Búsqueda Imágenes Maps Play YouTube Noticias Gmail Drive Más »
Iniciar sesión
Usuarios de lectores de pantalla: deben hacer clic en este enlace para utilizar el modo de accesibilidad. Este modo tiene las mismas funciones esenciales pero funciona mejor con el lector.

Patentes

  1. Búsqueda avanzada de patentes
Número de publicaciónUS20060172725 A1
Tipo de publicaciónSolicitud
Número de solicitudUS 11/355,074
Fecha de publicación3 Ago 2006
Fecha de presentación16 Feb 2006
Fecha de prioridad8 May 2003
También publicado comoCN1551597A, CN100403752C, EP1475944A2, EP1475944A3, US7324809, US20040224721
Número de publicación11355074, 355074, US 2006/0172725 A1, US 2006/172725 A1, US 20060172725 A1, US 20060172725A1, US 2006172725 A1, US 2006172725A1, US-A1-20060172725, US-A1-2006172725, US2006/0172725A1, US2006/172725A1, US20060172725 A1, US20060172725A1, US2006172725 A1, US2006172725A1
InventoresYuka Hayashi
Cesionario originalNec Corporation
Exportar citaBiBTeX, EndNote, RefMan
Enlaces externos: USPTO, Cesión de USPTO, Espacenet
Portable telephone set
US 20060172725 A1
Resumen
A check is made as to whether a received mail contains a password as a combination of preliminarily registered symbols or letters. When the password is found, a telephone diary in a database is retrieved by using a letter train other than the password contained in the received mail. When a telephone number corresponding to the other letter train is contained in the telephone diary, the corresponding telephone number is mail returned to the source of transmission. When no such telephone number is contained, this fact is mail returned.
Imágenes(5)
Previous page
Next page
Reclamaciones(8)
1. A portable telephone set comprising a database with data stored therein, a means for collating a cipher inputted at the time of a call arrival with a preliminarily registered cipher, a means for converting, when both the ciphers are identical, a retrieval code inputted in voice to data, a means for retrieving the database by using the converted retrieval code, and a means for transmitting, when the data corresponding to the retrieval code is found in the database, the corresponding data in voice to the source of transmission.
2. The portable telephone set according to claim 1, wherein when the data corresponding to the retrieval code is not found in the database, the fact is transmitted in voice to the source of transmission.
3. The portable telephone set according to claim 1, wherein the retrieving means retrieves, when the retrieval code is a name, the telephone diary in the database.
4. The portable telephone set according to claim 1, wherein the retrieving means retrieves, when the retrieval code is a date, the schedule book in the database.
5. The portable telephone set according to claim 1, wherein the transmitting means transmits data in voice to a preliminarily registered telephone number or mail address.
6. The portable telephone set according to claim 2, wherein the retrieving means retrieves, when the retrieval code is a name, the telephone diary in the database.
7. The portable telephone set according to claim 2, wherein the retrieving means retrieves, when the retrieval code is a date, the schedule book in the database.
8. The portable telephone set according to claim 2, wherein the transmitting means transmits data in voice to a preliminarily registered telephone number or mail address.
Descripción
    CROSS-REFERENCE TO RELATED PATENT APPLICATIONS
  • [0001]
    This application is a division of application Ser. No. 10/840,363, filed May 7, 2004, now pending, and based on Japanese Patent Application No. 2003-130252, filed May 8, 2003, by Yuka HAYASHI. This application claims only subject matter disclosed in the parent application and therefore presents no new matter.
  • BACKGROUND OF THE INVENTION
  • [0002]
    This application claims benefit of Japanese Patent Application No. 2003-130252 filed on May 09, 2003, the contents of which are incorporated by the reference.
  • [0003]
    The present invention relates to portable telephone sets and, more particularly, to a portable telephone set capable of reading out and utilizing personal data registered therein from a different telephone set or the like.
  • [0004]
    Hitherto, it has been possible to register many personal data such as a telephone diary or a schedule book in a portable telephone set. However, when the user forgets the portable telephone set to be carried, he or she can no longer externally refer to these personal data.
  • [0005]
    Accordingly, Japanese Patent Laid-Open No. 2000-216858, for instance, proposes a method of externally utilizing personal data of a personal telephone set. In this well-known method, when a personal password inputted by dialing is received and found to be identical, a personal data retrieval code is requested, and personal data is called out from a memory based on the retrieval code and is outputted (see Literature 1: Japanese Patent Laid-Open 2000-216858, for instance).
