Method for delivering primary information that exists in at least one electronic form

ABSTRACT

A method for delivering primary information that exists in at least one electronic form, includes transmission of the primary information via at least one communication network to at least one communication system allocated to an addressee of the primary information; creation of verification information relating to the acknowledgement of the primary information by the addressee; and saving and/or transmission of the verification information via at least one communication network. Individualized data is thus made available which not only documents the receipt of the primary information by the addressee but also the acknowledgement of the receipt of the primary information by the addressee. A telecommunication arrangement and a telecommunication unit which are suitable for carrying out the method are also disclosed.

CROSS-REFERENCE TO RELATED APPLICATIONS AND CLAIM OF PRIORITY

This application is a continuation under 35 USC 120 of copendingapplication Ser. No. 12/515,731 having a 35 USC 371(c) date of May 20,2009, which is a National Stage entry under 35 USC 371 of InternationalApplication No. PCT/DE2007/002166 filed Nov. 20, 2007, which claimspriority from German Patent Application No. 10 2006 057 120.7 filed Nov.30, 2006 and U.S. Provisional Application Ser. No. 60/867,921 filed Nov.30, 2006, which applications are incorporated herein by reference.

BACKGROUND OF THE INVENTION

The invention relates to a method for delivering primary informationthat exists in at least one electronic form as well as atelecommunication arrangement and a telecommunication device that areadapted for conducting the method or for use with the method.Particularly, the invention relates to a method of delivering a primaryinformation that allows for, beyond the fact of reading the transmittedprimary information, detecting and saving the acknowledgement of theprimary information by the addressee.

The proof that a certain information has been delivered to a certaininformation recipient can be of great importance with respect to legalor factual reasons. Concerning non-electronic transmission ofinformation via postal delivery, it is possible to conduct such a prooffor instance by transmission of a registered letter with return receipt,wherein with respect to this manner of posting the addresser receivesback a notice of receipt, the return receipt, having the originalsignature of the recipient. Also a delivery by a bailiff is possible insome legal systems.

These well-tried methods of proving a delivery are not available withrespect to electronic transmission of information, for instance viae-mail. Known e-mail programs are arranged for providing a confirmationof transmission. In such a case the addresser is informed by means of aconfirmation of transmission that the transmitted e-mail message wasdelivered to the mailbox of the recipient. Further, a read confirmationcan be requested which informs the addresser that a transmitted messagewas retrieved from the mailbox of the recipient and opened.

A proof of delivery of an electronic message is however not possiblewith such a transmission or read confirmation. This is the case due toseveral reasons. A first reason consists in that a read confirmationonly documents that a certain message was read. The content of themessage that was read is not documented. For this reason, it cannot beexcluded that the originally transmitted message was delivered to therecipient in manipulated form or was only partly delivered to therecipient.

A second problem consists in that the telecommunication system of theaddressee is possibly configured in such way that sending a transmissionconfirmation or read confirmation is denied. A “non-cooperative”addressee may therefore from his own power prevent the confirmation ofreceipt of the message.

A third and essential problem consists in that a read confirmationmerely documents that a message was read, however allows no conclusionby whom it was read. Particularly, no conclusion is possible whether theinformation was noticed by the addressee, i.e., was understoodsemantically. As an addressee an entity is understood, that shall,according to the will of the addresser, notice and semanticallyunderstand the message, thus usually a human recipient.

Accordingly, there exists the need to provide a method for deliveringprimary information that exists in at least one electronic form andrespective telecommunication devices that reduce the possibilities of anaddressee to deny the fact of delivery of the primary information, and,in the best case, allow for the proof of the delivery to the addressee.

SUMMARY OF THE INVENTION

According to an aspect of the invention, in one embodiment it isprovided that verification information regarding the acknowledgement ofprimary information at the addressee is created and that thisverification information is saved. The saving of the information cantake place at a communication end system allocated to the addressee.Usually, the verification information is however created at a thirdperson and/or is transmitted to such a third person via at least onecommunication network, wherein this third person is for instance theaddresser, a trustworthy third party, or an automat, that is arranged ator in a communication network and evaluates and/or saves verificationinformation regarding the acknowledgement of primary information at theaddressee.

