Title of Invention

A WIRELESS COMMUNICATION TERMINAL AND A METHOD FOR DISALLOWING AN UNVERIFIED CALL THEREAT

Abstract A communication terminal and a call origination limiting method carried out in a communication terminal are disclosed. The communication terminal (10) comprises: transmitting/ receiving unit (11) constituted of an antenna and a communication control circuit and configured for performing radio communication with base stations (21) of a mobile data communication network (20); and a downloading means for downloading an application comprising a plurality of execution units from a download server (40), using the transmitting/receiving unit (11); the communication terminal (10) being characterized by comprising: a storing means and a means for allowing or not allowing software to execute the execution unit in the application, wherein: the storing means stores a plurality of telephone number storing means including a plurality of telephone numbers that have been granted in advance; and the software means is configured for determining whether the call origination using the telephone number is allowed, on the basis of whether the telephone number is registered in at least one of the plurality of telephone number storing means.
Full Text

A WIRELESS COMMUNICATION TERMINAL AND A
METHOD FOR DISALLOWING AN UNVERIFIED CALL
THEREAT
Technical Field
The present invention relates to a method and an apparatus for
limiting call originations accompanied by executing an application at a
communication terminal.
Background Art
Advancement of portable telephones is accelerating. Recently, it
is possible to access servers on the Internet through a portable telephone
to download a variety of contents and applications. Such applications
that are downloaded from a network and used include, for example, an
application called "Java Applet" described in the Java (registered
trademark) programming language.
Open networks, including the Internet, generally have poor security,
and hence, Java Applets distributed through such an open network are not
necessarily reliable.
Accordingly, it is necessary to exclude accesses to networks
established by an illegal Java Applet. In response to this demand, there
has been proposed an access limiting technique called "sandbox model."
The sandbox model allows communication terminals, which perform as
clients, to access only a server from which a Java Applet is downloaded.
However, it is anticipated that network resources will be further
integrated or distributed in the future. In such situations, some cases are
likely to happen where applying the existing access limiting technique
mentioned above is not adequate.

Disclosure of Invention
Accordingly, it is an object of the present invention to propose a
new mechanism for limiting network accesses gained by executing
applications on a communication terminal.
To this end, the present invention provides a call origination
limiting method including a comparison step for comparing, when a call
origination is performed from a communication terminal accompanied by
executing an application, a telephone number of a communication node,
for which a call origination is to be implemented, with a telephone number
of a communication node which has been stored in a storing means
beforehand and for which a call origination has been granted, and a
determination step for determining whether the call origination should be
granted or not on a basis of the result of the comparison.
According to the present invention, when a call origination of a
predetermined communication node is accompanied by executing an
application, it is determined whether the call origination should be granted
or not by checking the telephone number of the communication node to be
one of the telephone numbers that have been granted in advance. This
permits improved security to be achieved.
In a preferred form, the storing means is a memory for storing
telephone directory data, and compares the telephone number of the
communication node to be called with the telephone numbers included in
the telephone directory data in the comparison step.
In another preferred form, the storing means is a memory for
storing a history of outgoing/incoming calls, and compares the telephone
number of the communication node to be called with telephone numbers
of at least either the outgoing calls or incoming calls in the history of
outgoing/incoming calls in the comparison step.
In still another preferred form, the storing means stores plural

types of telephone number groups, and compares, in the comparison step,
the telephone number of the communication node for which the call
origination is to be implemented with a type of telephone number groups
corresponding to an application to be executed.
In a preferred form, the call origination limiting method is provided
with a step for outputting a predetermined error message and prompting
an operation for instructing a call origination performed by a user if a call
origination processing has been rejected in the determination step, and a
step for accepting the operation for instructing the call origination
performed by the user and carrying out the call origination.
In each form described above, the call origination is a processing
for line connection for voice communication or data communication.
The present invention can be implemented also in a form wherein a
carrying out program for the call origination limiting method described
above is distributed to a user through a telecommunication line, or in a
form wherein such a program stored in a computer-readable medium is
distributed to a user.
Furthermore, the present invention can be implemented in a form
wherein a communication terminal for carrying out the method for
limiting call origination explained above is manufactured and marketed.
Such a communication terminal is provided with a means for storing
telephone numbers of communication node for which a call origination
has been granted, a means for comparing a telephone number of
communication node for which a call origination is to be implemented
with the telephone numbers stored in the storing means when a call
origination is accompanied by executing an application, and a means for
determining whether the call origination should be granted or not on a
basis of the result of the comparison.
An example of the communication terminal is a portable telephone

