CN1870596A - Receiving apparatus and transmitting apparatus - Google Patents

Receiving apparatus and transmitting apparatus Download PDF

Info

Publication number
CN1870596A
CN1870596A CNA200610084498XA CN200610084498A CN1870596A CN 1870596 A CN1870596 A CN 1870596A CN A200610084498X A CNA200610084498X A CN A200610084498XA CN 200610084498 A CN200610084498 A CN 200610084498A CN 1870596 A CN1870596 A CN 1870596A
Authority
CN
China
Prior art keywords
identifier
communicator
receiving system
password identifiers
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA200610084498XA
Other languages
Chinese (zh)
Inventor
高桥雅史
岩井俊幸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sharp Corp
Original Assignee
Sharp Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sharp Corp filed Critical Sharp Corp
Publication of CN1870596A publication Critical patent/CN1870596A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A communication terminal of the present invention includes: judgment section for whether or not a hidden identifier hidden from the user and assigned fixedly and uniquely to each communication terminal or the like is included in response data transmitted from another communication apparatus in reply to transmission of connection request data including data requesting connection with the communication apparatus; and response data generating section for generating, in later calls in cases where the hidden identifier is judged to be included in the response data, reply data including (i) the hidden identifier assigned to the communication terminal and the hidden identifier received from the communication terminal.

