Method and system for storage and use of information
The present invention relates to a method and system for storage and use of information, such as personal contact information. At present, a large number of contact possibilities exist for persons to be contacted, such as telephone, mobile phone, facsimile, e-mail, surface mail etc. Usually, every person keeps his own personal address book. Usually, separate address books are used for the various types of communication possibilities. This present method of storing information has a number of disadvantages. The address books are usually static and need to be updated manually. The information for a specific person is usually kept at different places. When the address book is very large, it is easy to make mistakes. When a specific apparatus such as a mobile phone is lost, usually all the information stored in that apparatus is also lost. To have a complete information, it is usually necessary to carry a number of different devices (mobile phone, pda, etc), which requires carrying a lot of weight and expensive equipment. Using different address books, usually means that contact information of a specific person will be entered in multiple locations, which is double redundant work. The different address books, e.g. in the form of memory devices, may not be always available at a specific time and location. Furthermore, synchronisation between different address books is either impossible, complex, or difficult to set up. Even if address books are synchronised, it is always possible that differences between various address books exist or develop, and that it is unclear which address book comprises the most up to date information. Also, a present address book provides a consultation function: a user looks up a telephone number or e-mail address, and then has to key in the telephone number, or open an e-mail program and enter the e-mail address.
Furthermore, the continuously increasing complexity of e.g. mobile telephones or e- mail address books results in more and more actions that need to be performed (key presses) to obtain a desired contact. If a person gives another person a business card with his personal contact information, the person has no further control of the proliferation of that information to third parties .
European patent application EP-A-0 917 332 discloses a method for calling a remote party in a communication network. Frequently, used numbers can be chosen by using an easily rememberable word (mnemonic) associated with the number. The
method described receives a number combination (short number) or a letter combination (easily rememberable word (mnemonic)) and tries to find a corresponding telephone number in a number file or a name file. This provides a more simple access to a local address book, but does not provide a solution to the above mentioned problems relating to use and storage of information.
The present invention seeks to provide a method and system to store information which does not have the above mentioned disadvantages.
According to the present invention, a method for use and storage of information, such as personal contact information, is provided, comprising the steps of making a personal contact file for a user at a centrally accessible location, storing information in the personal contact file, associating a unique contact number with the personal contact file, the unique contact number comprising a first code and a second code, and the information being updateable using the unique contact number, and storing third party information, such as contact information, in the personal contact file, the third party information being accessible using the first code only.
The present method allows to store information in a personal contact file, which is centrally accessible using a number of possible access methods. It is thus no longer needed to store personal contact information in a number of different places and/or devices. This also provides the possibility to continuously have up to date information by accessing and renewing information in the personal contact file, from any location. Also, third party information may be kept up to date at any time (synchronisation).
In an embodiment of the present invention, third party information is stored in the personal contact file after authorisation by the third party, the authorisation comprising the first code and second code of the third party. This allows to include information such as personal contact information of other persons to be included in the personal contact file. Access to that information is then available using the first code only as an associative link. The third party may be required to authorise the addition of its contact information to a user's personal contact file, e.g. by requiring additional authentication schemes. The third party information may be stored in the personal contact file by appending the third party information to the personal contact file, or by including a relational link in the personal contact file. The first alternative has the advantage that is
straightforward and may be implemented easily. The latter alternative has the advantage that less storage space is required.
In a further embodiment, the method comprises the further steps of receiving a first code from a user, accessing the personal contact file associated with the user, matching the first code with the first codes in the personal contact file, providing the information associated with the first code. With this embodiment, the required information is looked up in the personal contact file and provided to the user. When more than one information matches with the first code entered, the user may be presented with a choice option to select one of the matches. The information may in an even further embodiment, comprise at least one type of communication address, and the method comprises the further steps of receiving a selection of a communication type requested (as selected by a user), and establishing a communication link associated with the selected communication type between the user and the third party. In this way, a user of the present method may reach another person in a very easy and cost-effective manner, using only the first code to obtain the communication link with the other user.