Therefore, in one aspect, the invention provides individualized data,that documents, beyond the fact of receipt of the primary information atthe communication system of the addressee, the acknowledgment of theprimary information by the addressee. In this sense, the inventionprovides in one aspect an individualized automatic read confirmationthat documents the acknowledgement of the primary information by theaddressee.

Further, it is noted, that the present invention does not demand theaware, active assistance of the addressee of the information that is tobe transmitted, although such an assistance is absolutely possible inaspects of the invention. As far as an active aware assistance of theaddressee when creating a verification information is not necessary,this is connected with the advantage that the addressee cannot baffle adelivery or is hindered from baffling the delivery. The verificationinformation restrict or prevent the possibility of the addressee to denya delivery that has taken place. In this sense the present inventionprovides restrictions of deniability that may have different validity,which can also be denoted as non-deniability levels.

Thus, the invention envisages that not merely the fact is automaticallydetected that a transmitted primary information was received and read atthe communication end system of the addressee. The verificationinformation relates to information for delivery and acknowledgement ofthe primary information at the addressee himself.

For this, in one embodiment of the invention, it is provided that thecreation of verification information comprises a direct or indirectinteraction with the recipient of the information, to whom thisinformation is dedicated, i.e., the addressee. At the same time, in anembodiment of the invention, the interaction with the addressee isrelated to the creation of verification information in a manner that isnot directly recognizable by the addressee. The direct or indirectinteraction with the addressee can take place upon and/or after receiptof the primary information at the communication system of the addressee.

Examples of such a direct or indirect interaction are a telephone callwith the addressee that relates to contents of the transmitted message,as well as a saving of data of this telephone call or of data that canbe deduced from the telephone call. An example for such deducibleinformation is for instance the recording of a frequency spectrum of thevoice signal of the addressee. The frequency spectrum, recorded at acertain time and with reference to a certain telephone number, canprovide evidence that a certain person was at a certain place at acertain time. In conjunction with further information such as a readconfirmation this can represent a criterion that at least limits thedeniability of a delivery by the addressee (also denoted as restrictionof deniability in the following).

A further example of an interaction with the addressee from whichverification information can be deduced, is the transmission of ane-mail to the addressee that indirectly relates to the primaryinformation. For instance, the primary information is delivered as voicemessage and the addressee simultaneously or shortly thereafter receivesan e-mail that relates to the delivered voice message. An answer to thee-mail by the addressee can represent a verification informationregarding the delivery of the voice message.

In a further embodiment of the invention the verification informationfor delivery of the primary information to the addressee is obtained byan intelligent evaluation of protocol information. Protocol informationparticularly includes all signaling information for connectionestablishment between the addresser and the telecommunication system ofthe addressee. Such protocol information can be recorded and thecorresponding protocol steps can be stored.

Also the case that the addressee transmits authentication information tothe addresser falls under the creation of verification information by anintelligent evaluation of protocol information. For instance, this cantake place by means of an electronic signature. For instance, such anelectronic signature can be added to 10 a read confirmation. Such anauthentication requires the aware assistance of the addressee whenconfirming delivery of the primary information. This is a case which isnot excluded by the invention. Actually, in most cases, the addresseesof the transmitted primary information will be willing to confirm thefact of receipt.

In a further embodiment of the invention the verification informationfor delivery of the primary information to the addressee is determinedby the transmission of a computer program or a cookie to the addressee'scommunication device, wherein the cookie is designed such that itdetects a reading of the received information by the addressee and savesthis verification information and/or sends it to the addresser of theinformation or to a third person.

In a further aspect of the invention it can be provided that a supportfor the method of delivery from the communication network side islargely abdicable. In an embodiment of the invention it is provided thatthe primary information experiences a transformation before or uponreceipt at the communication system into another medium. For instance,the primary information is at first transmitted as an electronic mailthat is transformed into a voice signal before or upon delivery.

This can for instance be carried out by means of a voice generator. Itcan also be provided that voice information having instructions on howthe receipt of the voice signal is to be confirmed are added to thevoice signal or that the voice signal already contains such information.

