Method, system and computer device for providing communication services between resources in communication networks and internet to perform transactions

FIELD: technologies and systems for performing financial business operations for wireless or wired communication networks and Internet, providing transaction-related services between network resources.

SUBSTANCE: in accordance to method, network resource has unique network identifier assigned thereto, utilized as identifier of financial account of resource, while also performed is generation of File of resource, containing network identifier associated with resource, and also financial data and data of financial account of resource, output by Authenticating Center of Digital Certificate containing data of resource File for utilization during performing transactions between requesting and requested network resources, wherein Administrator of Digital Certificates preferably also acting as Address Administrator of Central Commutator, outputs Files and Digital Certificates of resources, transmits resource Files and Digital Certificate directly to resource or temporary network resource or reseller; reseller for payment assigns universal account/File/Digital Certificate to permanent or temporary network resource, while encryption of secret financial data and data of financial account prior to their positioning in File or Digital Certificate occurs with utilization of Open key of Authorization Center, which makes it possible to avoid leaking out of secret financial data and financial account data, and positioning of universal account identifier of Authorization Center in resources File together with financial data and data of financial account of resource, serves as address information for making connections to Authorization Center for providing services of performing transactions between resources.

EFFECT: possible providing of communication services utilizing unique network identifier as identifier of financial account of resource.

3 cl, 12 dwg

 

The scope of the invention

The present invention generally relates to data processing. More specifically, the present invention relates to a system and method of facilitating information exchange and communication between different communication devices, phone number.

Description of related technologies

U.S. patent No. 6151624 (hereinafter "patent 624") author K.Teare and others, which is included in the present invention in its entirety, which is also seen by the author as the closest prototype of this application of the invention and describes a system and method that facilitate search and access network resources, such as web page using their natural language descriptions. In the case of web pages, the system and method 624 patent links natural language name ("name") with the so-called Uniform Resource Locator ("URL") in the metadata file, which also contains additional descriptive information about the web page. After the introduction and confirmation of natural language name in the line data entry web browser, the system and method apply to index the database that contains the metadata allows you to find the appropriate URL that is associated with a given natural language name. System and method 624 patent then send to the user responsive to the request, the web page indicated by the soo the relevant URL. This method frees the user from having to know the full URL of the desired web page before the user will have access to the web page.

However, there are some flaws and limitations associated with the system and method described patent 624. As stated in the patent 624, natural language names are not unique and any specific name specified by the user may correspond to more than one web page from which the user is forced to choose. Accordingly 624 patent provides additional data and network processing to resolve such conflicts.

Moreover, the names may be protected by copyright, trademark or the registration of the domain name and therefore may be prohibited for use by the administrator of the web site who wants to call your website this specific name, even if it is registered in the manner prescribed by law.

Moreover, 624 patent does not claim the possibility of communication with other resources and methods of communication, namely e-mail, voice mail and PDA devices (personal digital assistant).

So what was missing and therefore has not been available is a system and method that allow the user to use unique and descriptive information to identify and domestic the access and interact with web sites or other network resources, using information that is unique and famous.

The encryption method of the public key allows you to protect sharing using key pairs. Each key pair consists of a public and a private key. Public key and private key are related such that data encrypted with one key of the pair can be decrypted only with the other key pair, and to determine the private key with the public key, it is practically impossible. The private key is typically created and kept secret by the owner, while the public key is usually provided for everyone. Secure communication between the parties can then be set using belonging to the sides of the key pair.

The use of public key cryptography solves a lot of problems in open networks such as the Internet. However, remain two significant problems. First, the parties must have effective access to the public keys of other parties. Second, because in many communication protocols, the parties identified with their public keys must be found a reliable method for such parties to verify that the corresponding public key belongs to the correct person.

The management structure of a Public key (Public Key management Infrastructure-PKI) solves these two problems. In one of the approaches PKI osnovana digital certificates, associating public keys with relevant persons with some degree of integrity. PKI typically includes a database of digital certificates with the ability to conduct operations on them to operate on such data and maintain the database. For example, are handled by the requirement of providing a new digital certificate, revoke existing certificates, checks the status of existing certificates.

The next prototypes and their differences.

U.S. patent No. 6151624 issued by RealNames, does not offer roaming between networks of communications and the Internet; check on-line status; secure connection; support communication standards of the 3rd generation, such as MMS/1-mode/FOMA and unified communications services and messaging (unified communication and messaging).

U.S. patent No. 6324645 owned by VeriSign, proposes the use of digital certificates, but does not give details on using certificates for device networks communications with the Internet connection; protected services shopping online and transactional services based on verification of the ETA and dynamic URLS (Uniform Resource Locators);

U.S. patent No. 5793762, entitled "System and method for providing packet data and voice services to mobile subscribers", and U.S. patent No. 5457736, entitled "System and method for providing microcellular personal communications services (PCS) utilizing embedded switches" differ from the present invention. The main difference between a patent is mi and the present invention is that in addition to making calls and wired communication network, mobile network, mobile network, wired network, mobile network, mobile network, the present invention also offers the possibility of connections the browser - wired network, the browser - mobile network, mobile network browser and a wired network browser, thus providing the opportunity compounds (cooperability) not only between all mobile Internet, but also between mobile wired network and Internet users, so that the user of any network or the Internet can make a call without being a subscriber of the mobile communication.

U.S. patent No. 5732359, entitled "Mobile terminal apparatus and method having network inter-operability", offers crossoverpoint between mobile networks and satellite communications, but does not protect crossoverpoint between any telephone network and the Internet.

U.S. patent No. 6353621, entitled "Method to allow seamless service to mobile subscribers across various mobile switching centers supporting multiple intersystem standards, describes a telephone connection and method of crossoverpoint for mobile networks at the level set multiple Switches, supporting various communication protocols (TCP/IP for Internet included). However, this patent does not provide a connection to exchange between the machine and the program or program and hardware.

P is the awning U.S. No. 5521962, named "Temporary storage of authentication information throughout a personal communication system", describes a method of managing information for authentication for users of mobile networks, reducing the number of copies of such information, hosted in the infrastructure of a particular wireless communication network.

Famous inventions do not assume a Central Repository for Internet switch (switch)that contains the database Files of Rooms providing crossoverpoint between mobile networks, wired and Internet.

Limitations and disadvantages of known systems and methods described above can be removed and eliminated various embodiments of the present invention, in particular offering methods, systems, computer data streams, the recording media business models, including, inter alia, the creation of the Primary File Rooms or PFN (primary number file - PNF), containing a single phone address ETA, having a phone number that belongs to the network resource.

One of the advantages offered by the invention is a method for creating a Secondary File Number or VPN (secondary number file) and a File Number or HFN (default number file), and VPN and HFN are mirror copies of PFN; GFN place at the Central switch (switch, server), which provides connection to the network device itself is the network resources is om, and VPN placed on the server of the Internet provider.

Other specific proposed advantage is that the method includes the issuance of a temporary digital certificate containing the ETA for use with at least one Temporary Subscriber - VA (Temporary Target - TT), and VA can act as a temporary subscriber of the recipient or initiator of calls in the network, while the Administrator of Digital Certification-WITHIN (preferably same switch server) produces ETA and CA ETA (digital certificate ETA); puts ETA and CA ETA directly in the File Number or sends their sales representative (reseller; reseller assigns ETA/CA specific temporary Subscriber by placing them in PFN of such person.

Another application of the invention is the encryption during the transfer session, in which Subscribers use a shorter key pair for encryption acceleration of video and audio streams in real time, with each Subscriber produces short the public and private keys; places the private key of the secure internal memory of the Subscriber, and the private key is used only for one session; encrypts the new short public key using the original long private key or using long public key of the other party (the second party in exchange); sends over the network encrypted communicated to the e to the second Subscriber; the second Subscriber decrypts the received message containing the new short public key of the first Subscriber, and uses the received public key of the first Subscriber to encrypt and/or decrypt exchange with the first Subscriber.

The preceding description is a summary only of certain aspects of the most interesting applications of the invention. A detailed description of the various applications of the invention described below, while the scope of the invention defined in the Formula.

The above needs and other needs and objects accomplished by the present invention which, on the one hand, contains a method spent in the network ("localization") and communication network resources, using the telephone number and the identifier designated in the network, and includes the steps of placing a first telephone number of the resource in Association with the ID designated in the network (the "pointer location" or "index") for that resource; receiving a request for the establishment of designated network resource containing the first telephone number; retrieving a pointer interconnected with the first telephone number; and establishing communication with the resource using the received index.

One of the features of this perspective involves placing at least a second telephone number for the same resource in the cos is ovasi with a pointer; receiving a request for localization resource based on the first or second telephone number; retrieving a pointer interconnected with the first or second telephone number; and establishing a connection with the resource using the received index. Another feature includes the steps of placing first and second telephone numbers in conjunction with the pointer in the file room in the storage device interconnected with the resource.

Another feature includes the steps of removing the file number containing the phone number and the associated resource; analysis file number; create index entries based on the values found in the file rooms; placing the index entries in the index, which is available separately from the storage device. And another feature includes the steps to transfer file number through the network to the client associated with the resource; the location of the file number to the storage device on the server associated with the client. Another feature includes periodically polling the file number associated with the client; check for match one of the numbers found in the file room with the third telephone number contained in the database index; updating the database index when the file number changes detected. Another feature is the step synchronization index with the database.

the accordance with another feature of the method includes the steps of receiving a customer ID, interconnected with the resource; generating a set of metadata describing the resource index and the identifier of the client; the placement of metadata in the permanent storage device associated with the client. Another feature is to assign a randomly generated name for the metadata set. Another feature is instructing the client to place the metadata in a particular specified place in the permanent storage device. Another feature is the registration of the metadata set and randomly generated name in the database.

The previous is only a brief description of the various features of the invention. The invention determines many other aspects set forth in the claims.

Brief description of drawings

The present invention is only illustrated as examples and not as limitations of the application, accompanying drawings, in which the numbering refers to similar elements among which are:

Figa is a chart file number.

FIGU is a diagram of an embodiment of a system for navigation of network resources based on metadata.

Figa is a precedence diagram for the method of registration services in the system depicted in FIGU.

Figv is the precedence diagram method for enhancing file numbers the system, depicted on figv.

Figure 3 is a precedence diagram for the method of work questionnaire "spider" in the system depicted in FIGU.

4 is a flowchart services index build in the system depicted in FIGU.

Figure 5 is a sequence diagram of operations for method resolution service in the system figv.

6 is a sequence diagram of operations for the method of operation of services of search of numbers in the system depicted in FIGU.

Figa is an example page statistical report generated by the system figv.

Figv is another example of a page statistical report generated by the system figv.

Fig is a block diagram of a computer system that can be used to implement the present invention.

Figure 9 is a simplified block diagram of permit systems and navigation.

The detailed description of embodiments of the invention

Here we describe the Mechanism linking the network resource with the phone number and location in the network and communication network resources, the use of associated phone numbers. In the present description, for purposes of explanation, are some distinctive details, in order to give a comprehensive idea of the invention. However, sophisticated che is ovako it will be obvious that the present invention can be used without such distinctive details. In other instances, well-known construction and devices shown in the form of schemes or explained another way, in a manner that avoids the indistinctness in relation to the present invention.

The File format of Numbers

In one implementation of the present invention the metadata linked to a network resource, such as web pages, network computers, web-capable device, wireless or other communication devices. In General, metadata is data that describes other data. The metadata is specified, provide information that describes a web page or other resource of the communication network in a manner similar to the manner in which the card catalogue of the library describes the book. For example, the metadata includes information communication phone number from a web page or other network resource description resource description language supported by the resource location of the resource, and other information related to the resource. Referring to the example above web page, the metadata is determined by the administrator of the server that contains this page, which is described in the metadata, and a copy of the metadata posted and linked to this server so that this metadata is available through the Web. COI is lsua program-librarian this copy of the metadata is registered in the database, associated in turn with the index. Like that web-site can be called a way of printing known phone number (it is in the metadata associated with the information) in the web browser. Then, the metadata information is used to resolve phone numbers in the address of web sites associated with this phone number in the metadata.

As indicated, in addition to web pages metadata can link other network resources with the phone number. For example, metadata can link the phone number tool instant messaging (instant messaging) user mobile phone number (when the phone number is based on the metadata file is a landline phone number), or even video-conferencing Internet. In this spirit, phone number, and associated metadata can be used to detect the myriad means of communication associated with the phone number in addition to a web page.

While further description of the different versions of the present invention mainly relates to the resolution of type resource web page with a phone number, it is understood that skilled in technology people will be able to easily modify proposed this concept to resolve other network resources, IP is by using phone number as is described below.

Preferably, the metadata is prepared and originally posted in the form of File rooms 64, which is a text file with grammar Extensible Markup Language (XML). XML is a language definition promoted by the corporations Microsoft Corporation and Netscape Communications Corporation. Further information about the XML provided in the document "XML: Principles, Tools, and Techniques," The World Wide Web Journal, vol.2, no.4 (Fall 1997) (Sebastopol, Calif.: O'reilly & Assoc., Inc.).

Preferably, the text in the file rooms 64 is compatible with the formats of the Resource Definition Format ("RDF") and CC/PP (Composite Capabilities/Preference Profiles)based on RDF for management information describing the device, as well as with other initiatives XML descriptions of Web-capable mobile devices and metadata. RDF is an XML syntax, developed by the World Wide Web consortium for expressing semantics. Text file for metadata described herein also referred to as the MLS file. The example file MLS presents further FIGA.

MLS file 900 is defined in accordance with the grammar, in which the elements are surrounded accompanying tags. For example, "<resource>and</resource>" are complementary tags. MLS file 900 has two main parts, namely section circuit 902 and the data section 904. Section circuit 902 and the data section 904 invested in the accompanying tags ("<xml> </Hm>"), which indicate that MLS file 900 uses a grammar XM.

Section circuit 902 tagged <schema> and </schema>. Section schema defines the schema that is used to organize the data in a data partition. For example figa link "href section of the scheme refers to the file "MLS-schema", hosted on a web server that contains the schema definition. The scheme named "MLS". Tags MLS file 900, which is part of MLSschema has the prefix "MLS". Using this prefix, an XML parser that reads the MLS file 900 may determine the tags that are part of the MLS schema.

The data section 904 tagged <xml:data> and </xml:data>. The data section contains one or more MLS entries 905. Each MLS record 905 tagged <assertions> and </assertions>. Conceptually, each MLS record 905 is a set of claims about a network resource that is specified within the tag <assertions>. In the example on figa, one MLS entry 905 makes assertions about the network resource home.acme.com that example is the home web page for the fictitious Acme Corporation. Of course, in accordance with the present invention the tag <assertions> can create approval on a network resource that is different from the web page. For example, the tag <assertions> can specify the nickname of the user for instant messages.

In further embodiments of the present invention, more than one type of resource can be associated with the phone the phone number, and different resources may be available based on the availability of a specific resource. For example, the landline phone number of the user can be associated with the nickname of the user that is used for instant messaging, SMS user ID, with video-conferencing real-time, such as Microsoft NetMeeting. File number specifies a list of these different resources in a hierarchy, such as instant messaging, then video, then text messages, and preferably is updated depending on the availability of each resource in real time in accordance with known methods. Thus, when an attempt is made to establish contact with the user, using his landline phone, a resource contributes to the establishment of such contact, as determined by the established hierarchy and the availability of a specific resource in real-time for different cases have been described. Continuing to consider the example shown, communication is established through the means of instant messages unless the user is available in real time ("on-line" or "line") through his means instant messages, otherwise it will attempt to communicate through a video conference. If a user is running-not available on-line through video-conferencing, will attempt to communicate via SMS. Other means of communication may also be offered, such as voice or video messages can be placed for subsequent delivery to the user.

The metadata file of the present invention provides a unified addressing scheme based on the use of telephone numbers. The file metadata in combination with a single addressing scheme makes possible communication between and among devices of different types operating in distinct networks. In another example, the metadata file can be used to facilitate the address posted online a video conferencing system and a mobile phone equipped with video conferencing, for example a mobile phone 3rd generation, with the possibility of video conferencing. In this context, the communication may be initiated by the user videoconference over the Internet, scored in the address bar of your Internet browser phone number, which was allowed by the file metadata in the resource Videophone.

Language for RDF provides a common mechanism for describing many types of resources. RDF does not provide a means to describe web pages. Accordingly, the File numbers 64 is expressed in RDF terminology specific to web pages, which describes the main attributes of the web page. The attributes in luchot phone number associated with the web page, and preferably also include a pointer or URL, description, language attribute, the attribute of the region and the attribute registry. Of course, the professional will appreciate the fact that the concept allows the use of other relevant attributes for resources that are not web pages.

