Sign In to Follow Application
View All Documents & Correspondence

Method And Device For Implementing Authorized Master Controls

Abstract: The present invention relates to implementing master controls on a communication device to control calls directed to/from the communication device. In one embodiment, upon detecting a call directed to the communication device from a calling device, modification information associated with the communication device is fetched from a database. A first identifier associated with the calling device is modified using the modification information and the call is routed to the communication device such that the modified first identifier is provided to the communication device in place of the first identifier. In another embodiment, upon detecting a call directed from the communication device to a called device, calling rules and routing identifiers associated with the called party are fetched from a database. The call is then routed to a first routing identifier based on the calling rules.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
21 July 2016
Publication Number
32/2016
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
mail@lexorbis.com
Parent Application
Patent Number
Legal Status
Grant Date
2023-11-24
Renewal Date

Applicants

Comviva Technologies Limited
A-26, Info City, Sector 34, Gurgaon-122001, Haryana, India

Inventors

1. JAIN, Manish Kumar
43, Vasudha Enclave, Pitampura, Delhi – 110034, India
2. RABRA, Arun
196, Sector 21-C, Faridabad, Haryana – 121001, India

Specification

DESCRIPTION
TECHNICAL FIELD OF INVENTION
The invention generally relates to communication controls. More particularly, the
invention relates to implementation of authorized controls for controlling calls between
various communication devices.
BACKGROUND OF INVENTION
There are various types of call control techniques available in the market. One
example of call control technique is parental controls which are implemented by parents to
ensure safety and protection of their children. One such measure includes providing cell
phones to children so that the children can immediately contact their parents in need of
emergency. Various solutions are available to prevent threat activities (e.g. calls or messages
from strangers) and unsupervised access to various features of the smart phone (e.g.
accessing in-appropriate web sites). These solutions also limit various activities of the child
using the smart phone, such as playing games, and texting, and calling, based on various
parameters such as time, date, and contact numbers.
In one solution, a parent through a parent device (e.g. mobile phone) sets parental
control settings to a child device (e.g. mobile phone). The control settings include list of
authorized incoming and outing number, type of incoming and outgoing communication (e.g.
call and SMS) allowed, duration or time period for restricting or allowing incoming and
outgoing communications and web access, and type of applications allowed. The control
settings are either stored in a database or in the child device. The child device monitors each
incoming and outgoing communication and rejects or allows the communication based the
stored control settings.
In another solution, child mobile device functions are controlled via a combination of
parental control settings set by a parent-user and parental control settings set by a third partyuser.
A parental control server receives parental control settings and context criteria from a
parent-user, and parental control settings from a third party user. The parental control server
receives authorization from the parent-user to allow third party parental controls to control a
child's device. The control settings may restrict each cell phone feature based on time,
location and/or the individual demographics of each child. The parental control settings and
third party user control settings are transmitted to the child mobile device. When the context
criteria identified by the parent is present (e.g., child device is in an identified location, time
of day, day of week, etc.), the parental control settings are override by the third party user
3
control settings, and incoming and outgoing communications are monitored in accordance
with the third party user control settings.
In one another solution, a parental authority selects a parental control feature to be
implemented at a child mobile station and by way of a user interface at a computer
workstation or a master mobile station. Detection is made of the selection, and a control
signal is generated that includes identification of the selection. The control signal is sent to
the child mobile station. Once received at the mobile station, the control signal is detected, its
contents ascertained, and the parental control feature is implemented at the mobile station.
In yet another solution, a controlling device (parent device) includes a communication
interface for control communication with one or more associated devices of the controlling
device, and the associated devices (child devices) correspond to members of a group. An
integrated display device displays a parental control user interface. A parental control service
is implemented to receive an input of a device control via the parental control user interface,
where the device control is initiated for one or more of the associated devices that are
controllable by the controlling device. The parental control service can then initiate
communication of the device control to the associated devices that are controlled by the
controlling device.
As can be gathered from above, all the solution necessitates transmission of the
control settings to the child device and further saving of the control settings in the child
device. However, such saving of control settings is vulnerable to tampering by unauthorized
users.
Another example of call control technique is creation of closed user group (CUG) or
virtual private network (VPN) which allows members of the CUG to call each other using
short codes rather than complete phone numbers. Various solutions are for creation of such
CUG or VPN. In one solution, subscribers of different VPN of a single organization can call
each other using short codes assigned to them. In another solution, CUG can also be defined
for Internet Telephony Network.
These solutions establish the call based on calling party and called party being
members of the CUG. However, these solutions do not provide any option if the call is
established but the called party is not available. Further, the call controls are universal to
every subscriber in the CUG.
Therefore, there is a need for a better call control solution which overcomes all the
above deficiencies.
4
SUMMARY OF INVENTION
In accordance with the purposes of the invention, the present invention as embodied
and broadly described herein, implementation of authorized master controls for controlling
calls.
Accordingly, a control server receives control data from a computing device. In one
example, the computing device is used by a user such as parent, guardian, administrator, and
supervisor. The control data includes a predefined list of identifiers associated with one or
more devices authorized to establish a call with a communication device, modification
information associated with the one or more devices, at least one calling rule associated with
the one or more devices, and one or more routing identifiers associated with the one or more
devices. The control server then stores the control data in a database.
In one embodiment, the control server receives a request trigger from a calling device.
The request trigger is indicative of call directed to the communication device and includes a
first identifier associated with the calling device and a second identifier associated with the
communication device. In one example, the communication device is used by a child. Based
on the first identifier, the control server fetches modification information associated with the
calling device from a database. The modification information is one of: a short code and a
combination of digits of predefined length. The control server then modifies the first
identifier using the modification information. Thereafter, the control server routes the call to
the communication device based on the second identifier, wherein the modified first identifier
is provided to the communication device in place of the first identifier.
Further, prior to fetching, the first identifier is compared with the predefined list of
identifiers. If a match exists, the modification information is fetched. On the contrary, if a
match does not exist, the calling device is determined to be unauthorized to establish a call
with the communication device and the call is terminated.
In another embodiment, the control server receives a request trigger from the
communication device. The request trigger is indicative of call directed to a called party and
includes a first identifier associated with the called party, a second identifier associated with
the communication device, and metadata information of the call. The first identifier is a short
code associated with the called party and the second identifier is a device identifier of the
communication device. The metadata information includes a location of the communication
device, a date of the call, and a time-stamp for the call.
5
Upon receiving the trigger, the control server fetches, at least one calling rule and one
or more routing identifiers associated with the called party from a database based on the first
identifier. The at least one calling rule is defined based on at least one of: location of called
party and time of day. The one or more routing identifiers include a device identifier of a
communication device.
Thereafter, the control server determines a first routing identifier from the one or
more routing identifiers based on the second identifier, the metadata information, and the at
least one calling rule. The control server then routes the call based on the first routing
identifier and the second identifier.
Further, prior to fetching, the first identifier is compared with the predefined list of