The first code may comprise a number representation of a name code which is easy to remember, and in a further embodiment, the name code may comprise e.g. the first three letters of a person's first name and first three letters of that person's last name. The first code may also comprise a plurality of numbers, and may be associated with other complex information other than contact information, such as the text of a brochure, which is recorded on the central database. This allows to send the complex information to a third person by just sending the first code to the third person, or to add the complex information to one's own personal contact file. The second code may comprise a randomly generated number, the random number e.g. comprising 8 digits.
The information, or better personal contact information may comprise one or more of the following types of information: telephone number, mobile telephone number, facsimile number, e-mail address, ICQ-address, physical address. A user trying to contact a third party can specify an identifier indicating which communication channel (or combination thereof) to use.
The information may further comprise attributes associated with the information, such as time windows, sequential preference options for contact, restrictions for access.
In this manner, information may be available only in specified time periods or time windows. Also the information may be ordered by preference, such as a mobile telephone number in the first place, followed by other numbers (fixed work telephone number, fixed home telephone number, e-mail address, etc.) which are available when the higher preferred addresses are not available.
In an advantageous embodiment, the first code may be detected using voice recognition. Especially when the first code comprises a limited number of letters, the voice recognition may be implemented very easily, as the detection only requires a one out of 26 recognition scheme, instead of a sophisticated voice recognition system. In a further aspect, the present invention relates to a system for use and storage of information, such as personal contact information, comprising a network connected to a central server, the central server being connected to a database, the network providing access to the central server, and the central server being arranged for making a personal contact file for a user in the database, storing information in the personal contact file, associating a unique contact number with the personal contact file, the unique contact number comprising a first code and a second code, and the information being updateable using the unique contact number, storing third party information in the personal contact file, the third party information being accessible using the first code only. Furthermore, the central server may be arranged for executing the present method. The present invention will now be explained in further detail using a number of exemplary embodiments, with reference to the accompanying drawings, in which:
Fig. 1 shows a schematic view of the contact number and the associated information according to an embodiment of the present invention; Fig. 2 shows a schematic view of the elements of the system according to an embodiment of the present invention;
Fig. 3 shows a plan view of a postage sticker which may be used in an embodiment of the present invention;
Fig. 4 shows a schematic diagram of a use of the present invention in mobile telephony.
The present invention allows a user to store and retrieve information at any place and at any time, and to update his own information. Information 13 of a person may comprise a large number of different data. In Fig. 1, examples of information 13 are
shown as comprising a telephone number 14, a mobile telephone number 15, a fax number 16, a pager number 17, an e-mail address 18 and a physical (home) address 19. The information 13 may also comprise multiple data of the same type (e.g. home and work telephone number 14, or multiple telephone numbers). The information may also comprise further attributes, e.g. relating to a time window in which a specific part of the contact data 13 is valid. E.g. a user may indicate in his information 13 using attributes, that he can be reached at his telephone number 14 from Monday through Friday from 9.00 hours to 17.00 hours. In an alternative embodiment, the information 13 may comprise preferences, e.g. first a mobile telephone number, then a fixed telephone number at work, then a fixed telephone number at home. The preference sequence may be fixed, or based on historical data. The attributes may also relate to restrictions for access to specific information on the information 13, e.g. providing the possibility to grant access to certain information parts to specified third parties only. The information 13 is associated with a unique contact number 10. The unique contact number 10 comprises a first code 11 and a second code 12. The first code 11 may e.g. be a six number combination, and may in a specific embodiment be formed by a letter combination, represented by numbers (cf. the keypad coding of a telephone, in which alphanumeric key '2' also comprises the letters 'abc'). This way, the first code 11 may be remembered as a mnemonic, e.g. using the first three letters of a first name and the first three letters of a last name. Paul Wentges would then become PAUWEN, which in numbers is associated with the first code '728936'. For the person skilled in the art, it will be clear that other combinations of letters and/or numbers are possible.
The second code 12 may be a randomised number, e.g. comprising 8 digits, generated when the information 13 is firstly generated and stored. The second code 12 may also be (part of) an existing number, such as the user's mobile telephone number. It must be noted that the combination of the first code 11 and second code 12 must form a unique contact number 10. The first code 11 is easily to remember when using e.g. acronyms or translated letters (as described above).The second code 12 may be remembered just as a present telephone number. With this unique contact number and in combination with possible further authentication mechanisms (described below), the user who has registered can access all his personal contact information 13.