Each MLS record 905 has a set of metadata 906. In the case of example figa, metadata 906 contain the value that indicates the telephone number associated with the resource. The phone number value "212-555-1234" is between tags <telnumber> and <telnumber>. Metadata 906 also include a description value, the value of the language ID and the ID value of the region. A pair of tags allocates each value. For example, on figa value description is "Home Page of Acme Corporation," the value of language - "English," and the value of the region is "Global." Value description provides the description of the network resource that is associated with a real phone number, which in the above example can be the main corporate telephone Corporation Acme Corporation. In accordance with the present invention, the phone number may include area code or country code, and may contain numeric alphabetic or mixed prefixes or extensions, for example 1-800-USA-RAIL, or any other character type, commonly used with telephone numbers is.

When many resources are defined in the same MLS file, preferably, for security purposes, so that each network address declared for the resource, was associated with the shortest network address contained in the MLS file for each resource. In the preferred embodiment, each network address must be a logical continuation or logical root of the network addresses in the MLS file that contains the least number of characters. For example, in the excerpt shown in figa relating to the web pages, all subsequent declarations of resources would be needed to identify the network addresses that describe the files that are placed inside the tree, the directory for which the address www.medialingua.com is the root. This relationship is verified by the Service Registration Service 22 at the moment when for the first time the file was created MLS.

Of course, as described above, can be described by the MLS file any resource which is not the web page, such as an email address or nickname of the user for instant messaging ("buddy" identifier from an instant messaging buddy list.

Another key advantage of the described mechanism is that it can be used to provide access to the network resources that use multiple phone numbers. Creates one or more Files of 64 Rooms. Files 64 rooms contain a lot of description of the deposits. Each description includes the phone number is interlocked with the one or more network resources associated with the field <telnumber>. However, each of the descriptions apply to the same network resource associated with the tag <resource>.

For example, one or more Files of 64 Rooms have descriptions that contain the corresponding phone number of the Corporation Acme Corporation, such as the main number for legal, marketing, technical Department and sales Department. Each description describes the same network resource. Accordingly, these descriptions create a lot of phone numbers that indicate or are resolved in the same network address. When a third party wishes to access described thus a network resource, such third party may use any of these phone numbers this network resource that is known of such third party. The Resolver) 40 permit such a phone number, that is, will allow to find the network address of the network resource corresponding to the room, no matter what the number of this resource was introduced. Accordingly, the user can find and access a network resource, using any of many well-known phone numbers of the resource.

In an alternative embodiment, ATP is buta also contain the attribute list of the selected tag < MLS:listings>. The attribute list is one or more keywords or other values that describe other properties of the resource. For example, each resource has a property of the object, which indicates the General nature of the product, service or organization associated with the resource. This allows you to organize database manner similar to that used by the directory "yellow pages". For example, the Acme Corporation Corporation has in its File number 64 string <MLS:listings>containing> Anvils (anvil), Rockets (missiles). Slingshots (slingshot), which indicates that the Corporation is a manufacturer of anvils, rockets and slingshots.

In an alternative embodiment, the resources described in the File rooms 64, are subjects, not web pages. A resource of type "entity" has the metadata, including postal address, email address and other personal information. In such embodiment, the system can be used as search service entities, and not for navigating web pages or other network resources.

For example, the resource search service entities may contain links to web resources page, where the user can send an e-mail message to the owner of the resource. Additionally or alternatively, such a resource may contain links that allow you to select the sludge is to send the message, pager or other way to send a message to the owner of the resource. Moreover, ftp, or other links or data associated with the owner of the resource can be posted on this web page. Thus, the phone number field <telnumber> File Rooms 64 plays the role of "Personal Internet Address (Personal Internet Address)or PIA (PIA)as a personal identifier that can be used by others to connect, send and/or receive information about a resource in multiple ways, namely, to call, send email, upload or "reset" the files using ftp, exchange messages, and participate in the chat, send appointment of a task or appointment, to leave a voice message or a video message, or check on-line status owner PIA. The usefulness of a phone number associated with the search service entities is increased when the phone number is a landline phone and mobile, thus allowing to implement services "one call (one call)" offered by different operators, landline phone and mobile phone that allows you to automatically transfer the call to a predefined mobile number, if a landline telephone is not responding.

If the resource has means for sending messages, the sender can b shall be identified by retrieving data from settings of his computer and your computer's operating system. For example, while sending e-mail messages, the system may be accompanied by information identifying the sender is retrieved from the operating system settings Window, placed in the settings Start/Settings/Control Panel/Users/Properties. Thus, the resource that sent the message, will receive the sender's ID, which can be further used to answer the email of the sender.

In accordance with various performances of the presented invention, the resources described in the File rooms 64, are wireless devices, web-adapted devices or other means of communication other than web pages or subjects. For example, a resource of type "device" has the metadata that defines the device, for example, the size of its screen, memory, communication type, postal address associated with the device, e-mail, request resources such as the requirement to replenish the paper in a network printer, when the printer has detected that the paper ends, and other information. In such embodiment, the system may be more used to search services of devices, determine their availability and receipt of status, than for navigating web pages or other network resources.

In another alternative version, the File Numbers 64 can in order to keep other additional attributes m. For example, other attributes include the Organization), subject (Subject)Summary (Abstract), Type (Type), Audience (Audience). Attribute Organization File 64 may indicate the organization or company that owns or is associated with a network resource, such as "Federated Stores Incorporated. In the attribute Object File numbers 64 contains a description of the facilities of the network resource to the subject area, for example, "dogs" (dogs). Attribute Summary File number 64 is a brief description of the network resource. In the attribute Type of File numbers 64 contains information describing the type of network resource, such as file RealAudio file. In the attribute Audience File Numbers 64 contains information about the intended audience of a network resource, such as Women age 19-34" (women aged 19-34 years).

The metadata definition for the network resource, linking metadata to the network resource and the copy of metadata on the server that contains the network resource, implemented the proposed manner provides significant advantages. For example, support for metadata comfortable. Since a copy of the metadata is hosted locally on the server that contains the network resource, the metadata can be updated at any time without having to contact the main service. As described hereinafter, the mechanism crawl metadata crawler mechanism) of periodically visits the t such a server to control for changes in metadata. If the File is non 64 changed after confirmation of the change is automatically propagated to the database and the index.

In addition, the combination of File numbers 64 acts as a distributed database metadata. Support for distributed database increases the scaling, since the modification to the metadata are not dependent on the availability of a single Central database. Further, the placement of metadata files in conjunction with a server device that hosts himself the network resource, improves data integrity. Only the user who is logged in on the location of files on the server, you may create a relationship between the metadata and the corresponding reference network resources this server.

Of course, one skilled in the technology will duly appreciate the fact that the metadata may alternatively or in addition, be placed in a Central database. The Central database may be periodically updated by various relevant network servers that contain resources or information about resources or can be manually updated by the Central administrator.

Another advantage is multilingual compatibility. XML supports symbol table of the UNICODE standard. As a result, the attributes placed in the File rooms 64, can be expressed n is any natural language.

System Phone Numbers

The use of metadata placed in the File rooms 64, in combination with a detection system network resource, the attributes of a network resource can be used to detect and connect to a network resource. For example, as described above, the phone number File 64 may be used to detect web page. On FIGU shows a block diagram of the performance of the detection system network resource, consisting of a Register (Registry) 10, Librarian (Librarian) 20, Index (Index) 30 and the Resolver (Resolver) 40. An experienced technology specialist will appreciate the fact that variations in performance of the presented system network discovery can implement the system for resources other than web pages.

It is clear that as shown above and hereinafter, the term "network address" in General means the unequivocal identifier of the location of the resource in the network, one example of a network address is a URL.

Registry 10 includes a database 12 in the form of a commercial database system such as SQL Server or another database. Registry 10 provides a centralized repository to associate phone numbers with network address or URL, as well as descriptive information associated with telephone numbers. By definition, each phone number is unique throughout the Internet or the another communications network and therefore is unique within the Registry 10. Registry 10 functions as a centralized, highly productive, scalable, continuously operating store all metadata. Registry 10 also contains statistics relating to the use of metadata in the context of the various services that are built on top of the Registry, such as the navigation system GO described in this document.

Phone numbers, network addresses and descriptive information are loaded into the Registry 10 using the Librarian 20. In a preferred execution, the Librarian 20 and 30 Index exchange database 12 using the ODBC interface. In a preferred execution, the database 12 has a capacity of about several hundred million records. Registry 10 and database 12 help to ensure an appropriate structure and vocabulary for web sites or other resources to be used.

Librarian 20 has a Service registration Service 22 and the Spider (Crawler) 24, each of which is connected to a database 12 and a network such as the Internet 50 or other communication network. Registration Service 22 receives a new connection, telephone numbers, network addresses, as well as descriptive information, and downloads ("registers") in the Registry 10. Registration Service 22 receives communications from the client 70 via the Internet 50. Crawler 24 moves over the Internet 50 (examining the Internet), periodically communicating with the registered resources, which are connected to the Internet, to the found changes in relationships, posted by or associated with such web servers.

System phone numbers interacts with one or more web servers or other resources that are connected to the Internet 50. As an example, one web server 60 shown in figv, but any number of web servers can be used in this design. The local database 62 is connected with the web server 60, so that the web server can retrieve the values from a local database for use in web applications executable on the web server.

File 64 is placed in connection with the web server 60 so that the web server can retrieve the File number and send its content to the Internet 50 in response to requests. In a preferred version the File numbers 64 locates one or more phone numbers. Each description phone number contains the phone number of the resource, the web server 60, the description of the resource, the network address or other identifier designated resource in the network, as well as other information about the resource, such as use of language and the intended geographical area of any use. Preferably, the File numbers 64 also places the ID of the grammar, which is used for formatting other information in the File rooms. Thus, the information in the File room is self-contained in the sense descriptions and independently researched is my language.

As indicated by path 29, the Crawler 24 can communicate with the web server 60 and retrieve values placed in the File rooms 64, using the connection via the Internet 50. As indicated in the path 28, the Crawler 24 may notify 30 Index that the index Files 34 must be updated to reflect changes in the information contained in the File room File Number 64.

Index 30 associated with the Register 10. Index contains 30 Builder index Builder 32 and one or more index files Index Files 34 which contains an index of all phone numbers, phone entries and resources known to the system. For example, the index Files Index Files 34 are index entries for the values placed in the File of 64 rooms. Index Files 34 constructed, operated and updated by Builder index Builder 32.

In General, in a preferred execution, files, Index Files 34 more compact than the indices supported by conventional search engines, because the amount of information presented to all Files 64 rooms, is significantly lower than the content of all network resources available on the Internet. Such compactness is an advantage, providing greater scale and sensitivity than conventional search engines. In addition, the compact size of the index files Index Files 34 allows the index 30 can be replicated in many different geographical m is Art.

The Resolver) 40 contains one or more resolution processes (resolver processes) R1, R2, Rn, each of which is associated respectively with the Service) 42, 44, 46. Each resolver process R1, R2, Rn associated with their respective Service 42, 44, 46 for receiving a query containing a phone number, conversion or permission phone number to a network address associated with the phone number, and send addresses and other information associated with the phone number to the requesting Service.

The client 70 is connected to the Internet 50. The client is a computer, server, web-capable device or wireless communication device or network in which the program is being executed, the web browser 74 under the control of the operating system 72. An example of a web browser 74 is Netscape Communicator. (3TM), as the example operating system 72 is Microsoft Windows 95.(3TM). System services phone numbers available to the client 70 via the Internet 50 using the browser 74 in accordance with the standard protocols of telecommunications or Internet/Web.

For example, under the control of the browser 74 and the operating system 72, the client 70 may establish an HTTP connection with the Registration Service 22 via the Internet 50. The browser 74 extracts page or form of the Registration Service 22, which are prepared in the format of a markup language like HTML. The browser 74 shows the pages or forms. The user client 70 reads the page is or enters information into the form and sends the completed form back in the Registration Service 22. In this case, the client 70 and Registration Service 22 executes a dialog that the user client 70 may perform the functions of the proposed system.

Preferably, the Service Registrations 22, the Spider 24, the Builder Index 32 and the Resolver 40 are one or more computer programs having functions and procedures described here. In one implementation, each of the Service Registrations 22, the Spider 24, the Builder Index 32 and the Resolver 40 is an independent process, and one or more instructions of each of these processes can be active and will be executed at each given point in time. In a preferred implementation, a computer program developed using an object-oriented programming language and programming tools such as Java language.

Service Registrations (Registration Service) 22, the Spider (Crawler) 24, the Builder of the Index Builder 32 and Resolver) 40 preferably are executed on one or more components servernya computers that can quickly access, manage and update the database 12 and the index files 34. These elements can be distributed and divided. For example, provided that the Resolver 40 and its processes R1, R2, Rn are running on the same server computer, and the Service Registrations 22, the Spider 24, and the Builder Index 32 operate on the same computer or on a cluster to which Numerov separate from the server, host Resolver 40. In this configuration, the Resolver 40 can quickly receive and respond to customer inquiries about how to obtain access to network resources that are hosted in the index Files index Files 34, without disturbing or affecting the operation of other elements and their functions.

In one of the performances Librarian (Librarian) 20, as well as other system functions may be available to the client 70 by establishing a connection with one or more administrative web pages (Web pages) 80, which provides functions using an HTTP connection. Administrative web pages (Web pages) 80 placed on a web server and is generated by a program that is installed on this server, which can communicate with other elements of the system. This program sends the top-level page to the client 70. The browser 74 client displays this page the top level, which is a menu of options for working with the system. For example, the preferred menu options are shown in Table 1.

Each of these options is the top-level menu can be selected by moving a cursor, which is generated by the client 70, in the name of the desired menu option using the input device and "clicking" them on the selected options. Functions executed when you select each of the menu options presented below in the context of the functioning of the module implementing this the function.

In the preceding discussion of the elements of the system have been described in relation to the Internet 50 as a unifying element. However, the Internet is just one more example of the connecting element, which can be used for communication between elements of the system. Other elements, such as a local area network, regional network, other wired or wireless network, an Intranet and an Extranet may also be used. At the same time, the Protocol relating to the Internet, such as Transmission Control Protocol and Internet Protocol, also not mandatory, other protocols can be used instead.

In this configuration, the system has advantages compared with other approaches. For example, the websites of the customer 60 is isolated from the database 12. The index files 34 is separated from the database 12 and the index Files are only available to Resolver) 40. This reduces the load time database and increases the ability to respond, and also provides scaling. This architecture is well consistent with the concept of a distributed File replication index.

The function of the Customer Profile

In one of the performances, the system provides the set to the customer a set of information management functions that allow you to locate, track, update customer information in the system. Information managed for each customer, called what is the Profile of the Customer. Profiles of customers reside in the database 12.

When this option is selected, the CUSTOMER/New customer, the system generates one or more web pages that contain forms that allow the user to enter a new user profile. The form has a field to record the name, address, phone number, contact person and method of payment, such web pages and forms are sent to the client 70 and shown in the browser. The user client 70 enters the appropriate information in the entry fields and clicks the" ACCEPT "button, located on a web page. In response, the client 70 returns to the system via HTTP the completed form. The system extracts the information from the field and places it in the database table 12.

In a preferred implementation, the registration process the Customer /New customer is initiated using the web page generated by the system in the form shown in Table 2:

TABLE 2
The MAIN REGISTRATION PAGE
Welcome to the website of the system of registration Numbers. Before you submit your Phone Number, you should provide us with some information about you and the organization you can imagine.
Clinicial registration process, you first need to enter your email address as your login name), and to choose a password.
You will also need to remember this username and password as the System Phone Numbers uses them to provide you with access privileges.
Name
Password
[BACK][NEXT]

In Table 2, indicate [BACK] and [NEXT] mean function buttons. The user enters the email address of the user in the Name field, and chosen by the user for a password in the Password field. When the user presses (clicks) the function button NEXT to the username and Password are in the database 12 in relation to each other.

Preferably, the system then displays the web page that contains a form that allows the system to obtain further information about the user. The form may have fields for entering the user name, address, city, region, postcode, state, and phone number, ID or nickname from the list of instant messaging, email address, mobile or landline communication, equipment type and model number. The user enters the required information and click NEXT. Alternatively, or in addition, certain information may be extracted from the information already available is Phnom on the user's computer, for example set the preferred language or country and city code contained in the web user's browser or operating system Windows user. The system checks each value to make sure that the format of the value complies with the requirements for each field. Values are placed in the database 12 in Association with the user name and email address. All together, this information is a Profile of the customer. When a customer profile is created, the user can create a record of type "phone number" and place them in one or more Files of 64 rooms.

Select the menu option the CUSTOMER /Edit profile causes the system to generate a web page that contains a form that allows the user to edit a previously created user profile. To protect transactions, the user's IP address is retrieved from the HTTP exchange, in which the user has used the option CUSTOMER /Edit profile. The user is allowed to view and modify only the profile that coincides with the previously created File rooms, placed on a server with the same IP address as the user. Based on the IP address of the user, the system displays the appropriate profile in the database 12, and extracts the content of the profile. The content of the profile is displayed on a web page.

