Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR SENDING A MESSAGE TO A COMPUTER EQUIPMENT
Document Type and Number:
WIPO Patent Application WO/2016/050976
Kind Code:
A1
Abstract:
A method to send at least one message to a computer equipment adapted to manage the message is provided. The method comprises: obtaining the message to be sent to the computer equipment adapted to manage the message; packing at least the message, wherein the packed message comprises a plurality of symbols; encoding the message using a packaging coding table, wherein in the coding table each of the symbols of the packed message corresponds to a telephone number; making a missed call to each of the telephone numbers associated with the symbols present on the packed message, wherein information regarding each missed call is received by the computer equipment adapted to manage the message. Additionally, methods to manage and receive the message are also provided.

Inventors:
GOÑI MACIÀ JOSEP RAMON (ES)
FENOLLOSA BIELSA CARLOS (ES)
Application Number:
PCT/EP2015/072869
Publication Date:
April 07, 2016
Filing Date:
October 02, 2015
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
PARADOXA TECHNOLOGIES S L (ES)
International Classes:
H04L12/58
Domestic Patent References:
WO2002058417A12002-07-25
Foreign References:
EP2398216A12011-12-21
Attorney, Agent or Firm:
ZBM PATENTS - ZEA, BARLOCCI & MARKVARDSEN (1 2nd floor, Barcelona, ES)
Download PDF:
Claims:
CLAIMS

1 . A method to send at least one message (m) to a computer equipment adapted to manage the message (m), the method comprising:

- Obtaining the message (m) to be sent to the computer equipment adapted to manage the message (m);

- Packing at least the message (m), wherein the packed message (p) comprises a plurality of symbols;

- Encoding the packed message (p) using a coding table, wherein in the coding table each of the symbols of the packed message (p) corresponds to a telephone number;

- Making a missed call to each of the telephone numbers associated with the symbols present in the packed message (p), wherein the information regarding each missed call is received by the computer equipment adapted to manage the message (m). 2. A method according to claim 1 , comprising:

- Compressing at least the message (m).

3. A method according to any of claims 1 or 2, comprising:

- Encrypting at least the message (m).

4. A method according to any of claims 1 - 3, comprising:

- Compressing the packed message (p).

5. A method according to any of claims 1 - 4, comprising:

- Encrypting the packed message (p).

6. A method according to any of claims 1 - 5, comprising:

- Obtaining an identifier (RID) of the final receiver of the message (m), wherein packing at least the message (m) comprises packing the message (m) and the identifier (RID) of the final receiver of the message (m).

7. A method according to claim 6, wherein the identifier (RID) of the final receiver of the message (m) comprises a telephone number.

8. A method according to any of claims 1 - 7, wherein packing at least the message (m) further comprises packing a package header, a package body and a package footer.

9. A method according to any of claims 1 - 8 wherein packing at least the message (m) comprises packing at least the message (m) using a positional numbering system based on a number. 10. A method according to any of claims 1 - 9, wherein making a missed call to each of the telephone numbers associated with the symbols present in the encoded message (p) is run according to the order of the symbols within the encoded message (p). 1 1 . A method according to any of claims 1 - 10, wherein the method is run on a computer adapted to send the message (m); wherein the information regarding each of the missed calls comprises, for each missed call, at least one of the following parameters:

- An identifier (SID) of the sender of the message associated with the computer equipment adapted to send the message (m);

- Phone number to which the missed call is made;

- Start time of the missed call;

- Call duration. 12. A method according to claim 1 1 , wherein the identifier (SID) of the sender of the message (m) comprises a telephone number.

13. A method according to any of claims 1 - 12, comprising: - If after a predetermined time a confirmation of the receipt of the message (m) has not received by the computer equipment adapted to send at least one message (m), a fault indicator related to the send of the message (m) is generated. 14. A computer program product comprising program instructions for causing a computer equipment adapted to send at least one message (m) to run a method according to any of claims 1 - 13 for sending at least the message (m) to a computer equipment adapted to manage the message (m). 15. A computer program product according to claim 14, wherein the computer program product is stored in recording means.

16. A computer program product according to any of claims 14 - 15, wherein the computer program product is carried by a carrier signal.

17. Computer equipment adapted to send at least one message (m) to computer equipment adapted to manage the message (m), comprising:

- Electronic / computer means to obtain the message (m) to be sent to the computer equipment adapted to manage the message (m);

- Electronic / computer means to pack at least the message (m), wherein the packed message (p) comprises a plurality of symbols; -Electronic / computer means to encode the packed message (p) using a coding table, wherein in the coding table each of the symbols of the packed message (p) corresponds to a telephone number;

- Electronic / computer means to make a missed call to each of the telephone numbers associated with the symbols present in the packed message (p), wherein the information regarding each missed call is received by the computer equipment adapted to manage the message (m).

18. Computer equipment adapted to send at least one message (m) to a computer equipment adapted to manage the message (m) comprising a memory and a processor, wherein the memory stores computer program instructions executable by the processor, the instructions comprising features to run a method according to any of claims 1 - 13 configured send at least one message (m) to a computer equipment adapted to manage the message (m).

19. Computer equipment according to claim 18, wherein the computer equipment is one of the following:

- An equipment comprising a SIM card;

- A computer system.

20. A method for managing at least one message (m) sent from a computer equipment adapted to send the message (m), the method comprising:

- Receiving information regarding missed calls made by the computer equipment adapted to send the message (m), wherein the information comprises, for each missed call, at least the phone number to which the missed call is made;

- Encoding each of the telephone numbers to which the missed calls can be made using a coding table, wherein each of the phone numbers corresponds to a symbol of a packed message (p);

- Unpacking the packed message (p) such that at least the message (m) is obtained. 21 . A method according to claim 20 comprising:

- Decrypting the packed message (p).

22. A method according to any of claims 20 or 21 comprising:

- Decompressing the packed message (p).

23. A method according to any one of claims 20 - 22 comprising:

- Decrypting the unpacked message.

24. A method according to any one of claims 20 to 23 comprising:

- Decompressing the unpacked message (p).

25. A method according to any of claims 20 - 24 comprising:

- Sending an indicator of the confirmation of the receipt of the message (m) to the computer equipment adapted to send the message (m).

26. A method according to any of claims 20 - 25, wherein unpacking the packed message (p) comprises unpacking the packed message (p) using a positional numbering system based on a number. 27. A method according to any of claims 20 - 26, wherein the information received regarding each of the missed calls comprises, for each missed call, at least one of the following parameters:

- Identifier (SID) of the message sender (m) associated with the computer equipment adapted to send the message (m);

- Phone number to which the missed call is made;

- Start time of the missed call;

- Call duration.