Fig. 2 shows a schematic view of a generalised system in which the present invention may be utilised. A network 20 is connected to a central server 21, which in its
turn is connected to a database 22. The network is also accessible for a user by means of various systems. E.g., a user may contact the central server 21 using a mobile telephone 23, via a wireless connection to a base station 24, which is connected (directly or indirectly) to the network 20. Alternatively, a user may access the server 21 using a fixed telephone apparatus 25 by means of a switch 26, which is connected
(directly or indirectly) to the network 20. Also, a user may connect to the central server 21 using a personal computer 27 which is connected to the network 20. For the person skilled in the art, it will be clear that more possibilities exist for a user to make contact with the central server 20. Also, it will be clear that the central server 21 and connected database 22 may be implemented alternatively as a distributed system, i.e. that the physical implementation of the central server 21 and database 22 comprises multiple computers and storage means, which may even be located remote form each other.
Personal contact information 13, as discussed above, may be stored by a user of the present method and system at a central location (the database 22). For this, the user has to contact the central server 21 (using a suitable means as discussed above). To access his personal file with contact information 13, the user has to enter his personal contact number 10. When using the embodiment discussed above, this unique contact number 10 is rather easily to remember. Additionally, the central server 21 may be arranged to perform further authentication, e.g. by requesting a PIN or the like. Also, the user may e.g. be identified and/or authenticated using calling line identification
(when using a telephone). The central server 21 may be arranged to change the personal contact information 13 using suitable means, such as an Intelligent Voice Response system when being contacted via telephone 23, 25, or a graphical user interface when contacted using a personal computer 27. Personal contact information from others (indicated by third party in the following) may be added to the database file of a specific person (associated by the contact number 10). This may be authorised by the third party by giving the complete contact number 10 (first code 11 which may be easy to associate with the third party and the second code 12), and possibly by a further authentication key, indicating that the third party allows the user to add the third party information to the user's personal contact file. When a user contacts the central server 21 and indicates that he wishes to add a third party to his personal file in the database 22, the central server 21 will ask for the contact number 10 of the third party. The central server 21 will then have already
authenticated the user and accessed the associated database file or entry. After checking that the contact number 10 entered corresponds to an existing entry in the database 22, the central server 21 will add the contact information to the user's personal file.
This may be simply achieved by copying the information 13 of the third party and append that information to the file of the user. However, it is advantageous to use a relational link to the entry of the third party in the database 22. This will prevent duplicate information to be present in the database 22, and also allows to simply update information 13 of a person at a single location in the database 22. As a result, information 13 of a specific person will always be up to date for every user of the present method and system. In stead of sending a large number of address change notifications in the usual way, it now suffices to change one's address at a single location only.
The third party information 13 is stored with only the first code 11 of the contact number 10 as an association. This way, it is possible to access the contact information of third parties, as stored in a user's file, by only using the first code 11 which is easily to remember.
For accessing the authorised information on third parties, the user now only has to enter the first code 11 of the contact number. The central server 21 is then arranged to provide the requested contact information of the third party associated with that specific first code 11 , e.g. by matching the first code 11 with the contact information in the personal file of the user in the database 22. The central server 21 may be arranged to already provide a match after only part of the first code 11 is entered, when this partial data of the first code 11 already provides an unambiguous match.
The first code 11 may also comprise a plurality of numbers, and may be associated with other complex information different from contact information, such as the text of a brochure, which is recorded on the central database 22. This allows to send the complex information to a third person by just sending the first code 11 to the third person, or to add the complex information to one's own personal contact file.
The central server 21 may be arranged to provide the requested information as visual data or voice data (e.g. using a digital message such as a SMS for mobile telephones 23, or an Interactive Voice Response system).
The detection of the first code 11 may be implemented in a very simple manner using the alphanumeric keyboard as described above. However, it is also possible to
use a voice recognition scheme to detect the first code. Especially when the first code comprises a limited number of characters (such as the six letter acronym described below), the voice recognition scheme can be implemented very easily, as only a one out of 26 detection is necessary, and not a sophisticated voice recognition scheme (e.g. based on vowel detection).
