WO2016050976A1 - Method, system and computer program product for sending a message to a computer equipment - Google Patents

Method, system and computer program product for sending a message to a computer equipment Download PDF

Info

Publication number
WO2016050976A1
WO2016050976A1 PCT/EP2015/072869 EP2015072869W WO2016050976A1 WO 2016050976 A1 WO2016050976 A1 WO 2016050976A1 EP 2015072869 W EP2015072869 W EP 2015072869W WO 2016050976 A1 WO2016050976 A1 WO 2016050976A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
computer equipment
equipment adapted
packed
manage
Prior art date
Application number
PCT/EP2015/072869
Other languages
English (en)
French (fr)
Inventor
Josep Ramon GOÑI MACIÀ
Carlos FENOLLOSA BIELSA
Original Assignee
Paradoxa Technologies, S.L.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Paradoxa Technologies, S.L. filed Critical Paradoxa Technologies, S.L.
Publication of WO2016050976A1 publication Critical patent/WO2016050976A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/18Commands or executable codes

Definitions

  • the present disclosure refers to a method for sending at least one message to a computer equipment, wherein the computer equipment is adapted to manage the message.
  • the present disclosure further refers to a system and a computer program product suitable to carry out a method for sending at least one message to a computer equipment, wherein the computer equipment is adapted to manage the message.
  • the present disclosure refers to a method for managing at least one message sent from a computer equipment adapted to manage the message. Additionally, the present disclosure refers to a system and a computer program product suitable to carry out the method.
  • the present disclosure relates to a method to receive at least one message sent from computer equipment adapted to manage the message. Additionally, the present disclosure refers to a system and a computer program product suitable to carry out the procedure.
  • the scope of application of the present disclosure is related to the telecommunication systems. More particularly, the scope of application is related to systems for sending messages between telephone systems. BACKGROUND ART
  • a widespread communication system between mobile devices may be the short message service SMS. This service is available on mobile phones. The system allows sending short messages. This system has become one of the most widespread systems due to the ease use, flexibility and relatively low cost compared with a voice call.
  • Some other communication system suitable to perform the communication between mobile devices may be the multimedia messaging system MMS. This communication system allows mobile phones to send and receive multimedia content. The system may also integrate audio, video, and / or pictures.
  • a recently developed communication mechanism is the use of missed calls.
  • One missed call may be defined as a telephone terminal calling another telephone terminal and, intentionally or not, the call is terminated without being answered.
  • the user of a telephone terminal may avoid the cost related to a conventional call or a SMS or MMS. This may be performed simply holding the fee related to the use of the telephone network. The network will not charge additional costs.
  • the known methods suitable to use missed calls in the communication between telephone terminals have different limitations and drawbacks. This way, the implementation of these methods is not completely satisfactory.
  • a problem of the known methods may be that said methods can only broadcast a list of pre-set messages. Thus, these methods are unable to encode data which is not agreed between parts. Therefore, the use of missed calls in order to send a message can be considered a very limitative communication system.
  • This object is achieved by providing a method to send at least one message to a computer equipment adapted to manage the message.
  • the method comprises: obtaining a message to be sent to the computer equipment adapted to manage the message; packing at least the message, wherein the packed message comprises a plurality of symbols; encoding the packed message using a coding table, wherein in the coding table each of the symbols of the packed message corresponds to a telephone number; making a missed call to each of the phone numbers associated with the symbols present in the packed message, wherein information related to each of the missed calls is received by the computer equipment adapted to manage the message
  • a method as previously describes may allow the communication through missed calls in a reliable way while keeping costs down.
  • the method uses the conventional phone structure such that the associated cost may only be the maintenance of the phone service.
  • the method allows to communicate all sort of messages, thus the need to restrict the communication to a predefined number of messages may be avoided.
  • the method may comprise at least compress the message.
  • the method may comprise at least encrypt the message.
  • the method may comprise at least compress the packed message.
  • the method may comprise at least encrypt the packed message.
  • the method may comprise obtaining at least an identifier of the final recipient of the message, wherein packing at least the message may comprise packing the message and the identifier of the final recipient of the message.
  • packing at least the message (m) may comprise packing a package header, a package body and a footer.
  • the identifier of the final recipient of the message may comprise a phone number.
  • the method may comprise packing at least the message using a positional numeral system, wherein a base of the positional numeral system is a number. Moreover, the method may perform a missed call to each of the phone numbers associated with the symbols present in the encoded message. Additionally, the missed called may be performed according to the symbol's order within the encoded message.
  • the method may be run / executed in a computer equipment adapted to send a message.
  • the information regarding each of the missed calls may comprise, for each missed call, at least one of the following parameters: an identifier of the message's sender associated with the computer equipment adapted to send the message; a phone number to which the missed call is made; the start time of the missed call; the duration of the call.
  • the identifier of the message sender identifier may comprise a phone number.
  • the method may comprise: if, after a predetermined time, a confirmation of the reception of the message has not been received by the computer equipment adapted to manage the message, an indicator of failure in sending a message is generated.
  • a computer product program may comprise program instruction.
  • the program instruction may cause the computer equipment adapted to emit the message to execute a process as previously described. The process is able to send at least a message to a computer equipment adapted to manage the message.