performing radio communication.
Brief Description of the Accompanying Drawings
Fig. 1 is a block diagram showing an entire system configuration in
accordance with an embodiment of the present invention.
Fig. 2 is a block diagram showing a hardware configuration of a
portable telephone in the embodiment.
Fig. 3 is a diagram showing an example of a history of
outgoing/incoming calls stored in the portable telephone in the
embodiment.
Fig. 4 is a diagram showing an example of telephone directory data
stored in the portable telephone in the embodiment.
Fig. 5 is a schematic diagram showing a software configuration of
the portable telephone in the embodiment.
Fig. 6 is a flowchart showing a processing operation performed
when a Java virtual machine of the portable telephone in the embodiment
executes a downloaded Java application.
Best Mode for Carrying Out the Invention
Referring to the drawings, an embodiment will be described in
accordance with the present invention as follows:
In this embodiment, an example will be explained in which a
portable telephone for radio data communication executes an application
described with Java (registered trademark) programming language
(hereinafter referred to as "Java application"). The present invention,
however, can be implemented in various modifications within the scope of
the technological spirit thereof, rather than being limited to the
embodiment.
A: Configuration

First, the configuration of the embodiment will be explained.
(1) Configuration of the entire system
Fig. 1 is a block diagram showing the configuration of the entire
system according to the embodiment of the present invention. As shown
in the drawing, the system is constructed of portable telephones 10a and
10b, a mobile data communication network 20, a server 25, the Internet 30,
and a download server 40.
The portable telephones 10a and 10b are owned by users to receive
call services of a mobile telephone network, which is not shown, and to
perform radio communication with a base station 21 of the mobile data
communication network 20 to receive data communication service of the
network 20. The portable telephones 10a and 10b incorporate a browser
for browsing various pages on the Internet 30 and a Java virtual machine
for supporting Java (registered trademark), which allows various Java
applications to be executed.
The portable telephones 10a and 10b share the same configurations
and operations, so they shall be generically referred to as a portable
telephone 10 hereinafter unless it is necessary to distinguish them in
explanation.
The mobile data communication network 20 is constituted of base
station 21, switching office, which is not shown, and communication lines
for connecting them. Multiple base stations 21 are deployed at
predetermined intervals in a communication service area of the mobile
data communication network 20 to effect radio communication with the
portable telephones 10 movably located in respective radio cells. The
mobile data communication network 20 is connected to the Internet 30
through a gateway, which is not shown, and two-way data transfer is
possible between the networks.
The download server 40 holds data in an HTML (Hypertext

Markup Language) format that can be referred by using the browser of the
portable telephone 10, and various types of Java applications, and
provides them to the portable telephone 10 through the intermediary of the
Internet 30 and the mobile data communication network 20.
Java applications held by the download server 40 include, for
example, software for providing PIM (Personal Information Management)
to a user of the portable telephone 10 and game software for the user of
the portable telephone 10 to play a confrontational game with another user.
When these Java applications are downloaded from the download server
40 to the portable telephone 10 and executed by the portable telephone 10,
a predetermined communication node is called, and processing is carried
out by performing communication with the communication node. There
is also a Java application in which, when a user specifies a call destination
communication node, a so-called "PhoneTo" function is implemented to
call the communication node to effect voice communication.
In this case, as a call destination communication node, there are,
for example, server 25, portable telephones 10 other than the portable
telephone 10 that executes an application, and fixed telephones, which are
not shown.
The server 25 has a function for providing a user with the PIM
service. More specifically, the server 25 has a memory area for storing
schedules, note pads, etc. of each user, and performs updating or the like
of such data in response to requests received from the portable telephone
10 of each user. In this case, the Java application downloaded into the
portable telephone 10 is carried out thereby to cause the portable
telephone 10 to call the server 25 and perform processing in cooperation
with the server 25 to receive the PIM service.
If the Java application downloaded into the portable telephone 10
is a confrontational game to play with another portable telephone 10, then