28. A method according to any of claims 20 - 27, wherein the packed message (p) comprises the message (m) and an identifier (RID) of the final receiver of the message (m), wherein unpacking the packed message (p) to obtain at least the message (m) comprises unpacking the packed message (p) such that the message (m) and an identifier (RID) of the final receiver of the message (m) are obtained. 29. A method according to claim 28 comprising:

- Replacing the identifier (RID) of the final receiver of the message (m) by the identifier (SID) of the sender (m), wherein the identifier (SID) is included in the information received regarding each of the missed calls.

30. A method according to claim 29, wherein the identifier (RID) of the final receiver of the message (m) comprises a telephone number associated with a computer equipment adapted to receive the message (m). 31 . A method according to claim 30 comprising:

- Sending at least the message (m) to the computer equipment adapted to receive the message (m).

32. A method according to claim 31 , wherein sending at least the message (m) to the computer equipment adapted to receive the message (m) comprises: - Packing the message (m) and the identifier (SID) of the message sender (m), wherein the packed message (ρ') comprises a plurality of symbols;

- Encoding the packed message (ρ') using a coding table, wherein in the coding table each of the packed message (ρ') symbols corresponds to a telephone number;

- Making a missed call from each of the telephone numbers associated to the symbols present in the packed message (ρ') to the telephone number included in the identifier (RID) of the final receiver of the message (m), wherein information regarding each missed call is received by the computer equipment adapted to receive the message (m).

33. A method according to claim 32 comprising:

- Compressing at least the message (m).

34. A method according to any of claims 32 or 33 comprising:

- Encrypting at least the message (m). 35. A method according to any one of claims 32 - 34 comprising:

- Compressing the packed message (ρ').

36. A method according to any of claims 32 - 35 comprising:

- Encrypting the packed message (ρ').

37. A method according to any of claims 32 - 36 comprising:

- If after a predetermined time a confirmation of the receipt of the message (m) has not received by the computer equipment adapted to receive the message (m), a fault indicator related to the send of the message (m) is generated.

38. A connputer program product comprising program instructions for causing a computer equipment adapted to manage at least one message (m) to run a method according to any one of claims 20 - 37, wherein the method is a method to manage the message (m) sent from the computer equipment adapted to send the message (m).

39. A computer equipment adapted to manage at least one message (m) sent from a computer equipment adapted to send the message (m), comprising:

- Electronic / computing means for receiving information regarding missed calls made by the computer equipment adapted to send the message (m), wherein the information, for each missed call, comprises the phone number to which the missed call is made;

- Electronic / computing means to encode each of the phone numbers to which the missed calls are made using a coding table, wherein in the coding table each of the telephone numbers corresponds to a symbol of a packed message (p);

- Electronic / computing means to unpack the packed message (p) such that the message (m) is obtained. 40. Computer equipment adapted to manage at least one message (m) sent from a computer hardware adapted to send the message (m) comprising a memory and a processor, wherein the memory stores executable computer program instructions for the processor, the instructions comprising features to execute a method according to any of claims 20 - 37, wherein the method is a method for managing at least one message (m) sent from the computer equipment adapted to send the message (m).

41 . A method to receive at least one message (m) sent from a computer equipment adapted to manage the message (m), comprising:

- Receiving information regarding the missed calls performed by the computer equipment adapted to manage the message (m), wherein the information comprises, for each missed call, at least the telephone number that makes the missed call;

- Encoding each of the phone numbers that makes a missed call using a coding table, wherein each of the phone numbers of the coding table corresponds to a symbol of the packed message (p');

- Unpacking the packed message (ρ') such that at least the message (m) is obtained.

42. A method according to claim 41 , comprising:

- Decrypting the packed message (ρ').

43. A method according to any of claims 41 or 42, comprising:

- Decompressing the packed message (ρ'). 44. A method according to any of claims 41 - 43, comprising:

- Decrypting the unpacked message.

45. A method according to any one of claims 41 - 44, comprising:

- Decompressing the unpacked message.

46. A method according to any of claims 41 - 45, wherein the packed message comprises the message (m) and an identifier (SID) of the sender of the message (m), wherein unpacking the packed message (ρ') such that at least the message (m) is obtained comprises unpacking the packed message (ρ') to obtain the message (m) and the identifier (SID) of the sender of the message (m).

47. A computer program product comprising program instructions for causing a computer equipment adapted to receive at least one message (m) to execute a method according to any of claims 41 - 46, wherein the method is a method for receiving at least one message (m) sent from a computer equipment adapted to manage the message (m).

48. A computer equipment adapted to receive at least one message (m) sent from a computer equipment adapted to manage the message (m), comprising:

- Electronic / computing means for receiving information regarding missed calls made by the computer equipment adapted to manage the message (m), wherein the information, for each missed call, comprises the phone number to which the missed call is made;

- Electronic / computing means to encode each of the phone numbers which make the missed calls using a coding table, wherein in the coding table each of the telephone numbers corresponds to a symbol of a packed message (p');

- Electronic / computing means to unpack the packed message (ρ') such that the message (m) is obtained.

49. A computer equipment adapted to receive at least one message (m) sent from a computer equipment adapted to manage the message (m) comprising a memory and a processor, wherein the memory stores executable computer program instructions for the processor, the instructions comprising features to execute a method according to any one of claims 41 or 46, wherein the method is a method for receiving at least one message (m) sent from a computer equipment adapted to manage the message (m).

50. A system comprising

- A computer equipment adapted to manage the message (m) according to claim 40;

- A computer equipment adapted to send the message (m) to computer equipment adapted to manage the message (m) according to any of claims 18 or 19;

51 . A system according to claim 50, comprising: - A computer equipment adapted to receive the message (m) according to claim 49, wherein the message is sent from the computer equipment adapted to manage the message (m). 52. An alarm system comprising:

- A computer equipment according to claim 40 adapted to manage at least the message (m), wherein the message (m) is sent by an alarm system comprising a computer equipment according to any of claims 18 or 19, wherein the computer equipment is adapted to send the message (m) and wherein the message (m) comprises a security code.

53. A system according to claim 52, wherein the security code is obtained using a symmetric encryption algorithm. 54. A system according to claim 52, wherein the security code is obtained using a sequential generation of a list of pseudo-random numbers.

55. A system according to any of claims 52 - 54, comprising the alarm installation.

Description:
Method, system and computer program product for sending a message to a computer equipment

This application claims the benefit of Spanish Patent Application P201431462 filed on October 03, 2014.

The present disclosure refers to a method for sending at least one message to a computer equipment, wherein the computer equipment is adapted to manage the message.