identifiers. If a match exists, the modification information is fetched. On the contrary, if a
match does not exist, the called party is determined to be unauthorized to establish a call with
the communication device and the call is terminated.
The advantages of the present invention include, but are not limited to, controlling the
call directed to or from the communication device via the control server based on authorized
master controls.
Further, the authorized master controls are stored in the database associated with the
control server. This prevents tampering or manipulating of control data by unauthorized
persons including the owners of the communication device, for example, a child, and the
devices authorized to call the communication device. In addition, both incoming and
outgoing calls are monitored on the communication device and on the devices authorized to
establish communication. This results in improving security for the communication device.
These and other aspects as well as advantages will be more clearly understood from the
following detailed description taken in conjunction with the accompanying drawings and
claims.
BRIEF DESCRIPTION OF THE ACCOMPANYING DRAWINGS
To further clarify the advantages and features of the invention, a more particular
description of the invention will be rendered by reference to specific embodiments thereof,
which is illustrated in the appended drawings. It is appreciated that these drawings depict
only typical embodiments of the invention and are therefore not to be considered limiting of
its scope. The invention will be described and explained with additional specificity and detail
with the accompanying drawings in which:
6
Figure 1 illustrates a control server implementing authorized master controls for
controlling a call directed to or from a communication device, in accordance with an
embodiment of present invention.
Figure 2 illustrates an exemplary network environment that facilitates
implementation of authorized master controls for controlling a call directed to or from a
communication device, in accordance with an embodiment of present invention.
Figure 3 illustrates a flow diagram for controlling a call directed to a communication
device, in accordance with an embodiment of present invention.
Figure 4 illustrates a flow diagram for controlling a call directed from a
communication device, in accordance with an embodiment of present invention.
Figure 5 illustrates an exemplary method implemented at a control server for
controlling a call directed to a communication device, in accordance with an embodiment of
present invention.
Figure 6 illustrates an exemplary method implemented at a control server for
controlling a call directed from a communication device, in accordance with an embodiment
of present invention.
Figure 7 illustrates a typical hardware configuration of a computing system, which is
representative of a hardware environment for practicing the present invention.
It may be noted that to the extent possible, like reference numerals have been used to
represent like elements in the drawings. Further, those of ordinary skill in the art will
appreciate that elements in the drawings are illustrated for simplicity and may not have been
necessarily drawn to scale. For example, the dimensions of some of the elements in the
drawings may be exaggerated relative to other elements to help to improve understanding of
aspects of the invention. Furthermore, the one or more elements may have been represented
in the drawings by conventional symbols, and the drawings may show only those specific
details that are pertinent to understanding the embodiments of the invention so as not to
obscure the drawings with details that will be readily apparent to those of ordinary skill in the
art having the benefits of the description herein.
DETAILED DESCRIPTION
For the purpose of promoting an understanding of the principles of the invention,
reference will now be made to the embodiment illustrated in the drawings and specific
language will be used to describe the same. It will nevertheless be understood that no
limitation of the scope of the invention is thereby intended, such alterations and further
7
modifications in the illustrated system, and such further applications of the principles of the
invention as illustrated therein being contemplated as would normally occur to one skilled in
the art to which the invention relates.
It will be understood by those skilled in the art that the foregoing general description
and the following detailed description are exemplary and explanatory of the invention and are
not intended to be restrictive thereof. Throughout the patent specification, a convention
employed is that in the appended drawings, like numerals denote like components.
Reference throughout this specification to “an embodiment”, “another embodiment”
or similar language means that a particular feature, structure, or characteristic described in
connection with the embodiment is included in at least one embodiment of the invention.
Thus, the appearances of the phrase “in an embodiment”, “in another embodiment” and
similar language throughout this specification may, but do not necessarily, all refer to the
same embodiment.
The terms "comprises", "comprising", or any other variations thereof, are intended to
cover a non-exclusive inclusion, such that a process or method that comprises a list of steps
does not include only those steps but may include other steps not expressly listed or inherent
to such process or method. Similarly, one or more devices or sub-systems or elements or
structures proceeded by "comprises... a" does not, without more constraints, preclude the
existence of other devices or other sub-systems.
Various embodiments of the invention will be described below in detail with
reference to the accompanying drawings.
Figure 1 illustrates an exemplary control server (100) enabling implementation of
authorized master controls for controlling a child’s communication device.
In one embodiment, the control server (100) implements authorized master controls
for controlling a call directed to a communication device. Accordingly, the control server
(100) includes a trigger receiving unit (101) adapted to receive a request trigger from a
calling device. The request trigger is indicative of call directed to the communication device.
The request trigger includes a first identifier associated with the calling device and a second
identifier associated with the communication device. The first identifier is a device identifier
of the calling device and the second identifier is a device identifier of the communication
device.
The control server (100) further includes an analysis unit (102) adapted to fetch
modification information associated with the calling device from a database (103) based on
the first identifier. In one example, the database (103) can be external to the control server
8
(100). In another example, the database (103) can be internal to the control server (100). The
database (103) includes a predefined table identifying a mapping between the first identifier
and the modification information. The database (103) further includes a predefined list of
identifiers associated with one or more calling devices. The one or more calling devices are
authorized to establish a call with the communication device.
To fetch the modification information, the analysis unit (102) compares the first
identifier with the predefined table and fetches the modification information based on the
mapping.
Further, the analysis unit (102) is adapted to modify the first identifier using the
modification information.
Further, the analysis unit (102) is adapted to prevent the call from being established
between the calling device and the communication device based on the first identifier and the
second identifier prior to fetching the modification information.
The control server (100) further includes a routing unit (104) adapted to route the call
to the communication device based on the second identifier, wherein the modified first
identifier is provided to the communication device in place of the first identifier.
Accordingly, the routing unit (104) may direct a network operator to establish call between
the calling device and the communication device and display the modified first identifier
instead of the first identifier.
Further, prior to fetching, the analysis unit (102) is adapted to compare the first
identifier with the predefined list of identifiers and determine the first identifier is available in
the predefined list of identifiers. If a match exists, i.e., the first identifier is available in the
predefined list of identifiers, the analysis unit (102) determines the calling device is
authorized and fetches the modification information. On the contrary, if a match does not
exist, i.e., the first identifier is not available in the predefined list of identifiers, the analysis
unit (102) determines the calling device is unauthorized to establish a call with the
communication device and terminates the call.
In another embodiment, the control server (100) implements master control for
controlling a call directed from the communication device. Accordingly, the trigger receiving
unit (101) is adapted to receive a request trigger from the communication device. The request
trigger is indicative of call directed to a called party from the communication device. The
request trigger includes a first identifier associated with the called party, a second identifier
associated with the communication device, and metadata information of the call.
9
Further, the first identifier is one of a short code and a combination of digits of
predefined length associated with the called party and the second identifier is a device
identifier of the communication device.
Further, the metadata information includes a location of the communication device, a
date of the call, and a time-stamp for the call.
Further, the analysis unit (102) is adapted to fetch at least one calling rule and one or
more routing identifiers associated with the called party from the database (103) based on the