the portable telephone 10a, for example, calls the portable telephone 10b.
Thereafter, communication is carried out between the portable telephones
10a and 10b to execute the Java application.
Thus, a Java application is executed on the portable telephone 10
so as to connect a line by calling a predetermined communication node
and to execute a processing (including voice communication processing)
by performing communication with the communication node.
However, when the presence of an illegal application mentioned
above is taken into account, it is not desirable to allow a call origination
processing based on a instruction of Java applications without limitation.
For this reason, the embodiment imposes a certain limitation on a
call origination processing accompanied by executing a Java application.
(2) Hardware configuration of portable telephone 10
Referring now to the block diagram shown in Fig. 2, the hardware
configuration of the portable telephone 10 will be described.
As shown in the drawing, the portable telephone 10 is constructed
of a transmitting/receiving unit 11, a control unit 12, a user interface unit
13, and a bus 14 interconnecting them.
The transmitting/receiving unit 11 is constituted of an antenna and
a communication control circuit, which are not shown, and performs radio
communication with the base stations 21 of the mobile data
communication network 20.
The user interface unit 13 is constructed of a liquid crystal display
for displaying various types of information, a key pad for a user to
perform various types of input operations, and a microphone with a
speaker for telephone calls of the user.
The control unit 12 controls each part of the portable telephone 10,
and is constructed of a CPU 121, a ROM 122, and an SRAM 123.
Various control programs or the like are stored in the ROM 122,

and the CPU 121 reads out the control programs to execute various types
of control processing. Control programs in the ROM 122 include an
operating system provided in the portable telephone 10, a browser, and
various types of software, which will be discussed hereinafter.
The SRAM 123 is used as a work area of the CPU 121, and also
stores Java applications downloaded from the download server 40, the
history of outgoing/incoming calls of the portable telephone 10, and
telephone directory data entered by a user.
Fig. 3 is a diagram showing an example of the history of
outgoing/incoming calls stored in the SRAM 123, and Fig. 4 is a diagram
showing an example the telephone directory data stored in the SRAM 123.
As shown in Fig. 3, the history of outgoing calls is stored with date
and time when the portable telephone 10 made each call, associated with
the telephone number of the communication node from which the
telephone call was made (the originating telephone number). Similarly,
the history of incoming calls is stored with date and time when the
portable telephone 10 received each call, associated with the telephone
number of the communication node from which the telephone call,
corresponding to the received call, was made (the incoming telephone
number).
Furthermore, the telephone directory data is stored with
interrelated names and telephone numbers, as shown in Fig. 4.
As for a processing for storing of histories of outgoing and
incoming calls, well-known arts shall be applied and the explanation
thereof will be omitted.
(3) Software configuration of portable telephone
The software configuration of the portable telephone 10 will now
be described.
Fig. 5 is a schematic diagram showing the software configuration

of the portable telephone 10. As shown in the drawing, the software of
the portable telephone 10 is constituted of an operating system OS, a Java
application manager JAM, a Java K virtual machine KVM and a Java
application AP in this order from a lowermost layer to an uppermost layer.
The operating system OS is a well-known software installed in a
portable telephone to support basic processing of the portable telephone
10.
The Java application manager JAM is software mainly for control
and security check on the Java K virtual machine KVM. To be more
specific, the Java application manager JAM refers to the aforesaid
histories of outgoing/incoming calls and the telephone directory data and
determine whether the call origination processing should be executed or
not by checking whether the telephone number of the above
communication node is included therein, when a call origination is
processed to a predetermined communication node accompanied by
executing the Java application AP. The determination is based on an
idea: a call origination processing can be granted in such cases that the
node communication telephone number of the call origination is included
in the histories of outgoing/incoming calls or the telephone directory data,
because this means that the portable telephone 10 performed
communication with the communication node in the past or the user
recognized it as a communication partner.
The Java K virtual machine KVM carries out the Java application
under the control of the Java application manager JAM. The Java virtual
machine KVM and the Java application manager JAM are incorporated
into the operating system OS in advance, and they are all stored in the
ROM 122.
The Java application AP is the software described in the Java
(registered trademark) programming language as mentioned above, and it