The present disclosure further refers to a system and a computer program product suitable to carry out a method for sending at least one message to a computer equipment, wherein the computer equipment is adapted to manage the message.

Furthermore, the present disclosure refers to a method for managing at least one message sent from a computer equipment adapted to manage the message. Additionally, the present disclosure refers to a system and a computer program product suitable to carry out the method.

Furthermore, the present disclosure relates to a method to receive at least one message sent from computer equipment adapted to manage the message. Additionally, the present disclosure refers to a system and a computer program product suitable to carry out the procedure.

The scope of application of the present disclosure is related to the telecommunication systems. More particularly, the scope of application is related to systems for sending messages between telephone systems. BACKGROUND ART

Latest communication systems have carried out a major expansion of wired and wireless communications networks. Particularly, the telephone networks have experienced an unprecedented expansion. This expansion has been spurred by the strong demand from the consumer. Thus, the present and the future of the telephone systems is characterized by facilitating the information transfer between users. This way, the telephone terminals have been developed to improve the user experience through emails, phone calls, text messages and some other communication mechanisms.

A widespread communication system between mobile devices may be the short message service SMS. This service is available on mobile phones. The system allows sending short messages. This system has become one of the most widespread systems due to the ease use, flexibility and relatively low cost compared with a voice call. Some other communication system suitable to perform the communication between mobile devices may be the multimedia messaging system MMS. This communication system allows mobile phones to send and receive multimedia content. The system may also integrate audio, video, and / or pictures.

Originally, both communication systems were designed as a part of the telephone system GSM. However, the systems are currently available in a wide variety of networks e.g. 3G or 4G.

A recently developed communication mechanism is the use of missed calls. One missed call may be defined as a telephone terminal calling another telephone terminal and, intentionally or not, the call is terminated without being answered. By means of missed calls, the user of a telephone terminal may avoid the cost related to a conventional call or a SMS or MMS. This may be performed simply holding the fee related to the use of the telephone network. The network will not charge additional costs.

However, the known methods suitable to use missed calls in the communication between telephone terminals have different limitations and drawbacks. This way, the implementation of these methods is not completely satisfactory. A problem of the known methods may be that said methods can only broadcast a list of pre-set messages. Thus, these methods are unable to encode data which is not agreed between parts. Therefore, the use of missed calls in order to send a message can be considered a very limitative communication system.

SUMMARY OF THE INVENTION

Therefore, there is a need for new methods for sending messages using missed calls, wherein the new methods solve at least some of the aforementioned problems. It is an object of the present invention to fulfil said necessity.

This object is achieved by providing a method to send at least one message to a computer equipment adapted to manage the message. The method comprises: obtaining a message to be sent to the computer equipment adapted to manage the message; packing at least the message, wherein the packed message comprises a plurality of symbols; encoding the packed message using a coding table, wherein in the coding table each of the symbols of the packed message corresponds to a telephone number; making a missed call to each of the phone numbers associated with the symbols present in the packed message, wherein information related to each of the missed calls is received by the computer equipment adapted to manage the message

This way, a method as previously describes may allow the communication through missed calls in a reliable way while keeping costs down. Basically, the method uses the conventional phone structure such that the associated cost may only be the maintenance of the phone service. Moreover, the method allows to communicate all sort of messages, thus the need to restrict the communication to a predefined number of messages may be avoided.

In some examples, the method may comprise at least compress the message.

In some other examples, the method may comprise at least encrypt the message.

According to some other examples, the method may comprise at least compress the packed message.

According to yet some other examples, the method may comprise at least encrypt the packed message. According to some examples, the method may comprise obtaining at least an identifier of the final recipient of the message, wherein packing at least the message may comprise packing the message and the identifier of the final recipient of the message. According to some examples, packing at least the message (m) may comprise packing a package header, a package body and a footer.

Additionally, the identifier of the final recipient of the message may comprise a phone number.

According to some examples, the method may comprise packing at least the message using a positional numeral system, wherein a base of the positional numeral system is a number. Moreover, the method may perform a missed call to each of the phone numbers associated with the symbols present in the encoded message. Additionally, the missed called may be performed according to the symbol's order within the encoded message.

According to some examples, the method may be run / executed in a computer equipment adapted to send a message. The information regarding each of the missed calls may comprise, for each missed call, at least one of the following parameters: an identifier of the message's sender associated with the computer equipment adapted to send the message; a phone number to which the missed call is made; the start time of the missed call; the duration of the call.

In some other examples, the identifier of the message sender identifier may comprise a phone number. In addition, the method may comprise: if, after a predetermined time, a confirmation of the reception of the message has not been received by the computer equipment adapted to manage the message, an indicator of failure in sending a message is generated. According to a second aspect, a computer product program is provided. The computer product program may comprise program instruction. The program instruction may cause the computer equipment adapted to emit the message to execute a process as previously described. The process is able to send at least a message to a computer equipment adapted to manage the message.

Said computer program product may be stored in a physical storage media such as recording means, a computer memory, or a read-only memory, or it may be stored in a carrier wave such as electrical or optical. The computer program product may be in the form of source code, object code or an intermediate code between source code and object code e.g. a partially compiled from. The computer program product may also be in any other form suitable to be used in order to implement the procedures described. The carrier may be any entity or device capable of carrying the program. This way, the carrier may comprise a storage medium such as a ROM, for example a CD - ROM, a semiconductor ROM. It may also comprise a magnetic recording medium, for example a floppy disc or a hard disc. Moreover, the carrier may be a transmissible carrier means such as an electrical or optical signal. The signal may be transmitted via electrical or electrical cable. Additionally, the signal may also be transmitted by radio or some other means

When the computer program product is contained in a signal that can be transmitted directly via a cable or some other device or means, the carrier can be formed by said cable or some other device or means.

Alternatively, the carrier may be an integrated circuit in which the computer program product is embedded. Said integrated circuit may be adapted to perform or to be used in the implementation of relevant procedures.

Moreover, the described methods can also be implemented using computer systems such as personal computers, servers, computer networks, laptops, tablets or any other programmable device or computer processor. Additionally or alternatively, it can also be used electronic programmable devices e.g. programmable logic controllers (ASICs, FPGAs, PLCs, etc.).

Therefore, the description can be implemented in hardware, in software or firmware, or any combination thereof. In a third aspect, a system to send at least one message to a computer equipment adapted to manage the message is provided. The system may comprise: electronic / computer means to obtain the message to be sent to the computer equipment adapted to manage the message; electronic / computing means to pack at least the message, wherein the packed message comprises a plurality of symbols; electronic / computing means to encode the packed message using a coding table, wherein in the coding table each of the symbols of the packed message corresponds to a phone number; electronic / computing means to make a missed call to each of the telephone numbers associated with the symbols present in the packed message, wherein message information regarding each missed call is received by the computer equipment adapted to manage the message.