  • [0006]
    In the method described in the Literature 1, however, when the individual password is identical, a question as to whether the personal data call-out is requested is to be answered in term of “Yes” or “No”. In addition, it is necessary to answer a question as to whether call arrival history or a message is requested. Furthermore, it is necessary to answer a question concerning the retrieval code. Therefore, the operation is cumbersome and time-consuming.
  • SUMMARY OF THE INVENTION
  • [0007]
    The present invention was made in view of the above prior art problems, and it has an object of providing a portable telephone set and control method thereof capable of simple and safe reading out of the personal data with improved convenience.
  • [0008]
    According to an aspect of the present invention, there is provided a portable telephone set comprising a database with data stored therein, a means for checking whether a preliminarily registered password is contained in a received mail, a means for checking, when the password is found to be contained, whether a letter train other than the password is also contained in the received mail, a means for retrieving, when the other letter train is found to be contained in the received Mail, the database by using the other letter train, and a means for mail returning, when data corresponding to the other letter train is found to be in the database, the corresponding data to the source of transmission.
  • [0009]
    When the data corresponding to the other letter train is not found in the database, this fact is mail returned to the source of transmission. The retrieving means retrieves a telephone diary in the database by using the other letter train. The retrieving means retrieves a schedule book in the database by using the other letter train. The transmitting means transits data to a preliminarily registered main address or telephone number.
  • [0010]
    According to another aspect of the present invention, there is provided a portable telephone set comprising a database with data stored therein, a means for collating a cipher inputted at the time of a call arrival with a preliminarily registered cipher, a means for converting, when both the ciphers are identical, a retrieval code inputted in voice to data, a means for retrieving the database by using the converted retrieval code, and a means for transmitting, when the data corresponding to the retrieval code is found in the database, the corresponding data in voice to the source of transmission.
  • [0011]
    The data corresponding to the retrieval code is not found in the database, the fact is transmitted in voice to the source of transmission. The retrieving means retrieves, when the retrieval code is a name, the telephone diary in the database. The retrieving means retrieves, when the retrieval code is a date, the schedule book in the database. The transmitting means transmits data in voice to a preliminarily registered telephone number or mail address.
  • [0012]
    According to other aspect of the present invention, there is provided a control method of a portable telephone set comprising steps of checking whether a preliminarily registered password is contained in a received mail, checking, when the password is found to be contained, whether a letter train other than the password is contained in the received mail, retrieving, when the other letter train is found to be contained in the received mail, database by using the other letter train, and mail returning, when data corresponding to the other letter train is found to be in the database, the corresponding data to the source of transmission.
  • [0013]
    According to further aspect of the present invention, there is provided a control method of a portable telephone set comprising steps of checking as to whether a received mail contains a password as a combination of preliminarily registered symbols or letters, retrieving, when the password is found, a telephone diary in a database by using a letter train other than the password contained in the received mail; and mail returning, when a telephone number corresponding to the other letter train is contained in the telephone diary, the corresponding telephone number to the source of transmission, and when no such telephone number is contained, mail returning this fact.
  • [0014]
    Other objects and features will be clarified from the following description with reference to attached drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • [0015]
    FIG. 1 is a block diagram showing the arrangement of the first embodiment of the present invention;
  • [0016]
    FIG. 2 is a flow chart showing operation of the embodiment of FIG. 1;
  • [0017]
    FIG. 3 is a block diagram showing the arrangement of a second embodiment; and
  • [0018]
    FIG. 4 is a flow chart showing operation of the embodiment of FIG. 3.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • [0019]
    Preferred embodiments of the present invention will now be described with reference to the drawings.
  • [0020]
    FIG. 1 is a block diagram showing the arrangement of the first embodiment of the present invention. Referring to the Figure, reference numeral 1 designates an antenna, numeral 2 a radio circuit for transmitting and receiving radio signals, numeral 3 a control circuit for controlling various circuits in the telephone sets, and numeral 4 a memory as a database, in which various data of a telephone diary, a schedule book, etc. are registered. Also, reference numeral 5 designates a temporal memory for temporarily storing data, numeral 6 a loudspeaker for outputting voice, numeral 7 a liquid crystal or like display part for displaying various data, numeral 8 a key input part for inputting various data such as telephone numbers and mails, numeral 9 a microphone for inputting voice.
  • [0021]
    In this embodiment, the control circuit 3 checks whether a received mail having been received via the antenna 1 and the radio circuit 2 and stored in the temporal memory 5 contains identification symbols or letters preliminarily registered in the memory 4. The user has preliminarily formed such symbols or letters as a combination and registered as a password in the memory 4.