Uses the user can then move the cursor generated by the client 70 to any other value shown on the web page, and make changes in value. When the user selects or clicks the "ACCEPT"button, filled values contained on the web page is sent to the system via HTTP. The system updates the database 12 using these values.

Select the menu option the CUSTOMER /Edit contacts allows the user to change the contacts on the payment associated with the registered File number.

Selecting the CUSTOMER/ Exit allows the user to terminate the current session or login under a different name of the customer. These functions are provided in the web program, which receives and loads the appropriate values in the Registry (Registry).

Service Registrations

On figa is a diagram of a preferred execution of the method of operation of the Service Registrations (Registration Service) 22 Librarian (Librarian) 20.

Preferably, the Registration Service 22 has a web interface through which one or more clients 70 may use the functions offered by the Service Registrations by selecting the function keys, located on a web page to activate the function.

The main function of the Service Registration is 22 registration of new phone numbers in the Register 10. In one of the performances, Service Registrations 22 is invoked by use the of options to Create on the page top menu. As shown in the diagram 200, an external user or "customer" system identifies itself to the system so that the information entered later can be associated with the customer. This information includes the email address of the customer, which can be directed to the customer Service messages Registrations 22 via the Internet 50. In this context, 'the terms "customer" and "user" refer to the operator's computer remotely connected to the system, such as client 70.

As indicated in the diagram 202, the customer then provides information to the Service Registrations 22 that identifies the network resource, the web server 60, based on its location, telephone number, descriptive information about the network resource. For example, the customer enters the phone number "212 555 3000" (he is the main number for a company named XYZ Corp), http://www.xyzcorp.com in the URL field, and a description of the resource. Preferably, such information is entered into the field of web page that is designed for the purpose of receiving such information, in the form shown in Table 3:

TABLE 3
PAGE RECORDS PHONE NUMBER
Phone Number: 212-555-3000
URL: http://www.xyzcorp.com.
the Fe:
Language: English
Region: North America
Description: This is the homepage of the manufacturer of the devices, XYZ Corp.
[BACK][NEXT]

When the user has entered all the information to continue processing the File rooms 64, the user presses the function button NEXT placed at the bottom of the page.

In response, in step 203, the system initiates a service review, which is the price described resolution service. For example, there may be a hold on a firm price based on the expected number of transitions per month for a specific resource. The expected number of permits for any particular site can be based on the available history of previous activity on this site. For example, MSN provides documentation of the number of clicks per month on various websites. Referring to this database, the system can determine how many hops it is expected on the web site identified by the user, and the system will set the appropriate price for a user with payment in advance or upon execution.

In step A the user is informed about the payment for services provided permission and he or rejects the payment and exits the program, or animal payment and proceeds to step 204.

In step 204, the Service Registrations 22 creates a File Rooms 64, based on the information entered by the customer. Thus, the File Numbers 64 is hosted on a server available to Service Registrations 22. However, the File Numbers 64 until placed in conjunction with the web server 60.

In block 205, the Service Registrations 22 randomly generates a file name for the File Numbers 64. Random file name is used to prevent unauthorized access of programs, processes, or users to identify or change the File Rooms 64, when it is placed in Association with the web server 60. If you used the same name on any web server is registered by the Register 10, an authorized user can modify the record made in the File Rooms 64, referring to another network resource. In the end, as will be shown later, the Spider 24 has detected the change and put the phone number in the Register 10. Accordingly, it is desirable to hide the name File 64 rooms from unauthorized users.

In block 206, the File Numbers 64 is sent to the customer as a file attachment to the email. The object 206 includes the step of receiving the e-mail message from the user. In the preferred implementation, the system displays the web page with the input field of the e-mail address into the form shown in Table 4:

TABLE 4
PAGE WRITE EMAIL
Please enter your email address where we can send you a File of phone numbers that you just created.
joe@xyzcorh.com
[BACK][NEXT]

After sending the user File Numbers 64 e-mail, the system displays a confirmation page to the client 70. In a preferred implementation, the confirmation page has the form shown in Table 5.

TABLE 5
The CONFIRMATION PAGE
Your Phone Number was sent to the address joe@xyzcorp.com. Now You should save this file on your web site in accordance with the instructions in the message you will get. After the execution of this step, the file must be enabled via the services File activation Phone Number. (Just follow the above link or contact customer Service, refer to the menu item Activation related to the category of the File MLS.)

[END]

In step 208, the customer sets the File number 64 on the web server 60 or the way available on the web the server. Preferably, the File Numbers 64 is placed at a location on the web server 60, which is described by the Service Registrations 22. For example, the email message describes that the File Numbers 64 must be installed in the root directory of the network resource that is named in the File of 64 rooms. This is done to ensure that the receiving client is authentic; Service Registrations 22 assumes that the only authentic representative of the customer may have access to the root directory of the web server that hosts the named network resource. The root directory is also indicated for the convenience of the customer. When the File Numbers 64 is placed in the root directory of the web server, the customer can change or reorganize the web server without affecting the File rooms. On the contrary, if the File Numbers 64 would be placed in a sub directory of the web server, then it could be a risk of disabling File number when you accidentally delete the directory in which the File was kept.

In block 210, the customer confirms the Service Registrations 22 that the File Numbers 64 was placed by the customer in the described location. Confirmation of the Customer can be provided in the form of email messages sent to the Service Registrations 22 or by entering an appropriate command using the web Service interface Registrations 22.

Then the user is required to activate the File rooms. Activitati what is the validation process, that File is available in the right place and by the authorized user. Optionally, the activation process may also include the payment for the privilege of File numbers to be registered and recognized by the system. One of the performances of the method of activation is shown in figv.

In the preferred implementation, the user activates the File number after it has been created by selecting the FILE menu MLS /Activation from the list of menu options at the top level. In response, as shown at 212, the system creates a page that asks the user to enter the activation type and sends the page to the client, which displays it. For example, the system displays a page of the form shown in Table 6:

TABLE 6
PAGE select the TYPE of ACTIVATION
Please select the service you want:
(*) Live update previously registered File Number.
(*) Check the new File Numbers on your web-site.
[BACK] [NEXT]

Preferably the symbols shown in the form "(*)" in Table 6 above are displayed as radio buttons or other graphical elements, which can be carried out in the Bor user. When the user selects the first option ("Live update previously registered File Number "), as shown in 214-216, the system activates the Spider (Crawler), which finds the File number of the Internet user updates the database 12, as described below. Thus, the "Live update" allows the user to force the system to find the modified File rooms and updated with new information. Alternatively, as described below in connection with the Spider (Crawler), the user can just wait and Spider (Crawler) eventually will find the modified file and updates the database.

When the user selects the second option ("Register a new File Number on your web-site "), as shown in the 220-222, in response, the system generates and sends to the client 70 web page from which the user can enter payment information pertaining to the user and to the File Number in accordance with the counted amount and the actions taken in steps 203 and A. Steps for payment of the activation process are completely optional part of the process, and other performances do not involve any payment mechanism, including those relating to steps 203 and A. In designs that use payment mechanisms, the web page contains fields for entering information related to the payment. For example, field account type credit card numbers CT is s, the date of expiration of the card and name card holder. The system retrieves the values of the fields of the payment information in block 224.

In block 226, the system prompts the user to enter the network address of the File in order to activate it, and a description of the File Number.

In block 228 Service Registrations 22 creates an HTTP connection with the web server 60 requests and downloads a copy of the File Numbers 64. This step is performed in order to verify that the File Numbers 64 valid and posted in the right place. In block 230, the File Numbers 64 parsed and extracted from it the value that identifies the network resource. In block 232, the system creates a web page that reflects all of the values identified in the analysis process from the current File Rooms 64, and sends the page to the client 70. On a web page, the system displays the following message:

File rooms, which we have downloaded from your site, contains the following entries. Please check the accuracy of these records. Click NEXT to continue.

[BACK] [NEXT]

As shown at block 234, the user looks at the records, checking their correctness, and clicks on the button NEXT. If some of the values are incorrect, the user presses the BACK key, which advance the range function to EXCUSE, are described here.

In the preferred implementation, the system then displays the web page that contains a written legal agreement providing for the payment of the fee for registration and dispute resolution, including legal, as shown in blocks 236-238. Agreement "signed" by clicking on the button "ACCEPT" or "REJECT". To accept the agreement and continue the Registration the user presses the ACCEPT button. To reject the terms of the agreement and termination of the process of Registration the user clicks the button to REJECT. The use of a legal agreement is completely optional, and do not use such an agreement is also considered here and is the subject of the present invention.

The system then places the values extracted in the analysis of File Numbers 64 in the database 12 of the Case 10, as shown in block 240.

For security purposes, network address or URL of the File Numbers 64 must coincide with the root directories web server 60. This prevents the redirection of telephone numbers to unauthorized other network addresses. It also prevents the owners of the web server 60 from redirection to the web server to any other telephone number that the server owner does not possess.

In block 242 Service Registrations 22 notifies IndexBuilder 32, that was a new record created in the database 12. Route 26 on FIGV is of such notice. The notification includes information sufficient to identify a new entry in the database 12, such as a row identifier ("rowid") of the table in which to place the new record. In response, the Index Builder 32 performs a live update of the Index Files 34, as explained below.

Therefore, the File Numbers 64 user-created, activated and becomes available for use by the Resolver 40.

In a preferred execution, the database 12 may receive requests from registered members of the system. As a result, a registered member may send requests to the database 12, which cause the database to display the current registered information about network resources or web pages or other structures. Accordingly, if another registered user to register information, which is in a false light the contents of the network resource of the user, the distortion may be detected and reported to the Register for action adjustments. Thus the procedure of Registration, and open the possibility to query the database 12 allows the system to avoid fraud, which is possible with the help of unintended use of the Oia meta tags.

Changing and deleting the information of the File Rooms

After the File is created Rooms which have one or more entries, the entries can be edited or deleted using the MLS FILE /Edit FILE and MLS /Delete shown in the list of the top-level menu.

When the user selects the function of the MLS FILE /Edit, the system reads the MLS file from a server associated with the user, and displays the contents of this file on a web page in the form shown in Table 7.

The page consists of sections of text instructions, the set of functional buttons edit and list of records currently in the File Rooms. Text instructions explain the functions performed by the functional buttons. In a preferred implementation, functional buttons this page apply to all records of the File Numbers and not on the fields separately. For example, to edit the record, the user selects the corresponding phone number, such as "212-555-1235" and clicks the EDIT button. In response, the system displays the edit page of the entry that contains the selected record. The user can enter the changed text in the field entries on the edit page.

Similarly, to delete an entry, the user selects the appropriate word and clicks REMOVE THE . In response, the system creates a new File Number that contains all previous records, except records selected for deletion.

To add a new record to the displayed File Number the user clicks the ADD button. In response, the system displays the page in the form of Table 3, discussed above in connection with the creation of a new File Number.

To activate changes made with EDIT, DELETE and ADD the user clicks the NEXT button. On clicking NEXT causes the system to create a new File rooms, preferably in the above XML format. The system sends by email the new File number of the user in the corresponding explanatory message. For security purposes, the user is required to put the new File Numbers in the directory, prescribed by the system, as in the case of creating a new file.

Spider (Crawler)

On the chart of the sequence of operations figure 3 shows the performance of the method is preferably used by the Spider 24. In the preferred implementation, the system includes a process Scheduler that initiates the activation and operation of the Spider 24. For example, the Scheduler places the events schedule. The event sets that Spider 24 must be performed every twenty-four hours. After the occurrence of the scheduled event Scheduler runs the Spider 24.

The unit is 302 Spider 24 reads the database 12 of the Case 10, and retrieves one or more rows, or records, to identify network resources, sandersonia in the Index Files 34. The method of selection of rows or records is not critical, and therefore can be used in several different schemes. For example, the Spider 24 can select all rows or records that were not updated since the last time the Spider. Or Spider 24 can select all rows or records that were created for a certain period of time or that are older than a certain number of days. Or Spider 24 selects a list of recently updated records. In the preferred implementation, the system also establishes communication between phone numbers and filenames MLS and placements called a Table of information about the File Info table). Spider compares the selected row to a Table of information about the files and sets the network address, the location or URL of the File Numbers associated with each telephone number, string or record.

For each of the selected rows or records in a block 304, the Spider 24 polls the web-site of the customer, which is represented by a row or record, trying to find the update in the File Rooms 64, which is placed in connection with the website. The survey includes the step of establishing an HTTP connection with the web site, requesting and receiving a copy of the File Rooms. The spider 24 analyzes the File Number using an XML parser to find for the of n telephone numbers, as well as the values within each record phone numbers that contain a telephone number, network address, as well as descriptive information about the network resource. XML parser exists and can be purchased from Microsoft®Corporation.

For each record in the File room, as shown in block 306, the spider 24 checks whether the entry line or record in the database 12. Thus the Spider 24 determines if the contents of the File Room of records in the database 12. If so, as shown in block 308, the Spider 24 updates the database 12 and requests the Builder index Builder) to rebuild the index entry associated with the updated row or record in the database 12.

In this way the Spider 24 polls the web sites on the Internet 50 to detect the sites of the clients have been updated. Because the Files of the Rooms are spread in the network on a large number of sites of customers, each customer can change their File Rooms at any time. The customer does not need to inform the system of telephone numbers, as the Spider 24 in the end will detect every change and update the database 12, respectively. So, the Librarian 20 automatically controls the changes in the File Rooms, distributed in the network, and periodically updates the Register 10 in accordance with the changes. Profitable that customer and end users are not involved in the process of updating the database 12; The spider 24 updates the database automatically.

In a preferred execution, the customer can instruct the Librarian 20 to immediately perform the Program of the Spider 24 in relation to a specific web site. In this case, modify the specific File Numbers instantly detected and loaded into the database. The customer activates the instant execution of the Spider 24 by selecting a Live Update from the top menu. In a preferred implementation, the system also performs once a week, a full update of the Index Files 34, based on the contents of the database 12. So at least weekly. The Index files 34 are constructed anew on the basis of the current contents of the database 12.

In an alternative implementation, the Spider 24 also confirms the validity of each location of network resources that are identified by each File Number. For example, the Spider 24 is trying to establish a connection and download each resource, which is identified in the File record number. If an error occurred, creates a corresponding Email message and sent to the contact person of the organization that registered the File Rooms. This message informs the contact person that the File numbers are wrong location of a network resource.

Builder Index Builder)

The index contains 30 Post Otel Index 32 and the Index Files 34. Builder Index 32 is a program or process that operates in two modes. In the first mode. Reconstructive process Builder Index 32 periodically polls the database 12, detects changes in the database and indexes dirty phone entries in the Index Files 34. In the second mode, the Builder Index 32 updates the Index Files 34 in real time, performing a queue of instructions to update the indexes. Figure Fi is a block diagram of a preferred implementation of the Builder Index 32. Computers that are marked GO Machines 100, 102, 104, each performing a program Builder Index 32. Each of the cars GO Machine 100, 102, 104 associated with the processes of the network interface M1, M2, Mn Agent Queue Agent) 92a. Agent queues 92a is connected to the network 106, such as a local network, and receives requests to build the index entries from the Librarian 20. Agent queues 92a distributes a copy of each request to one of the network interfaces M1, M2, Mn, which in turn passes the request to its associated car GO 100, 102 or 104. This architecture responds well to external requests and is resistant to errors.

Within each GO machine Builder Index 32 is associated with a pair of queues 90a, 90b and a pair of indexes 34a, 34b. Service GO 42 may have access to any of the indexes 34a, 34b, but in each individual the first time is associated with only one of them. The resolver 40 is absent in figure 4 for clarity, but it should be clear that the Service GO 42 accesses each index 34a, 34b through the process By 40.

For Service GO 42 it is important to maintain constant communication with one or another index. Accordingly, using the architecture shown in figure 4, the Builder Index builds indexes, using the following process. Service GO associated with index 34b and has instructions to send a resolution request phone numbers only index 34b. As soon as the request for the index comes from the Agent queue 92A in the Builder 32 Index Builder 32 Index adds requests to both queues 90a and 90b. When one of the queues becomes quite full, for example, a queue 90a, Builder Index 32 sequentially removes entries from this queue, in order of "first-in-first-out (FIFO), and updates the index 34a account each queue. At the same time, if you received any new requirements on the construction of the index, they are sent in both queues. When the queue 90a empty and the index 34a fully updated. Builder Index 32 instructs the Service GO 42 to pass the requirement on the resolution of the phone numbers only index 34a. Builder index 32 then removes the entry from the queue 90b and only updates the index 34b from this queue. Thus the Builder Index 32 m who can add index entries to one of the queues 90a, 90b, but always updates only one index per unit of time using the contents of only one queue per unit time. The queue from which the Builder Index 32 communicates, is always opposite or complementary to the indexes 34a, 34b, with whom the Service GO 42 is connected to the current time. Therefore, the Service GO 42 is in constant communication with index, and the Builder Index 32 can update the index in real time without interrupting the process of resolving phone numbers.