Therefore, the system could have a purely electronic configuration (for example, the system could be a programmable electronic device e.g. ASIC, an FPGA or a PLC). Additionally, the system may be a computing device. The computing device may comprise a memory and a processor, wherein the memory is adapted to store a serie of computer program instructions and, wherein the processor is adapted to execute the instructions stored in memory in order to generate the different events and actions for which the system has been programmed. Similarly, the system could have a hybrid configuration with computer elements and electronic elements in combination.

Everything described with respect to the procedure to send at least one message to a computer equipment adapted to manage the message applies to this system.

According to another aspect, a computer equipment adapted to emit the message is provided. The computer equipment may comprise a memory and a processor, wherein the memory stores computer program instructions executable by the processor, wherein the instructions comprise functionalities to execute a procedure to send at least one message to a computer equipment adapted to manage the message, as previously described. According to some examples, the computer equipment adapted to emit the message may be selected from: an equipment comprising a SIM card; a computer system.

Everything described with respect to the method to send at least one message to a computer equipment adapted to manage the message applies to the computer equipment adapted to emit the message. According to yet another aspect, a method to manage at least one message sent from a computer equipment adapted to emit the message is provided. The method may comprise: receiving information regarding the missed calls made by the computer equipment adapted to emit the message, wherein the information comprises for each missed call, at least the phone number to which the missed call is made; encoding each of the telephone numbers to which the missed call is made using a coding table, wherein the in the coding table each of the telephone numbers corresponds to a symbol of a packed message; unpack the packed message such that at least the message is obtained.

In some examples, the method can comprise at least decompress the packed message.

In some other examples, the method may comprise decrypt at least the packed message.

Additionally, the method may also comprise decompress at least the unpacked message. According to some other examples, the method may comprise decrypt at least the unpacked message. In addition, this method may comprise sending a confirmation indicator of the reception of the message (m) to a computer equipment adapted to emit the message.

According to some examples, the method may comprise unpack the packed message using a positional number system based on a number.

In some other examples, the information received about each of the missed calls may comprise, for each missed call, at least one of the following parameters: an identifier of the message sender associated with the computer equipment adapted to emit the message; a phone number to which the missed call is made; the start time of the missed call; the duration of the call. In some examples, the packed message (p) may comprise the message and an identifier of the final recipient of the message, wherein unpacking the packed message (p) such that at least the message (m) is obtained may comprise unpacking the packed message to obtain the message and the identifier of the final recipient of the message.

According to some examples, the method may comprise replacing the final recipient's identifier by the identifier of the sender of the message included in the information received about each of the missed calls. In addition, the identifier of the final recipient of the message may comprise a phone number associated with a computer equipment adapted to receive the message.

According to some examples, the message may be sent to the computer equipment adapted to receive the message m. According to some other examples, the step of sending at least the message to the computer equipment adapted to receive the message may comprise: packing the message and the identifier of the sender of the message, wherein the packed message comprises a plurality of symbols; encoding the packed message using a coding table, wherein each of the symbols of the packed message corresponds to a telephone number; making a missed call from each of the phone numbers associated with the symbols present in the packaged message to the phone number comprised in the final recipient of the message, wherein the computer equipment adapted to receive the message receives information about each of these missed calls.

According to some examples, the method may comprise compressing at least the message. In other examples, the method may comprise at least encrypting the message.

According to some examples, the method may comprise compressing the packed message.

According to some other examples, the method may comprise encrypting the packed message.

In addition, the method may comprise: if after a predetermined time a confirmation of the reception of the message has not been received by the computer equipment adapted to receive the message, an indicator of failure in sending the message is generated.

According to some other aspect, a computer program product to manage at least one message sent from a computer equipment adapted to send the message is provided. The computer program product may comprise program instructions configured to cause a computer equipment adapted to manage the message to execute a method to manage at least one message sent from the computer equipment adapted to send the message, as previously commented.

Everything described with respect to the method to manage at least one message sent from a computer equipment adapted to manage the message applies to this computer program product. According to yet another aspect, a system for managing at least one message (m) sent from a computer equipment adapted to send the message is provided. This system may comprise: electronic / computer means for receiving information regarding missed calls made by the computer equipment adapted to send the message, wherein this information for each missed call comprises, at least the phone number to which the call is made; electronic / computing means for encoding each of the telephone numbers to which calls are made using a coding, wherein in the coding table each of the telephone numbers corresponds to a symbol of a packaged message; electronic / computing means for unpacking the packed message such that the message is obtained.

Everything described with respect to the method for managing at least one message sent from a computer equipment adapted to send the message applies to this system.

According to another aspect, computer equipment adapted to manage the message, wherein the computer equipment comprises a memory and a processor is provided. The memory of the computer equipment adapted to manage the message can store computer program instructions executable by the processor, wherein the instructions comprise functionalities to execute a method for managing at least one message sent from a computer equipment adapted to send the message, as previously described.

Everything described with respect to the method for managing at least one message sent from a computer equipment adapted to send the message applies to this computer equipment adapted to manage the message.

Moreover, according to some other aspect, a method for receiving at least one message (m) sent from a computer equipment adapted to manage the message is provided. The method may comprise: receiving information regarding missed calls made by the computer equipment adapted to manage the message, wherein the information comprises for each missed call, at least the telephone number that makes the missed call; encoding each of the phone numbers that makes a missed call using an encoding table in which each of the telephone numbers corresponds to a symbol of the packed message; unpack the packed message such that the message is obtained.

According to some examples, the method may comprise decrypting the packed message. According to some examples, the method may comprise decompressing the packed message.

According to some examples, the method may comprise decrypting the unpacked message.

According to some examples, the method may comprise decompressing the unpacked message.

According to some examples, the packed message may comprise the message and an identifier of the message's sender; and unpack the packed message such that the message is obtained may comprise unpack the packed message to get the message and the identifier of the message's sender.

According to another aspect, a computer program product for receiving at least one message sent from a computer equipment adapted to manage the message is provided. The computer program product may comprise program instructions in order to cause that a computer equipment (the computer equipment may be the computer adapted to receive the message previously described) runs / executes a procedure for receiving at least one message sent from a computer equipment adapted to manage the message, as previously commented.

Everything described with respect to the procedure for receiving at least one message sent from a computer equipment adapted to emit the message applies to this computer program product.