Description

Receiving system, dispensing device
Technical field
The present invention relates to communication technical field, particularly a kind of identifier that uses telephone number and so in the network of packet switching formula communicates device, system, method and program that the calling between the device is controlled.
Background technology
In recent years, along with popularizing of connecting-type the Internet often, the communication service identical with former telephone network can provide by the Internet.In addition, in the former telephone network, because the restriction on quality and the cost and the communication service of not too common TV phone and so on has also produced universal sign.
Under the situation of the communication service of internet usage, it is basic transmitting based on the data of IP (Internet Protocol).During IP-based data transmitted, terminal was divided into grouping with data, and the IP address of adding the expression communication object to each grouping also sends.Afterwards, the Internet sends to the communication object terminal according to the transmission lines of IP address choice grouping with above-mentioned grouping.Employed IP address in the selection of transmission line like this, by the circuit of connecting terminal or provide the enterprise (below be called provider) of IP Connection Service to decide, so the user can't freely set.In addition, under a lot of situations, even circuit or provider are identical, the IP address also might be changed, and therefore is not constant (fixing).
So the IP address is not suitable for as be used for determining user or identifiers of terminals when making a phone call.Therefore, propose and adopted to be used for using intrinsic identifier of user and the Internet, with the whole bag of tricks that couples together between the terminal.The one example can list SIP (Session InitiationProtocol).
Contrast Figure 33 below, the action of the system that uses SIP is described.
Terminal A and terminal B, with oneself the IP address as aforesaid be used for retrieving separately the sign (tag) of intrinsic sip address, registration (register) in sip server (C1, C2).In addition, the IP address of sip server is constant.
Below the action under the situation of terminal A calling terminal B is described.
In this case, terminal A is a destination-address to the sip address ([email protected]) that sip server sends to distribute to terminal B, and has added the connection request signal (C3) of the IP address of oneself.Afterwards, after sip server receives this signal, visit the database of oneself, the sip address of terminal B is used mark as retrieval, the IP address (192.168.0.100) of searching terminal B, the above-mentioned connection request signal of self terminal A is transmitted to terminal B (C4) in the future.
Terminal B receives after the above-mentioned signal, and the IP address (192.168.0.100) of oneself is added in the response message, postbacks to sip server (C5), by sip server this response message is transmitted to terminal A (C6).By above order, terminal A and terminal B can learn mutual IP address.
Transfer of data in two terminals afterwards (for example flow data such as audio or video information or rest image etc.) is directly carried out (C7) without sip server.
In addition, from terminal B when terminal A sends response message, response message is via sip server, also can learn by such sip server and finish terminal A and being connected of terminal B.
Above step is the example of having simplified, and in fact also is used to transmit the negotiation (negotiation) of the agreement and the port numbers of sound.In addition, require sometimes to transmit connection request from terminal A to terminal B, but because irrelevant with essence of the present invention through a plurality of sip servers, thus in the following description only to describing via the action under the situation of single S IP server.
In addition, be used for using DDNS (Dynamic Domain Name Service) etc., can be used as the purpose identical with SIP with reference to structure according to the IP address of certain identifier dynamic change.
But there are several problems in employed telephone number in the telephone network of the switch before above-mentioned IP telephone network or the use.Following (1)~(4) list its subject matter.
(1) if the connection place of terminal changes because of user's removal of home etc., then telephone number also changes, if therefore use telephone number before this, make a phone call then can't for this user.
(2) if telephone number known by undesirable object, then might make undesirable phone from this object.
(3) under the situation that above-mentioned telephone number is known by uncertain a plurality of people, before the change telephone number, might receive malicious call etc.
(4) because above-mentioned telephone number is enumerating of numeral, so the user is difficult to storage, and makes mistakes easily during input.
Here, about the problem of above-mentioned (4), particularly in mobile phone,, obtained partly solving by electric phone book being set at terminal inner.For example, replace directly input telephone number, with name and telephone number associated being recorded in the terminal, the user only by retrieve the other side's who wishes contact title from telephone directory, just can call out reliably.
In addition, in order partly to solve the problem in above-mentioned (2), (3), for example in patent documentation 1 (spy opens 2001-119482 communique (April 27 calendar year 2001 is open)), announced and a kind ofly given a terminal, can add telephone system by the subsidiary ID registration system that this any identifier connects with a plurality of identifier allocation.
In the system of patent documentation 1, when connecting same terminal, use permanent allocation to give the telephone number of terminal, and the temporary transient subsidiary ID that distributes.Here, above-mentioned subsidiary ID is made of the sum that is restricted to given figure place, but in order in pager message etc., to use, and by the combination definition of numeral and the conversion between the Word message, can use people easily storage compatibility person arranged, and carry out release management it can not repeated with other entrants' subsidiary ID.By like this, when the user connects other users in hope, just can be connected as long as know among telephone number and the subsidiary ID any, in addition, receive the user of connection, do not know permanent telephone number, only know that subsidiary ID just can receive connection.
Below use Figure 34, above-mentioned adding telephone system is specifically described.
Be assigned these two identifiers of telephone number and subsidiary ID in the terminal 1002.In addition, be assigned telephone number in the terminal 1003.Audio communication between terminal 1002 and the terminal 1003 is carried out through adding telephone network 1001.
At first, the user of terminal 1002 uses telephone number--connection ID service station 1004.After the connection,, receive giving of subsidiary ID 00000000 by adopting DTMF method remote operation ID such as (Dual ToneMultiFrequency, dual-tone multifrequencies) management control part 1006.Meanwhile, ID management control part 1006 will attach the corresponding relation between the telephone number △ △ △-△ △ △-△ △ △ △ of ID 00000000 and terminal 1002, be registered in the database 1007.
Afterwards, know the user of the subsidiary ID 00000000 of terminal 1002, add preamble for above-mentioned subsidiary ID ● ● ● ●, input to after the terminal 1003, switch 1011 identifies above-mentioned preamble ● ● ● ●, notify above-mentioned subsidiary ID 00000000 to ID service station 1004.Here, above-mentioned preamble is an employed particular number under the situation about dialling by subsidiary ID.
Afterwards, ID service station 1004 is by comparable data storehouse 1007, and the telephone number △ △ △-△ △ △-△ △ △ △ with above-mentioned subsidiary ID 00000000 is transformed into terminal 1002 sends to switch 1011 with the telephone number after the conversion.Like this, the telephone number of switch 1011 after according to above-mentioned conversion connects to come the calling of self terminal 1003 to terminal 1002.
By more than, above-mentioned adding telephone system does not know that telephone number just can confirm call-side and receiver side.Also promptly, above-mentioned adding telephone system can be protected the privacy of call-side and the privacy of receiver side simultaneously.
But, disclosed subsidiary ID registration system adds telephone system in the patent documentation 1, both there be not the open user who does not yet have prompt terminal 1002, to the mechanism of the original telephone number △ △ △-△ △ △-△ △ △ △ of the user notification of the terminal 1003 of using subsidiary ID to be connected.
Therefore, user for terminal 1002, the user of terminal 1003 is also to have wished to allow under the permanent user's who connects the situation after having changed the subsidiary ID 00000000 of terminal 1002, have the operation of the oral reception and registration telephone number of the user △ △ △-△ △ △-△ △ △ △ produced terminal 1002, and the user who has produced terminal 1003 writes down this problem of operation (generation of the problem of above-mentioned (4)) of above-mentioned telephone number.In addition, also exist the user of the telephone number that do not prevent to be told this telephone number to be notified to other people this problem of method (generation of the problem of above-mentioned (2)).And the user needs separately to use telephone number and subsidiary ID both sides consciously, has using method this problem of complexity that becomes.In addition, need separately to use this point consciously, in patent documentation 1, be used for separately using the dedicated preamble this point of telephone number and subsidiary ID to learn from use.
Summary of the invention
The present invention proposes in view of above problem, even purpose is to provide a kind of telephone number of former communicator of once communicating by letter to take place under the situation of change, also can communicate, can improve simultaneously the in order to be effective receiving system of privacy in the user's communications, dispensing device etc.
Related receiving apparatus of the present invention, in order to address the above problem, receive data from the communicator that is connected through communication line, it is characterized in that, possess: address storage part, it is to a plurality of communicators, with intrinsic in the definite information that is used for determining this communicator of each communicator, each communicator and the password identifiers to user cipher device, expression fixed allocation be used for connection that this communicator is postbacked could connection could information, be saved in the corresponding form; Extraction mechanism, it extracts the password identifiers of this communicator from the connection request data as the received data that include the request connection of a communicator of one of described communicator; Searching mechanism, it uses the password identifiers that is extracted, and retrieves the described form in the described address storage part; And could decision mechanism, its result in retrieval is that the password identifiers of described extraction is recorded under the situation in the described form, reading the connection that the password identifiers that be extracted is recorded in the described form could information, could information according to the connection of being read, judge whether to allow connection to a described communicator.
By above-mentioned formation, in the above-mentioned address storage part, above-mentioned definite information, above-mentioned password identifiers and above-mentioned connection could information be kept in the form that is mapped.Here, determine information, be equivalent to the possessory name of communicator, open identifier etc. so long as can determine that the information of communicator is just passable.In addition, open identifier is telephone number or IP address and so on, is used for confirming respectively the identifier of communicator and receiving system, is disclosed identifier.
In addition, password identifiers is the identifier of the intrinsic and fixed allocation of communicator, is stored in the communicator, and Any user all can't obtain.Because Any user is not all known, so no matter which user can't change password identifiers.In addition, as the extraction example that carries out password identifiers by extraction mechanism, for example can allow the extraction mechanism executive program, this program is provided with in the data of password identifiers in advance according to certain particular data that rule generated, when communicator and receiving system detect this particular data, can be judged as and extract password identifiers.
If receive the connection request data, just said extracted mechanism is from the password identifiers of this this communicator of extracting data from one of a plurality of communicators.Here, above-mentioned connection request data are meant that communicator is used for data that the receiving system request is connected.And above-mentioned searching mechanism uses the password identifiers that is extracted to retrieve the interior form of above-mentioned address storage part.In addition, above-mentioned receiving system is just passable as long as have receiving function at least, except receiving function, for example can also have sending function accordingly.
The result of retrieval is, above-mentioned connection of could decision mechanism reading corresponding above extracted password identifiers could information, could information judge whether to allow to connect according to the connection of being read.In addition, connection could information, be the information of each communicator being set the sign that could connect and note and so on, can replace in order to confirm whether communicator is the regular communicator of legal registration for receiving system, and confirm the information of this condition of definite information (proof identifier for example described later or affirmation identifier) of the intrinsic setting of institute in the communicator.
Like this, by with password identifiers be connected and could information be mapped, for the communicator that has sent the connection request data that include password identifiers, could decision mechanism can carry out according to connect could information could judge.Therefore, even the user of communicator changes after its open identifier, password identifiers and the influence that could information also can not be subjected to the change of open identifier to connection that should password identifiers.Consequently, the communicator that the connection of corresponding password identifiers allows is even under the situation that the open identifier of this communicator is changed, also can communicate.In addition, the communicator that corresponding password identifiers can not connect no matter how the open identifier of this communicator changes, can both be refused communication.
By like this, use the user of above-mentioned communicator and the secret per family password identifiers of usefulness of above-mentioned receiving system, the user of above-mentioned receiving system can only communicate with an object that allows communicate by letter.In addition because above-mentioned password identifiers is constant, therefore played with open identifier irrelevant, can carry out based on password identifiers with special object between this effect of communicating by letter.
In addition, related receiving apparatus of the present invention, for addressing the above problem, be the receiving system that receives data from the communicator that is connected through communication line, it is characterized in that possessing: address storage part, it is to a plurality of communicators, with the definite information that is used for determining this communicator of each communicator, and the password identifiers to user cipher device of intrinsic and fixed allocation in each communicator, be saved in the corresponding form; Extraction mechanism, it extracts the password identifiers of this communicator from the connection request data that include the data of asking connection that communicator received for the first time as one of described communicator; Searching mechanism, the password identifiers that it uses described extraction mechanism to extract is retrieved the described form in the described address storage part; And write controlling organization, it is that the password identifiers identical with the described password identifiers that extracts is not recorded under the situation in the described form at result for retrieval, password identifiers and described definite information that this extracted are mapped, are written in the described form.
By above-mentioned formation, if receive the connection request data first, just said extracted mechanism is from the password identifiers of this this communicator of extracting data from a communicator of one of a plurality of communicators.Like this, extracted in extraction mechanism under the situation of password identifiers, above-mentioned searching mechanism uses the password identifiers that is extracted, and retrieves the form in the above-mentioned address storage part.
At result for retrieval is the situation that does not have to preserve the password identifiers identical with the password identifiers that is extracted in the above-mentioned address storage part, and the communicator that is equivalent to have password identifiers is asked the situation of suitable connection first, perhaps can regard as suitable.Therefore, the above-mentioned controlling organization that writes is mapped definite information of above extracted password identifiers and communicator, is written in the above table in the above-mentioned address storage part, and this communicator is registered.
By above-mentioned formation owing to from above-mentioned connection request data, automatically extract the password identifiers of communicator, and be registered in the above table, therefore played not just can the exchanging secrets identifier via the user effect.
In addition, open identifier is telephone number or IP address and so on, is used for determining respectively the identifier of communicator and receiving system, is disclosed identifier.In addition, above-mentioned definite information can be above-mentioned open identifier so long as can determine that the information of communicator is just passable, also can be the possessory name of communicator etc.
Relevant dispensing device of the present invention, in order to address the above problem, it is a kind of communicator to being connected through communication line, send the dispensing device of data, it is characterized in that possessing: decision mechanism, it judges that the corresponding connection request data that will include the data of request connection have sent to described communicator, from the reply data that this communicator postbacked, whether include each this communicator the password identifiers to user cipher device of intrinsic and fixed allocation; And data generate mechanism, it includes in described reply data under the situation of password identifiers in the result who judges, in later calling, generate and to include the password identifiers of distributing to dispensing device self and from the connection request data of the received password identifiers of described communicator or postback data described communicator.
By above-mentioned formation, above-mentioned decision mechanism is judged from the reply data that communicator postbacked that sent the connection request data, whether is included password identifiers.Here, above-mentioned reply data is the data that include the information that expression replys above-mentioned connection request data.In addition, the result who judges includes in the above-mentioned reply data under the situation of password identifiers, allow with this communicator between be connected, in the calling afterwards, above-mentioned data generate mechanism, generate the password identifiers that includes above-mentioned dispensing device self and from the data that postback of the received password identifiers of above-mentioned communicator (also promptly distributing to the intrinsic password identifiers of communicator of communicator).In addition, above-mentioned dispensing device is just passable as long as have sending function at least, except sending function, for example can also correspondingly have receiving function.
By like this, in above-mentioned reply data, include under the situation of password identifiers, the user of above-mentioned dispensing device, irrelevant with the open identifier of oneself and other party, all can communicate with the specific object that exchanged password identifiers.
Related receiving apparatus of the present invention, in order to address the above problem, be a kind of being assigned with to user cipher device and can be as password identifiers to the destination-address of the connection request of receiving system, and with by open to the user and can be as to the open identifier of the destination-address of the connection request of receiving system and any in the above-mentioned password identifiers, the communication line of determining the receiving system of linking objective is connected, receive the receiving system of data from the communicator that is connected with communication line, it is characterized in that, described receiving system possesses: extraction mechanism, they are from the connection request data that the received request of one of described communicator connects, and extraction includes the open identifier of receiving system self and any the above object way address information in the password identifiers; Could decision mechanism, it is according to the described destination-address information of extracting, and judgement could be connected with the communicator that has sent described connection request data; And postbacking data generation mechanism, it generates the data that postback of expression permission connection under the situation that permission connects.
By above-mentioned formation, related receiving apparatus of the present invention can receive data from other communicators that are connected with above-mentioned communication line.In the above-mentioned communication line, the receiving system that is connected with this communication line comes unique identification by password identifiers.In addition, be assigned with at receiving system under the situation of open identifier, also can uniquely discern by open identifier.Therefore, in the above-mentioned communication line, the communicator that is connected can be used as destination-address with the open identifier or the password identifiers of receiving system, and receiving system is sent data.In other words, receiving system can receive the connection request data that open identifier or password identifiers with this receiving system from above-mentioned communicator are destination-address.In addition, open identifier is telephone number and so on for example, to the disclosed identifier of user.Relative therewith, password identifiers is stored in receiving system or communicator inside, is the identifier to user cipher device.
Receive after the connection request data from above-mentioned communicator, said extracted mechanism extracts the destination-address information that includes open identifier or password identifiers from these connection request data.Afterwards, according to the destination-address information of being extracted, above-mentioned could decision mechanism to whether carrying out and having sent data communication between the communicator of connection request data, also promptly connect and could judge.
For example, can include under the situation of password identifiers as destination-address information above-mentioned could mechanism's judgement the permission to connect.Perhaps, including under the situation of open identifier as destination-address information, be to use in judgement under the situation of first calling of open identifier, allowing to connect; Perhaps, can be set to allow to connect to using the calling of open identifier; Perhaps above-mentionedly could decision mechanism refuse the judgement that connects without exception.And then, can also in the connection request data, include under the situation of the open identifier of communicator or password identifiers, can be corresponding with it, preserve in advance expression and this communicator be connected could information, judge that according to this information connection could wait, not special the qualification.
Like this, could decision mechanism judge under the situation that allows to connect that above-mentioned the above-mentioned data that postback generate mechanism, generate expression allow with above-mentioned communicator between be connected postback data.Afterwards, the data that postback that generated are sent to above-mentioned communicator, establish a communications link between above-mentioned receiving system and the above-mentioned communicator, carry out data communication.
By like this, related receiving apparatus of the present invention can be corresponding to the content of destination-address information, to be connected above-mentioned communication line in other communicators between be connected and limit.For example, can convey in the communicator that above-mentioned communication line connects, have only the communicator of the password identifiers of having obtained receiving system in advance, can carry out and this receiving system between data communication.
Relevant dispensing device of the present invention, be a kind of with by open to the user and can be used as open identifier to the destination-address of the connection request of receiving system, with to user cipher device and can be as in the password identifiers of the destination-address of the connection request of receiving system any, the communication line of determining the receiving system of linking objective is connected, send the dispensing device of data to the receiving system that is connected with this communication line, it is characterized in that, possess: address storage part, it will get up to the corresponding preservation with described password identifiers of the disclosed definite information of user in order to distinguish each password identifiers; And data generation mechanism, its generation includes the connection request data by the specified password identifiers of described definite information.
By above-mentioned formation, relevant dispensing device of the present invention can send data to the receiving system that is connected with this communication line, and can be the dispensing device that is not assigned with password identifiers.In the above-mentioned communication line, the receiving system that is connected with above-mentioned communication line can come unique identification by open identifier or password identifiers.Therefore, in the above-mentioned communication line, open identifier or password identifiers with this receiving system that the receiving system that is connected with this communication line can receive from above-mentioned dispensing device are the data of destination-address.In other words, above-mentioned dispensing device can be used as destination-address with the open identifier or the password identifiers of this receiving system, and this receiving system is sent data.。
In addition, by above-mentioned formation, above-mentioned address storage part stores and is used for allowing definite information of a plurality of receiving systems that user's difference of above-mentioned receiving system is connected with above-mentioned communication line.Determine that information is to the disclosed information of user, the user can be free with reference to the definite information that is stored in the above-mentioned address storage part.For example, determine that information can be the user's name or the diminutive of receiving system, or distribute to the open identifier of receiving system.In addition, in the above-mentioned address storage part, will determine information and distribute to that corresponding preservation is got up by determining the password identifiers of the determined receiving system of information.In addition, the user can not be free with reference to the password identifiers that is stored in the address storage part.
Send under the data conditions for the receiving system that is connected in the above-mentioned communication line, the user of above-mentioned dispensing device specifies the receiving system that sends the destination by determining information.Afterwards, above-mentioned data generate mechanism, will be in address storage part with the corresponding password identifiers of above-mentioned definite information as destination-address, generate the connection request data.Also promptly, in the connection request data that generated, include the definite information corresponding password identifiers specified, as destination-address information with the user.
By like this, in the relevant dispensing device of the present invention, the receiving system that is connected in the above-mentioned communication line is being sent under the data conditions, and the user determines information by specifying, and the password identifiers that can generate with the receiving system that sends the destination is the connection request data of destination-address.Also promptly, password identifiers is preserved under the state to user cipher device, can password identifiers be sent the connection request data as destination-address to being connected in the above-mentioned communication line and allowing to obtain the receiving system of password identifiers.
Other purposes of the present invention, feature and advantage can be fully clear and definite by explanation shown below.In addition, advantage of the present invention can be come clear and definite by the explanation that following contrast accompanying drawing is carried out.
Description of drawings
Fig. 1 is the figure of expression embodiments of the present invention 1, is the block diagram of functional structure of the control part of expression communication terminal.
Fig. 2 is the figure of the structure of employed open identifier in the expression embodiments of the present invention.
Fig. 3 is the 1st (classification numbering) and the figure that distributes relation between objects in the data rows of employed open identifier in the expression embodiments of the present invention.
Fig. 4 is the figure of the summary of employed various identifiers in the expression embodiments of the present invention.
Fig. 5 is the figure of expression embodiments of the present invention, is the block diagram of all structures of expression communication system.
Fig. 6 is the block diagram of wanting bilge construction of expression related communication terminal of the present invention.
Fig. 7 constitutes the structure chart of one of input/output unit of one example for representing display part and input part.
Fig. 8 is the precedence diagram as execution mode 1 of the order of the communication process in the expression communication system of the present invention.
The figure of one of set information that Fig. 9 is provided to the user's communications terminal from setting server of the present invention for expression example.
The figure of one of the demonstration in the display part of Figure 10 during example for the above-mentioned communication terminal of expression initial setting.
The figure of one of the set information that Figure 11 is downloaded from above-mentioned setting server for expression communication terminal example.
Figure 12 (a) is when being illustrated in the open identifier of registering communication terminal in the server and address designator, send to the figure of one of the message example of server from communication terminal, Figure 12 (b) is for the password identifiers that is illustrated in registering communication terminal in the server during with address designator, sends to the routine figure of one of message of server from communication terminal.
Figure 13 (a) sends one of message under the situation of message related to calls that terminal generated the open identifier that contains the password identifiers that sends terminal self and receiving terminal routine figure for expression, Figure 13 (b) has generated the figure of one of the message under the situation of accepting response message of the password identifiers that contained receiving terminal self and the open identifier that sends terminal example for the above-mentioned receiving terminal of expression, Figure 13 (c) has generated the figure of one of the message under the situation of call denial response message of the password identifiers that does not contain receiving terminal self example for the above-mentioned receiving terminal of expression.
Figure 14 is the figure that expression is stored in one of tableau format in telephone directory storage part example.
Figure 15 (a) is for representing having pointed out the receiving terminal of password identifiers, send the figure of one of message under the situation that terminal generated the password identifiers that contains receiving terminal and the message related to calls of the password identifiers that sends terminal self example, Figure 15 (b) replys the message related to calls of Figure 15 (a) for expression, by the figure that accepts one of response message example that receiving terminal generated.
Figure 16 is the flow chart of the flow process of the associated call processing of expression embodiments of the present invention 1.
Figure 17 is the flow chart of the flow process of the associated call processing of expression embodiments of the present invention 1.
Figure 18 is the precedence diagram as execution mode 2 of the order of the communication process in the expression communication system of the present invention.
Figure 19 sent terminal before the password identifiers with self sends to receiving terminal for expression, the figure of the demonstration example of the message that the user of request transmission terminal confirms.
Figure 20 is for representing to be stored in the figure of the tableau format example in the execution mode 2 in the telephone directory storage part.
Figure 21 (a) sends the figure that terminal has generated one of message under the situation that includes the proof identifier that sends terminal self and the message related to calls of the open identifier of receiving terminal example for expression, and Figure 21 (b) has generated one of the message under the situation of accepting response message of the proof identifier that included receiving terminal self and the open identifier of transmission terminal routine figure for the above-mentioned receiving terminal of expression.
Figure 22 is the precedence diagram as execution mode 3 of the order of the communication process in the expression communication system of the present invention.
Figure 23 (a) sends the figure that terminal has generated one of message under the situation that includes the proof identifier that sends terminal self and the message related to calls of the open identifier of confirming identifier and receiving terminal example for expression, and Figure 23 (b) has generated the proof identifier that included receiving terminal self and confirmed identifier and send one of message under the situation of accepting response message of open identifier of terminal routine figure for the above-mentioned receiving terminal of expression.
Figure 24 is for representing to be stored in the figure of the tableau format example in the execution mode 3 in the telephone directory storage part.
Figure 25 (a) is for representing having pointed out the receiving terminal of password identifiers, sending terminal has generated password identifiers that contains receiving terminal and the password identifiers that sends terminal self and has been exclusively used in receiving terminal and the figure of one of message under the situation of the message related to calls of the affirmation identifier that generates example, Figure 25 (b) replys the message related to calls of Figure 25 (a) for expression, by the figure that accepts one of response message example that receiving terminal generated.
Figure 26 is the flow chart of the flow process of the associated call processing of expression embodiments of the present invention 3.
Figure 27 is the flow chart of the flow process of the associated call processing of expression embodiments of the present invention 3.
Figure 28 is the block diagram of all structures of the associated communication system of expression embodiments of the present invention 4.
Figure 29 (a) is the figure of the structure of the employed password identifiers of this communication terminal of expression for the figure of the structure of the employed open identifier of related communication terminal of expression embodiments of the present invention 4, Figure 29 (b).
Figure 30 is the precedence diagram as execution mode 4 of the order of the communication process in the expression communication system of the present invention.
The figure of one of the set information that Figure 31 downloads from the setting server for the related communication terminal of expression embodiments of the present invention 4 example.
Figure 32 (a) is the routine figure of one of message related to calls during based on first communication of the relevant password identifiers of embodiments of the present invention 4 and the combination of confirming identifier for expression, Figure 32 (b) one of allows to reply the figure of example to the connection of Figure 32 (a) for expression, Figure 32 (c) is one of the exchange messages figure of example of expression identifier, Figure 32 (d) for expression to the identifier of Figure 32 (c) exchange one of reply the figure of example, Figure 32 (e) is the figure of one of the message related to calls in the 2nd when communication of expression example, and Figure 32 (f) one of allows to reply the figure of example to the connection of Figure 32 (e) for expression.
Figure 33 is the block diagram of all structures of the former communication system of expression use sip server.
Figure 34 is the block diagram of all structures of the telephone system before the expression.
Figure 35 is the figure of the structure of the related system integral body of expression embodiments of the present invention 5.
Figure 36 is the figure of the structure of the communication terminal of the associated call side of expression embodiments of the present invention 5.
Figure 37 is the figure of the structure of the communication terminal of the relevant incoming call side of expression embodiments of the present invention 5.
Figure 38 for expression with the relevant incoming call side communication terminal of embodiments of the present invention 5, be divided into the terminal that independently goes out to postback the server capability of the view data of being asked, and be used for sending to terminal the figure of formation of the terminal of various command through network.
Figure 39 is the precedence diagram of one of communication process in the associated communication system of expression embodiments of the present invention 5 example.
Figure 40 is the flow chart of the flow process of the relevant call waiting processing of expression embodiments of the present invention 5.
Figure 41 is the precedence diagram of one of communication process in the associated communication system of expression embodiments of the present invention 5 example.
Embodiment
Related receiving apparatus of the present invention and dispensing device for example can be applied to the communication terminal that communicates mutually and the communication system of IP phone machine, mobile phone, mail transmitter-receiver and so on.
[execution mode 1]
In the present embodiment, use a plurality of identifiers (open identifier, password identifiers, proof identifier, affirmation identifier, address designator), therefore at first each identifier is described.
Open identifier is the identifier that is equivalent to the telephone number in the former phone, is employed identifier when connecting the communication terminal that did not connect as yet before this.If more convenient to the user, and no problem, then no matter be that any identifier system can.Here use the numeral of 10 shown in Fig. 2.In addition, can omit the hyphen that is inserted between the numeral.Each position that below will disclose identifier is called the 1st, the 2nd in turn from a left side.
The 1st the classification numbering of utilizing purpose etc. for the open identifier of expression, for example corresponding with the distribution object shown in Fig. 3.Here, above-mentioned distribution object is represented application target, purposes of the open identifier of the kind of distributing the user types of open identifier or accepting window and so on etc.