Preferably, requests for building contain the ID called "FileId", file, or terms, linked Table Information File or TYPHOID (File Info table)described above. Builder Index 32 looking for FileID in TYPHOID and retrieves all records in the database that match the FileID. Each database record contains a unique identifier, which is described in the database record. These unique identifiers are generated using the generator sequence database server. Using the unique ID of the database record that matches the FileID, the Builder Index retrieves a matching entry in the index. Information index entries is compared with information contained in the request to build. If the information in the build request is different, the record index update is changing. If the information in the build request indicates that the associated network resource is no longer active or offline, the index entry is deleted.

To ensure scalability, reliability and rapid response, each of the GO machines 100, 102, 104 has a similar configuration and operates in parallel with others. Although figure 4 for illustration only shows three GO machine 100, 102, 104, the system may use any number of machines. In a preferred execution, the Scheduler determines when to start the execution of the Builder Index 32.

The Resolver)

In General, the Resolver 40 functions as a query interface to the metadata posted on the Register 10. The resolver 40 operates by receiving the telephone number as requests from services 42, 44, 46, queries the index 30 to determine a network address corresponding to the specified phone addresses, and responds services, transmitting the detected network address. The resolver 40 is constructed so as to respond quickly to a search operation and to serve millions of requests per day. To minimize response time and scale out, answering the query, the Resolver 40 is not directly access the database 12 of the Case 10. Instead, the Resolver supports communication with Index 34, which is located in fast main memory.

In a preferred implementation of the Resolver 40 is funkcioniruet on any number of multiple processes R1, R2, Rn, each of which is associated with the service 42, 44, 46, which generates a query to the Resolver. Services 42, 44, 46 communicate with the processes R1, R2, Rn Resolver using the HTTP connection. It is preferable that the computers executing the program of the Resolver 40, had a configuration with triple redundancy. This configuration provides fast response to service requests 42, 44, 46 and reliability. Each of the processes R1, R2, Rn executed in a web application that performs the Resolver. Services 42, 44, 46 communicate with the processes R1, R2, Rn Resolver using an HTTP connection.

In one of the performances of the process of the Resolver 40 is made in the form of a dynamic library links (dynamically linked library or DLL), which is integrated into the services 42, 44, 46. In a preferred execution of each of the processes of the Resolver 40 is a standalone process or program that operates in accordance with the method shown in figure 5. The resolver 40 is executed with one or more APIs (creation interface application programming interface)that allow you to create services that use the Resolver, such as yellow pages and search services.

As shown in blocks 502-504, external web client, server, or the browser, such as the client 70, refers to the Resolver 40. In one of the performances, the client 70 establishes a connection with the Resolver 40, is using an HTTP connection. In block 502, the client 70 creates a HTTP connection to the Resolver 40. In block 504, the client 70 provides the URL Resolver, thereby requesting to return the network address corresponding to a particular telephone number. For example, the URL presented in the form of http://www.resolver.com/resolve? tn=TELRPHONE NUMBER. In this form of the URL string "http://defines the URL as HTTP request "www.resolver.com" is the server's domain, a "resolve" is the name of the program executable on the server for the specified domain, which itself is the Resolver. The expression "tn=TELEPHONE NUMBER" transfer value "TELEPHONE NUMBER" parameter "rntn, which is recognized by the resolver. In cases where the phone number is available, together with the codes of the city and country, the client browser is preferably programmed to add country codes and city to a phone number that is entered by the user without one or both codes. Such information can be obtained as the secondary of the installations of the operating system Window the user.

In another implementation, the client 70 establishes a connection with one of the services 42, 44, 46, connected with the processes of Resolver 40. Services 42, 44, 46 communicate with the client 70, requesting and receiving phone number.

So, in one case, the Resolver 40 receives the telephone number requested by the client 70. In response, the Resolver 40 build-qualifier (Qualifier object), which in the main memory contains t the telephone number. In block 506, the Resolver communicates with the Index 30 and makes a request of the network address or URL that corresponds to the phone number in the client request 70. In a preferred execution of the request is performed by sending the host Object index object Store) message containing the Object specifier. Accommodation index summarizes or provides a brief explanation of the Index 30. Accommodation index performs a query against the index.

In block 508, the Resolver 40 receives a response from the Index 30 that contains the network address or URL that corresponds to the phone number in the client request 70. In a preferred implementation of the accommodation index returns the Object set Entry Set object) to the Resolver 40. Object the recordset contains or refers to a set of one or more entries from the Index 30, which correspond to the requested telephone number. Preferably the Object is a set of records generated to give the location or URL of the network resource described in the record object.

The use of Object the recordset allows the system to function when you type only a part of a phone number. This is particularly useful when the user presents the system knows only part of the telephone number which you are seeking information. As an example, uses the Vatel, who knows only the last four digits of the phone number, you may enter "3421". Object the recordset will contain all records of phone numbers ending in "3421", i.e. for example the number "212-324-3421", "213-247-3421" and "702-397-3421", and the user can then select a number or an appropriate resource, from his point of view is the target resource.

Accommodation index also contains the logic for ordering the entries in the Object set of records based on excessive use. If the Object the recordset has only one entry, the ordering is not required. If the Object the recordset has more than one record, then the record can use any preferred method of ordering.

In block 510, the Resolver 40 generates an outgoing message based on the response index. In a preferred implementation of the Resolver 40 generates an XML file containing information from the response Index 30. In the preferred implementation of each of the services 42, 44, 46 is supplied by the XML parser, which can convert XML file created by the Resolver 40, text or other information in the format used by the client 70. In the preferred implementation, each record referred to in the Object set the record also contains a value that indicates the number of times the entry was permitted (is sought or has been used). Number of can the be used to rank the records during the display or used in another way one of the services 42-46.

Preferably, after the resolution of each phone number, the Resolver 40 recorded in the log file 84, which include the phone number, the total number of permits in the past, including the current resolution, IP address and domain name of the client or the server that requested the current resolution, and the time at which it happened resolution.

In a preferred implementation of the Index 30 and the Resolver 40 is physically running on the same computer, and the Index Files 34 housed in the main memory of the computer. This configuration improves the response time of the Resolver 40 by providing quick access to the Index 30. Assume that the Resolver 40 is responsible for tens of millions of requirements to allow phone numbers a day. In a preferred implementation of the Index 30 and the Resolver 40 is also made in the form of a variety of software COM object (Component Object Model or COM)that is exchanged with an executable library AltaVista, using the API AltaVista. The license for the Executable library AltaVista sold by Digital Equipment Corporation in the form of AltaVista SDK (Software Development Kit or SDK).

In an alternative implementation of the Resolver 40 is able to distinguish between addresses that are related to the Internet, a local area network or "intranet", and is also available outside the local business network "extranet". In the intranet version of the Resolver 40 is drawn into the Register 10, which RA is substituted within the organization, which owns and controls the operation of the Resolver. Register 10 contains information that describes the resources of the intranet. In particular this applies to organizations that have based PBX phone system that uses four internal or participarea expansion of the internal phones. The resolver 40 turns the phone number or extension entered by the user in the address allocation intranet resources, and navigating users to these resources.

Services

Services 42, 44, 46 can be performed in several ways. In one embodiment, the GO service 42 is a computer program that is installed or attached to the browser 74 client 70. For example, the GO service 42 is installed on the client 70 as a plug-in (plug-in) to the browser 74. The user loads the GO service 42 from the Central site distribution and hosts the service on the client 70. The user performs the installation program that installs the service on the browser 74. After installation GO service 42 intercepts the telephone number entered by the user in the browser 74 and allows phone addresses in the network address used by the browser 74.

Figure 6 shows the block diagram of the method of functioning of the GO service 42 in the specified configuration. In block 600, the user invokes the execution of the browser 74. The browser 74 has a field with the introduction of the URL, which the user things differently request prints the network address of the document to retrieve and display in the browser. In block 602, the user enters a phone number in the box to the introduction of network address. In block 604 the GO service 42 captures keystrokes made by the user when printing in the field of introduction of the network address of the browser 74, and thus receives the phone number entered by the user.

Then the control is passed to block 609. In block 609 service 42 queries the Resolver 40 to allow the phone number received from the browser in the network address. For example, service 42 generates a URL that refers to a predefined location in the system where the Resolver 40. This URL contains a parameter that is passed to the Resolver 40, the telephone number received from the browser. Service 42 opens an HTTP connection with the client 70 to the Resolver 40, using this URL, containing the phone number. The resolver 40 retrieves the phone number from the URL and resolves as described above. The resolver 40 then returns the value of the address of the network resource, the HTTP message to the browser 74.

If the corresponding value of the address of the network resource is received from the Resolver 40, in block 610, the GO service 42 redirects the browser 74 on the network address found by the Resolver 40. For example, service 42 retrieves the address of the network resource from the HTTP messages received from the Resolver 40, and transmits it to the browser functions 74, which can load and display a web page, the Browser 74 then loads and displays the file or page, located at the network address in the usual manner. Alternatively, if you receive more than one value of the location of a network resource from the Resolver 40 in response to receiving the Resolver 40 is only part of the phone number, then in block 610, the service displays a list of values of the locations (addresses) of network resources. The results are shown in order from more important to less important permissions, based on the values of permits processed and contained in the Statistical service (Statistics Service) 82. In another embodiment, the service returns to the client 70, the HTTP response containing the XML that contains the query results.

In an alternative execution of the GO service 42 is designed as a web application executing on a dedicated web server. To search for a network resource, the client 70 establishes a connection with the web server GO using a predefined address or URL. In response, the web application service GO 42 shows a web page containing a form with a field of data entry. The user vpechatlyaet telephone number of the network resource in the field of data entry. GO to the server 42 detects a network resource, as described above.

In another alternative execution of the GO service 42 is associated with the button or panel built-in web page on an external web server. Button or panel is secured network address or URL that calls the GO service 42, Bogdanovka or a panel selected by the user, viewing an external web server. This configuration provides the ability to enter the telephone numbers that do not require a browser.

In another alternative execution of the GO service 42 includes a mechanism to detect and respond to the language used by the client 70 that communicates and makes a service request to GO, specifying the country code in this way. Suppose the computer that runs the Service, GO 42, operates using character set UTF-8 and English, while the client 70 uses the Japanese language and encoding a different set of characters. When the Service GO 42 sends to the client 70 a web page that contains the form you enter the phone number, the web page includes a hidden field placed there a predefined text string. The client 70 receives the web page and its the browser or the operating system converts the web page into a set of characters that he uses. The user client 70 enters a phone number in a web page and sends it to the Service GO 42. Service GO 42 receives the web page, extracts the value of the hidden field and compares this hidden value to the table or compares the value of the hidden field with a different set of character encodings and languages. Service GO 42 determines the appropriate character set and language. Using the language (country code), the GO service 42 selects the resource with the tributary of the meaning of the language in section 906 metadata resource. Thus, the system determines the language of the client that sent the request and gives the resource corresponding to that language.

In another alternative implementation, the Service GO 42 and the Resolver 40 use the values of the metadata File rooms 64, associated with the resources for answering extended requests. For example, suppose that United Airlines registers the File rooms 64, which describes the resources on several different languages such as English, French and Japanese. The user finds a web site owned by United Airlines, which is located in France or prepared in French. The user enters in the GO Service 42 phone number reservations United Airlines in the United States by adding thereto the words "France" like this: "1-800-241-6522 France. The resolver 40 compares the entry with metadata fields section 906 Description, Region and Language, related File numbers 64 United Airlines. The resolver 40 and Go service 42 redirects the user's browser to the website of United Airlines, performed in French.

In an alternative implementation, when the GO service 42 is designed as a plug-in to the browser on the client 70, GO service provides information on character encoding of the Resolver 40. To get the character encoding currently used by the client 70, the GO service 42 calls the operating system function, which works the AET on the client 70. GO service 42 adds information about the client uses the character encoding for the URL to send the user request to the Resolver 40. In this case, the Resolver receives information that specifies the language and character encoding currently being used by the client 70, and may return the address of the network resource corresponding to the given language.

In an alternative execution of the computer system further includes a microphone connected to the analog-to-digital Converter (ADC). This ADC is connected via an interface bus of a computer system. Running the system software driver, or another appropriate program ADC receives an analog audio signal from the microphone and converts it into a digital signal. The driver or other program receives the digital signal and converts it into a phoneme string of words, keyword or command to GO service 42. The converted signal is used the GO service 42 as the incoming signal, replacing him with the keyboard or mouse. Thus, the user can view the user interface 1000 and saying words into the microphone, giving the GO service 42 to search for specific network resources. Thus, the user uses the navigation through the web, using words (numbers) of the spoken language.

Another alternative implementation is shown in Fig.9 Service performed in the form of a web server or an intermediate Web application server 60A. The web application server 60A communicates with the client 70 using HTTP messages through the Internet 50. The web application server 60A includes script processor interface the Common Gateway Interface (CGI), an application server, such as server Netscape Kiva, Microsoft Active Server, or Apple WebObjects (ZTM). A software application executing on a Web application server 60A, is exchanged with the Resolver 40 via the Internet 50 via path 40A, 40b, using CGI scripts to generate HTTP requests and responses. The web application server 60A uses function calls provided by the API Resolver 40 for communication over the path 40A, 40b. Using this scheme, the Web application server 60A produces a query containing a query to the Resolver 40. In response, the Resolver 40 evaluates requests, queries the Index 30 and creates a set of metadata for all records in the index, reflecting the web pages that satisfy the query. The metadata set is packaged in an XML file and is delivered by the Resolver 40 Web application server 60A. The web application server 60A has an XML parser (parser, which can parse XML from an XML file. Using the parsed XML, Web application server 60A generates one or more HTML documents and delivers them to the client 70. The client 70 shows the HTML documents to the end user.

Service Statistics (Statistics Service)

As described above with respect to the Resolver 40, each time By producing the t resolution phone numbers he writes a note about this in the log file. The system has the Statistics 82, which is responsible for reading log and load log information in the Index Files 34.

In a preferred execution Statistics Service 82 operates periodically based on a schedule. Service Statistics 82 reads each record of the log and creates an index object, based on information contained in the log. Then Statistics Service 82 sends a message to the Builder Index 32, which requires the Builder Index constantly to place the values in the Index Files 34. In response Builder Index 32 places the values in the Index File 34.

Page top-level menu system has hyperlinks that allow the user to access statistics and functions of the payment of bills.

When selected STATISTICS AND PAYMENT of BILLS/ Statistics, the system generates a web page 700 in the form shown in figa. The web page 700 has a list of options top level 702. The set of functional buttons 704 allows the user to create other global functions such as address resolution, the introduction of information about the new customer, obtaining support services users and expanded information on the system telephone numbers.

Function buttons reporting 706 allows the user to access the functions you created the report system. In this version button reporting 706 include buttons Select Records 712, the timing 714, a Report to Write 716, Report on facilities 718.

Button Select Records 712 is used to determine the list of records within the File numbers for which should be generated reports. When the user uses the Select key Accounts 712, the system reads the File numbers from the server with an IP address that matches the IP address of the current user's domain. The system analyzes the File rooms and displays a list of all phone numbers on the new web page, which is sent to the client 70. This page displays a picker - the so-called radio button adjacent to each telephone number in the list. The selection by clicking on the radio button, then the web page is sent to the system, the system provides statistical information for all selected telephone numbers in all of the reports that will be generated later.

Button timing 714 is used to set the time period for which you want to generate statistical reports. When the user uses the Select button time 714, the system generates a new web page and sends it to the client 70. This web page includes a form where the user enters the start date and the end date of the report. When the user adalatzapomnit page in the system, the system receives and places the received date values. Later, when a report is generated, it will contain statistical information for the permissions of phone numbers that occurred between these dates.

The Report button to Record 716 is used to generate reports and graphs that reflect resolution of all phone numbers that have occurred for each telephone number documented in the current File number. When used the Report button to Record 716, the system reads the statistical information, which is available in the statistical tables in the database 12 for each of the phone numbers that are defined in the current File number. The system generates graphs and statistical reports and generates a web page containing these graphs and charts.

On figa shows an example of a web page generated in this way. Graph 708 contains illustrative histogram. Each bar represents the phone number defined in the current File number. The vertical axis 720 shows the number of permits (in thousands) for each phone number. The horizontal axis 722 shows each Number for which the statistics in the report. Statistical 710 square contains a column 730 description, taken from the Description field of the File Number, the column number of the solution is 732 and the percentage column 734. The description column 730 lists each phone number and its Description, which is defined in the current File number. The column number of permits 732 gives the number of permits phone numbers that occurred during the current specified period of time. The percentage column 734 each phone number shows the percentage of all permissions that are attributable to the resolution of this phone number.