  • Said computer program product may be stored in a physical storage media such as recording means, a computer memory, or a read-only memory, or it may be stored in a carrier wave such as electrical or optical.
  • the computer program product may be in the form of source code, object code or an intermediate code between source code and object code e.g. a partially compiled from.
  • the computer program product may also be in any other form suitable to be used in order to implement the procedures described.
  • the carrier may be any entity or device capable of carrying the program. This way, the carrier may comprise a storage medium such as a ROM, for example a CD - ROM, a semiconductor ROM. It may also comprise a magnetic recording medium, for example a floppy disc or a hard disc.
  • the carrier may be a transmissible carrier means such as an electrical or optical signal.
  • the signal may be transmitted via electrical or electrical cable. Additionally, the signal may also be transmitted by radio or some other means
  • the carrier can be formed by said cable or some other device or means.
  • the carrier may be an integrated circuit in which the computer program product is embedded. Said integrated circuit may be adapted to perform or to be used in the implementation of relevant procedures.
  • the described methods can also be implemented using computer systems such as personal computers, servers, computer networks, laptops, tablets or any other programmable device or computer processor. Additionally or alternatively, it can also be used electronic programmable devices e.g. programmable logic controllers (ASICs, FPGAs, PLCs, etc.).
  • ASICs programmable logic controllers
  • FPGAs field-programmable gate arrays
  • PLCs programmable logic controllers
  • a system to send at least one message to a computer equipment adapted to manage the message may comprise: electronic / computer means to obtain the message to be sent to the computer equipment adapted to manage the message; electronic / computing means to pack at least the message, wherein the packed message comprises a plurality of symbols; electronic / computing means to encode the packed message using a coding table, wherein in the coding table each of the symbols of the packed message corresponds to a phone number; electronic / computing means to make a missed call to each of the telephone numbers associated with the symbols present in the packed message, wherein message information regarding each missed call is received by the computer equipment adapted to manage the message.
  • the system could have a purely electronic configuration (for example, the system could be a programmable electronic device e.g. ASIC, an FPGA or a PLC).
  • the system may be a computing device.
  • the computing device may comprise a memory and a processor, wherein the memory is adapted to store a memori of computer program instructions and, wherein the processor is adapted to execute the instructions stored in memory in order to generate the different events and actions for which the system has been programmed.
  • the system could have a hybrid configuration with computer elements and electronic elements in combination.
  • a computer equipment adapted to emit the message may comprise a memory and a processor, wherein the memory stores computer program instructions executable by the processor, wherein the instructions comprise functionalities to execute a procedure to send at least one message to a computer equipment adapted to manage the message, as previously described.
  • the computer equipment adapted to emit the message may be selected from: an equipment comprising a SIM card; a computer system.
  • a method to manage at least one message sent from a computer equipment adapted to emit the message may comprise: receiving information regarding the missed calls made by the computer equipment adapted to emit the message, wherein the information comprises for each missed call, at least the phone number to which the missed call is made; encoding each of the telephone numbers to which the missed call is made using a coding table, wherein the in the coding table each of the telephone numbers corresponds to a symbol of a packed message; unpack the packed message such that at least the message is obtained.
  • the method can comprise at least decompress the packed message.
  • the method may comprise decrypt at least the packed message.
  • the method may also comprise decompress at least the unpacked message.
  • the method may comprise decrypt at least the unpacked message.
  • this method may comprise sending a confirmation indicator of the reception of the message (m) to a computer equipment adapted to emit the message.
  • the method may comprise unpack the packed message using a positional number system based on a number.
  • the information received about each of the missed calls may comprise, for each missed call, at least one of the following parameters: an identifier of the message sender associated with the computer equipment adapted to emit the message; a phone number to which the missed call is made; the start time of the missed call; the duration of the call.
  • the packed message (p) may comprise the message and an identifier of the final recipient of the message, wherein unpacking the packed message (p) such that at least the message (m) is obtained may comprise unpacking the packed message to obtain the message and the identifier of the final recipient of the message.
  • the method may comprise replacing the final recipient's identifier by the identifier of the sender of the message included in the information received about each of the missed calls.
  • the identifier of the final recipient of the message may comprise a phone number associated with a computer equipment adapted to receive the message.
  • the message may be sent to the computer equipment adapted to receive the message m.
  • the step of sending at least the message to the computer equipment adapted to receive the message may comprise: packing the message and the identifier of the sender of the message, wherein the packed message comprises a plurality of symbols; encoding the packed message using a coding table, wherein each of the symbols of the packed message corresponds to a telephone number; making a missed call from each of the phone numbers associated with the symbols present in the packaged message to the phone number comprised in the final recipient of the message, wherein the computer equipment adapted to receive the message receives information about each of these missed calls.
  • the method may comprise compressing at least the message. In other examples, the method may comprise at least encrypting the message.
  • the method may comprise compressing the packed message.
  • the method may comprise encrypting the packed message.
  • the method may comprise: if after a predetermined time a confirmation of the reception of the message has not been received by the computer equipment adapted to receive the message, an indicator of failure in sending the message is generated.