is downloaded into the portable telephone 10 from the download server 40,
then written to and stored in the SRAM 123.
B: Operation
The operation of the embodiment with the above configurations
will now be explained.
Fig. 6 is a flowchart showing the processing execution of the Java
application AP by the portable telephone 10.
When an instruction is issued for starting up a requested Java
application AP by user's operation, the Java application AP is started up
on the Java K virtual machine KVM shown in Fig. 3 in response to the
instruction, and the processing is executed unit by unit which is an
execution unit called "class" (step S1).
Then, it is determined whether the class to be executed is the
processing that requires a call origination or not to a communication node
(step S2).
If the class does not require the call origination processing (NO in
step S2), then the Java K virtual machine KVM repeats the processing of
step S1, and executes the processing corresponds to the class.
If the class requires the call origination processing (YES in step
S2), then the Java application manager JAM refers to the telephone
number of the communication node, for which the call origination
processing is to be implemented, the histories of outgoing/incoming calls
and the telephone directory data and compares them in response to a
request from the Java K virtual machine KVM (step S3).
If a comparison result indicates that the same telephone number as
that of the communication node for which the call origination processing
is to be implemented has been found in the histories of outgoing/incoming
calls or the telephone directory data (YES in step S4), then the Java
application manager JAM determines that the call origination processing

has been granted and instructs that the Java K virtual machine KVM to
execute the call origination processing (step S5).
If no telephone number, which is identical to that of the
communication node for which the call origination processing is to be
carried out, is found in the histories of outgoing/incoming calls and the
telephone directory data (NO in step S4), then it is determined that the call
origination processing has not been granted. The Java application
manager JAM instructs the Java K virtual machine KVM to display a
message on a liquid crystal display, indicating that the call origination
processing cannot be granted, together with another message indicating
that user's instruction is necessary to perform call origination (step S6).
The displayed in this case can be a message, for example, " You
need to call oo-xxxx-∆∆∆∆ to continue the processing. Are you making
the call? Press key 1 for YES or press key 2 for NO."
If the user issues an instruction for making the call (YES in step
S7), then the processing comes to step S5 wherein the Java K virtual
machine KVM carries out the call origination processing. Then, the
processing returns to step S1 wherein the processing for executing the
Java application AP is continued.
In this case, a call origination is made in the step S5 processing so
that the telephone number used for making the call is stored in the history
of outgoing calls. Hence, the call origination processing will be granted
thereafter concerning this telephone number by step S4 determination
above mentioned.
If an instruction is issued by the user not to make the call (NO in
step S7), then the Java application AP is forcibly terminated by the Java
application manager JAM in response to the instruction (step S8).
In this way, a call origination is granted only if the result indicates
conformity after the comparison of the communication node telephone

number to be implemented for the call origination with the histories of
outgoing/incoming calls and the telephone directory data.
That is to say, in this embodiment, call originations are limited to
the communication nodes called before or the communication nodes
registered in the telephone directory by the user to ensure the security
thereby.
C: Modification examples
As previously mentioned, the present invention is not limited to the
embodiment described above, and may be implemented in various
modifications as shown below.
(1) Form of each communication node
In the embodiment described above, the portable telephone 10 has
been used as the subject executing applications. The subject executing
applications, however, is not limited thereto; it may be a fixed telephone
or a personal computer connected to a portable telephone or a fixed
telephone.
A communication node to be called is not limited to the server 25
or the portable telephone 10; it may be a personal computer or the like
connected to a fixed network and placed at home or in an office.
Thus, the subjects executing the applications and the objects to be
called are not limited as long as they are communication nodes to which
lines are connected by using telephone numbers to perform data
communication or voice communication.
(2) The use of the histories of outgoing/incoming calls and telephone
directory data
In the embodiment, both the histories of outgoing/incoming calls
and the telephone directory data have been used to determine whether the
call origination processing should be granted or not; however, the present