On FIGU shows an example graph of a different type, generated by the statistics service. The vertical axis 720 is the number of permits each phone number. The horizontal axis 722 contains many columns 738, each of which is associated with the phone number. The bar represents the number of permits such phone numbers. The second vertical axis 736 shows the percentage of all resolutions made by the system in relation to telephone numbers listed on the horizontal axis 722.

In such embodiment, the system owner telephone number receives payment from end users who have registered a phone number in the Register 10. Librarian 20 generates a request for payment on account of each user when the system starts a new record via the Service Registrations (Registration Service) 22. In another implementation, end users and customers from among those who register phone numbers to which egistra 10, pay remuneration to the owner of the phone numbers for each resolution produced by the Resolver 40 in response to the request of third parties. The resolver 40 generates a request for payment on account of each user, after the end of each permission. In this version information about the withholding remuneration from the customer accounts documented and collected in a database table 12. Periodically, an external accounting program reads the chart of accounts and payments from the database 12 and generates invoices that are sent to users. The menu option STATISTICS AND PAYMENT of BILLS /Statistics from the menu list 702 allows users to see and explore in real time balances and current payment users registered entries of phone numbers, as well as to take into account the amount of payment for services permissions. When you selected Payment accounts, the system reads the chart of accounts and payment from the database 12 and generates a web page report summarizing the payment system by the customer. This web page is sent to the client 70 and shown him.

Hardware overview

On Fig shows a block diagram illustrating a computer system 800, on the basis of which can be carried out the execution of the invention. System Fig is intended for the embodiment described above is applied is the first for permission web pages, using a phone number. Experienced in the technique specialist will appreciate the fact that the system Fig can be modified to use known methods and components for execution of resource permissions other than those described above, such as mobile phones, PDA, and so on.

Computer system 800 is comprised of bus 802 or other mechanism for transferring information, and the processor 804 is connected to the bus 802 for processing information. Computer system 800 also includes a main memory 806, such as a RAM (random access memory or RAM) or other storage device connected to the bus 802 for posting information and instructions designed for execution on a processor 804. Main memory 806 can also be used for temporary variables or other intermediate information during execution of instructions designed for execution by processor 804. Computer system 800 further includes ROM (read only memory or ROM) 808 or other permanent storage device associated with the bus 802 to host static information and instructions for processor 804. The storage device 810, such as a magnetic disk or optical disk, is also present and is connected with the bus 802 for posting information and instructions.

Computer system 800 may be connected across the bus 802 display 812, such as a cathode ray tube (CRT), for displaying information to a computer user. The input device 814, including alphanumeric and other keys, coupled to bus 802 to exchange information and commands with the processor 804. Another type of input device is cursor control 816, such as a mouse, trackball, or cursor control keys for transmission of the guide information and the selection command processor 804, and for controlling cursor movement on the display 812. This input device typically has two degrees of freedom in two axes, a first axis (x)and second axis (y)that allow the device to be positioned on the plane.

The invention relates to the use of computer system 800 for providing the implementation of the systems network discovery via their phone numbers. In accordance with one version of the invention, detection of a network resource is provided by computer system 800 in response to execution by the processor 804, one or more sequences of instructions contained in main memory 806. Such instructions may be read into main memory 806 with other media computer information (computer-readable medium), such as a storage device 810. Executing sequences of instructions contained in main memory 806, prompts the processor 804 to perform the steps of the process is, as described here. In alternative designs may be used a different mounting scheme instead of or in combination with software instructions to implement the invention. Thus application of the invention is not limited to any specific combination of schemes of hardware and software.

The concept of "media computer information" ("computer-readable medium"is used to refer to any medium that participates in providing for execution of the instructions the processor 804. Such media, including, but not limited to, may be non-volatile media, volatile media, and transmission media. Non-volatile media include, for example, optical or magnetic disks, such as storage device 810. Volatile media include dynamic memory, such as main memory 806. Transmission media include coaxial cables, copper wire and fiber optics, including wires that comprise the bus 802. Transmission media can also take the form of acoustic or light/radio waves, such as those created in the process of communication in radio or infrared wave bands of data.

The General form of media computer information includes, for example, floppy disk, flexible disk, hard disk, magnetic tape or any other magnetic wear the spruce, CD-ROM or any other optical medium, punch cards, punched tape, any other physical media with the application of holes, RAM, PROM, and EPROM, flash memory, any other memory chip or cartridge, a carrier wave as described below, or any other medium which can be read by the computer.

Various forms of storage media can be used for carrying one or more sequences of one or more instructions to the processor 804 for execution. For example, the instructions may initially be recorded on a magnetic disk of a remote computer. The remote computer can load the instructions into a dynamic memory and send the instructions over a telephone line using a modem. The modem is placed near the computer system 800 may receive data through a telephone line and use an infrared transmitter to convert the data to an infrared signal. The infrared receiver connected to the bus 802 may receive the data brought an infrared signal, and to transmit data to the bus 802. Bus 802 transfers the data in main memory 806, from which the processor 804 retrieves and executes the instructions. Instructions received by the main memory 806 may choose to be placed on the storage device 810 before or after execution by processor 804.

Computer system 800 also who engages communication interface 818, associated with the bus 802. Communication interface 818 provides two-way communication, connected with a network link 820, which is connected to the local network 822. For example, communication interface 818 may be a card or modem digital network integrated services (integrated services digital network or ISDN) to provide the data connection to the telephone line of the appropriate type. Another example of a communication interface 818 may be a network card LAN (local area network or LAN)that provides a data connection to a compatible LAN. Wireless communication can also be used. In each such embodiment, the communication interface 818 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.

Network link 820 typically provides data communication through one or more networks or other devices. For example, network link 820 may provide a connection through local network 822 with the main computer 824 or equipment Internet service provider (Internet Service Provider or ISP) 826. ISP 826 in response provides data transmission services through the worldwide packet data is often now called the Internet 828. Local network 822 and 828 Internet both use electrical, electromagnetic or optical signals, bearing data streams. Signals in different networks, the signals in the communication network 820 and the signals in the communication interface 818 carrying digital data from the computer system 800 is illustrative forms of carrier waves to transmit information.

Computer network 800 can send and receive data, including program code, through the network (s), network link 820 and communication interface 818. In the example of the Internet, the server 830 may transmit a requested code for software applications via the Internet 828, ISP 826, a local network 822 and communication interface 818. According to the invention, one such downloaded application software provides the system names for the language-dependent networks, as described here.

The received code may be executed on the processor 804 after receipt, and/or saved for later execution on the storage device 810, or other storage device with non-volatile when power off memory. In this manner, computer system 800 may receive the program code in the form of a carrier wave.

Options. Advantages

In the following specification the invention has been described with respect to specific performances. However, it is obvious that it may be made of various modifications and changes without deviating from the basic idea of the invention in the whole e is the breadth and depth. For the invention, therefore, the specification and drawings have illustrative rather than restrictive value.

Description of applications.

Definitions:

Layer secure protocols (Secure layer protocols: Secure Sockets Layer (SSL); Microsoft Passport single sign-in (SSI); other similar.

URL. URL (Uniform Resource Locator) is a unique identifier, such as IP address. Keyword, phone number or DNS name, as well as any others that uniquely identifies network resources.

The IP address. IP (Internet Protocol) address is a numeric URL, and represents the layer addressing under the addressing system DNS; IP addresses are unique by definition; IP addresses can have DNS names assigned to them. DNS name or Keyword cannot be used if they are not mapped IP address.

ETA - one Telephone Address (UTA - Uniform Telephone Address). ETA - this is the telephone number assigned to a network Subscriber, User or Resource (together Subscribers). Each Subscriber has only one assigned to ETA and because each ETA uniquely identifies a particular Subscriber. Each ETA has at least one of the File Number assigned to this ETA and associated with it. Addressing system ETA is a unique layer addressing (URLS) on top of phone numbers, IP addresses and DNS names. ETA is compatible with the system name Keyword company RealNames (Ref: company RealNames was discontinued in the summer of 2002). ETA can be Pris is oen any network Subscriber, including Internet resources, as well as phones with wired or wireless (cellular, satellite and other line.

ETA Subscriber. The subscriber has the ability to work in the "world wide web" or web and is a network object of any nature by the device (as, for example, computer device, media, chip or processor), software (such as web browser, instant messenger, email correspondence, etc.), data (as, for example, a web site or page, etc.), the wave frequency, modulation or division or composition (such as a particular radio station). The subscriber can request the network to assign it a URL. There is only one unique ETA assigned to the Subscriber.

The IP address that defines the exact location of the Subscriber in the Internet is called the Primary IP address and PFN owned by the Subscriber and is available in a network location, clearly defined Primary IP address. All Subscribers have the tools web such as web server, web browser, and other software and hardware that allows the Subscriber to manage the data of PFN, to make the connection, communication and exchange through the Internet. For each of the Primary File Number should be created, preferably two mirror copies of PFN, called the Primary and Secondary File Rooms; these copies of PFN hosted and available in real lie is no on switch, server, server, Internet service provider (ISP), respectively.

Dynamic and static IP addresses (URLS) and "travelling" mobile identity (ID). Each Subscriber may be available in the network using its URL. Internet Subscribers usually have static IP addresses assigned to them, using dedicated Internet line, (as DSL, T1, etc.); the so-called dial-up Internet access "dial-up") or mobile (traveling) Subscribers usually have temporary dynamic IP address assigned via DHCP (Dynamic Host Configuration Protocol) and is valid for the time when the Subscriber is connected to a specific ISP or hundredth of a mobile network. When traveling, mobile devices are remembered, and the devices themselves are serviced using such standards mobile roaming (travel)as ANSI-41 and GSM-MAP.

ANSI-41

ANSI-41 provides support for travelers attending your service area, as well as your customers when they are travelling outside of your service. When the traveler is registered in your service area by:

Use the MIN/ESN of the traveler, your mobile switching center MSC (mobile switching center (MSC) and the Register of visitors to the area (visiting location register - VLR) determines the appropriate MSC Register home zone traveler (HLR) for routing.

Your MSC sends a message through the SS7 network and, if necessary, through access gateway to other networks S7, for transmission to the MSC/HLR home area to check.

MSC/HLR caller traveler's checks and sends the response, allowing the caller requested the connection.

When your customer travels outside of your service area, the process is repeated, but the messages are sent over the network to your MSC/HLR.

GSM-Map

As well as ANSI-41, GSM-MAP allows you to send important information about MSC/HLR/VLR Registration and imperceptible movement between you and your network of the roaming partner, and this Protocol messages gives you instant access to improved opportunities SS7, for example to store the number (Number Portability).

One feature where the transport GSM-MAP differs from the ANSI-41, is the administration of the traveler. GSM-MAP use the International Mobile Station Identifier (IMSI), while the ANSI-41 uses a Mobile ID Number (MIN). IMSI is the ID of the 15-digits, which is created based on the mobile country code (Mobile Country Code MCC), representing the country of origin of the traveller, code mobile network (Mobile Network Code MNC), which defines the native network network (origin) of the user, and, finally, the identification number of the mobile station (Mobile Station Identification Number-MSIN), which identifies a specific mobile node.

When the traveler is registered in your service area by:

Phone traveler was included in your service area the project; your VLR initiates the request for Registration to the HLR of the traveler. Each HLR is identified by mobile country code (Mobile Country Code and mobile network code (Mobile Network Code).

HLR responds to the service you VLR, and the VLR your responds in MSC data travelling user.

Thus the traveler is now registered in your service area.

When your customer travels outside of your service, but is in the coverage area of your partner's GSM roaming, the process is repeated with exactly the opposite and messages are sent back to the MSC/HLR your network.

ETA Chief, Primary and Secondary URL. Primary URL THIS is the URL that defines the location of the Primary File Rooms ETA placed on the Subscriber to the Internet. Secondary URL THIS is the URL that defines the location of the Secondary File Rooms ETA (mirrored copy of the Primary File Number) associated with the ISP. Secondary File Numbers predominantly placed at the location of the ISP on the Internet. ETA Main URL specifies the location of the Main File Rooms ETA on the Switch-server in the Internet. Secondary URL and Home URL are primarily used, while the Subscriber is not available in real-time mode is off line off-line), that is, when the Subscriber is unavailable on the Primary URL, and also the use for the purposes of validation and verification.

File Rooms ETA. The file Numbers are described in application for U.S. patent No. 10/085,717, which is a parent to present its Partial Continuation (CIP). This File Numbers are assigned a specific number, ETA, indicating the Subscriber's network.

The main, Primary and Secondary Files Non ETA. The file Room contains metadata associated with the ETA. The file Room is primarily a data file in the format of RDF XML-based and CC/PP. The main File is available on the Main URL to the Switch server, which is described above. The primary File is available on the Subscriber device available on the network by the Primary URL, and the Secondary File Rooms available at URL address of the Secondary ISP. Can be also Tertiary, Quaternary, and so on URL, providing different or distributed Internet services and connectivity; accordingly may exist Tertiary, Quaternary, and so on the File Number. PFN mainly contains three URLS, i.e. Primary, Primary and Secondary URLs. The main URL is always the same as the Primary URL, the Switch server. The secondary URL is always the same as the Primary URL of the Internet service provider (ISP) Subscriber. Both Primary and Secondary URLS are provided to the Subscribers when they sign up for services, both URLS are recorded in the Primary File of the Rooms in the process of commissioning or allocated by the network dynamically and zapisi who are in PFN, when the Subscriber connects to the network. Both the Primary and secondary Files are mirrored copies of the Primary File Number.

The contents of the metadata File Rooms ETA: Metadata mainly use XML and compatible with RDF, and CC/PP, as well as other formats and can contain the following information related to Subscriber:

Phone Number (ETA).

Primary URL. The primary URL is defined, if the Subscriber is available in real time (lo-line), and undefined if the Subscriber is not available ("off-line").

Secondary URL

Primary URL

Primary URL Centre Authorizations

Primary URL of the Administrator of Digital Certification (if it is not the same as the switch server)

Primary URL, Network Security

Room ETA Center Authorizations

Room ETA Administrator Digital Certification

Room ETA Network Security

The primary public Key (the public key switch, server)

Secondary public Key (the public key of the native ISP Subscriber)

The public Key of the Center Authorizations

The public key of the Administrator of the Digital Certificate (if different from that of the switch-server)

Outdoor Network Security Key

On-line status. On-line status is derived from the Primary URL.

The current status of available and additional resources required User (device)

Acquired resources Yakushi status of purchase (delivery/payment, etc.)

Data related to the Security policy of the Network, contain financial and banking information, electronic purse, resolution proxies, access rights, data sets for authentication and identification, biometric data, etc.

User preferences (conventional communication services, such as service subscriber identity, the procedure and conditions for switching on the order of services, such as instant messages, text mode, text mode, etc.)

Methods and protocols verification and authorization to grant access

Other metadata disclosed in the Parent application to the present Partial Continuation.

Other data provided by third parties, such as Microsoft Passport or VeriSign certificates, etc.

A digital Certificate Administrator of Digital Certificates (Switch) (preferably contains all fields in the Primary File Numbers with the same values)

Authorized privileges for the Encryption method public keys (preferably is part of a Digital Certificate)

The metadata posted on the protected segment of the internal memory of the Subscriber:

** Credit Card**

**Bank Account information**

**Private key file to encrypt method public keys **

** The password for one-time phone**

Check the availability of the Subscriber for the communication mode is the real time (On-line status check): the description of the command "ping" to check the IP addresses

The command "ping" or other similar checks the availability of a particular Subscriber in the network in real-time by its IP address or DNS name. The command execution is possible in manual mode in Windows using the path Start-Programs-Accessories-Command Prompt. To test a specific IP address or URL of the command line should be like this:

ping <here we need to specify the IP address>

or

ping <here you specify the DNS name>

The following is a specific example of the execution of the ping command:

Microsoft Windows 2000 [Version 5.00.2195]

(C) Copyright 1985-2000 Microsoft Corp.

C:>ping www.names.ru

Pinging www.names.ru [212.24.32.169] with 32 bytes of data:

Reply from 212.24.32.169: bytes=32 time<10 ms TTL=121

Reply from 212.24.32.169: bytes=32 time=10 ms TTL=121

Reply from 212.24.32.169: bytes=32 time=10 ms TTL-121

Reply from 212.24.32.169: bytes=32 time<10 ms TTL=121

Ping statistics for 212.24.32.169:

Packets: Sent=4, Received=4, Lost=0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum=0ms, Maximum=10ms, Average=5ms

C:>

The web server (Web server). A network device or program is installed on a particular network Subscriber; usually the web server provides the connection to the Internet, data processing, and scripts and stuff. Web server supports secure sockets layer (Layer secure protocols) and therefore supports the PKI and its procedures, it can create a Request for the Issue of Certificate Certificate Signature Request (CSR), to create public and Private keys, find, extract, obtain and place in memory the Digital Certificate is t, issued by the CA Administrator. It may also act within the PKI as a Calling or Receiving Subscriber infrastructure. The Web server may be a device-just a chip, such as ASET or PIC12C509A/SN (http://world.std.com/˜fwhite/ace/) or program. The Web server is always part of the Subscriber, but the Subscriber may not have its own Web server (web server).