  • a computer program product to manage at least one message sent from a computer equipment adapted to send the message.
  • the computer program product may comprise program instructions configured to cause a computer equipment adapted to manage the message to execute a method to manage at least one message sent from the computer equipment adapted to send the message, as previously commented.
  • a system for managing at least one message (m) sent from a computer equipment adapted to send the message may comprise: electronic / computer means for receiving information regarding missed calls made by the computer equipment adapted to send the message, wherein this information for each missed call comprises, at least the phone number to which the call is made; electronic / computing means for encoding each of the telephone numbers to which calls are made using a coding, wherein in the coding table each of the telephone numbers corresponds to a symbol of a packaged message; electronic / computing means for unpacking the packed message such that the message is obtained.
  • computer equipment adapted to manage the message wherein the computer equipment comprises a memory and a processor is provided.
  • the memory of the computer equipment adapted to manage the message can store computer program instructions executable by the processor, wherein the instructions comprise functionalities to execute a method for managing at least one message sent from a computer equipment adapted to send the message, as previously described.
  • a method for receiving at least one message (m) sent from a computer equipment adapted to manage the message may comprise: receiving information regarding missed calls made by the computer equipment adapted to manage the message, wherein the information comprises for each missed call, at least the telephone number that makes the missed call; encoding each of the phone numbers that makes a missed call using an encoding table in which each of the telephone numbers corresponds to a symbol of the packed message; unpack the packed message such that the message is obtained.
  • the method may comprise decrypting the packed message. According to some examples, the method may comprise decompressing the packed message.
  • the method may comprise decrypting the unpacked message.
  • the method may comprise decompressing the unpacked message.
  • the packed message may comprise the message and an identifier of the message's sender; and unpack the packed message such that the message is obtained may comprise unpack the packed message to get the message and the identifier of the message's sender.
  • a computer program product for receiving at least one message sent from a computer equipment adapted to manage the message.
  • the computer program product may comprise program instructions in order to cause that a computer equipment (the computer equipment may be the computer adapted to receive the message previously described) runs / executes a procedure for receiving at least one message sent from a computer equipment adapted to manage the message, as previously commented.
  • a system for receiving at least one message sent from a computer equipment adapted to manage the message may comprise: electronic / computer means for receiving information regarding missed calls made by the computer equipment adapted to manage the message, wherein the information comprises, for each missed call, at least the telephone number that makes the missed call; electronic / computing means configured to encode each of the phone numbers which make the missed call using a coding table, wherein in the coding table each of the telephone numbers correspond to a symbol of a packaged message; electronic / computing means for unpacking the packed message such that the message is obtained.
  • Everything described with respect to the procedure for receiving at least one message sent from a computer equipment adapted to manage the message applies to this system.
  • a computer equipment adapted to receive the message comprising a memory and a processor
  • the memory can store computer program instructions which may be run by the processor, therein the instructions comprise functionalities to run a procedure for receiving at least one message sent from a computer equipment adapted to manage the message, as previously described. Everything described with respect to the procedure for receiving at least one message sent from a computer equipment adapted to manage the message applies to this computer equipment adapted to receive the message.
  • a system which may comprise a computer equipment adapted to manage the message, a computer equipment adapted to send the message, as previously described, is provided.
  • a computer system comprising a computer equipment adapted to receive the message (m) sent from the computer equipment adapted to manage the message (m) is provided.
  • an alarm system comprises: a computer equipment adapted to manage at least one message, wherein this message is sent by an alarm system and, wherein the alarm system comprises a computer equipment adapted to send the message, wherein the message comprises a secure code.
  • the secure code may be obtained using a symmetric encryption algorithm.
  • the secure code can be obtained using the sequential generation of a list of pseudo-random numbers.
  • the system may comprise alarm systems.
  • Figure 1 shows a computer equipment adapted to manage the message and a computer equipment adapted to send the message according to some examples
  • Figure 2 shows an example of a packed message according to some examples
  • Figure 3 shows an example of a coding table that connect symbols corresponding to the packed message with phone numbers
  • Figure 4 schematically shows an example of a translation table related to the service requested
  • Figure 5 schematically shows a method for sending messages to a computer equipment adapted to manage the message from a computer equipment adapted to send the message according to some examples
  • Figure 6 schematically shows a method for managing messages on a computer equipment adapted to manage the message sent from a computer equipment adapted to send the message according to some examples
  • Figure 7 shows a computer equipment adapted to manage the message and a computer equipment adapted to receive the message according to some examples;
  • Figure 8 schematically shows a method for sending messages from one computer equipment adapted to manage the message to a computer equipment adapted to receive the message according to some examples
  • Figure 9 schematically shows a method for receiving at least one message in a computer adapted to receive the message, wherein the message is sent from one computer equipment adapted to manage the message according to some examples.
  • the system comprises a computer equipment adapted to manage the message 2 e.g. a computer equipment adapted to receive missed calls and a computer equipment adapted to emit the message 1 e.g. a computer equipment adapted to emit missed calls.
