WO2008139495A2 - Participant caché à des communications en temps réel - Google Patents
Participant caché à des communications en temps réel Download PDFInfo
- Publication number
- WO2008139495A2 WO2008139495A2 PCT/IN2008/000298 IN2008000298W WO2008139495A2 WO 2008139495 A2 WO2008139495 A2 WO 2008139495A2 IN 2008000298 W IN2008000298 W IN 2008000298W WO 2008139495 A2 WO2008139495 A2 WO 2008139495A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- hidden
- participant
- participants
- conference
- natural
- Prior art date
Links
- 238000004891 communication Methods 0.000 title description 17
- 238000000034 method Methods 0.000 claims abstract description 64
- 230000008569 process Effects 0.000 description 13
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000008570 general process Effects 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- OKTJSMMVPCPJKN-UHFFFAOYSA-N Carbon Chemical compound [C] OKTJSMMVPCPJKN-UHFFFAOYSA-N 0.000 description 2
- 241000282414 Homo sapiens Species 0.000 description 2
- 229910052799 carbon Inorganic materials 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
- H04L12/1822—Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission
Definitions
- the embodiments herein generally relate to hidden participant in real-time communications and more particularly to invisible participant who can witness and participate in a real-time text or audio based conference to a limited extent.
- Communication may take place between units of very different size and complexity. It may occur between and within individuals, group, organizations, social classes, nations, countries and regions of the world. Communication is thus the basic phenomenon to all human beings.
- Email may be information conveyed from one person to another, or it may be part of a discussion group mailing list where individuals signup and subsequently exchange email with all subscribers.
- chat in the field of internet refers to real time communication between two or more people.
- the voice chat allows two people to speak to each other using the internet, as with a normal telephone call.
- text chat one can either use a specially designed program, such as Microsoft® messenger to interact with a person or a group of people in other locations, or one can join a web-based chat dedicated to the community.
- Chat differs from e-mail and other electronic communication modalities it provides an opportunity for online conversation to take place in real time.
- chat conversations take the form of text rather than audio, a chat session shares many features with a telephonic conference call. In both scenarios, several people from different locations participate in a conversation at the same time. Both allow people to join or leave the session as needed.
- a chat or conference software enables people to hold a live discussion by sending each other short written messages. Chat software normally enables public and/or private conversations to take place and, depending on the software, these may be individuals or group.
- conference is used for a conversation involving more than two people or parties.
- a conference can be a text only conversation like the computer or mobile phone based chat applications, voice conferences which are through telephonic or Voice Over IP (VOIP) using software or video conferencing.
- VOIP Voice Over IP
- Such conferencing methods can be called real-time communications, as they are instantaneous and happen in real-time.
- all the participants share the information which is exchanged among other participants.
- Some conferences allow one of the participants to have extra rights to govern the conference by allowing a participant to join or block from joining or dropping from the conference. But, all the joined participants share the same information which is offered by any other participant. For example, if there are five participants in a text conference and one of them posts a text message, it is seen by all the five participants. In a similar voice conference, if one speaks, it is heard by all the others.
- US Patent application 20060172727 talks about a method of providing one-to- one call during conference call in a mobile terminal.
- the method allows for two participants to set up a one-to-one call between them, without disconnecting from the conference call and the other participants being aware of the call being held.
- the other participants are aware of the presence of the participants, who are holding the one-to-one call.
- US Patent 7058682 "Instant Messaging Blind Join” talks about a method of inviting a participant anonymously to participate in an instant messaging session.
- the participant's identity is not revealed and can post actively to the session.
- the posts by the anonymous participant can be seen by all the participants in the session.
- a method is developed to provide hidden participant facility in text based conferencing system using instant messenger.
- the method comprising: of sending invitations to participants corresponding to natural and hidden participants and validating the rights of natural and hidden participants to participate in a conference.
- the comments of the all natural participants are viewed by everyone including hidden participants.
- the comments of the hidden participant can only seen by the natural participant who had invited the hidden participant in the conference.
- the natural participant can only invite the hidden participant and natural participant can invite plurality of hidden participants.
- Once hidden participant accepts the invitation he can see complete text based communications and further interact with the natural participant who had sent the participation request. Participation of the hidden participant in the conference can be terminated by the natural participant who had sent the invitation to the hidden participant.