The web browser (Web browser). A network device or program. The Web browser may provide different sets but must have at least the following: address processing and finding them Subscribers to the Internet and compatible with the Web of communications networks; the connection with the selected Subscribers; rendering static content to the Internet (HTML, XML, etc.); visualization of dynamic content Internet, video and audioman in real time using the technology of video and voice over IP connection (dynamic markup language data, streaming data, VoIP, and so on). Web browser supports SSL (Layer secure protocols) and therefore supports the PKI and its procedures, it can create a Request for the Issue of Certificate Certificate Signature Request (CSR), to create public and Private keys, find, extract, obtain and place in the memory of a Digital Certificate issued by the CA Administrator. It may also act within the PKI as the Calling or Receiving Subscriber infrastructure.

Administrator Addresses ETA (AA). AA is the Central administrator, which contains a Central repository ETA data, providing registration ETA applicants, managed services addressing ETA and address resolution ETA on the network and associated with the ETA File Rooms. The switch server is the Central software - hardware complex data management, located on the administrator's Address.

The administrator of Digital Certification (KL ACC). KL ACC is the Central administrator PKI, providing Digital Certificates for Files of Rooms ETA and services related to SSL. Preferably KL ACC is also the Administrator of the Address (AA).

Switch server Switch server). The switch is an Internet server, providing services switching for Subscribers with addresses ETA and not having those. The switch is a Central Subscriber (switch) network and contains the Master Files of Rooms ETA, providing the Main URL for each of them. Itself as a network Subscriber, Switch, server has its own Primary, Primary and Secondary File Number.

File System Security. Switch server and ISP can set and enforce Security Policy network for selected or all IP connections, exchanges, phone calls and transactions. Information Policy data placed in the File Security System is available as is and Switch server and ISP, housed respectively in the Main and Secondary Security Files. The Security file can have its own ETA number and therefore may be available on the network using a ETA Room Security. Such Security Number ETA can be widely known number, such as 911 in the United States, or numbers 01, 02 and 03, which are used in Russia and so on.

Online (On-line) status. This is the availability status of the Subscriber to communicate in real-time. For the purposes of this application the term "on-line status" is defined as the availability of particular Subscriber via the Web on its Primary URL (Subscriber status "on-line") and the concept of "off-line status" means the unavailability of the Subscriber on its Primary URL (Subscriber status "off-line").

"The calling" and "Responsible" subscribers. The caller is the Subscriber initiating the call through another IP - Responding Subscriber, using the number of the ETA last. Calls can be implemented as machine-to-machine, machine-to-program, program-with-apparatus and program-to-IP calls. The caller can provide to Meet the Subscriber's your ETA number and other metadata from the Primary File of the Calling Number. The Caller can also be an anonymous face.

IP call. IP call is the Internet connection between the Calling and Answering Callers, set the output for data exchange, visual and sound currency type point-to-point using the Internet and TCP/IP, technology transfer images and sound over IP (voice & video over IP technology), other appropriate means of working with the Web. It can be implemented as a call type wired network, mobile network, mobile network, wired network, mobile network, mobile network, the present invention also offers the possibility of connections the browser - wired network, the browser - mobile network, mobile network browser and a wired network browser, and under mobile network is understood as a cellular, satellite or other wireless communication. In protected mode IP call may use any known algorithms and encryption methods such as RSA, Diffie-Hellman and others, SSL, MS SSI and PKI.

Service provider - ISP (Service Provider). Under the Operator or ISP in the application refers to companies that provide communication services with access to the Internet. As a Subscriber, each ISP may have its Primary, Primary and Secondary File Number.

Point of sale and service (Point Of Sales - POS). POS terminal is a node in the network is endowed with a number of the ETA that provides communication, sales support and transactions. Each POS can be endowed with a number of ETA and can therefore be a Subscriber in the network that provides access to the Internet.

Implementation

The preferred use of standard methods of authentication (authentication). Recommendations for standard H (H recommendations); directory Services X.509 (X.509 directory services); the Protocol directory services H (X directory services protocol); the Preferred use of the IETF Kerberos (http://www.ietf.org/html.charters/krb-wg-charter.html); the Syntax for encrypted messages Cryptographic Message Syntax (CMS); other

Digital certificates, encryption issues: Internet X.509 PKI certificates can be used in accordance with the specification IETF "Use of ECC Algorithms in CMS" located in the Internet at http://search.ietf.org/internet-drafts/draft-ietf-smime-ecc-06.txt for distribution of public keys. The use of algorithms and keys ESA in the framework of X.509 certificates is described in the following works:

- L.Bassham, R.Housley and W.Polk, "Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and CRL profile", PKIX Working Group Internet-Draft, November 2000.

- FIPS 186-2, "Digital Signature Standard", National Institute of Standards and Technology, 15 February 2000.

- SECG, "Elliptic Curve Cryptography", Standards for Efficient Cryptography Group, 2000. The document is available at www.secg.org/collateral/secl.pdf.

Financial services and transactions: Preferably uses the ANSI X9.62-1998, Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA)", American National Standards Institute, 1999; markup Language electronic commercial documents (Electronic Commerce Markup Language - SPECIFICATION)

Create Primary File Number (Primary Number File - PNF). To is Yes, the user first becomes a client services based on the use of non ETA, it enables the Administrator Address and the Administrator of Digital Certificates all necessary information, including its ETA room and on the basis of this information formed the Primary File Numbers (PFN). To use PFN for the implementation of the transactions and services SSL, the Administrator of Digital Certificates - KL ACC produces a Digital Certificate (CA), allowing you to use SSL and PKI. The open part of the information for PKI is placed in the ETA of PFN and available to other users of the PKI, and the closed portion is placed in a protected memory segment of the Subscriber. CA is signed with a Private key KL ACC and contains at least the number of the ETA and the public key of the Subscriber. CA corresponds to the X.509 format; ETA contained in X.509 extension.

Providing Primary URL and synchronization with the Primary File Number: Each time a Subscriber logs on to the network, the network it registers, and assigns the Primary URL, and after giving the Primary URL, this URL is preferably transmitted to the Subscriber and stored in the metadata of the Primary File Number; the value of the Primary URL is then preferably placed in a Secondary File Rooms (ISP) and in the Main File Room (on the Switch-server). During Registration in the network, the Switch preferably authenticates (authenticates) the Subscriber using the CA Subscriber; Then ABO the UNT synchronizes the field of PFN with the corresponding fields of the Main and Secondary File Rooms. To do this, the Subscriber retrieves the field values of the Main and Secondary URL of PFN and, using them, and establishes a connection with the Main and Secondary Files, Numbers, respectively; when the connection is established, the Subscriber starts the synchronization metadata. For authorization and verification of the Subscriber and to prevent access dummies (impostors) to network resources, Switch, server, ISP, or any other Subscriber or visitor network with procedures SSL can remove CA from PFN, decrypt it using the public key WITHIN, and get at least a number of the ETA and the public key belonging to the Subscriber; and then, exchanging SSL, authenticating entity can verify that the Caller does not play the role of a real number, and is as such and has the appropriate privileges.

Upgrade the Secondary and Main File Number: ISP constantly and promptly updates a Secondary File Rooms, establishing the connection with the Primary and/or the Main File Room. The availability of the Subscriber in real rooms (status is "on-line") can also be installed in the usual way via the communication service provider and then in a File format Number and placed in a Secondary File Number.

Update the Main File Number:

Method 1: Switch server constantly and promptly updates a Master File Rooms, extracting data (Switch-pool method) or by getting Dan is haunted (ISP-push method) from the Secondary File Number; if the network received a call to a specific Subscriber, Switch, server retrieves the Primary URL of the site from the Main File Room and, if the Primary URL is specified, the Switch establishes a connection with him; If the connection is not established, the Switch breaks the link and assigns the Primary URL in the Main File Number "zero", and the value of the field status is set to "off-line". In another case, "on-line status of the Subscriber may be obtained using other native capabilities ISP, and then extracted with ISP and placed on the Switch server for each Subscriber. Alternative Switch server can constantly check with a command like "ping" all Subscribers using their Primary URL and checking thus their "on-line status" constantly. Every time, when checking on-line status, the Switch updates the status field in the Main File Number for each Subscriber /ETA.

Method 2: Getting in range of a network, each Subscriber establishes a connection with the Switch server and synchronizes the metadata of its Primary File Rooms with the Main File Room. The switch continuously and in a timely manner connected with each particular Subscriber and updates the values of fields in the Main File Room data taken (Switch-pool method) or received (Subscriber push method) from the Primary File Number; when a call was received from the network for konkretnej the Subscriber, Switch server retrieves the Primary URL of the site from the Main File Room and, if the Primary URL is not equal to zero, the Switch establishes a connection; if it is zero or a connection cannot be established, the Switch closes the connection, and sets the value "zero" in the Primary URL of the Subscriber, and the status is "off-line".

Making Outbound IP call: When in the address bar of a web browser or other Internet introduced ETA Caller ID, the Caller establishes a connection and communicates with the Switch server, as described in the parent Application to the present Partial Continuation, and retrieves the metadata Corresponding to the Subscriber of its Main File Number; if ETA Primary URL of the Responding Subscriber is not equal to zero, then the Caller is trying to establish a connection with the Corresponding Subscriber, using his ETA Primary URL is taken from the Main File Numbers Corresponding Subscriber; if the Primary URL is valid (current) and The user answers, the Caller and the Answering give each other their CA and do the validation in accordance with the current security policy of the network; depending on the policy, the Caller may access the Primary File of the Meeting Rooms and Meet back can verify the Primary File Number of the Caller; the Caller and the CTE is non manipulate data security following established procedures, security policies, accessing data, and communicating with the Responsible Person, if you allow to do privileges. It uses mostly the Session initiation Protocol IETF (IETF Session Initiation Protocol) or similar for exchange between the Caller and the Answering Subscriber.

When the Primary URL of the Responding Subscriber is valid and the Caller is connected with a Corresponding Subscriber, but the latter is not responding (not picking up the phone"), the Caller tries to leave a message in the memory device Corresponding to the Subscriber;

When the Primary URL is not valid or equal to zero, the Browser retrieves the Secondary URL and tries to detect the Secondary network File Rooms, and so forth, and when found the next URL that said, the web browser allows you to make and leave a message of any type.

Answering an incoming IP call: When the received IP call, and the Answering Subscriber automatically switches to the appropriate mode "reply"/ "refuse to answer" or another mode, calls or other way lets you know about the incoming connection (call); Meet the Subscriber tries to extract the number of ETA and CA from the Primary file of the Caller ID; Answering Subscriber can check the validity of the ETA and CA, as well as the privileges of the Caller using PKI. After checking Otech the store Subscriber decides to grant or to refuse the connection to the Calling Subscriber in accordance with the security policy and implementation challenges privileges and preferences of both parties are defined in the metadata File Numbers and their CA. If you had to establish a secure connection, both parties begin to encrypt communication using SSL and PKI, as well as their Public and Private keys. Secured communication mode allows you to make purchases, to pay and to use other services and transactions in a secure mode. When checking, verification, authentication is completed, then the parties is mostly used Protocol "IETF Session Initiation Protocol" or similar for exchange between the parties.

Switching on and off of the lists of subscribers. Each Subscriber has a list of other network Subscribers, or otherwise related to that specific Subscriber (i.e., a list of phone numbers of friends, partners, relatives, etc). The list can be divided at least mainly on the following parts: those Subscribers who are not authorized to see the on-line status of that particular Subscriber; those Subscribers who are allowed to see on-line the status of that particular Subscriber; those Callers who are not authorized to connect to that specific person; those Callers that are allowed to connect to this specific person, etc. So each Caller can check and get "on-line hundred the condition" only for those Subscribers, which allowed the Caller to check it. Before making connection with a particular Subscriber, the Caller can check if the (on-line) Meeting (the callee) Subscriber in the network or the Subscriber in the network is not available (off-line). The Caller may abandon attempts to establish a connection and save time that way.

The issue of digital certificates (CA) for ETA/Subscriber. When the Administrator Addresses ETA creates and registers the number ETA associated with a particular Subscriber and creates the Primary File Number for the Subscriber, Administrator of Digital Certification (KL ACC), in turn, creates a Digital Certificate (CA); to create a CA Subscriber must be able to support the work over SSL and:

The subscriber fills and fills in all the necessary fields in the Primary File Number (preferably all fields of PFN with the same values), and then generates the file requirements of the Certificate Signing Certificate Signature Request (CSR), as well as Private and public key; the Private key is stored in the protected memory segment Subscriber;

The subscriber provides the CSR and the public key for signature WITHIN;

The Public key file and the Primary File Rooms ETA encrypted (signed) Private key WITHIN, and this encrypted file is a Digital Certificate ETA;

WITHIN p is desive CSR and returns it to the Caller as a Digital Certificate Subscriber (CA). CA includes ETA and signed WITHIN digitally;

The subscriber places a CA in the Primary File Number and makes it available for procedures SSL.

Verification and Authentication are used to prevent access impostors to network resources or her specific Subscribers and are implemented using PFN specific Subscriber, with the participation of the Administrator of Digital Certification, Switch or Subscriber:

Simple Authentication in unprotected mode (SSL is not used): Retrieves the ETA of the Primary File of the Calling Subscriber; retrieves the Main, Primary and Secondary Files ETA Calling; checked ETA Caller ID by comparing the key data points taken from Secondary and Main File Numbers with the corresponding taken from the Primary File Number; if the data match, the validation (verification) completed safely and the Calling Subscriber is permitted to use the requested service and the Subscriber is provided verification of the Switches.

Strict authentication in secure mode (SSL) here the Subscriber And (A) authenticates the Subscriber (In):

In:

Encrypts Data using the Private key In forming Data B1

Create a test message containing CA and the Data B1

Sends the Subscriber a test message, and

And:

Retrieves the CA TS Data 1 from the test message

Decrypts CA, using the public key WITHIN

Extracts the Data and the public key from the decrypted CA

Decrypts the Data B1, using the public key In and forming Data And

Compares Data And Data and if the Data And the identical Data, And concludes that owns a correct and certified WITHIN Private key, and reliable Data, therefore authentic;

Here Data are preferably part of CA and ETA; or other fields In CA, or some or all fields In CA; or complete CA Century

Other similar appropriate authentication procedures can be established based on the use of a specific method of cryptography.

Verification, authentication and authorization of the Responsible Person.

For authorization and verification of Callers and to prevent unauthorized access impostors to the resources of the Subscriber uses fake Primary File Rooms ETA Caller, a particular Subscriber via SSL.

Retrieves the Digital Certificate of the Primary File of the Calling Subscriber; CA decrypts it using the Public key WITHIN (Switch); checks the validity of the CA; authenticates the Caller; provides Caller connection with Complying with the Subscriber account privileges Calling the th Subscriber, if he passed the tests successfully, and denied his connection, if he checks failed.

Verification, authentication and authorization by the Caller.

In order to verify that the connection has happened to real, and not fake conform to the Subscriber and to prevent unauthorized access impostors to resources Caller using his PFN, in the process of establishing the connection with the Corresponding Subscriber, the Caller retrieves the CA Responsible Subscriber of his PFN; CA decrypts the data using the public Key WITHIN (Switch); verifies the Room ETA Meet Subscriber and checks his privileges.

Services transactions through a secure connection between Subscribers, representing both Buyer and Seller.

Services transaction via an IP connection can be provided on the basis of the relevant Security Policy Network Security policy) and privileges for users using layer Secure Socket Layer (SSL), PKI infrastructure and services WITHIN the rooms ETA. Method of public key encryption allows you to check the numbers ETA through Infrastructure encryption method public keys PKI (Public key cryptography infrastructure). Layer SSL (secure socket layer) allows the use of PKI for conducting secure transactions electronic and mobile Commerce, banking services is, services data exchange and sharing in real-time. They are all based on the use of CA and content of Certificates. Payments between the Buyer and Seller can be carried out using procedures similar to the implementation of the authorization of payment by credit card, as described below:

The message of the Buyer

"Message from Buyer" is a message generated by the customer to the Buyer. "Message from Buyer" preferably contains:

CA Seller

Primary URL of the Seller (not required)

Data about the purchase of (currency and amount of purchase, time of purchase, the number of purchases/transactions and other necessary information about the purchase)

"Message from Buyer" is a purchase Agreement, a certified digital signature that is encrypted using the Private Key of the Subscriber-Purchaser.