According to another aspect, a system for receiving at least one message sent from a computer equipment adapted to manage the message is provided. The computer equipment adapted to manage the message may comprise: electronic / computer means for receiving information regarding missed calls made by the computer equipment adapted to manage the message, wherein the information comprises, for each missed call, at least the telephone number that makes the missed call; electronic / computing means configured to encode each of the phone numbers which make the missed call using a coding table, wherein in the coding table each of the telephone numbers correspond to a symbol of a packaged message; electronic / computing means for unpacking the packed message such that the message is obtained. Everything described with respect to the procedure for receiving at least one message sent from a computer equipment adapted to manage the message applies to this system.

According to yet another aspect, a computer equipment adapted to receive the message comprising a memory and a processor is provided. The memory can store computer program instructions which may be run by the processor, therein the instructions comprise functionalities to run a procedure for receiving at least one message sent from a computer equipment adapted to manage the message, as previously described. Everything described with respect to the procedure for receiving at least one message sent from a computer equipment adapted to manage the message applies to this computer equipment adapted to receive the message.

Furthermore, a system which may comprise a computer equipment adapted to manage the message, a computer equipment adapted to send the message, as previously described, is provided.

In some examples, a computer system comprising a computer equipment adapted to receive the message (m) sent from the computer equipment adapted to manage the message (m) is provided.

In some other examples, an alarm system is provided. The alarm system comprises: a computer equipment adapted to manage at least one message, wherein this message is sent by an alarm system and, wherein the alarm system comprises a computer equipment adapted to send the message, wherein the message comprises a secure code.

In some other examples, in the alarm system, the secure code may be obtained using a symmetric encryption algorithm.

In examples, the secure code can be obtained using the sequential generation of a list of pseudo-random numbers.

For example, the system may comprise alarm systems.

BRIEF DESCRIPTION OF THE DRAWINGS

Particular embodiments of the present invention will be described in the following by way of non-limiting examples, with reference to the appended drawings, in which:

Figure 1 shows a computer equipment adapted to manage the message and a computer equipment adapted to send the message according to some examples;

Figure 2 shows an example of a packed message according to some examples;

Figure 3 shows an example of a coding table that connect symbols corresponding to the packed message with phone numbers;

Figure 4 schematically shows an example of a translation table related to the service requested; Figure 5 schematically shows a method for sending messages to a computer equipment adapted to manage the message from a computer equipment adapted to send the message according to some examples;

Figure 6 schematically shows a method for managing messages on a computer equipment adapted to manage the message sent from a computer equipment adapted to send the message according to some examples; Figure 7 shows a computer equipment adapted to manage the message and a computer equipment adapted to receive the message according to some examples;

Figure 8 schematically shows a method for sending messages from one computer equipment adapted to manage the message to a computer equipment adapted to receive the message according to some examples; Figure 9 schematically shows a method for receiving at least one message in a computer adapted to receive the message, wherein the message is sent from one computer equipment adapted to manage the message according to some examples.

DETAILED DESCRIPTION OF EMBODIMENTS

Find below some descriptions of different examples.

As shown in Figure 1 , according to some examples, the system comprises a computer equipment adapted to manage the message 2 e.g. a computer equipment adapted to receive missed calls and a computer equipment adapted to emit the message 1 e.g. a computer equipment adapted to emit missed calls.

In addition, the computer equipment adapted to emit the message 1 and the computer equipment adapted to manage message 2 can communicate with each other through a communication network such as a telephone network (or Internet in the case of VoIP). Thus, the computer equipment adapted to emit the message 1 is able to send messages to the computer equipment adapted to manage the message 2 using missed calls. This is performed in a reliable way and with reduced cost, i.e. the cost associated to the communication between the computer equipment adapted to emit the message 1 and computer equipment adapted to manage the message 2 can be only the maintenance of the telephone network.

In this particular example, the computer equipment adapted to emit the message 1 may be a telephone terminal e.g. a mobile phone. However, it also could be, for example, a fixed device and / or an IP voice terminal (in this case, the communication network could be Internet).

This computer equipment adapted to emit message 1 can include a subscriber identity module, for example a 2G SIM card. This module may allow to securely store the phone number used to identify the user (or indirectly to identify the computer equipment adapted to send the message 1 ) on the network. First, this configuration allows changing the phone number of one computer to another simply by changing the card. Moreover, it allows the computer equipment adapted to emit message 1 being compatible to work on different communications networks with different telephone service suppliers.

The computer equipment adapted to emit the message 1 may further comprise a data input device e.g. a keyboard configured for the introduction of a message (m) to be sent to the computer adapted to manage the message 2. The message may be in text format. In some other examples, the introduction of text messages can be performed through some other devices e.g. devices configured for text entry via voice recognition. In further examples, the message (m) may have been previously entered in the computer equipment adapted to emit the message 1 . In some other examples, the message may be automatically entered in the computer equipment adapted to deliver a message 1 e.g. in response to a generated alarm.

In addition, this computer equipment adapted to emit the message 1 may comprise a memory. In the memory, a list of identifiers of final recipients of the message is stored. In the present example, this list can be formed by the user's phonebook of the computer equipment adapted to emit a message 1 . Thus, using e.g., the input device described above or some other suitable device, an identifier (RID) of the final recipient of the message (m) may be selected by the user from the phonebook stored in the computer equipment adapted to emit a message 1 . In the present example, the identifier (RID) of the final receiver of the message comprises the telephone number of the final user. However, this identifier could be any other type as long as the final recipient of the message is accurately identified.

With respect to the computer equipment adapted to manage the message 2, it may be a server system. The server system may be formed by a telephone system 2a and a computer system 2b.

The telephone system 2a can be a system to manage a plurality of phone numbers, wherein each of the phone numbers may be configured to receive missed calls emitted by the computer equipment adapted to emit the message activity 1 . The telephone system's 2a activity is processed by the computer system 2b. Both systems can be integrated in one device or may physically be two different devices, even arranged in a remote configuration. The telephone system 2a and the computer system 2b can exchange one or more events related to the missed calls received. Each of the events (MCE) related to the missed call can may be formed with one or more fields. The fields may comprise information regarding the missed calls received. This information may, for example, comprise an identifier (SID) of the message (m) sender (s) associated with the computer equipment adapted to send the message 1 , the identifier (RID) of final recipient of the message, the phone number to which the missed call is made, the start time of the missed call, the duration of the missed call, etc. The computer equipment adapted to manage the message 2 can carry out the call set-up and the release of the missed calls, although some other features are possible. For example, said computer equipment can detect when the computer equipment adapted to emit the message 1 wants to communicate with the computer equipment adapted to manage the message 2 and / or interpret the signals that can be sent by the computer equipment adapted to emit the message 1 .

Figure 5 schematically shows a method for sending messages to a computer equipment adapted to manage the message 2 from a computer equipment adapted to emit the message 1 according to some examples, taking into account the configuration described in figure 1 .