For example, as shown in Figure 3, classification numbering 2 is corresponding with " the specific consumers window is used " of distributing object, represents that for example bank is to having the open identifier that the user informed of bank account.In addition, classification numbering 3 corresponding " client's window is used " of distributing object for example are the open identifiers of printed manual class, and expression is to the open open identifier of uncertain a plurality of users.Classification numbering 4 is corresponding " during limit window with " of distributing objects, represent accepting of for example concert wait only during specific in the effective identifier that discloses.Above-mentioned classification numbering the 2,3, the 4th, " professional using ".Relative therewith, classification numbering 5 and classification numbering 7, corresponding " the general user with " who distributes object, common user's open identifier is distributed in expression.
In addition, whether correct the 2nd be to be used for judging according to following formula (1) the 1st and the 3rd 's to the 10th numbering check digit (check digit).By like this, the user's input error that can take precautions against caller's side is in possible trouble.And then 8 numerals of the 3rd to the 10th are arbitrarily, to each communication terminal duplicate allocation not.In addition, open identifier can change at any time by user's request, no longer utilizes basically.
Above-mentioned check digit for example through type (1) is obtained.
[(n 1+n 3+n 5+n 7+n 9)×3+(n 4+n 6+n 8+n 10)]mod10…(1)
In addition, n aRepresent a bit digital.
In the above-mentioned formula (1), for example as to shown in the remarks of the communication terminal 10a of Fig. 5, be numbered 5 according to classification, the numbering that connects identification code and be 1234-5678 is obtained check digit, and then as the formula (2), check digit is 3, and open identifier is 53-1234-5678.
[(5+1+3+5+7)×3+(2+4+6+8)]mod10=3…(2)
Like this, consistent if bring the numbering of being imported into value that formula (1) is obtained with the 2nd check digit, just judge there is not input error.
Because the 1st of open identifier is the classification numbering, so the user is initial only by seeing the 1st numbering, just can learn which purposes it is distributed as.In addition, by check digit being arranged on the 2nd, can freely distribute from the 3rd to the 10th numeral.By like this, can number the numbering that 2,3,4 such " professional using " open identifier allocation are remembered easily to classification.
In addition, no matter which classification in the present embodiment, all with 10 numeral as open identifier, but be not limited in this, can also use the number system of the short numbering of distributing memory easily in " professional with " numbering.
Next, password identifiers is the identifier no matter which user can't see, and is the intrinsic and mutually different identifier of each communication terminal.Because the user can't see, therefore if communication system can handle, then no matter be any identifier system can, but use 8 alpha-numeric string (for example the communication terminal 10 of Fig. 5 marked " ufds3982 ") here.Here, employed numbering in the password identifiers, identical with employed numbering in the above-mentioned open identifier, be called the 1st, the 2nd successively from a left side.
In the 1st,, can use the character beyond the numeral in order to distinguish in the above-mentioned password identifiers employed numbering in employed numbering and the above-mentioned open identifier.Here be fixed as " u ".Also promptly, when the 1st of alphanumeric row was " u ", these alphanumeric row were password identifiers as can be known.Remaining 7 is alphanumeric arbitrarily, and case-insensitive.Like this, in the communication system of the present invention, can distinguish each identifier, the constraint item of holding its kind is defined as communication protocol.
Password identifiers is the identifier that is used for determining the user basically, and the password identifiers of therefore temporarily distributing to certain communication terminal is fixed in this communication terminal, and is stored in the communication terminal.Can be corresponding to user's request, distribute a plurality of password identifiers for a communication terminal, in this case, by appending distribution, the password identifiers that has distributed is not deleted.But,, also can be the service of moving password identifiers from old communication terminal to the new traffic terminal according to the application of communication service.
Next, prove identifier (the 1st identifier in the scope that respective rights requires), identical with password identifiers, be the identifier that the user can't see, all identical except the 1st with password identifiers.Here, for example among Figure 20 as shown in " i328fas2 " of an example, the 1st figure place of above-mentioned proof identifier is " i ".In addition, above-mentioned proof identifier is generated as with password identifiers and concerns one to one, and the corresponding relation between password identifiers and the proof identifier is constant.The use example of proof identifier describes in execution mode 2.
Above-mentioned password identifiers and proof identifier are distributed to each user by the manager who communicates by letter.
Relative therewith, following affirmation identifier (the 2nd identifier in the scope that respective rights requires) is by each user's terminal generation.Confirm that identifier is before being used for confirming and the identifier that the user can't see of destinations traffic terminal communication,, by being generated as the destinations traffic terminal-specific from communication terminal, and send the destinations traffic terminal to the proof identifier of destinations traffic terminal.For example showing " c9jd09j5 " as an example among Figure 24, is the 1st 8 alphanumeric row for " c ".Though for the proof identifier of destinations traffic terminal, and need not be unique, must generate to such an extent that be not easy to infer.For simplicity can consider to generate by random number.In addition,, proof identifier and password identifiers concern that therefore identifier is confirmed in the proof identifier generation of destinations traffic terminal, the password identifiers that is equivalent to the destinations traffic terminal generates the affirmation identifier because being in one to one.Detailed content will describe in execution mode 3.
Next, address designator is described.
Communication terminal of the present invention is assumed to and is connected with the Internet to be in the packet switching network of representative and to use.In the packet switching network, transmit grouping to receiving target, need this information be called address designator here with the information that decides circuit for transmission source from data.If the Internet, then mean it is " 192.168.12.34:5060 " such IP address (and port numbers) of being marked for example for the communication terminal A of Fig. 5, also address designator is described as the IP address in the following description.
Explanation to above-mentioned each identifier reduces form, as shown in Figure 4.
Next transmission and the record to each identifier describes.
When calling out (transmission)/incoming call (reception), send and receive open identifier, password identifiers, proof identifier, but encrypt preferably for each identifier.In the field of the Internet, use IPsec (IPSecurity Protocol) etc. are as encryption rule.In addition, in password identifiers and for example nonvolatile memory that in communication terminal, had of proof identifier record the time, preferably also under the state of having encrypted, carry out record, preferably note not known by the user.Certainly, if carried out under the state of appropriate managerial when repairing etc., also can use decryption device to wait to understand the identifier of having encrypted.
Contrast Fig. 5 describes associated communication system of the present invention.
This communication system has communication terminal 10a, communication terminal 10b, network 11, server (sip server) 12 and sets server 13.
Network 11 is the IP-based network such as the Internet that transmit communication data.
Server 12 carries out relaying corresponding to the inquiry from communication terminal 10a, 10b to grouping.
Set the server that server 13 provides the set information (aftermentioned) of communication terminal 10a, 10b.
Contrast Fig. 6 below, illustrate that the summary of communication terminal 10a, 10b constitutes.Communication terminal 10a, 10b have microphone 1, audio interface 2, input/output unit 3, control device 4, network interface 5, loud speaker 6, telephone directory storage part (address storage part) 7 as shown in Figure 6.
Microphone 1 is transformed into the electric signal (below be called audio signal) of simulation with sounds such as sound (sound wave), and this audio signal is sent to audio interface 2.
Audio interface 2 receives after the above-mentioned audio signal, this audio signal is transformed into numerical data encodes afterwards again, sends it to control device 4.
In addition, input/output unit 3 is in order to call out or operation such as incoming call and accept device from user's input, the input of being accepted to be transformed into signal, sending it to control device 4.In addition, input/output unit 3, for example shown in Figure 7, can be the keyboard of band picture.
Control device 4 becomes to be suitable for received data conversion after the grouping of network form this grouping to be sent to network interface 5.In addition, control device 4 has the 1st and sends control part the 41, the 2nd transmission control part 42, reception control part 43, reply data generating unit 44 as shown in Figure 1.Detailed will be explained below.
Above-mentioned network interface 5 receives after the above-mentioned grouping, sends above-mentioned grouping to the other side's communication terminal.Afterwards, network interface 5 sends to control device 4 with this grouping after the other side's communication terminal receives grouping, and control device 4 is resolved these groupings.Like this, control device 4 will obtain data by parsing, send to audio interface 2.
Audio interface 2 has received after the data of resolving, and is transformed into analog signal by these data of decoding, and this analog signal is sent to loud speaker 6.Loud speaker 6 receives after the above-mentioned analog signal, it is transformed into also outputs such as sound.
Telephone directory storage part 7 will be used for determining definite information (user name, open identifier etc.), the password identifiers of a plurality of communication terminals and connect could information, is saved in the corresponding table.Here, above-mentioned telephone directory storage part 7 is not limited in the fixing nonvolatile memory that is built in the communication terminal, for example can also be detachable assemblies such as cassette nonvolatile memory.By like this, in case the user is inserted into this assembly in the communication terminal beyond own and plays this communication terminal, the communication terminal that is positioned at various places just can equally with the communication terminal of oneself use.
Certainly, communication terminal can also have fixing nonvolatile memory and modularization the insertion section of nonvolatile memory, be inserted with modularization the situation of nonvolatile memory under, preferential with it certainly.
Contrast Fig. 8 below, the summary of the action of related communication terminal 10a, the 10b of present embodiment is described.In addition, here communication terminal 10a is a dispensing device, and communication terminal 10b is a receiving system, and the action during to communication terminal 10a call communication terminal 10b describes, but the action when communication terminal 10b call communication terminal 10a too, therefore the explanation of having omitted opposite situation.In addition, the symbol pub-a shown in Fig. 8 is the open identifier of communication terminal 10a, and symbol pub-b is the open identifier of communication terminal 10b.In addition, symbol sec-a is the password identifiers of communication terminal 10a, and symbol sec-b is the password identifiers of communication terminal 10b.In addition, the identifier that has marked underscore among Fig. 8 is represented the destination-address of message.
Server 13 is set in communication terminal 10a visit, carries out the initialization of oneself as described later.Next, oneself address designator (IP address) is registered in the server 12, by making server 12 can relaying send to the grouping of communication terminal 10a like this.
In addition, at communication terminal 10a first during call communication terminal 10b, communication terminal 10a with the open identifier of communication terminal 10b as destination-address, and include the password identifiers of communication terminal 10a, send to server 12 (pub-b, sec-a), server 12 is transmitted to communication terminal 10b according to the open represented destination-address of identifier.Afterwards, communication terminal 10b as destination-address, and includes the password identifiers of communication terminal 10b with the open identifier of communication terminal 10a, and (pub-a, sec-b), server 12 is transmitted to communication terminal 10a according to destination-address to send to server 12.By like this, above-mentioned communication terminal 10a and communication terminal 19b can intercourse password identifiers.In addition, because password identifiers is the intrinsic identifier of communication terminal, therefore can refuse the setting of incoming call according to it.
In the 2nd communication afterwards that the exchange of password identifiers is through with, when communication terminal 10a call communication terminal 10b, " the open identifier " when replacing first the calling with " password identifiers " reviewed identical route.
Below be divided into action in the registration of action in the initialization of communication terminal, communication terminal, call out the action of communication terminal under the situation of object of first communication and call out before the action of communication terminal under the situation of the object of communicating by letter describe.
At first the action in the initialization of communication terminal 10a is elaborated.
Server 12 and setting server 13 are managed and provide the enterprise of service, as shown in Figure 9, for example, address designator (IP address), user ID and the password of the needed setting server 13 of the initial setting of communication terminal 10a offered the user by mailing.Afterwards, as shown in figure 10, the user uses input/output unit 3, the address designator of server 13 will be set, user ID, password inputs to (step 1~step 4) after the communication terminal 10a, communication terminal 10a sends to setting server 13 with user ID and password, download initial setting information that should the user from setting server 13, also i.e. identifier (publicid) openly, password identifiers (secretyserid), set server address (setupserver), set server password (setupserverpassword), server address (sipserver), server password (sipserverpassword).Here, by the represented part of italic, be the character string that the user imports among Figure 10.The obtained set information of communication terminal 10a this moment, for example shown in Figure 11.
Finished after the initial setting by above step, as shown in figure 10, transferred to the standby picture (step 5) of the input of waiting for the other side's numbering.In addition, be address designator (IP address) though set server address, in order to allow the user import easily, blank character is transformed into * and provides out., occur when wrong in input as the step 4 among Figure 10 ' shown in demonstration, the several seconds is got back to step 1 afterwards automatically.Below just finished initial setting.
Here, communication terminal 10a is transformed into the title of IP address (address designator) by using DNS, provides sip server address and the related setting information of setting server address, by like this, can change the IP address (address designator) of server when needed in the future.
Next the action in the registration of communication terminal 10a is described.
During the starting of communication terminal 10a, or change has been when having taken place in the address designator of distributing to communication terminal 10a, and communication terminal 10a is registered to the address designator of oneself in the server 12.In addition, communication terminal 10a can also regularly upgrade institute's addresses distributed identifier and be registered in the server 12.In the server 12, except by such address designator of registering, also registration has open identifier and password identifiers.
In addition, only can use the server of the general specification that the corresponding relation between an identifier and the address designator is managed in the native system.In this case, can register open identifier and address designator respectively, and the combination of password identifiers and address designator.
When Figure 12 (a) is the combination of the open identifier (5312345678) of registering communication terminal 10a and the address designator (192.168.12.34:5060) that contains port numbers, from communication terminal 10a sends to the sip message of server 12, isolate major part and one of show example, Figure 12 (b) is during for the combination of the password identifiers (ufds3982) of registering communication terminal 10a and the address designator (192.168.12.34:5060) that contains port numbers, isolates major part and one of show example from communication terminal 10a sends to the sip message of server 12.
By above location registration process, from then on after, for example open identifier or the password identifiers of communication terminal 10b designated communication terminal 10a, and send message (grouping) to server 12, by like this, server 12 can be with this forwards to communication terminal 10a.In order to confirm, for example to use the communication terminal authentication of server password etc., but, omit explanation here owing to be common technology from the request of communication terminal 10a, 10b or the legitimacy of message.According to the requirement on the safety, for example each server 12,13 and communication terminal 10a, 10b sometimes, and the communication between communication terminal 10a, the 10b also encrypts, but equally also be common technology, therefore omit its explanation.
Contrast Fig. 8 below, and use the example of communication terminal 10a call communication terminal 10b, the action of communication terminal 10a under the situation of the object of calling out first communication is described.
The main points of processing in this case are, the connection request data that communication terminal 10a will include request connection data send to communication terminal 10b, relative therewith, communication terminal 10a judges the password identifiers that whether includes communication terminal 10b from the reply data that communication terminal 10b is postbacked, in above-mentioned reply data, contain under the situation of password identifiers in the result who judges, in the later calling to communication terminal 10b, communication terminal 10a generates the password identifiers include communication terminal 10a oneself and as the connection request data of the password identifiers of the communication terminal 10b of communication object.Be specifically described below.
At first, communication terminal 10a (shown in Fig. 5,14, the user is " hillside plot is the youth too ") will be the connection request message (connection request data) of destination-address with the open identifier pub-b (5913572468 shown in Fig. 5) of communication terminal 10b, send to server 12, request connects.
Here, shown in Figure 13 (a), in the above-mentioned connection request message, except the message (INVITE) that is used for connection request, the password identifiers (ufds3982) that also is added with call-side (In-Reply-To).
Figure 13 (a) is one of a connection request message example.In this example, specify open identifier (5312345678) as the information (From) of determining call-side, the open identifier (5913572468) of designated communication terminal 10b is as the information (To) of determining destination-address, and the identifier (In-Reply-To) when specifying password identifiers (ufds3982) to call out with reference to this as communication terminal 10b or server 12.In addition, in the above-mentioned connection request message, the address designator (192.168.12.34:5060) that also includes communication terminal 10a (Contact).
Server 12 is given communication terminal 10b with reference to destination-address with above-mentioned connection request forwards.Communication terminal 10b is with reference to the form (Figure 14) that is stored in the telephone directory storage part 7, if there is not to set password identifiers refusal incoming call to communication terminal 10a, just postback the response message (below be called accept response message) of the meaning of expression acceptance, if set the refusal incoming call, then postback the response message (below be called refusal incoming call response message) of the meaning of expression refusal incoming call.Here, above-mentioned one of the response message of accepting is for example shown in Figure 13 (b), and one of above-mentioned refusal incoming call response message is for example shown in Figure 13 (c).
Shown in Figure 13 (b), accept in the response message, specify expression to accept " OK " message of incoming call in the 1st row, accepted the information (From) of definite transmitter side of response message and the information (To) of definite destination-address, directly inherited above-mentioned connection request message.In addition, what communication terminal 10b was sent accepts in the response message, contains the password identifiers (u89u23ei) of communication terminal 10b.Therefore, accept at communication terminal 10b to become and intercourse the result that password identifiers also promptly consigns to the other side under the situation of calling of communication terminal 10a.By above processing, can intercourse password identifiers by initial communication process.
In addition, shown in Figure 13 (c), in the refusal incoming call response message, specified " Forbidden " message of expression refusal incoming call in the 1st row.In addition, owing to there is not the password identifiers of communication terminal 10b in the refusal incoming call response message, therefore under the situation of the calling of communication terminal 10b refusal communication terminal 10a, communication terminal 10a can't obtain the password identifiers of communication terminal 10b.
The structure of the form of being preserved in the telephone directory storage part 7 has been shown among Figure 14.The content of the form of Figure 14 is equivalent to leave telephone directory storage part 7 among the communication terminal 10b situation.Open identifier when the 1st title (determining information), the 2nd of classifying the communication object that should show when determining incoming call as in input/output unit 3 is classified initial incoming call as, the 3rd classifies password identifiers as, and the 4th classifies the set point of whether accepting incoming call (flag bit etc. connect could information) as.Receive the communication terminal 10b that allows incoming call to reply, open identifier and password identifiers with the communication terminal 10a that contained in replying are registered in the form of Figure 14.Connection could information can could be postbacked by the user of communication terminal 10b in free change.
Next, contrast Fig. 8, and use the example of communication terminal 10a call communication terminal 10b describes the action of communication terminal 10a under the situation of the object of communicating by letter before calling out.
Communication terminal 10a will be with the password identifiers (u89u232ei of communication terminal 10b; Brief note is sec-b among Fig. 8) be the connection request message of destination-address, send to server 12.Here, in the above-mentioned connection request message, shown in Figure 15 (a), except the message (INVITE) that is used for asking to connect, also be added with the password identifiers (ufds3982 of call-side; Brief note is sec-a among Fig. 8).
Server 12 is transmitted connection request message with reference to the password identifiers (u89u23ei) that becomes destination-address to communication terminal 10b.Here, communication terminal 10b is with reference to the form of the telephone directory storage part 7 of oneself, confirming the password identifiers of having registered communication terminal 10a, and do not refuse under the situation of setting of incoming call, the response message of accepting of the password identifiers (u89u232ei) that includes communication terminal 10b self that will be shown in Figure 15 (b) postbacks to server 12.
Like this, carry out in the other side's destination-address of the 2nd later communication, do not use modifiable open identifier, and use mutually not to the password identifiers of whose disclosed fixed allocation to communication terminal, therefore as long as communication object is not refused the setting of incoming call, even change has taken place the open identifier of communication object, also can communicate.
Next, be divided into above-mentioned communication terminal 10a, 10b (for convenience's sake following and be called communication terminal 10) and carry out call treatment and carry out the situation that incoming call is handled, describe.
The function that the above-mentioned control part 4 that is had in the communication terminal 10 has been shown among Fig. 1 constitutes.In this control part 4, the above-mentioned the 1st sends control part 41, has address determination portion 45 and the 1st data generating unit 46, and the above-mentioned the 2nd sends control part 42 has judging part 47 and the 2nd data generating unit 48.In addition, above-mentioned reception control part 43 has extraction unit 49, search part 50, writing control part 51 and postback could judging part 52.In addition, control part 4 has reply data generating unit 44.
In addition, above-mentioned reply data generating unit 44, address determination portion the 45, the 1st data generating unit 46, judging part the 47, the 2nd data generating unit 48, extraction unit 49, search part 50, writing control part 51 and postback could judging part 52, be by carrying out the program that is stored in the storage device by CPU, not shown peripheral circuit such as imput output circuit being controlled the functional block that is realized.
Next, the flow chart shown in contrast Figure 16, the action of the communication terminal 10 during to the calling in the present embodiment describes.
At first, the method that the user calls out has with reference to telephone directory storage part 7, selects the method for the record (record) registered here, and the direct method of the open identifier of input, but in step 1 (below be called S1), selection is any method wherein.Here,, then handle and enter S2,, then handle entering S3 if select the latter's method if select the former method.
Being divided into S2 processing and S3 processing afterwards afterwards below describes.
At first in S2, input/output unit 3 demonstrates the selection picture that allows the user can have a guide look of communication objective way address, according to the selection from the user, the signal (below be called select signal) of expression user's chosen content is sent to address determination portion 45.Like this, address determination portion 45 receives after the above-mentioned selection signal, with reference to telephone directory storage part 7, obtains display name (the 1st row of user-selected object; Recname), open identifier (the 2nd row; Recpub), password identifiers (the 3rd row; Recsec) and resolve, send it to the 1st data generating unit 46.Afterwards, processing enters S6.
In addition, among the S3, the user uses input/output unit 3, imports the telephone number (open identifier) of desired object.Input/output unit 3 receives after the above-mentioned input, and this input is sent to address determination portion 45.Address determination portion 45 with the record of being stored in the form of above-mentioned pub as key search telephone directory storage part 7, judges whether to exist corresponding record (S4).Here, under the situation that corresponding record is arranged, handle and enter S5, under situation about not having, handle entering S7.
Being divided into S5 processing and S7 processing afterwards afterwards below describes.
At first in S5, address determination portion 45 obtains the record of above-mentioned correspondence from telephone directory storage part 7, reads display name (recname) from the 1st row of this record, reads open identifier (recpub) from the 2nd row, reads password identifiers (recsec) from the 3rd row.Afterwards, address determination portion 45 sends it to the 1st data generating unit 46.Handle afterwards and enter S6.
Like this, the 1st data generating unit 46 generates the message shown in Figure 15 (a) of the password identifiers (recsec) that includes the other side, and recsec is called out (S6) as destination-address.Handle afterwards and enter S9.
In addition, among the S7, under the record that includes above-mentioned pub was not stored in situation in the form of telephone directory storage part 7, address determination portion 45 was at the 1st row; Set null character string among the recname, at the 2nd row; Set the open identifier of being imported among the recpub, in the 3rd row recsec, set null character string, send it to the 1st data generating unit 46.Afterwards, the 1st data generating unit 46 generates the message shown in Figure 13 (a) of the open identifier (recpub) that includes the other side, sends it to network interface 5, and recpub is called out (S8) as destination-address.Promptly, in the form of telephone directory storage part 7, do not write down under the other side's the situation of password identifiers yet, carry out transmission according to the other side's open identifier.Handle afterwards and enter S9.
Among the S9, address determination portion 45 judges whether above-mentioned recname is null character string (S9).Here, not under the situation of null character string at above-mentioned recname, handle and enter S10, among the S10, in input/output unit 3, express call source is whom to address determination portion 45 with this character string display.
In addition, be under the situation of null character string at recname, handle and enter S11, among the S11, address determination portion 45 is with the other side's open identifier; Recpub replaces the other side's display name, is presented in the input/output unit 3.
Afterwards, wait for, accept acknowledgment packet or refusal incoming call acknowledgment packet (S12) up to receiving from the other side.
In addition, among the S13, extraction unit 49 judges whether this grouping is to accept acknowledgment packet after network interface 5 receives above-mentioned any grouping, if accept acknowledgment packet, just extracts the other side's password identifiers from accept acknowledgment packet.In addition, under the situation that has received refusal incoming call acknowledgment packet, finish communication process.
Among the above-mentioned S14, receiving under the situation of accepting acknowledgment packet, the password identifiers that is extracted with extraction unit 49 is a keyword, and the form of search part 50 retrieval telephone directory storage parts 7 judges that the 3rd of form is listed as; Whether recsec is null character string.Here, be under the situation of null character string at recsec, handle to enter S15, if not null character string, and under the other side's the password identifiers situation about having registered, terminated call action, beginning communication process.
Among the S15, postbacked the appropriate communication terminal of accepting acknowledgment packet that includes password identifiers, therefore not registration in telephone directory storage part 7 as yet carries out location registration process.Also promptly, the open identifier record that writes the other side that control part 51 extracted extraction unit 49 is recorded in password identifiers in the 3rd row in the 2nd row of form, can the information of postbacking be recorded in the 4th row.In addition, the display name of the 1st row can be used as automatic processing input null character string, or skips the 1st row.Afterwards, terminated call is handled, the beginning communication process.
In addition, the flow chart shown in contrast Figure 17, the action of the communication terminal 10 during to the calling in the present embodiment describes.
At first, network interface 5 receives after the grouping, and this grouping is sent to extraction unit 49 (S21).
Afterwards, 49 pairs of groupings of extraction unit are resolved, and are to call out grouping if judge this grouping, then call out from this and extract open identifier and password identifiers grouping, above-mentioned open identifier is made as the variable pub of calling order, above-mentioned password identifiers is made as variable sec (S22).
Afterwards, extraction unit 49 sends to search part 50 with above-mentioned variable pub and variable sec, and search part 50 is with reference to the form of telephone directory storage part 7, and whether retrieval exists the record (S23) of corresponding above-mentioned variable sec.Here, under the situation that does not have corresponding record, handle and enter S24, under situation about having, handle entering S27.
Being divided into the later processing of later processing of S24 and S27 below describes.
At first in S24, extraction unit 49 judges whether above-mentioned grouping is based on the incoming call of open identifier, also promptly judges whether to extract open identifier from received incoming call grouping.
Here, be based in judgement under the situation of above-mentioned open identifier, handle and enter S25, among the S25 above-mentioned variable pub and variable sec sent to and write control part 51.Afterwards, writing control part 51 adds above-mentioned each variable in the form of telephone directory storage part 7 to as record.Specifically, the 1st row of form are made as null character string, the 2nd row are made as pub, and the 3rd row are made as sec, and the 4th row are made as " permission ", and simultaneously, recname is made as null character string with variable, and recpub is made as pub with variable.Afterwards, write control part 51 and will represent that the signal of the meaning of " permission " sends to reply data generating unit 44.Afterwards, processing enters S30.
In addition, search part 50 is judged under the situation of the incoming call that is not based on above-mentioned open identifier among the S24, for example be based under the situation of password identifiers, processing enters S26, among the S26,, all produced and received not matching based on this login state of incoming call of password identifiers etc. no matter in the telephone directory storage part 7 whether record is arranged, therefore postbacking could judging part 52, will represent that the signal of the meaning of " refusal " sends to reply data generating unit 44.Like this, reply data generating unit 44 receives after the above-mentioned signal, generates refusal incoming call acknowledgment packet, and sends to network interface 5, and network interface 5 sends refusal incoming call acknowledgment packet to the other side, finishes communication process.
In addition, among the S27, because the record of corresponding the other side's password identifiers is arranged in the telephone directory storage part 7, so the 1st information (variable recname) that is listed as, the 2nd information (variable recpub) that is listed as, the 4th information (variable recallow) that is listed as of search part 50 these records of retrieval.Afterwards, search part 50 sends to above-mentioned variable recallow that postback could judging part 52.Afterwards, postback and could receive after the above-mentioned variable recallow by judging part 52, judge the information wherein set whether be " permission " (S28).Here, in above-mentioned information is not " permission ", that is to say under the situation of " refusal ", postback and to represent that the signal of the meaning of " refusal " sends to reply data generating unit 44, enters S29 by such processing, among the S29 by judging part 52, postback after the signal of the meaning that could judging part 52 receives above-mentioned expression " refusal ", generate refusal incoming call acknowledgment packet, above-mentioned refusal incoming call acknowledgment packet is sent to network interface 5, finish communication process.In addition, be under the situation of " permission " in above-mentioned information, postback and could will represent that the signal of the meaning of " permission " sends to reply data generating unit 44, enters S30 by such processing by judging part 52.
Among the above-mentioned S30, reply data generating unit 44 receives after the signal of meaning of above-mentioned expression " permission ", generates and accepts acknowledgment packet, and the above-mentioned acknowledgment packet of accepting is sent to network interface 5, and network interface 5 sends to the other side with the above-mentioned acknowledgment packet of accepting.
Afterwards, whether search part 50 judgment variable recname are null character string (S31).Here, under the situation that is not null character string, handle to enter S32, among the S32, search part 50 with this character string display in input/output unit 3.In addition, be under the situation of null character string at variable recname, handle to enter S33, among the S33, search part 50 is presented at the other side's of setting among the above-mentioned variable recpub open identifier in the input/output unit 3.The processing of S31 to S33, if registration has display name in the telephone directory storage part 7, just show this title, if not registration, just would show the open numbering of being registered in the telephone directory storage part 7.By such processing, under the 2nd later incoming call situation, even the change that the open numbering of call-side takes place, the open numbering when demonstrating initial incoming call also can prevent the user's of incoming call side confusion.
Afterwards, in case the other side begins communication process, reply data generating unit 44 is just indicated not shown regeneration control part regeneration calling tone (S34).Afterwards, above-mentioned regeneration control part, through audio interface 2, the calling tone of regenerating in loud speaker 6 finishes the incoming call action, after the user replys, just begins communication process.
Except above processing, it is also conceivable that the pattern of not accepting based on the incoming call of open identifier.Be made as and be provided with after the communication terminal, receive incoming call at once, use open identifier only to be connected, register password identifiers mutually with the other side who will want from now on to communicate by letter based on open identifier.Afterwards, if switch to the pattern of not accepting the incoming call in the open identifier, then move as the communication terminal that is merely able to communicate with the object that exchanged password identifiers.If in the S24 of Figure 17, always enter the not processing of side, just can realize this pattern.For example, have only father and mother to accept, can prevent that then child from calling out undesirable object, or receive incoming call from undesirable object based on the calling of open identifier or the pattern of incoming call if communication terminal constitutes to switch to.
In addition,, need various user interfaces, but it can use the interface that has carried out various processing in the mobile phone particularly for the data structure of the form of safeguarding the telephone directory storage part 7 shown in Figure 14.But,, must manage and allow the user can't see for password identifiers.
When having pointed out password identifiers, can point out user's the pet name, in the telephone directory storage part of the other side's communication terminal, store display name.By making the management of telephone directory more or less freely like this.
In addition, having distributed under the situation of a plurality of password identifiers for a communication terminal, when replying, can select to send which password identifiers by the user in the transmission of message related to calls and to it.This has under the situation of a communication terminal very effective a plurality of users.