- the hidden participant can also leave the conference at any point of time.
- the participation of the hidden participant in the conference is terminated as soon as the natural participant, who had sent invitation to the hidden participant, leaves the conference.
- a natural participant invites more than one hidden participant he can authorize the hidden participants to communicate with each other.
- the natural participant can make himself invisible to become hidden participant and remain in the conference.
- the hidden participant associated with natural participant continues to be the part of conference. The entire natural and hidden participants quit the conference automatically once the conference is complete.
- the invention provides a method of inviting a hidden participant to an audio conference by using passcodes; which are assigned to each participant and stored in the conference bridge server; to validate the participants and to validate the participants' rights to participate as hidden.
- the invitation to the hidden participant may be extended by the moderator or by any participant in the conference.
- the data sent by the hidden participant is routed only to the moderator or participant who sent the invitation to the hidden participant. Only the moderator or conference participant, who sent the invitation to the hidden participant for the conference, can interact with the hidden participant. In the hidden mode, the hidden participant can witness the entire happenings of the conference but his inputs will be visible only to the inviting participant.
- FIG. 1 shows the diagrammatic representation of the conference system and the various elements constituting the system.
- FIG. 2 shows a general flow diagram of the conferencing process.
- FIG. 3 shows participation and interaction of hidden participant an instant messaging conference.
- FIG. 4 shows a typical audio conferencing bridge server and participants associated.
- FIG. 5 shows the general process for adding a participant to an audio conference.
- FIG. 6 shows the process of how a participant can join the audio conference in the hidden mode.
- FIG. 7 shows how a normal participant of the conference can invite a hidden participant to the audio conference.
- the embodiments introduce the method of inviting and involving a hidden participant in a text based or audio based conference.
- FIG. 1 shows the diagrammatic representation of instant messenger based conferencing system and the various elements constituting the system.
- members (natural participants) of the conference (102) are A, B, C, D (104) and E (106).
- Hidden participant is X (108), who has been invited to the conference by natural participant E (106).
- Participant X (104) is an audience to the conference, but can interact only with E (103), his inviter.
- Natural participant can invite plurality of hidden participants. When more than one hidden participants are invited by any natural participant, hidden participants can not interact or view comments of other hidden participants without authorization of natural participant (inviter).
- a hidden participant can be authorized to be heard by other hidden participants by the same inviter. The inviter can also authorize the hidden participant to be heard by one or more natural participants.
- FIG. 2 shows the process flow of the method.
- Various natural participants A, B, C, D, E join the conference to initiate a real-time conference (202). Every natural participant is aware of the presence of all other natural participants in the conference and can interact with each of them in the conference.
- Participant E sends a conference invitation to a hidden participant X (204).
- Hidden participant X accepts the invitation and joins the conference (206).
- X can witness the conference, but is invisible to the rest of the participants.
- the conference is carried out normally where all participants can interact with each other, without being aware of the presence of X.
- Hidden Participant X can interact only with E (208) who is inviter of hidden participant X.
- Hidden participant X can terminate his participation in the conference by quitting the conference or the participation can be terminated by E (210). The conference continues or terminates in accord to the will of the rest of the members who are participating in it (212). Incase of termination of conference all the participant including hidden participants are terminated from the conference automatically.
- This process can be implemented on any medium of real-time communication like phone, text chats, voice chats, video conferencing, tele-conferencing, text based conferencing, etc.
- FIG. 3 shows participation and interaction of hidden participant in instant messaging conference.
- the natural participants who are online on the instant messaging software, set up a conference among themselves (302).
- a moderator may be appointed to regulate the conference.
- This invite can be sent out by either the moderator of the conference or by any of the participants in the conference.
- the recipient of the invite who is the hidden participant, accepts the invitation and joins in the conference (306). All other natural participants are unaware of presence of hidden participant in the conference.
- Hidden participant can see the comments and discussion in the conference.
- data is received from a participant (308), the details of the participant are checked (310) to see if the participant is a hidden participant or a normal participant.
- the participant permission details are collected (312). The permission details are checked to see which natural participants are authorized to receive the data from the hidden participant. The data is then sent to the natural participants authorized to receive the data (314). If the data is from a natural participant, then the data is broadcast the conference where all the participants can see the data (316).