invention is not limited thereto. Alternatively, whether call origination
processing should be granted may be determined by using only the history
of outgoing calls, only the history of incoming calls, or only the telephone
directory data, or by using at least two of them.
(3) Processing for different applications
In the embodiment, even when a plurality of Java applications AP
have been installed in the portable telephone 10, it has been determined
whether call origination should be implemented by using all the histories
of outgoing/incoming calls and the telephone director data without
awareness of differences among applications, when any of the Java
applications AP is carried out; however, the present invention is not
limited thereto. Alternatively, data on which the determination is based
may be limited for each application AP to be executed.
For instance, for the first Java application only the telephone
directory data may be the foundation on which determination is based, for
the second Java application both histories of outgoing/incoming calls and
telephone directory data may be the foundation on which determination is
based, and for the third Java application, without providing any
foundation on which determination is based, calls to all communication
nodes may be granted.
As for this occasion users may determine every time which data
shall be the determination foundation, or the Java application manager
JAM may determine according to attributes of a Java application AP.
Java applications AP are not necessarily limited to those
downloaded from a network. For example, some Java applications AP are
stored in the ROM 122 in advance. Such Java Applications AP are
considered to be with high security and no limitation may be put on the
call originations. Furthermore, Java applications AP that are
downloaded from the download server 40 authenticated by predetermined

certificate authorities may be expected to provide respectable security.
Hence, both the histories of outgoing/incoming calls and the telephone
directory data may be used as the foundations on which determinations are
based to ease the restrictions on call origination. Security may not be
expected much for Java applications AP downloaded from download
server 40 that are not authenticated by predetermined certificate
authorities. Hence, only a telephone directory data history may be used
as the foundation on which determinations are based enhancing
restrictions on call origination.
(4) Programming language
In the embodiment, the Java (registered trademark) has been used;
the present invention, however, is not limited thereto. It is needless to
say that other programming languages may be used.

WE CLAIM;
1. A communication terminal (10) comprising:
transmitting/receiving unit (11) constituted of an antenna and a communication
control circuit and configured for performing radio communication with base stations (21) of
a mobile data communication network (20); and
a downloading means for downloading an application comprising a plurality of
execution units from a download server (40), using the transmitting/receiving unit (11);
the communication terminal (10) being characterized by comprising:
a storing means for storing software providing an execution environment for the
downloaded application, wherein the software is configured for, before an execution unit in
the application is executed, detennining whether the execution of the execution unit requires
a call origination by the transmitting/receiving unit (11) using a telephone number, and for, if
it is determined that a call origination is required, determining whether the call origination
using the telephone number is allowed; and
a means for, if it is determined by the software that the call origination using the
telephone number is allowed, allowing the software to execute the execution unit in the
application, and for, if it is determined by the software that the call origination using the
telephone number is not allowed, not allowing the software to execute the execution unit in
the application, wherein:
the storing means stores a plurality of telephone number storing means including a
plurality of telephone numbers that have been granted in advance; and
the software means is configured for determining whether the call origination using
the telephone number is allowed, on the basis of whether the telephone number is registered
in at least one of the plurality of telephone number storing means.
2. The communication terminal (10) as claimed in claim 1, wherein the plurality of
telephone number storing means comprises at least one of:
a first storing means for registering a telephone number of a communication node
called by the communication terminal (10),
a second storing means for registering a telephone number of a communication node


