WO2005114967A2 - Je systeme de communication permettant de securiser la communication entre au moins deux interlocuteurs et procede d'affichage de messages - Google Patents

Je systeme de communication permettant de securiser la communication entre au moins deux interlocuteurs et procede d'affichage de messages Download PDF

Info

Publication number
WO2005114967A2
WO2005114967A2 PCT/EP2005/005513 EP2005005513W WO2005114967A2 WO 2005114967 A2 WO2005114967 A2 WO 2005114967A2 EP 2005005513 W EP2005005513 W EP 2005005513W WO 2005114967 A2 WO2005114967 A2 WO 2005114967A2
Authority
WO
WIPO (PCT)
Prior art keywords
communication
partner
communication partner
file
partners
Prior art date
Application number
PCT/EP2005/005513
Other languages
German (de)
English (en)
Other versions
WO2005114967A3 (fr
WO2005114967B1 (fr
Inventor
Pierre-Alain Cotte
Michael Greve
Matthias Greve
Frank SCHÜLER
Zong Hyeck An
Sven HÄWEL
Original Assignee
Combots Product Gmbh & Co. Kg
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from DE102004033164A external-priority patent/DE102004033164A1/de
Priority claimed from DE200410039697 external-priority patent/DE102004039697B3/de
Priority claimed from DE102004059748A external-priority patent/DE102004059748B4/de
Priority claimed from DE102005001720A external-priority patent/DE102005001720B4/de
Application filed by Combots Product Gmbh & Co. Kg filed Critical Combots Product Gmbh & Co. Kg
Priority to EP05745194A priority Critical patent/EP1665744A2/fr
Publication of WO2005114967A2 publication Critical patent/WO2005114967A2/fr
Publication of WO2005114967A3 publication Critical patent/WO2005114967A3/fr
Publication of WO2005114967B1 publication Critical patent/WO2005114967B1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/54Presence management, e.g. monitoring or registration for receipt of user log-on information, or the connection status of the users
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates

Definitions

  • Communication system for secure communication between at least two communication partners and method for displaying messages
  • the invention relates to a communication system for communication between at least two
  • the invention relates to a communication system for communication between two communication partners via any one
  • Communication networks in particular via the Internet, using computers and software that can be executed thereon to control the communication between these partners.
  • the term communication here means any type of message or information exchange between contacts, ie between people or institutions.
  • the first person contacts the second person (recipient) via at least one contact address, such as his special telephone number, his special email address, etc., in order to receive a message to transmit or to establish communication.
  • the second person can also be reached from any number of other people at this contact address. So can anyone who can operate a phone, dial the specific phone number, or anyone who can send emails, send an email to the specific email address. In this way, a lot of unwanted messages and information reach the recipient, which the recipient then has to filter out or block.
  • the object of the present invention is therefore to provide a communication system or a method for communication in which the disadvantages of the prior art are avoided.
  • the task is achieved by direct communication, which is carried out exclusively between two contact partners, that is to say direct and exclusive communication, with preferably synchronous and asynchronous communication merging into one another.
  • the object is achieved in particular by a communication system for communication between a first communication partner and a second
  • Communication partner which comprises the following components: a communication network, preferably the Internet, a first terminal of the first communication partner comprising a first communication application, a second terminal of the second communication partner comprising a second communication application, comprising a control device an authentication device, an exclusive connection, which is immediately available when required, can be established in the communication network for the exclusive communication between the first and the second communication partner via the communication applications and the control device, a graphic communication element being provided which is used for communication between the two communication partners via the Communication applications can be activated.
  • the communication system represents a communication environment that consists of the above-mentioned various components that are implemented in hardware and / or software.
  • the communication system preferably comprises end devices such as computers, personal digital assistants (PDAs), telephones, WAP telephones, networks, servers, memories, and
  • Communication applications such as B. communication programs, in particular clients, for telephony, Voice-over-IP (VoIP), instant messaging, email, etc., which are fused together so that the boundaries between synchronous and asynchronous communication and between different communication media disappear for the users of the system
  • Communication in the sense of the invention encompasses any type of transmission of data in general, in particular multimedia data such as text (documents, emails, memos etc.), video (images, photos, films etc.) audio (speech, sound, music, etc .).
  • the communication partners can be persons or institutions that use the communication system to communicate with each other via their end devices. These can be private individuals, systems, in particular computers, servers, communication devices or software, or also companies and the like.
  • a communication network is a network that is available to the communication partners for communication transmission. This can be, in particular, the Internet as a network or else a cellular network, an ISDN network, a general IP-based network or a combination thereof.
  • the terminals used by the communication partners are preferably computers, mobile communication devices or PDAs on which a communication application can run. These terminals are particularly preferably connected to the communication network, for example an Internet connection. This internet connection is particularly preferably a permanent connection or a connection that is immediately available if required. Different applications can preferably run in parallel on these end devices, so that the end devices are not exclusive to
  • the communication application is preferably software that can be started and used by the communication partner on his terminal.
  • This communication application is preferably a program with which the exchange of files, messages, status signals such as the presence of the other communication partner or the presence of new messages can be carried out.
  • the communication application is particularly preferably represented by an icon or graphic symbol on the user interface, ie preferably on the electronic desk (desktop), on the terminal of the communication partner. By activating this icon, data can be transmitted on the one hand or by status signaling and Animating this icon indicates the existence of the files provided by the other communication partner.
  • a control device is preferably provided to coordinate the communication between the two communication applications and on the one hand to establish the corresponding connection path between the two communication partners and on the other hand to provide the content that is involved in the communication between the two
  • the control device can preferably also carry out the authentication of the two communication partners.
  • the control device is particularly preferably set up on a dedicated server on the Internet, which can then also access memory contents which are desired for the connection or the contents of the communication between the communication partners.
  • the control device also takes over the management of the connection on the Internet, in particular also supports the secure transmission and / or encryption.
  • First data memories are preferably provided, in which data for the first communication partner are stored, just as there are furthermore preferably memory areas in which files of the second communication partner are stored.
  • These memories can be present locally on the computer, can be present externally on further storage media, or can be set up on storage media that can themselves be accessed centrally on the Internet. Any combination of these is possible, so that storage areas are in part local to the respective user and in part can be set up externally and / or centrally.
  • these files preferably also include address and contact information about the individual communication partners.
  • the communication application establishes an exclusive connection between the two communication partners that is then immediately available via the control device.
  • the individual communication application is thus able to establish a connection to a special other communication partner, so that the connection between these two communication partners is an exclusive connection. Since there is no public address for this connection between the two communication partners, which could be used by everyone, the communication partner cannot be contacted by a third party via this communication application, but only by the communication partner once defined. In this way, only communication via the first and second communication partners can be established via the exclusive connection in the communication network.
  • both the first partner and the second partner have the option of making a selection of their data, that of the other
  • Communication partners are made available. For example, it is possible for the first partner to select special music files from its files for communication with the second partner, which are then made available to the second partner in this exclusive connection. In addition, other files such as images, text, Films, presentations, etc. can be included. In this way it is possible for all communication partners to be displayed and made available to the two communication partners in the exclusive connection, which documents have ever played a role in their previous communication.
  • the files made available by the first partner for the second partner can preferably be called up by the second partner, but cannot be changed.
  • the first partner on the other hand, can change his selection of the files he makes available in the communication connection and add additional files. He can also delete the files previously made available.
  • the second communication partner can also do this in mirror image from his side with his selection for the first communication partner.
  • the selected files are thus displayed to the other communication partner and made available at the same time, ie made available for download or for opening the document by the other communication partner.
  • the selection of the data and files is preferably made available on a website managed by the system or at least displayed for the communication partners.
  • a communication element for communication between these two communication partners via which the two communication partners can spontaneously communicate with one another.
  • a communication element could, for example, be a whiteboard, into which both can write (simultaneously) and one communication partner can see (immediately) what the other person is entering.
  • this communication element can spontaneously transmit drawings and sketches, copy pictures, films to be played, to transmit or display video images, to display websites or a combination thereof.
  • This communication element can thus also be activated via the communication application of the two communication partners.
  • This is preferably a graphic communication element, ie an element into which content can be inserted and displayed using text or images.
  • the communication element is advantageously designed as an interaction window in which both contact partners can make multimedia input.
  • This communication system provides a possibility for the two communication partners to be able to communicate directly and exclusively with one another without one of the two receiving undesired messages via this communication system.
  • This enables secure point-to-point communication. Since communication only takes place between the two partners and no third party can communicate via this communication channel, it is impossible for unwanted advertising and spam to reach one of the communication partners via this communication system.
  • a communication system is provided which, in a very elegant and unprecedented manner, provides and displays both files and preferably records of any communication that has ever taken place between the two partners, and at the same time has a communication element via which the partners can communicate with one another.
  • This new type of communication system ensures exclusive communication between the two communication partners, which is kept free from disturbing influences from third parties.
  • an application is made available through the provision of data and preferably also historical information about contacts in the past, with which you can communicate more directly and comprehensively than with conventional communication applications such as e-mail, fax, chat, instant messaging, etc.
  • the control device comprises an authentication device.
  • the control device can preferably be provided on the server of the control device and comprise a software application; it can also be set up locally on the terminals of the communication partners.
  • a certificate is used to ensure the identity of the communication partners when establishing the connection.
  • a certificate is particularly preferably used here, in which the content of the certificate also contains the user ID of at least one communication partner.
  • the user ID is the unique identification of the respective user of the system, ie one of the two communication partners.
  • the certificate particularly preferably contains the user IDs or other characteristic data / information about both communication partners which are to communicate in this exclusive connection. With the help of this identification data, which are contained in the certificate, the actual certificate is used to set up the Connection also transmits the identity of the user and can therefore also be checked. Certificates are usually used for so-called digital signatures or electronic signatures. This is proof of the integrity and authenticity of a message.
  • the digital signature is mostly based on asymmetrical krypton systems.
  • the certificate itself is a signer's well-known public key (also known as a public key).
  • the certificate allows the verification of his signature, which was generated with his secret personal key. Certificates are therefore usually used to provide evidence of the authenticity of the origin of messages and documents.
  • the user ID or user ID is usually used as evidence of the user authorization of system resources and functions. According to the invention, these two initially independent certificates, namely certificate and user ID, are linked to one another. Preferably, even the two user IDs are linked with a certificate, ie in this way it is possible to prove that both users are authorized to use the system with proof of the authenticity of messages and documents.
  • the authentication device thus preferably comprises a device for evaluating a certificate, the certificate particularly preferably comprising identification data of the first communication partner and / or of the second communication partner.
  • the exclusive communication link between the two communication partners A and B can be authenticated in a time-saving and efficient manner by evaluating the certificate.
  • the selection of the data is stored on a temporary storage. This ensures that the selection of data that the individual communication partner wants to make available exclusively to the other is available in a buffer for the latter and thus contains a subset of the entire data of the communication partner. Because the data is in the buffer, this data can be accessed by the other communication partner even when the other communication partner is not online.
  • the control device can then display and make available to the other communication partner the selection of data specially prepared for him, regardless of whether the individual communication partner is online. In this way, the data is thus provided via a buffer or an intermediate store.
  • the other communication partner is informed by his application that new data or messages are updated in the buffers, which he can then call up. It also makes it easier for the control unit to address precisely the area that is to be made available to the other partner in the exclusive connection.
  • the communication element comprises at least one interaction window that can be used simultaneously by both communication partners.
  • This interaction window is preferably provided on a website managed by the system and can be used via a browser.
  • Through the simultaneously usable Interaction window as a communication element makes it possible for the communication partners to make common entries in a window, such as entering text, drawing, displaying pictures, displaying links, etc., so that interactive communication can take place.
  • the other communication partner who was not online at the time, can later call up the message and view it as a stream, meaning that he can follow the creation of the image in the real time recorded at the time, while at the same time listening to the explanations in the voice message of the communication partner , However, he can then intervene again and make his own interim comments both as a voice message or as data input into the interaction window, which in turn are then made available to the other communication partner.
  • the communication system provides for the individual communication partner to make the first selection of the first data and the second selection of the second data via the communication application as an alias, in particular as a symbol, placeholder or pointer, to which the data stored in the memories is displayed and made available.
  • an alias in particular as a symbol, placeholder or pointer, to which the data stored in the memories is displayed and made available.
  • the individual communication partner wants to open such a file or wants to download it to his area, he can download the entire file by activating this alias. If the communication partner only wants to claim a file within this communication, he can also drag the pointer over his area (by drag & drop) and thus add it to his selection - it is then only necessary that this pointer is copied and not the entire one behind it lying file. Alternatively, the entire file can be loaded. In this way, management of the displayed and provided content or data between the communication partners is optimized in the memory. The data are mutually provided at different levels of availability.
  • the communication system provides for the individual communication partner to interact with the other person through the communication application Communication partner a double window can be displayed, a first predetermined selection of the first data on one page and a second predetermined selection of the second data on a second page of the double window being displayed and made available.
  • a particularly preferred form of presentation has been chosen for the individual files made available - it is also conceivable to present the presentation in a window using a sort (by sender). Sorting criteria are date / time, type of communication, assigned keywords, headings, etc.
  • the double window is also preferably made available on the website so that it can be used via a browser.
  • the selection of the data of the first communication partner can be represented in the left half, for example, while that of the second communication partner can be represented in the right half. It is thus possible for each individual communication partner to have their own selection of files, which the other communication partner makes available to them, displayed on the left side, for example, while those on the right side are provided by the other communication partner Files would appear.
  • Such a display in the double window enables a very clear display of the content and the origin of the content in communication.
  • the double window is preferably integrated into a communication page of the website together with the aforementioned interaction window. Double windows and interaction windows can thus be operated and used simultaneously. In particular, cross-window drag & drop functions are possible.
  • the data are also particularly preferably displayed in the interaction window. The data can preferably be displayed in different colors to visualize the author of each data.
  • the communication system provides that the exclusive connection in the communication network is an encrypted connection. Encrypting the connection in this way further increases the security of the communication between the two communication partners. This can preferably be 1024 bit encryption.
  • a history of the connection between the communication partners can be represented via the communication application.
  • An overview of the past communication that has already taken place is therefore displayed. This enables the two communication partners to see at a glance which connection they have had with each other and which files have been exchanged. Here you can also summarize which calls were made between the two, which voice messages, which text messages, etc. were exchanged and when.
  • the communication data are also particularly preferably sequenced or indexed. This makes it possible for the recipient of a corresponding message not only to be able to view the result as a whole, but also to be able to track the time course of the creation of this message. They can then run and view them again in real time (or jump from sequence to sequence along the index and thereby follow the message that arises).
  • This information about the indexing or sequencing can be obtained from the sender of the Message as well as the system. For example, it is possible that the sender himself sets index points in his message and thus enables the recipient to jump directly to the corresponding steps in the creation of the message. It is also possible that the system itself sets index points, such as depending on the time (an index point is set every minute) or after special steps of input (e.g.
  • index points which are made available to the recipient of the message according to time criteria or input criteria, can preferably also be changed by the recipient himself, ie added or moved or deleted.
  • the author can be "looked over the shoulder" in this respect, since the sender of the message, as far as he has permitted this, can display each typed letter or corrections of words in time to the other communication partner , The informational value of the message then results not only from the message text that is finally displayed, but also from the chronological sequence of the writing of the text and the editing of the text until the final version.
  • the author of the message can provide the recipient with much more information, since he can not only generate a final text, but also by adding or deleting words to reinforce the content of his message. It is possible, for example, that an addressee can delete a sentence once it has been written before the eyes of the recipient and replace it with a new sentence, which then shows the recipient the direction from which the sender has worked out the sentence that was finally written.
  • the sender can also preferably determine in which "batches" the text is made available to the recipient - in extreme cases, the sender can prepare the entire text "offline" and make it available to the recipient at once. In this case, additional information about the time for the creation of this text would not be available to the recipient.
  • a method for displaying data of a message from a first communication partner A, which the latter has transmitted to a second communication partner B is provided, these data having index points by which they are indexed in time, the data being along the Index points are displayed at various stages of their creation.
  • communication partner B can have the data, ie the message in its history of origin, displayed by jumping from index point to index point of the corresponding stage of origin of the message.
  • communication partner B as the recipient also receives additional information on the creation of this text. He can also receive information that is no longer contained in the final text.
  • index points can be approached automatically, so that communication partner B can see and read the story of how this message came about, as in a film. It is also advantageously provided that the receiving communication partner B can control these index points by hand or can select when these individual points are controlled, so that he can determine when the next stage is to be considered. This way he can speed up the display to his adjust your own recording speed of the message, ie above all reading speed.
  • the message can thus either be sent as a stream, ie as a kind of film file, which shows the creation of the entire message in real time, in which the viewer can then navigate like in a film, ie fast-forward or jump to the next index point.
  • the message consists of several individual documents, which then represent the history of their origin in their sequence.
  • the recipient can then look at one after the other and the message of the tenth file corresponds to the final text.
  • the fifth file can then contain information which the sender has deleted and which is then no longer available in the sixth to the tenth file or slide.
  • the communication element for real-time or almost real-time communication between the two communication partners can be activated via the communication applications.
  • both communication partners are online and have started the communication application
  • a telephone connection can be established via the communication application and both communication partners can speak to one another while simultaneously drawing or writing into an interaction window.
  • they can access the data made available to each other or each can provide new data for both that was previously only available for one communication partner stood.
  • This communication which is carried out almost in real time and which cannot occur absolutely simultaneously due to delays due to the network an almost synchronous and interactive communication between the communication partners can be realized.
  • the communication applications can be activated via at least one graphic symbol.
  • the communication applications are particularly preferably activated via icons. These icons can preferably be defined by the user himself and provide him with an idea of which communication partner he is using
  • Communication application has to do. For example, it is possible to use stylized symbols (such as a smiley) for the individual partners as well as photos of the faces of these communication partners.
  • the icons are preferably animated in order to signal the respective communication partner states which indicate the current status of the other communication partner, in particular the status of whether he is online or whether he currently does not want to be disturbed and the like.
  • several images are stored for such icons, which can then be used for the different signaling states. For example, it is possible to select a laughing face for a communication partner and to provide a second animated representation with a waving hand or a third representation with closed eyes.
  • the graphic symbol is stored on the user interface of the terminal.
  • the communication partner is always present and in view.
  • a corresponding choice of the size of the icons can then also ensure that the individual communication partners are constantly visible in a certain area and that signaling of messages about them can thereby be achieved particularly advantageously.
  • the communication applications can be activated by moving a cursor over the graphic symbol. It is thus advantageously possible to start a function by moving the cursor onto the icon (mouse-over function).
  • pop-up menus can be opened, in which the user can then select individual functionalities of the communication application or recognize a special status. It is possible, for example, that the pop-up menu gives the user the option of a notification or a call to the communication partner, or he can see how many messages the communication partner has on him wait, etc. It is also possible to
  • the communication system provides that the graphic symbols can be used exclusively for establishing a connection with a special communication partner.
  • the exclusive use of a graphic symbol for a special communication partner also ensures that there can be no confusion. If an individual icon is used for a special communication partner, this makes it easier to assign the transmitted signaling.
  • the communication system provides that the communication applications provide the management of a plurality of graphic symbols in parallel. Due to the joint administration of several communication applications and thus several individual connections to individual communication partners, it is advantageous, especially with a larger number of individual communication applications or icons, to maintain them in a central administration application. Such a higher-level communication application can then preferably include further contact details. In addition to the management of the communication applications according to the invention, it is then also possible to manage conventional contact data and also to manage them and, if necessary, to contact them in the conventional way.
  • a display unit which provides the communication behavior between the individual graphic symbols in the communication application.
  • the individual graphic symbols are in the communication system within the communication application for individual communication partners or contacts. If these communication partners contact the user of the communication system or the communication application, this is signaled to the user. If different communication partners come into contact with one another without looking for the connection or communication with the user of the communication application, then in this preferred exemplary embodiment this communication behavior of the individual contacts with one another is displayed to the user. In the star-shaped structure of the communication partner of one user, the user is also shown when some of his communication partners with others
  • This display option can be described by the keyword "interaction between friends".
  • This interaction can be displayed graphically, for example by means of corresponding animations of the two graphic symbols of the communication partners who are currently in communication with one another. It is also possible to display graphic symbols between these two graphic symbols, such as lines, animated interaction representations such as stars oscillating between the two symbols, color adaptation of the two graphic symbols, etc. It is also conceivable to record this communication in a corresponding protocol that can be called up and viewed by the user via the communication application.
  • the communication application has a research facility, preferably an integrated and automated research facility.
  • the second communication partner is a group of individuals includes.
  • This form of grouping of several communication applications for several individual communication partners makes it possible to integrate the entire group into the communication. If a message is now sent to this group communication application, any member of this group will be able to reach this message on their corresponding group communication application. However, this group is completely closed. Just as the individual contact can only be established with the consent of both communication partners, the group can only be activated if each individual group member agrees to be in this group and to be able to exchange messages.
  • the communication applications enable the transmission of files and trigger the transmission of a file from the first communication partner to the second communication partner by moving a file symbol by means of an input medium, in particular by dragging and dropping using a computer mouse , on a graphic symbol of the communication application.
  • This type of transmission or provision of files makes it possible, for example, for the first communication partner to simply drag a file that he wants to make available to the second communication partner onto the icon of this second communication partner and then release it using drag-and-drop.
  • This file is then automatically displayed to the second communication partner, preferably in the double window with the files provided by the first communication partner. In this way it is very easy to exchange files with one another communicate. This is made possible not least by the fact that the dial-in of the established exclusive communication connections between the two communication partners is defined sufficiently that no further information, such as an e-mail address or the like, is required for the transmission or provision the files.
  • the invention provides that the drag-and-drop onto the graphic symbol of the
  • Communication applications start real-time website sharing with a URL, initiate an upload to the communication partner with a file; for a folder / directory the communication partner
  • a dialog window is opened by the communication application before triggering the transfer of a file, via which additional data can be added for the sending communication partner for transfer with the file.
  • a dialog window can preferably also optionally open, in which an accompanying message can also be entered for the corresponding communication partner. This makes it very elegantly possible to even annotate individual files and send them to the communication partner. Such an entry can be made as text or as a short voice note, which is then transmitted as a voice file.
  • the communication applications enable one, more or all of the following types of communication: text, speech, in particular telephone, VoIP, streaming, in particular real-time audio or video transmission, data transfer, in particular image, text, music, video data, file sharing, instant messaging, chat, email, fax, etc.
  • Communication application using a variety of different media, it is possible to use these individual media alternatively or even cumulatively.
  • text is entered in the interaction window and text messages can thus be exchanged.
  • these functionalities can also be selected in the communication application - either via mouse-over functionality or Pressing a button within the displayed double window, etc.
  • graphics can be created or existing images can be displayed and the movement of the mouse within the image can be recorded synchronously with the voice message he shows a picture in the interaction window, explains it linguistically in parallel and shows what he is talking about with movements of the mouse.
  • notes can be added to the Image file can be drawn into it.
  • this editable file when an editable file is moved from one contact (first communication partner A) via the communication application to the other contact (second communication partner B), this editable file is converted into a non-editable file.
  • this function can create increased security and thus increased trust. For example, it is possible for A to create a text file for B using a word processing program and drag this file into the interaction window and make it available to B via drag-and-drop. The system then converts this editable file into one that is not editable file, such as a file in PDF or TIFF format. In this way, B can read the document but cannot modify it. This is a functionality that could be described by the term "digital fax". This function can optionally be selected by the sending communication partner.
  • the communication application also has a management device for notes of the individual communication partner for itself.
  • Such an administration device for notes is preferably implemented by an input device into which the individual communication partner can enter messages for himself, ie short text notes, voice messages, pictures, films, etc. These notes are available to the communication partner alone and preferably relate to the communication with the other exclusive communication partner. For example, it is possible for one communication partner A in the
  • the management device for notes particularly preferably comprises a signaling function.
  • a signaling function With the help of such a signaling function, the communication partner who created the note can have the presence of an event signaled. For example, A can write down the note that his communication partner B bought a special ticket for a performance of the Opera Festival in July and use the signaling function to choose to have this note displayed and signaled again the day after the performance. A is then able to ask B how he felt about the performance.
  • an acoustic and / or visual signal can be used to indicate to the A which note or resubmission should heeded. It is also conceivable to effect the signaling on a further communication device of the A, for example by sending an SMS to A with a correspondingly defined content. In this way, the communication partner B can not only make notes regarding the communication with B, but can also have various events signaled or displayed. It is therefore an administration facility for notes with an alarm clock. Calendar function. An electronic calendar is also particularly preferably included in this administration device for notes. A calendar view can also be selected with particular preference, in which A can manage and view its various exclusive communication partners in parallel.
  • the task is further solved by a method for
  • a method is provided, the signaling to the communication partner being carried out by that a graphic symbol is animated on the communication partner's user interface.
  • the invention provides a method, further comprising the
  • An exclusive connection according to the invention is preferably installed between two communication partners by the first communication partner inviting the second communication partner to establish such a communication connection with him (communication by invitation).
  • the inviting communication partner preferably sends a conventional e-mail to the desired, invited communication partner and offers him the corresponding communication application with the graphic symbol by clicking the mouse. to install his desk (Com.Bot).
  • the invited communication partner accepts this invitation by installing or starting the communication application and thereby confirming it. It is then recognized in the control device or the server center that this connection has been established.
  • This communication link between the two communication partners in the form of their communication application is then registered or authenticated and can be used exclusively between these two parties in the future.
  • Another (third) person considers the establishment of an exclusive communication between two communication partners to be sensible and therefore provides the first as well as the second communication partner with appropriate information so that these together Can establish a connection (Communication by invitation fro third party). For example, it is possible for the third person to send both the first and the second communication partner an email with a link that can be used to install the communication application in such a way that they only establish a corresponding connection between the two invited communication partners can. The third person is then not a communication partner within this communication connection - he only initiated it.
  • the essence of the present invention is preferably that two people are connected to one another via a dedicated communication channel and can communicate with one another via this channel, which has been established and authenticated. Both people have an application on their computer, which preferably shows them the status or presence of the other party and is available for any short-term communication with exactly this person.
  • the user preferably has an icon or graphic symbol (combot) on his desk onto which he can drag files in order to transmit them directly to his communication partner. In the same way, he could double-click this icon and then a double window would open, in which his own data and the history of the communication with the communication partner are listed on the one side and on the other side there is a selection field for communication with this partner (buttons for telephoning , Fields for writing messages, etc.).
  • this type of communication does not rely on an e-mail program, a fax program, etc., but rather on this communication application the complete communication between the two communication partners allows. For example, it is possible to transfer documents directly, send messages (similar to e-mail), make phone calls (Voice-over-IP or telephone connection via PSTN network), offer files for exchange, etc. If there is a communication setup or an inquiry - ie if a message was sent to the communication partner - the icon begins to signal that a message has arrived or a file has been sent, etc. The communication partner on the other hand is then able to recognize that a corresponding message has reached him.
  • the icon assigned to the other partner is on the desktop of the communication partner, so that communication between the partners is visually supported via these icons.
  • These icons are therefore graphic elements, which thus have the function of so-called communication robots (English: Communications Robots) and are referred to below as "ComBots”.
  • the ComBots are not only to be understood as graphic elements and status indicators, but also as functional elements for direct access to the contact or communication partner, in order to send him messages and / or files of any kind, a ComBot is therefore a contact element and corresponds to a program object that a user program accesses to a direct one Establishing access via the communication system from one contact to the other contact, whereby the user program can also use or emulate various applications, such as an email client or an application for a peer-to-peer file transfer for example, a first user A simply by dragging and dropping on his desktop the other user B a document, such as a text file Send part, image file or entire directories or at least give him access rights to these files grant.
  • various applications such as an email client or an application for a peer-to-peer file transfer for example, a first user A simply by dragging and dropping on his desktop the other user B a document, such as a text file Send part, image file or entire directories or at least give him access rights to these files grant.
  • user A pulls the symbol for the file onto the ComBot on his desktop, which represents user B.
  • the files and directories exchanged and / or shared among the users appear on a shared website managed by the system, preferably within a certain window layout, such as, for example, B. a double window.
  • the double window essentially has two sections, each of which is assigned to one of the two users.
  • all the associated files and directories appear in the sub-area of the user A and likewise the associated files and directories appear in the sub-area of the user B.
  • the website is particularly used for the administration and implementation of communication between remote contacts, i.e. telecommunications in the broadest sense.
  • the website is therefore also known as the Telecommunications Website.
  • the two users can access them directly and without a login procedure via the user program, ie by clicking on the ComBot, or, if necessary, also via a web browser, whereby the URL should be known and log-in should be carried out. It is preferably accessed directly via the ComBots.
  • Communication is initiated by the local client and this is also the program that the two communication partners use exclusively for themselves - technically, it is preferably implemented in such a way that this application with the data or services they offer accesses a server center (Living Contact), on which the data can be stored, a trust center that is responsible for authentication is operated, other resources can be offered, such as the connection for making calls, Voice-over-IP, etc.
  • the data from communication partner A can be stored on the corresponding Living Contact server, on the cell phone or on the PC.
  • the various aliases of the corresponding files displayed are then displayed in the "double window".
  • the communication in this communication channel (wormhole) takes place preferably with a very high encryption (4096 bit encryption) and thus represents one of the safest communication channels at all.
  • a corresponding contact group ie to organize them as a group. These combined contacts are then sent as a group. In such a group, several individual contacts can thus be combined. Communication is therefore from a first contact partner possible to the group, ie point-to-multipoint communication. If the contact group is now offered to other contacts, they do not have to be available to all in the Group grouped individual contacts themselves, but can use the entire contact as a group. This saves many work steps for the individual users - by simply sending the group, the set-up and distribution is accelerated. Furthermore, a psychological advantage can be seen in the fact that the collectors' drive of the individual leads to the completion of the group and thus even more data is made available in the overall system.
  • a first way to increase security is a Program that periodically changes the passwords on the relevant pages itself, without the user (contact partner) having to do this himself. It is possible, for example, that the passwords are changed once a day and thus new passwords are always available for applications such as Amazon accounts, eBay accounts, etc. The user himself does not have to know these passwords, since he can automatically use this keychain function when logging in.
  • Another way to increase security is that a memory stick is used as a digital socket key and the system requires authentication that was previously written on such a memory stick. It is only possible to use the system actively on the Internet via the passwords if the dongle is plugged into a device connected to the system, in particular an Internet access terminal.
  • this dongle be plugged in and thus start a communication application, in particular request a combot, and then open a communication channel in the first place. The user could then act accordingly by entering his own password.
  • an appropriate invitation can also be sent directly to the desired communication partner in such a case.
  • the individual website via which a connection with the invited communication partner can be initiated, does not have a fixed address that is visible outside the system. On this way, even a hacker cannot get to the corresponding website and penetrate the system.
  • communication partner A it is also possible for communication partner A to set up an exclusive website for communication partner B, a so-called private website, which only communication partner B can access as part of the exclusive connection between A and B.
  • A can store such a private website either via normal programming in HTML format in the LC system or on the Internet, which the B then accesses with a browser-like application or with the communication application that he uses for the exclusive communication between A and B uses the so-called LC software.
  • Communication partner A can also provide B with the website as an independent format within the LC software or communication application, so that B can access this website directly via the LC software in which A has stored special content for B.
  • access to the website provided below is particularly secure and exclusive. Third parties cannot access this website, even if it was provided on a web server. Because even if the content of the website is possibly stored in HTML format and could be read with a standard browser, access to this website is reserved exclusively for the communication partners. In particular, the website is not assigned a usual URL, but a special address. At least in the event that the website is conventionally programmed as HTML, the address provided by A to B is preferably encrypted. Access to this website is preferably only granted after authentication. This authentication takes place particularly preferably in the background, so that the authentication data for releasing the exclusive communication between A and B are also used in order to be able to visit and view the private websites provided here.
  • Communication partner A can particularly preferably make a private website available to several of its exclusive communication partners Bl to Bn, particularly preferably to a whole group of communication partners, which are combined in a group combot. In this way, A can provide its special communication partners with an individual website that only the members of this group can access.
  • FIG. 1 shows a schematic view of an embodiment of a communication system according to the present invention
  • FIG. 2 shows a schematic view of the user interface of a communication application in a communication system according to the invention
  • FIG. 3 schematically shows the mouse-over functionality in partial illustrations 3a and 3b;
  • FIG. 4 schematically shows the drag-and-drop functionality of the in part illustrations 4a to 4c Communication application of the communication system according to the invention
  • Fig. 5a shows a simplified representation of Fig. 1 of a contact connection in the form of a two-point contact connection, in which the method according to the invention is applied and in which contacts on the desktop are represented by so-called ComBots;
  • FIG. 5b shows representations of further contact connections, in particular multi-point contact connections, in which the method according to the invention is applied and in which contacts on the desktop are represented by so-called ComBots;
  • FIG. 7 shows a representation of a system architecture for managing contacts by means of the method according to the invention with the integration of ComBots and / or GroupComBots;
  • FIG. 8 shows a schematic illustration of an architecture according to an exemplary embodiment of the present invention.
  • 9a shows a schematic illustration to illustrate the method for displaying data of a message within a communication according to the present invention
  • 9b shows a suitable representation for the communication on the desktop of a user
  • Figure 10 shows an alternative representation which includes a recording and playback function REC.
  • a terminal 30.1 of the first communication partner A comprises a local communication application 10.1.
  • the terminal 30.1 is a computer with Internet access via a DSL broadband connection. Access to the communication network 9, i. H. the internet possible.
  • a terminal 30.2 of the second communication partner B with a communication application 10.2 is shown in mirror image. This terminal 30.2 is also a computer and has access to the Internet.
  • the communication partners A and B can therefore communicate with one another by means of the communication applications running on their terminals 30.1 and 30.2, respectively, via the Internet 9, which exemplifies different communication networks. In this case, communication is carried out directly and securely by means of a control device and memories 15.1a to 15.1c and 15.2 which are described in more detail, these memories preferably serving as data buffers.
  • the control device 20 has access to the memories 15.1a, 15.1b and 15.1c and 15.2.
  • the memories contain communication data and files that the
  • the specific storage location can be distributed over any storage media and over different locations.
  • the memory 15.1a is on a server
  • the memory 15.1b is a memory on the PDA (personal digital assistant) of the first communication partner A
  • the memory 15.1c is the local memory on its computer 30.1.
  • the memory 15.2 is a memory area on a server that can be reached via the Internet.
  • this control panel comprises a communication element 11 as an interaction window.
  • the local communication application 10.1 sends a request to the control device 20 on the computer 30.1 of the first communication partner A to release the connection from A to B.
  • the control device 20 authenticates the connection from A to B by checking whether both partners are registered or authenticated and that this exclusive connection can be established. The control device then selects the selection of the first
  • Communication partner A ie the data, files and / or data areas predetermined by him in the memories 15.1a and 15.1b and 15.1c, which are to be displayed in the left half of the double window 17.1.
  • the data, files and data area selected by the second communication partner B are represented in the memory 15.2 in the right half window 17.2 as data for the communication partner B.
  • the area 17.1 thus contains the data which communication partner A makes available to communication partner B and in area 17.2 the data which communication partner B makes available to communication partner A in this exclusive connection.
  • the system has now been able to set up a communication channel (wormhole) to the communication partner B, the partners being offered the double window 14 and a communication element 11 on the website as an input and control element.
  • the communication partner A can now exclusively communicate with the communication partner B via the corresponding local communication application 10.1 or 10.2 and exchange data and vice versa.
  • FIG. 2 shows a schematic view of the double window 14 and the communication element 11.
  • partners A and B Via the communication applications (communication programs) running on the terminals of communication partners A and B, partners A and B have access to several operating windows, in which a double window 14 with left and right sub-areas 17.1 and 17.2 and a communication element in the form of an interaction window 11 are provided is.
  • the first selection of data 17.1 of the communication partner A is shown in the left window 17.1 in the double window 14.
  • This is, for example, a text file "A-doc.doc" and a music file "song # l.mp3".
  • In the right area 17.2 shows the second selection of data 17.2 of the second communication partner B.
  • each partner has an overview of the data selection that he makes available to the other partner and of the data selection that he receives from the other partner.
  • B can now choose whether he wants to view the data made available by A or transfer it to his area.
  • the arrow I shows that B now has the option, for example, of dragging and dropping the file “song # l.mp3” into its area of selecting data 17.2.
  • the song is moved to the area from B copied over to us, B is immediately available in his own area.
  • communication partner B can also go there and drag the documents from area A from 17.1 directly onto his own desk or hard drive, which will download them and directly to him locally in the
  • the icons or the individual files shown in windows 17.1 and 17.2 are preferably only a pointer or an alias file, without the entire file having to be uploaded in order to be displayed in the window.
  • interaction window 11 inputs of any form (text, figures, pictures, etc.) can be made by both partners. For example, a cylinder and an asterisk have been entered as drawing elements. In addition, a line has been drawn by a mouse cursor and a text message "... and this is how it works " has been entered.
  • the interaction window 11 thus serves for interactive communication in a form in which synchronous and asynchronous forms of communication merge into one another. This means that it is no longer necessary to distinguish in a conventional manner between an asynchronous form of communication, such as email, and a synchronous form of communication, such as chat, in particular, no separate software applications, ie email client and Chat client are used, but all forms of communication preferably go through this one interaction window 11.
  • a and for B it is thus possible in the interaction window 11 for A and for B to make inputs which the other communication partner can see directly. For example, it is possible to enter shapes such as the cylinders or stars shown as examples, or to add comments to existing images using lines or other markings. It is also possible to write messages into this window via text input or also via peripheral devices such as the microphone voice messages for the To leave interaction windows.
  • a parallel voice connection can particularly preferably be set up via a corresponding function, so that in addition to the visual possibilities in the interaction window, parallel voice messages can also be transmitted.
  • a video image of the other communication partner can be faded in via this interaction window 11, so that a corresponding video communication is also possible.
  • Communication application represented by a graphic symbol (combot).
  • Communication partner B is shown on the desk (desktop) of communication partner A as a graphic symbol, here a smiling face.
  • FIG. 3a shows how the input means mouse of the communication partner A is brought to the left below the combot, which represents the communication partner B, in FIG. 3b it can now be seen that the mouse was moved over the graphic symbol 40 of the communication partner B. and a pop-up menu has been activated, from which communication partner A can now select various functionalities that the local communication application presents to him. So it is possible e.g. B.
  • FIG. 4 shows in three steps how the drag-and-drop functionality can be used in an exemplary embodiment of the present invention. It can be seen in FIG. 4a that the communication partner A, by clicking on a corresponding document, pulls it in the direction of the graphic symbol that represents the communication partner B. 4b shows how this file symbol is now dragged onto the graphic symbol of the communication partner B and released with the mouse. 4c shows the animated reaction of the graphic symbol which "swallowed" the document and the transmission of this document to communication partner B by the speech bubble "thanks! signaled. In this way, it is possible to make a file available to the other communication partner (here, for example, the B), or to transmit it by simply transferring the file to the exclusive connection application using simple drag-and-drop.
  • the other communication partner here, for example, the B
  • the file can preferably be viewed and called up in the double window and from B.
  • communication partner A who drags and releases the document on the combot, an additional communication window afterwards in which he can write an additional message or leave a voice message, which provides communication partner B with further explanations of the transmitted file give.
  • FIGS. 5 to 7 illustrate further applications of the invention in which contacts for communication of any type (email, SMS, telephony, instant messaging, file sharing ...) are in permanent or at least quasi-permanent contact with one another, with special graphical ones Elements (the above-mentioned ComBots) on the desktop of the computer display the current status of the respective contact partner and several of these elements can be grouped together (the above-mentioned GroupComBots).
  • the above contacts are the users of the system, i.e. the people or institutions previously referred to as communication partners.
  • FIG. 5a shows a schematic representation of an existing contact connection between the first user A and the second user B.
  • FIG. 5a corresponds to an alternative and simplified representation of FIG. 1, in order to show the function of the double window even closer from the perspective of the user explain.
  • the representation of the interaction window is thus omitted in the following.
  • FIG. 5a Shown in FIG. 5a is the respective desktop DTA by user A or DTB by user B and the respective graphic element in the form of a ComBot, which represents the contact to the other user.
  • the ComBot for user B and vice versa can be found on the desktop DME.
  • Both users are logged into a system to be described in more detail (see FIG. 7), so that the users are in constant contact with one another and can be regarded as contact partners who may want to spontaneously communicate with one another.
  • This connection is therefore a quasi-permanent contact connection, which serves as a preliminary stage for the spontaneous establishment of one or more communication connections.
  • the respective ComBot shows the current status (status) of the contact partner by means of a graphic change, animation or comparable measures.
  • ComBot B on user A's desktop DTA changes color as soon as user B is online.
  • the ComBots are not only status indicators, but also direct access to the contact partner in order to send him messages and / or files of any kind.
  • user A can send user B a document, such as a text file, image file or entire directories, or at least grant him access rights to these files.
  • user A pulls the symbol for the file onto the ComBot B located on the desktop DTA.
  • the files and directories exchanged and / or shared among the users appear on a common website TCW managed by the system, preferably within a double window.
  • the double window essentially has two sections, each of which is assigned to one of the two users.
  • the TCW website is therefore particularly used to manage and carry out communication between contacts.
  • the TCW website is therefore also known as the telecommunications website.
  • the operation of the ComBots shown and the use of the TCW website is particularly easy by drag & drop operations on the respective user interface, ie on the personal desktop and / or in the double window displayed by the browser.
  • A wants to transmit a directory with MP3 audio files to user B
  • A only needs to drag and drop the icon of the directory onto his other desktop desktop to the ComBot B of the other user and drop it.
  • the system will then automatically provide this directory on the TCW website for user B and inform user B of this by animating ComBot A on the desktop DTB.
  • directories and / or files are transmitted in the same way, ie by simple drag & drop. This is illustrated by the arrows in Fig. 5a.
  • the double window shows which files and directories have been made available by which user for use by the other user.
  • the physical storage locations can be located centrally on a server of the system or they can also be located decentrally on the users' computers and end devices or on other external computers.
  • users can find out about the current status and, as they wish, transfer individual or multiple files and entire directories to their area. This means, for example, that user B moves a file located there in the partial area of user A to his partial area B by dragging and dropping on the website of the website TCW.
  • this file or a copy thereof can be downloaded automatically from the TCW onto the computer of the user B.
  • the modes of operation will be described in more detail later with reference to FIG. 7.
  • FIG. 5a illustrates, the method and system of the invention is suitable for establishing a quasi-permanent contact connection between users (contact partners) via a website TCW set up for this purpose and the current status on the desktops of the computers and / or the displays of the terminal devices display the user and enable direct access to the respective contact partner using graphic elements, the so-called ComBots.
  • a group can be formed by simply dragging and dropping ComBots: If there are already two or more ComBots for individual contacts, such as for B and C, on the desktop DTA of a user, the user can Create a so-called GroupComBot GRP by dragging and dropping one ComBot (e.g. ComBot B) onto the other (ComBot C). This GroupComBot GRP then represents the contacts (here B and C), ie it corresponds to a contact group. The GroupComBot GRP can be expanded at any time by dragging and dropping. B. Another contact D. Thus appears on the user's desktop instead of many individual ComBots just one symbol, namely the GroupComBot GRP. With a simple double click or similar measures, the GroupComBot GRP is broken down into the individual ComBots (here in B, C and D).
  • the grouping of several contacts into a group in the form of GroupComBots provides a significantly improved overview on the desktop and thus increases the ease of use for the user.
  • the group formation is very flexible, so that the user can form GroupComBots in any way. It can be a single ComBot, e.g. B. is assigned to a work colleague and friend, also in several GroupComBots, such as B. one for "colleagues" and one for "friends”.
  • the user can also combine several GroupComBots into GroupComBots. For example, he can combine the two GroupComBots "work colleagues" and “friends" into a GroupComBot "my birthday party” because he wants to invite all his work colleagues and friends to his next birthday party.
  • GroupComBots formed according to persons (contacts), time, event and / or project
  • the grouping according to the invention can also be carried out by itself in which the system automatically creates virtual GroupComBots and suggests them to the user.
  • the LC system is based on the Internet and essentially comprises one or more servers which manage contact data of a large number of users for possible communication and the provision of user data.
  • the system LC is symbolic in FIG. 7 shown.
  • two users A and B are shown as examples and a website TCW provided for the users by the system.
  • the system LC provides each user with a memory area (e.g. MEM-A for user A). This storage area is located e.g. B. on the drive of the LC server or on an associated data storage medium.
  • system-external memory in particular the HD-A or HD-B drives of their computer PC or their PDA end devices, to store any files and / or directories to make it available for other users (contacts).
  • the system LC provides a website TCW with a double window in which all data recorded by the system LC, in particular the contact details of the two users A and B and the user data provided by them, can be displayed.
  • the ComBots also serve to establish direct contact by a user (here A) clicking the ComBot of the desired contact (here B) and then using an application that then appears from a communication menu.
  • the system LC supports the user by only using the possible or even preferred communication methods, such as. B. Email or SMS.
  • the user profiles and user requirements managed by the system are taken into account.
  • Spontaneous communication can also be initiated by simple drag & drop. For example, if user A drags a WORD file onto ComBot B of his contact partner B, the LC system converts this file into PDF format and transmits the PDF file as an attachment to user B along with a notification email.
  • the user A pulls an MP3 file (symbolized by an asterisk) onto the ComBot B, which is currently located on the hard disk HD-A of the computer A of the user A.
  • the system LC immediately starts an upload by transferring this MP3 file to the internal memory area MEM-A of user A and displaying this on the website TCW.
  • User B now receives a message that A is providing him with a file.
  • the system LC animates ComBot A on the desktop DTB of user B, whereby ComBot B receives, for example, a speech bubble with the message "MP3 from A for you".
  • the user B can then immediately surf to the TCW website and there access his own memory area (right side of the double window) and also the memory area released by A (left side). Either user B leaves the MP3 file (see star) there in the storage area of A or user B initiates a transfer of the file to his storage area. He can do this by dragging and dropping the file symbol, here by dragging the star from left to right (see arrow).
  • the system LC immediately controls a corresponding file transfer from the hard disk HD-A to a storage area specified by user B, here to the hard disk HD-B, which is located in the end device of user B, here in the mobile personal digital assistant PDA.
  • the file transfer takes place via a two-point connection in the form of a peer-to-peer transfer p2p. Many other applications are possible.
  • the LC system is characterized in particular by the fact that it makes all possible communication techniques for contacts usable spontaneously and through simple desktop-optimized operability, with the contact details being updated automatically.
  • FIG. 8 shows a schematic structure with which it can be illustrated how data can preferably be exchanged between user A and user B.
  • User A has a computer with a local hard disk A local.
  • This computer is in the local area network LAN-A of user A.
  • This computer can establish a connection to the Internet via a DSL connection.
  • the program running on A's computer can access A LUH-A's Living Contact User Home.
  • the LUH-A which among other things has comparable functions such as a Visitor Location Register (VLR) in mobile communications executes, the information of the corresponding user is stored in profiles, preferably in a database PA.
  • this database PA acts as a buffer.
  • a Central Identity Directory CID is provided, which is used for a central identification or
  • Identity directory corresponds and performs comparable functions as a home location register (HLR) in mobile communications and that all addresses of the individual users of this communication environment, Living Contacts, i.e. so here A and B, managed. CID thus knows the physical location of all users in the
  • a local's computer connects to LUH-A.
  • B There the profile of B is read from the database P-A and the corresponding address of LUH-B is determined. Thereupon LUH-B is contacted and checked where B local is currently and in particular whether B is online. When B is online, a direct connection to B is established. If B is not online, it is possible to leave data in the user home of B LUH-B, which the user will find the next time they log in.
  • A could release a file from its own hard disk A local for B, which in a first step only receives information that this file is released for it. On LUH-A this would only transmit an alias that contains the position of this file on A local. This alias would be passed on to LUH-B and - insofar as B is online - would be announced to B local. In a next step, B could then download this file from A's computer onto A local's hard disk. However, if A is no longer online at the moment, B could not currently access the file. This making the file available from A to B is a level of lowest availability.
  • the file could already be completely transferred from A local to LUH-A, i.e. uploaded.
  • the file would then be in LUH-A in a buffer.
  • B would be informed as usual that this file is available for him. If B now accesses this file, he can do so via LUH-B on LUH-A even if A is not online. However, if A later decides that he wants to delete this file, he could do so by directly accessing LUH-A - in such a case, the file would then no longer be available to B.
  • B could decide to transfer the file that he found on LUH-A or A local to his own user home LUH-B. By now transferring the file to LUH-B, he increases the availability of this file for himself. Because even if A later decides to delete this file on LUH-A, B would still use LUH-B be available.
  • B could choose, the file even from LUH-B to its local one Transfer computer B local. In this case, the file would still be available at B local even after the application was closed. He could even use the file if he was no longer online.
  • the CID looks up the user ID (UserlD) and specifies the assigned address of the correct UHL.
  • the CID therefore performs a data mapping from UserlD to UHL-A to the UHL address.
  • the architecture shown can be flexibly expanded to larger networks with a large number of users n.
  • the “upload on demand” provides for the transmission of further information about the file made available by the display of alias files.
  • “Upload on Demand” is a memory management system that enables Display files first and then transfer them fully later. In the various levels of availability, as long as the file for user A is on the computer, the availability for user B is low. If the file is on the LUH of user A LUH-A, the availability is always there regardless of its online property, and if the file was then downloaded from the LUH of sender A to the LUH of recipient B, the availability for the recipient is there without restriction - in a further step he can even download the file to his desktop.
  • user A can also choose to provide the user with an entire directory, ie a folder with files.
  • the user B can then "browse" the directory and see what files he wants. For example, it is possible for the user A to provide the user B with a directory with music files on his own hard disk A. B is now authorized To access these music files, B is initially only shown a folder icon, in which he recognizes that a folder provided by A exists here. When B opens this folder, the individual music tracks can now be displayed.
  • These files are still alias files that refer to the corresponding files on A local's hard disk or LUH-A.
  • 9a shows a schematic view to illustrate the method for displaying message files within a communication according to an exemplary embodiment of the present invention.
  • 9b shows a preferred representation for the communication on the desktop of a user.
  • Time points TO to T5 are shown along a time axis, which is identified by T (see FIG. 9a).
  • the period TO to T5 comprises communication or at least a partial area thereof, in which both communication partners, i.e. contacts A and B, use the communication element shown to send messages (text, language) and other information (pictures, photos, files, actions ..) can exchange.
  • the communication element is shown in the form of windows on the desktop of the communication partner (s. Fig.
  • the HIS window has a navigator element NAV, with which the user can highlight sections within the chronology or history. The selected section is then enlarged in a window, such as here e.g. displayed in the interaction window INA.
  • the history covers the period from TO to T5.
  • the current input is currently being prepared by user A in his PRE window shown here and relates to the previous communication with user B. User A enters text and writes: "Do you still have old photos from our school days?"
  • the messages consist, for example, of text which the respective user enters into the computer via his keyboard.
  • graphics can be created, pictures can be inserted and a voice message can be spoken.
  • the respective sender A can also set index points at TO to T5.
  • the communication process shown is as follows: Sender A starts at TO with a text message that he types in using the keyboard: "Hello B, look what I found here”. In the time interval from T1 to T2 the sender then inserts a graphic that represents, for example, a class photo. He also speaks a voice message over a microphone: "Amazing how young we were then”. The whole thing is displayed in the INA window for both users at the same time. In the time interval T2 to T3, the B now paints a mustache in the class photo for the teacher and adds a short text "Nice!.
  • the original author or sender A speaks the sentence "This is a bit silly "And in the time interval T4 to T5 he (user A) wipes the mustache away and writes the text" Who was the boy on the far left in the second row? ". Again everything appears in the INA window he sends this message to recipient B.
  • Recipient B has various options for displaying this message. He can first view the message in its final, final stage, ie as it was at time T5.
  • the recipient B could now also go there and look at the chronological course of this message. To do this, he uses the HIS window and the Navigator NAV. He can then do this in such a way that he jumps back at time TO and then steps forward to times Tl, T2, T3, T4 and T5. With TO a blank sheet would be seen, with Tl the sentence would be "Hello B, look what I found here”. At T2 there would be an image and a reference to an existing language file. If B then plays this language file, it would be Hear sentence "Amazing how young we were back then”.
  • the photo would now be seen with the teacher and the mustache, while at time T4 there would be an indication of another voice message, when played back the sentence "This is a bit silly" would be heard.
  • this mustache would have been wiped away again and the sentence read "Who was the boy again on the far left of the second row?".
  • the sequential display appears step by step in a dedicated window, such as the INA window. You can jump from index point to index point as you like. Thus, the user can also selectively jump to or select each index point individually and in any order, such as the T3 and then T5 and then Tl etc. ...
  • the display in the HIS window is designed so that the entries are nested sequentially are shown, whereby they are assigned to the respective author (user A or B).
  • the inputs from A are, for example, on the left and the inputs from B on the right, as shown in FIG. 9b for the desktop of user A.
  • the display on the desktop of the other user B would then be a mirror image.
  • the inputs can also be marked graphically, in particular in color, so that it is quickly apparent who is the author of the respective inputs.
  • the position of the other user's navigator is indicated by a marker BL.
  • the marking BL on the desktop of the A indicates that the B is currently navigating to the index point T5.
  • the history is preferably strictly chronological. However, this does not mean that all new entries can only be added as an attachment to the existing sequence.
  • Each user can also make new entries in an existing sequence, for example in the interval T3 to T4, by using the Navigator NAV goes and then makes the new entry in the INA window or first in the PRE window. The direct entry or the actuation of the send button then leads to an update of the view. In the example, the mustache is removed again at T5. The corresponding entry is made in the history.
  • the user such as B. the user B, would also have the opportunity to view the entire message in real time so that he could view and hear the entire history of the creation of this message along the time axis T.
  • the voice messages would preferably start automatically and be imported at the appropriate time.
  • the writing would develop word by letter or letter by letter, and B could now also track spelling mistakes or corrections that A then made.
  • A might have initially used the term "seen” instead of the word "found” when writing the text in the time interval between TO and Tl. A then, after having written this word, deleted the word and replaced it with "found”. B would now also be able to follow this first word, the correction and the replacement of the expression.
  • B has the option of running this "news creation film" faster at any time, similar to a CD player, or jumping to the individual index points TO to T5. B would now also be able to insert a new index point between T3 and T4 or to move the index point T2. In this way, B can index the message again for himself and thus structure it for later viewing.
  • the present invention provides a communication system which can be used to communicate exclusively with a special further communication partner in a very comprehensive and very secure manner, without both communication partners being disturbed by third parties in the communication and having to find unwanted messages from third parties in their communication application ,
  • the combination of providing documents and files on the one hand and an interaction window for quasi-synchronous and simultaneous use by the communication partners on the other hand enables extensive and convenient exclusive communication between the two communication partners.
  • LAN-A Local Area Network
  • a local computer of user A or B is a local computer of user A or B
  • P-A P-B database of user A or B

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un système de communication entre un premier interlocuteur A et un deuxième interlocuteur B. Ce système comprend un réseau de communication de préférence l'Internet; un premier terminal du premier interlocuteur A comportant une première application de communication que le premier terminal exécute; un deuxième terminal du deuxième interlocuteur B comportant une deuxième application de communication que le deuxième terminal exécute; un dispositif de commande comportant un équipement d'authentification. Les applications de communication et le dispositif de commande permettent d'établir une communication, disponible immédiatement si besoin, dans le réseau de communication et destinée exclusivement à la communication entre le premier et le deuxième interlocuteurs A et B. Un élément de communication graphique permet d'activer la communication entre les deux interlocuteurs par les applications de communication.
PCT/EP2005/005513 2004-05-21 2005-05-20 Je systeme de communication permettant de securiser la communication entre au moins deux interlocuteurs et procede d'affichage de messages WO2005114967A2 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP05745194A EP1665744A2 (fr) 2004-05-21 2005-05-20 Robot de communication

Applications Claiming Priority (18)

Application Number Priority Date Filing Date Title
EP04012120.4 2004-05-21
EP04012120 2004-05-21
US58469804P 2004-07-01 2004-07-01
US60/584,698 2004-07-01
US58646904P 2004-07-08 2004-07-08
DE102004033164A DE102004033164A1 (de) 2004-07-08 2004-07-08 Verfahren und System zum Verwalten und Vorschlagen von Kontaktgruppen
DE102004033164.2 2004-07-08
US60/586,469 2004-07-08
DE102004039697.3 2004-08-16
DE200410039697 DE102004039697B3 (de) 2004-08-16 2004-08-16 Kommunikationssystem zur Kommunikation zwischen mindestens zwei Kommunikationspartnern und Verfahren dafür
DE102004052071.2 2004-10-26
DE102004052071 2004-10-26
DE102004059748A DE102004059748B4 (de) 2004-12-11 2004-12-11 Verfahren und Kommunikationssystem zur Steuerung der direkten Kommunikation zwischen zwei Kommunikationspartnern
DE102004059748.0 2004-12-11
US63553504P 2004-12-13 2004-12-13
US60/635,535 2004-12-13
DE102005001720A DE102005001720B4 (de) 2005-01-13 2005-01-13 Kommunikationssystem zur sicheren Kommunikation zwischen mindestens zwei Kommunikationspartnern und Verfahren zur Anzeige von Nachrichten
DE102005001720.7 2005-01-13

Publications (3)

Publication Number Publication Date
WO2005114967A2 true WO2005114967A2 (fr) 2005-12-01
WO2005114967A3 WO2005114967A3 (fr) 2006-01-19
WO2005114967B1 WO2005114967B1 (fr) 2006-03-09

Family

ID=34968604

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2005/005513 WO2005114967A2 (fr) 2004-05-21 2005-05-20 Je systeme de communication permettant de securiser la communication entre au moins deux interlocuteurs et procede d'affichage de messages

Country Status (2)

Country Link
EP (1) EP1665744A2 (fr)
WO (1) WO2005114967A2 (fr)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102006010770A1 (de) * 2006-03-08 2007-09-20 Combots Product Gmbh & Co. Kg Verfahren zur Einladung, ein Kommunikationssystem zu nutzen, und zur Installation eines Kommunikationselementes, sowie eine das Verfahren ausführende Vorrichtung
WO2007128513A1 (fr) * 2006-05-08 2007-11-15 Combots Product Gmbh Procédé et système permettant d'obtenir un menu de sélection associé à un symbole affiché
WO2007134758A1 (fr) * 2006-05-19 2007-11-29 Combots Product Gmbh Système pour la mise à disposition de quantités de données pour une communication et système de communication prevu a cet effet
WO2007134839A1 (fr) * 2006-05-24 2007-11-29 Combots Product Gmbh Transmission de messages au moyen d'éléments de communication animés
EP1971107A1 (fr) 2007-03-14 2008-09-17 Magix Ag Système et procédé pour la partage d'un contenu visuel dans un environnement en ligne
FR2930099A1 (fr) * 2008-04-14 2009-10-16 Goojet Procede et dispositif de routage de donnees
EP2533493A1 (fr) * 2011-06-06 2012-12-12 Mitel Networks Corporation Extension de mobilité de session de proximité
EP2533491A1 (fr) * 2011-06-06 2012-12-12 Mitel Networks Corporation Mobilité de session de proximité

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998029956A2 (fr) * 1996-12-30 1998-07-09 Intel Corporation Procede et appareil prenant en charge la connectivite a la demande pour des applications de reseau
US20030021398A1 (en) * 1999-12-24 2003-01-30 Telstra New Wave Pty Ltd. Portable symbol
US20030051003A1 (en) * 1999-12-20 2003-03-13 Catherine Clark Communication devices

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998029956A2 (fr) * 1996-12-30 1998-07-09 Intel Corporation Procede et appareil prenant en charge la connectivite a la demande pour des applications de reseau
US20030051003A1 (en) * 1999-12-20 2003-03-13 Catherine Clark Communication devices
US20030021398A1 (en) * 1999-12-24 2003-01-30 Telstra New Wave Pty Ltd. Portable symbol

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102006010770A1 (de) * 2006-03-08 2007-09-20 Combots Product Gmbh & Co. Kg Verfahren zur Einladung, ein Kommunikationssystem zu nutzen, und zur Installation eines Kommunikationselementes, sowie eine das Verfahren ausführende Vorrichtung
DE102006010770B4 (de) * 2006-03-08 2007-10-31 Combots Product Gmbh & Co. Kg Verfahren zur Einladung, ein Kommunikationssystem zu nutzen, und zur Installation eines Kommunikationselementes, sowie eine das Verfahren ausführende Vorrichtung
WO2007128513A1 (fr) * 2006-05-08 2007-11-15 Combots Product Gmbh Procédé et système permettant d'obtenir un menu de sélection associé à un symbole affiché
WO2007134758A1 (fr) * 2006-05-19 2007-11-29 Combots Product Gmbh Système pour la mise à disposition de quantités de données pour une communication et système de communication prevu a cet effet
WO2007134839A1 (fr) * 2006-05-24 2007-11-29 Combots Product Gmbh Transmission de messages au moyen d'éléments de communication animés
EP1971107A1 (fr) 2007-03-14 2008-09-17 Magix Ag Système et procédé pour la partage d'un contenu visuel dans un environnement en ligne
FR2930099A1 (fr) * 2008-04-14 2009-10-16 Goojet Procede et dispositif de routage de donnees
EP2533493A1 (fr) * 2011-06-06 2012-12-12 Mitel Networks Corporation Extension de mobilité de session de proximité
EP2533491A1 (fr) * 2011-06-06 2012-12-12 Mitel Networks Corporation Mobilité de session de proximité
US10225354B2 (en) 2011-06-06 2019-03-05 Mitel Networks Corporation Proximity session mobility
US10277641B2 (en) 2011-06-06 2019-04-30 Mitel Networks Corporation Proximity session mobility extension
US11153393B2 (en) 2011-06-06 2021-10-19 Mitel Networks Corporation System capable of interacting with devices on a network
US11258864B2 (en) 2011-06-06 2022-02-22 Mitel Networks Corporation Communication device capable of interacting with devices on a network

Also Published As

Publication number Publication date
EP1665744A2 (fr) 2006-06-07
WO2005114967A3 (fr) 2006-01-19

Similar Documents

Publication Publication Date Title
US11977585B2 (en) Systems and methods for escalating a collaboration interface
EP2198589B1 (fr) Procédé pour réaliser une communication multimédia reposant sur un protocole réseau, en particulier sur tcp/ip et/ou udp
US8533284B2 (en) Sharing of media and other content through a communication channel
US6728784B1 (en) Collaborative multimedia architecture for packet-switched data networks
DE69428725T2 (de) Multimedia Telekonferenzsystem
US20160099984A1 (en) Method and apparatus for remote, multi-media collaboration, including archive and search capability
JP4647610B2 (ja) ネットワーク接続されたチャット及びメディア共有のシステム及び方法
DE69634473T2 (de) Universelles Nachrichtenablieferungssystem
DE69633103T2 (de) Universeller Rufnummernauskunftsdienst
EP1665744A2 (fr) Robot de communication
DE202010018483U1 (de) System zum Zusammenführen von Bearbeitungen für eine Konversation in einem gehosteten Konversationssystem
US20130275885A1 (en) Systems and methods for collaboration
CN116325662B (zh) 基于群组的通信***中的环境的自组织多媒体协作的计算机可读介质、方法和***
EP2458537A1 (fr) Systèmes et procédés de collaboration
DE102011010686A1 (de) Kontextabhängige Korrelationsmaschine
KR20170036127A (ko) 대화 환경과 회의 환경을 가지는 통신 어플리케이션
CN117678213A (zh) 用于基于群组的通信***的协作中心
US12019775B2 (en) Managing permissions for collaborative shared documents
US11875081B2 (en) Shared screen tools for collaboration
DE102005036424B3 (de) Kommunikationssystem für eine sichere Kommunikation zwischen Endgeräten von Kommunikationspartnern und Peripheriegeräte dafür
DE102004039697B3 (de) Kommunikationssystem zur Kommunikation zwischen mindestens zwei Kommunikationspartnern und Verfahren dafür
DE102005001720B4 (de) Kommunikationssystem zur sicheren Kommunikation zwischen mindestens zwei Kommunikationspartnern und Verfahren zur Anzeige von Nachrichten
JP2006013996A (ja) 情報処理システムおよびサーバ
JP2005222246A (ja) 共同作業支援システム及び方法
WO2008071992A2 (fr) Améliorations apportées à un système de communication

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2005745194

Country of ref document: EP

B Later publication of amended claims

Effective date: 20060117

WWP Wipo information: published in national office

Ref document number: 2005745194

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 2005745194

Country of ref document: EP