By above-mentioned formation, even taken place at the open identifier that is equivalent to telephone number under the situation of change, also can be by the incoming call of constant password identifiers continuation from the other side who has communicated by letter.Therefore, solved the problem (if the other side's telephone number changing makes a phone call then can't for this other side) of above-mentioned (1).In addition,, set the incoming call of refusal,, also can continue to refuse incoming call even for example the other side has changed open numbering from undesirable the other side by using password identifiers.By such problem that solves (2) (if telephone number known, then might squeeze into phone) from this object by undesirable object.In addition, owing to reduced the caused unfavorable condition of change of on business opening identifier, therefore can easily change open identifier, (3) problem is (under the situation that telephone number is known by uncertain a plurality of people, before the change telephone number, might receive malicious call) also become inapparent problem.In addition, by system, also solved the problem (because above-mentioned telephone number is enumerating of numeral, so the user is difficult to memory, and makes mistakes easily during input) of (4) based on electric phone book.In addition, based on the input validation of check digit, also help to solve the problem of (4).
Like this, the present invention can provide a kind of system that has solved the problem that telephone network had in the past.In addition,,, therefore can directly use former sip server owing to there is not special requirement for server 12, thus can be lower with importing cost control ground.
On the principle, the password identifiers of the communication terminal that user self is all does not need the user of this communication terminal is maintained secrecy, but in order to allow the user not use the chance of password identifiers, and prevent because user's mistake causes password identifiers to leak, as present embodiment the most like this, the user is also maintained secrecy.
[execution mode 2]
In the above-mentioned execution mode 1 in the illustrated formation, as mentioned above, established the other side who connects and knew password identifiers by allowing, though afterwards openly identifier change had taken place, also can be connected with this object.
But in the formation of execution mode 1 owing to transmit own password identifiers in the moment that connects, so some situations may cause with being connected of undesirable object in, also the password identifiers that can't change can be passed to this object.Though to these undesirable objects, can all be made as the refusal incoming call, it is very unreasonable to we can say.
The situation that is connected with undesirable object has taken place, and can list for example openly mistake of identifier input.In the employed open identifier, contain check digit among the present invention, therefore check mistake input before calling is even but so also can't prevent from fully to make mistakes.In addition, check digit is not essential in the embodiments of the present invention.And, transforming regular communication terminal, automatically change open identifier, and call out, when producing the device of the attachable openly this malice of identifier of search, do not known by uncertain a plurality of people because the user notices open identifier, and cause the change of open identifier to postpone in this situation, transmit password identifiers can for undesirable object yet.
Above situation produces during owing to exchanging secrets identifier when connecting, even therefore constitute the communication terminal that is not easy to obtain password identifiers, also can't prevent.
In addition, in order to set the incoming call of refusal reliably, need the so fixing identifying information of password identifiers to communication terminal or user from undesirable object.Therefore, in the present embodiment, to except the fixing password identifiers that is used to connect, the communication terminal that also is provided with the fixing identifier that is used for discerning other communication terminals describes.Below, this identifier is called proof identifier (the 1st identifier).In addition, prove that identifier and password identifiers are same, all by setting server 13 intrinsic and fixing each communication terminal of giving, no matter which user is assigned private identifier.
The action of the communication terminal of present embodiment, all identical except the action of calling out the other side of communication first as shown in figure 18 with the action of the communication terminal of execution mode 1, therefore below action when calling out first describe.In addition, id-a represents the proof identifier of communication terminal 10a, and id-b represents the proof identifier of communication terminal 10b.
The action of the communication terminal in the present embodiment, when the beginning of communication, the exchanging secrets identifier does not prove identifier but exchange.In addition, prove that identifier is fixing to communication terminal or user's this point, identical with password identifiers, but can not use this identifier to call out.
The related communication terminal of present embodiment, identical with the formation of the related communication terminal 10 of above-mentioned execution mode 1, but be stored in the form in the telephone directory storage part 7 of related communication terminal of present embodiment, different with the telephone directory storage part 7 of the related communication terminal of execution mode 1, therefore will describe in detail in the back.
Action to the relevant first object of communicating by letter of calling of present embodiment describes below.
To the first communication of the object of first communication, use open identifier to carry out.Also be, identical with execution mode 1, communication terminal 10a with the open identifier of communication terminal 10b as destination-address, message related to calls (the pub-b that will include the proof identifier of communication terminal 10a, id-a) send to server 12, server 12 is transmitted to communication terminal 10b according to destination-address.Afterwards, received the communication terminal 10b of such message related to calls, with the open identifier of communication terminal 10a as destination-address, response message (the pub-a that will include the proof identifier of communication terminal 10b, id-b) postback to server 12, server 12 is transmitted to communication terminal 10a according to destination-address.By like this, above-mentioned communication terminal 10a and communication terminal 10b have finished intercoursing of proof identifier.Therefore in addition, prove that identifier is an identifier intrinsic in the communication terminal, receive the communication terminal side of proof identifier, can prove that identifier refuses the setting of incoming call according to this.In addition, owing to can't use the proof identifier to call out, even for example prove that therefore identifier has been transmitted to undesirable object, can not receive the calling repeatedly of this object yet.
Afterwards, after the communication that has begun between two communication terminals, come first exchanging secrets identifier by any trigger.This trigger for example can list this condition of communication during continuing necessarily.If mistake connects or from the incoming call of the object of malice, then the user can cut off rapidly, so this trigger can not start.
Here, above-mentioned is enough by the user the other side to be judged during certain, the time whether decision is cut off, preferably is made as about 30 seconds usually.Certainly, it is long that the user can change this time, can be before the transmission reception includes the message of password identifiers, send certain warning demonstration or warning tones from input/output unit 3 or not shown reproducing unit, shown after the affirmation message as shown in figure 19, waited for the push-botton operation of the judgement of respective user.Be preferably in during this push-botton operation waits for, for example set the certain time-out time about 40 seconds, under overtime situation, be judged as and do not allow.
In addition, sent password identifiers in order to eliminate communication terminal 10a side, and communication terminal 10b side refusal postbacks the unfairness in this case of password identifiers, preferably after having confirmed to intercourse grouping, carries out this processing sequence of the exchange of mutual password identifiers again.Specifically, agreement such as operational phase exchange of secret is also very effective.
Form structure in the telephone directory storage part 7 of related communication terminal of present embodiment has been shown among Figure 20.Compare with Figure 14, the 3rd row have become the zone of storage proof identifier, the zone of having added the storage password identifiers in the 5th row.
Next, contrast Figure 16 describes one of the flow process of the performed call treatment of the communication terminal in present embodiment example.
The processing of S1, S3, S4 does not change.The processing of S2 and S5 in the processing of the S2 of execution mode 1 and S5, has been added the 5th row of retrieval table, resolves password identifiers; The processing of recsec2.In addition, the recsec of the 3rd row is proof identifiers.In addition, " based on the calling of password identifiers (recsec) " among the S6 of execution mode 1 handled in the processing of the S6 in the present embodiment, replaces to " based on the calling of password identifiers (recsec2) " and handles.
The processing of S7, S9~S14 does not change.In the message related to calls that is generated, added the proof identifier of oneself among the S8.
The processing of S15, the 3rd processing that is listed as that " password identifiers " is recorded form with the S15 in the above-mentioned execution mode 1, replace with the processing that " proof identifier " is recorded the 3rd row of form, simultaneously, also added the processing of in the 5th row of form, setting null character string.
Next, describe according to Figure 17 flow process that performed incoming call is handled to the communication terminal in the present embodiment.
The processing of S21, S23, S14 does not change.
Among the S22, " password identifiers " among the S22 of execution mode 1 is replaced as " proof identifier ".
The processing of S25 in the processing in the S25 of execution mode 1, has been added the processing of setting null character string in the 5th row of form.In addition, the exchange in Figure 18 include after the grouping of password identifiers, carry out the final processing of in the 5th row, setting password identifiers.
Not change in the processing of S26~S34.
Here, one of the message that contained in the employed grouping in the connection of using open identifier example has been shown among Figure 21 (a), has illustrated among Figure 21 (b) and to have represented one of the message that contained in its grouping of replying example.The figure of one of the message under the situation of the message related to calls of the proof identifier that Figure 21 (a) has included oneself for the communication terminal of representing transmitter side has generated and the open identifier of receiver side communication terminal example, the figure of one of message under the situation of accepting response message of the proof identifier that Figure 21 (b) has included oneself for the above-mentioned receiver side communication terminal of expression has generated and the open identifier of transmitter side communication terminal example.Compare with Figure 13 (a) and (b), the In-Reply-To that transmits password identifiers has been transformed into the Subject that transmits the proof identifier.In addition, when exchange packets contains the grouping of password identifiers, use connection request message and the response message identical with Figure 13 (a) and (b).
In addition, as the method that prevents that password identifiers from leaking, can when carry out initial communication,, switch and whether carry out the exchange of password identifiers according to the classification numbering of the open identifier in the other side's the communication terminal.For example, be the business communication terminal of object to uncertain person with above-mentioned communication numbering 3,4 and so on, do not carry out the exchange of password identifiers, only under situation in addition, exchange.
More than, in the present embodiment, can solve the problem (if telephone number known, then might make a phone call) of (2) in the above-mentioned execution mode 1 more effectively by this object by undesirable object.
[execution mode 3]
The present invention correctly installs with communication terminal basically, and not carrying out illegal is prerequisite.But might occur the own communication terminal that is had is illegally transformed, will leak user from the password identifiers that communication terminal obtained to other people.Therefore, in the present embodiment, imported and to have known the affirmation structure which communication terminal to leak out password identifiers from.
Figure 22 has imported the figure of the communication under the situation of such affirmation structure for expression.Similar with the situation of the embodiment 2 shown in Figure 18, but initial the use when openly identifier communicates, in message and in replying, add each communication terminal alone and the affirmation identifier that communication terminal generated that be exclusively used in the other side (cer-a1, cer-a2) also transmission.In addition, above-mentioned affirmation identifier only uses when authenticating the other side's communication terminal at communication terminal, is not used to specify the other side, therefore can repeat between the user.In addition, above-mentioned affirmation identifier, in the 2nd later communication, can play from the other side's communication terminal of paying password identifiers based on the incoming call of password identifiers the time, require the such effect of a kind of password of prompting.
If the situation to communication terminal 10a, 10b describes, then when communication terminal 10a communicated by letter with communication terminal 10b first, the 1st data generating unit 46 of communication terminal 10a generated and gives to being exclusively used in the affirmation identifier (cer-ab) of communication terminal 10b.Communication terminal 10b, the affirmation identifier that communication terminal 10a is sent, after the 2nd time, identifier is confirmed in the prompting that should point out when connecting communication terminal 10a as the use password identifiers, be mapped with the information of definite communication terminal 10a and the password identifiers of communication terminal 10a, be recorded in the form of telephone directory storage part 7.
In addition, the 1st data generating unit 46 of communication terminal 10b also when communicating by letter with communication terminal 10a first, generates and gives to being exclusively used in the affirmation identifier (cer-ba) of communication terminal 10a.By like this, can be between the particular communication terminal, intercourse the other side's communication terminal the intrinsic affirmation identifier that can in other communication terminals, not use.Below this point is specifically described.
Figure 24 is the figure of the form structure of employed telephone directory storage part 7 in the expression present embodiment.For example, the communication terminal (being made as the communication terminal 10b shown in Fig. 5) that stores the form of Figure 24 is when initial connection, generation is exclusively used in the too affirmation identifier of youth's communication terminal 10a of hillside plot, adds above-mentioned affirmation identifier and sends to too youth's communication terminal 10a of hillside plot.Afterwards, hillside plot is youth's communication terminal 10a too, and received affirmation identifier is preserved as the prompting affirmation identifier (c9jd09j5) to communication terminal 10b.In addition, above-mentioned communication terminal 10b, will with the corresponding hillside plot identical affirmation identifier of affirmation identifier of youth's communication terminal 10a too, confirm that as expectation identifier record gets up.Therefore, in the communication after the 2nd time, when communication terminal 10b receives message from communication terminal 10a, can expect always to contain in this message expectation and confirm identifier (c9jd09j5).
In addition, send to hillside plot too the message of youth's communication terminal 10a from communication terminal 10b, be added with hillside plot too the prompting that is exclusively used in communication terminal 10b that generated of youth's communication terminal 10a confirm identifier (c87ue903).This prompting affirmation identifier (c87ue903) and hillside plot too youth's communication terminal 10a are mapped, and are recorded in the form in the communication terminal 10b.Like this, hillside plot too among youth's the communication terminal 10a in intrinsic other communication terminals obsolete expectation confirm that identifier (c9jd09j5) and prompting confirm identifier (c87ue903), with the display name of communication terminal 10a, open identifier, proof identifier, postback could information and password identifiers be mapped, be recorded in the form.
(a) of Figure 23 shows message related to calls and the response message corresponding with it of using open identifier in (b) respectively.The message related to calls of Figure 23 (a), be made as from hillside plot too youth's communication terminal 10a send to the message of above-mentioned communication terminal 10b.Under this situation, include hillside plot too the proof identifier (i328fas2) of youth's communication terminal 10a and the affirmation identifier (c87ue903) that consigns to communication terminal 10b among the Subject.
Consign to the affirmation identifier (c87ue903) of communication terminal 10b from communication terminal 10a, for hillside plot youth's communication terminal 10a too, be to confirm identifier with the unique corresponding expectation of communication terminal 10b, in addition, for communication terminal 10b, as institute's record in the form of Figure 24, be with hillside plot too the unique corresponding prompting of youth's communication terminal 10a confirm identifier.
In addition, among the Subject of the response message of Figure 23 (b), include the proof identifier (ifsda29u) of communication terminal 10b and communication terminal 10b and hillside plot too youth's the unique corresponding expectation of communication terminal 10a confirm identifier (c9jd09j5).
In addition, at hillside plot when too youth's communication terminal 10a carries out the 2nd later communication to above-mentioned communication terminal 10b, the 1st data generating unit 46 generates information and sending, additional in this message have in the past from the obtained affirmation identifier that communication counterpart generated of distant terminal, also be that identifier is confirmed in the prompting to communication terminal 10a that is exclusively used in communication terminal 10a that communication terminal 10b is generated, identifier (c9jd09j5) is confirmed in the expectation for communication terminal 10b in other words.Do not need to contain the affirmation identifier in replying.Figure 25 (a) and (b) are to use the message related to calls and reply corresponding with it of password identifiers.Hillside plot is too among the Subject of the message related to calls (Figure 25 (a)) that sent of youth's communication terminal 10a, before showing from the received affirmation identifier (c9jd09j5) of the other side's communication terminal.
Incoming call side communication terminal, to the suggested affirmation identifier of call-side communication terminal whether with oneself telephone directory in the expectation of being registered confirm that identifier is consistent and judge, judge whether it is correct incoming call message.
Figure 26 is the flow chart of the call treatment in the present embodiment.Only the part different with Figure 16 described.Among the step S302 and S305 during as the 2nd later calling, have calling (S306),, be set among the reccer confirming to remove the identifier from the prompting of telephone directory from the received affirmation identifier of the other side's communication terminal in the past based on password identifiers.In addition, among the step S308 when calling out for the first time, the 1st data generating unit 46 generates confirms identifier, and includes its calling (S309).In addition, when writing control part 51 and in telephone directory storage part 7, add, with the own affirmation identifier cer that is generated with from the received affirmation identifier of the other side, be saved in respectively in the 6th row and the 7th row in the form of Figure 24.
The flow chart of the processing when Figure 27 is the expression incoming call.At first, 49 pairs of incoming call message of extraction unit are resolved, and will be set in the cer from the affirmation identifier that the other side's communication terminal is paid.Cer can be expected under the situation based on the openly incoming call of identifier, the affirmation identifier that is generated for the other side's communication terminal, under situation, for oneself communication terminal in the past generates and consign to the affirmation identifier of the other side's communication terminal based on the incoming call of password identifiers.Under the situation of first incoming call, the 1st data generating unit 46 generates confirms identifiers, and is set among the cer2, simultaneously, writes control part 51 with cer2 and the suggested affirmation identifier of the other side, during the 6th row that are saved in telephone directory storage part 7 are listed as with the 7th (S406).In addition, send reply (S407) include the affirmation identifier that generates by self terminal.Whether in addition, under the situation of the 2nd later communication, search part 50 and postback could judging part 52 is taken out expectation and is confirmed identifier (S409) from telephone directory storage part 7, judge and the suggested affirmation identifier of the other side consistent (S410).Sent among the S412 reply in do not contain the affirmation identifier.
In the present embodiment, in order to make password identifiers effective, identifier is confirmed in essential prompting, therefore under the situation of only having leaked password identifiers, also can not have problems.In addition, even under the situation that password identifiers and affirmation identifier corresponding with it leak,, also can learn it is to leak, therefore can set up and prevent the solution of leaking from which communication terminal by reference telephone directory storage part 7.
In the present embodiment, employing is when initial communication, the affirmation identifier that certain communication terminal 10a is generated and sent for the other side's communication terminal 10b, after the 2nd time, when communication terminal 10b connects communication terminal 10a, be prompted to this of communication terminal 10a by communication terminal 10b and constitute, but be not limited in this.Also promptly, in the time of can be with initial communication, the affirmation identifier that communication terminal 10a is generated communication terminal 10b be prompted to communication terminal 10b by communication terminal 10a later on too at the 2nd time.Owing to the communication terminal that authenticates the other side according to any affirmation identifier that generates of the other side's communication terminal, so the intensity of fail safe reduces but in this case.
[execution mode 4]
Execution mode 1 adopts the system configuration by the sip server relay message to execution mode 3.In addition, the method that realizes having the system of same function by DDNS has been shown in the execution mode 4.Contrast Figure 28 describes the associated communication system of present embodiment.In addition, execution mode 4 is identical with execution mode 3 in essence, therefore for the action that repeats, no longer repeat specification.
This communication system has communication terminal 20a, communication terminal 20b, network 11, DDNS registrar 22, dns server 23 and sets server 24. Communication terminal 20a, 20b are the communication terminals that has with illustrated before this communication terminal 10 identical formations.Communication terminal is the open identifier of institute's IP address allocated as own communication terminal, and with password identifiers as a token of (tag) be registered in the DDNS registrar 22.Information through DDNS registrar 22 is registered sends to dns server 23 without delay.
By such formation, communication terminal can use the open identifier or the password identifiers of the other side's communication terminal, dns server 23 is inquired, by such IP address that can access the other side's communication terminal, thereby can message be sent to the other side's communication terminal not via sip server.
Figure 29 (a) and (b) show the employed structure that discloses identifier and password identifiers in the present embodiment respectively.Open identifier shown in Figure 29 (a) has added 4 authentication code in the open identifier shown in Fig. 2.In addition, authentication code is not the object that carries out verification by check digit.In addition, also added 4 authentication section in the password identifiers shown in same Figure 29 (b).
Figure 30 is the figure of the communication in the expression present embodiment.Almost be equal to shown in Figure 22 the communicating by letter in the above-mentioned execution mode 3, but difference is, do not transmit message via sip server by using DNS.During initial setting, provide the information shown in Figure 31 by setting server.This information is similar to the initial setting information shown in Figure 11, but be added with proof identifier (certificationid), provided information simultaneously about dns server and DDNS registrar, replace about sip server information (sipserver, sipserverpassword).Dnsserver specifies the dns server of DNS inquiry destination-address.Ddnsserver specifies the DDNS registrar, employed password when ddnsserverpassword is the DDNS registration.
After initial setting was finished, communication terminal 20a, 20b were registered to identifier of oneself and the corresponding relation between the IP address in the DDNS registrar 22.After the DDNS registration was finished, for example, communication terminal 20a can be known the IP address 192.168.43.21 of communication terminal 20b by to dns server 23 inquiry 5913572468.example.org or u89u23ei.example.org.As previously mentioned, authentication code and authentication section are not used in the inquiry to dns server 23.
In addition, in general, make great efforts to make and to handle very at a high speed the inquiry of dns server.Therefore, if malice is used, open identifier portion of change or password identifiers part, for example the xxxxxxxxxx from 0000000000 to 9999999999 with xxxxxxxxxx.example.org adds 1 one by one, and dns server inquired, then might produce the effectively openly guide look of identifier.As its countermeasure, authentication code shown in Figure 29 and authentication section have been imported in the present embodiment.
Authentication code, authentication section are not used in the inquiry to dns server 23, send to the other side's communication terminal when calling out.Incoming call side the other side's communication terminal, the authentication code that is contained in message, authentication section and initial setting server-assignment are given under the inconsistent situation of authentication code, authentication section of communication terminal, the flat refusal incoming call.In addition, also can under the situation that certain number of times arrives, for example in 10 seconds, arrive under the situation more than 3 times continuously, just refused incoming call later on from this communication terminal in authentication code and the inconsistent message of authentication section from same communication terminal.Like this, actual call just can't judge whether correct authentication code and authentication section by having imported not, has solved the problems referred to above.
In addition, a plurality of effective authentication codes communication terminal be can also be distributed to, hooking call sound or message related to calls etc. come by authentication code.For example, be under 0102 the situation, to use melody A at authentication code as calling tone, under 1023 situation, use melody B as calling tone, for authentication code refusal incoming call in addition.Equally, can also under authentication code is 0102 situation, demonstrate the message of calling party A, under 1023 situation, demonstrate the message of calling party B, thereby make the one family can have same communication terminal.
Equally, can constitute, if open identifier that contains in the message that is sent and initial setting server-assignment are inconsistent to the open identifier from communication terminal, just the communication terminal flat refusal incoming call of incoming call side.Constitute by this, even taken place also can be refused based on the incoming call of old open identifier, therefore the registration that does not need to delete DNS under the situation of change by communication terminal at the open identifier of communication terminal.Therefore, have to use and have only registering functional, and do not have the advantage of the DDNS registrar of delete function.
In first communication, the 2nd communication, the information that is contained in the message is all identical with Figure 22, but on the formation of message format, the exchange of proof identifier is not message related to calls and the response message thereof by first when communication, but the identifier during by first communication exchanges messages and response message is carried out.In addition, these message receive this point not via sip server but directly send, and are also different with Figure 22.
Message related to calls when Figure 32 (a) and (b), (c), (d), (e), (f) represent first communication respectively, connect allow to reply, identifier exchanges messages, the identifier exchange is replied, the message related to calls during the 2nd communication and connect and allow to reply.Here, illustration do not use as the less Subject of the frequency of the sign of sip message, the example of In-Reply-To.Can learn from this figure, be transformed into the open identifier of IP address and password identifiers after the @ symbol, authentication code in addition, authentication section, proof identifier, confirm identifier before the @ symbol, distinguish by hyphen and preserve by DNS inquiry.
[execution mode 5]
Above-mentioned execution mode 1 is to the formation of execution mode 4, and the formation that two terminals that communicate are had identical function is illustrated.In the execution mode 5, different to the formation of execution mode 4 with execution mode 1, terminal A only has call function, and terminal B only has the incoming call function.Also promptly, can be from terminal A calling terminal B, but can't be from terminal B calling terminal A.In addition, the combination by open identifier and password identifiers has solved this essence of the present invention of the problem points that existing telephone number had, and does not have any different with execution mode 1 to the example shown in the execution mode 4 that oneself has illustrated.
Below execution mode 5 is elaborated.Below, for the content that execution mode 1 has illustrated to the execution mode 4, no longer repeat specification.
Figure 35 is all figure that constitutes of the system in the expression execution mode 5.In the formation shown in Figure 35,, therefore do not disclose identifier and password identifiers, and only be assigned the necessary IP of communication address because terminal A does not have the incoming call function.In addition, terminal B is identical with execution mode 1, is assigned open identifier, password identifiers, IP address, and these information are registered in the sip server 12.In the present embodiment, between terminal A and terminal B, the situation of carrying out the transmission reception of view data is that example describes.
Terminal A has the calling other-end, obtains the image in this other-end, and is presented at the function in the picture.In addition, terminal B has the incoming call of acceptance from other-end, sends the function of image to this other-end.Terminal A needs user's operation, and terminal B not necessarily needs the user to operate, and can be a kind of server of automatic-answering back device.
Figure 36 is the figure of the structure of expression terminal A.Terminal A has display part 31.In addition, display part 31 can show from the shown image of the obtained view data of other-end.Display part 31 can also have other functions outside the display image as required, for example can have the decoding function of JPEG.In addition, the picture function of the input/output unit 3 of display part 31 in Fig. 6.
In addition, display part 31 not necessarily will with terminal A one, for example also can constitute by the display unit of peripheral hardwares such as TV receiver.In addition, display part 31 can also have the function that demonstrates the represented image of picture signal that the not shown image forming machine structure (for example TV tuner etc.) that is built among the terminal A exported.
Infrared remote controller 32 and infrared ray light accepting part 33 are equivalent to the keyboard of the input/output unit 3 of Fig. 6, the input operation of accepted user.In the present embodiment, illustration terminal A accept the example of input operation by infrared remote controller 32, but also can use the remote controller that adopts wired or electric wave, do not limit especially.
Telephone directory card 34 is to allow the telephone directory storage part 7 shown in Fig. 6 can load and unload resulting card, is installed among the terminal A through connecting portion 35.
In addition, above-mentioned display part 31, infrared ray light accepting part 33, connecting portion 35 etc. can one be assembled in the TV receiver, constitute terminal A.
In addition, described in enforcement mode 1, in the communication via the terminal room of network, preferably with data encryption.Therefore, network interface 5 can have the function by for example IPsec of extensive use (Security Architecture for Internet Protocol) or SSL (Secure Socket Layer) encrypt data in the Internet.By having encryption function, can prevent to cause various identifiers to be learnt by the user because of spying on communication packet.
Figure 37 is the figure of the structure of the above-mentioned terminal B of expression.Terminal B has information stores zone 401.Information stores zone 401 is zones of storing image data.In the information stores zone 401, for example store from view data that camera transmitted such as digital cameras.In addition, be stored in the view data in the information stores zone 401, send to other-end.Information stores zone 401 for example can be loaded and unloaded as flash card, also can be the hard disk drive that is fixed among the terminal B.In addition, identifier region 402 is to be used for the open identifier of storage terminal B and the zone of password identifiers.
As previously mentioned, terminal B can adopt the formation of the server of the desired view data of automatic transmission other-end.In this case, need in terminal B, to upload view data in advance, but, preferably carry out via network to the transmission of the view data in the information stores zone 401 of terminal B.In addition, based on the incoming call control of open identifier described later, also preferably can indicate terminal B through network.
Illustrated among Figure 38 the terminal B shown in Figure 37, be divided into the terminal 50 of the server capability that independently goes out to postback desired view data, and be used for formation after network is given the terminal 60 that terminal 50 sends various indications.
Terminal 50 and terminal 60 are connected through network, can send the reception view data between terminal 50 and the terminal 60.For example, in terminal 60, storage card 63 is installed under the situation in the connecting portion 64, is stored in the view data in the storage card 63, send on network through network interface 65 by control device 62.In addition, terminal 50 receives the data that sent through network interface 5, and is saved in the information stores zone 401.
In addition, the user can be from terminal 60 remote terminals 50.Also promptly, the user uses the input/output unit 3 of terminal 60, and input is to the operation of terminal 50, and control device 62 contents according to the operation of being imported are controlled control device 4 through network.
Remote control thereof like this via network, for example can use HTTP (Hyper Text TransferProtocol), or in HTTP, used the HTTPS general technology such as (HTTP over SSL (SecureSockets Layer)) of encryption technology, therefore omit its detailed description.
In addition, control device 4 have the extraction mechanism put down in writing in the scope of claim, could decision mechanism, postback data generate mechanism, data generate mechanism, searching mechanism, transmission could storing mechanism, incoming call could storing mechanism, log-on message generates various mechanisms such as mechanism, Sealing mechanism, deciphering mechanism.
Figure 39 is the precedence diagram of the communication process in the communication system shown in the execution mode 5.Terminal A in terminal B and the execution mode 1 and terminal B carry out initialization equally, provide open identifier and password identifiers by setting server.Figure 39 supposition is that terminal B downloads the communication steps of open identifier and password identifiers from setting server, but open identifier and password identifiers also can be generated by terminal B oneself.But in this case, the identifier that generates in order to confirm is not utilized by other-end, need be inquired setting server by terminal B.In addition, terminal A does not disclose identifier and password identifiers, does not therefore need such initialization step.
Next, terminal B is mapped IP address (being 192.168.43.21:5060 among Figure 35) and open identifier pub-b and the password identifiers sec-b of terminal B of terminal B, is registered in the sip server.
Next, terminal B is set by the user to allowing the pattern based on the incoming call of open identifier, accepts the incoming call message based on open identifier.At this moment, the user operates input/output unit 3, and terminal B is made as above-mentioned pattern.This both can set by the operation of preference pattern from menu, perhaps can also adopt the formation that the user that can set pattern is limited by password.If need the operation of password,, therefore can also utilize as a kind of father and mother's controlled function owing to can prevent that child from allowing the incoming call from undesirable the other side.In addition, then do not need this step if accept often based on the openly incoming call of identifier.
Next, if send message related to calls to terminal B, then will allow to reply from terminal B and send to terminal A connection that should message related to calls from terminal A.During this connection allows to reply, include the password identifiers sec-b of terminal B.Simultaneously, terminal B transfers to the state of refusal based on the incoming call of open identifier.Also promptly, terminal B only Figure 39 acceptance of the bid be marked with oblique line during, accept message related to calls based on open identifier.In addition, above-mentioned during in,, can also exchange the proof identifier or confirm identifier to described in the execution mode 4 as enforcement mode 2.
In addition, be endowed at terminal A under the situation of password identifiers or proof identifier, can also adopt the technology of using open key password, password identifiers or proof identifier with terminal A, encrypt resulting result by the close key that terminal B is had, the formation of the affirmation identifier of terminal A being issued as terminal B.By such formation, even do not write down the affirmation identifier that terminal B is issued terminal A, also can generate the affirmation identifier, therefore can not need the expectation among Figure 24 to confirm the identifier hurdle.
By communication afterwards, send the view data of being stored among the terminal B to terminal A, the image that the view data that is transmitted is represented is presented in the display part 31 of terminal A.In this communication, can use above-mentioned HTTP or HTTPS etc.
In the 2nd the later communication, use password identifiers sec-b this point, identical with the example shown in the execution mode 1.Also promptly, though terminal B is in the state of not accepting based on the incoming call of open identifier, accept incoming call, so terminal A can begin communication without a doubt based on password identifiers.