  • the computer equipment adapted to emit the message 1 and the computer equipment adapted to manage message 2 can communicate with each other through a communication network such as a telephone network (or Internet in the case of VoIP).
  • a communication network such as a telephone network (or Internet in the case of VoIP).
  • the computer equipment adapted to emit the message 1 is able to send messages to the computer equipment adapted to manage the message 2 using missed calls. This is performed in a reliable way and with reduced cost, i.e. the cost associated to the communication between the computer equipment adapted to emit the message 1 and computer equipment adapted to manage the message 2 can be only the maintenance of the telephone network.
  • the computer equipment adapted to emit the message 1 may be a telephone terminal e.g. a mobile phone.
  • a telephone terminal e.g. a mobile phone.
  • it also could be, for example, a fixed device and / or an IP voice terminal (in this case, the communication network could be Internet).
  • This computer equipment adapted to emit message 1 can include a subscriber identity module, for example a 2G SIM card.
  • This module may allow to securely store the phone number used to identify the user (or indirectly to identify the computer equipment adapted to send the message 1 ) on the network.
  • this configuration allows changing the phone number of one computer to another simply by changing the card.
  • it allows the computer equipment adapted to emit message 1 being compatible to work on different communications networks with different telephone service suppliers.
  • the computer equipment adapted to emit the message 1 may further comprise a data input device e.g. a keyboard configured for the introduction of a message (m) to be sent to the computer adapted to manage the message 2.
  • the message may be in text format.
  • the introduction of text messages can be performed through some other devices e.g. devices configured for text entry via voice recognition.
  • the message (m) may have been previously entered in the computer equipment adapted to emit the message 1 .
  • the message may be automatically entered in the computer equipment adapted to deliver a message 1 e.g. in response to a generated alarm.
  • this computer equipment adapted to emit the message 1 may comprise a memory.
  • a list of identifiers of final recipients of the message is stored.
  • this list can be formed by the user's phonebook of the computer equipment adapted to emit a message 1 .
  • an identifier (RID) of the final recipient of the message (m) may be selected by the user from the phonebook stored in the computer equipment adapted to emit a message 1 .
  • the identifier (RID) of the final receiver of the message comprises the telephone number of the final user.
  • this identifier could be any other type as long as the final recipient of the message is accurately identified.
  • the server system may be formed by a telephone system 2a and a computer system 2b.
  • the telephone system 2a can be a system to manage a plurality of phone numbers, wherein each of the phone numbers may be configured to receive missed calls emitted by the computer equipment adapted to emit the message activity 1 .
  • the telephone system's 2a activity is processed by the computer system 2b. Both systems can be integrated in one device or may physically be two different devices, even arranged in a remote configuration.
  • the telephone system 2a and the computer system 2b can exchange one or more events related to the missed calls received.
  • Each of the events (MCE) related to the missed call can may be formed with one or more fields. The fields may comprise information regarding the missed calls received.
  • This information may, for example, comprise an identifier (SID) of the message (m) sender (s) associated with the computer equipment adapted to send the message 1 , the identifier (RID) of final recipient of the message, the phone number to which the missed call is made, the start time of the missed call, the duration of the missed call, etc.
  • the computer equipment adapted to manage the message 2 can carry out the call set-up and the release of the missed calls, although some other features are possible. For example, said computer equipment can detect when the computer equipment adapted to emit the message 1 wants to communicate with the computer equipment adapted to manage the message 2 and / or interpret the signals that can be sent by the computer equipment adapted to emit the message 1 .
  • Figure 5 schematically shows a method for sending messages to a computer equipment adapted to manage the message 2 from a computer equipment adapted to emit the message 1 according to some examples, taking into account the configuration described in figure 1 .
  • the computer equipment adapted to emit the message 1 may obtain a message (m) to be sent (for example, the user can enter the message via a keyboard located in the computer equipment adapted to send the message) to the computer adapted to manage the message 2.
  • the computer equipment adapted to emit the message 1 may also obtain the identifier (RID) belonging to the final recipient of the message (for example, the user may select the corresponding entry in his phone book using the keyboard itself or some other suitable device, so that the final recipient identifier can be his mobile number).
  • the obtained message (m) may be subsequently compressed. Compression may be performed using data compression algorithms, such as LZW or GNU Zip. Alternatively, the compression may be performed using an encoder dictionary.
  • the encoder dictionary can operate by searching for matches between the characters forming the message (m) and a plurality of characters which may be contained in a table. This way, the plurality of characters can be replaced, thus the number of characters of the message (m) may be minimized.
  • the message (m) or the compressed message (m) may also be encrypted.
  • the encrypted message (m) or the encrypted and compressed message (m) may become unreadable. Thus, it can only be read using a key. Therefore, the security of data transmission (i.e. the packed message) may be increased considerably.
  • the message (m) may be first compressed and then encrypted, although some other alternatives are possible, such as the message (m) may be first encrypted and then compressed, the message (m) can be only encrypted or the message (m) can only be compressed.
  • the method may comprise a second step 202 in which the message (m) can be packed, together with some other information, by the computer equipment adapted to send the message.
  • the packaging can be carried out using a positional number system which is based on a number, for example decimal or hexadecimal.
  • the positional numbering may be a numbering system in which each digit has a value that depends on its relative position.
  • the position is determined by the base, which is the number of digits needed to write any number.
  • it can be carried out the packaging using a hexadecimal system, which its base is the 16.