first identifier. The at least one calling rule is defined based on at least one of location of
called device and time of day. The one or more routing identifiers include a device identifier
of a communication device. The database (103) further includes a predefined list of
identifiers associated with one or more called devices, wherein the communication device is
authorized to establish a call with the one or more called devices.
Further, the analysis unit (102) is adapted to determine a first routing identifier from
the one or more routing identifiers based on the second identifier, the metadata information,
and the at least one calling rule.
Further, the routing unit (104) is adapted to route or direct the call based on the first
routing identifier and the second identifier. Accordingly, the routing unit (104) may direct the
network operator to establish call between the device having the first routing identifier and
the communication device.
Further, prior to fetching, the analysis unit (102) is adapted to compare the first
identifier with the predefined list of identifiers and determine the first identifier is available in
the predefined list of identifiers. If a match exists, i.e., the first identifier is available in the
predefined list of identifiers, the analysis unit (102) determines the calling device is
authorized and fetches the at least one calling rule and the one or more routing destinations.
On the contrary, if a match does not exist, i.e., the first identifier is not available in the
predefined list of identifiers, the analysis unit (102) determines the calling device is
unauthorized to establish a call with the communication device and terminates the call.
The control server (100) further enables creation of control data for implementing the
parent controls. Accordingly, the control server (100) includes a configuration setting unit
(105) adapted to enable a user via a master computing device to provide control data for
implementing the authorized master controls. The control data includes the control
parameters, the predefined list of identifiers corresponding to the authorized devices, the
modification information corresponding to each of the authorized devices, calling rules, and
10
the routing identifiers. The configuration setting unit (105) is further adapted to store the
control data in the database (103).
The control server (100) further includes configuration transmitting unit (106) adapted
to transmit the modification information to the communication device and the one or more
authorized devices or associated devices (hereinafter referred interchangeably). Further, the
configuration transmitting unit (106) is adapted to transmit an indication to a network
operator that calls to and from the communication device and the associated devices are to be
sent to the control server (100) for processing prior to establishing the call.
Further, in one implementation, any of the units can be implemented as a
software/hardware/combination of hardware and software module in the control server (100).
In another implementation, any combination of the units can be implemented a
software/hardware/combination of hardware and software module in the control server (100).
The control server (100) further includes a memory (107) which may include one or
more of routines, programs, objects, components, data structures, etc., which perform
particular tasks, functions or implement particular abstract data types.
The control server (100) further includes a processor (108) adapted to perform
necessary functions of the control server (100). Further, in one embodiment, all the above
mentioned units, i.e., the trigger receiving unit (101), the analysis unit (102), the routing unit
(104), the configuration setting unit (105), and the configuration transmitting unit (106) are
provided separately from the processor (108).
In another embodiment, all the above mentioned units, i.e., the trigger receiving unit
(101), the analysis unit (102), the routing unit (104), the configuration setting unit (105), and
the configuration transmitting unit (106) are present as a part of the processor (108).
In one another embodiments, any one of above mentioned units is present as a part of
the processor (108). In one such implementation, only the trigger receiving unit (101) is
present as a part of the processor (108). In one such implementation, only the analysis unit
(102) is present as a part of the processor (108). In one such implementation, only the routing
unit (104) is present as a part of the processor (108). In one such implementation, only the
configuration setting unit (105) is present as a part of the processor (108). In one such
implementation, only the configuration transmitting unit (106) is present as a part of the
processor (108).
In yet another embodiment, any combination of abovementioned units is present as a
part of the processor (108). In one such implementation, the trigger receiving unit (101) and
the analysis unit (102) are present as a part of the processor (108). In one such
11
implementation, the trigger receiving unit (101), the analysis unit (102), and the routing unit
(104) are present as a part of the processor (108). In one such implementation, the trigger
receiving unit (101), the analysis unit (102), the routing unit (104), and the configuration
setting unit (105) are present as a part of the processor (108). In one such implementation, the
trigger receiving unit (101), the analysis unit (102), the routing unit (104), the configuration
setting unit (105), and the configuration transmitting unit (106) are present as a part of the
processor (108). Although, few combinations have been illustrated above, it is to be
understood that any combination of the units is possible within the scope of the invention.
Although, specific hardware has been illustrated in the figure and described above, it
should be understood that the calling device (not shown in the figure) may include other
hardware modules or software module or combinations as may be required for performing
various functions.
Figure 2 illustrates an exemplary network environment (200) that facilitates
implementation of authorized master controls for controlling a communication device, in
accordance with an embodiment of present invention. In such embodiment, the network
environment (200) includes a communication network (201) enabling various devices to
communicate with each other over data communication mode such as Internet, cloud
network, wired network, and wireless network such as Wi-Fi, PSTN, and mobile network.
Thus, the communication network (201) may include one or more network nodes or network
operators such as mobile Switching centre (MSC), a base station subsystem (BSS), a radio
access network (RAN), a telephone exchange, a telephone switch, and server(s) supporting
the multimedia calling applications.
The network environment (200) further includes a control server (202) coupled to the
communication network (201). The control server (202) includes components as illustrated in
Figure 1 above. In one implementation, the control server (202) is part of or integrated with
the network operators in the communication network (201). In another example, the control
server (202) is external to the network operators but is communicatively coupled with the
network nodes in the communication network (201).
Further, the control server (202) provides a user interface accessible to a master
computing device (203) via the communication network (201). Examples of the master
computing device (203) include, but not limited to, desktop, smart phone, notebook, mobile
phone, and laptop. Examples of the interface include, but not limited to, web-interface,
message interface, and mobile interface.
12
The user interface allows the user to set, update, and/or maintain control parameters
on the control server (202). The control parameters implement call control features on a
communication device (204). Examples of the communication device (204) include, but not
limited to, smartphone, mobile phone, computer, laptop, desktop, notebook, and kids phone.
Examples of such user include, but not limited to, parent, supervisor, and administrator.
Accordingly, the configuration setting unit (105) of the control server (202) provides
the user interface on the master computing device (203). The user can access the user
interface in a manner as known in the art, such as via SMS, USSD, IVR, web-based
application, and mobile-based application. Upon accessing the user interface, the user can
register him/her and save an identifier associated with the master control device (203) and the
communication device (204). The identifier can be a unique identification of the device itself
or user of the device. Examples of the identifier include, but not limited to, telephone number
of the device, MSISDN of the device, IMSI of the device, IMEI of the device, MAC address
of the device, IP address of the device, user-id associated with multimedia calling application,
and combination thereof.
Further, the user can define control parameters such as master controls, audit controls,
advertisement controls, authorization controls, and configurations controls, as known in the
art. Examples of such controls include, but not limited to, defining whitelist and/or blacklist
of callers, limiting device usage in terms of duration and/or volume of calls and messages,
limiting data usage, and restricting forwarding of messages.
In accordance with the invention, the user can define one or more authorized or
associated devices (205-1, 205-2, …, 205-N) (hereinafter referred to as authorized or
associated device (205) indicating one authorized or associated device, and authorized or
associated devices (205) indicating a plurality of authorized or associated devices). In other
words, the communication device (204) can make or receive calls only from the authorized
devices (205) (hereinafter interchangeably referred to as associated devices (205)) over the
communication network (201) such as through multimedia calling application(s), PSTN, and
mobile network.
Further, the associated devices (205) can include the master computing device (203).
