Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Realizing method for strengthening meeting telephone service

A technology of a conference call and an implementation method, applied in the field of communications, can solve the problems that the communication security of the conference call cannot be well guaranteed, the conference call service cannot flexibly adjust the conference members, and the legitimacy of the conference members is not considered. Market potential, improved commercial value, and improved practicability

Active Publication Date: 2005-05-11
HUAWEI TECH CO LTD
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, during the conference call, the master user can use the operation code to delete conference members, but only the last member who joined the conference call can be deleted
[0004] Therefore, because the main control user of the existing conference call service must input the numbers of the called users one by one, and call the conference members in turn, the complexity of the operation is greatly increased, and the time required for setting up the conference call is increased.
For example, when there are many conference members, the master user not only needs to remember and input multiple numbers, but also takes considerable time to set up multiple calls one by one, which is unbearable for the user
[0005] Moreover, since the establishment of the conference call and the joining of the controlled user are only controlled by the master user, once the conference call is established, the controlled user cannot actively initiate a call to request access to the conference, so that the conference call service cannot flexibly adjust the participating conference members. For example, when the master user initiates a conference call, due to various reasons, a controlled user fails to join the conference call service. In this case, the master control user may think that the controlled user cannot join the conference call service. And no longer initiate a call access request to it. At this time, even if the accused user wishes to join the conference call service, it cannot be realized, which brings inconvenience to the user's normal use of the conference call service.
[0006] In addition, the existing conference calls do not consider the legitimacy of each conference member, that is, the current main control user can initiate a call and establish a corresponding conference call service without entering a password for identity verification, so that the security of conference call communication cannot be greatly improved. Good guarantee, for example, some illegal users can easily pretend to be the master user to request the establishment of a conference call service, or perform some operational control on the established conference call service, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Realizing method for strengthening meeting telephone service
  • Realizing method for strengthening meeting telephone service
  • Realizing method for strengthening meeting telephone service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The core idea of ​​the present invention is by signing eCC (Enhanced Conference Call) service, group, group master user password, controlled user password and conference member number at HLR (Home Location Register), thereby can realize in the communication network The conference call service can be developed flexibly. For example, the master control user can delete any controlled user, and the controlled user can actively apply to join the established conference call. At the same time, the present invention can also ensure the security of the conference call service.

[0046] The present invention mainly comprises to the improvement of existing conference phone:

[0047] 1. The process of initiating and establishing a conference call. In this process, the main control user of the present invention can initiate a call to each conference member in a group mode and request to establish a conference call service; All members included in the group, and at this time, the mas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method includes following steps: the group mode is used to build up procedure of conference call service; when the conference call needs to build up the only thing having to do is inputting a number of group; after building up the conference call the main control user can add or delete the appointed conference member; the difference ciphers are set for members and main control users in each group.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method for realizing enhanced conference call service. Background technique [0002] A conference call is a supplementary service in a communication system that allows users to initiate multi-connection calls. Each member in a conference call can receive information from other members, which facilitates real-time information interaction among multiple members. . [0003] In the existing conference call, the main control user initiates a call to the called user. When initiating a call, the main control user must input the numbers of the called users one by one, and call the conference members in turn to realize the conference call service. During the conference call, if the master user releases the call, the entire conference call process will be released. At the same time, during the conference call, the master user can use the operation code to delete conference member...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04B7/26H04L9/00H04M3/42H04M3/56
Inventor 龙天泳高新菊
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products