  • [0022]
    When such a password is found, the control circuit 3 automatically retrieves a telephone diary stored in the memory 4 by using a letter train (i.e., retrieval keyword) other than the identification symbols or letters of the mail data. The result is mail returned to the mail source. In other words, when subject data is found, it is extracted. When no subject data is found, on the other hand, a preliminarily prepared response message, for instance “no subject data”, is mail returned to the mail source.
  • [0023]
    The operation of the embodiment will now be described with reference to the flow chart shown in FIG. 2. In this case, an operation of automatically retrieving personal data concerning the telephone diary and mail returning the retrieved data will be described. As noted above, the terminal user preliminarily registers identification symbols or letters as a combination in the memory 4 of the portable telephone set.
  • [0024]
    At this time, the identification symbols or letters are set individually, so that any other person is incapable of taking out data. When the user receives a mail (step 201), he or she checks whether the identification symbols or letters preliminarily registered in the memory 4 are contained in the received mail (step 202).
  • [0025]
    When no identification symbols or letters are contained, the portable telephone set is restored to the waiting state (START). When the identification symbols or letters are contained, a check is executed as to whether other letter train (i.e., retrieval keyword) is contained (step 203). When no other letter train is found, the portable telephone set is restored to the waiting state (START). When the other letter train is found, the portable telephone set retrieve the telephone diary stored in the memory 4 by using the other letter train (step 204). In this instance, a name letter train is used as the other letter train, and the retrieval is executed whether a telephone number corresponding to the name is present.
  • [0026]
    Then, the user checks the retrieval result (step 205). When the subject data is found, this data is extracted (step 206) and automatically returned to the mail source (step 207), while when no subject is found, a response message, for instance “no data”, preliminarily prepared in the memory 4 is taken out (step 207) and automatically returned to the mail source (step 208). Subsequently, the waiting state is restored (START).
  • [0027]
    As shown above, in this embodiment in the event of, for instance, forgetting the portable telephone set to be carried, it is possible to obtain, from an external telephone set, data registered in the portable telephone set, and the convenience is thus improved. Also, since each user can individually preliminarily register identification symbols or letters for causing automatic process in the portable telephone set, it is possible to prevent stealing of data by other persons.
  • [0028]
    A second embodiment of the present invention will now be described. In this second embodiment, the retrieval acceptance and transmission of the retrieval result are carried out in a different method from the method in the first embodiment. Specifically, the acceptance of the data retrieval is made with cipher input by a push-button, and vocal methods are used for the retrieval keyword reception and retrieval result report.
  • [0029]
    FIG. 3 is a block diagram showing the arrangement of a second embodiment. This FIG. 3 embodiment is different from the block diagram of FIG. I showing the first embodiment in that it additionally comprises a voice recognition part 10 for recognizing voice. The remainder of the arrangement is the same as in the first embodiment. The operation of the second embodiment will now be described with reference to FIGS. 3 and 4.
  • [0030]
    The portable telephone set user preliminarily registers a cipher for external accessing in the memory 4 of the portable telephone set. When the portable telephone set automatically receives a call (step 401), the control circuit 3 checks whether the input of a cipher registered in the memory 4 (step 402). As noted above, the cipher is inputted by the push-button. When the inputted cipher is identical with a registered cipher, subsequently inputted voice is temporarily stored in the temporal memory 5 for conversion of the voice to data in the voice recognition part 10 (step 403).
  • [0031]
    The inputted voice contains a retrieval keyword, a name, for instance, being used as the retrieval keyword. Using this retrieval keyword, the control circuit 3 retrieves the telephone diary registered in the memory 4 (step 405), and checks whether a pertinent subject data (i.e., telephone number) is contained in the designated retrieval keyword (i.e., name) (step 406).
  • [0032]
    When the subject data is found, the user extracts this data (step 407), feeds the data (i.e., telephone number) to a D/A converter (not shown) for D/A conversion (step 409), and transmits the data in voice via the radio circuit 2 and the antenna 1 to the opposite side of communication (step 410).
  • [0033]
    When no subject data is found, the user feeds a response message, for instance “no data”, preliminarily prepared in the memory 4 to a D/A converter (not shown) for D/A conversion (step 409), and transmits the data in voice via the radio circuit 2 and the antenna 1 to the opposite side of communication (step 410).
  • [0034]
    As has been shown, in the above embodiments, in the event of forgetting the portable telephone set to be carried, a retrieval keyword can be inputted in voice or as a cipher. It is thus possible to obtain persona data registered in the portable telephone set from a general telephone set or a Public telephone set, an the convenience can be further improved.