The authorized device (205) is any electronic device capable of making or receiving a call
over the communication network (201) such as through multimedia calling application(s),
PSTN, and mobile network. Examples of the authorized device (205) include smart phone,
mobile phone, telephone, tablet, notebook, and personal digital assistance (PDA).
Accordingly, the user can set a list of identifiers associated with the one or more authorized
13
devices (205) through the configuration setting unit (105). The identifier can be a unique
identification of the device itself or user of the device. Examples of the identifier include, but
not limited to, telephone number of the device, MSISDN of the device, IMSI of the device,
IMEI of the device, MAC address of the device, IP address of the device, user-id associated
with multimedia calling application, and combination thereof.
Further, the user can assign modification information to each of the identifiers. The
modification information can be either same or different for each of the one or more
authorized devices (205). In one implementation, the modification information can be short
code. In another implementation, the modification information can be a combination of digits
of predefined length. Accordingly, the user can provide a mapping between the identifier of
the one or more authorized devices (205) and the modification information. In an example,
identifier can be mobile number and telephone number of authorized device and modification
information mapped to the identifier can be 1234. Thus, the modification information defines
settings for controlling a call directed to the communication device (204) from the authorized
devices (205).
In one example, the user can be mother, and the user can define the devices of father,
mother, class teachers, and two friends of a child as authorised devices to establish call with
the child. In such example, the user can define list of identifiers and provide mapping
information between the device identifiers and the modification information as below:
Name Identifier Modification Information
Father F1 (landline number), F2 (mobile
number), F3 (office number)
606
Mother M1 (mobile number) 706
Class teacher T1 (mobile number), T2 (school
number)
806
Friend 1 N11 (mobile number), N12 (video
calling application id)
901
Friend 2 N21 (mobile number), N22 (video
calling application id)
902
Further, the user can define one or more calling rules and one or more routing
identifiers. The calling rules are defined based on various parameters such as location of
authorized devices (205) and time of day. The routing identifiers are a unique identifier
14
associated with the authorized devices (205), as described above. Examples of the routing
identifier include, but not limited to, telephone number of the device, MSISDN of the device,
IMSI of the device, IMEI of the device, MAC address of the device, IP address of the device,
user-id associated with multimedia calling application, and combination thereof. Each calling
rule can be associated with one or more routing identifiers in a predefined order.
Thus, the calling rules define settings for controlling a call directed to the one or more
authorized devices (205) from the communication device (204). In the above example, the
user can define a first calling rule for father based on location ‘home/near home’ and time
2200 hours, and routing identifier as F1, a second calling rule for father based on location
‘tennis club’ and time 1100 hours, routing identifier as F2. The user may set the rules and the
routing identifiers as known in the art. Thus, it would be understood, the master control
device (203) is a device through which the user can set, update, and/or maintain control
parameters. This prevents unauthorized access to the control data/parameters.
Upon receiving control data from the master computing device (203) that includes the
control parameters, the predefined list of identifiers corresponding to the authorized devices
(205), the modification information corresponding to each of the authorized devices, the
calling rules, and the routing identifiers, the configuration setting unit (107) transmits the
control data to a database (206) coupled to the control server (202). The database (206) is
similar to the database (103) as described in Figure 1. Thus, in one implementation, the
control data can be stored in the database (206) in form of a table. This prevents tampering or
manipulating of control data by unauthorized persons as only authorized persons can access
the control server (202) and the database (206).
Thereafter, the configuration transmitting unit (106) transmits the modification
information to the communication device (204) and identifier of the communication device
(204) to the associated devices (205) over the communication network (201) such that the
modification information is stored in a memory of the communication device (204) and the
associated devices (205). This enables quick accessing of the modification information.
Referring to above example, MSISDN of the communication device is stored in a
contact list of the devices corresponding to Father, Mother, Class Teacher, and friends.
Similarly, the modification information 606, 706, 806, 901, and 902 is stored in the contact
list of the communication device. In addition, this enables a user of the communication
device to remember only the modification information and does not have to remember full 8
or 10 digit contact numbers. Accordingly, the control transmitting unit (108) generates a
15
message suitable for transmitting the modification information and transmits the message as
known in the art.
Further, the configuration transmitting unit (106) does not transmit any control data to
the associate devices (205) and the communication device (204). Therefore, the control data
is not stored in either of the communication device (204) and the authorized devices (205).
This prevents tampering or manipulating of control data by unauthorized persons including
the child, in case of parental control data. Further, the configuration transmitting unit (106)
transmits an indication to the network operators that calls to and from that calls to and from
the communication device (204) and the associated devices (205) are to be sent to the control
server (202) for processing prior to establishing the call.
In operation, in one embodiment, the control server (202) controls a call directed to
the communication device (204). Figure 3 illustrates flow diagram (300) corresponding to
the implementation of the master controls upon receiving a call from a calling device (206) to
the communication device (204). The calling device (206) can be any electronic device
capable of making or receiving calls over the communication network (201). Examples of the
calling device (206) include, but not limited to, desktop, smart phone, notebook, mobile
phone, and laptop.
Accordingly, the calling device (206) initiates a call to the communication device
(204) over the communication network (201). The call can be through multimedia calling
application(s), PSTN, and mobile network. Upon detecting a placement of the call, the calling
device (206) transmits a request trigger to the control server (202) over communication
network (201). In one example, such a request trigger can be generated and sent by the using
a message frame, as known in the art.
The request trigger is indicative of call directed to the communication device (204).
The request trigger includes a first identifier associated with the calling device (206) and a
second identifier associated with the communication device (204). The first identifier can be
one of a telephone number of the device, MSISDN of the device, IMSI of the device, IMEI of
the device, MAC address of the device, IP address of the device, and user-id associated with
multimedia calling application. The second identifier can be one of a telephone number of the
device, MSISDN of the device, IMSI of the device, IMEI of the device, MAC address of the
device, IP address of the device, and user-id associated with multimedia calling application.
Further, the request trigger may be generated upon determining the second identifier
corresponding to the communication device (204). As would be understood, the request
trigger is first received by a network operator and then transmitted to the control server (202).
16
Further, upon receiving the request trigger, the control server (200) prevents
establishment of the outgoing call between the calling device (206) and the communication
device (204) based on the first identifier and the second identifier. In one implementation, the
control server (202) sends a request message to the network operator to put the call on hold.
At step 301, the trigger receiving unit (101) of the control server (202) receives the
request trigger.
At step 302, the analysis unit (102) is adapted to compare the first identifier with the
predefined list of identifiers and determine the first identifier is available in the predefined list
of identifiers. If a match exists, i.e., the first identifier is available in the predefined list of
identifiers, the analysis unit (102) determines the calling device is authorized and flow
proceeds to step 304.
On the contrary, if a match does not exist, i.e., the first identifier is not available in the
predefined list of identifiers, the analysis unit (102) determines the calling device (206) is
unauthorized to establish a call with the communication device (204) and terminates the call
at step 303. Therefore, the call will not be established between the calling device (206) and
the communication device (204). Message(s) indicative of non-establishment of the call will
be sent to the calling device (206), as known in the art.
At step 304, the analysis unit (102) fetches the predefined table identifying a mapping
between identifiers of the authorized devices (205) and the modification information from the
database (206). Upon fetching, the analysis unit (102) compares the first identifier with the
predefined table and obtains the modification information associated with the authorized