With respect to the used terminology the following is pointed out. Aprimary information can be or contain text and graphics in the form of ascripture or any other form, audio and/or video messages of any kind andform, any hybrid form of the aforementioned forms and further—notrestricted to human perceivable—types of contents and forms,identifications, designations, notations, and specifications of themessages. It can also be a message transmission information such as forinstance protocol-/signalling information of all kind.

A delivery of a primary information takes place in a framework of an actof communication. This act can for instance comprise an electronic mailmessage (e-mail) but also any other kind of electronic data transfersuch as for instance via telephone, via fax machine, via SMS etc.

A telecommunication network can be a communication network, for instancethe conventional telephone network, the internet, mobile communicationnetworks, next generation networks, etc. As a telecommunication networkalso a communication network is understood that is arbitrarilycomplemented by means of conventional transportation routes of any kindof conventional transport networks (such as for instance Deutsche Post,FedEx, DHL), either delivery-initial, in center, as well asdelivery-terminal.

An addressee in the sense of the present invention is the recipient ofthe primary information, to whom this primary information is dedicatedto. Usually, this will be a human being. The communication system is tobe distinguished from the addressee, usually a communication end systemthat is allocated to the addressee and in which the primary informationis electronically received. Further, the recipient of a transmittedprimary information is to be separated from the addressee. The recipientis the operating person/the user of the communication system that isallocated to the addressee. At the same time the recipient can beidentical to the addressee. The operating person/the user of thecommunication system can however also be different from the addressee.For instance, it can be a secretary or a family member of the addressee.

As will be recognized by the above descriptions, embodiments of theinvention leverage on the acknowledgement of the primary information bythe addressee or recipient of the primary information. As disclosedabove, the frequency spectrum of the voice signals of the addressee willbe referred to as “biosignal” authentication. Similarly, as disclosedabove, the protocol or log-in monitoring of the communication system, asperformed by a cookie, will be referred to as “IT security” or “ITsec.”These overarching notions may often overlap and hence are commonlyreferred to as “biosignal/ITsec authentication” of the addressee and thereceived message.

In an embodiment of the invention the addressee does not need to beknown upon sending out the primary information, for instance in thesense that several addressees may come into consideration foracknowledgement. For instance, in case a company or a group of potentialaddressees is delivered to, several addressees come into consideration.Then, it may be documented which addressee has acknowledged the primaryinformation.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows a telecommunication network and communication systemsconnected thereto which are allocated to an addresser and an addresseeamong which a primary information shall be transmitted;

FIG. 2 shows verification levels regarding the confirmation of thedelivery of a primary information to an addressee;

FIG. 3 shows an embodiment for creation of verification informationrelating to the delivery of a primary information to an addressee;

FIG. 4 shows a further embodiment for the creation of verificationinformation relating to the delivery of a primary information to anaddressee; and

FIG. 5 shows a communication sequence for delivery of primaryinformation and for creation of verification information for theacknowledgment of this primary information by the addressee.

DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION

FIG. 1 schematically shows a telecommunication arrangement having atelecommunications network 5, to which two telecommunication end systems(TC end systems) are connected. To each TC end system 1, 2 a human userA, B is associated. The TC end system 1, 2 can be a singletelecommunication end device such as a PC, a laptop, a telephone(including a cell phone) or a PDA. Likewise, the end system 1, 2 can bea local system consisting of several components such as for instance atelephone, a PC, a laptop, a fax machine, a TC system and a server.

In the following it is assumed that the addresser A sends a certainInformation (primary information) to the addressee B by means of the TCend system 1 via the TC network 5 to the TC end system 2 foracknowledgement and information detection.

Furthermore, an intermediate addressee 3 as well as an interactionautomat 4 are connected to the TC network 5. Both devices 3, 4 areoptional and only present in embodiments of the Invention.

The intermediate addressee 3 can be for instance a trustworthy thirdperson, for instance a notary, to whom the primary information is sentat first from the TC end system 1. From the intermediate addressee 3 theinformation is then redirected to the TC end system 2. Protocol—or asthe case may be signalling information, which are transmitted fortransmission of the primary information among the involved units, are atthe same time on one hand transmitted among the TC end system 1 and theintermediate addressee 3 and on the other hand among the intermediateaddressee 3 and the TC end system 2.

