The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Nov. 21, 2006
Filed:
Jan. 17, 2002
Neil Marley, Winchester, GB;
Charlie William Debney, Kintbury, GB;
Neil Marley, Winchester, GB;
Charlie William Debney, Kintbury, GB;
Vodafone Group PLC., Berkshire, GB;
Abstract
Application service providers (ASP, ASP. . . ) are linked to a mobile telecommunications network (N), such as a cellular telecommunications network, for providing services such as information-providing services to users (MS, MS, MS. . . ) in the network. For example, one service provider (ASP) may, on request from a user, provide the address of or directions to the user's nearest pizza outlet. The user's request is intercepted by the network which generates a 'user tag' identifying the user, the service provider to whom the request is directed, and the time and date of the request. The network stores the information in the user tag, encodes it and transmits it to the service provider in a form from which the service provider is unable to access the user or obtain the user's identity. The service provider then requests the current location of the user from the network using the user tag to identify the user to the network. The network transmits the user's location to the service provider in association with the user tag and the service provider responds by transmitting back to the network the information required by the user (the address of or directions to the user's nearest pizza outlet), again in association with the user tag. The network passes the information to the user. Finally, the service provider requests the network to levy a charge against the user, again using the user tag so that the network can identify the particular user. In this way, information identifying the user is never provided to the service provider who cannot therefore directly access the user either during the session or subsequently. The user tag may have a predetermined short lifetime to provide further security.