  • some other positional numeral systems known by the person skilled in the art are possible, for example decimal or octal.
  • Figure 2 shows an example of a possible packed message (p) to be sent to the computer equipment adapted to manage the message 2 from the computer equipment adapted to send the message 1 according to some examples.
  • the message (m) can be packed in a single package but may also be packed in a plurality of different packages. In case to be packed in only one package, this package may be formed with a plurality of fields, for example, a header
  • the body 21 of the package may include the characters of the encoded message (m) according to the selected positional number system.
  • the positional number system is based on a number selected, for example, the hexadecimal system, as previously commented.
  • the package body may have a different structure depending on the data of the header or the package's footer. For example, an identifier field of the demanded service can be included.
  • the package's footer may contain a checksum.
  • the checksum may be a hash function. The main purpose of the hash function may be to detect accidental changes in a data stream in order to protect the integrity of said data stream.
  • the hash function may verify that there is no discrepancy between the values obtained by making an initial check and a final check after transmission. In this way, data can be transmitted with its hash value and the receiver can calculate said value. The value may be compared with the hash value received. If a discrepancy is detected, it is possible to reject the data or request a retransmission.
  • the header 20 may contain, for example, a message identifier of the packed message (p), the length of this message, the receiver's identifier (RID), the requested service and / or an encryption verification bit.
  • the message identifier may be implicit.
  • each part for example the computer equipment adapted to send message 1 or computer equipment adapted to manage message 2, store a list of messages which have been successfully sent. This way, each of the messages sent can be assigned with a sequential identifier. Consequently, any of the two parties, such as the computer equipment adapted to send the message or the computer equipment adapted to manage the message, can access to the message identifier. Therefore, the need to store the message identifier in the own message can be eliminated.
  • the packed message (p) may also include a field (not shown) related to a requested service. This field can be commonly accessed by both the computer equipment adapted to manage the message 2 and the computer equipment adapted to send the message 1 using a translation table.
  • Figure 4 partially and very schematically shows an example of a translation table of a requested service.
  • the first column 400 can show the service code which may be included in the packed message (p).
  • the second column 401 shows the possible interpretation of the service code.
  • the table can be interpreted by the computer equipment adapted to manage the message 2 or by the computer equipment adapted to receive a message 8, to carry out a service or perform an action.
  • the service code "1 " may be interpreted by the computer equipment adapted to manage the message 2 or by the computer equipment adapted to receive a message 8 as "conduct a market assessment"; the service code “2” can be interpreted as “send an email”; the service code “3” can be interpreted as the "text delivery to a recipient”; or service code "4" can be interpreted as "display the contents of a web page”.
  • the packaging can be carried out, as appropriate, on the message (m) or alternatively on the compressed message (m) or the encrypted message (m) or the compressed and encrypted message or the encrypted and compressed message.
  • the packed message (p) can be further compressed.
  • the packed message (p) compression can be carried out using data compression algorithms such as LZW or GNU zip.
  • the compression may be carried out using an encoder dictionary.
  • the encoder dictionary can operate searching for matches between characters forming the encoded message (p) and a plurality of characters which can be contained in a table. Thus, the plurality of characters can be replaced. Consequently, the number of characters of the packed message (p) can be minimized.
  • the packed message (p) or the packed and compressed message (p) can be encrypted.
  • the encrypted and packed message (p) or the compressed, encrypted and packed message (p) can become illegible. Therefore, the message can only be read using a key. Consequently, the information transmission security can be considerable increased.
  • the packed message (p) may be first compressed and then encrypted although some other alternatives are possible.
  • the packed message may be first compressed and then encrypted, the packed message can be only encrypted or the packed message can only be compressed.
  • the packed message (p) may be encoded using a coding table.
  • the structure and the operation of the coding table may be similar to those described in Figure 3.
  • the coding table may comprise a link among symbols 91 corresponding to the packed message (p) and phone numbers 92.
  • the positional number system which is based on a number can be hexadecimal (as previously explained in Figure 2).
  • the hexadecimal system may have the number 16 as a base.
  • This system may have a set of symbols which can be: 0, 1 , 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F. These symbols appear in the first column 91 of the table shown in figure 3.
  • the table column 92 matches with a plurality of telephone numbers (telephone number) configured to receive missed calls. This way, each of the symbols forming the packed message (p) may match with a telephone number and vice versa.
  • the coding table may be updated via Internet and / or some other wired or wireless network communications. In addition, the coding table may be updated using a sending protocol. The protocol will be described later in figures 5 and 6. Alternatively, the coding table can be manually updated.
  • the coding table may be stored in a computer equipment adapted to send the message 1 . However, in some examples, the coding table may be stored in the computer equipment adapted to manage the message 2 and / or the computer equipment adapted to receive the message (as will be described later) and / or an external server.
  • the encoding step represented by block 203 may be performed based on this coding table.
  • the phone number corresponding to each packed message (p) symbol is determined from the computer equipment adapted to manage the message. This is performed using the coding table.
  • the computer equipment adapted to send the message 1 performs a missed call to each of the phone numbers obtained in the encoding of the packed message.
  • these phone numbers are managed by the telephone system 2a present in the computer equipment adapted to manage message 2, that is, the computer that is intended to send the message (m).