Chat

"Chat" is a message generated by the customer to the Seller. "Message to Seller" preferably contains:

CA Buyer

Primary URL of the Buyer (not required)

"Message from Buyer", signed using the Private key of the Buyer.

Data about the purchase of (currency and amount of purchase, time of purchase, the number of purchases/transactions and other necessary information about the purchase)

"Chat" is a Contract of sale, severancepay signature that is encrypted using the Private Key of the Subscriber-Seller.

Authorization

"Authorization" is the message compiled by the Center Authorizations. "Authorization" preferably contains:

CA buyer's Primary URL of the Buyer (not required)

"Message from Buyer", signed by the Private key of the Buyer.

Data about the purchase of (currency and amount of purchase, time of purchase, the number of purchases/transactions and other necessary information about the purchase)

"Authorization" authorization is signed digitally, that is encrypted using the Private key of the Center Authorizations.

Method of Authorizations "Payment"

Contains steps:

Installed wired or wireless connection between the Buyer and Seller

The user is shown on the display or otherwise communicate the name of the purchase, its price and other details about the purchase /transaction

The subscriber's device is waiting to receive permission (authorization) to the Buyer on the purchase, and if permission is received:

Preferably runs a Strict mutual authentication Buyer/Seller in a secure communication mode

If the seller and the Buyer authentic, Buyer:

Is the "Message to Buyer"

Establishes a connection to a Central Authorization using Primary RL Center Authorizations

Performs Simple mutual authentication Centre Authentication in a secure communication mode, if required

Transmits "Message to Buyer" in the Center of Authorizations

Center Authorizations:

Decrypts the Message of the buyer, using the public key of the Buyer, taken from CA Buyer in the Authentication process and

Center Authorizations

Is the message "Authorization"

Sends the message "Authorization" to the Buyer

The buyer sends the message Authorization" Seller

Sold decrypts the message "Authorization", using the public key of the Center Authorizations

Or the Center of Authorizations:

Allow (search queries) through Switch-server Primary URL of the Seller, using the number ETA Seller, taken from the CA of the Seller; OR has a Primary URL of the Seller from the "Message to Buyer"

Establishes a connection with the Seller, using the Primary URL of the Seller

Authenticates the Seller and if the Seller is authentic:

Checks (verifies) the parties to the transaction, and information about buying

Is the message "Authorization"

Sends the message "Authorization" Seller

Sold decrypts the message "Autorizacia"using the public key of the Center Authorizations

The seller authorizes the sale and / or transfer to the Purchaser of goods/services), if the payment is authorized by the Central Authorization

M is TOD Authorization "Hold"

Includes steps:

Installed wired or wireless connection between the Buyer and Seller

The user is shown on the display or otherwise communicate the name of the purchase, its price and other details about the purchase /transaction

The subscriber's device is waiting to receive permission (authorization) to the Buyer on the purchase, and if permission is received:

Preferably runs a Strict mutual authentication Buyer/Seller in a secure communication mode

If the seller and the Buyer authentic, Buyer:

Is the "Message to buyer"

According to "the Message of the Buyer to the Seller; and the Seller:

Decrypts the Message of the Buyer, using the public key of the Buyer, taken from the CA to the Buyer, and verifies the data about the purchase, if it is specified to be used by the policy, and if the data about the purchase is correct, it

Is "chat"

Establishes a connection to a Central Authorization using Primary URL Centre Authorizations

Performs Simple mutual authentication with the Center of Authorizations in protected mode, if it requires a security policy, and if the authenticity of the parties established:

According to "chat" in the Center of Authorizations; and the Centre of Authorizations:

Decrypts "chat"using Outdoor to the JCH Seller, retrieves and decrypts the Message of the Buyer, using the public key of the Buyer, taken from CA Buyer

Verifies the parties to the transaction and data

Is the message "Authorization"

Sends the message "Authorization" Seller

Sold decrypts the message "Authorization", using the public key of the Center Authorizations

The seller authorizes the sale, if authorization of payment received

Recording Credit Card. Recording Credit Card (CCZ) is a typical entry is placed on the credit card. CCZ is usually recorded on the magnetic stripe of a credit card or contained in the internal memory of the smart card or other memory credit cards.

Method of Authorization of payment with credit card. In order to use credit cards for transactions in real time, the zone must be read with a credit card and recorded in the metadata of the Protected memory space of the Subscriber. Then the zone can be used as described in the Methods Authorizations. If a particular system of credit cards (such as VISA, MasterCard or other) requires a change of the zone in the process of Authorization of a specific transaction, the amended credit system of the zone is returned to the Subscriber is encrypted by the public key of the Subscriber, then the CCZ is decrypted by the Subscriber with its Private key and placed in metadone the Protected memory space of the Subscriber for future use.

Method of withdrawing funds from your Bank account. Direct debit from a Bank account can be provided by similar described in the Method section, Authorization of payment with credit card.

Temporary ETA. To reduce the cost of calls and to increase the flexibility and availability of communication services WITHIN (Switch) may issue Temporary CA, containing numbers of the ETA, the latter is used for one-time phone handsets can communicate through the Internet and for Internet browsers and other network objects/Subscribers, which collectively are referred to as Transient Subscribers (VA); they can all connect as a Calling or Answering Subscribers in the network. KL ACC (Switch) produces ETA and CA ETA; places ETA and CA directly in the File rooms VA or passes them to the Resellers, who are seizing these ETA/CA specific VA, placing them in the Primary File Numbers VA.

Such disposable tube can use Transactions to exchange text, voice, image via an IP connection, they can be sold and activated for use by assigning or not assigning them a permanent network number of the ETA. When you purchased the handset for the first time enabled by the user, it prompts the user to manually print or select a specific preset number, ETA, or select automatically and h is s network temporary non ETA.

Mode Pseudostatic ETA: If the user wants to use a specific ETA room, the tube is preferably requires you to enter the Password for the temporary ETA rooms to check user rights on the use of ETA (this password is similar to the use of personal identification numbers of SIM cards for GSM phones); when the password is entered, the handset establishes a connection with the server Administrator, issued the number ETA (AA, Switch, server, ISP, reseller) through the layer SSL and checks the Password for the temporary ETA rooms" OR compares the password with the encrypted password, placed in protected memory tube; if the test succeeded (password is correct), the user is granted access to network resources using the selected ETA and the user is the rightful owner of the ETA; if the verification is not successful, then the tube may be denied network resources, or it can be declared stolen, depending on what is provided by the security policy of the network, OR

Specific ETA number and CA can be provided and be valid for the standard set period of time, a certain number of connections/transactions tube/programs and, if assigned, this number ETA must be entered (can be programmed so that the ETA itself peewits is in the user interface immediately after turning on the tube/programs) and its use is confirmed by the user command;

Dynamic ETA: after purchasing the handset user includes it for the first time, the handset establishes a connection with the Switch-server via the Internet; Switch server registers the handset to the network and assigns a Dynamic number of ETA and the Main File Room; Main File Room is a copy of the Primary File Rooms ETA; Dynamic ETA can only be used for a specific connection, if the user does not require to secure for him the room ETA on a standard period of time or other standard terms of use. Dynamic ETA is revoked after the connection is completed or assigned Temporary Subscriber on a standard period of time at the user's request. To keep the Dynamic non ETA at standard conditions, the tube should be able to update your Primary File Non-specific dynamic ETA, and KL ACC shall issue a CA-containing ETA, and assign the CA tube, as described above.

The use of PFN as Digital data ID. PFN can be used as a Digital ID, including all identifying information required for the specific purposes of verification, authentication, holding Authorizations and transactions.

Encrypted sessions using shortened the s key Pairs. To speed up encryption of streaming audio and video in real-time Subscribers can use a Short session key Pair.

To do this, each Subscriber:

- Generates a new Pair of short keys (public and Private).

- The private key is stored in a Secure segment of the internal memory of the Subscriber and is used only for one session.

- Each Subscriber encrypts the new short public key using the Original Private key of the Sending Subscriber or using the Original Public Key of the Receiving Subscriber, and transmits the encrypted so Short public key to the Receiving Subscriber.

Receiving the Subscriber decrypts the message with a Short public key of the opposite party, and uses it to encrypt/decrypt data interchange (streaming data) with Referring the Caller.

OR alternatively:

Each of the Subscribers creates a Couple of new short keys so that the Short public key of each user is a Prime number, some account closest to lack or excess to the number of the ETA (or number that is calculated on the basis of the ETA installed in the network by the way), and intimacy in the room ETA is determined by the current Security Policy of the network, and the Private short key for each Subscriber which m is selected to be practically very difficult computed

Thus, using the current Security Policy of the network and the ETA number of the Subscriber, the Subscribers of the network can be calculated as its own Short public key and a Short public key of the opposite party without the need to exchange public keys with each other.

Thus, each Subscriber has a Short public key of the opposite party and uses it to encrypt/decrypt data interchange (streaming data) with the opposite party.

It is clear that in the PKI Subscribers can encrypt messages (threads) in two ways:

using the Private key of the Sending Subscriber and the Receiving Subscriber decrypts it with the public key of the Sending Subscriber. The encrypted message can be decrypted by any Subscriber that has the public key of the Sending Subscriber, and the secrecy of correspondence is NOT guaranteed;

using the Public key of the Receiving Subscriber and the Receiving Subscriber decrypts the message using its Private key. The encrypted message cannot be decrypted by anyone except the Receiving Subscriber, and the privacy of correspondence is GUARANTEED

Business model 1: sales of non-ETA, which is valid Chechenenergo period of time or quantity of services provided, or a certain amount of money and so on.

Business model 2: sales of Digital Certificates, where ETA is the main verifiable part of the certificate, privileges contain terms and conditions that are valid for a certain period of time or quantity of services provided, or for a certain sum of money and so on.

Business model 3: Sale of PFN with constant ETA number for regular Subscribers or without permanent ETA rooms for Temporary Subscribers.

Business model 4: Sale of media (SIM card for GSM and later standards of the 3rd generation network (3G standards), CD, DVD, or other media) with PFN files recorded on such media.

The business model is 5: Sales of recorded memory chips or processors with PFN files recorded in the memory.

The business model 6: Sale of PFN as a Digital ID.

The business model 7: Sale of "permissions" non ETA and /or File Number (transaction search Primary URL for the known ETA number/ File Number) payment for each resolution.

The business model 8: Sale rooms ETA and/or data File Number to any third parties with payment for each provision of the ETA and/or data File Number.

The business model 9: Sales of services authentication rooms ETA and/or data File Rooms, with payment for each AU is entification.

The business model 10: Sales of services Authorization of payment by the number of ETA and/or data File Rooms, with payment for each authorization.

The business model 11: Sale of development tools (Software Development Kit - SDK) implement functionality using ETA specified in the application methods.

While different implementations and methods of obtaining online status, authentication, verification, methods of communication and services transactions for Internet-capable programs, and devices using a Single Telephone Addresses were described in the application in detail, a professional can understand that a number of other implementations and methods may be possible within the framework and spirit of the invention.

1. The method of providing communication services between resources in wired and wireless communication networks and the Internet, the Administrator of network Addresses for each resource registers the unique network identifier of the network creates a resource File associated with the unique network resource identifier, enters in the resource File address data resource for the implementation of the switching network connections resource allocates the resource File in the database of the network Switch, and after receiving the call from a network resource, containing the ID of the linked resource, the Switch retrieves the address information from a File called resource commutes network connection is the calling of the resource caused by the network resource, using the address information of the called resource, wherein at least one of the resources, at least one of the communication networks or the Internet is a firewall core Switch (hereinafter CC), providing services transactions, for which the Administrator Addresses a Central Switch creates resource Files for at least two resources, each of which is registered in at least one wired or wireless communication network or the Internet, enters into a file of the appropriate resource of financial information and details of at least one financial account associated with this resource, the identifier of the financial account is the network resource identifier (hereinafter Universal Account or US) places the resource File in the database of the Central Switch and the main Switch after receiving from the calling resource one of the communication networks or Internet payment instruction, containing the amount of the payment, as well as the network identifier of at least one of the called resource using the network identifier of the called resource contained in the payment instruction, the Central Switch retrieves the data in the financial account from a File corresponding resource, and provides the transaction.

2. The method according to claim 1 services St. the bond between resources in wired and wireless communication networks and the Internet, characterized in that in the database of the Central Switch includes at least two File resources-financial calculations and one resource File which is the certification authority (CA) one of the communication networks or the Internet, and each of the resource Files contains, at least, the CONDITION of the resource, financial data, details of the financial account of the resource and the public key of the resource, and at least each of the resource Files-participants in the financial calculations signed by the Administrator Certifying Center (CA) digitally using the private key of the resource (hereinafter "Digital signature"), which is the certification authority (CA)and signed with a digital signature of the CA resource Files are Digital certificates resources and uses resources networks for secure transactions using digital signatures resources.

3. The method according to claim 2, characterized in that the communication services are provided using layer protected by SSL.

4. The method according to claim 2, characterized in that the communication services resources participating in the transaction provided by the Central Switch using Public Key Infrastructure certification authority.

5. The method according to claim 2, characterized in that the digital certificate corresponds to the X.509 format, and the specified CONDITION is contained in races is irenie X.509 certificate; or the specified CONDITION is addressed in the alias of the certificate; or in another appropriate field of the certificate.

6. The method according to claim 2, characterized in that the digital certificate corresponds to the X.509 format, and specified financial information and details of the financial account of this resource in encrypted or unencrypted form contained in the X.509 certificate extension.

7. The method according to claim 2, characterized in that the Central Switch is a certification authority (CA).

8. The method according to claim 2 and claim 7, characterized in that the centrifugation is the Internet Service Provider (ISP).

9. The method according to claim 1, characterized in that the core Switch is a Bank or authority (CA) credit or other payment card or payment Center (RC).

10. The method according to claim 1, characterized in that it includes a step of updating the data in the resource File by the Administrator Addresses a Central Switch.

11. The method according to claim 1, characterized in that the network IDs of US are phone number, or DNS name, or URL, or email address, or Universal Payment Identification Code (PUFFINS), or Bank Identification Code (BIC), or other network identifier, or the name of a natural language.

12. The method according to claim 11, wherein the specified network identifier CONDITION is Nepal the m phone number, as mentioned, the method further includes the step of comparing incomplete phone numbers with one or more phone numbers in the database of the Central Switch or the execution of the algorithm for automatic additions incomplete phone numbers to a full telephone number.

13. The method according to claim 11, wherein the specified CONDITION is a phone number, in which at least one of country codes and region is represented by a zero or a group of zeros, or if the named CONDITION is a phone number that contains a zero in the left-most digit or the named CONDITION is a phone number that contains alphabetic string or alphanumeric string as the value of the country code or an area code or phone number or additions to the telephone number.

14. The method according to claim 7 or 8, characterized in that the resource Files COI and CC are the same.

15. The method according to claim 1, characterized in that the resource File is used as a Digital Passport containing the identifying information required for the specific purposes of verification, authentication, and authorization of payment instructions.

16. The method according to claim 1, wherein the payment instruction further comprises at least one of the amount, currency, time of transaction, and the identifier of the payment instruction.

17. The method according to claim 1, great for the present, however, that provided the Central Committee service transactions between resources provides payment or operation of invoice and includes the preparation of the first payment instructions causing resource network.

18. The method according to 17, characterized in that, using the services of the Central Switch and the network identifier of the called resource contained in the first payment instruction that causes the resource establishes a network connection with the called resource, transmits the first payment instruction called resource; the called resource renders on the display or the other way first data payment instructions to the user of the called resource; the user of the called resource authentic authorizes the first payment instruction; receiving user authorization, called the resource creates a second payment instruction, establishes a connection with the Central Committee and directs him a second payment instruction for authorization.

19. The method according to 17, wherein causing the resource communicates with the Central Committee, transmits the first payment instruction to the Committee for its authorization.

20. The method according to p or 19, characterized in that after receiving the payment instructions of the Central Committee authenticates the network ID (RD) of the invoking resource, authorizes payment instruction and provides the service during Tr is Sacchi between the caller and the callee resources.

21. The method according to claim 20, characterized in that the Central Committee of the extracts CONDITION identifiers of the called and the calling of resources from the received payment instruction, retrieves financial data and financial accounts resources from their Files calling and called resources, authorize payment, generates an authorization message containing data taken from the payment instruction, transmits an authorization message to the caller and/or called the resource using the network resource identifiers contained in the payment instruction.

22. The method according to claim 20, characterized in that the method further includes creating a Central Switch message about authorization and this message contains information related to authorization.

23. The method according to item 22, wherein the specified message authorization authorization is signed digitally using a Secret key of the Central Committee, or other authentic authoritative the Central Committee.

24. The method according to p, characterized in that the first payment instruction is the invoice for payment and second payment instruction is an instruction to pay an invoice for payment.