In block 201 , the computer equipment adapted to emit the message 1 may obtain a message (m) to be sent (for example, the user can enter the message via a keyboard located in the computer equipment adapted to send the message) to the computer adapted to manage the message 2. The computer equipment adapted to emit the message 1 may also obtain the identifier (RID) belonging to the final recipient of the message (for example, the user may select the corresponding entry in his phone book using the keyboard itself or some other suitable device, so that the final recipient identifier can be his mobile number).

The obtained message (m) may be subsequently compressed. Compression may be performed using data compression algorithms, such as LZW or GNU Zip. Alternatively, the compression may be performed using an encoder dictionary. The encoder dictionary can operate by searching for matches between the characters forming the message (m) and a plurality of characters which may be contained in a table. This way, the plurality of characters can be replaced, thus the number of characters of the message (m) may be minimized.

In addition, the message (m) or the compressed message (m) may also be encrypted. Thus, the encrypted message (m) or the encrypted and compressed message (m) may become unreadable. Thus, it can only be read using a key. Therefore, the security of data transmission (i.e. the packed message) may be increased considerably.

In relation to the above, the message (m) may be first compressed and then encrypted, although some other alternatives are possible, such as the message (m) may be first encrypted and then compressed, the message (m) can be only encrypted or the message (m) can only be compressed.

Getting back to the figure 5, the method may comprise a second step 202 in which the message (m) can be packed, together with some other information, by the computer equipment adapted to send the message. The packaging can be carried out using a positional number system which is based on a number, for example decimal or hexadecimal. The positional numbering may be a numbering system in which each digit has a value that depends on its relative position. The position is determined by the base, which is the number of digits needed to write any number. For example, it can be carried out the packaging using a hexadecimal system, which its base is the 16. However, some other positional numeral systems known by the person skilled in the art are possible, for example decimal or octal.

Figure 2 shows an example of a possible packed message (p) to be sent to the computer equipment adapted to manage the message 2 from the computer equipment adapted to send the message 1 according to some examples.

The message (m) can be packed in a single package but may also be packed in a plurality of different packages. In case to be packed in only one package, this package may be formed with a plurality of fields, for example, a header

20, a package body 21 and a package footer 22. The body 21 of the package may include the characters of the encoded message (m) according to the selected positional number system. The positional number system is based on a number selected, for example, the hexadecimal system, as previously commented. In some examples, the package body may have a different structure depending on the data of the header or the package's footer. For example, an identifier field of the demanded service can be included. The package's footer may contain a checksum. The checksum may be a hash function. The main purpose of the hash function may be to detect accidental changes in a data stream in order to protect the integrity of said data stream. The hash function may verify that there is no discrepancy between the values obtained by making an initial check and a final check after transmission. In this way, data can be transmitted with its hash value and the receiver can calculate said value. The value may be compared with the hash value received. If a discrepancy is detected, it is possible to reject the data or request a retransmission. Furthermore, the header 20 may contain, for example, a message identifier of the packed message (p), the length of this message, the receiver's identifier (RID), the requested service and / or an encryption verification bit.

The message identifier may be implicit. For the implicit calculation can be set that each part, for example the computer equipment adapted to send message 1 or computer equipment adapted to manage message 2, store a list of messages which have been successfully sent. This way, each of the messages sent can be assigned with a sequential identifier. Consequently, any of the two parties, such as the computer equipment adapted to send the message or the computer equipment adapted to manage the message, can access to the message identifier. Therefore, the need to store the message identifier in the own message can be eliminated.

Additionally, It is also important to emphasize that the packed message (p) may also include a field (not shown) related to a requested service. This field can be commonly accessed by both the computer equipment adapted to manage the message 2 and the computer equipment adapted to send the message 1 using a translation table.

Figure 4 partially and very schematically shows an example of a translation table of a requested service. The first column 400 can show the service code which may be included in the packed message (p). The second column 401 shows the possible interpretation of the service code. The table can be interpreted by the computer equipment adapted to manage the message 2 or by the computer equipment adapted to receive a message 8, to carry out a service or perform an action. In this particular example, the service code "1 " may be interpreted by the computer equipment adapted to manage the message 2 or by the computer equipment adapted to receive a message 8 as "conduct a market assessment"; the service code "2" can be interpreted as "send an email"; the service code "3" can be interpreted as the "text delivery to a recipient"; or service code "4" can be interpreted as "display the contents of a web page".

The packaging can be carried out, as appropriate, on the message (m) or alternatively on the compressed message (m) or the encrypted message (m) or the compressed and encrypted message or the encrypted and compressed message.

Furthermore, the packed message (p) can be further compressed. As in the case of the message (m), the packed message (p) compression can be carried out using data compression algorithms such as LZW or GNU zip.

Alternatively, the compression may be carried out using an encoder dictionary. The encoder dictionary can operate searching for matches between characters forming the encoded message (p) and a plurality of characters which can be contained in a table. Thus, the plurality of characters can be replaced. Consequently, the number of characters of the packed message (p) can be minimized.

Furthermore, the packed message (p) or the packed and compressed message (p) can be encrypted. Thus, the encrypted and packed message (p) or the compressed, encrypted and packed message (p) can become illegible. Therefore, the message can only be read using a key. Consequently, the information transmission security can be considerable increased.

The packed message (p) may be first compressed and then encrypted although some other alternatives are possible. For example, the packed message may be first compressed and then encrypted, the packed message can be only encrypted or the packed message can only be compressed.

In block 203 (said block forms part of the method flow diagram shown in Figure 5), the packed message (p) may be encoded using a coding table. The structure and the operation of the coding table may be similar to those described in Figure 3. Thus, the coding table may comprise a link among symbols 91 corresponding to the packed message (p) and phone numbers 92. In this particular example, the positional number system which is based on a number can be hexadecimal (as previously explained in Figure 2). The hexadecimal system may have the number 16 as a base. This system may have a set of symbols which can be: 0, 1 , 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F. These symbols appear in the first column 91 of the table shown in figure 3.

Furthermore, the table column 92 matches with a plurality of telephone numbers (telephone number) configured to receive missed calls. This way, each of the symbols forming the packed message (p) may match with a telephone number and vice versa. The coding table may be updated via Internet and / or some other wired or wireless network communications. In addition, the coding table may be updated using a sending protocol. The protocol will be described later in figures 5 and 6. Alternatively, the coding table can be manually updated. The coding table may be stored in a computer equipment adapted to send the message 1 . However, in some examples, the coding table may be stored in the computer equipment adapted to manage the message 2 and / or the computer equipment adapted to receive the message (as will be described later) and / or an external server.