The intermediate addressee 3 can be a trustworthy third party, whichboth of the other parties A, B trust (so called Trusted Third Party,TTP). Such TTPs usually collect proofs concerning transactions, storethem, and make them available in case of need. Their activity cancomprise a key- and identity certification. The intermediate thirdperson 3 must not necessarily represent such a trustworthy third party,but may also have a grade of trust lying beneath the latter, or may evencomprise no grade of trust at all.

In a further embodiment it may be provided that the intermediateaddressee 3 merely obtains a copy of the primary information that wastransmitted from addresser A to addressee B, wherein the actualcommunication exclusively takes place among addresser A and addressee Bor, as the case may be, among the TC systems 1, 2 allocated to them,respectively. The transmission of a copy of the transmitted informationto the intermediate system 3 then serves for confirming the attempt of adelivery to the addressee B.

It is noted, that the intermediate addressee must not be known uponsending the primary information, but the intermediate addressee ishowever determinable for instance by means of certain attributes, heshould comprise.

In FIG. 1 the intermediate addressee 3 is depicted as being connected tothe TC network 5. Alternatively, the intermediate addressee can bearranged in the network. Likewise, it can be a unit of the end system 1,2 of the addresser A or the addressee B.

The interaction automat 4 being optional as well may also serve for, inan automated manner, providing a direct or indirect interaction with theaddressee B (and not only with the corresponding TC end system 2), andsaving the corresponding verification information, and, as the case maybe, for transmission of said verification information to further TCdevices. This will be further explained in detail by means ofembodiments. At the same time, the interaction automat 4 can be part ofan intermediate addressee 3. It is also possible that the interactionautomat 4 merely obtains a copy of the primary information that was sentfrom the addresser A to the addressee B, and, on the basis of thisinformation and eventual additional instructions of the addresser A,conducts and logs an interaction with the addressee B.

FIG. 2 shows different verification levels, that may principally befulfilled regarding the delivery of a primary information to anaddressee. A first verification level 201 relates to checking whetherthe primary information was sent from the addresser. Such a check takesplace at the addresser or, as the case may be, at the addresser's endsystem 1. A second verification level 202 relates to checking anddetermining whether the primary information was received at the TC endsystem 2 of the addressee. For instance, a transmission confirmation asknown from e-mail programs corresponds to such a verification level. Forinstance, a transmission confirmation as known from e-mail programscorresponds to such a verification level.

A third verification level 203 relates to checking, or as the case maybe, to determining whether the primary information was read at the TCend system 2 of the addressee B. A read confirmation as known frome-mail programs corresponds to such a verification level. A fourthverification level 204 relates to checking, or as the case may be,determining whether a primary information was acknowledged by theaddressee. Only this verification level 204 allows for confirming orideally proving in a judicial sense a delivery of the primaryinformation to the addressee.

Finally, a fifth verification level 205 relates to checking anddetermining whether the addressee comprehends the primary information,thus, has read and/or heard and/or seen and semantically understood it.This final verification level 205 is normally not necessary forconducting the proof of a delivery to the addressee. Even in a commonpostal delivery one can only extract the information from a confirmationof receipt that the addressee has received the transmission. Whether hehas read it, is associated to the subjective sphere and can normally notbe determined. However, the method according to the invention partlyalso allows for a verification according to verification level 5.

FIG. 3 relates to steps of the method for detecting and deducingverification information regarding the acknowledgement of a primaryinformation at the addressee B, and not only at his TC end system 2. Itis provided that all protocol information, that is transmitted among theinvolved TC end systems 1, 2 within the framework of the transmission ofthe primary information, is detected, documented, and saved, step 301.

In step 302 it is tried to deduce from this information verificationinformation of said kind. This can take place via an intelligentsoftware that evaluates the protocol information. It can be provided forinstance, that the addresser, wherein in this case the active assistanceof the addresser regarding the creation of verification information isnecessary, confirms receipt of the primary information by means of adigital signature or another authentication.