Figure 40 is the flow chart of the flow process of the relevant call waiting processing of expression execution mode 5.In the execution mode 5, terminal A only has call function, and terminal B only has the incoming call function, so the processing of the call waiting shown in Figure 40, is the processing of only being undertaken by terminal B.Below to the terminal B shown in Figure 37 (terminal 40), carry out the situation that the call waiting shown in Figure 40 handles and describe.
At first, among the S500, control device 4 will use the variable timer of timer to be made as 0, carry out initialization.In addition, will represent to be made as illegal state with timed unit 4 based on the sign recallow of the incoming call enable state of open identifier.In addition, software or hardware constitute the value increase automatically at regular intervals of variable timer.
S501 and S507 are one group, constitute Infinite Cyclic.
Among the S502, detect the user at control device 4 and indicated under the situation about allowing, handle and enter S514,, enter S503 just handle if do not detect based on the openly incoming call of identifier.
Among the S514, control device 4 will represent whether be the variable recallow of permission based on the pattern of the incoming call of open identifier, be made as " permission ".By like this, expression is the pattern that allows based on the incoming call of open identifier.Also promptly, control device 4 uses variable recallow, preserves the state that whether allows based on the incoming call of above-mentioned open identifier.In addition, simultaneously, control device 4 is initialized as 0 with variable timer.Variable timer is used for to from being made as the variable that permission is carried out timing based on institute's elapsed time after the pattern of the incoming call of open identifier.Afterwards, processing is transferred to S507 from S514.
In addition, among the S503, control device 4 judges whether the incoming call based on password identifiers.Under situation about having, handle entering S512 based on the incoming call of password identifiers.Owing to often accept incoming call, so among the S512, acknowledgment packet is accepted in the incoming call that control device 4 sends the password identifiers sec-b that includes terminal B based on password identifiers.In addition, in the present embodiment, show the example that acknowledgment packet is accepted in the incoming call that sends the password identifiers sec-b that includes terminal B, accept in the acknowledgment packet but the password identifiers of terminal B also can be not included in incoming call.Afterwards, handle and enter S513, communicate processing.
Among the S503, if, enter S504 just handle not based on the incoming call of password identifiers.Among the S504, control device 4 judges whether the incoming call based on open identifier.Afterwards,, enter S509, if, do not enter S505 just handle not based on the incoming call of open identifier just handle if having based on the openly incoming call of identifier.
In addition, among S503 and the S504, be based on the incoming call of password identifiers in judgement, also be based under the situation of incoming call of open identifier, can be by the password identifiers that whether contains oneself in the message of incoming call being investigated, is judged the incoming call that the incoming call that is based on open identifier also is based on password identifiers.Also promptly,, then can be judged as incoming call, if not then be based on the incoming call of open identifier based on password identifiers if include password identifiers.
Among the S509, control device 4 judges whether to allow based on the openly incoming call of identifier with reference to the value of variable recallow.If variable recallow is set as " permission ", also, enter S511 based on the openly incoming call of identifier just handle if allow.Among the S511, owing to forbid later incoming call based on open identifier, so control device 4 is provided with " forbidding " in variable recallow.Afterwards, under by situation, carry out same processing, also promptly carry out the processing of S512 and S513 successively based on the incoming call of password identifiers.
Among the S509, if allow to enter S510 based on the openly incoming call of identifier just handle, control device 4 sends refusal incoming call acknowledgment packet.Afterwards, processing is transferred to S507 from S510.In addition, under the situation of refusal incoming call, the general refusal incoming call acknowledgment packet that sends is not done any replying but can control yet.
Among the S504, if, enter S505 just handle not based on the incoming call of open identifier.And among the S505,4 pairs of control device allow whether exceeded certain value (setting) based on the elapsed time after the incoming call of open identifier and judge from having set.If the above-mentioned elapsed time has surpassed certain value, enter S508 just handle, control device 4 is set " forbidding " in variable recallow.By like this, forbid incoming call later on based on open identifier.Afterwards, processing is transferred to S507 from S508.
Among the S505, set permission in judgement and do not exceeded under the situation of certain value, handled entering S506 based on the elapsed time after the incoming call of open identifier.Among the S506, indicated cancellation to based on the openly permission of the incoming call of identifier, entered S508 just handle if control device 4 detects the user.Afterwards, control device 4 is set " forbidding " in variable recallow, just forbids the incoming call based on open identifier later on.In addition, do not indicated cancellation to based on the openly permission of the incoming call of identifier, entered S507 just handle if control device 4 detects the user.Processing enters after the S507, just gets back to S501, repeats processing discussed above.
As mentioned above, in call waiting is handled, during the incoming call of qualification acceptance based on open identifier, perhaps, by after the incoming call of once having accepted based on open identifier, just forbid incoming call based on open identifier, can further reduce the possibility of illegal incoming call.In addition, can also change take place at the open identifier of distributing to communication terminal before this, pass through under the situation of regular hour after having distributed new open identifier, forbidden incoming call.
More than, to use to allow or forbid handling and be illustrated based on the call waiting of the pattern of the incoming call of open identifier.In the related communication terminal of the present invention, not only under the situation of incoming call, when calling out, also can carry out same processing.Also promptly, can use and allow or forbid calling control based on the pattern of the calling of open identifier.In this case, handle identical with the call waiting shown in Figure 40, after the operation by the user has allowed based on the calling that discloses identifier, carried out just forbidding carrying out once more based on the openly calling of identifier after once the calling based on open identifier.Perhaps, after the operation by the user has allowed based on the calling that discloses identifier, under the situation of having passed through certain hour, just forbid calling later on based on open identifier.
In addition, as described in to the explanation of Figure 29 (a), in the incoming inspection of the open identifier in the call-side terminal, adopt the structure that in the checked object of check digit, does not comprise authentication code, also can adopt the structure that in checked object, includes authentication code.Under authentication code is included in situation in the checked object, have the reduction of some degree based on the authentication capability of authentication code, but particularly in the present embodiment, owing to the incoming call of restriction based on open identifier, so the reduction of authentication capability can bring influence to fail safe hardly.
Here, another form to open identifier describes.Among Figure 29 (a) to classification numbering and check digit, be connected the open identifier that identiflication number, authentication code constitute and be illustrated.Relative therewith, as can also to replace through type (1) to be obtained check digit adopts to have the formation of verifying function in authentication code.This configuration example realizes as can through type (3) obtaining authentication code.
[(n 1+n 5+n 9)×1357+(n 2+n 6+n 10)×3571+(n 3+n 7)×5713+(n 4+n 8)×7135]mod10000…(3)
In addition, n aRepresent a bit digital.
For example, for so last 4 the open identifiers that have been assigned with authentication code of 53-1234-5678-abcd, if through type (3) is obtained above-mentioned authentication code abcd, then as the formula (4), it is 5278 that above-mentioned authentication code abcd obtains, and open identifier becomes 53-1234-5678-5278.
[(5+3+7)×1357+(3+4+8)×3571+(1+5)×5713+(2+6)×7135]mod10000=5278…(4)
If this value has input error, then can cause inconsistent, simultaneously owing to seem at random therefore also have the function of authentication.In addition, the calculating formula that is used to calculate authentication code is not limited in formula (3), can also use to be difficult to find regular algorithm more.If use the open identifier that includes the authentication code that is calculated like this, then as long as the secret of conservative algorithm just can improve the ability that detects illegal calling in the terminal.By like this, owing to can suppress generation, therefore help to alleviate open identifier is transformed into the server of address designator and the load of other-end based on the message related to calls self of illegal calling.
In addition, in the execution mode 4, show the message related to calls that to refuse incoming call in the wrong grade of authentication section, for example in 10 seconds, arrived under the situation more than 3 times, just refuse example afterwards from the incoming call of this terminal.Relative therewith, can also carried out incoming call refusal set after through certain during after (for example after 10 minutes or after 1 day), automatically terminate the incoming call refusal.By like this,, thereby become the state of refusal from this user's incoming call, the also function that can recover automatically even realized just in case certain user makes a mistake numbering continuously and calls out.
In the step discussed above, terminal B judges whether to accept based on the openly incoming call of identifier, but is not limited in this.
Figure 41 is the precedence diagram of another communication process in the communication system shown in the execution mode 5.The content of the communication process shown in Figure 41 is compared with the content of the communication process shown in Figure 39, has only the processing difference of registering IP address.
In the communication process shown in Figure 41, just the same after initialization process finishes with the communication process shown in Figure 39, the IP address of registration terminal B in sip server.At this moment, in the sip server, corresponding IP has only registered the address password identifiers (sec-b), not the open identifier (pub-b) of registration.Under this state, other-end can't be by open identifier calling terminal B.Afterwards, if the operation by the user has allowed the incoming call based on open identifier to terminal B, just terminal B registering IP address in sip server once more.At this moment, in the sip server, sec-b has not only been registered in the IP address of counterpart terminal B, and also registration has pub-b.Therefore, from then on just can carry out based on the openly incoming call of identifier terminal B.
In addition, under the situation of forbidding, only can carry out again the processing of the corresponding IP address registration of password identifiers (sec-b) in the sip server based on the incoming call of open identifier.Also promptly, sip server is corresponding to the request that comes self terminal B, and the state of sec-b is only registered in the IP address of getting back to counterpart terminal B.
In addition, below other characteristic points of the present invention are concluded.
Also have, related receiving apparatus of the present invention is characterised in that, in the above-described configuration, and said extracted mechanism, have from be used for determining communicator and receiving system to the disclosed open identifier of user, extract the extraction mechanism of function of the open identifier of receiving system self; The above-mentioned controlling organization that writes, result for retrieval at above-mentioned searching mechanism is that the password identifiers identical with above extracted password identifiers is not recorded in the above table, and not from above-mentioned connection request extracting data under the situation of the open identifier of receiving system oneself, the corresponding password identifiers that is extracted is written to the expression refusal in the above table with the information of the meaning that is connected of an above-mentioned communicator.
According to above-mentioned formation, from above-mentioned connection request data, do not extract the situation of the open identifier of receiving system self, regard the illegal situation about connecting of communicator request that is equivalent to have password identifiers as.
Therefore, the above-mentioned controlling organization that writes, the corresponding password identifiers that is extracted, the information of expression being refused the meaning of connection is written in the form.By like this, the user of receiving system can select to have password identifiers and proper communicator, and can set this proper communicator as required and allow to connect.
In addition, the password identifiers identical with the password identifiers that is extracted is not stored in the above-mentioned address storage part, and situation not from above-mentioned connection request extracting data to the open identifier of receiving system oneself, be equivalent to or regard as the communicator that is equivalent to have password identifiers, use the situation of the more proper connection of the request of open identifier of receiving system self first.
According to above-mentioned formation, when a communicator from one of a plurality of communicators received the connection request data for the first time, said extracted mechanism was from the password identifiers of this this communicator of extracting data and the open identifier of receiving system self.Like this, extracted in extraction mechanism under the situation of password identifiers, above-mentioned searching mechanism uses the password identifiers that is extracted, and retrieves the form in the above-mentioned address storage part.
Result in retrieval is that the password identifiers identical with the password identifiers that is extracted is not stored in the above-mentioned address storage part, and said extracted mechanism has extracted under the situation of open identifier of receiving system oneself, be equivalent to or regard as the communicator that is equivalent to have password identifiers, use the situation of the proper connection of open identifier request first.Therefore, the above-mentioned controlling organization that writes, definite information of above extracted password identifiers and communicator is mapped to be written in the above table in the above-mentioned address storage part, registers this communicator.
In addition, not under the situation of the open identifier of above-mentioned connection request data extract receiving system self, be equivalent to or regard as the illegal situation about connecting of communicator request that is equivalent to have password identifiers.Therefore, the above-mentioned controlling organization that writes, the corresponding password identifiers that is extracted, the information that the expression refusal is connected is written in the form.By like this, the user of receiving system can select to have password identifiers and proper communicator, and can set this proper communicator as required and allow to connect.
And then related receiving apparatus of the present invention in the above-described configuration, preferably also has data and generates mechanism, and its generation includes whether expression allows the information that connects to an above-mentioned communicator the data that postback; Above-mentioned could decision mechanism, judge that above-mentioned data generate mechanism under the situation that allows to connect, include expression at least and allow the information that connects, and the password identifiers of giving receiving system self, generate the above-mentioned data that postback.
By like this, can the communicator that allow to connect be notified the password identifiers of giving to receiving system self, thereby can intercourse password identifiers.Promptly, can prevent that password identifiers is transmitted to does not allow the communicator that connects yet.In addition, the communicator side, also the same with receiving system, the password identifiers of receiving system can be mapped with the permission information that is connected to receiving system.By like this, between the receiving system and communicator that allow mutually to connect by password identifiers, can not be subjected to the influence of the change of open identifier, communicate.
And then related receiving apparatus of the present invention in the above-described configuration, preferably also has data and generates mechanism, and its generation includes whether expression allows the information that connects to an above-mentioned communicator the data that postback; Said extracted mechanism has from being used for determining disclosing the identifier the user is disclosed of communicator and receiving system, extracts the function of the open identifier of receiving system self; Be not recorded in the above table at the password identifiers identical with above extracted password identifiers, and said extracted mechanism has extracted under the situation of open identifier of receiving system oneself, above-mentioned data generate mechanism, at least include the information that expression allows connection, and the password identifiers of giving receiving system, generate the above-mentioned data that postback.
By like this, can notify the password identifiers of giving to receiving system self, thereby can intercourse password identifiers having password identifiers and proper communicator.Also promptly, can prevent that password identifiers is transmitted to the illegal communication device that carries out connection request under the state that does not disclose identifier in the connection request data for the first time.In addition, the communicator side, also the same with receiving system, the password identifiers of receiving system can be mapped with the permission information that is connected to receiving system.By like this, between the receiving system and communicator that allow mutually to connect by password identifiers, can not be subjected to the influence of the change of open identifier, communicate.
In the relevant dispensing device of the present invention, above-mentioned address storage part preferably can load and unload.
By above-mentioned formation, above-mentioned address storage part can take off from dispensing device, or is installed in the dispensing device.
By like this, employed address storage part in certain dispensing device can use in other dispensing devices.Also promptly, if the dispensing device of above-mentioned address storage part can be installed, just can be to the receiving system in being connected above-mentioned communication line, be that destination-address sends the connection request data with the password identifiers of receiving system.Therefore, can improve for user convenience.
Related receiving apparatus of the present invention, be characterised in that, in the described receiving system of claim 7, also has address storage part, it stores and openly gives definite information of user with the password identifiers of distributing to other devices in order to distinguish the password identifiers of distributing to above-mentioned communicator, corresponding with at least one side in the open identifier of above-mentioned communicator, the password identifiers of above-mentioned communicator, or whether expression allows the connection that connects could information, or distribute to the 1st identifier to user cipher device of each communicator for mutual above-mentioned a plurality of communicators of difference, or distribute to each communicator for mutual a plurality of communicators of difference, consign to the 2nd identifier of the communicator that allows communication, more than any from above-mentioned receiving system.
By above-mentioned formation, above-mentioned address storage part can corresponding above-mentioned definite information or above-mentioned open identifier, and storing above-mentioned password identifiers, above-mentioned connection could information, more than in above-mentioned the 1st identifier and above-mentioned the 2nd identifier any.
Determine that information is to the disclosed information of user, the user can be free with reference to the definite information that is stored in the above-mentioned address storage part.For example, determine that information can be the user's name of communicator or diminutive etc.Connection could information, be represent whether to allow be connected above-mentioned communication line in the information that is connected of communicator.
In addition, the 1st identifier to be connected a plurality of communicators in the above-mentioned communication line and to distribute to communicator in order to distinguish mutually, to user cipher device.In addition, the 1st identifier is used for the communicator in the transmission source of receiving system identification connection request data, can not be as the destination-address of specifying linking objective.
Whether in addition, the 2nd identifier is the communicator that is used for confirming the transmission source of connection request data, be the identifier of the communicator of communicating by letter in the past.In addition, the 2nd identifier to password identifiers that should communicator, determine generations such as information or the 1st identifier, can send the object that allows communication to.
By like this, in the related receiving apparatus of the present invention, under situation about having from the connection request that is connected the communicator in the above-mentioned communication line, according to definite information of the communicator that is contained in the connection request data that sent, open identifier or password identifiers, from address storage part read about the connection of the communicator that sent the connection request data could information, the 1st identifier or the 2nd identifier.Afterwards, can according to the connection of being read could information, the 1st identifier or the 2nd identifier, to whether carry out with above-mentioned communication terminal between communicate by letter and judge.
In the related receiving apparatus of the present invention, preferably allow said extracted mechanism, from above-mentioned connection request data, extraction distribute to the communicator that sends these connection request data password identifiers, for distinguish this password identifiers with the password identifiers of having distributed to other communicators to the disclosed definite information of user, or distribute to the 1st identifier to user cipher device of each communicator for the above-mentioned communicator of difference mutually; Also have address storage part, at least one side in its corresponding above-mentioned definite information and the above-mentioned password identifiers, to the connection request from above-mentioned communicator, preserving the connection of representing whether to allow above-mentioned connection could information and above-mentioned the 1st identifier; And searching mechanism, it retrieves corresponding above extracted password identifiers, determines that the connection of information or the 1st identifier could information from above-mentioned address storage part; Above-mentioned could decision mechanism, under the situation that the above-mentioned connection that retrieves could information representation allows to connect, the above-mentioned data that postback are generated mechanism's indication and send the above-mentioned data that postback.
According to above-mentioned formation, in the above-mentioned connection request data, include the communicator that has sent these connection request data password identifiers, determine information or the 1st identifier, said extracted mechanism extracts it.In addition, determine that information is to be used for allowing the user distinguish the information of above-mentioned communicator, open to the user.In addition, the 1st identifier to be connected a plurality of communicators in the above-mentioned communication line and to distribute to communicator in order to distinguish mutually, to user cipher device.In addition, the 1st identifier sends under the data conditions to receiving system at communicator, can not be appointed as destination-address.The 1st identifier is used at receiving system, the communicator in the transmission source of identification connection request data.
In addition, by above-mentioned formation, above-mentioned address storage part, store the corresponding definite information that receiving system is sent a plurality of communicators of connection request data, with at least one side in the password identifiers, to connection request, preserve and represent that the connection that whether allows to connect could information and the 1st identifier from this communicator.Above-mentioned searching mechanism retrieves corresponding above extracted password identifiers, determines that the connection that information or the 1st identifier are preserved could information from above-mentioned address storage part.And, above-mentioned could decision mechanism, under the situation that the above-mentioned connection that retrieves could information representation allows to connect, the above-mentioned data that postback are generated mechanism's indication and send the above-mentioned data that postback.
By like this, related receiving apparatus of the present invention can only could communicate by the pairing communicator of information with the connection that expression allows be connected, and refusal could communicate by the pairing communicator of information with representing the connection that does not allow to be connected.
Related receiving apparatus of the present invention, it is a kind of receiving system according to claim 7, be characterised in that: said extracted mechanism, from above-mentioned connection request data, extract the password identifiers of the communicator that sends these connection request data, in order to distinguish each password identifiers to the disclosed definite information of user, distribute to the 1st identifier to user cipher device of each communicator for mutual above-mentioned a plurality of communicators of difference, or distribute to each communicator for a plurality of communicators of difference mutually, consign to the 2nd identifier of the communicator that allows communication from above-mentioned receiving system; Also have address storage part, at least one side in its corresponding above-mentioned definite information and above-mentioned password identifiers and above-mentioned the 1st identifier stores above-mentioned the 2nd identifier; And searching mechanism, it retrieves corresponding above extracted password identifiers, determines the 2nd identifier of information or the 1st identifier from above-mentioned address storage part; Above-mentioned could decision mechanism, to above-mentioned the 2nd identifier that retrieves, judge with whether above extracted the 2nd identifier is consistent, in the result who judges is consistent, or above extracted destination-address information is under the situation of open identifier, and the above-mentioned data that postback are generated mechanism's indication and send the above-mentioned data that postback.
According to above-mentioned formation, in the above-mentioned connection request data, include the password identifiers of the communicator that has sent these connection request data or definite information, the 1st identifier, the 2nd identifier, said extracted mechanism extracts it.In addition, according to above-mentioned formation, above-mentioned address storage part, correspondence is stored above-mentioned the 2nd identifier of this communicator to definite information, password identifiers or the 1st identifier of a plurality of communicators of receiving system transmission connection request data.
In addition, according to above-mentioned formation, above-mentioned searching mechanism retrieves the password identifiers that corresponding said extracted mechanism extracted, the 2nd identifier of determining information or the 1st identifier from above-mentioned address storage part.Afterwards, above-mentioned could decision mechanism, at the 2nd identifier that is retrieved, under the corresponding to situation of being extracted with said extracted mechanism of the 2nd identifier, the above-mentioned data that postback are generated mechanism's indication and send the above-mentioned data that postback.In addition, above-mentioned could decision mechanism, under the situation of the destination-address information that the open identifier of having specified receiving system is extracted as said extracted mechanism, also the above-mentioned data that postback are generated mechanism's indication and send the above-mentioned data that postback.
By like this, can allow related receiving apparatus of the present invention, from with at least one communicator that corresponds properly the 2nd identifier and above-mentioned definite information, password identifiers and the 1st identifier, sent under the connection request data conditions that includes the 2nd identifier, replied.
In the related receiving apparatus of the present invention, preferably allow above-mentioned data generate mechanism, generate the above-mentioned information that postbacks that includes the password identifiers of giving this receiving system self.
By above-mentioned formation, above-mentioned data generate postbacking in the data that mechanism generated, include the password identifiers of giving this receiving system self.
By like this, sent in the communicator of connection request data giving above-mentioned receiving system, allow the communicator that is connected with above-mentioned receiving system, the password identifiers of distributing to above-mentioned receiving system can be included in postback in the data and postback.Also be, the communicator that permission is connected with above-mentioned receiving system, the open identifier change of above-mentioned receiving system later on can obtain the password identifiers of above-mentioned receiving system, even also can be that destination-address sends the connection request data to above-mentioned receiving system with the password identifiers.
In the related receiving apparatus of the present invention, preferably allow above-mentioned could decision mechanism, judge whether to send the password identifiers of above-mentioned receiving system self, judging under the situation that allows to send, designation data generates mechanism, sends the above-mentioned data that postback of the password identifiers that includes receiving system self.
By above-mentioned formation, above-mentioned could decision mechanism, judge whether to send the password identifiers of above-mentioned receiving system self.For example, above-mentioned could decision mechanism, can with passed through under the situation of certain hour after communicator has begun to communicate by letter, judge to allow to send, or judge in the situation of the password identifiers that has received communicator and to allow to send.In addition, above-mentioned could decision mechanism, can also be under situation about having received from user's indication, judge to allow to send etc. not special restriction.
By like this, in the related receiving apparatus of the present invention, do not need password identifiers with receiving system self to send communicator to and just can begin and the communicating by letter of communicator, and only postback password identifiers under the believable situation of the other side's communicator judging.Therefore, the password identifiers that can prevent receiving system self is known by undesirable the other side.
In the related receiving apparatus of the present invention, preferably allow said extracted mechanism, from above-mentioned connection request data, extract the password identifiers of the communicator that sends these connection request data; Above-mentioned could decision mechanism, extracted in said extracted mechanism under the situation of password identifiers of above-mentioned communicator, judge the transmission of the password identifiers that allows above-mentioned receiving system self.
By above-mentioned formation, said extracted mechanism extracts the password identifiers of the transmission sources traffic device of distributing to these connection request data in above-mentioned connection request data.Afterwards, above-mentioned could decision mechanism, extracted in said extracted mechanism under the situation of password identifiers of above-mentioned communicator, also promptly obtained under the situation of password identifiers of communication terminal in definite transmission source, judged the password identifiers that allows to send oneself to above-mentioned communicator.
By like this, in the related receiving apparatus of the present invention, to not sending the communicator of password identifiers, the password identifiers of transceiver self not.Therefore, can prevent that the password identifiers of receiving system self from being known, and can't obtain this inequitable state of the other side's password identifiers.
In the related receiving apparatus of the present invention, preferably allow above-mentioned could decision mechanism, with after communicating by letter of above-mentioned communicator begins through under the situation of regular hour, judge the transmission of the password identifiers that allows above-mentioned receiving system self.
By above-mentioned formation, above-mentioned could decision mechanism, with after communicating by letter of above-mentioned communicator begins through under the situation of regular hour, judge the password identifiers that allows to above-mentioned communicator transceiver self.Here, the regular hour is enough by the user communication counterpart to be judged, judges whether the time of continuing to communicate by letter.Also promptly, also continue communication after having passed through the regular hour, the expression communication object is believable object, and the communication terminal that the password identifiers of receiving system self is sent to the other side is also no problem.
By like this, in the related receiving apparatus of the present invention, can prevent the password identifiers of receiving system self, also just not cut off the other side of communication after having been begun to communicate by letter by the user through the regular hour, also promptly connection or despiteful the other side's communication terminal are known by mistake.
In the related receiving apparatus of the present invention, preferably allow said extracted mechanism, from above-mentioned connection request data, extract the password identifiers of the communicator that sends these connection request data, and the definite information that discloses this user in order to allow the user distinguish each password identifiers; Also have the corresponding address storage part of getting up of preserving of above-mentioned definite information with above-mentioned password identifiers; And write controlling organization, it will be from the obtained definite information of the operated input/output unit of user, or definite information of being extracted of said extracted mechanism, the password identifiers that is extracted with said extracted mechanism is mapped, and is written in the above-mentioned address storage part.
According to above-mentioned formation, said extracted mechanism from above-mentioned connection request data, extracts the password identifiers of the communicator of distributing to the transmission source that sends these connection request data, and definite information.In addition, the user can also determine information through the input/output unit input.Afterwards, the above-mentioned controlling organization that writes, with above extracted definite information, or definite information that the user imported, be mapped with above extracted password identifiers, be written in the above-mentioned address storage part.At this moment, password identifiers directly is stored in the address storage part user cipher device.Relative therewith, determine that information can be to the disclosed information of user by user oneself input, the user can be free with reference to the definite information that is stored in the above-mentioned address storage part.For example, determine that information can be the user's of receiving system title or diminutive, or distribute to the open identifier of receiving system.
By like this, for receiving system password identifiers is kept at communication terminal in the address storage part, the user can be with reference to definite information of this communication terminal.Also promptly, the password identifiers of communication terminal is still to user cipher device, but the user can know that password identifiers is stored in the communication terminal in the receiving system by determining information.In addition because definite information that the user can the input communication terminal, therefore can be own to communication terminal registration definite information of identification easily.
In the relevant dispensing device of the present invention, preferably also have searching mechanism, it obtains part or all that determine information from the operated input/output unit of user, retrieves and will be equivalent to definite information of this obtained definite information from above-mentioned address storage part; Above-mentioned data generate mechanism, and generating with the above-mentioned password identifiers of definite information stores in address storage part that is retrieved of correspondence is the connection request data of destination-address.
By above-mentioned formation, the user operates input/output unit, and part or all of information determined in input.Above-mentioned search part in definite information of being preserved, is retrieved part or all the corresponding to definite information with definite information of being imported from address storage part.Afterwards, the result of retrieval is, generate contain with part or all corresponding to definite information of definite information of being imported the password identifiers of corresponding preservation, as the connection request data of destination-address data.At this moment, password identifiers is to user cipher device, and is included in the connection request data as destination-address.In addition, determining that information is open to the user, is that the user is used for the information of receiving system of identifying purpose way address.
By like this, at relevant dispensing device of the present invention, the receiving system in being connected above-mentioned communication line sends under the connection request data conditions, and the user can come the receiving system of named place of destination address by own definite information of identification easily.
In the relevant dispensing device of the present invention, having also preferably whether preservation allow could storing mechanism based on the transmission of the state of the transmission of open identifier; Above-mentioned data generate mechanism, could storing mechanism demonstrate under the situation of permission based on the state of the transmission of open identifier in above-mentioned transmission, and generating with open identifier is the above-mentioned connection request data of destination-address.
By above-mentioned formation, above-mentioned transmission could storing mechanism, preserve the receiving system that is connected in the above-mentioned communication line is being sent under the connection request data conditions, whether allow to distribute to the state that the open identifier of this receiving system sends as destination-address.Like this, when the user will disclose identifier and carry out transmit operation as destination-address, could storing mechanism demonstrate under the situation of the state that allows transmission in above-mentioned transmission, generating mechanism's generation by above-mentioned data is the connection request data of destination with open identifier.