In a more preferred embodiment, the central server 21 is arranged to provide the selected communication path. When the user e.g. selects to make a telephone call with a third party ('PAUWEN'), the central server 21 looks up the associated telephone number 14 and instructs the base station or switch 24 to set up a call from the originating telephone 23 to the telephone number of 'PAUWEN'. When e.g. e-mail is selected, the central server 21 may send a message to the personal computer 27 comprising the e-mail address 18 of 'PAUWEN' and an instruction to start an e-mail program or to open a new e-mail message comprising the e-mail address 18. As a further alternative it may be possible to leave a voice mail message in someone's e-mail box.
With reference to Fig. 3, a further implementation of the present method is illustrated. In Fig. 3, a sticker 30 is shown comprising two parts of information. On the sticker 30, an identification 32 of the sender of a mail piece is indicated, e.g. using a barcode. Furthermore, an identification 31 of the addressee is present. As indicated in Fig. 3, this may be achieved using the first code 11 of the information of the addressee. A number of columns are printed, corresponding to the keypad letters (nine columns as shown). A number of rows (six rows indicated in Fig. 3, corresponding to the embodiment of the first code 11 described above) are provided with boxes, which can be ticked for selection (one per row). As indicated, it is thus very easy to direct and send mail to an addressee from any location, with any medium, without carrying any device or address book, by shortening the remembered name according to the present invention, in the example shown 'MAAKET'. When the mail service receives the piece of mail, it scans the sticker. The first code 11 is detected, as well as the identification of the sender. The mail service can then contact the central server 21 (or a dedicated server for this purpose) and match the addressee code in the file associated with the sender. Then, the complete mail address may be printed on the mail (to allow normal delivery via mailman) coded in another form to allow further automatic processing of the mail. It will be apparent, that the sticker may also comprise a window in which the
first code 11 is printed, and that the mail service uses character recognition means to detect the addressee. This stick, tick and mail embodiment of the present invention provides the further advantage that a user only has to pay when the letter is posted, a user does not have to buy any more stamps. Furthermore, the status of the mail can be checked, and a confirmation may be generated upon delivery. Also, a reply mail by the addressee can be easily achieved by copying the relevant code. Further advantages include that a receiver can block unwanted mail, and that a user can send his mail from anywhere without carrying an address book, and without having to remember complex contact information. A further embodiment using the present invention is illustrated in Fig. 4. Fig.4 depicts two telecommunication networks 41, 46, in which a first user, located in a first country 40, uses a landline telephone 42 or mobile telephone 43 to contact a second user on mobile telephone 45 in a second country 44. A second user carries a mobile phone 45 which is normally used in the first country 40, which is reachable through roaming arrangements on network 46 in second country 44 via inter network connection 47. At present it is not possible to be reached on a mobile telephone 48 having mobile network 46 as its home network without informing the first user of the telephone number of mobile telephone 48. If a connection is established between mobile telephone 43 and mobile telephone 45, the second user is charged for the roaming fees between networks 41 and 46.
With the present method, these roaming charges could be avoided. The second user would change the mobile phone number in information 13 from the number of the mobile telephone 45 to the number of mobile telephone 48. The first user would dial on mobile telephone 43 or landline 42 in to a server 49, similar to server 21 described above, which is connected to mobile network 41 via PSTN or mobile connection, and provides the first code 11 of the unique contact number 10. Server 49 would route the call using least-cost routing method via low-cost PSTN connection 51 or leased line to mobile telephone 48 via gateway 50, which is connected to mobile network 46 via PSTN or mobile connection. For the person skilled in the art, it will be clear that it is also possible to make calls from mobile telephone 48 to national and international numbers, providing further opportunities for least-cost routing.
A further possible application is a 'road to target' embodiment. By implementing the present method in a navigation system, the road to someone's location (e.g. home or
work address) can be easily obtained by entering the name code 11. One's own location may be already available from the navigation system. Alternatively, one's own location may be obtained by localising one's mobile telephone and the desired route may be obtained from a mobile service. The above described embodiments of the present invention are only for illustrative purposes. For the person skilled in the art it will be clear that numerous modifications and amendments are possible within the scope of this invention, which is defined in the appended claims.