from which a call is received by the communication terminal (10), and
a third storing means for storing telephone directory data.
3. The communication terminal (10) as claimed in claim 1, wherein the software means is
configured for determining a telephone number storing means among the plurality of telephone
number storing means, to be used to determine whether the call origination using the telephone
number is allowed, on the basis of the application.
4. The communication terminal (10) as claimed in claim 3, wherein the software means is
configured for determining a telephone number storing means among the plurality of telephone
number storing means, to be used to determine whether the call origination using the telephone
number is allowed, on the basis of an attribute of the application.
5. The communication terminal (10) as claimed in claim 3, wherein the software means is
configured for determining a telephone number storing means among the plurality of telephone
number storing means, to be used to determine whether the call origination using the telephone
number is allowed, on the basis of whether the download server (40) from which the application is
downloaded is a server authenticated by predetermined certificate authorities.
6. A communication terminal (10) as claimed in claim 1, wherein:
the software means comprises first software for executing an execution unit in the
downloaded application and second software for controlling the first software;
the first software is configured for, before an execution unit in the application is executed,
determining whether the execution of the execution unit requires a call origination by the
transmitting/receiving unit (11) using a telephone number;
the second software is configured for, if it is determined that a call origination is required,
determining whether the call origination using the telephone number is allowed; and
the means is configured for, if it is determined by the second software that the call
origination using the telephone number is allowed, allowing the first software to execute the


execution unit in the application, and for, if it is determined by the second software that the call
origination using the telephone number is not allowed, not allowing the first software to execute the
execution unit in the application.
7. A communication terminal (10) as claimed in claim 1, comprising a plurality of telephone
number storing means, wherein the step of determining whether the call origination using the
telephone number is allowed comprises:
determining a telephone number storing means among the plurality of telephone number
storing means on the basis of an attribute of the application; and
determining whether the call origination using the telephone number is allowed, using the
determined telephone number storing means.
8. A call origination limiting method carried out in a communication terminal (10) comprising:
transmitting/receiving unit (11) constituted of an antenna and a communication control
circuit and configured for performing radio communication with base stations (21) of a mobile data
communication network (20); and
a storing means for storing software providing an execution environment for an application;
the method comprising:
downloading an application including a plurality of execution units from a download server
(40), using the transmitting/receiving unit (11);
the method being characterized by comprising:
before an execution unit in the application is executed, determining, using the software,
whether the execution of the execution unit requires a call origination by the transmitting/receiving
unit (11) using a telephone number;
if it is determined that a call origination is required, determining, using the software, whether
the call origination using the telephone number is allowed on the basis of whether the telephone
number is registered in at least one of a plurality of telephone number storing means comprising a
plurality of telephone numbers that have been granted in advance;
if it is determined that the call origination using the telephone number is allowed, allowing
the software to execute the execution unit in the application, and
if it is determined that the call origination using the telephone number is not allowed, not
allowing the software to execute the execution unit in the application.


9. A call origination limiting method as claimed in claim 8, wherein:
the software means comprises first software for executing an execution unit in an application
and second software for controlling the first software;
the step of determining whether the execution of the execution unit requires a call
origination by the transmitting/receiving unit (11) using a telephone number is performed using the
first software;
the step of determining whether the call origination using the telephone number is allowed is
performed using the second software; and
if it is determined that the call origination using the telephone number is allowed, the first
software is allowed to execute the execution unit in the application.


"ABSTRACT"

A communication terminal and a call origination limiting method carried out in a
communication terminal are disclosed. The communication terminal (10) comprises: transmitting/
receiving unit (11) constituted of an antenna and a communication control circuit and configured for
performing radio communication with base stations (21) of a mobile data communication network
(20); and a downloading means for downloading an application comprising a plurality of execution
units from a download server (40), using the transmitting/receiving unit (11); the communication
terminal (10) being characterized by comprising: a storing means and a means for allowing or not
allowing software to execute the execution unit in the application, wherein: the storing means stores
a plurality of telephone number storing means including a plurality of telephone numbers that have
been granted in advance; and the software means is configured for determining whether the call
origination using the telephone number is allowed, on the basis of whether the telephone number is
registered in at least one of the plurality of telephone number storing means.