The protocol information and/or verification information, for exampleboth of them, are then saved in step 303, wherein said saving of theinformation may take place at the end system 1 of the addresser, whichhowever may generally also take place at another place, for instance atthe end system 2 of the addressee, at an intermediate addressee 3 and/oran interaction automat 4.

FIG. 4 shows a further embodiment that, besides detection 401 ofprotocol information according to FIG. 3, also allows for a detection ofinteraction information in step 402 in addition. This interactioninformation relates to information that was created by means of a director indirect interaction with the addressee B, either upon receipt of theinformation at the addressee or in a communication act followingthereafter. This will be further explained by means of embodiments.

Then, in step 403 a verification information is deduced from theinteraction information and/or the protocol information. Thereby,protocol information may also serve for supporting the evaluation of theinteraction information. It can be provided as well that onlyinteraction information is detected and evaluated. An evaluation ofinteraction information and/or protocol information allows for providinga verification information of at least verification level 4 according toFIG. 2. Then, in step 404, protocol information and/or interactioninformation and/or verification information are saved, wherein saidsaving, as explained with reference to FIG. 3, may take place at theaddresser or at other data devices.

FIG. 5 shows a communication sequence among the TC device 1 allocated tothe addresser A, the TC device 2 allocated to the addressee B, aninteraction automat (for instance corresponding to the interactionautomat 4 of FIG. 1) and the addressee B. At first, the primaryinformation is sent from the TC end system 1 to the interaction automat4, and from the interaction automat 4 it is further transmitted to theTC end system 2. At the same time, the interaction automat 4 acts as anintermediate addressee. In another embodiment it is however alsopossible that the transmission of the primary information from the TCend system 1 to the TC end system 2 takes place directly, i.e., withoutinvolving the interaction automat 4, wherein in this case, theinteraction automat 4 may receive a copy of the transmitted information.

It is pointed out, that the primary information may undergo a mediaconversion at the interaction automat or elsewhere. For instance, theprimary information is contained in one and is transformed in theinteraction automat into a voice message by means of a voice generatorwhich is then delivered via the telephone network. Within the frameworkof transmission of the primary information, the addresser A may receiveverification information of verification level 1 to 3 according to FIG.2, i.e., he may particularly gain assurance that the information wassent, received at the recipient and read thereabouts. Furtherinformation is not accessible.

Now, the interaction automat 4 initiates, for instance within theframework of an own communication connection, an interaction with theparty B. This interaction may take place via the TC end system 2, butmay also take place via different technical devices, for instance a cellphone of the addressee B.

A first example for such a further communication, that serves forobtaining interaction information from which verification information ofverification level 4 and eventually also of level 5 can be deducedaccording to FIG. 2, is to make a telephone call with addressee B. Thetelephone call may for instance relate to the content of the primaryinformation transmitted before. At the same time, the content of thetelephone call with the addressee B and thus the response of theaddressee B is saved in an embodiment. For instance, a response of theaddressee is conceivable in the sense that he confirms that he hasreceived the e-mail. It is further conceivable that the addresseeB—possibly in emotional imprudence—goes into the content of thetransmitted primary information in the telephone call. Such informationclearly documents the acknowledgement of the primary information as wellas the semantic comprehension of the primary information at theaddressee B.

Inasmuch as certain legal systems consider it as illegal to recordtelephone calls without agreement of the interlocutor, it can beprovided that, instead of the telephone call, information is recordedthat can be deduced from the telephone call. In an embodiment this maybe a deduced information from which at least a subset of the content ofthe telephone call and/or the identity of the interlocutor can bededuced without being identical to the telephone call or to make thelatter reconstructible. It can be provided for instance that regardingthe spoken statements of the addressee a spectral analysis informationis recorded as a deduced information.

It is pointed out, that the interaction automat can be equipped with anintelligent voice system so that the interaction automat mayautonomously conduct a telephone call with the addressee B. In otherembodiments a human party is associated to the interaction automat, thatconducts the telephone call. It can also be provided that theinteraction automat is arranged at the addresser A, wherein theaddresser A conducts the telephone call with the addressee.