  • each of the missed calls is executed according to the symbol's order within the packed message (p) from left to right.
  • some other alternatives are possible, for example, from right to left according to the order of the symbols of the packed message (p).
  • the computer equipment adapted to manage the message 2 i.e. the computer to which the message is sent can properly reconstruct said message.
  • the computer equipment adapted to manage the message (specifically the telephone system 2a) receives the missed calls, it may also receive information relating to said missed calls.
  • the information is managed and / or generated by the computer system 2b. Within the information regarding the missed calls can be found:
  • SID identifier of the message's sender (e.g. his phone number) associated with the computer equipment adapted to send the message 1 ;
  • the "start time of the call” may be the information that allows the computer equipment adapted to manage the message 2 to properly reconstruct the message, as will be described later.
  • the message (m) that the computer equipment adapted to send message 1 (particularly its user) wants to send to the computer equipment adapted to manage the message 2 (particularly its user) may correspond to the word "hello”.
  • This message (“hello") may be packed in the message's body 21 (for example, in hexadecimal), resulting in "68656C6C6F".
  • the footer 22 may correspond to the checksum previously commented, for example E5.
  • the header 20 may comprise the message length, for example 10. It may also comprise the message identifier e.g. 1 and the identifier of the final message recipient (RID) e.g. 3. In this way, the packed message (p) "103168656C6C6FE5" can be obtained, as shown in figure 2.
  • the computer equipment configured to manage the message 2 receives (block 501 ) all the information related to the missed calls, and since it also includes the coding table shown in Figure 3, the computer equipment adapted to manage the message is configured to obtain the symbols associated with each of the phones to which the missed calls have been made. This way, the message can be reconstructed (block 502). At this point it is important to emphasize that is necessary to use the start time of each of the missed calls. Thus, the correct order of the symbols which are part of the packed message (p) may be set.
  • the missed calls reception may be performed until the reception of an end of message signal (EOM).
  • EOM end of message signal
  • the end of message signal (EOM) may be a pre-set number of symbols per message although some other alternatives are possible.
  • the computer equipment adapted to emit the message may call to a specific number associated with the end of message signal.
  • phone numbers record may be obtained, wherein each field of this record may include one or more events related to the missed call (MCE) and / or telephone numbers.
  • MCE missed call
  • This record of phone numbers can be created in the computer equipment adapted to manage the message although some other alternatives are possible, for example, it can be created in the computer equipment adapted to emit the message.
  • the computer equipment adapted to manage the message 2 is able to obtain (block 503) the message (m) using a positional number system that is based on a number, as described in Figure 2. In this way, the computer equipment adapted to manage the message can obtain the message (m). Therefore, the message transmission among the computer equipment adapted to send the message (transmitter 1 ) and the computer equipment adapted to manage the message (receiver 2) can be completed without any extra charge / cost.
  • the packed message (p) may have been compressed or encrypted, or a combination of both. Therefore, before you can obtain the message (m), it may be needed to take the necessary actions in order to overcome the encryption and / or compression.
  • the message (m) may have also been compressed, encrypted, or a combination of both. Therefore, the appropriate action of decompressing and / or decryption may be performed to obtain the message (m).
  • the message (m) may be displayed on a display device located in the computer equipment adapted to manage the message 2, for example a screen.
  • the message (m) can be interpreted by the computer equipment adapted to manage message 2 as a request to perform an associated service.
  • the computer equipment adapted to manage the message may perform the service associated with the message.
  • the computer equipment may buy tickets to a gig or control home electronic services.
  • the computer equipment adapted to manage the message may send information about this service done to the computer equipment adapted to send the message.
  • a system of recognition and confirmation of data transmission may be described. This system may be able to send, from the computer equipment adapted to manage the message, a message of reception's acknowledgment to the computer equipment adapted to send the message.
  • the operation can be described as follows: once the message (m) is located at the computer equipment to manage the message, it may be emitted a confirmation signal to the computer equipment adapted to send the message, for example, the message's checksum present in the package's footer 22.
  • the checksum can be a hash function.
  • the main purpose of the hash function may be to detect accidental changes in a sequence of data to protect the integrity of said data.
  • the hash function may verify that there is no discrepancy between the values obtained by making an initial check and final check after the transmission. In this way, the data may be transmitted with its hash value.
  • the computer equipment adapted to manage the message can calculate this value and can compare it with the hash value received.
  • the computer equipment adapted to manage message data 2 may reject said data.
  • the computer equipment adapted to manage message data 2 may ask for a retransmission. Going back to the example, a user may enter by, for example, a keyboard, the text message "hello" in the computer equipment adapted to send the message e.g. a mobile phone.
  • the message "hello” may be translated into hexadecimal characters. It may correspond to "68656C6C6F".
  • the identifier (RID) of the final receiver of the message (for example by the user phonebook) may be obtained.
  • the footer 22 may correspond to the checksum, for example E5.
  • the header 20 may comprise the identifier (RID) of the final recipient of the message e.g. 3, the message length e.g. 10, and the message ID e.g. 1 . In this way, the packed message (p) "103168656C6C6FE5 can be obtained.
  • Each of the packed message symbols may correspond to a phone number according to the coding table of the figure 3. That is,
  • the computer equipment adapted to send the message may perform a missed call to each telephone number (telephone number).