This way, the encoding step represented by block 203 may be performed based on this coding table. To do this, from the computer equipment adapted to manage the message is determined the phone number corresponding to each packed message (p) symbol. This is performed using the coding table.

Next, according to block 204 of the flowchart of Figure 5, the computer equipment adapted to send the message 1 performs a missed call to each of the phone numbers obtained in the encoding of the packed message. At this point, it is important to remember that these phone numbers are managed by the telephone system 2a present in the computer equipment adapted to manage message 2, that is, the computer that is intended to send the message (m).

In addition, it is also important to note that each of the missed calls is executed according to the symbol's order within the packed message (p) from left to right. However, some other alternatives are possible, for example, from right to left according to the order of the symbols of the packed message (p). This way, the computer equipment adapted to manage the message 2 i.e. the computer to which the message is sent can properly reconstruct said message.

Since the computer equipment adapted to manage the message (specifically the telephone system 2a) receives the missed calls, it may also receive information relating to said missed calls. The information is managed and / or generated by the computer system 2b. Within the information regarding the missed calls can be found:

- An identifier (SID) of the message's sender (e.g. his phone number) associated with the computer equipment adapted to send the message 1 ;

- The phone number to which the missed call is made;

- Start time of the call;

- The duration of the call.

Taking into account all this information, it may be particularly relevant the "Start time of the call". The "start time of the call" may be the information that allows the computer equipment adapted to manage the message 2 to properly reconstruct the message, as will be described later.

In order to clarify all the information previously commented, a particular example will be presented below.

The message (m) that the computer equipment adapted to send message 1 (particularly its user) wants to send to the computer equipment adapted to manage the message 2 (particularly its user) may correspond to the word "hello". This message ("hello") may be packed in the message's body 21 (for example, in hexadecimal), resulting in "68656C6C6F". In addition, the footer 22 may correspond to the checksum previously commented, for example E5. The header 20 may comprise the message length, for example 10. It may also comprise the message identifier e.g. 1 and the identifier of the final message recipient (RID) e.g. 3. In this way, the packed message (p) "103168656C6C6FE5" can be obtained, as shown in figure 2.

As shown in Figure 6, once the computer equipment configured to manage the message 2 receives (block 501 ) all the information related to the missed calls, and since it also includes the coding table shown in Figure 3, the computer equipment adapted to manage the message is configured to obtain the symbols associated with each of the phones to which the missed calls have been made. This way, the message can be reconstructed (block 502). At this point it is important to emphasize that is necessary to use the start time of each of the missed calls. Thus, the correct order of the symbols which are part of the packed message (p) may be set.

Optionally, the missed calls reception may be performed until the reception of an end of message signal (EOM). The end of message signal (EOM) may be a pre-set number of symbols per message although some other alternatives are possible. For example, the computer equipment adapted to emit the message may call to a specific number associated with the end of message signal.

In some examples, phone numbers record may be obtained, wherein each field of this record may include one or more events related to the missed call (MCE) and / or telephone numbers. This record of phone numbers can be created in the computer equipment adapted to manage the message although some other alternatives are possible, for example, it can be created in the computer equipment adapted to emit the message.

Once the computer equipment adapted to manage the message 2 has obtained the packed message, the computer equipment is able to obtain (block 503) the message (m) using a positional number system that is based on a number, as described in Figure 2. In this way, the computer equipment adapted to manage the message can obtain the message (m). Therefore, the message transmission among the computer equipment adapted to send the message (transmitter 1 ) and the computer equipment adapted to manage the message (receiver 2) can be completed without any extra charge / cost.

It has to be noted that the packed message (p) may have been compressed or encrypted, or a combination of both. Therefore, before you can obtain the message (m), it may be needed to take the necessary actions in order to overcome the encryption and / or compression.

Furthermore, it is also important to remember that the message (m) may have also been compressed, encrypted, or a combination of both. Therefore, the appropriate action of decompressing and / or decryption may be performed to obtain the message (m).

According to some examples, at block 503 the message (m) may be displayed on a display device located in the computer equipment adapted to manage the message 2, for example a screen.

In some other examples, at block 503, the message (m) can be interpreted by the computer equipment adapted to manage message 2 as a request to perform an associated service. In this case, the computer equipment adapted to manage the message may perform the service associated with the message. For example, the computer equipment may buy tickets to a gig or control home electronic services. Then, the computer equipment adapted to manage the message may send information about this service done to the computer equipment adapted to send the message. In yet some other examples, a system of recognition and confirmation of data transmission may be described. This system may be able to send, from the computer equipment adapted to manage the message, a message of reception's acknowledgment to the computer equipment adapted to send the message. The operation can be described as follows: once the message (m) is located at the computer equipment to manage the message, it may be emitted a confirmation signal to the computer equipment adapted to send the message, for example, the message's checksum present in the package's footer 22. The checksum can be a hash function. The main purpose of the hash function may be to detect accidental changes in a sequence of data to protect the integrity of said data. The hash function may verify that there is no discrepancy between the values obtained by making an initial check and final check after the transmission. In this way, the data may be transmitted with its hash value. The computer equipment adapted to manage the message can calculate this value and can compare it with the hash value received. If a discrepancy between these values is detected, the computer equipment adapted to manage message data 2 may reject said data. Alternatively, the computer equipment adapted to manage message data 2 may ask for a retransmission. Going back to the example, a user may enter by, for example, a keyboard, the text message "hello" in the computer equipment adapted to send the message e.g. a mobile phone.

The message "hello" may be translated into hexadecimal characters. It may correspond to "68656C6C6F". In addition, the identifier (RID) of the final receiver of the message (for example by the user phonebook) may be obtained. Moreover, the footer 22 may correspond to the checksum, for example E5. The header 20 may comprise the identifier (RID) of the final recipient of the message e.g. 3, the message length e.g. 10, and the message ID e.g. 1 . In this way, the packed message (p) "103168656C6C6FE5 can be obtained.

Each of the packed message symbols may correspond to a phone number according to the coding table of the figure 3. That is,

1 +3412340001

0 +3412340000

3 +3412340003

1 +3412340001

6 ^+3412340006

8 ^+3412340008

6 ^+3412340006

5 ^+3412340005

6 ^+3412340006

C ^+3412340012

6 ^+3412340006

C ^+3412340012

6 ^+3412340006

F ^+3412340015

E ^+3412340014

5 ^+3412340005

This way, the computer equipment adapted to send the message may perform a missed call to each telephone number (telephone number). Moreover, the computer equipment adapted to manage the message, that as previously commented in figure 1 is configured to manage said numbers, receives each of the missed calls.