device.
In the above example, when a request trigger is received from the device of father
having identifier F1, the modification information 606 is determined from the table.
Thereafter, the analysis unit (102) modifies the first identifier using the modification
information. In one implementation, the analysis unit (102) modifies the first identifier by
masking the entire first identifier with the modification information. The analysis unit (102)
can use any of the masking techniques as known in the art.
At step 305, the routing unit (104) of the control server (202) routes the call to the
communication device (204), wherein the modified first identifier is provided to the
communication device (204) in place of the first identifier. In one implementation, the
routing unit (104) transmits a call trigger to the network operator or network node in the
communication network (201) in conventional manner for establishing the call between the
communication device (204) and the authorized device (205). The call trigger includes the
17
second identifier and the modified first identifier. The call trigger further includes a request to
release the call that was earlier put on hold.
At step 306, the network operator then establishes the call between the
communication device (204) and the authorized device (205) and displays the modified first
identifier on a display unit of the communication device (204).
Thus, in the above example, whenever the father calls the communication device
(204) using devices having identifier F1, F2, or F3, the modified identifier information 606 is
displayed on the display unit of the communication device (204).
Further, all calls made to the communication device (204) are routed to the control
server (202). If the call is made from the authorized device, then the call is processed as
described above. However, if the call is made from device other than the authorized device,
then the call is terminated.
Further, it would be understood, that the network environment (200) may include one
or more master control servers (not shown in the figure) which implement the master control
features in a manner as known in the art. For example, when a call is received from a device,
which is not one of the authorized devices, then the call will be directed to the master control
server(s) via the network operator in the communication network (201) due to unavailability
of the control settings module in the device. The master control server(s) will then perform
necessary action based on control parameters set by the user in the master control server(s).
In operation, in another embodiment, the control server (202) controls a call directed
from the communication device (204). Figure 4 illustrates flow diagram (400) corresponding
to the implementation of the master control feature upon receiving a call from the
communication device (204) to a called device (207). The called device (207) can be any
electronic device capable of making or receiving calls over the communication network
(201). Examples of the called device (207) include, but not limited to, desktop, smart phone,
notebook, mobile phone, and laptop.
Accordingly, the communication device (204) initiates a call to the called device
(207) over the communication network (201). Upon detecting a placement of the call, the
communication device (204) transmits a request trigger to the control server (202) over
communication network (201). In one example, such a request trigger can be generated and
sent by using a message frame, as known in the art. As would be understood, the request
trigger is first received by a network operator and then transmitted to the control server (202).
The request trigger is indicative of call directed to the called device (207). The request
trigger includes a first identifier associated with the called device (207), a second identifier
18
associated with the communication device (204), and metadata information of the call. The
first identifier can be a short code or a combination of digits of predefined length, i.e., the
modification information. In one example, the first identifier is stored in a contact list of the
communication device (204). The second identifier is one of a telephone number of the
device, MSISDN of the device, IMSI of the device, IMEI of the device, MAC address of the
device, IP address of the device, and user-id associated with multimedia calling application.
The metadata information includes location of the communication device (204), a date of the
call, and a time-stamp for the call. The location of the communication device (204) can be
determined using location determining techniques such as GPS-location and satellite
triangulation. The metadata information can be obtained from call logs of the communication
device (204).
Further, upon receiving the request trigger, the control server (202) prevents
establishment of the outgoing call between the communication device (204) and the called
device (207). In one implementation, the control server (202) sends a request message to the
network operator or the network node to put the call on hold.
At step 401, the trigger receiving unit (101) of the control server (202) receives the
request trigger.
At step 402, the analysis unit (102) is adapted to compare the first identifier with the
predefined list of identifiers and determine the first identifier is available in the predefined list
of identifiers. If a match exists, i.e., the first identifier is available in the predefined list of
identifiers, the analysis unit (102) determines the called device (207) is authorized or the
authorized device (205) and the flow proceeds to step 404.
On the contrary, if a match does not exist, i.e., the first identifier is not available in the
predefined list of identifiers, the analysis unit (102) determines the called device (207) is
unauthorized to establish a call with the communication device (204) and terminates the call
at step 403. Therefore, the call will not be established between the communication device
(204) and the called device (207). Message(s) indicative of non-establishment of the call will
be sent to the called device (207), as known in the art.
At step 404, the analysis unit (102) fetches at least one calling rule and one or more
routing identifiers associated with the authorized device (205) from the database (206) based
on the first identifier.
Thereafter, the analysis unit (102) determines a first routing identifier from the one or
more routing identifiers based on the second identifier, the metadata information, and the at
least one calling rule. As described earlier, the routing identifier is an identifier associated
19
with the authorized devices (205). Accordingly, the analysis unit (102) may again determine
the location of the communication device (204) using location determining techniques such
as GPS-location and satellite triangulation and/or cell id of device or using other location
identification method. Based on the location, the analysis unit (102) may compare the
location specified by the calling rule and accordingly determine the routing identifier.
Similarly, the analysis unit (102) may determine the time of the call from the metadata
information and analyse the calling rule.
In one example, the communication device (204) is placing a call to father by dialling
the modification information. The analysis unit (102) fetches a first calling rule based on
location ‘school’ of the communication device (204), location ‘office’ of the authorized
device (205), time 1200 hours, and routing identifier as F1, and a second calling rule based
on location ‘school’ of the communication device (204), location ‘tennis club’ of the
authorized device (205), time 0900 hours, and routing identifier as F2. In such example, if the
current location of the communication device (204) is “school” and the time of the call is
1200 hours, the analysis unit (206) determines the routing identifier as F1. On the other hand,
if the current location of the communication device (204) is “school” and the time of the call
is 0900 hours, the analysis unit (206) determines the routing identifier as F2.
Further, if no routing identifier is available in accordance with the metadata
information and the calling rule(s), the analysis unit (102) may determine a default routing
identifier. In one implementation, the default routing identifier can be the authorized device
(205) of the user setting the master control feature. In the above example, if the current
location of the communication device (204) is “school” and the time of the call is 1230 hrs,
the analysis unit (102) determines the routing identifier M1 of mother as no routing
destination is specified for the location and time of the call.
At step 405, the routing unit (104) of the control server (202) routes the call to the
first routing identifier. In one implementation, the routing unit (104) transmits a call trigger to
the network operator or the network node in the communication network (201) in
conventional manner for establishing the call between the communication device (204) and
the first routing identifier of the authorized device (205). The call trigger includes the first
routing identifier and the second identifier. The call trigger further includes a request to
release the call that was earlier put on hold.
At step 406, the network operator then establishes the call between the
communication device (204) and the authorized device (205) having the first routing
20
identifier. The authorized device (205) can be the same called device (207) or other device
having the first routing identifier.
Thus, all calls made by the communication device (204) are routed to the control
server (202). If the call is made to an authorized device, then the call is processed as
described above. However, if the call is made to a device other than the authorized device,
then the call is terminated.
Figure 5 illustrate a method (500) implemented at a control server for controlling a
call directed to a communication device, in accordance with an embodiment of present