By like this, in the relevant dispensing device of the present invention, can send the connection request data with open identifier as destination-address to the user and limit.
In the related receiving apparatus of the present invention, having also preferably whether preservation allow could storing mechanism based on the incoming call of the state of the incoming call of open identifier; Above-mentioned could decision mechanism, could storing mechanism demonstrate under the situation of permission based on the state of the incoming call of open identifier in above-mentioned incoming call, indicate the above-mentioned data generation mechanism that postbacks, send the above-mentioned data that postback.
By above-mentioned formation, above-mentioned incoming call could storing mechanism, preserve to be connected communicator in the above-mentioned communication line with the open identifier of receiving system self as the connection request data that destination-address sent, whether allow the state of incoming call.Like this, receiving to disclose identifier as the connection request data of destination-address the time, could storing mechanism demonstrate under the situation of the state that allows incoming call in above-mentioned incoming call, above-mentioned could decision mechanism, indicate the above-mentioned data that postback to generate mechanism and will represent to allow the data that postback of connection to send to above-mentioned communicator.
By like this, in the related receiving apparatus of the present invention, be the connection request data that destination-address was sent to open identifier with this receiving system, can refuse incoming call.Also promptly, by to the incoming call of user's restriction, can reduce illegal incoming call based on disclosed open identifier.
In the related receiving apparatus of the present invention, preferably also have log-on message and generate mechanism, it is created on the log-on message registered in the server unit of intermediary is carried out in connection, this log-on message is represented the open identifier of above-mentioned receiving system self and the password identifiers of above-mentioned receiving system self, and the corresponding relation between the above-mentioned receiving system self networks address.
By above-mentioned formation, above-mentioned log-on message generates mechanism, generates the log-on message of the corresponding relation between open identifier, password identifiers and the receiving system self networks address of representing receiving system self.Afterwards, above-mentioned log-on message is registered to being connected communicating to connect in the server unit that carries out intermediary between the communicator in the above-mentioned communication line.
By like this, if be connected the communicator in the above-mentioned communication line, the open identifier or the password identifiers of above-mentioned receiving system are sent data as destination-address, server unit just can be according to the network address of the receiving system that is mapped by log-on message, with the data relaying that sent to receiving system.
In the related receiving apparatus of the present invention, having also preferably whether preservation allow could storing mechanism based on the incoming call of the state of the incoming call of open identifier; Above-mentioned log-on message generates mechanism, could storing mechanism demonstrates under the situation about not allowing based on the state of the incoming call of open identifier in above-mentioned incoming call, will not disclose identifier and be included in the above-mentioned log-on message.
By above-mentioned formation, above-mentioned incoming call could storing mechanism, preserve to be connected communicator in the above-mentioned communication line with the open identifier of receiving system self as the connection request data that destination-address sent, whether allow the state of incoming call.Like this, above-mentioned log-on message generating unit could storing mechanism demonstrate under the situation of the state that does not allow incoming call in above-mentioned incoming call, generates the above-mentioned log-on message of the open identifier that does not contain receiving system.Also promptly, be registered in above-mentioned connection is carried out only including the password identifiers of receiving system and the corresponding relation of the network address in the log-on message in the server unit of intermediary.
By like this, be under the situation of incoming call that refusal is destination-address with the open identifier of receiving system self at receiving system, above-mentioned server unit, can not be the data of destination-address with the open identifier with receiving system that communicator sent that is connected in the above-mentioned communication line, relaying be given receiving system.Also promptly, call out with disclosed open identifier, can reduce illegal incoming call by limited subscriber.
In the related receiving apparatus of the present invention, preferably allow the above-mentioned incoming call could storing mechanism, after the operating and setting by the user is the state that allows based on the openly incoming call of identifier, passed through under the situation of certain hour, will be transformed into unallowable state from enable state based on the incoming call of open identifier.
By above-mentioned formation, above-mentioned incoming call could storing mechanism, is set as to allow the user to be undertaken having passed through under the situation of certain hour after the state of incoming call by open identifier, is altered to the state that does not allow based on the incoming call of open identifier.
By like this, can to the user can use disclosed open identifier carry out incoming call during limit, further reduce illegal incoming call.
In the related receiving apparatus of the present invention, preferably allow the above-mentioned incoming call could storing mechanism, received under the connection request data conditions, will be transformed into unallowable state from enable state based on the incoming call of open identifier at above-mentioned receiving system.
By above-mentioned formation, above-mentioned incoming call could storing mechanism, does not allow the state based on the incoming call of open identifier after receiving system has received under the connection request data conditions, has been altered to.
By like this, can use the incoming call of disclosed open identifier to limit to the user, further reduce illegal incoming call.
In the related receiving apparatus of the present invention, preferably allow the above-mentioned incoming call could storing mechanism, having received with open identifier at above-mentioned receiving system is under the connection request data conditions of destination-address, will be transformed into unallowable state from enable state based on the incoming call of open identifier.
By above-mentioned formation, above-mentioned incoming call could storing mechanism, and the open identifier that has received with receiving system self at receiving system is under the connection request data conditions of destination-address, does not allow the state based on the incoming call of open identifier after being altered to.
By like this, can use the incoming call of open identifier to limit to the user, further reduce illegal incoming call.
In the related receiving apparatus of the present invention, preferably allow the above-mentioned incoming call could storing mechanism, new openly passed through under the situation of regular hour after the identifier in that above-mentioned receiving system has been distributed, will be transformed into unallowable state from enable state based on the incoming call of the disclosure identifier.
By above-mentioned formation, above-mentioned incoming call could storing mechanism, distributed new open identifier to receiving system after, has passed through under the situation of certain hour, is altered to the state that does not allow based on the incoming call of open identifier.
By like this, can to the user can use disclosed open identifier carry out incoming call during limit, further reduce illegal incoming call.
In the related receiving apparatus of the present invention, preferably also has the Sealing mechanism that the data that send to above-mentioned communication line are encrypted; And to through the received encryption of above-mentioned communication line the deciphering mechanism that is decrypted of data.
By above-mentioned formation, send under the data conditions for above-mentioned communication line, above-mentioned Sealing mechanism is encrypted data.In addition, receiving through above-mentioned communication line under the data conditions of encrypting, above-mentioned deciphering mechanism is decrypted the data of encrypting.
By like this, in the related receiving apparatus of the present invention, can prevent that the user from knowing various identifiers by spying on communication packet.
In addition, related receiving apparatus of the present invention in the above-described configuration, also has the data of postbacking and generates mechanism, and its generation includes the data that postback whether expression allows information that an above-mentioned communicator connects; Said extracted mechanism has from above-mentioned connection request data, extracts the function to the 1st identifier of user cipher device of distributing to each communicator in order to distinguish above-mentioned a plurality of communicators mutually; In said extracted mechanism, having confirmed does not have password identifiers in the above-mentioned connection request data, and contain after the open identifier of receiving system self, from this connection request data extract under the situation of the 1st identifier, above-mentioned could decision mechanism, permission is to the connection of an above-mentioned communicator, simultaneously, above-mentioned data generate mechanism, include the information that expression allows connection at least, with the 1st identifier of giving receiving system self, generate the above-mentioned data that postback.
In the above-mentioned formation, the 1st identifier is the same with password identifiers, to user cipher device, but is the identifier different with password identifiers.In addition, carry out the extraction example of the 1st identifier by extraction mechanism, for example can allow the extraction mechanism executive program, in the data of the 1st identifier, be provided with in advance according to certain particular data that rule generated, when communicator and receiving system detect this particular data, can be judged as and extract the 1st identifier.
By above-mentioned formation, even do not have password identifiers in the connection request data, under the situation of the open identifier that contains the 1st identifier and receiving system self, the 1st identifier that in postbacking data, comprises receiving system self, postback to an above-mentioned communicator, by coming that so an above-mentioned communicator is allowed connection.By like this, communicator for the request connection, owing to do not use the password identifiers of receiving system self, connect permission but specially use the 1st identifier to provide, therefore for illegal generation or obtained the open identifier of password identifiers and receiving system, and the communicator of request connection, do not provide the connection permission, thereby can avoid password identifiers to be delivered to this risk of undesirable object by the data that postback that include password identifiers.
In addition, related receiving apparatus of the present invention, in the above-described configuration, also has the controlling organization of writing, it will distribute to the 2nd identifier each communicator, consign to the communicator that allows communication from above-mentioned receiving system for mutual a plurality of communicators of difference, be mapped with above-mentioned password identifiers, be written in the above table; Said extracted mechanism has the connection request data received from a described communicator, extracts the function of above-mentioned the 2nd identifier; Could retrieve above table by decision mechanism by above-mentioned, confirm the password identifiers and the 2nd identifier of this communicator of from above-mentioned connection request data, being extracted by said extracted mechanism, under the situation of corresponding record in above table, above-mentionedly could judge that above extracted password identifiers is proper by decision mechanism, can carry out to judge by the above-mentioned of information according to above-mentioned connection.
In the above-mentioned formation, the 2nd identifier distributes in order to distinguish a plurality of communicators mutually, passes to the communicator that allows communication from above-mentioned receiving system.In addition, the 2nd identifier is mapped with the above-mentioned password identifiers of distributing to each communicator, is recorded in the form of receiving system; Can be used in, the connection request data received, not comprise under the situation of the 2nd identifier, by confirming whether corresponding password identifiers is recorded in the form by decision mechanism from communicator.
Therefore, receiving only under the situation of password identifiers from a communicator, because can't discern is a proper connection request that communicator carried out that allows communication, still illegally obtained the wrongful connection request that other communicators carried out of password identifiers, relative therewith, by above-mentioned formation, can confirm to have received password identifiers from a proper communicator that allows communication.This be because, the 2nd identifier sends to a communicator in the lump with the permission of communicating by letter.
In addition, password identifiers and the 2nd identifier at this communicator that is extracted, in the absence of corresponding record in form, if corresponding the 2nd original identifier of the password identifiers that can from form, find and be extracted, then can be confirmed to be which communicator from the communicator that allows communication, the password identifiers that leaks out.
In addition, the 2nd identifier only confirms to send a communicator of the connection request data that include password identifiers at receiving system, whether be allow to communicate by letter just when communicator the time use, so do not need user cipher device the 2nd identifier.
In addition, the 2nd identifier is generated as required by receiving system self, and is very easy, so whether receiving system self generate the 2nd identifier, is not item in essence for the present invention.
In addition, relevant dispensing device of the present invention, in the above-described configuration, above-mentioned decision mechanism, has judgement in order to discern above-mentioned communicator and dispensing device, distribute to communicator and dispensing device intrinsic, to the 1st identifier of user cipher device, whether be included in the function in the above-mentioned reply data; The corresponding connection request data that will include the 1st identifier of distributing to dispensing device and the data of asking to be connected, send to above-mentioned communicator, postbacking from this communicator under the situation of reply data, whether above-mentioned decision mechanism includes password identifiers in having confirmed above-mentioned reply data after, judge different but the 1st identical identifier of data mode with the 1st identifier of dispensing device, be included under the situation in this reply data, above-mentioned data generate mechanism, generate and include the information that expression allows connection at least, with the password identifiers of dispensing device self, postback restore data to above-mentioned communicator.
By above-mentioned formation, judge from the communicator of the connection request data that sent the 1st identifier that includes dispensing device at decision mechanism, received under the situation of reply data of but the 1st identifier that data mode is identical different, this communicator can have been regarded as proper communicator with the 1st identifier of dispensing device.Like this, after judgement is proper communicator, the password identifiers of dispensing device self can be sent to this communicator.
By like this, owing to be merely able to exchange between the communicator of the 1st identifier, use the communication of password identifiers proper, therefore can reduce the risk that password identifiers is passed to wrongful communicator.
In addition, in the relevant dispensing device of the present invention, can allow above-mentioned decision mechanism, judgement is after having received the reply data that is postbacked by above-mentioned communicator, whether passed through certain hour, after certain hour has been passed through in judgement, indicate above-mentioned data to generate mechanism, send the above-mentioned data that postback that generated.
By above-mentioned formation, above-mentioned data generate mechanism, at above-mentioned decision mechanism, judge after having received the reply data that is postbacked by above-mentioned communicator, after having passed through certain hour, send the data that postback of the password identifiers include dispensing device self and communicator.Therefore, owing to receive after the reply data that postbacks by communicator, will not postback data and send to communicator, so the user of dispensing device utilizes this regular hour, consider whether should postback, and decision could postback at once communicator.
In addition, if passed through the regular hour, just irrelevant with user's will, execution sends the processing that postbacks data to communicator, but input mechanism can also be set in dispensing device, through before the regular hour, allow to send the processing that postbacks data, or interrupt sending the processing that postbacks data to communicator.
In addition, in the relevant dispensing device of the present invention, can also allow above-mentioned data generate mechanism, also has the function that the communicator that allows to connect is generated the 2nd identifier of intrinsic distribution, in whole callings of the first calling that comprises the communicator that permission is connected, generate the connection request data that include above-mentioned the 2nd identifier at least.
By above-mentioned formation, dispensing device is for the first time when the communicator request connects, point out in this communicator intrinsic the 2nd identifier, therefore, dispensing device and the 2nd identifier corresponding record can be got up in the communicator side.In addition, dispensing device will include the data that postback of dispensing device and communicator password identifiers separately in the 2nd time of the communicator later calling, send under the situation of communicator, also must add the 2nd identifier and send.Therefore, the password identifiers of communicator usually combines with the 2nd identifier and uses in communicating by letter.
Therefore in this case, the 2nd identifier is intrinsic in the communicator, and is this point that is generated by which dispensing device, and communicator is expressed, and can further improve communicator is guaranteed it is the effect of proper dispensing device.
In addition, in the relevant dispensing device of the present invention, can be at above-mentioned decision mechanism, judge the corresponding first calling that allows the communicator of connection, from the received reply data of this communicator, include under the situation of the 2nd identical identifier of but data mode different with above-mentioned the 2nd identifier, under the situation that above-mentioned decision mechanism is judged, above-mentioned data generate mechanism generate the password identifiers that includes dispensing device self and above-mentioned communicator password identifiers postback data.
By like this, and can guarantee that dispensing device is that proper dispensing device is the same for communicator, to guaranteeing for dispensing device it is the communicator of proper communicator, the communication of intercoursing password identifiers.
Relevant sending/receiving system of the present invention, the server that can have above-mentioned receiving system, above-mentioned dispensing device and the reply data that sends the connection request data that receive in above-mentioned dispensing device and the receiving system and reply the connection request data be carried out relaying.
By like this, can provide a kind of communicator that can access the action effect that had illustrated respectively in receiving system and the dispensing device.
In addition, above-mentioned communication system can have the server of issuing password identifiers to above-mentioned receiving system and dispensing device respectively.
Correlation reception method of the present invention, be a kind of communicator reception data from being connected through communication line, have: address storage part, it is to a plurality of communicators, with intrinsic in the definite information that is used for determining this communicator of each communicator, each communicator and the password identifiers to user cipher device, expression fixed allocation be used for connection that this communication is postbacked could connection could information, be saved in the corresponding form; Extraction mechanism; Searching mechanism; The performed method of reseptance of receiving system that could decision mechanism, comprise: said extracted mechanism, from connection request data, extract the extraction step of the password identifiers of this communicator as the received data that include the request connection of a communicator of one of above-mentioned communicator; Above-mentioned searching mechanism uses the password identifiers that is extracted, and retrieves the searching step of the above table in the above-mentioned address storage part; And be that the password identifiers of said extracted is recorded under the situation in the above table in the result of retrieval, above-mentioned could decision mechanism, reading the connection that the password identifiers that be extracted is recorded in the above table could information, could information according to the connection of being read, judge whether to allow to the connection of an above-mentioned communicator could determining step.
In addition, correlation reception method of the present invention, in order to address the above problem, be a kind of communicator reception data from being connected through communication line, have: address storage part, it is to a plurality of communicators, with the definite information that is used for determining this communicator of each communicator, and the password identifiers to user cipher device of intrinsic and fixed allocation in each communicator, be saved in the corresponding form; Extraction mechanism; Searching mechanism; And write method of reseptance in the receiving system of controlling organization, comprise: said extracted mechanism, from the connection request data that include the data of asking connection that communicator received for the first time, extract the extraction step of the password identifiers of this communicator as one of above-mentioned communicator; Above-mentioned searching mechanism, the password identifiers that uses said extracted mechanism to be extracted is retrieved the searching step of the above table in the above-mentioned address storage part; And be that the password identifiers identical with above extracted password identifiers is not recorded under the situation in the above table at result for retrieval, the above-mentioned controlling organization that writes, password identifiers and above-mentioned definite information that this extracted are mapped, are written to the controlled step that writes in the above table.
In addition, correlation reception method of the present invention, be a kind of communicator reception data from being connected through communication line, have: address storage part, it is to a plurality of communicators, with the definite information that is used for determining this communicator of each communicator, and the password identifiers to user cipher device of intrinsic and fixed allocation in each communicator, be saved in the corresponding form; Extraction mechanism; Searching mechanism; And write method of reseptance in the receiving system of controlling organization, comprise: said extracted mechanism, from the connection request data that include the data of asking connection that communicator received for the first time as one of above-mentioned communicator, extract the password identifiers of this communicator, simultaneously, from being used for determining disclosing the identifier of communicator and receiving system, extract the extraction step of the open identifier of receiving system self to the user is disclosed; Above-mentioned searching mechanism, the password identifiers that uses said extracted mechanism to be extracted is retrieved the searching step of the above table in the above-mentioned address storage part; And be that the password identifiers identical with above extracted password identifiers is not recorded in the above table at result for retrieval, and under the situation of the open identifier of said extracted mechanism extraction receiving system self, the above-mentioned controlling organization that writes, password identifiers and above-mentioned definite information that this extracted are mapped, be written in the above table, not from above-mentioned connection request extracting data under the situation of the open identifier of receiving system oneself, the above-mentioned controlling organization that writes, the corresponding password identifiers that is extracted will represent that the refusal and the information that is connected of an above-mentioned communicator are written to the controlled step that writes in the above table.
In addition, relevant sending method of the present invention, be a kind of have decision mechanism and data generation mechanism, the communicator that is connected through communication line is sent the performed sending method of dispensing device of data, have: by above-mentioned decision mechanism, judge that the corresponding connection request data that will include the data of request connection have sent to above-mentioned communicator, from the reply data that this communicator postbacked, whether include each this communicator the determining step to the password identifiers of user cipher device of intrinsic and fixed allocation; And include in the above-mentioned reply data under the situation of password identifiers in the result who judges, in later calling to above-mentioned communicator, generate mechanism by above-mentioned data, generate and include the password identifiers of distributing to dispensing device self and from the generation step that postbacks data of the received password identifiers of above-mentioned communicator.
In addition, above-mentioned receiving system both can be realized by hardware, can realize by executive program in computer again.Specifically, relative program of the present invention, be allow at least computer be used as extraction mechanism, testing agency, could decision mechanism and the program that writes controlling organization, record this program in the relative recording medium of the present invention.
If carry out these programs, just this computer moves as above-mentioned receiving system by computer.Therefore, identical with above-mentioned receiving system, can use the user of above-mentioned communicator and the secret per family password identifiers of usefulness of above-mentioned receiving system, only communicate with the object that the user of above-mentioned receiving system allows to communicate by letter.In addition therefore irrelevant because above-mentioned password identifiers is constant with open identifier, can carry out based on password identifiers with special object between communicate by letter.And later user can also only use password identifiers and this object to communicate.
In addition, above-mentioned dispensing device both can be realized by hardware, can realize by executive program in computer again.Specifically, relative program of the present invention is to allow computer be used as the program of decision mechanism and data generation mechanism at least, records this program in the relative recording medium of the present invention.
Carry out these programs by computer, this computer can move as above-mentioned dispensing device.Therefore, identical with above-mentioned dispensing device, contain at above-mentioned reply data under the situation of password identifiers, the user of above-mentioned dispensing device, irrelevant with oneself and other peoples' open identifier, can and point out between the object of determining of password identifiers to communicate.
In addition, communication terminal of the present invention, it is the network that packet switching is carried out in a kind of utilization, use the identifier of the communication terminal of determining the communication object destination, call out the communication terminal of this communication object destination, communication terminal with this communication object destination, or carry out server to the relaying of the communication terminal of this communication object destination-address, the communicator of transmitting and receiving data, have: storage area, its storage is used for determining the disclosed identifier of the user to the communication object destination of the communication terminal of above-mentioned communication object destination, and the identifier to the secret of the user cipher device of communication object destination that is used for determining the communication terminal of above-mentioned communication object destination; The password identifiers sending part, it is carrying out sending the identifier of the above-mentioned secret of own communication terminal under the situation about connecting from other communication terminals; Telephone directory portion, it is with the password identifiers of above-mentioned other communication terminals that above-mentioned other communication terminals sent, to the user cipher device and the record of own communication terminal; And call control department, it uses above-mentioned disclosed identifier, or is recorded in the password identifiers in the above-mentioned telephone directory portion, calls out.
By like this, except the open identifier that the user can see, return communication terminal and give password identifiers, under the situation of any identifier in using open identifier and password identifiers, all can call out from above-mentioned communication terminal.
Password identifiers only allowing exchange automatically between the communication terminal that connects, therefore can solve the problem that password identifiers is known by uncertain a plurality of people.In addition, in the 2nd later communication, use the connection request data that include password identifiers to call out, therefore can solve, make and to communicate this problem with the object of communicating by letter in the past because of changing open identifier.
In addition,, can all can't see under the state of password identifiers, password identifiers is managed any user of call-side and incoming call side by carrying out the transmission of password identifiers automatically.In addition, can also prevent that the user from inputing open identifier by mistake and carried out the problem of false call.
In addition, in the above-mentioned communication terminal, can also have and use the password identifiers that above-mentioned other communication terminals sent, retrieve above-mentioned telephone directory portion,, judge whether to allow the incoming call judging part of incoming call according to above-mentioned result for retrieval.
By like this, can prevent from the communication terminal of once all not communicating by letter to use password identifiers to carry out illegal incoming call.
In addition, in the above-mentioned communication terminal, also have under, send the proof identifier sending part of the proof of the own communication terminal of proof with identifier by the situation that above-mentioned other-end connected; The proof identifier of the own communication terminal of above-mentioned storage area storage proof, above-mentioned telephone directory portion, with above-mentioned proof with user cipher device and the record of identifier to own communication terminal.
By like this, by corresponding password identifiers, the proof identifier that importing can't be used to call out even do not know password identifiers, also can be determined the information of call-side to the prompting of incoming call side.By like this, can prevent to make that because of non-communications of having a mind to such as mistake transmissions password identifiers is leaked to the communication object of not wishing as the communication object destination.
In addition, in the above-mentioned communication terminal, can also have the incoming call judging part, it uses proof identifier that above-mentioned other communication terminals sent, and retrieves above-mentioned telephone directory portion, according to the result of above-mentioned retrieval, judges whether to allow the incoming call judging part of incoming call.
By like this, can prevent illegal incoming call based on password identifiers from the communication terminal of once all not communicating by letter.
In addition, in the above-mentioned communication terminal, above-mentioned password identifiers sending part, can begin in communication to have passed through from own communication terminal between given period during, perhaps the user at above-mentioned own communication terminal allows to send under the situation of above-mentioned password identifiers, sends above-mentioned password identifiers.
By like this, the user can send password identifiers in the desired moment.In addition, whether send the judgement of password identifiers, can be undertaken by the user.
In addition, in the above-mentioned communication terminal, can also have and confirm that identifier generating unit, its generation are used for confirming the affirmation identifier of having communicated by letter with the communication terminal of the above-mentioned communication object destination of corresponding above-mentioned password identifiers; And identifier corresponding relation judging part, it judges whether above-mentioned password identifiers and the corresponding relation between the above-mentioned affirmation identifier that the call source communicator is suggested be correct under the situation based on the incoming call of above-mentioned password identifiers, whether decision allows incoming call.
By like this, under the situation that password identifiers is leaked, can easily learn from which communication terminal and leak, thereby make the problem of fail safe be easier to solve.
In addition, in above-mentioned each execution mode, constitute each parts of receiving system and dispensing device, situation with " being stored in the functional module that the program code in the recording mediums such as ROM or RAM is realized by the execution of arithmetical organs such as CPU " is that example is illustrated, but same processing also can realize by hardware.In addition, can also allow the hardware of the part handled, the above-mentioned arithmetical organ that carries out the program of the control of this hardware and remaining processing with execution combines and realizes.And then in above-mentioned each parts, the parts that describe as hardware also can be by the hardware of the part handled, and the above-mentioned arithmetical organ that carries out the program of the control of this hardware and remaining processing with execution combines and realizes.In addition, above-mentioned arithmetical organ both can be a monomer, and also the common executive program code of a plurality of arithmetical organs that can be coupled together by bus or the various communication line via device inside is realized.In addition, the telephone directory storage part 7 in above-mentioned each parts can be storage devices self such as memory.
Can pass through the program code self that above-mentioned arithmetical organ is directly carried out, or as the program of data that can be by decompression processing generator code described later, this program (program code or above-mentioned data) is kept in the recording medium, distribute this recording medium, or said procedure is sent through the communication agency that the wired or wireless communication circuit transmits by being used for, distribute, carry out by above-mentioned arithmetical organ.
In addition, under situation about transmitting, constitute each transfer medium of communication line,, transmit said procedure through this communication line by transmitting the signal train of representation program through communication line.In addition, when transmitting signal train, dispensing device can be modulated carrier wave by the signal train of representation program, and above-mentioned signal train is overlapped in the carrier wave.In this case, receiving system comes the release signal row by the demodulation carrier wave.In addition, when transmitting above-mentioned signal train, dispensing device can be divided into the signal train as the numerical data row grouping and transmit.In this case, receiving system couples together received grouping, restores above-mentioned signal train.In addition, dispensing device can be by time-division/frequency division/sign indicating number method of grading when sending signal train, and signal train and other signal trains is multiplexed and transmit.In this case, receiving system extracts each signal train and restores from multiplexed signal train.Under any situation,, can both obtain same effect as long as through the communication line convey program.
Here, the recording medium during allocator preferably can be dismantled, but whether the recording medium after the assigning process preface then need not manage detachable.In addition, if aforementioned recording medium can stored program just can, no matter whether can rewrite (writing), whether have volatibility and recording method and shape etc.As one of recording medium example, can list belts such as tape or tape, or disks such as floppy disk (registered trade mark), hard disk, or CD-ROM or magneto optical disk (MO), shallow bid (MD), digital video disc dishes such as (DVD).In addition, recording medium can also be cards such as IC-card or light-card, or mask rom, or semiconductor memories such as EPROM, EEPROM or flicker ROM.Perhaps can also be formed in the interior memories of arithmetical organ such as CPU.
In addition, the said procedure code both can be that above-mentioned each Overall Steps of handling is indicated code to above-mentioned arithmetical organ, if can also by existing can be by accessing with given order, the base program (for example operating system, storehouse etc.) of part or all of above-mentioned each processing of execution, then indicate above-mentioned arithmetical organ to access the code of this base program or pointer etc., replace above-mentioned in steps part or all.
In addition, form in aforementioned recording medium during save routine, state that for example can be in being configured in actual storage, the preservation form of the addressable execution of arithmetical organ, or before being configured in the actual storage, preservation form after being installed in the local record medium (for example actual storage or hard disk etc.) that arithmetical organ can often visit perhaps, can also be the preservation form before network or transmissible recording medium etc. is installed to the above-mentioned local record medium.In addition, program is not limited in the object code after the compiling, can also preserve as the intermediate code that is generated in source code or decoding (interpret), the compilation process.Under any situation, as long as decoding, decoding, compiling, the connection of decompress(ion) that can be by compressed information, coded message and processing is set in actual storage etc., or the combination of each processing, be transformed into the executable form of above-mentioned arithmetical organ, just can access same effect, be not limited in the form when being saved in program in the recording medium.
The present invention is not limited in above-mentioned each execution mode, in the scope shown in the claim, can carry out various changes,, be also included within the technical scope of the present invention by resulting execution mode that technical method appropriate combination illustrated respectively in the different execution modes is got up.
Embodiment or embodiment that detailed content part of the present invention is illustrated, just be used for clear and definite technology contents of the present invention, and the present invention is not limited in its concrete example, should not carry out narrow definition, in the scope of spirit of the present invention and claim, can implement various changes.