Documents:

IN-PCT-2002-650-(11-01-2013)-ABSTRACT.pdf

IN-PCT-2002-650-(11-01-2013)-AMANDED PAGES OF SPECIFICATION.PDF

IN-PCT-2002-650-(11-01-2013)-CORRESPONDENCE.pdf

IN-PCT-2002-650-KOL-(08-11-2012)-CORRESPONDENCE.pdf

in-pct-2002-650-kol-abstract.pdf

IN-PCT-2002-650-KOL-ASSIGNMENT 1.1.pdf

in-pct-2002-650-kol-assignment.pdf

IN-PCT-2002-650-KOL-CANCELLED COPY.pdf

in-pct-2002-650-kol-claims.pdf

IN-PCT-2002-650-KOL-CORRESPONDENCE 1.1.pdf

IN-PCT-2002-650-KOL-CORRESPONDENCE-1.1.pdf

in-pct-2002-650-kol-correspondence.pdf

in-pct-2002-650-kol-description (complete).pdf

in-pct-2002-650-kol-drawings.pdf

IN-PCT-2002-650-KOL-EXAMINATION REPORT 1.1.pdf

in-pct-2002-650-kol-examination report.pdf

in-pct-2002-650-kol-form 1.pdf

IN-PCT-2002-650-KOL-FORM 13 1.1.pdf

in-pct-2002-650-kol-form 13.pdf

IN-PCT-2002-650-KOL-FORM 18 1.1.pdf

in-pct-2002-650-kol-form 18.pdf

in-pct-2002-650-kol-form 3.pdf

in-pct-2002-650-kol-form 5.pdf

IN-PCT-2002-650-KOL-GPA 1.1.pdf

in-pct-2002-650-kol-gpa.pdf

IN-PCT-2002-650-KOL-GRANTED-ABSTRACT.pdf

IN-PCT-2002-650-KOL-GRANTED-CLAIMS.pdf

IN-PCT-2002-650-KOL-GRANTED-DESCRIPTION (COMPLETE).pdf

IN-PCT-2002-650-KOL-GRANTED-DRAWINGS.pdf

IN-PCT-2002-650-KOL-GRANTED-FORM 1.pdf

IN-PCT-2002-650-KOL-GRANTED-FORM 2.pdf

IN-PCT-2002-650-KOL-GRANTED-FORM 3.pdf

IN-PCT-2002-650-KOL-GRANTED-FORM 5.pdf

IN-PCT-2002-650-KOL-GRANTED-SPECIFICATION-COMPLETE.pdf

IN-PCT-2002-650-KOL-INTERNATIONAL PUBLICATION.pdf

IN-PCT-2002-650-KOL-OTHERS.pdf

IN-PCT-2002-650-KOL-PETITION UNDER RULE 137.pdf

in-pct-2002-650-kol-priority document.pdf

IN-PCT-2002-650-KOL-REPLY TO EXAMINATION REPORT.pdf

in-pct-2002-650-kol-specification.pdf

IN-PCT-2002-650-KOL-TRANSLATED COPY OF PRIORITY DOCUMENT. 1.1.pdf

in-pct-2002-650-kol-translated copy of priority document.pdf


Patent Number 255524
Indian Patent Application Number IN/PCT/2002/650/KOL
PG Journal Number 09/2013
Publication Date 01-Mar-2013
Grant Date 28-Feb-2013
Date of Filing 14-May-2002
Name of Patentee NTT DOCOMO, INC.
Applicant Address 11-1, NAGATACHO 2-CHOME, CHIYODA-KU, TOKYO
Inventors:
# Inventor's Name Inventor's Address
1 YAMADA KAZUHIRO 660, MUTSUKAWA 1-CHOME, MINAMI-KU, YOKOHAMA-SHI, KANAGAWA 232-0066
2 KAMIYA DAI 3-1-301, TOMIHAMA 2-CHOME, ICHIKAWA-SHI, CHIBA 272-0115
3 WAKABAYASHI TATSUAKI 18-24 HONJUKU-CHO, ASAHI-KU, YOKOHAMA-SHI, KANAGAWA 241-0023
PCT International Classification Number H04M 1/677
PCT International Application Number PCT/JP2002/00698
PCT International Filing date 2002-01-30
PCT Conventions:
# PCT Application Number Date of Convention Priority Country
1 2001-024737 2001-01-31 Japan