invention. The order in which the method is described is not intended to be construed as a
limitation, and any number of the described method blocks can be combined in any order to
implement the method, or an alternative method. Additionally, individual blocks may be
deleted from the method without departing from the spirit and scope of the subject matter
described herein. Furthermore, the method can be implemented in any suitable hardware,
software, firmware, or combination thereof.
At block 501, control data is received from a master computing device. The control
data includes predefined list of identifiers associated with one or more devices authorized to
establish a call with the communication device and modification information associated with
the one or more devices. For example, the control server (202) receives the control data from
the parent computing device (203).
At block 502, the control data is stored in the database. For example, the control
server (202) stores the control data in the database (206).
At block 503, a request trigger from a calling device is received. The request trigger is
indicative of call directed to the communication device and includes a first identifier
associated with the calling device and a second identifier associated with the communication
device. For example, the trigger receiving unit (101) in the control server (202) receives the
request trigger from the authorized device (205).
At block 504, modification information associated with the calling device is fetched
from a database based on the first identifier.
The fetching of the modification information includes further steps. Accordingly, at
block 505, the first identifier is compared with a predefined table stored in the database. The
table identifies a mapping between the first identifier and the modification information. For
example, the analysis unit (102) in the control server (202) fetches the modification
information from the database (202).
21
At block 506, the first identifier is modified using the modification information. For
example, the analysis unit (102) in the control server (202) modifies the first identifier using
the modification information.
At block 507, the call to the communication device is routed based on the second
identifier, wherein the modified first identifier is provided to the communication device in
place of the first identifier. For example, the routing unit (104) routes the call between the
communication device (204) and the authorized device (205) such that the modified first
information is displayed on a display unit of the communication device
Figure 6 illustrate a method (600) implemented at a control server for controlling a
call directed from a communication device, in accordance with an embodiment of present
invention. The order in which the method is described is not intended to be construed as a
limitation, and any number of the described method blocks can be combined in any order to
implement the method, or an alternative method. Additionally, individual blocks may be
deleted from the method without departing from the spirit and scope of the subject matter
described herein. Furthermore, the method can be implemented in any suitable hardware,
software, firmware, or combination thereof.
At block 601, control data is received from a master computing device. The control
data includes a predefined list of identifiers associated with one or more devices authorized to
establish a call with the communication device, at least one calling rule associated with one
or more devices, and one or more routing identifiers associated with the one or more devices.
For example, the control server (202) receives the control data from the parent computing
device (203).
At block 602, the control data is stored in the database. For example, the control
server (202) stores the control data in the database (206).
At block 603, a request trigger is received from the communication device. The
request trigger being indicative of call directed to a called party and includes a first identifier
associated with the called party, a second identifier associated with the communication
device, and metadata information of the call. For example, the trigger receiving unit (101) in
the control server (202) receives the request trigger from the communication device (204).
At block 604, at least one calling rule and one or more routing identifiers associated
with the called party is fetched from a database based on the first identifier. For example, the
analysis unit (102) in the control server (202) fetches at least one calling rule and the one or
more routing identifiers from the database (206).
22
At block 605, a first routing identifier is determined from the one or more routing
identifiers based on the second identifier, the metadata information, and the at least one
calling rule. For example, the analysis unit (102) in the control server (202) determines the
first routing identifier.
At block 606, the call is routed based on the first routing identifier and the second
identifier. For example, the routing unit (104) routes the call between the communication
device (204) and the authorized device (205) having the first routing identifier.
Figure 7 illustrates a typical hardware configuration of a computing system (700),
which is representative of a hardware environment for implementing the present invention.
As would be understood, the control server (202) as described above, include the hardware
configuration as described below.
In a networked deployment, the computing system (700) may operate in the capacity
of a server or as a client user computer in a server-client user network environment, or as a
peer computer system in a peer-to-peer (or distributed) network environment. The computing
system (700) can also be implemented as or incorporated into various devices, such as, a
tablet, a personal digital assistant (PDA), a palmtop computer, a laptop, a smart phone, a
notebook, and a communication device.
The computing system (700) may include a processor (701) e.g., a central processor
(CPU), a graphics processor (GPU), or both. The processor (701) may be a component in a
variety of systems. For example, the processor (701) may be part of a standard personal
computer or a workstation. The processor (701) may be one or more general processors,
digital signal processors, application specific integrated circuits, field programmable gate
arrays, servers, networks, digital circuits, analog circuits, combinations thereof, or other now
known or later developed devices for analysing and processing data. The processor (701) may
implement a software program (708), for performing necessary functions such as booting of
the computing system (700).
The computing system (700) may include a memory (702) communicating with the
processor (701) via a bus (703). The memory (702) may be a main memory, a static memory,
or a dynamic memory. The memory (702) may include, but is not limited to, computer
readable storage media such as various types of volatile and non-volatile storage media,
including but not limited to random access memory, read-only memory, programmable readonly
memory, electrically programmable read-only memory, electrically erasable read-only
memory, flash memory, magnetic tape or disk, optical media and the like. The memory (702)
may be an external storage device or database for storing data. Examples include a hard
23
drive, compact disc ("CD"), digital video disc ("DVD"), memory card, memory stick, floppy
disc, universal serial bus ("USB") memory device, or any other device operative to store data.
The memory (702) is operable to store instructions executable by the processor (701). The
functions, acts or tasks illustrated in the figures or described may be performed by the
programmed processor (701) executing the instructions stored in the memory (702). The
functions, acts or tasks are independent of the particular type of instructions set, storage
media, processor or processing strategy and may be performed by software, hardware,
integrated circuits, firm-ware, micro-code and the like, operating alone or in combination.
Likewise, processing strategies may include multiprocessing, multitasking, parallel
processing and the like.
The computing system (700) may further include a display unit (704), such as a liquid
crystal display (LCD), an organic light emitting diode (OLED), a flat panel display, a solid
state display, a cathode ray tube (CRT), or other now known or later developed display
device for outputting determined information.
Additionally, the computing system (700) may include an input device (705)
configured to allow a user to interact with any of the components of system (700). The input
device (705) may be a number pad, a keyboard, a stylus, an electronic pen, or a cursor control
device, such as a mouse, or a joystick, touch screen display, remote control or any other
device operative to interact with the computing system (700).
The computing system (700) may also include a disk or optical drive unit (706). The
drive unit (706) may include a computer-readable medium (707) in which one or more sets of
instructions (708), e.g. software, can be embedded. In addition, the instructions (708) may be
separately stored in the processor (701) and the memory (702).
The computing system (700) may further be in communication with other device over
a network (709) to communicate voice, video, audio, images, or any other data over the
network (709). Further, the data and/or the instructions (708) may be transmitted or received
over the network (709) via a communication port or interface (710) or using the bus (703).
The communication port or interface (710) may be a part of the processor (701) or may be a
separate component. The communication port (710) may be created in software or may be a
physical connection in hardware. The communication port (710) may be configured to
connect with the network (709), external media, the display (704), or any other components
in system (700) or combinations thereof. The connection with the network (709) may be a
physical connection, such as a wired Ethernet connection or may be established wirelessly as