  • the computer equipment adapted to manage the message that as previously commented in figure 1 is configured to manage said numbers, receives each of the missed calls.
  • the computer equipment adapted to manage the message obtains a list of phone numbers, wherein each of the phone numbers corresponds to a missed call and, wherein the missed call is performed by the computer equipment adapted to send the message 1 .
  • the computer equipment adapted to manage 2 the message encodes the message based on the table shown in Figure 3, each phone number associated with your code, thus the message "103168656C6C6FE5" is obtained.
  • the message "103168656C6C6FE5" may be unpacked and, therefore, the message (m) "hello” is obtained in the computer equipment adapted to manage the message. This message is obtained free of charge.
  • the packed message (p) (more particularly, its header 20) may include the identifier (RID) of the final receiver of the message (m).
  • RID the identifier
  • the identifier may be, for example, a phone number of the ultimate recipient of the message (m).
  • the computer equipment adapted to manage the message 2 is not the final recipient of the message (m)
  • a global communications network 80 e.g. a telephone network or the Internet (for example in the case of VoIP).
  • a global communications network 80 e.g. a telephone network or the Internet (for example in the case of VoIP).
  • the telephone system included in the computer equipment adapted to manage the message 2 may also be configured to emit missed calls from the phone numbers managed by the own computer equipment adapted to manage the message.
  • the coding table can also be used for sending messages (m) from the computer equipment adapted to manage the message 2 to computer equipment adapted to receive the message.
  • the message (m) since the message (m) is in the computer equipment adapted to manage the message, the message (m) can be packed as previously discussed in figure 2, but with the peculiarity of replacing the identifier (RID) of the final receiver of the message (m) by the identifier (SID) of the sender (which has initially been generated from the computer equipment adapted to send the message 1 ). This way, a packed message (p ') may be obtained.
  • the computer equipment adapted to receive the message 8 once the message is unpacked, may know the sender of the message (m).
  • the message (m) may be compressed prior to be packed.
  • the compression may be performed using data compression algorithms such as LZW or GNU zip.
  • the compression may be accomplished using an encoder dictionary.
  • the encoder dictionary can operate searching for matches between characters forming the message (m) and the plurality of characters which can be contained in a table. This way, the plurality of characters can be replaced, thus the number of characters of the message (m) can be minimized.
  • the message (m) or the compressed message (m) may be encrypted.
  • the encrypted message (m) or the compressed and encrypted message (m) can become illegible. Said message can only be read using a key. Therefore, the security of the information transmission may be increased.
  • the message (m) may be first compressed and then encrypted although some other alternatives are possible, for example, the message (m) may be first encrypted and then compressed, the message (m) can only be encrypted or the message (m) can only be compressed.
  • the packed message can be further compressed in the same way as described above for the message (m).
  • the packed message (p) or the packed and compressed message (p) can be also encrypted.
  • the packed message (p ') may be encoded from the coding table of figure 3, so that a telephone number is obtained for each of the packed message symbols
  • the computer equipment adapted to manage the message 2 may cause the phone system 2a to perform missed calls from the telephone numbers managed by said phone system, wherein the telephone numbers correspond to the symbols of the packed message (p ').
  • the missed call may be performed to the telephone number (associated with the computer equipment adapted to receive the message 8) that corresponds to this identifier (RID) of the final receiver of the message (m).
  • the computer equipment adapted to receive the message 8 may be able to unpack the packed message (p ') e.g. as described in Figure 6.
  • the message (m) and the identifier (SID) of the sender (m), wherein the identifier is comprised within the packed message (p ') as discussed above, may be obtained. Therefore, the message (m) sent by the computer equipment adapted to manage the message (which has been previously generated in the computer equipment adapted to send the message 1 ) can be obtained in the computer equipment adapted to receive message 8.
  • the message can be obtained without any associated cost.
  • the text message "hello” corresponding to the message (m) may be in the computer equipment adapted to manage the message.
  • the message “hello” can be translated into hexadecimal, corresponding to the characters "68656C6C6F".
  • the footer 22 of the package may be a checksum, for example E5.
  • the header 20 may comprise the identifier (RID) of final recipient of the message e.g. 3, the message e.g. 10, and the message identifier e.g. 1 . In this way, the packed message ( ⁇ ') "103168656C6C6FE5" can be obtained.
  • Each of the symbols of the packed message may correspond to a phone number according to the coding table of the figure 3.
  • the computer equipment adapted to manage message 2 may perform a missed call to the number associated with the identifier (RID) of the final receiver of the message.
  • the missed call may be performed from each of the phone numbers (telephone number) obtained.
  • the computer equipment adapted to receive the message will have a list of phone numbers, wherein each of the phone numbers corresponds to a missed call performed by the computer equipment adapted to manage the message. Then, the computer equipment adapted to receive the message encodes each phone number, thus the message
  • the message "103168656C6C6FE5" can be then be unpacked and, therefore, the message (m) "hello” (generated by the computer equipment adapted to send the message 1 ) can be obtained in the computer equipment adapted to receive the message.
  • the message is obtained without any associated cost.
  • the computer equipment adapted to manage the message may send a signal of confirmation of the reception of the message to the computer equipment adapted to emit the message.
  • This confirmation signal may be, for example, the message's checksum.
  • the message's checksum may confirm that the message (m) is processed properly in the computer equipment adapted to receive the message.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
PCT/EP2015/072869 2014-10-03 2015-10-02 Method, system and computer program product for sending a message to a computer equipment WO2016050976A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ES201431462 2014-10-03
ESP201431462 2014-10-03