A further example for the generation of interaction information is thetransmission of a further e-mail to the addressee, or as the case maybe, to the addressee's TC end system 2. This e-mail may also indirectlyrelate to the primary information transmitted before. The response tothis e-mail may represent an interaction information from whichverification information can be deduced. In case the addressee respondsfor instance to the e-mail to that effect that he has not read the firste-mail, it can be at least deduced therefrom that the addressee hasacknowledged the first e-mail.

It is also possible that within the framework of a second e-mail oranother electronic message or as well upon transmission of the primaryinformation, a cookie is installed onto the TC end system of theaddressee B. This cookie may be designed for instance in a way that itdocuments the opening of the transmitted primary information, includingdetection of log-in-Information or another authentication information ofthe user. Usually, a user of a PC or a laptop has to identify himself atthe beginning of the usage by means of a log-in that serves forauthentication, so that in this way an identification of the user andthus cognition of the addressee is possible. Also other information maybe saved by the cookie, and may be read out at a given time. At the sametime, the information may be at first saved at the addressee and his endsystem or may be transmitted at once to the addresser or another endsystem.

The realization of the invention is not limited to the above statedembodiments. For instance it can be provided that

-   -   the interaction automat comprises human interaction and/or a        photo sequence on the route of delivery,    -   denial of acceptance confirmations are saved and evaluated,    -   a conversion of the representation of the primary information        does not only include message content related “media        conversion”, but also “delivery-address/-mode”-conversion (for        example language or judicial preamble or reassurance of the        grade of authorization of the recipient), or as well        “non-repudiability”-conversion of different variants, also in        favor of a third person,    -   created verification information is, as an evidence for        delivery, retrievable at any time, online controllable, online        traceable, interactive, alarm activating, approvable,        authenticatable, and/or accessible to different media        conversion,    -   all information can be transmitted in an encrypted manner, so        that it can only be understood partly or in its entirety, and as        the case may be, with a key agreement only during delivery, by        the addresser or only by him and the addressee or only by him        and other specified groups of persons,    -   the messages may contain non-deniable addresser        legitimation/identity and/or content authenticity and/or        addressee identity, wherein this kind of non-deniability may        stem from a notary that was mandated by the addresser,    -   also announced and/or unexpected and/or aware methods as well as        methods recording unilateral/bilateral spoken statements,        wherein the latter, as the case may be, send out or disguisedly        request at least one “spectral analysis information”, may belong        to the levels of non-deniability,    -   possibilities of participation of an involved network,        particularly the network that schedules the delivery, exist,    -   an interaction with Kreditreform/Schufa etc., collection        companies, credit card companies etc. exist,    -   verification information concerning a lawyer or a notary or an        encryption-“trusted entitity”—beneath the known “trusted third        party”—is detected and/or saved,    -   a self-documention takes place, and/or    -   an “indirect delivery” takes place, which may be, for instance,        content based, protocol information is “tape-recorded” during        delivery of the primary information (as the case may be on        different protocol levels), or as the case may be, at least the        protocol steps taking place on the addresser side are saved,    -   the result of the delivery of a primary information is signalled        by the application system (end system of the addressee) and at        least the logging of the application system is for instance        saved in the end system of the addresser,    -   protocol information during delivery of the primary information        (as the case may be on different protocol levels) from the        addresser to an intermediate addressee are “tape-recorded” or at        least the protocol steps taking place on the addresser side are        saved, and    -   protocol information during delivery of the primary information        (as the case may be on different protocol levels) from an        intermediate addressee to the end addressee are “tape-recorded”        or at least the protocol steps taking place on the side of the        intermediate addressee are saved and/or transmitted to the        addresser.

What is claimed is:
 1. A method for verifying delivery to a recipient ofprimary information in a telephone call, comprising: transmitting theprimary information via said telephone call to at least onecommunication system accessible by said recipient of the primaryinformation; creating verification information relating to the receiptof the primary information by the recipient, wherein said verificationinformation is created by an interaction with said recipient as to saidprimary information in said telephone call corresponding toacknowledgement by said recipient, occurring during or after receipt ofsaid primary information at the communication system, determining voicerecognition information that indicates with a predetermined level oftrustworthiness the identity of the recipient of said primaryinformation, and causing said verification information to be stored viaat least one telecommunication network.