  • [0035]
    While the first and second embodiments have been described such that retrieved data is transmitted to the source of transmission, this is by N means limitative; it is also possible to transmit the data to a mail address or a telephone number preliminarily registered in the portable telephone set.
  • [0036]
    Also, while th4 first and second embodiments have concerned with an example of retrieving the telephone diary with a name as a retrieval keyword, according to the present invention telephone diary is by no means limitative, and it is also possible to let a schedule book in the memory 4 to be retrieved. In this case, a “date” is inputted as a retrieval keyword after the identification letters or symbols, and when the date data is found, the schedule book registered in the memory 4 is retrieved by using the date data, and the schedule of the pertinent date is transmitted. Furthermore, according to the present invention it is possible to all personal data registered in the memory be read out and transmitted the source of transmission or registered addresses or telephone Numbers.
  • [0037]
    As has been described in the foregoing, according to the present invention in the even t of forgetting the portable telephone set to be carried, personal data registered therein can be externally utilized, and the convenience can be improved. Also, since all the processes are executed automatically, satisfactory operability can be ensured. Furthermore, since each user individually registers a password such as identification symbols or letters, it is possible to prevent leakage of individual data.
  • [0038]
    Changes in construction will occur to those skilled in the art and various apparently different modifications and embodiments may be made without departing from the scope of the present invention. The matter set forth in the foregoing description and accompanying drawings is offered by way of illustration only. It is therefore intended that the foregoing description be regarded as illustrative rather than limiting.
Citas de patentes
Patente citada Fecha de presentación Fecha de publicación Solicitante Título
US5390238 *15 Jun 199214 Feb 1995Motorola, Inc.Health support system
US5908383 *17 Sep 19971 Jun 1999Brynjestad; UlfKnowledge-based expert interactive system for pain
US5915225 *28 Mar 199622 Jun 1999Ericsson Inc.Remotely retrieving SIM stored data over a connection-less communications link
US5960399 *24 Dic 199728 Sep 1999Gte Internetworking IncorporatedClient/server speech processor/recognizer
US6014626 *12 Ago 199611 Ene 2000Cohen; Kopel H.Patient monitoring system including speech recognition capability
US6061571 *28 Ene 19989 May 2000Nec CorporationTelephone system capable of utilizing telephone number information stored in parent portable telephone unit by a plurality of child portable telephone units
US6118994 *20 Jun 199712 Sep 2000Matsushita Electric Industrial Co., Ltd.Portable communications device capable of autodialing truncated received telephone number
US6157705 *5 Dic 19975 Dic 2000E*Trade Group, Inc.Voice control of a server
US6185535 *16 Oct 19986 Feb 2001Telefonaktiebolaget Lm Ericsson (Publ)Voice control of a user interface to service applications
US6192338 *17 Jun 199920 Feb 2001At&T Corp.Natural language knowledge servers as network resources
US6564121 *3 Dic 199913 May 2003Telepharmacy Solutions, Inc.Systems and methods for drug dispensing
US6938100 *21 Dic 200030 Ago 2005Lg Electronics Inc.Method for synchronizing data between mobile terminal and computer
US6965404 *24 Jul 200115 Nov 2005Canon Kabushiki KaishaImage recording device, image input device, and data processor, image recording method, and storage medium recording image record control program
US6970827 *19 Mar 200229 Nov 2005Gomed, LlcSystem and method for storing information on a wireless device
US7062032 *18 Nov 200213 Jun 2006At&T CorpVirtual work environment for remote users
US20030055638 *23 May 200120 Mar 2003Burns Stephen S.Wireless speech recognition tool
US20030157946 *13 Jun 200221 Ago 2003Chong Yih YeongMethod and apparatus for remotely performing tasks in a wireless personal digital assistant
US20040048602 *28 Ago 200311 Mar 2004Nec CorporationMobile telephone apparatus with remote access function for external network and remote access method for mobile communication system
US20040088575 *1 Nov 20026 May 2004Piepho Allen J.Secure remote network access system and method
US20040192268 *2 Dic 200230 Sep 2004Nokia CorporationPrivacy protection in a server
US20040203601 *19 Dic 200214 Oct 2004Morriss Matthew JamesMethod and apparatus for activating a restrictive operating mode of a wireless communication device
Clasificaciones
Clasificación de EE.UU.455/412.1
Clasificación internacionalH04M11/00, H04M1/665, H04M1/00, H04M1/725, H04Q7/38, H04L12/58
Clasificación cooperativaH04M1/274558, H04M1/274516, H04M1/665, H04M1/72522, H04M1/72547
Clasificación europeaH04M1/2745M, H04M1/725F1