- a hidden participant can be used for specific purposes like a real time consultation of experts who need not be active participants or exposed to the others in the conference. The experts who participate as hidden participants may offer real time information and consultancy depending on the progress of the conference and this information will reach only the relevant party.
- the embodiments also provide a facility to natural participant on the conference to become invisible and remain in the conference as hidden participant. In this case, the hidden participant associated with the natural participant, continue to be part of conference in the hidden mode. Other natural members of the conference would be unaware of the hidden participant including the natural participant who has become invisible in the conference.
- a voice conference call is carried out by using telephones, can be cellular or land based phone.
- FIG. 4 shows a regular conference call using a Private Branch Exchange (PBX) (402) connected to multiple members (natural participants) along with a conference bridge.
- PBX Private Branch Exchange
- the conference bridge (404) is essentially a server that bridges multiple incoming calls and acts as conference controller. It creates real time data transfer of all communications to all participating parties. Software plays a huge role in the bridge's capabilities beyond simply connecting multiple callers. Multiple callers can call on a single PBX through a conference bridge.
- the various participating members in the conference 406, 408, 410, and 412 maybe using a cellular phone, a land phone or a computer through which they can dial and connect to the conference.
- the natural participants can hear others on their phones, but the hidden participant has different rights. He is allowed to witness the presence and happenings of the entire conference but he is audible only to the inviting participant.
- FIG. 5 shows the general process for adding a participant to an audio conference.
- Participant who aims to participate in the conference initiates the process by dialing a designated number, provided to him by the conference moderator (502). By dialing this number, the participant is connected to the bridge server.
- the bridge server further attempts to authenticate the natural participant by requesting for the passcode (504).
- the participant dials in the passcode (506) and the bridge server verifies the passcode (508). If the passcode is authenticated, then the participant is allowed to join the conference (510). If the passcode is not authenticated, then the bridge server checks if the maximum number of tries for entering the correct passcode has been completed (512). If yes, then the bridge server terminates the connection. If no, then the bridge server requests for the passcode once again i.e. the bridge server jumps to step (504). The process repeats itself till the participant has entered the correct passcode or the maximum number of tries have been attempted.
- the server has to authenticate a participant and validate his rights to participate as hidden.
- a method of introducing a new participant is that the moderator or administrator decides whether a participant can be allowed to join in as a hidden participant.
- the bridge server administrator or moderator of a conference registers one or more passcodes with the server and issues passcode to one or more specific personnel who can use the new pass code to join as hidden participants.
- FIG. 6 shows the process of adding a participant to the audio conference, with the bridge server having the ability to check if the participant is a hidden participant or a natural participant and assigning the necessary permissions to the participants.
- Step (602) shows how a participant who aims to participate in the conference initiates the process by dialing a designated number, provided to him by the conference moderator. By dialing this number, the person is connected to the bridge server.
- the bridge server attempts to authenticate the participant by requesting for the passcode. The participant dials in the passcode (606) and the bridge server verifies the passcode (608). If the passcode is not authenticated, then the bridge server checks if the maximum number of tries for entering the correct passcode has been completed (610).
- the bridge server terminates the connection. If no, then the bridge server requests for the passcode once again i.e. the bridge server jumps to step (604). The process repeats itself till the participant has entered the correct passcode or the maximum number of tries have been attempted. If the passcode has been authenticated, then the bridge server checks the passcode against the list of passcodes assigned to hidden participants (612). If the passcode matches an entry for passcodes assigned to hidden participants, then the participant is added as a hidden participant along with the necessary permissions and details (614). If the passcode does not match the passcodes assigned to hidden participants, then the participant is added as a natural participant (616) and the other participants in the conference are intimated that a new participant has joined the conference (618).
- Another alternate method of adding a hidden participant is by natural participant who can decide to invite another participant to join as a hidden participant.
- a participant is allowed to register with the bridge server to request for a hidden participant passcode and obtains the passcode.
- two separate passcodes may be issued for the inviter participant and the hidden participant to be identified as links. This helps at the time of exit from conference so that the server exits the hidden participant when the natural participant who invited the hidden participant exits.
- FIG. 7 shows the general process for adding a participant to an audio conference.
- Step (702) shows how a participant who aims to participate in the conference initiates the process by dialing a designated number, provided to him by the conference moderator. By dialing this number, the participant is connected to the bridge server.