Claims (32)

1. a receiving system receives data from the communicator that is connected through communication line, possesses:
Address storage part, it is to a plurality of communicators, with intrinsic in the definite information that is used for determining this communicator of each communicator, each communicator and the password identifiers to user cipher device, expression fixed allocation be used for connection that this communicator is postbacked could connection could information, be saved in the corresponding form;
Extraction mechanism, it extracts the password identifiers of this communicator from the connection request data as the received data that include the request connection of a communicator of one of described communicator;
Searching mechanism, it uses the password identifiers that is extracted, and retrieves the described form in the described address storage part; And
Could decision mechanism, its result in retrieval is that the password identifiers of described extraction is recorded under the situation in the described form, reading the connection that the password identifiers that be extracted is recorded in the described form could information, could information according to the connection of being read, judge whether to allow connection to a described communicator.
2. a receiving system receives data from the communicator that is connected through communication line, possesses:
Address storage part, it is to a plurality of communicators, with the definite information that is used for determining this communicator of each communicator, and the password identifiers to user cipher device of intrinsic and fixed allocation in each communicator, be saved in the corresponding form;
Extraction mechanism, it extracts the password identifiers of this communicator from the connection request data that include the data of asking connection that communicator received for the first time as one of described communicator;
Searching mechanism, the password identifiers that it uses described extraction mechanism to extract is retrieved the described form in the described address storage part; And
Write controlling organization, it is that the password identifiers identical with the described password identifiers that extracts is not recorded under the situation in the described form at result for retrieval, and password identifiers and the described definite information that this extracted is mapped, and is written in the described form.
3. receiving system as claimed in claim 2 is characterized in that,
Described extraction mechanism has from being used for determining disclosing the identifier the user is disclosed of communicator and receiving system, extracts the function of the open identifier of receiving system self,
The said write controlling organization, result for retrieval at described searching mechanism is that the password identifiers identical with the described password identifiers that extracts is not recorded in the described form, and not from described connection request extracting data under the situation of the open identifier of receiving system oneself, the corresponding password identifiers that is extracted is written to the information of the meaning that is connected between expression refusal and the described communicator in the described form.
4. receiving system as claimed in claim 1 is characterized in that,
Also possess data and generate mechanism, its generation includes whether expression allows the information that connects to a described communicator the data that postback,
Described could decision mechanism, judge that described data generate mechanism, generate the described data that postback under the situation that allows to connect, this postbacks data and includes the information that expression allows connection at least, and the password identifiers of giving receiving system self.
5. receiving system as claimed in claim 2 is characterized in that,
Also possess data and generate mechanism, its generation includes whether expression allows the information that connects to a described communicator the data that postback,
Described extraction mechanism has from being used for determining disclosing the identifier the user is disclosed of communicator and receiving system, extracts the function of the open identifier of receiving system self,
Be not recorded in the described form at the password identifiers identical with the described password identifiers that extracts, and described extraction mechanism has been extracted under the situation of open identifier of receiving system oneself, described data generate mechanism, generate the described data that postback, it includes expression at least and allows information that connects and the password identifiers of giving receiving system self.
6. a dispensing device sends data to the communicator that is connected through communication line, possesses:
Decision mechanism, it judges that the corresponding connection request data that will include the data of request connection have sent to described communicator, from the reply data that this communicator postbacked, whether include each this communicator the password identifiers to user cipher device of intrinsic and fixed allocation; And
Data generate mechanism, it includes in described reply data under the situation of password identifiers in the result who judges, in later calling, generate and to include the password identifiers of distributing to dispensing device self and from the connection request data of the received password identifiers of described communicator or postback data described communicator.
7. receiving system, be assigned with user cipher device and can be as password identifiers to the destination-address of the connection request of receiving system, and with determine that by in open identifier and the described password identifiers any communication line of the receiving system of linking objective is connected, receive data from the communicator that is connected with this communication line, described open identifier discloses and can be used as the destination-address to the connection request of receiving system to the user
Described receiving system possesses:
Extraction mechanism, they are from the connection request data that the received request of one of described communicator connects, and extraction includes the open identifier of receiving system self and any the above object way address information in the password identifiers;
Could decision mechanism, it is according to the described destination-address information of extracting, and judgement could be connected with the communicator that has sent described connection request data; And
Postback data and generate mechanism, it generates the data that postback that expression allows connection under the situation that permission connects.
8. dispensing device, with determine that by in open identifier and the password identifiers any communication line of the receiving system of linking objective is connected, send data to the receiving system that is connected with this communication line, described open identifier discloses and can be used as the destination-address to the connection request of receiving system to the user, described password identifiers is to user cipher device and can be as the destination-address to the connection request of receiving system
Described dispensing device possesses:
Address storage part, it will get up to the corresponding preservation with described password identifiers of the disclosed definite information of user in order to distinguish each password identifiers; And
Data generate mechanism, and its generation includes the connection request data by the specified password identifiers of described definite information.
9. dispensing device as claimed in claim 8 is characterized in that,
Described address storage part can load and unload.
10. receiving system as claimed in claim 7 is characterized in that,
Also possesses address storage part, it stores the password identifiers of described communicator, or whether expression allows the connection that connects could information, or the 1st identifier, or the 2nd more than in the identifier any, so that described password identifiers, connection could information, the 1st identifier, the 2nd identifier with for distinguish the password identifiers of distributing to described communicator with the password identifiers of distributing to other communicators to the disclosed definite information of user, corresponding with at least one side in the open identifier of described communicator, wherein said the 1st identifier is distributed to each communicator in order to distinguish described a plurality of communicators mutually, to user cipher device, described the 2nd identifier is distributed to each communicator in order to distinguish a plurality of communicators mutually, consign to the communicator that allows communication from described receiving system.
11. receiving system as claimed in claim 7 is characterized in that,
Described extraction mechanism from described connection request data, is extracted: the password identifiers of distributing to the communicator that sends these connection request data; For distinguish this password identifiers with distributed to other communicators password identifiers and to the disclosed definite information of user; Or distribute to the 1st identifier to user cipher device of each communicator for the mutual described communicator of difference,
Described receiving system also possesses:
At least one side in the address storage part, its corresponding described definite information and described password identifiers, to the connection request from described communicator, preserving the connection of representing whether to allow described connection could information and described the 1st identifier; And
Searching mechanism, it retrieves the corresponding described password identifiers that extracts, determines that the connection of information or the 1st identifier could information from described address storage part,
Described could decision mechanism, under the situation that the described connection that retrieves could information representation allows to connect, the described data that postback are generated mechanism's indication and send the described data that postback.
12. receiving system as claimed in claim 7 is characterized in that,
Described extraction mechanism from described connection request data, is also extracted: the password identifiers that sends the communicator of these connection request data; In order to distinguish each password identifiers to the disclosed definite information of user; Distribute to the 1st identifier to user cipher device of each communicator in order to distinguish described a plurality of communicators mutually; Or distribute to for mutual a plurality of communicators of difference each communicator, consign to the 2nd identifier of the communicator that allows communication from described receiving system,
Described receiving system also possesses:
Address storage part, at least one side in its corresponding described definite information and described password identifiers and described the 1st identifier stores described the 2nd identifier; And
Searching mechanism, it retrieves the corresponding described password identifiers that extracts, determines the 2nd identifier of information or the 1st identifier from described address storage part,
Described could decision mechanism, to described the 2nd identifier that retrieves, judge with whether described the 2nd identifier that extracts is consistent, in the result who judges is consistent, or the described destination-address information of extracting is under the situation of open identifier, and the described data that postback are generated mechanism's indication and send the described data that postback.
13. receiving system as claimed in claim 7 is characterized in that,
Described data generate mechanism, generate the described information that postbacks that includes the password identifiers of giving this receiving system self.
14. receiving system as claimed in claim 13 is characterized in that,
Described could decision mechanism, judge whether to send the password identifiers of described receiving system self, judging that designation data generates mechanism under the situation that allows to send, send the described data that postback of the password identifiers that includes receiving system self.
15. receiving system as claimed in claim 14 is characterized in that,
Described extraction mechanism from described connection request data, is extracted the password identifiers of distributing to the communicator that sends these connection request data,
Described could decision mechanism, extracted in described extraction mechanism under the situation of password identifiers of described communicator, judge the transmission of the password identifiers that allows receiving system self.
16. receiving system as claimed in claim 14 is characterized in that,
Described could decision mechanism, with described communicator between communicate by letter begin after through under the situation of regular hour, judge the transmission of the password identifiers that allows described receiving system self.
17. receiving system as claimed in claim 7 is characterized in that,
Described extraction mechanism from described connection request data, is extracted the password identifiers distribute to the communicator that sends these connection request data, and in order to allow the user distinguish each password identifiers to the disclosed definite information of user,
Described receiving system also possesses:
Address storage part, it gets up the corresponding preservation with described password identifiers of described definite information; And
Write controlling organization, it will be from the obtained definite information of the operated input/output unit of user, or definite information of extracting of described extraction mechanism, and the password identifiers that extracts with described extraction mechanism is mapped, and is written in the described address storage part.
18. dispensing device as claimed in claim 8 is characterized in that,
Also possess searching mechanism, it obtains part or all that determine information from the operated input/output unit of user, and retrieve and will be equivalent to definite information of this obtained definite information from described address storage part,
Described data generate mechanism, and generating with the described definite information that is retrieved of correspondence, the password identifiers that is stored in the address storage part is the connection request data of destination-address.
19. dispensing device as claimed in claim 8 is characterized in that,
Also possessing transmission could storing mechanism, and it preserves the state that whether allows based on the transmission of open identifier,
Described data generate mechanism, could storing mechanism demonstrate under the situation of permission based on the state of the transmission of open identifier in described transmission, and generating with open identifier is the described connection request data of destination-address.
20. receiving system as claimed in claim 7 is characterized in that,
Also possessing incoming call could storing mechanism, and it preserves the state that whether allows based on the incoming call of open identifier,
Described could decision mechanism, could storing mechanism demonstrate under the situation of permission based on the state of the incoming call of open identifier in described incoming call, indicate the described data generation mechanism that postbacks, send the described data that postback.
21. receiving system as claimed in claim 7 is characterized in that,
Also possess log-on message and generate mechanism, its generation is registered in carries out log-on message in the server unit of intermediary to connection, this log-on message is represented the open identifier of described receiving system self and the password identifiers of described receiving system self, and the corresponding relation between the described receiving system self networks address.
22. receiving system as claimed in claim 21 is characterized in that,
Also possessing incoming call could storing mechanism, and it preserves the state that whether allows based on the incoming call of open identifier,
Described log-on message generates mechanism, could storing mechanism demonstrates under the situation about not allowing based on the state of the incoming call of open identifier in described incoming call, will not disclose identifier and be included in the described log-on message.
23. receiving system as claimed in claim 20 is characterized in that,
Described incoming call could storing mechanism,, has passed through under the situation of certain hour for after allowing the state based on the incoming call of open identifier at the operating and setting by the user, will be transformed into unallowable state from enable state based on the incoming call of open identifier.
24. receiving system as claimed in claim 22 is characterized in that,
Described incoming call could storing mechanism,, has passed through under the situation of certain hour for after allowing the state based on the incoming call of open identifier at the operating and setting by the user, will be transformed into unallowable state from enable state based on the incoming call of open identifier.
25. receiving system as claimed in claim 20 is characterized in that,
Described incoming call could storing mechanism, has received under the connection request data conditions at described receiving system, will be transformed into unallowable state from enable state based on the incoming call of open identifier.
26. receiving system as claimed in claim 22 is characterized in that,
Described incoming call could storing mechanism, has received under the connection request data conditions at described receiving system, will be transformed into unallowable state from enable state based on the incoming call of open identifier.
27. receiving system as claimed in claim 20 is characterized in that,
Described incoming call could storing mechanism, and having received with open identifier at described receiving system is under the connection request data conditions of destination-address, will be transformed into unallowable state from enable state based on the incoming call of open identifier.
28. receiving system as claimed in claim 22 is characterized in that,
Described incoming call could storing mechanism, and having received with open identifier at described receiving system is under the connection request data conditions of destination-address, will be transformed into unallowable state from enable state based on the incoming call of open identifier.
29. receiving system as claimed in claim 20 is characterized in that,
Described incoming call could storing mechanism, has newly openly passed through under the situation of regular hour after the identifier in that described receiving system has been distributed, and will be transformed into unallowable state from enable state based on the incoming call of the disclosure identifier.
30. receiving system as claimed in claim 22 is characterized in that,
Described incoming call could storing mechanism, has newly openly passed through under the situation of regular hour after the identifier in that described receiving system has been distributed, and will be transformed into unallowable state from enable state based on the incoming call of the disclosure identifier.
31. receiving system as claimed in claim 7 is characterized in that,
Also possess:
Sealing mechanism, it is encrypted the data that send to described communication line; And
The deciphering mechanism, its to through the received encryption of described communication line data be decrypted.
32. dispensing device as claimed in claim 8 is characterized in that,
Also possess:
Sealing mechanism, it is encrypted the data that send to described communication line; And
The deciphering mechanism, its to through the received encryption of described communication line data be decrypted.
CNA200610084498XA 2005-05-25 2006-05-25 Receiving apparatus and transmitting apparatus Pending CN1870596A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
JP2005152909 2005-05-25
JP2005152909 2005-05-25
JP2006124489 2006-04-27

