Method and system to provide objects, especially documents, multimedia objects, software applications and/or processes to users of a telecommunications network
First Claim
1. Method with which a first nomad user of a telecommunications network (2), in which users can provide objects to other users of the telecommunications network, the method comprising the steps:
- ofidentifying a user by using a personal identification module;
reserving by the first user of a memory area (440) in an accessible database system (4) in said telecommunications network, in which at least a number of users can store objects, filing by the first user of objects in said memory area (440), allocation by the first user of access authorizations (441) for said objects, sending by a second user of a query to said database system (4), verification of the access authorization of the second user through the database system (4), by using the second user'"'"'s identity (102) stored in his said personal identification module (10) for his identification in the database system (4), if his access authorization allows it, sending of a reply from the database system (4) to the second user, wherein said database system (4) is connected to said telecommunications network (2) via a TCP/IP link, wherein the queries from users and the replies from the database system (4) are converted in a DIA interface (3) between the telecommunications network (2) and the TCP/IP link, wherein at least some messages between said user and the database system (4) are signed electronically.
7 Assignments
0 Petitions
Accused Products
Abstract
Method with which a first user of a mobile telecommunications network, in which users are identified with a chip card by the provider of the telecommunications network, can provide objects to other users of the telecommunications network, with the following steps:
reserving by the first user of a memory area in an accessible database in said telecommunications network, in which at least a number of users can store objects, for example documents and programs,
filing by the first user of objects in said memory area,
allocation by the first user of access authorizations for said objects,
sending by a second user of a query to said database,
verification of the access authorization of the second user through the database administration system, by using the second user'"'"'s identity stored in his said personal identification module for his identification in the database administration system,
if his access authorization allows it, sending of a reply from the database to the second user.
78 Citations
53 Claims
-
1. Method with which a first nomad user of a telecommunications network (2), in which users can provide objects to other users of the telecommunications network, the method comprising the steps:
- of
identifying a user by using a personal identification module;
reserving by the first user of a memory area (440) in an accessible database system (4) in said telecommunications network, in which at least a number of users can store objects, filing by the first user of objects in said memory area (440), allocation by the first user of access authorizations (441) for said objects, sending by a second user of a query to said database system (4), verification of the access authorization of the second user through the database system (4), by using the second user'"'"'s identity (102) stored in his said personal identification module (10) for his identification in the database system (4), if his access authorization allows it, sending of a reply from the database system (4) to the second user, wherein said database system (4) is connected to said telecommunications network (2) via a TCP/IP link, wherein the queries from users and the replies from the database system (4) are converted in a DIA interface (3) between the telecommunications network (2) and the TCP/IP link, wherein at least some messages between said user and the database system (4) are signed electronically. - View Dependent Claims (2)
- of
-
3. Method with which a first nomad user of a telecommunications network (2), in which users can provide objects to other users of the telecommunications network, the method comprising the steps:
- of
identifying a user by using a personal identification module;
reserving by the first user of a memory area (440) in an accessible database system (4) in said telecommunications network, in which at least a number of users can store objects, filing by the first user of objects in said memory area (440), allocation by the first user of access authorizations (441) for said objects, sending by a second user of a query to said database system (4), verification of the access authorization of the second user through the database system (4), by using the second user'"'"'s identity (102) stored in his said personal identification module (10) for his identification in the database system (4), if his access authorization allows it, sending of a reply from the database system (4) to the second user, wherein a fee is billed at the analysis of at least certain queries, a message with at least one indication of this amount being prepared and sent to a billing center (21) in said telecommunications network (2), the billing center (21) also billing the users for use of the telecommunications network (2), and wherein said billing center (21) debits the user of that amount. - View Dependent Claims (4, 5)
- of
-
6. Method with which a first nomad user of a telecommunications network (2), in which users can provide objects to other users of the telecommunications network, the method comprising the steps:
- of
identifying a user by using a personal identification module regardless of the user'"'"'s geographic location and also regardless of any network being accessed;
reserving by the first user of a memory area (440) in an accessible database system (4) in said telecommunications network, in which at least a number of users can store objects, filing by the first user of objects in said memory area (440), allocation by the first user of access authorizations (441) for said objects, sending by a second user of a query to said database system (4), verification of the access authorization of the second user through the database system (4), by using the second user'"'"'s identity (102) stored in his said personal identification module (10) for his identification in the database system (4), if his access authorization allows it, sending of a reply from the database system (4) to the second user. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53)
- of
Specification