- the bridge server attempts to authenticate the participant by requesting for the passcode. The participant dials in the passcode (706) and the bridge server verifies the passcode (708). If the passcode is authenticated, then the participant is allowed to join the conference (710). If the passcode is not authenticated, then the bridge server checks if the maximum number of tries for entering the correct passcode has been completed (712). If yes, then the bridge server terminates the connection.
- the bridge server requests for the passcode once again i.e. the bridge server jumps to step (704). The process repeats itself till the participant has entered the correct passcode or the maximum number of tries have been attempted.
- a participant joins the conference he can add plurality of hidden participant.
- the participant should register with the bridge server to request for a hidden participant code (714).
- Two separate passcodes are issued (716); one for the inviter participant and the second one for the hidden participant. Two passcodes are issued to maintain a link between the invitee participant (natural participant) and the hidden participant; so that when the inviter participant (natural participant) exits the conference, the hidden participant is also exited from the conference by the bridge server.
- the hidden participant who aims to participate in the conference initiates the process by dialing a designated number (718), provided to him by the inviter participant (natural participant). By dialing this number, the hidden participant is connected to the bridge server.
- the bridge server attempts to authenticate the hidden participant by requesting for the passcode.
- the hidden participant dials in the passcode (722) and the bridge server verifies the passcode (724). If the passcode is not authenticated, then the bridge server checks if the maximum number of tries for entering the correct passcode has been completed (726). If yes, then the bridge server terminates the connection. If no, then the bridge server requests for the passcode once again i.e. the bridge server jumps to step (720).
- the process repeats itself till the hidden participant has entered the correct passcode or the maximum number of tries have been attempted. If the passcode has been authenticated, then the hidden participant is allowed to join the conference and given the necessary permissions (728). When the inviter participant exits the conference (730), the server automatically exits the hidden participant (732).
- conferencing server is configured to function. Some do not allow the conference to begin or continue without the participation of the moderator. In such cases, the hidden participants are put on hold or exited from conference exactly as the other normal participants. Some servers allow other participants to continue the conference even when the moderator has not joined in. In such cases, the hidden participant is a part of the conference until the inviting party who invites the hidden participant is also a part of the conference. The hidden participant like natural participants can choose to exit the conference anytime by closing their connection/call.
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
L'invention porte sur une méthode d'invitation et de participation d'un participant caché à une conférence textuelle ou audio. Les participants à la conférence peuvent inviter le participant caché en lui envoyant une invitation. Une fois que le participant caché accepte l'invitation et rejoint la conférence, il peut être témoin du déroulement entier de la conférence, mais ses interventions ne sont visibles/audibles que pour le participant ayant fait l'invitation. Un participant à la conférence peut également inviter plusieurs participants cachés et les autoriser à communiquer entre eux. Le participant ayant fait l'invitation peut se rendre lui-même invisible et devenir un participant caché tout en restant dans la conférence alors que le participant caché associé continue à faire partie de la conférence. La participation du participant caché à la conférence peut être interrompue par le participant caché lui-même ou par le participant l'ayant invité.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN1010/CHE/2007 | 2007-05-14 | ||
IN1010CH2007 | 2007-05-14 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2008139495A2 true WO2008139495A2 (fr) | 2008-11-20 |
WO2008139495A3 WO2008139495A3 (fr) | 2009-11-26 |
Family
ID=40002740
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IN2008/000298 WO2008139495A2 (fr) | 2007-05-14 | 2008-05-13 | Participant caché à des communications en temps réel |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2008139495A2 (fr) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9912618B2 (en) | 2015-03-10 | 2018-03-06 | International Business Machines Corporation | Allow hidden and silent observers in a group conversation |