Publications (1)

Publication Number Publication Date
CN1870596A true CN1870596A (en) 2006-11-29

Family

ID=37444146

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA200610084498XA Pending CN1870596A (en) 2005-05-25 2006-05-25 Receiving apparatus and transmitting apparatus

Country Status (1)

Country Link
CN (1) CN1870596A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101640745B (en) * 2008-07-31 2012-03-28 夏普株式会社 Image transmitting apparatus
CN110570564A (en) * 2019-09-05 2019-12-13 安恒世通(北京)网络科技有限公司 single-machine lock and control method thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101640745B (en) * 2008-07-31 2012-03-28 夏普株式会社 Image transmitting apparatus
CN110570564A (en) * 2019-09-05 2019-12-13 安恒世通(北京)网络科技有限公司 single-machine lock and control method thereof

Similar Documents

Publication Publication Date Title
CN1212565C (en) System for managing program stored in storage block of mobile terminal
CN1246781C (en) Information processing system
CN1729460A (en) Communication method, communication system, relay system, communication program, program for communication system, mail distribution system, mail distribution method, and mail distribution program
CN100339844C (en) Information management system
CN1252581C (en) Secreting and/or discriminating documents remote-controlling printing
CN1659844A (en) Content duplication management system and networked apparatus
CN100338907C (en) Information processing system and method, information processing apparatus and method, recording medium, and program
CN1682174A (en) Group formation/management system, group management device, and member device
CN1365474A (en) Authentication system
CN1522395A (en) Content usage device and network system, and license information acquisition method
CN1947372A (en) Personal information management device, distributed key storage device, and personal information management system
CN1940952A (en) System and device for managing control data
CN1608263A (en) Rights management unit
CN1855805A (en) Encryption method for sip message and encrypted sip communication system
CN1781087A (en) Method and system for providing secure access to private networks with client redirection
CN1476580A (en) Content usage authority management system and management method
CN1396568A (en) Digital works protection system, recording medium device, transmission device and playback device
CN1665184A (en) Using a flexible rights template to obtain a signed rights label (SRL) for digital content
CN1736082A (en) Group entry approval system, server apparatus, and client apparatus
CN1272010A (en) Encryption/decryption method and identification method and device using multi affine cryptographic key system
CN1378405A (en) Method for setting radio local network parameter between communication equipment by directly contacting or adjacent connection
CN1430140A (en) Equipment and method for limitting contents access and storage
CN1380610A (en) System and method for testing computer device
CN1449540A (en) Method and system of securely collecting, storing, and transmitting information
CN1701560A (en) Connection authentication in wireless communication network system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication