132701? 九、發明說明: 【發明所屬之技術領域】 本發明係關於語音通話,尤其是有關於一種結合網頁以及 暫用門號的通話連結方法。 【先前技術】 I 網站(website)或網頁(webpage)不僅已經和傳統的平 面、電子媒體同為重要的廣告媒介;隨著社群、部落格的 興盛’更是許多個人提供聯絡的管道。目前廢商、個人多 是在網頁上提供自己的訊息(例如有關產品或服務的資訊) 以及自己的聯絡電話號碼,而由有意聯絡的人(例如客戶 或網友)自行撥打網頁所列的電話號碼來取得聯繫。 在别述的過程中,有些發話的人並不想讓受話的人經由「來 • 電號碼」(caller ID)等機制知道自己的電話號碼。其理由 可月匕單純疋為了隱私、或是避免未來受到騷擾(例如廠商 的促銷活動)、或是詐⑽集團的利用。另-方面,受話的人 (例如廠商或是部落格主)也可能基於隱私或是某些原因 (例如電話號碼可能改變、或是只想在某些特定時段接受 來電),也不想在網頁上刊登特定的電話號碼。但是,目前 似並無任何機制可以同時對發話方與受話方提供服務,而 又能同時讓雙方無法得知對方的電話號碼。- 13Z/Uiy 【發明内容】 =息種有新:通話連結方法 話,伸在聯絡的發話方進行語音通 道對程中,發話方與應答方都完全不知 、話號碼,因而達到保護雙方隱私的目的。 連結方㈣m㈣方,由該㈣方依 據太方=話方與—應答方之間扮演中繼、轉接的角色。佐 之。。接者伺服方會提供給發話方至少一個、在一:個 ^失效的暫用門號。發話方只要在時限_打該=限 服方就會接起該通㈣而建立發話方_ Η 的第-段通話。接下來,舰方在保持第_段通之間 發話給該連結所對應的應答方,另外建立—㈣$時, 服方之間的第二段通話。健方接著再將第=與词 1通話經㈣服方連結起來,而達成雙方的 在别述的過程中’發話方與應答方彼此的電話號碼、、 飼服方知道,目此而達到保障雙方隱私的目的4都只 本通話連結方法的另外—舰要實施例是在發話 ^後’伺·服方要求發話方提供—個電話號碼。接著询壤蜂 會提供給發話方至少-個、在_定時限後就*效的智=方 號發話方/、要在時限内用該電話號碼的電話撥打场 1 門號’词服方就會接起賴來電祕立發話方與彳用 7 1327019 I ». 間的第-段通話。接下來,•方發話給該連結所對應的 應答方,另外建立-個應答方㈣服方之間的第二段通 話。伺服方接著再將第-段通話與第二段通話經由饲服方 連結起來’而達成雙方的通話連結。 兹配合所附圖示'實施例之詳細說明及中請專利範圍,將 上述及本發明之其他目的與優點詳述於後。然而,當可了</ RTI> </ RTI> </ RTI> </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; [Previous technology] I website (website) or webpage (webpage) has not only been an important advertising medium with traditional flat and electronic media; as the community and blog flourishes, it is a conduit for many individuals to provide contact. At present, most of the wasters and individuals provide their own messages (such as information about products or services) and their own contact numbers, and those who are interested in contact (such as customers or netizens) call the phone numbers listed on the website. To get in touch. In the course of the other, some people who do not want to let the person who knows know their phone number through a mechanism such as "caller ID". The reason for this may be that it is purely for privacy, or to avoid future harassment (such as vendor promotions) or fraudulent use of the group. On the other hand, the person being called (such as a vendor or a blogger) may also be based on privacy or for some reason (for example, the phone number may change, or only want to accept calls at certain times), and do not want to be on the webpage. Publish a specific phone number. However, at present, there seems to be no mechanism to provide services to both the caller and the callee, and at the same time, the two parties cannot know the other party's phone number at the same time. - 13Z/Uiy [Summary] There is a new type of interest: the call connection method, in the voice channel of the contact party, the caller and the responder are completely ignorant of the number, thus achieving the protection of the privacy of both parties. purpose. The connecting party (4) m (four) party, by the (four) party according to the role of the party = the party and the responder play a role of relay and transfer. Zuozhi. . The receiver will provide the caller with at least one temporary gate number that is invalid. As long as the caller is in the time limit _ call the limit, the service party will pick up the pass (4) and establish the first-segment call of the caller _ Η. Next, the ship will send a message to the respondent corresponding to the link between the _ segment, and establish a second call between the servants when the (4)$ is established. The health party then connects the first and the word 1 to the (4) service party, and the two parties reach the phone number of the sender and the responder in the process of the other, and the feeding party knows that the protection is achieved. The purpose of the privacy of both parties is only the other method of the call connection method. The ship is required to provide a telephone number after the call is made. Then the inquiry bee will provide the sender with at least one, and after the _ definite time, the wisdom = the number of the party / / to use the phone number within the time limit to dial the field number 1 'word service party It will pick up the first paragraph of the call between the secret caller and the 7 1327019 I ». Next, the party sends a message to the respondent corresponding to the link, and establishes a second session between the respondent (4) service parties. The servo party then connects the first-segment call with the second-segment call via the feeding party to reach the call connection between the two parties. The above and other objects and advantages of the present invention will be described in detail in conjunction with the appended claims. However, when it is ok
解所附圖7F純係為解說本發明之精神而設,不當視為本發 明範嘴之定義。有關本發明範嘴之定義,請參照所附之申 清專利範圍。 【實施方式】BRIEF DESCRIPTION OF THE DRAWINGS Figure 7F is purely illustrative of the spirit of the present invention, and is not considered to be a definition of the present invention. For the definition of the invention, please refer to the attached patent scope. [Embodiment]
第la圖所示係本發明之一示意圖。如圖所示,本發明共涉 及實施本發明之一伺服方30、至少一個發話方1〇、以及N (N》1 )個應答方20。應答方2〇就是在網頁刊登訊息的人 (例如提供產品或服務的廠商);而發話方ι〇就是意欲聯 繫應答方20的人(例如對廠商的產品或服務有興趣的人)。 伺服方3G扮演的角色像是這_應答方2()的總機或接線 生,將某個發話方1G和其所欲聯繫的某個應答方2〇之間, $起通时連結。由於該發# 1Q和誠料2〇是透 發㈣縣方3G的中繼來達成通話連、结,雙方都 無法侍知對方的電號號碼。至於土 保嘈欢^ ^ 於本發明如何提供這種同時 保遵發話方H)和應答方20隱私的功能,以下將詳細說明。 8 1327019 本發明包含二個主要的實施例,以下稱為第1與第2主要 實施例。基於這二個主要實施例,本發明可再分別延伸出 若干相關的實施例,這些實施例以下則以第1-1、第1-2、 第2_1、第2-2實施例的方式指稱。。 第lb圖所示係依據本發明第1主要實施例連結一發話方10 與一應答方20之流程示意圖。首先應答方20是在一網頁 刊登自己的訊息(例如產品或服務的資訊),這個網頁可能 是應答方20自己提供的網頁、或是伺服方30的網頁、或 是任何.第三人提供的網頁。重要的是這個網頁裡具有一個 指向伺服方30、和特定應答方20對應的圖像或文字的連結 (link)。當這個連結被點擊時,點擊者會被導引到伺服方 30的一個網頁、或者向伺服方30發出一個訊息(本說明書 稱此為對伺服方30發出一個請求),伺服方30因此得以與 點擊者進行對話,並且伺服方30從請求所附帶的參數或資 訊可以得知點擊者的網路地址、所點擊的是啷一個應答方 20的連結。以上這些都是網頁的基本技術,所以在此不多 贅述。請注意到,一個應答方20可以在多個位於不同網址 的網頁刊登訊息與提供相同的連結(例如在各個拍賣網站 有關自己商品的網頁上),所以一個劉覽者在任一網頁點擊 該連結,而且同一時間可以有不同的瀏覽者,分別在這些 網頁點擊這些連結。點擊這些連結的瀏覽者,對於伺服方 30而言,就是想要聯絡這些連結對應的應答方20的發話方 10。 1327019 » *. 發話方10 (以下假設是第la圖的曱)在瀏覽這個網頁時, 想要與應答方20 (以下假設是第la圖的A)聯繫(例如想 要得到應答方20所提供的產品或服務的進一步資訊),發 話方10可以點擊這個連結,向伺服方30發出一個請求(圖 中的步驟100)。 在以下執行本發明的各個步驟時,伺服方30會存取預先建 置好的一個門號集90與一個資料集91。門號集90記錄了 一或多個暫用門號以及相關的資訊,資料集91則記錄了各 個應答方20的相關資訊與一些系統參數。進一步的細節, 以下將逐一說明。 以下假設該應答方20的連結是第一次被點擊。接下來在圖 中的步驟110,伺服方30從門號集90中挑選一個目前未被 使用(「空閒」)的暫用門號。伺服方30將該暫用.門號與該 應答方20建立起一個對應關係,並賦予此對應關係一個有 效時限。該有效時限是當時的時間(T )加上一個伺服方 30的系統參數ΔΤ (例如24小時)。也就是說,在有效時限 (Τ+ΔΤ)以前,該對應關係都是有效的。此外,該暫用門 號在該有效時限(Τ+ΔΤ)到達以前,都不會再被伺服方30 拿來和其他應答方20建立對應關係。 請注意到,該有效時限是有可能被延後的。例如在該有效 1327019 時限到達前有另一個發話方1〇(例如第la圖的乙)在同一 網頁或不同網頁點擊對應同一個應答方20的連結,伺服方 30從該應答方20的有效對應關係可以找到該暫用門號。伺 服方30會告知新發話方10使用同樣該暫用門號來聯絡該 應答方20。假設當時的時間是(T+10),經過新發話方10 的點擊後,該暫甩門號與該應答方20的對應關係的有效時 限就會變成當時的時間(T+10)加上伺服方30的系統參 數AT而變成(Τ+10+ΔΤ)。 伺服方30接著告知發話方10 (例如,在發話方10的瀏覽 器中跳出一個訊息視窗),請發話方10在該時限内撥打該 暫用門號來聯絡應答方20 (圖中的步驟120)。請注意到, 發話方10被告知的·是該暫用門號,而非該應答方20真正 的電話號碼(因而保護了該應答方20的隱私)。 接下來,可能有以下幾種種情形會發生:(1)發話方10在 有效時限内撥打該暫用門號;(2)—個不是發話方10的人在 有效時限内撥打該暫用門號(可能是因為撥錯號);(3)任何 人(包含發話方10)在超過有效時限後撥打該暫用門號。 以下就一一說明這幾種情形。 如果發話方10在有效時限内撥打該暫用門號,伺服方30 會接聽這通來電,因而在發話方10和伺服方30之間建立 起一個「第一段通話」(圖中的步驟130)。由於當時該暫用 11 1327019 門號和應答方2〇有一個有效的對應關係,伺服方3〇接著 從貝料集91裡找到該應答方20的聯絡電話號碼(圖令的 步驟140)。伺服方30然後在該第一段通話裡告知發話方 10目前要接通應答方20,請發話方1〇稍待等等。 伺服方3〇接著立即用步驟140取得的電話號碼撥號給應答 方 如果應答方20是忙線或是一定時限内都沒有接聽, 鲁 飼服方3 q就會告知發話方1 〇猶後再試,然後結束第一段 通話。如果應答方20應答的話,應答方20和伺服方3〇之 間就會建立起一個「第二段通話」(圖中的步驟15〇)。伺服 方3〇會以語音詢問應答方2〇是否願意通話,如果應答方 20拒絕(例如藉由按下一個特定鍵),伺服方30就會結束 第二段通話、告知發話方10稍候再試與結束第一段通話。 如果應答方20願意通話(例如藉由按下另一個特定鍵), 接下來伺服方3〇立即將其對發話方1〇的通話(第一段通 話)、以及其對應答方20的通話(第二段通話)連結起來, 使得雙方可以經由伺服方30進行即時雙向的通話(圖中用 貫穿的虛線表不的步驟160)。換吕之,本發明所提供的即 時雙向通話,是由伺服方3〇像接線生一樣,將這兩段分別 的通話由祠服方3〇接通起來。請注意到,應答方2〇所接 到的來電不是直接發自發話方10,所以應答方2〇盔 電顯示的功能得知發話方1Λ认啼乂组 …古從來 方10的電話號碼(因此保鳟了级t 方10的隱私)。 了發話 12 132701.9 如果一個不是發話方10的人在有效時限内撥打該暫用門號 的話,由於當時該暫用門號和應答方20有一個有效的對應 關係,伺服方30 —樣會接聽這通來電(因為伺服方20無 從判斷來話的是不是發話方10)。伺服方30從資料集91 裡找到該應答方20的聯絡電話號碼,然後在該第一段通話 裡告知來話人目前要接通應答方20等等。來話人在此時就 可以發現自己打錯號碼而自動掛斷電話。 請注意到,伺服方30具有一個週期性檢查的機制(例如利 用作業系統的工作排程)定期的檢查所有的對應關係(例 如每分鐘1次)。當伺服方30發現某個對應關係的有效時 很已經到達或超過時,便會立即取消該對應關係,並使該 對應關係涉及的暫用門號可以在嗣後任何應答方2 0的連結 被點擊時,再被用來建立新的對應關係(也就是使其成為 「空閒」)。 當任何人(包含發話方10)在超過有效時限後撥打該暫用 門號時,由於該暫用門號已無和任何應答方20存在有效的 對應關係,伺服方30可以在接聽該通來電後,告知來話人 目前無法提供服務、以及可能的原因等等,然後掛斷電話。 如前所述,門號集90以及資料集91都是伺服方30事先建 立好的一或多個資料庫或是檔案,在某些實施例裡門號集 13 1327019 90以及資料集91甚至可以是放在同一個資料庫或檔案 裡。本說明書將此二者區別開來,一來這是一種實施方式, 二來也是為了方便說明。門號集90裡包含了所有暫用門 號,以及每個暫用門號的對應關係(如果有的話)。該對應 關係的資料包括該暫用門號所對應的應答方20 (通常是一 個獨特的代號);以及該對應關係的有效時限。所以從對應 關係的有無,就可以判斷該暫用門號是否是「空閒」。資料 集91則包含了系統參數(例如ΔΤ)以及有關每個應答方 20的資訊(例如聯絡電話號碼),以下會有進一步敘述。 對於資料集91,伺服方30可以提供一個管理界面來設定其 中的各項資訊。這個管理界面通常是以網頁的形式,供伺 服方30的工作人員以及應答方20自行隨時修改維護。管 理界面還可以其他方式實施,例如採用自動語音回應系統 (interactive voice response,IVR),由應答方 20 撥打一個 特定的服務電話號碼,然後透過電話按鍵來進行修改維 護,這種技術已經相當成熟,所以在此不多贅述。請注意 到,門號集90、資料集91、管理界面都是伺服方30的一 部份,第lb圖將門號集90、資料集91單獨繪出僅是為了 方便說明。 在前述步驟110裡,伺服方30可以採用一種邏輯或演算法 從門號集90中挑選一個「空閒」的暫用門號。這種邏輯或 演算法有很多種可能。例如,從所有「空閒」的暫用門號 14 叫701夕 不特別設限 隨機挑選-個、或是挑選「空間η 本發明對匈服方30所採的邏輯或的暫用Η號等等 以上所述係本發明最簡單的__個實施例。從這個第1主要 ^施例還可以衍生出其他的實施例出來。以下就--加以 首先,在本發明之第1-1實施例裡,為了避免有人惡意大 量點擊連結來癱瘓伺服方30的運作,伺服方30因此在發 話方10點擊連結時(前述步驟100),可以檢查該點擊是來 自哪一個網路地址(例如IP address),而且該網路地址若 疋在從^時到過去一定時段(也是一個糸統參數)產生超 過一定數目(也是一個系統參數)的點擊的話,伺服方3〇 會在發話方10的瀏覽器裡告知目前歉難提供服務以及理由 等,而不提供任何暫用門號。 在本發明的第1-2實施例裡,每一個應答方20在資料集91 裡可以有一個以上的聯絡電話號碼。因此在步驟150建立 第二段通話時,伺服方30可以依照某種順序依序撥打這些 聯絡電話號碼。如果一個聯絡電話號碼是忙線或是無人應 答時’伺服方30會自動嘗試順序裡的下一個聯絡電話號 碼。然後依此類推,直到應答方20應答、或是全部電話號 碼都嘗試過了,伺服方30就會告知發話方10稍後再試, 然後結束第一段通話。 .15 13270以Figure la is a schematic view of one of the present invention. As shown, the present invention is directed to implementing a server 30, at least one utterer, and N (N"1) responders 20 of the present invention. The responder 2 is the person who posts the message on the web page (for example, the vendor who provides the product or service); and the caller is the person who wants to contact the responder 20 (for example, someone who is interested in the vendor's product or service). The role played by the server 3G is like the switchboard or operator of the responder 2 (), connecting a caller 1G and a responder 2〇 to which it wants to contact. Since the #1Q and 诚2〇 are transparent (4) county 3G relays to reach the call, the two parties can not know the other's electric number. As for the function of the present invention, the present invention will provide a detailed function of both the privacy of the sender H) and the response party 20, which will be described in detail below. 8 1327019 The present invention comprises two main embodiments, hereinafter referred to as the first and second main embodiments. Based on these two main embodiments, the present invention can further extend a number of related embodiments, which are hereinafter referred to as the 1-1, 1-2, 2_1, and 2-2 embodiments. . Figure lb is a flow chart showing the connection of a caller 10 and a responder 20 in accordance with the first main embodiment of the present invention. First, the responder 20 publishes a message (such as information about a product or service) on a webpage, which may be a webpage provided by the respondent 20 itself, or a webpage of the server 30, or any third party provided. Web page. What is important is that this web page has a link to the image or text corresponding to the server 30 and the specific responder 20. When the link is clicked, the clicker will be directed to a web page of the server 30 or send a message to the server 30 (this is referred to as a request to the server 30), and the server 30 is thus enabled. The clicker makes a conversation, and the server 30 can know the clicker's network address and the clicked link from the responder 20 from the parameters or information attached to the request. These are the basic technologies of web pages, so I won't go into details here. Please note that a respondent 20 can post messages on multiple webpages located on different web sites and provide the same link (for example, on the webpage of each auction site about their own products), so a viewer clicks on the link on any webpage. And there can be different viewers at the same time, click on these links on these pages. The viewer who clicks on these links is the sender 30 who wants to contact the respondent 20 corresponding to these links. 1327019 » *. The Talker 10 (the following hypothesis is the la of the la diagram). When browsing this webpage, you want to contact the responder 20 (the following assumes the A of the la diagram) (for example, you want to get the respondent 20) Further information about the product or service), the caller 10 can click on this link to send a request to the server 30 (step 100 in the figure). When the various steps of the present invention are performed below, the server 30 accesses a pre-built set of door numbers 90 and a data set 91. The door number set 90 records one or more temporary door numbers and related information, and the data set 91 records the relevant information of each responder 20 and some system parameters. Further details will be explained below. It is assumed below that the link of the responder 20 is the first click. Next, at step 110 in the figure, the server 30 selects a temporary door number that is currently unused ("idle") from the door number set 90. The server 30 establishes a correspondence between the temporary door number and the responder 20, and gives the correspondence a valid time limit. The effective time limit is the time (T) at that time plus a system parameter ΔΤ of the servo 30 (for example, 24 hours). That is to say, the correspondence is valid until the effective time limit (Τ+ΔΤ). In addition, the temporary door number is no longer used by the server 30 to establish a correspondence with the other responder 20 until the valid time limit (Τ+ΔΤ) arrives. Please note that this effective time limit is likely to be postponed. For example, before the valid 1327019 time limit arrives, another caller 1〇 (for example, B of the first figure) clicks on the same web page or a different web page to link the same responder 20, and the valid response of the server 30 from the responder 20 The relationship can find the temporary door number. The servant 30 will inform the new Talker 10 to contact the responder 20 using the same temporary door number. Assuming that the time at that time is (T+10), after the click of the new party 10, the effective time limit of the correspondence between the temporary door number and the responder 20 becomes the current time (T+10) plus the servo. The system parameter AT of the square 30 becomes (Τ+10+ΔΤ). The server 30 then informs the Talker 10 (e.g., a message window pops up in the browser of the Talker 10), and the Talker 10 dials the temporary door number within the time limit to contact the answering party 20 (Step 120 in the figure) ). Please note that the Talker 10 is informed of the temporary door number, not the true telephone number of the responder 20 (thus protecting the privacy of the responder 20). Next, there may be several situations that may occur: (1) the Talker 10 dials the temporary door number within the valid time limit; (2) - A person who is not the Talker 10 dials the temporary door within the valid time limit No. (maybe because of the wrong number); (3) Anyone (including the Talker 10) dials the temporary number after the valid time limit has expired. The following describes each of these situations. If the utterer 10 dials the temporary door number within the valid time limit, the server 30 will answer the incoming call, thereby establishing a "first session" between the utterer 10 and the server 30 (step 130 in the figure). ). Since the temporary 11 1327019 gate number and the responder 2〇 have a valid correspondence at the time, the server 3 then finds the contact telephone number of the responder 20 from the bedding set 91 (step 140 of the command). The server 30 then informs the Talker 10 in the first conversation that the answering party 20 is currently to be connected, please wait for the Talker. The server 3 then dials the phone number obtained in step 140 to the responder immediately. If the responder 20 is busy or does not answer within a certain time limit, the Lu feed party will inform the caller 1 and try again. Then end the first conversation. If the responder 20 answers, a "second call" is established between the responder 20 and the server 3 (step 15 in the figure). The server 3 will voice the respondent 2 to be willing to talk. If the responder 20 refuses (for example, by pressing a specific button), the server 30 will end the second call and inform the caller 10 to try again later. End the first conversation. If the responder 20 is willing to talk (for example by pressing another specific button), then the server 3 immediately immediately makes its call to the caller 1 (the first call) and its call to the responder 20 ( The second segment of the call is linked so that both parties can make an instant two-way conversation via the server 30 (step 160 in the figure with a broken line). In the case of Lvzhi, the instant two-way communication provided by the present invention is the same as that of the servos, and the two separate calls are connected by the service party. Please note that the incoming call received by the responder 2〇 is not directly sent to the caller 10, so the function of the responder 2〇 helmet display is known to the caller 1ΛPen group...the ancient 10 phone number (so the phone number is Guaranteed the privacy of level t 10). Talk 12 132701.9 If a person who is not the Talker 10 dials the temporary door number within the valid time limit, since the temporary door number and the responder 20 have a valid correspondence at the time, the servo party 30 will answer this. Calling through (because the server 20 has no way to judge whether it is the utterer 10). The server 30 finds the contact telephone number of the responder 20 from the data set 91, and then informs the caller that the caller is currently connected to the answering party 20 and the like in the first conversation. At this point, the caller can find that he has erroneously hang up the phone by typing the wrong number. Please note that the servo side 30 has a periodic check mechanism (for example, using the work schedule of the operating system) to periodically check all correspondences (e.g., once per minute). When the server 30 finds that a certain relationship is valid or has already arrived or exceeded, the corresponding relationship is immediately canceled, and the temporary door number involved in the corresponding relationship can be clicked on the link of any responder 2 0 after the response. It is then used to establish a new correspondence (that is, to make it "idle"). When any person (including the Talker 10) dials the temporary door number after the valid time limit is exceeded, since the temporary door number has no valid correspondence with any responding party 20, the server 30 can answer the caller. After that, inform the caller that the service is currently unavailable, and the possible reasons, etc., and then hang up. As mentioned above, the door number set 90 and the data set 91 are one or more databases or files established by the server 30 in advance. In some embodiments, the door number set 13 1327019 90 and the data set 91 may even be Is placed in the same database or file. This specification distinguishes the two, which is an implementation and the second is for convenience of explanation. The door number set 90 contains all temporary door numbers and the correspondence (if any) for each temporary door number. The correspondence information includes the responder 20 (usually a unique code) corresponding to the temporary door number; and the effective time limit of the correspondence. Therefore, it is possible to determine whether the temporary door number is "idle" from the presence or absence of the corresponding relationship. Data set 91 contains system parameters (e.g., ΔΤ) and information about each responder 20 (e.g., contact telephone number), as further described below. For data set 91, server 30 can provide a management interface to set various information therein. This management interface is usually in the form of a web page for the staff of the server 30 and the responder 20 to modify and maintain at any time. The management interface can also be implemented in other ways, such as using an automatic voice response (IVR), where the responder 20 dials a specific service number and then performs a modification and maintenance via a telephone button. This technique is quite mature. So I won't go into details here. Please note that the door number set 90, the data set 91, and the management interface are all part of the servo side 30. The lb diagram shows the door number set 90 and the data set 91 separately for convenience of explanation. In the foregoing step 110, the servo 30 can select an "idle" temporary gate number from the door number set 90 using a logic or algorithm. There are many possibilities for this logic or algorithm. For example, from all the "idle" temporary door numbers 14 called 701 eve, there is no special limit to randomly select one, or to select "space η, the temporary nickname of the logic or the slogan adopted by the invention for the Hungarian service party 30, etc. The above is the simplest embodiment of the present invention. Other embodiments can be derived from this first main embodiment. Hereinafter, first, in the 1-1st embodiment of the present invention In order to prevent the malicious party from clicking on the link to operate the server 30, the server 30 can check the network address (for example, IP address) from which the clicker is when the caller 10 clicks the link (step 100 above). And if the network address generates a click that exceeds a certain number (also a system parameter) from a certain time period to a certain period of time (also a system parameter), the server 3 will be in the browser of the utterer 10 It is informed that it is currently difficult to provide services and reasons, etc., without providing any temporary door numbers. In the 1-2th embodiment of the present invention, each responder 20 may have more than one contact telephone number in the data set 91. because When the second session is established in step 150, the server 30 can sequentially dial the contact numbers in a certain order. If a contact number is busy or no answer, the server 30 will automatically try the sequence. The next contact phone number, and so on, until the answering party 20 answers, or all the phone numbers have been tried, the server 30 will inform the caller 10 to try again later, and then end the first call. .15 13270 Take
I 例還可以進-步延伸為第1-3實施例如下 數目(另?時::過去一定時段(再-個系统參數;Γ词 笟方20另如外一個系統參數)的發話方10嘗試發話认货 ΓΓ都無法接通(因為忙線、無人接聽、應 拒絕通話) 按恥或是應答方2〇 答方2〇方3G相錢續聽方Η)點擊應〇 供暫用門二 就青知目前歉難提供服務等等,.也4 〜以免繼續造成更多發話方10的gj播_ 這種停權】的h σ + 擾。要解除 人員聯繫,由工t 0和飼服方30的工作 限制。或者/ M解除制答方2G的這種「停權」的 話,這種=經Γ段時間後,因為沒有對應答方2〇發 m 權」狀況會自然解除。 91 發明的第1_4實施例’每—個應答方2G在資料集 至少一以有一個以上「接聽時段」,每個接聽時段可以對應 ^個電話號碼。比如說,例如週一到週五、早上8點 他=晚5點的上班時(接聽時段1)對應電話號碼1 ;但其 週一到週五非上班時間(接聽時段2),則是對應電話 2 JU 。因此在步驟150建立第二段通話時,伺服方30可以 才艮 /,»_ 士 、备時的時間以及應答方20接聽時段的設定,撥打適當 r電話號碼給應答方20。如果發話方1〇是在所有接聽時段 應^時間點擊應答方2〇的連結,伺服方30就會告知目前 =方20無法接聽,請發話方1〇應答方2〇的接聽時段 再試等等。 在二,的各個實施例裡’―個暫用門號代表了—條線路。 也就疋同時間只能有—個發話方1G經由該暫用門號和伺 服方30建立起 〜乐一段通話,也因此同一時間只有一個發話 方1〇此和該門號對應的應答方2G通話。對於比較熱門的 應答方20,發每古1Λ心w ^ ^ w方10在步驟13〇撥打該暫用門號發生忙線 哼暫用尚。因此’於本發明的第1-5實施例裡, 多個撥打同—暫用門二代表旒」。如此同-時間就能有 一段通話。當然,相=發Γ10和舰方30建立起第 多條線_代錢,雜;2G的祕電話應該也是 忙線的機率也才合降低在步驟15G建立第二段通話時, 還有一個第1-6實施例是 暫用門號時,舰方3G^ m提供發話方1〇 供多個暫用門號供發話方;;=供-個暫㈣號’而是提 是分別屬於國内不同固灿選:。比如說’這些暫用門號 發話方啊以依據自己===之電信業者的門號。 哪-個業者,而選擇撥打:=話或行動電話是屬於 ^ 门服方30提供的該業者的暫用門 號。本貝施觸^方切Μ像是健方3〇具有多個門 唬集90’而-:門说集9〇所包含的就是某個固網與行動電 話業者_ 他的細節就與提供單-暫用Π號時一 樣’所述。可以想見的是,本實施例在門號的 需求上要认供早-暫用門號多許多。 以 17 1327019 下討論其他實施例時,本說明書還是以提供單一暫用„ π π號 為例來說明。 由於有些時候,應答方20想要暫時停止接聽來電,因此本 發明的第1_7實施例是在資料集91裡提供一個開關值,供 應答方20透過管理界面設定開關值為「開」或「關」。卷 發話方10點擊應答方20的連結時,伺服方30就會查詢^ 料集91裡該應答方20的開關值’如果為「開」,本發明的 邃作方式和前述各個實施例一樣。但當開關值為「關」時 伺服方30就會告知目前應答方20暫停接聽,請發話方w 稱後再試等等。如果發話方10是在開關值仍為「開」時取 得一暫用門號,而在開關值設為「關」後的有效時限内才 發話給該暫用門號。伺服方30 —樣會接聽這通來電。由於 當時該暫用門號和應答方20有一個有效的對應關係,伺服 方30接著從資料集91.裡找到該應答方20的聯絡電話號碼 與_關值。因為開關值設為「關」,.所以伺服方3〇會在第 一段通話裡告知發話方1〇應答方2〇暫時停止接聽,請發 話方10稍後在試等等。 據前所述’當有Ν個應答方20時,伺服方30最多會需要 Ν個暫用門號(這樣才能每個應答方2〇對應一個暫用門 號)。如果暫用門號數小於Ν,.這樣就有可能發生當發話方 點擊某個應答方20的連結,伺服方3〇在步驟u〇搜尋門 號集90時’找不到空閒的暫用門號,這時伺服方30只好 18 1327019 告知發話方10目前無法提供服務,請發話方10稍後再試。 不過,如果有些應答方20被點擊的頻率很低,而且ΔΤ相 當短時(也就是說,暫用門號被佔用的時間很短),上述暫 用門號用磬的發生機率可能會非常低,所以伺服方30也可 以採用小於N的暫用門號數,以節省門號資源。但是不可 否認的,N愈大,所需的暫用門號就更多。以下的第2主 要實施例就是利用所謂的來電號碼(Caller ID),來節省所 需要的暫用門號。 第lc圖所示係依據本發明第2主要實施例連結一發話方10 與一應答方20之流程示意圖。和前述實施例相同的步驟, 以下只會簡單描述。如圖所示,發話方10 (以下假設是第 la圖的甲)點擊某個應答方20 (以下假設是第la圖的A) 的連結,向伺服方30發出一個請求(圖中的步驟100)。 接下來在圖中的步驟105,伺服方30在發話方10的瀏覽器 裡跳出一値輸入視窗(或是呈現一個輸入的頁面等),要求 發話方10輸入他將來聯絡應答方20時所會採用的電話的 電話號碼(以下稱為「來電號碼」)。在輸入視窗或頁面裡, 伺服方30還可以提醒發話方10將來在撥打電話時,一定 要將來電號碼顯示的功能打開。發話方10完成輸入後,按 下一値確定鍵,將該電話號碼送給伺服方30 (圖中的步驟 115)。 I3?701.9 接下來在圖中的步驟125,伺服方30從門號集9〇中挑選一 個適當的暫用門號(以下會有進一步說明)。伺服方3〇將 該暫用Η號與該來電號碼建立起―個對應關係,並賦予此 對應關係二個參數:一個是該應答方2〇 ; 一個是有效時限 (計算方式和前述實施例相同)。 第Id圖所㈣依據本發明第2主要實施例暫間號與來電 • 號碼之對應關係之示意圖。如圖所示,-個暫用門號可以 與一個以上的來電號碼有對應關係。例如一個發話方 (甲)點擊—鶴答方2G (A)的連結然後提供的是來電 號碼1 ’飼服方30配予的是暫用門號1,並在暫用門號】 和來電號碼1之間建立對應關係,該對應關係並被設定有 參數A和有效時限Tl (如第ld圖所示)。 假設另-個魏方1G (乙)點擊另—個應答方Μ (B)秋 籲後提供的是來錢碼2,健方3G搜尋門義⑽裡所有暫 用門號的對應關係,發現沒有暫用門號和來電號碼2有對 應關係’假制服方3〇重複使用暫用門號丨,並在暫用門 和來電號碼2之間建立對應關係,該對應關係並被設 疋有參數B和有效時限Τ2 (如第le圖所示)。 假設發时Π)⑺也轉另—個應答方2g(b)缺❹ 樣提供的是來電號碼w银方3G搜尋門號集9g 用門號的對應關係,發現暫用門號!和來電號碼仏經^ 20 132701? 對應關係,伺服方30於是另外配予暫用門號2,並在暫用 門號2和來電號碼1之間建立對應關係,該對應關係並被 設定有參數B和效時限T3 (如第If圖所示)。 比較特別的情形是,如果發話方10 (甲)在乃到達前又點 擊同一個應答方20 (A)然後同樣提供的是來電號碼1。如 果依照前述的處理方式,伺服方30搜尋門號集90裡所有 暫用門號的對應關係,發現暫用門號1、2和來電號碼1已. 經有對應關係,伺服方30於是另外配予暫用門號3。這樣 固然是一種處理方式,但是其實伺服方30可以重複使用暫 用門號1,另外配予門號3顯然沒有必要。 所以另外一種處理方式是,伺服方30搜尋門號集90裡所 有暫用門號的對應關係,找出所有和來電號碼1已經有對 應關係的暫用門號,伺服方30接著會檢驗該這些對應關係 的應答方參數,如果發現其應答方參數也是A (例如暫用 門號1的對應關係),伺服方30就會不再配置新門號,但 是根據當時的時間重新配置有效時間(例如從乃調整為 T4),然後告知發話方10在該有效時限T4前使用該門號1。 只有這些對應關係的應答方參數都檢驗過,發現應答方都 不同時,伺服方30才另外配予新門號。在此實施例裡,門 號集90的結構會和前述實施例不同。門號集90裡包含了 一或多個暫用門號,以及每個暫用門號對應的來電號碼、 21 1327019 > ψ 應答方20、以及有效時限。請注意到,伺服方30同樣具有 一個週期性檢查的機制定期的檢查所有暫用門號的對應關 係。當伺服方30發現某個對應關係的有效時限已經到達或 超過時,便會立即取消該對應關係。另外也請注意,第2 主要實施例的暫用門號同一時間可以用來聯絡不同的應答 方20,所以可以大量節省門號。 伺服方30接著告知發話方10 (例如,在發話方10的瀏覽 器中跳出一個訊息視窗),請發話方10在該有效時限内用 該來電號碼的電話撥打該暫用門號來聯絡應答方20 (圖中 的步驟127)。同樣地,發話方10被告知的是該暫用門號, 而非該應答方20真正的電話號碼(因而保護了該應答方20 的隱私)。 接下來,可能有以下幾種情形會發生:(1)發話方10用該 來電號碼的電話在有效時限内撥打該暫用門號;(2)—個不 是發話方10的人(可能是因為撥錯號)、或是發話方10使 用不是該來電號碼的電話、或是發話方10沒有打開來電顯 示的功能在有故時限内撥打該暫用門號;(3)任何人(包含 發話方10)在超過有放時限後撥打該暫用門號。以下就一 一說明這幾種情形。 如果發話方10用該來電號碼的電話在時限内撥打該暫用門 號,伺服方30在鈴響時就會得知來電號碼(這是來電顯示 22 1327019 的功能)。由於當時該來電號碼和該暫用門號有一個有效的 對應關係,伺服方30會接聽這通來電,因而在發話方10 和伺服方30之間建立起一個「第一段通話」(圖中的步驟 130)。伺服方30接著依據該對應關係裡的應答方參數,從 資料集91裡找到該應答方20的聯絡電話號碼(圖中的步 驟140)。伺服方30然後在該第一段通話裡告知發話方10 目前要接通應答方20,請發話方10稍待等等。 伺服方30立即用步驟140取得的電話號碼撥號給應答方 20。如果應答方20是忙線或是一定時限内都沒有接聽,伺 服方30就會告知發話方10稍後再試,然後結束第一段通 話。如果應答方20應答的話,應答方20和伺服方30之間 就會建立起一個「第二段通話」(圖中的步驟150)。伺服方 30會以語音詢問應答方20是否願意通話,如果應答方20 .拒絕(例如藉由按下一個特定鍵),伺服方30就會結束第 二段通話、告知發話方10稍候再試與結束第一段通話。 如果應答方20願意通話(例如藉由按下另一個特定鍵), 接下來伺服方30立即將其對發話方10的通話(第一段通 話)、以及其對應答方20的通話(第二段通話)連結起來, 使得雙方可以經由伺服方30進行即時雙向的通話(圖中用 貫穿的虛線表示的步驟160)。 如果一個不是發話方10的人、或是發話方10使用其他電 23 丄 ν/ϋΐ5 話、或是發話方1G没有打開來電顯示而在有效時限内撥打 胃暫用μ ’ &_服方3G在該暫用門號的所有相關對應 關係中找不到其所取得的來電號碼,舰方3G可以在接聽 胃通來電後告人目前無法提供服務、以及可能的原 因等等,然後掛斷電話。 當任何人(包含發話方10)在超過有效時限後撥打該暫用 • Η號纟於該門就已無和該來電號碼具有有效的對應關 係’飼服方3G樣在接聽該通來電後告知來話人目前無法 提供服務、以及可能的原因等等,然後掛斷電話。 帛2主要實施例切以和像前述的第丨主要實施例一般加 以延伸如下.(每種延伸方式的相關細節請見前文。): ()第2 1實施例.飼服方3〇可以在發話方n點擊連結時 檢查該點擊是來自哪一個網路地址,如果該網路地址若是 籲在從當時到過去一定時段產生超過一定數目的點擊的話, 祠服方30可以拒絕提供服務。 這種作法也延伸為用來電號碼來檢查。伺服方30可以依據 發話方10^供的來電號碼來檢查所有暫用門號的所肴對應 關係,如果涉及該來電號碼的對應關係超過一定數目的 話,伺服方30可以拒絕提供服務(但是已經存在的對應關 係還是保持)。 24 1327019 其實不論是用網路地址或是來電號碼的限制,如果一個來 電號碼在同一時間只能有Μ ( M21 )個有效的對應關係的 話,第2主要實施例與其延伸的實施例最少可以只需要Μ 個暫用門號。 (2) 第2_2實施例:每一個應答方20在資料集91裡可以有 一個以上的聯絡電話號碼。 (3) 第2-3實施例:如果伺服方30從當時到過去一定時蜱 為一定數目的發話方10嘗試發話給某一應答方20都無法 接通的話,伺服方30可以在後續發話方10點擊應答方20 的連結時,就告知目前歉難提供服務等等,也不提供暫用 門號。 (4) 第2-4實施例:每一個應答方20在資料集91裡可以有 一個以上的接聽時段,每個接聽時段可以對應至少一個聯 絡電話號碼。 (5) 第2-5實施例:暫用門號是多條線路的「代表號」。這 種作法對於第2主要實施例與其延伸的實施例尤其必要, 因為一個暫用門號可以用來聯絡多個應答方20,所以該暫 用門號代表的線路愈多,發生忙線的機率就會愈低。 (6) 第2-6實施例:伺服方30不是只提供一個暫用門號, 而是提供多個暫用門號供發話方10選擇。 (7) 第2-7實施例:每一個應答方20在資料集91裡可以有 一個開關值。 25 13^7019 前述的第卜2主要實施例及其延伸的其他實施例還可以有 下列的延伸: (1) 在發話方10與應答方20通話結束時(不論是哪一方先 掛斷),產生一筆通話記錄記錄在資料集91裡。該通話記 錄至少包含該發話方10、發話方10的來電號碼(如果有取 得的話)、應答方20、應答方20的電話號碼、通話之開始 與結束之曰期與時間。請注意到,為了保護發話方10的隱 私,應答方20從管理界面是看不到發話方10的來電號碼。 (2) 每一個應答方20有自己的一個黑名單。對於一些惡意或 常惡作劇的發話方10,應答方20可以選擇將其電話號碼加 入記錄在黑名單裡。 發話方10的電話號碼被加入到黑名單的效果是,在第2主 要實施例步驟115發話方10提供電話號碼給伺服方30時, 伺服方30會和應答方20的黑名單比對,如果該來電號碼 φ 屬於該黑名單,伺服方30不會提供暫用門號,而會以訊息 視窗或頁面告知發話方10歉難提供服務以及理由。 另外在第1主要實施例的步驟130,當發話方10撥打暫用 門號而且如果發話方10有打開來電顯示時,伺服方30可 以將來電號碼和應答方20的黑名單比對,如果該來電號碼 屬於該黑名單,伺服方30會在第一段通話告知發話方10 歉難提供服務以及理由,然後結束第一段通話。 26 1327019 還有一種效果是,發話方10的來電號碼雖然不屬於其目前 所欲聯繫的某一應答方20的黑名單中,但是有列在一定數 目其他應答方20的黑名單的話,伺服方30同樣是如前述 描述的方式會告知發話方10歉難提供服務以及理由。 將電話號碼記錄到黑名單的方式有兩種,一是由應答方20 事後透過管理界面來進行。雖然基於保護發話方10的隱 私,管理界面看不到該筆通話記錄的發話方10來電號碼(但 是伺服方30是知道的),所以只要應答方20指出是哪一通 話記錄,伺服方30還是可以將該發話方10的來電號碼加 入到黑名單裡。 在雙方通話結束後,如果應答方20先掛斷(結束第二段通 話),伺服方30會自動掛斷其和發話方10的第一段通話。 如果是發話方10先掛斷而應答方20留在線上的話,應答 方20可以透過仍保留的第二段通話以按鍵對伺服方30下 達某些指令。所以另外一種加入黑名單的方式是,應答方 20如果從剛才的通話發現對方是沒有誠意、惡作劇的,就 可以設定將剛才結束的通話的發話方10的來電號碼加入到 自己的黑名單裡。 以下本說明書對本發明所適用的網路環境作進一步的說 明。首先,請見第2a圖,發話方10為了能瀏覽網頁、點 擊連結,.必需是一個可以透過電腦、PDA、手機、或是任 27 132701.9 何適當的網路終端設備80,連結到網路40,進行網頁瀏覽 的使用者。本發明對於發話方10所採用的網路終端設備 80、以及和網路40的連結方法(例如透過電話撥接、 ADSL、有線電視系統的cable、或是無線區域網路、或是 行動通訊業者的2.5G或3G的行動數據網路)並不特別設 限。網路40基本上就是公眾網際網路(Internet),但不以 此為限。 伺服方30則包含了一或多台伺服器31、32,透過這些伺服 器以及其他適當的網路連結設備(如路由器)與機制(例 如專線連接到網路40)連結在網路40上以處理發話方10 的點擊連結或提供資料集91的管理界面。本發明同樣對伺 服方30所採用的網路連結設備與機制並不設限。伺服方30 的伺服器除了提供網頁的界面外,還負責連結發話方10和 應答方20進行雙向即時通話。這兩部分的功能可以由位於 同一地的伺服器31、32所提供,伺服器31、32也可以是 分位於二地,例如第2b圖所示的本發明所適用的另一網路 環境中,處理連結的伺服器31是位於一地.,而負責連結發 話方10和應答方20進行語音通話的伺服器32則是位於另 一地,但是伺服器31和32之間必需要能進行雙向的通訊 (例如第2b圖所示的透過網路40)。 在本發明適用的網路環境裡,發話方10和伺服方30之間 除了要能透過網路40連結外,發話方10還必需能夠透過 28 132701.9 電話終端設備7G (有線電話誠行動電話手機)與傳統的 電話網路60,像是公眾交換電話網路ο· sw遍 tdephone netw〇rk,PSTN )或是行動電話網路發話給飼服方 3〇。反之,除非為了透過網頁的管理界面維護資料集… 應答方20未必需要和網路40有連結(如第^圖所示)。 但是词服方30 -定要能透過傳統的電話網路⑼發話給應 答方20的電話終端設備7〇 (如第2a、2b圖所示)。 Φ請注意到,發話方10發話給伺服方3〇、以及祠服方%發 話給應答方20不只限於採用「傳統電話」,也可以是用「網 .=電話」。「傳統電話」包括透過公眾交換電賴路的固接 ^線電話、無線行動電話(包括㈣限於依循·、 I^A、3G、PHS等協定的行動電話)等。「網路電話」則 =稱所有將通話的語音數位化、畴包方式經㈣路傳送 i 從使用者的角度來看,「網路電話」有可能是 • 線的·(透過傳統的乙太網路線)、也可能是無線的(例如 透過Wi-Fi無線區域網路、或是WMax高速廣域無線區域 網路)。 第2c圖所示係本發明所適用之另一網路環境示意圖。如圖 所示,伺服方3〇和發話方1〇是以「網路電話」經由網路 4〇進行通話’伺服方30和應答方20則仍是以「傳統電話」 、、π由傳統電話網路6〇進行通話。在其他實施例裡,也可能 是(1)伺服方30和發話方1〇是以「傳統電話」進行通話, 29 1327019 伺服方30和應答方20則是以「網路電話」進行通話 是(2)伺服方30和發話方10、應答方2〇都是以° ’ •話」進行通話 或 網路電 請注意到’本發明在前述不同的網略環境下運作 一樣的。因此,本說明書前文所稱的「電話號版 ^ 疋 % e %」、「來雷 號碼」都可以視為是一種「識別代碼J,除了包含固接有 電話、無線行動電話的電話號碼外’也可以包含網路電^ 所用的網路位址(例如168.149· 16 32 )、祕々, y埤名(例如 abc@xyz.com)、或是專屬系統(例如Skype®、或是G〇 ^ @The example I can also be extended to the first 1-3 implementation, for example, the next number (other time:: a certain period of time in the past (re-system parameters; Γ 笟 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 I can't connect because of the call (because busy line, no answer, should refuse to call). Shame or answering party 2 〇 方 2 2 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 Qingzhi is currently apologetic to provide services, etc., also 4 ~ so as not to continue to cause more spoofing party 10 gj broadcast _ this stop right] h σ + disturbance. To relieve the contact of the person, the work of the worker t 0 and the feeding party 30 is limited. Or / M cancels the "stop right" of the 2G party, this kind of = after the lapse of time, because there is no right to respond to the responder 2, the situation will be naturally lifted. The first to fourth embodiment of the invention is that each of the responding parties 2G has at least one "reception period" in at least one of the data sets, and each of the answering periods can correspond to ^ telephone numbers. For example, for example, Monday to Friday, 8:00 am = 5 pm (working time 1) corresponds to phone number 1; but Monday to Friday non-working time (receiving time 2), it is corresponding Phone 2 JU. Therefore, when the second conversation is established in step 150, the server 30 can dial the appropriate r telephone number to the answering party 20 by setting the time of the /, the player, the time of the standby, and the answering period of the answering party 20. If the Talker 1 〇 is the link of the responder 2 在 at all the listening time, the server 30 will inform the current = party 20 can not answer, please call the party 1 〇 responder 2 〇 answering period and try again. In each of the two embodiments, a temporary door number represents a line. In other words, only one utterer 1G can establish a call to the servant side via the temporary door number and the servo party 30, and therefore only one utterer at the same time 1 应答 the responder 2G corresponding to the door number call. For the more popular responder 20, send a message every time, and then dial the temporary number to generate a busy line. Therefore, in the 1-5th embodiment of the present invention, a plurality of dialings are the same as the temporary door two. So the same time - there will be a conversation. Of course, phase = hairpin 10 and ship 30 establish the first line _ money, miscellaneous; 2G secret phone should also be busy line probability is also reduced when the second paragraph is established in step 15G, there is a In the 1-6 embodiment, when the door number is temporarily used, the ship 3G^m provides the utterer 1 for a plurality of temporary door numbers for the utterer;; = for the temporary (four) number, but the domestic Different solid choices: For example, these temporary door numbers are used by the telephone number of the carrier who is based on their own ===. Which one of the operators, and choose to dial: = or mobile phone is the temporary number of the operator provided by the door service party 30. Benbe Shi touches the square and cuts the image like Jian Fang 3〇 has multiple thresholds 90' and -: Gate says 9〇 contains a fixed network and mobile phone operators _ his details and offers - The same as when using the apostrophe. It is conceivable that this embodiment needs to recognize the number of early-temporary door numbers in the demand of the door number. When other embodiments are discussed under 17 1327019, the present specification is described by taking a single temporary π π π as an example. Since the responder 20 sometimes wants to temporarily stop answering an incoming call, the first to seventh embodiments of the present invention are A switch value is provided in the data set 91, and the supply respondent 20 sets the switch value to "on" or "off" through the management interface. When the volume utterer 10 clicks on the link of the responder 20, the server 30 will query the switch value of the responder 20 in the material set 91. If it is "on", the mode of the present invention is the same as that of the above embodiments. However, when the switch value is "off", the server 30 will inform the current responder 20 to suspend the call, please call the caller w and try again. If the utterer 10 obtains a temporary door number when the switch value is still "on", and sends the temporary door number within the effective time limit after the switch value is set to "off". The servo party 30 will answer the incoming call. Since the temporary gate number and the responder 20 have a valid correspondence at that time, the server 30 then finds the contact telephone number and the _off value of the responder 20 from the data set 91. Because the switch value is set to "Off", the servo party will inform the caller in the first call. 1 The responder 2 will temporarily stop answering. Please speak the party 10 later and so on. According to the previous description, when there is one responder 20, the server 30 needs at most one temporary door number (so that each responder 2〇 corresponds to a temporary door number). If the number of temporary door numbers is less than Ν, this may occur when the Talker clicks on a link of a responder 20, and the server 3 ' in step u 〇 search for the door number set 90 'Cannot find the idle temporary door No. At this time, the server 30 is only 18 1327019. The sender 10 is currently unable to provide the service. Please call the party 10 and try again later. However, if some respondents 20 are clicked at a low frequency and ΔΤ is relatively short (that is, the temporary gate number is occupied for a short period of time), the probability of occurrence of the above temporary gate number may be very low. Therefore, the servo side 30 can also use the temporary door number less than N to save the door number resource. But it is undeniable that the larger the N, the more temporary doors are needed. The second main embodiment below uses the so-called Caller ID to save the required temporary number. Figure lc is a flow chart showing the connection of a caller 10 and a responder 20 in accordance with a second main embodiment of the present invention. The same steps as the previous embodiment will be briefly described below. As shown in the figure, the utterer 10 (hereinafter assumed to be A of the first figure) clicks on a link of a responder 20 (hereinafter assumed to be A of the first figure), and issues a request to the server 30 (step 100 in the figure). ). Next, in step 105 of the figure, the server 30 jumps out of an input window (or presents an input page, etc.) in the browser of the Talker 10, and asks the Talker 10 to input the future when he contacts the responding party 20. The phone number of the phone used (hereinafter referred to as "caller number"). In the input window or page, the server 30 can also remind the caller 10 that the caller number display function must be turned on when the call is made in the future. After the caller 10 completes the input, press the next OK button to send the phone number to the server 30 (step 115 in the figure). I3? 701.9 Next, at step 125 in the figure, the servo 30 selects an appropriate temporary door number from the door number set 9 (described further below). The server 3 establishes a corresponding relationship between the temporary nickname and the caller number, and assigns two parameters to the correspondence: one is the responder 2〇; one is the valid time limit (the calculation method is the same as the previous embodiment) ). Figure 4 is a schematic diagram showing the correspondence between the temporary number and the incoming call number according to the second main embodiment of the present invention. As shown in the figure, a temporary door number can correspond to more than one caller number. For example, a Talker (A) clicks - the link of the Crane A2G (A) and then provides the caller number 1 'The service party 30 is assigned the temporary door number 1, and the temporary door number】 and the caller number A correspondence relationship is established between 1 and the correspondence relationship is set with the parameter A and the valid time limit T1 (as shown in the ld diagram). Suppose another Wei Fang 1G (B) clicks another answering party Μ (B) Qiu Yu provides the money code 2, and Jian Fang 3G searches for the correspondence between all the temporary door numbers in the door (10) and finds that there is no The temporary door number and the caller number 2 have a corresponding relationship. 'The fake uniform party 3〇 reuses the temporary door number 丨, and establishes a correspondence relationship between the temporary door and the caller number 2, and the corresponding relationship is set with the parameter B. And the effective time limit Τ 2 (as shown in the figure le). Assume that the time is Π) (7) also turn to another - the responder 2g (b) is missing the sample is provided by the caller number w silver side 3G search door number set 9g with the corresponding relationship of the door number, find the temporary door number! Corresponding relationship between the caller number and the caller number ^ 20 132701?, the server 30 is additionally assigned the temporary door number 2, and a correspondence relationship is established between the temporary door number 2 and the caller number 1, and the correspondence relationship is set with parameters. B and the effective time limit T3 (as shown in Figure If). A more special case is if the Talker 10 (A) clicks on the same responder 20 (A) before it arrives and then the caller number 1 is also provided. According to the foregoing processing manner, the server 30 searches for the correspondence relationship of all the temporary door numbers in the door number set 90, and finds that the temporary door numbers 1, 2 and the caller number 1 have been used. The servo side 30 is additionally equipped with the corresponding relationship. Temporary use of door number 3. This is certainly a way of handling, but in fact the servo side 30 can reuse the temporary door number 1, and it is obviously unnecessary to assign the door number 3. Therefore, another processing method is that the server 30 searches for the correspondence relationship of all the temporary door numbers in the door number set 90, and finds all the temporary door numbers that have a corresponding relationship with the caller number 1, and the server 30 then checks the these. If the responder parameter of the corresponding relationship is also A (for example, the correspondence of the temporary door number 1), the server 30 will no longer configure the new door number, but reconfigure the effective time according to the current time (for example From yes to T4), the caller is then informed that the door number 1 is used before the valid time limit T4. Only the responder parameters of these correspondences have been tested. When the responders are found to be different, the server 30 is additionally assigned a new door number. In this embodiment, the structure of the door number set 90 will be different from the previous embodiment. The door number set 90 contains one or more temporary door numbers, and the caller number corresponding to each temporary door number, 21 1327019 > 应答 responder 20, and the effective time limit. Please note that the servo side 30 also has a periodic check mechanism to periodically check the correspondence of all temporary door numbers. When the server 30 finds that the valid time limit of a corresponding relationship has reached or exceeded, the corresponding relationship is immediately cancelled. Also, please note that the temporary door number of the second main embodiment can be used to contact different responders 20 at the same time, so that the door number can be saved in a large amount. The server 30 then informs the Talker 10 (for example, a message window pops up in the browser of the Talker 10), and the Talker 10 dials the temporary door number with the caller's number within the valid time limit to contact the answering party. 20 (step 127 in the figure). Similarly, the Talker 10 is informed of the temporary door number, not the true telephone number of the responder 20 (thus protecting the privacy of the responder 20). Next, there may be several situations that may occur: (1) the caller 10 dials the temporary door number within the valid time limit with the caller's number; (2) a person who is not the caller 10 (probably because Dial the wrong number), or the caller 10 uses the call number that is not the caller number, or the caller 10 does not open the caller ID function to dial the temporary door number within the time limit; (3) Anyone (including the caller) 10) Dial the temporary door number after the release time limit is exceeded. The following is a description of these situations. If the Talker 10 dials the temporary door number within the time limit by the caller's number, the server 30 will know the caller number when the ringer rings (this is the function of the caller ID 22 1327019). Since the caller number and the temporary door number have a valid correspondence relationship at the time, the server 30 will answer the incoming call, thereby establishing a "first session" between the caller 10 and the server 30 (in the figure) Step 130). The server 30 then finds the contact telephone number of the responder 20 from the data set 91 based on the responder parameters in the correspondence (step 140 in the figure). The server 30 then informs the Talker 10 in the first conversation that the answering party 20 is currently to be connected, please wait for the Talker 10 to wait. The server 30 immediately dials the answering party 20 with the telephone number obtained in step 140. If the answering party 20 is busy or does not answer within a certain time limit, the server 30 will inform the caller 10 to try again later and then end the first paragraph of the call. If the responder 20 answers, a "second call" is established between the responder 20 and the server 30 (step 150 in the figure). The server 30 will voicely ask the answering party 20 if it is willing to talk. If the responder 20 rejects (for example, by pressing a specific button), the server 30 will end the second call and inform the caller 10 to try again later. End the first call. If the answering party 20 is willing to talk (e.g., by pressing another specific key), then the server 30 immediately immediately makes its call to the Talker 10 (the first conversation) and its call to the answering party 20 (second The segment calls are linked so that both parties can make an instant two-way conversation via the server 30 (step 160 indicated by a broken line in the figure). If a person who is not the Talker 10, or the Talker 10 uses other power 23 丄ν/ϋΐ5, or the Talker 1G does not open the Caller ID, and dials the stomach within the valid time limit μ ' & _ Service 3G In the relevant correspondence of the temporary door number, the caller number obtained by the temporary door number cannot be found. The ship 3G can sue the current service, the possible reason, etc. after answering the stomach call, and then hang up the phone. . When any person (including the Talker 10) dials the temporary use after the valid time limit is exceeded, the Η 纟 纟 纟 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 ' ' ' ' ' ' ' ' ' The caller is currently unable to provide the service, and the possible reasons, etc., and then hang up. The main embodiment of the 帛 2 is cut and generally extended as follows in the main embodiment of the foregoing. (For details of each extension, see the previous section.): () The 21st embodiment. The feeding side can be When the caller clicks on the link, it checks which network address the click is from. If the network address is more than a certain number of clicks from the time to the past, the service party 30 can refuse to provide the service. This practice also extends to the use of electrical numbers for inspection. The server 30 can check the correspondence relationship of all the temporary door numbers according to the caller number provided by the utterer 10^. If the correspondence relationship involving the caller number exceeds a certain number, the server 30 can refuse to provide the service (but already exists) The correspondence is still maintained). 24 1327019 In fact, whether it is a network address or a caller number restriction, if a caller number can only have Μ (M21) valid correspondences at the same time, the second main embodiment and its extended embodiment can at least only Need a temporary door number. (2) Embodiment 2_2: Each responder 20 may have more than one contact telephone number in the data set 91. (3) Embodiment 2-3: If the server 30 attempts to send a message to a certain responder 20 from time to time when a certain number of utterers 10 are unable to connect, the server 30 can be in the subsequent utterer. 10 When you click on the link of the responder 20, you will be informed that the service is currently apologetic, etc., and the temporary door number is not provided. (4) Embodiment 2-4: Each responder 20 may have more than one answering period in the data set 91, and each of the answering periods may correspond to at least one contact telephone number. (5) Embodiment 2-5: The temporary door number is the "representative number" of a plurality of lines. This practice is especially necessary for the second main embodiment and its extended embodiment, since a temporary door number can be used to contact multiple responders 20, so the more lines represented by the temporary door number, the probability of a busy line occurring. The lower it will be. (6) Embodiment 2-6: The servo side 30 does not provide only one temporary door number, but provides a plurality of temporary door numbers for the utterer 10 to select. (7) Embodiment 2-7: Each responder 20 may have a switch value in the data set 91. 25 13^7019 The foregoing main embodiment of the second embodiment and its extended embodiments may further have the following extensions: (1) at the end of the conversation between the utterer 10 and the responder 20 (regardless of which party hangs first), A call record is recorded in the data set 91. The call record includes at least the caller number of the Talker 10, the Talker 10 (if available), the answering party 20, the telephone number of the answering party 20, and the expiration and time of the start and end of the call. Please note that in order to protect the privacy of the Talker 10, the answering party 20 does not see the caller number of the Talker 10 from the management interface. (2) Each responder 20 has its own blacklist. For some malicious or often mischievous Talkers 10, the responding party 20 may choose to add its telephone number to the blacklist. The effect that the telephone number of the Talker 10 is added to the blacklist is that when the Talker 10 provides the telephone number to the Serving Party 30 in step 115 of the second main embodiment, the Serving Party 30 compares with the blacklist of the Responder 20, if The caller number φ belongs to the blacklist, and the server 30 does not provide the temporary door number, but the message window or page is used to inform the caller 10 that it is difficult to provide the service and the reason. In addition, in step 130 of the first main embodiment, when the utterer 10 dials the temporary door number and if the Talker 10 has the caller ID turned on, the server 30 can compare the caller number with the blacklist of the responder 20, if The caller number belongs to the blacklist, and the server 30 will inform the caller 10 in the first call to provide service and reason, and then end the first call. 26 1327019 Another effect is that although the caller number of the caller 10 does not belong to the blacklist of a certain responder 20 that he currently wants to contact, but there is a blacklist listed in a certain number of other responders 20, the server 30 is also in the manner described above to inform the Talker 10 that it is difficult to provide services and reasons. There are two ways to record a phone number to a blacklist. One is that the responder 20 does this through the management interface afterwards. Although based on the privacy of the protected Talker 10, the management interface does not see the Talker 10 caller number of the call record (but the server 30 is aware), so the sender 30 is still only as long as the answering party 20 indicates which call record. The caller number of the Talker 10 can be added to the blacklist. After the two parties have finished talking, if the answering party 20 hangs up (the second paragraph is terminated), the server 30 automatically hangs up the first conversation with the Talker 10. If the Talker 10 hangs up and the Responder 20 stays online, the Responder 20 can issue certain commands to the Serving Party 30 by pressing the second session that remains. Therefore, another way to add a blacklist is that if the respondent 20 finds that the other party has no sincerity or mischief from the previous call, it can set the caller number of the caller 10 of the just-concluded call to be added to his blacklist. The following description of the present invention further describes the network environment to which the present invention is applicable. First, please see Figure 2a. In order to be able to browse the web and click on the link, the Talker 10 must be connected to the network 40 via a computer, PDA, mobile phone, or any appropriate network terminal device 80. , the user who browses the web. The invention relates to the network terminal device 80 used by the Talker 10 and the connection method with the network 40 (for example, through a telephone dial-up, ADSL, cable television cable, wireless local area network, or mobile communication carrier). The 2.5G or 3G mobile data network is not specifically limited. Network 40 is basically the public Internet (Internet), but not limited to this. The server 30 includes one or more servers 31, 32, which are connected to the network 40 through these servers and other suitable network connection devices (such as routers) and mechanisms (such as dedicated lines connected to the network 40). Process the click link of the Talker 10 or provide the management interface of the data set 91. The present invention also imposes no restrictions on the network connection devices and mechanisms employed by the server 30. In addition to providing the interface of the web page, the server of the server 30 is also responsible for connecting the Talker 10 and the answering party 20 for two-way instant calls. The functions of the two parts can be provided by the servers 31, 32 located at the same place, and the servers 31, 32 can also be located in two places, for example, in another network environment to which the present invention is applied as shown in Fig. 2b. The server 31 that handles the connection is located at one place, and the server 32 responsible for connecting the utterer 10 and the responder 20 to make a voice call is located at another place, but the server 31 and 32 must be bidirectional. Communication (for example, through network 40 as shown in Figure 2b). In the network environment to which the present invention is applicable, in addition to the connection between the Talker 10 and the Serving Party 30, the Talker 10 must be able to pass the 28 13270 1.9 Telephone Terminal Equipment 7G (Wired Telephone Vision Mobile Phone). And the traditional telephone network 60, such as the public exchange telephone network ο· swt tdephone netw〇rk, PSTN) or the mobile phone network to send messages to the feeding party. On the contrary, unless the data set is maintained in order to manage the data through the webpage management interface, the responder 20 does not necessarily need to be connected to the network 40 (as shown in the figure). However, the vocabulary 30 must be able to speak to the telephone terminal 7 of the responding party 20 via the conventional telephone network (9) (as shown in Figures 2a and 2b). Φ Please note that the Talker 10 sends a message to the server 3, and the 祠 方 % 给 给 给 应答 20 20 20 20 20 20 20 20 20 20 20 20 不 不 不 不 不 不 不 不 不 不 不 不 不 不 不 不 不 不 不 不"Traditional telephones" include fixed-line telephones and wireless mobile phones (including (4) limited to follow-up, I^A, 3G, PHS, etc.) through the public. "Internet phone" = all the voices of the call are digitized, and the domain packet mode is transmitted by (4). From the user's point of view, the "network phone" may be • lined (through the traditional Ethernet Network route), or wireless (for example, via Wi-Fi wireless LAN or WMax high-speed wide-area wireless LAN). Figure 2c is a schematic diagram of another network environment to which the present invention is applicable. As shown in the figure, the server 3 and the sender 1 are talking on the Internet via the "network phone". The server 30 and the responder 20 are still "traditional phones", and the π is by the traditional phone. The network 6〇 makes a call. In other embodiments, it is also possible that (1) the server 30 and the sender 1 are talking on a "traditional telephone", and the 29 1327019 server 30 and the answering party 20 are talking on the "network phone" ( 2) The server 30 and the Talker 10 and the responder 2 〇 are both in the 'phone' or the network. Please note that the present invention operates in the different network environment described above. Therefore, the "phone number version ^ 疋 % e %" and "lighting number" as mentioned earlier in this manual can be regarded as an "identification code J, except for the telephone number with the fixed telephone and wireless mobile phone". It can also include the network address used by the network (eg 168.149· 16 32 ), tips, y埤 (eg abc@xyz.com), or a proprietary system (eg Skype®, or G〇^) @
Talk®等)的使用者帳號。而本說明書前文提及「路 6 知話」、「撥 號」、「撥打」時’可以是指「用傳統電話發話」,也可以甘 指「用網路電話發話」等。這些細節其實對於熟習相關 術人士而言都是可以輕易掌握與瞭解的。其實,在數焉; 流(digital convergence)的今天,「傳统電話」與「網=二 話」的界線愈來愈模糊,例如目前我經 實驗配予070開頭的電話號碼,這使得撥打r網路' 和撥打「傳統電話」已經沒有什麼差別了。 §」 藉由以上祕具體實施例之詳述,係希望能更加清楚描述 本發明之特徵與精神,而並非以上述所揭露的較佳且體實 施例來對本發明之範疇加以限制。相反地,其目的^希望 能涵蓋各種改變及具相等性的安排於本發明所欲申=之專 利範圍的範蜂内。 30 132701.9 【圖式簡單說明】 第la圖所示係本發明之一示意圖。 第lb圖所示係依據本發明第1主要實施例連結一發話方與 一應答方之流程示意圖。 第lc圖所示係依據本發明第2主要實施例連結一發話方與 一應答方之流程示意圖。 第Id圖所示係依據本發明第2主要實施例暫用門號與來電 號碼之對應關係之示意圖。 第le圖所示係依據本發明第2主要實施例暫用門號與來電 號碼之對應關係之另一示意圖。 第If圖所示係依據本發明第2主要實施例暫用門號與來電 號碼之對應關係之又一示意圖。 第2a圖所示係本發明所適用之一網路環境示意圖。 第2b圖所示係本發明所適用之另一網路環境示意圖。 第2c圖所示係本發明所適用之又一網路環境示意圖。 【主要元件符號說明】 10 發話方 30 伺服方 40 網路 70 電話終端設備 90 門號集 100-160流程步驟 20 應答方 31,32 伺服器 60 傳統電話網路 80 網路終端設備 91 資料集 A、B、N應答方 31 1327019 曱、乙發話方User account for Talk®, etc.) As mentioned in the previous section of this manual, "Like 6 Knowing", "Dialing" and "Calling" can mean "speaking by traditional telephone" or "speaking by VoIP". These details can be easily grasped and understood by those skilled in the art. In fact, in today's digital convergence, the boundaries between "traditional telephone" and "network = two words" are becoming more and more blurred. For example, I have now experimented with the telephone number at the beginning of 070, which makes dialing the r network. ' There is no difference between making a "traditional call". </ RTI> </ RTI> </ RTI> </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; On the contrary, it is intended to cover various modifications and equivalent arrangements within the scope of the invention. 30 132701.9 [Simple description of the drawings] Figure la is a schematic view of the present invention. Figure lb is a flow chart showing the connection of a caller and a responder in accordance with the first main embodiment of the present invention. Figure lc is a flow chart showing the connection of a caller and a responder in accordance with the second main embodiment of the present invention. Fig. 1D is a diagram showing the correspondence between the temporary door number and the incoming call number in accordance with the second main embodiment of the present invention. Fig. 3 is a view showing another correspondence between the temporary door number and the incoming call number according to the second main embodiment of the present invention. Fig. If Fig. 2 is a schematic view showing the correspondence between the temporary door number and the incoming call number according to the second main embodiment of the present invention. Figure 2a shows a schematic diagram of a network environment to which the present invention is applied. Figure 2b is a schematic diagram of another network environment to which the present invention is applicable. Figure 2c is a schematic diagram of yet another network environment to which the present invention is applicable. [Main component symbol description] 10 Talker 30 Servo 40 Network 70 Telephone terminal device 90 Gate number set 100-160 Process step 20 Responder 31, 32 Server 60 Traditional telephone network 80 Network terminal equipment 91 Data set A , B, N responders 31 1327019 曱, B 话方