discussed later. Likewise, the additional connections with other components of the system
24
(700) may be physical connections or may be established wirelessly. The network (709) may
alternatively be directly connected to the bus (703).
The network (709) may include wired networks, wireless networks, Ethernet AVB
networks, or combinations thereof. The wireless network may be a cellular telephone
network, an 802.9, 802.16, 802.20, 802.1Q or WiMax network. Further, the network (709)
may be a public network, such as the Internet, a private network, such as an intranet, or
combinations thereof, and may utilize a variety of networking protocols now available or
later developed including, but not limited to TCP/IP based networking protocols.
In an alternative example, dedicated hardware implementations, such as application
specific integrated circuits, programmable logic arrays and other hardware devices, can be
constructed to implement various parts of the computing system (700). Applications that may
include the systems can broadly include a variety of electronic and computer systems. One or
more examples described may implement functions using two or more specific
interconnected hardware modules or devices with related control and data signals that can be
communicated between and through the modules, or as portions of an application-specific
integrated circuit. Accordingly, the present system encompasses software, firmware, and
hardware implementations.
The computing system (700) may be implemented by software programs executable
by the processor (701). Further, in a non-limited example, implementations can include
distributed processing, component/object distributed processing, and parallel processing.
Alternatively, virtual computer system processing can be constructed to implement various
parts of the system.
The computing system (700) is not limited to operation with any particular standards
and protocols. For example, standards for Internet and other packet switched network
transmission (e.g., TCP/IP, UDP/IP, HTML, HTTP) may be used. Such standards are
periodically superseded by faster or more efficient equivalents having essentially the same
functions. Accordingly, replacement standards and protocols having the same or similar
functions as those disclosed are considered equivalents thereof.
While certain present preferred embodiments of the invention have been illustrated
and described herein, it is to be understood that the invention is not limited thereto. Clearly,
the invention may be otherwise variously embodied, and practiced within the scope of the
following claims.
25
We claim:
1. A method implemented at a control server for controlling a call directed to a
communication device, the method comprising:
- receiving a request trigger from a calling device, the request trigger being
indicative of call directed to the communication device and includes a first
identifier associated with the calling device and a second identifier associated
with the communication device;
- fetching, based on the first identifier, a modification information associated
with the calling device from a database;
- modifying the first identifier using the modification information; and
- routing, based on the second identifier, the call to the communication device,
wherein the modified first identifier is provided to the communication device
in place of the first identifier.
2. The method as claimed in claim 1, wherein the call is prevented from being
established between the calling device and the communication device based on the
first identifier and the second identifier.
3. The method as claimed in claim 1, wherein the first identifier is one of: telephone
number of the calling device, MSISDN of the calling device, IMSI of the calling
device, IMEI of the device, MAC address of the calling device, IP address of the
calling device, and user-id associated with multimedia calling application, and the
second identifier is one of a telephone number of the communication device,
MSISDN of the communication device, IMSI of the communication device, IMEI of
the device, MAC address of the communication device, IP address of the
communication, and user-id associated with multimedia calling application.
4. The method as claimed in claim 1, wherein the modification information is one of: a
short code and a combination of digits of predefined length.
5. The method as claimed in claim 1, wherein the fetching further comprises:
- comparing the first identifier with a predefined table stored in the database, the
table identifying a mapping between the first identifier and the modification
information.
26
6. The method as claimed in claim 1, further comprising:
- receiving control data from a master computing device, wherein the control
data includes a predefined list of identifiers associated with one or more
devices authorized to establish a call with the communication device and
modification information associated with the one or more devices; and
- storing the control data in the database.
7. The method as claimed in claim 6, further comprising:
- prior to fetching, comparing the first identifier with the predefined list of
identifiers; and
- if a match exists, fetching the modification information; or
- if a match does not exist, determining the calling device is unauthorized to
establish a call with the communication device and terminating the call.
8. A method implemented at a control server for controlling a call directed from a
communication device, the method comprising:
- receiving a request trigger from the communication device, the request trigger
being indicative of call directed to a called party and includes a first identifier
associated with the called party, a second identifier associated with the
communication device, and metadata information of the call;
- fetching, based on the first identifier, at least one calling rule and one or more
routing identifiers associated with the called party from a database;
- determining a first routing identifier from the one or more routing identifiers
based on the second identifier, the metadata information, and the at least one
calling rule; and
- routing the call based on the first routing identifier and the second identifier.
9. The method as claimed in claim 8, wherein the first identifier is one of a short code
and a combination of digits of predefined length associated with the called party and
the second identifier is one of a telephone number of the communication device,
MSISDN of the communication device, IMSI of the communication device, MAC
address of the communication device, IP address of the communication, user-id
associated with multimedia calling application.
27
10. The method as claimed in claim 8, wherein the one or more routing identifiers include
telephone number associated with the called party, MSISDN associated with the
called party, IMSI associated with the called party, MAC address associated with the
called party, IP address associated with the called party, user-id associated with
multimedia calling application.
11. The method as claimed in claim 8, wherein the metadata information includes a
location of the communication device, a date of the call, and a time-stamp for the call.
12. The method as claimed in claim 8, the at least one calling rule is defined based on at
least one of: location of called party and time of day.
13. The method as claimed in claim 8 further comprising:
- receiving control data from a master computing device, wherein the control
data including a predefined list of identifiers associated with one or more
devices authorized to establish a call with the communication device, at least
one calling rule associated one or more devices, and one or more routing
identifiers associated with the one or more devices; and
- storing the control data in the database.
14. The method as claimed in claim 13, further comprising:
- prior to fetching, comparing the first identifier with the predefined list of
identifiers; and
- if a match exists, fetching the at least one calling rule and the one or more
routing identifiers; or
- if a match does not exist, determining the called party is unauthorized to
establish a call with the communication device and terminating the call.
15. A control server for controlling a call directed to a communication device, the control
server comprising:
- a trigger receiving unit to receive a request trigger from a calling device, the
request trigger being indicative of call directed to the communication device
and includes a first identifier associated with the calling device and a second
identifier associated with the communication device;
28
- an analysis unit coupled to the trigger receiving unit to:
- fetch, based on the first identifier, a modification information associated
with the calling device from a database; and
- modify the first identifier using the modification information; and
- a routing unit coupled to the analysis unit and the trigger receiving unit to
route, based on the second identifier, the call to the communication device,
wherein the modified first identifier is provided to the communication device
in place of the first identifier.
16. A control server for controlling a call directed from a communication device, the
control server comprising:
- a trigger receiving unit to receive a request trigger from the communication
device, the request trigger being indicative of call directed to a called party and
includes a first identifier associated with the called party, a second identifier
associated with the communication device, and metadata information of the
call;
- an analysis unit coupled to the trigger receiving unit to:
- fetch, based on the first identifier, at least one calling rule and one or more
routing identifiers associated with the called party from a database;
- determine a first routing identifier from the one or more routing identifiers
based on the second identifier, the metadata information, and the at least
one calling rule; and
- a routing unit coupled to the analysis unit and the trigger receiving unit to
route the call based on the first routing identifier and the second identifier.