US10205974B1 (en) | 2018-01-12 | 2019-02-12 | Ringcentral, Inc. | Systems and methods for providing shared memory pointers to a persistent video stream for use in a video communications session |
CN112383517A (zh) * | 2020-10-30 | 2021-02-19 | 杭州安恒信息安全技术有限公司 | 网络连接信息的隐藏方法、装置、设备和可读存储介质 |
US12381919B1 (en) | 2024-01-30 | 2025-08-05 | Microsoft Technology Licensing, Llc | Communication session join modes and auto join |
EP4427452A4 (fr) * | 2021-11-05 | 2025-09-03 | Get A Head Inc | Appareils et procédés de télésurveillance de fournisseurs de services de conseil ou de services médicaux |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2368224B (en) * | 2000-10-17 | 2004-08-25 | Hewlett Packard Co | Content provider entity for communication session |
US6882717B2 (en) * | 2001-06-25 | 2005-04-19 | International Business Machines Corporation | Undetected provision of auxiliary services during a telephone conversation |
US7337213B2 (en) * | 2003-06-19 | 2008-02-26 | International Business Machines Corporation | Method and apparatus for managing messages in a messaging session |
-
2008
- 2008-05-13 WO PCT/IN2008/000298 patent/WO2008139495A2/fr active Application Filing
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9912618B2 (en) | 2015-03-10 | 2018-03-06 | International Business Machines Corporation | Allow hidden and silent observers in a group conversation |
US9948581B2 (en) | 2015-03-10 | 2018-04-17 | International Business Machines Corporation | Allow hidden and silent observers in a group conversation |
US10205974B1 (en) | 2018-01-12 | 2019-02-12 | Ringcentral, Inc. | Systems and methods for providing shared memory pointers to a persistent video stream for use in a video communications session |
US10631021B2 (en) | 2018-01-12 | 2020-04-21 | Ringcentral, Inc. | Systems and methods for enabling a persistent stream for use in a communications session |
CN112383517A (zh) * | 2020-10-30 | 2021-02-19 | 杭州安恒信息安全技术有限公司 | 网络连接信息的隐藏方法、装置、设备和可读存储介质 |
EP4427452A4 (fr) * | 2021-11-05 | 2025-09-03 | Get A Head Inc | Appareils et procédés de télésurveillance de fournisseurs de services de conseil ou de services médicaux |
US12381919B1 (en) | 2024-01-30 | 2025-08-05 | Microsoft Technology Licensing, Llc | Communication session join modes and auto join |
WO2025165495A1 (fr) * | 2024-01-30 | 2025-08-07 | Microsoft Technology Licensing, Llc | Modes de ralliement à des sessions de communication et ralliement automatique |
Also Published As
Publication number | Publication date |
---|---|
WO2008139495A3 (fr) | 2009-11-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103493465B (zh) | 授权用户参与通过通信网络执行的会议 | |
KR101453896B1 (ko) | 호출 회의 서비스들을 제공하기 위한 방법들 및 장치 | |
US8249571B2 (en) | Method and system for mobile call conferencing | |
TWI419543B (zh) | 啟動一會議呼叫之系統及方法 | |
CN103475499B (zh) | 一种基于网络电话会议的语音对讲方法及系统 | |
US20020122391A1 (en) | Method and system for providing audio conferencing services to users of on-line text messaging services | |
US9729336B2 (en) | System and method for delayed phone conferencing | |
US8175243B2 (en) | Systems and methods for facilitating teleconferencing without pre-reservation of conference resources | |
US20070218885A1 (en) | Method and apparatus for remote generation of a conference call using SMS or email messages | |
US9596230B2 (en) | Conferencing intelligence engine in a collaboration conferencing system | |
US20120170726A1 (en) | Media Link | |
US20030158900A1 (en) | Method of and apparatus for teleconferencing | |
US10942992B2 (en) | Identification token in a collaboration conferencing system | |
US10630843B1 (en) | Dialing into a meeting without entering information | |
US10623350B2 (en) | Subscription/notification of a conference in a collaboration conferencing system | |
US20130058473A1 (en) | Digital Network-Based Telephone Systems and Functionality | |
US10187529B2 (en) | Systems and methods for conducting conference calls | |
US20140098947A1 (en) | Ad hoc meeting initiation | |
WO2012042271A1 (fr) | Videoconférence basée sur ip effectuée au moyen d'un serveur de réseau social | |
WO2008139495A2 (fr) | Participant caché à des communications en temps réel | |
CN102404286A (zh) | 主动式网络语音会议系统及其方法 | |
CN103168444B (zh) | 参加会议的方法和会议系统 | |
TW201208296A (en) | Initiative network audio-conferencing system and method | |
HK1168492A (en) | Multimodal conversation park and retrieval | |
HK1168492B (en) | Multimodal conversation park and retrieval |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08776663 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08776663 Country of ref document: EP Kind code of ref document: A2 |