Therefore, the computer equipment adapted to manage the message obtains a list of phone numbers, wherein each of the phone numbers corresponds to a missed call and, wherein the missed call is performed by the computer equipment adapted to send the message 1 .

Then, based on the list of phone numbers, the computer equipment adapted to manage 2 the message encodes the message based on the table shown in Figure 3, each phone number associated with your code, thus the message "103168656C6C6FE5" is obtained.

Then, the message "103168656C6C6FE5" may be unpacked and, therefore, the message (m) "hello" is obtained in the computer equipment adapted to manage the message. This message is obtained free of charge. Furthermore, as previously discussed, the packed message (p) (more particularly, its header 20) may include the identifier (RID) of the final receiver of the message (m). Thus, during unpacking, it is possible to obtain said identifier (RID). The identifier may be, for example, a phone number of the ultimate recipient of the message (m).

If the computer equipment adapted to manage the message 2 is not the final recipient of the message (m), it may be necessary for said first computer to send the message to a computer equipment adapted to receive the message 8 (the final recipient of the message (m)) via a global communications network 80 e.g. a telephone network or the Internet (for example in the case of VoIP). This configuration is shown in Figure 7. In this situation, the telephone system included in the computer equipment adapted to manage the message 2 may also be configured to emit missed calls from the phone numbers managed by the own computer equipment adapted to manage the message.

Furthermore, the coding table can also be used for sending messages (m) from the computer equipment adapted to manage the message 2 to computer equipment adapted to receive the message. 8

As previously shown in figure 8, in block 601 , since the message (m) is in the computer equipment adapted to manage the message, the message (m) can be packed as previously discussed in figure 2, but with the peculiarity of replacing the identifier (RID) of the final receiver of the message (m) by the identifier (SID) of the sender (which has initially been generated from the computer equipment adapted to send the message 1 ). This way, a packed message (p ') may be obtained. Thus, the computer equipment adapted to receive the message 8, once the message is unpacked, may know the sender of the message (m).

As previously discussed, the message (m) may be compressed prior to be packed. The compression may be performed using data compression algorithms such as LZW or GNU zip. Alternatively, the compression may be accomplished using an encoder dictionary. The encoder dictionary can operate searching for matches between characters forming the message (m) and the plurality of characters which can be contained in a table. This way, the plurality of characters can be replaced, thus the number of characters of the message (m) can be minimized. In addition, the message (m) or the compressed message (m) may be encrypted. Thus, the encrypted message (m) or the compressed and encrypted message (m) can become illegible. Said message can only be read using a key. Therefore, the security of the information transmission may be increased. The message (m) may be first compressed and then encrypted although some other alternatives are possible, for example, the message (m) may be first encrypted and then compressed, the message (m) can only be encrypted or the message (m) can only be compressed.

Furthermore, the packed message can be further compressed in the same way as described above for the message (m).

Additionally, the packed message (p) or the packed and compressed message (p) can be also encrypted.

In block 602, the packed message (p ') may be encoded from the coding table of figure 3, so that a telephone number is obtained for each of the packed message symbols

Subsequently, in accordance with block 603, after the identifier (RID) of the final receiver of the message (m) is obtained, the computer equipment adapted to manage the message 2 may cause the phone system 2a to perform missed calls from the telephone numbers managed by said phone system, wherein the telephone numbers correspond to the symbols of the packed message (p '). The missed call may be performed to the telephone number (associated with the computer equipment adapted to receive the message 8) that corresponds to this identifier (RID) of the final receiver of the message (m).

This way, the computer equipment adapted to receive the message 8 can receive (block 701 of Figure 9) all the information regarding the missed calls. Additionally, using the coding table shown in Figure 3, the packed message

(ρ') can be obtained (clock 702). It has to be noted that packed message (p ') may have been compressed or encrypted, or a combination of both. Therefore, before you can obtain the message (m), it may be needed to overcome the necessary encryption and / or compression actions.

Finally, the computer equipment adapted to receive the message 8 may be able to unpack the packed message (p ') e.g. as described in Figure 6. This way, the message (m) and the identifier (SID) of the sender (m), wherein the identifier is comprised within the packed message (p ') as discussed above, may be obtained. Therefore, the message (m) sent by the computer equipment adapted to manage the message (which has been previously generated in the computer equipment adapted to send the message 1 ) can be obtained in the computer equipment adapted to receive message 8. The message can be obtained without any associated cost.

In the particular example regarding figures 8 and 9, the text message "hello" corresponding to the message (m) may be in the computer equipment adapted to manage the message. The message "hello" can be translated into hexadecimal, corresponding to the characters "68656C6C6F". In addition, the footer 22 of the package may be a checksum, for example E5. The header 20 may comprise the identifier (RID) of final recipient of the message e.g. 3, the message e.g. 10, and the message identifier e.g. 1 . In this way, the packed message (ρ') "103168656C6C6FE5" can be obtained.

Each of the symbols of the packed message may correspond to a phone number according to the coding table of the figure 3.

1 ^+3412340001

0 ^+3412340000 3 ^+3412340003

1 ^+3412340001

6 ^+3412340006

8 ^+3412340008

6 -^+3412340006

5 ^+3412340005

6 ^+3412340006

C ^+3412340012

6 ^+3412340006

C ^+3412340012

6 ^+3412340006

F ^+3412340015

E ^+3412340014

5 ^+3412340005

Then, the computer equipment adapted to manage message 2 may perform a missed call to the number associated with the identifier (RID) of the final receiver of the message. The missed call may be performed from each of the phone numbers (telephone number) obtained.

Following the example, the computer equipment adapted to receive the message, will have a list of phone numbers, wherein each of the phone numbers corresponds to a missed call performed by the computer equipment adapted to manage the message. Then, the computer equipment adapted to receive the message encodes each phone number, thus the message

"103168656C6C6FE5" is obtained.

The message "103168656C6C6FE5" can be then be unpacked and, therefore, the message (m) "hello" (generated by the computer equipment adapted to send the message 1 ) can be obtained in the computer equipment adapted to receive the message. The message is obtained without any associated cost.

Moreover, once the computer equipment adapted to receive the message receives the message, the computer equipment adapted to manage the message may send a signal of confirmation of the reception of the message to the computer equipment adapted to emit the message. This confirmation signal may be, for example, the message's checksum. The message's checksum may confirm that the message (m) is processed properly in the computer equipment adapted to receive the message.

Although only a number of examples have been disclosed herein, other alternatives, modifications, uses and/or equivalents thereof are possible. Furthermore, all possible combinations of the described examples are also covered. Thus, the scope of the present disclosure should not be limited by particular examples, but should be determined only by a fair reading of the claims that follow.