25. The method according to 17, characterized in that the first payment instruction signed with a digital signature or other means of authentic authorized by the author of such payment instructions.

26. The method according to p different is the present, what CC is the center of the Authorization of payments using credit or other payment cards.

27. The method according to claim 1 or 26, wherein the financial data and details of the financial account, at least one of the resource Files of the communication networks and the Internet are data and details of the credit card account that has a Credit Card Account (CCZ), financial data and details of the financial account, at least one of the resource Files of the communication networks and the Internet are data and details of merchant account or credit card account can accept credit card payments, and File, at least one of the resources of communication networks and the Internet is a File resource authorising transactions conducted using the zone and which authority (CA) credit card payments.

28. The method according to claim 2 or 27, characterized in that, in CA, or, at least, one of the resources of communication networks and the Internet, having a resource File, performs the functions of the resource - Cryptographer CCZ, equipped with means for encrypting data using the method of public key and has access to the Digital certificate of the CA, and at least one resource of the communication network or the Internet with the resource File, is also the zone requiring encryption for secure authorization of a transaction with its IP is by the use, moreover, the share encryption CCZ reads CCZ requires encryption and the public key of the CA encrypts the zone using the Public Key of the CA receives the thus Encrypted Credit Card Account (SSCC).

29. The method according to claim 2 or 28, characterized in that the resource is an encryption zone transfers SSCC in the Central Committee to host SSCC in the resource File, which belongs to the zone.

30. The method according to clause 29, wherein the Authorization Center is called a resource and receives from causing network resources payment instructions, and to authorize payment by credit card, CA retrieves the network resource identifier of the Purchaser from the payment instruction, retrieves the Encrypted Credit Card Account (SSCC) associated with the network resource identifier of the Buyer, decrypts SSCC using the Private key of the authority, using the decrypted CCZ derives from a payment instruction, the value of the payment amount, and makes a payment with a credit card.

31. The method according to item 30, wherein the financial data and details of the financial account are at least one of the data sets: the CONDITION of the authority, or CA Center credit card Authorization and SSCC, or US Bank and encrypted or unencrypted Bank account details.

32. The method according to p, characterized in that the Central Committee is the Bank and/or Payment of Tim center or the authority and/or ISP and/or certification.

33. The method according to any one of claims 1, 27, 28, 30, 31, characterized in that the financial data and financial account credentials are Bank data and Bank account details.

34. The method according to claim 1, characterized in that it includes the sale of US or File a third party to pay for its provision of payment for each performed with using the transaction.

35. The method according to clause 34, wherein the validity CONDITION or File is limited to, at least, a period, or the number of use, or a fixed value of the services provided transaction.

36. The method according to clause 34, wherein the temporary resource File for sale without a MOUSTACHE or a temporary CONDITION.

37. The method according to p, characterized in that it includes an entry, at least. File recorded on the storage medium and the sale of recorded media recorded with him, at least. File.

38. The method according to clause 37, wherein the recordable medium is a portable recordable media.

39. The method according to 38, characterized in that the portable recordable media is the SIM card for the GSM device or an identification module for devices of the third generation (3G), or smart card, or a card with a magnetic strip, or wear a recordable chip the m memory or processor is equipped with a memory, or CD or DVD.

40. The method according to clause 34, wherein the File is a Digital Passport resource.

41. The method according to claim 2, characterized in that it includes the sale of a digital certificate, and the CA is verifiable part of the specified digital certificate, and privileges contain the terms and conditions of use of the digital certificate, limited, at least, a period, or number using the MUSTACHE, or a fixed value of the services provided transaction.

42. The method according to claim 2, characterized in that it includes the sale of services authentication using the specified CONDITION and/or File with payment for each transaction authentication.

43. The method according to claim 1, characterized in that it includes the payment services using a MUSTACHE and/or File with payment for each operation authorization of payment.

44. The system is designed to provide services transactions between resources in wired and wireless communication networks and the Internet, containing, at least, wired and wireless communication network and the Internet connecting resources and resources which at least one payment Center or/and the Bank or/and the Authorization Center, one Central Switch, at least one caller and one called resources, each of which is assigned a network identifier in one of the wireless or wired network or Internet connection, system in which the calling resource creates the first payment instruction and makes a call to the called resource transactions, characterized in that the first payment instruction as identifiers of the financial accounts includes at least a network identifier of the callee and the network ID of the calling resource and at least one of the amount, currency, time, transaction, and transaction ID.

45. The system of item 44, wherein at least one of the resources installed allowing authentic authorize the first payment instruction.

46. The system of item 44, wherein at least one of the resources installed the app allows you to create a second payment instruction containing at least one network identifier and at least one of the amount, currency, time, transaction, and transaction ID.

47. The system of item 44, wherein at least one of the resources installed the app allows you to authorize the second payment instruction, and verify the authenticity of the authorization.

48. The system of item 44 which contains the certification authority (CA) to issue digital certificates (CA) resources and/or username and password of resources, different those who, that specified a digital certificate contains: at least, only the CONDITION of the resource, or the CONDITION of the resource and the CONDITION of the Authorization Center, or CONDITION of the resource and the CONDITION of the Authorization Center and encrypted or unencrypted Bank or other financial account, or the CONDITION of the resource and the encrypted or unencrypted Bank or other financial account resource.

49. System p, characterized in that the digital certificate corresponds to the X.509 format, and in the X.509 extension contains: the CONDITION of the resource, or the CONDITION of the resource and the CONDITION of the Authorization Center, or CONDITION of the resource and the CONDITION of the Authorization Center and encrypted or unencrypted Bank or other financial account, or the CONDITION of the resource and the encrypted or unencrypted Bank or other financial account.

50. System p, characterized in that the Central Switch is by the certification authority.

51. System p, characterized in that the CA contains the CA and the CA signed with a digital signature of the CA.

52. System p, characterized in that it uses a secure connection (Secure Socket Layer - SSL)and Public Key Infrastructure PKI and services certification Centre MUSTACHE.

53. The system of item 44, wherein the authorization message Center Authorization contains the network IDs, at m is re, one resource of the Seller and one resource of the Buyer and at least one of the amount, currency, time, transaction, and transaction ID, and the ID and other data related to authorization.

54. The system according to item 53, wherein the authorization message is an authorization, digitally signed using the Private key of the Authorization Center.

55. The system according to item 54, wherein the Seller receives from Central Authorization authorization message and allows the purchase if the payment authorization Center Authorization granted.

56. The system of item 44, characterized in that at least one of the centers of authorization is a Bank.

57. A computer device to create a payment instruction, communication with the Central Committee and submission to the Central Committee of the payment instructions for the transaction, which the network resource has been registered in the communications network or the Internet network resource identifier and the resource File in the database of the Central Committee, containing a processor, memory and an input device connected via an electrical connection, wherein the input device is used for input to the data processor, at least the payment amount and the network identifier of one of the called resource and the memory device contains at least a network IDA is typinator calling resource and one or more sequences of machine-readable commands, moreover, the performance of one or more sequences of machine-readable commands by the processor causes the processor to perform the steps of: reading from the input device, at least a data amount of the payment and the network identifier of the called resource read from the memory device data ID of the calling resource, creating the first billing statement containing the amount of the transaction and at least one of the network identifiers of the calling and called resources instead of the details of their financial accounts, establish network connections to network resources, and including a Central Switch and transmission to a Central Switch payment instructions.

58. A computer device according to 57, which is caused by resource, wherein execution of the one or more sequences of machine-readable commands by the processor causes the processor to receive from the calling resource first payment instruction, you authorize the first instruction and to check the authenticity of the authorization.

59. A computer device according to 57, which is causing a resource characterized in that the execution of one or more sequences of machine-readable commands by the processor causes the processor to perform a network call to the called resource using its network identifier contained in the first of the payment instructions, to establish a connection with the called resource and to transmit the authorization callable resource first payment instruction.

60. A computer device according to p in memory which contains the ID of the Authorization Center of the transaction, wherein the Authorization Center transaction is invoked by the resource, and the execution of one or more sequences of machine-readable commands allows you to extract the network ID Center payment Authorization, to establish a network connection using the extracted network identifier and to transmit the first payment instruction to authorize the Authorization Center.

61. A computer device according to 57 is caused by resource and contains a display or other means for displaying information, an input device authorization and a means to verify the authenticity of the authorization, wherein execution of the one or more sequences of machine-readable commands by the processor causes the processor to receive the first payment instruction from the calling resource, display or otherwise indicate to the user computing device, the data contained in the first payment instructions to receive from a user an authentic authorize the first payment instruction, to create a second payment instruction to the Authorization Center.

62. Computer is RNA the device p in memory which contains the ID of the Authorization Center transactions wherein execution of the one or more sequences of machine-readable commands by the processor causes the processor to extract the network ID Center payment Authorization; set with Center Authorization network connection and send the second payment instruction to authorize the Authorization Center.

63. A computer device according to 57 of the Authorization Center, in memory which contains the ID of a Central Switch, wherein execution of the one or more sequences of machine-readable commands by the processor causes the processor to receive a payment instruction from the calling resource to extract from the received payment instruction, the CONDITION of the calling and called resources, to retrieve from memory the network identifier of the Central Switch contains the database with resource Files wired and wireless networks and the Internet, to establish a network connection with the Central Switch using the network identity of the caller and the callee resources extracted from the payment instruction, to search Files calling and called resources in the database of the Central Switch, extract financial information and details of financial accounts from the Files of the callee and the caller's resources, to authorize or refuse to authorize payment, to create the message the author is ment, containing at least part of the data removed from the payment instruction and the data of the authorization, to send an authorization message to the caller and the called resource network whose IDs are specified in the payment instructions.



 

Same patents:

FIELD: computer science.

SUBSTANCE: when user requests a certain address from computer, contact to first DNS server is performed. At least one other DNS server is associated with the latter, to which non-identified or partially identified internet address is sent, which is decode with use of serial comparison operation and is sent back as a known numeric code (IP-address) to user.

EFFECT: higher efficiency.

10 cl, 6 dwg

The invention relates to computer technology and can be used in the nodes of a packet switching data transmission network of automated control system

The invention relates to computer technology and can be used in the nodes of a packet switching data transmission network of automated control system

FIELD: technologies for realization of electronic payment circulation with utilization of mobile terminal.

SUBSTANCE: method includes following stages: transferring request for payment from mobile terminal into payment realization center, transfer of required payment parameters from mobile terminal to payment making center, assignment to each payment procedure of unique transaction code or permission code and transfer of assigned transaction code or permission code to mobile terminal and/or addressee of payment.

EFFECT: improved reliability of communication between payment requester and center for making payments.

2 cl, 9 dwg

FIELD: technology for automation of elections and cryptographic technologies used for this purpose.

SUBSTANCE: methods include encrypting selection in voting paper by means of first secret known only to operator, for generation of first component of encrypted voting paper, then selection is encrypted in voting paper by means of second secret, known only to operator, while second secret is selected independently on first secret, for generation of second component of encrypted voting paper. Then proof is generated, demonstrating that first and second components of encrypted voting paper are encrypted for one and the same selection in voting paper. First and second components of encrypted voting paper and proof are transmitted to computerized vote gathering system.

EFFECT: improved protection of voting platform from malicious software.

17 cl, 3 dwg

FIELD: technology for automation of elections and cryptographic technologies used for this purpose.

SUBSTANCE: methods include encrypting selection in voting paper by means of first secret known only to operator, for generation of first component of encrypted voting paper, then selection is encrypted in voting paper by means of second secret, known only to operator, while second secret is selected independently on first secret, for generation of second component of encrypted voting paper. Then proof is generated, demonstrating that first and second components of encrypted voting paper are encrypted for one and the same selection in voting paper. First and second components of encrypted voting paper and proof are transmitted to computerized vote gathering system.

EFFECT: improved protection of voting platform from malicious software.

17 cl, 3 dwg

FIELD: data processing technologies, possible use for verification of user rights for using a service.

SUBSTANCE: method for verification of user rights for using a service includes: provider provides for user at least one matrix of variable number and one matrix of variable signature. User forms his variable number on basis of variable number matrix and sends it to provider. On basis of results of check of variable number receiver from user provider determines whether this variable number belongs to this user. Then provider sends to user at least one query for variable signature. In response to query user forms his variable signature on basis of variable signature matrix and sends it to provider. If results of check of variable signature received from user are true, then provider verifies rights for usage of ordered service.

EFFECT: full confidentiality of user rights verification procedure, including when unprotected information channels are used for this purpose.

4 cl

FIELD: engineering of systems for marking and verifying objects, possible use for marking and identification of products, valuable papers and documents.

SUBSTANCE: system consists of verification center, data input stations, similar number of corporative databases of corporative control centers, n verification stations, system has blanks of protective marks with applied counting numbers, and cancelled marks, indexes show number of corporative control center acting as data provider. System provides for high protection of information applied onto protective mark.

EFFECT: possible marking of objects in several corporative subsystems and with reliable confirmation of authenticity of marked objects present in industrial circulation.

11 cl, 13 dwg

FIELD: recognition methods, possible use in industrial branches suffering from unsanctioned copying of serial products.

SUBSTANCE: method for protecting unique individual symbolic marking of serial product includes applying onto serial product of unique individual marking, visually recognizable and machine-readable, forming of interactive electronic database with unique symbolic machine-readable identifier, fully corresponding to symbolic value of unique individual marking on serial product and meant for positive authentication of serial product marking in aforementioned database, sending query for authentication of current marking of serial product in interactive electronic database, identification of aforementioned marking of serial product, automatic receipt of response about positive or negative authentication, automatic deletion of identifier corresponding to requested one from aforementioned database in case of and simultaneously with first positive authentication.

EFFECT: improved level of protection of serial product from unsanctioned access.

FIELD: computer science, in particular, engineering of information effect system of information-marketing centers in integrated electronic trading infrastructure.

SUBSTANCE: system has three registration devices, two adders, block for selecting supporting recording address, block for selecting supporting reading address, block for selecting query source address, block for selecting current record address, block for forming temporal period address, block for forming database addresses, block for controlling recording and reading of data and data dispensing block.

EFFECT: improved system speed of operation by excluding renewable data search across whole database of electronic trading and localizing search only by temporal and individual signs of goods identifiers.

9 dwg

FIELD: engineering of computerized information-analytic trading means, possible use for negotiating orders for buying and selling during performing of trade operations with cashless payment using communication network.

SUBSTANCE: system has authorization and registration block, roles block, block for controlling price offers, price forming block, block for controlling formulas, logistics block, block for controlling agreements, block for finding goods and making agreements, ordering block, block for accepting, block for forming goods movement graphs, display block, block for forming characteristics of goods and goods batches, block for controlling goods, block for purchasing goods, payment block, block for registering goods at warehouses, balances block, notifications block, documents registration block, block for payments and determining payments, automatic procedures block, activation block, analytics block, goods card block, marketing block, participants block, sells block.

EFFECT: expanded functional capabilities due to control over deliveries and quality of goods and services.

1 dwg

FIELD: engineering of equipment for processing documents.

SUBSTANCE: device has detector system for detecting characteristic signs of documents, controlling system for realization functions, connected to information, received by detector system and/or to documents processing method, aforementioned system includes memorizing device for storing a set of codes, each of which corresponds to appropriate function, and is made with possible permission of function use, if it is confirmed that transferred permitting code corresponds to one of stored function codes.

EFFECT: simplified adjustment processes of software-hardware equipment complex.

3 cl, 6 dwg

FIELD: engineering of information accumulation system, in particular - technology for performing an interactive game.

SUBSTANCE: each user is provided with means for identification as game participant, provided with a mark. As a mark, optical signal source is used. Positioning of device for receiving optical signals is performed relatively to multiple users. Source position of identification means of game participant is held relatively to means for receiving optical signals in accordance to game conditions. Game objects and rules are given to participants and game start signal is given. User targets his mark to appropriate means for receiving optical signals. Optical signals are received from game participants and received optical signals are registered in registration device. Signals are processed in accordance to given program and results are outputted on an information carrier.

EFFECT: possible polling of large group of participants and detection of winners, while maintaining anonymousness of results.

6 dwg

FIELD: computer science.

SUBSTANCE: device has n-byte query register, query limits location systems, each of which consists of counting timer and OR element, OR element, AND element, keys cascade.

EFFECT: higher reliability and speed of operation.

1 dwg

The invention relates to a device for data transmission and can be used in a synchronous telecommunication systems

The invention relates to computing and information exchange in computer network

The invention relates to computing, and in particular to a device pairing

The user interface // 2216771
The invention relates to computing, and in particular to systems displaying information on a computer

The invention relates to a device for data transmission and can be used in a synchronous telecommunication systems

The invention relates to automatic control and computer engineering, in particular to communication systems, and can be used in computer networks that use a common bus for connecting multiple subscribers
Up!