Documents

Application Documents

# Name Date
1 201611025015-IntimationOfGrant24-11-2023.pdf 2023-11-24
1 Power of Attorney [21-07-2016(online)].pdf 2016-07-21
2 Form 9 [21-07-2016(online)].pdf_30.pdf 2016-07-21
2 201611025015-PatentCertificate24-11-2023.pdf 2023-11-24
3 Form 9 [21-07-2016(online)].pdf 2016-07-21
3 201611025015-FORM-8 [29-07-2023(online)].pdf 2023-07-29
4 Form 5 [21-07-2016(online)].pdf 2016-07-21
4 201611025015-CLAIMS [14-06-2021(online)].pdf 2021-06-14
5 Form 3 [21-07-2016(online)].pdf 2016-07-21
5 201611025015-FER_SER_REPLY [14-06-2021(online)].pdf 2021-06-14
6 Form 18 [21-07-2016(online)].pdf_29.pdf 2016-07-21
6 201611025015-OTHERS [14-06-2021(online)].pdf 2021-06-14
7 Form 18 [21-07-2016(online)].pdf 2016-07-21
7 201611025015-PETITION UNDER RULE 137 [14-06-2021(online)].pdf 2021-06-14
8 Drawing [21-07-2016(online)].pdf 2016-07-21
8 201611025015-FER.pdf 2019-12-26
9 Description(Complete) [21-07-2016(online)].pdf 2016-07-21
9 201611025015-Correspondence-130717.pdf 2017-07-21
10 201611025015-OTHERS-130717.pdf 2017-07-21
10 abstract.jpg 2016-08-11
11 201611025015-Proof of Right (MANDATORY) [13-07-2017(online)].pdf 2017-07-13
11 Form 26 [19-08-2016(online)].pdf 2016-08-19
12 201611025015-Proof of Right (MANDATORY) [13-07-2017(online)].pdf 2017-07-13
12 Form 26 [19-08-2016(online)].pdf 2016-08-19
13 201611025015-OTHERS-130717.pdf 2017-07-21
13 abstract.jpg 2016-08-11
14 201611025015-Correspondence-130717.pdf 2017-07-21
14 Description(Complete) [21-07-2016(online)].pdf 2016-07-21
15 201611025015-FER.pdf 2019-12-26
15 Drawing [21-07-2016(online)].pdf 2016-07-21
16 201611025015-PETITION UNDER RULE 137 [14-06-2021(online)].pdf 2021-06-14
16 Form 18 [21-07-2016(online)].pdf 2016-07-21
17 201611025015-OTHERS [14-06-2021(online)].pdf 2021-06-14
17 Form 18 [21-07-2016(online)].pdf_29.pdf 2016-07-21
18 201611025015-FER_SER_REPLY [14-06-2021(online)].pdf 2021-06-14
18 Form 3 [21-07-2016(online)].pdf 2016-07-21
19 Form 5 [21-07-2016(online)].pdf 2016-07-21
19 201611025015-CLAIMS [14-06-2021(online)].pdf 2021-06-14
20 Form 9 [21-07-2016(online)].pdf 2016-07-21
20 201611025015-FORM-8 [29-07-2023(online)].pdf 2023-07-29
21 Form 9 [21-07-2016(online)].pdf_30.pdf 2016-07-21
21 201611025015-PatentCertificate24-11-2023.pdf 2023-11-24
22 Power of Attorney [21-07-2016(online)].pdf 2016-07-21
22 201611025015-IntimationOfGrant24-11-2023.pdf 2023-11-24

Search Strategy

1 Searchdoc201611025015-converted_26-12-2019.pdf

ERegister / Renewals

3rd: 12 Feb 2024

From 21/07/2018 - To 21/07/2019

4th: 12 Feb 2024

From 21/07/2019 - To 21/07/2020

5th: 12 Feb 2024

From 21/07/2020 - To 21/07/2021

6th: 12 Feb 2024

From 21/07/2021 - To 21/07/2022

7th: 12 Feb 2024

From 21/07/2022 - To 21/07/2023

8th: 12 Feb 2024

From 21/07/2023 - To 21/07/2024

9th: 13 Mar 2024

From 21/07/2024 - To 21/07/2025

10th: 21 Jul 2025

From 21/07/2025 - To 21/07/2026