Publications (1)

Publication Number Publication Date
WO2016050976A1 true WO2016050976A1 (en) 2016-04-07

Family

ID=54288774

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2015/072869 WO2016050976A1 (en) 2014-10-03 2015-10-02 Method, system and computer program product for sending a message to a computer equipment

Country Status (1)

Country Link
WO (1) WO2016050976A1 (und)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220158843A1 (en) * 2020-11-13 2022-05-19 Ford Global Technologies, Llc Diagnostic over ip authentication

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002058417A1 (en) * 2001-01-22 2002-07-25 Mobile Telephone Networks (Proprietary) Limited Method and system for sending a message to a recipient
EP2398216A1 (en) * 2009-02-11 2011-12-21 Teleconline Networks, SL Method and system for sending messages over telecommunication networks

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002058417A1 (en) * 2001-01-22 2002-07-25 Mobile Telephone Networks (Proprietary) Limited Method and system for sending a message to a recipient
EP2398216A1 (en) * 2009-02-11 2011-12-21 Teleconline Networks, SL Method and system for sending messages over telecommunication networks

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220158843A1 (en) * 2020-11-13 2022-05-19 Ford Global Technologies, Llc Diagnostic over ip authentication

Similar Documents

Publication Publication Date Title
CN103109509B (zh) 用于使用接受者标识符提供与服务的通信的方法和装置
CN100531108C (zh) 处理编码消息的系统和方法
WO2015158114A1 (zh) 一种智能通讯方法、终端及系统
JP2006505993A5 (und)
US11310727B2 (en) Methods, devices and media for obtaining and for providing access information of wireless access points
CN102638459A (zh) 认证信息传输系统、认证信息传输服务平台及传输方法
WO2017166840A1 (zh) 一种语音加密通信方法、主叫端、被叫端及系统
US20170272407A1 (en) Encrypted communications method and communications terminal, and computer storage medium
CN104202736A (zh) 面向Android系统的移动终端短信端到端加密方法
CN105429753A (zh) 提高VoLTE通信安全性的语音数据方法、系统及移动终端
EP2239973B1 (en) Recording communications
CN105025102A (zh) 一种3d打印模型文件的网络存储调用方法和存储系统
CN103209389A (zh) 短信推送方法、短信推送系统及短信推送云端服务器
CN101841783A (zh) 基于stk业务的短信安全通信方法和系统以及装置
WO2016050976A1 (en) Method, system and computer program product for sending a message to a computer equipment
CN101588237A (zh) 一种基于主动网技术的终端加密通信方法、装置和系统
CN103795524B (zh) 基于3des的动态短信加密、解密方法
CN107343001B (zh) 数据处理方法及装置
CN107154920B (zh) 安全信息的加密方法、解密方法及用以接收安全信息的接收装置
CN105915531B (zh) 一种屏幕解锁方法及终端
CN106878964B (zh) 基于短信信道的鉴权系统和方法
US9154471B2 (en) Method and apparatus for unified encrypted messaging
CN102045709A (zh) 移动终端应用数据的下载方法、系统及移动终端
GB2415574A (en) Authenticating messages in a telecommunication system
CN112637230A (zh) 一种即时通信方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15777914

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 19.07.2017)

122 Ep: pct application non-entry in european phase

Ref document number: 15777914

Country of ref document: EP

Kind code of ref document: A1