Methods, systems, and products for providing communications services by incorporating a subcontracted result of a subcontracted processing service into a service requested by a client device

Information

  • Patent Grant
  • 10230658
  • Patent Number
    10,230,658
  • Date Filed
    Tuesday, December 8, 2015
    9 years ago
  • Date Issued
    Tuesday, March 12, 2019
    5 years ago
Abstract
Service providers may subcontract some services to subcontractors. Electronic packets of data may be outsourced for a subcontracted processing service provided by a server or other element. A result of the subcontracted processing service may then be received and incorporated.
Description
NOTICE OF COPYRIGHT PROTECTION

A portion of the disclosure of this patent document and its figures contain material subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, but otherwise reserves all copyrights whatsoever.


BACKGROUND

1. Field


This invention generally relates to computers and to communications and, more particularly, to processing data in a communications network.


2. Description of the Related Art


Manipulation of electronic data is important in computer networking and in communications. Often times electronic data must be manipulated for presentation at a client communications device. That is, the electronic data must be changed, formatted, or altered to suit the display characteristics, processing abilities, and/or storage capabilities of the client communications device. A handheld personal data assistant, for example, often requires that bandwidth-intensive electronic data, such as on-demand video, be scaled, color corrected, and/or otherwise manipulated for optimum presentation on the small display of the handheld personal data assistant. Heretofore, however, manipulation of electronic data was usually the responsibility of the client communications device—that is, the client communications device stores and utilizes one or more computer programs to manipulate incoming electronic data for presentation on the client communications device.


Locally manipulating electronic data, however, poses problems. As the electronic data is received, the client communications device must store the electronic data, process/manipulate the electronic data, and present the manipulated electronic data to the user. This process of storing, manipulating, and/or presenting the electronic data, however, often taxes the limited processing and storage capabilities of the client communications device. As both those skilled and unskilled recognize, when the processing and/or storage capabilities of the client communications device are overwhelmed, the audio/video presentation may “stumble” and degrade the user experience. Sometimes the client communications device even experiences a fault or failure when the processing and/or storage capabilities are overwhelmed. There is, accordingly, a need in the art for methods and systems of manipulating electronic data that reduce the need for locally-stored computer programs and that reduce the need for local processing requirements.


BRIEF SUMMARY OF THE INVENTION

The aforementioned problems, and other problems, are reduced by a Analysis Module. This Analysis Module comprises methods, computer systems, computer programs, and computer program products that provide communications services to subscribers. Each time a subscriber requests communications service, the Analysis Module on-demand, dynamically, and in real-time, assesses the subscriber's communications needs and the real-time state of one or more communications networks. The Analysis Module then ascertains the best or preferred scenario for providing that communications service. The subscriber might even have a Service Level Agreement, so this invention ascertains how to utilize the available network routing and bandwidth to satisfy the Service Level Agreement. This invention ascertains the best or preferred scenario for segmentation of data, how that segmented data should be processed, and how the segmented and processed data should be reassembled, again according to the subscriber's Service Level Agreement.


This invention discloses methods, systems, and products for providing communications services. One of the embodiments describes a method for providing communications services. This method receives a request for electronic data, and the request for electronic data originating from a client communications device. The availability of network routing is assessed in real-time to fulfill the request. The availability of network bandwidth is assessed in real-time to fulfill the request. A preferred scenario of segmentation, dispersion, and assemblage of electronic data is ascertained to fulfill the request. Electronic data fulfilling the request is communicated to the client communications device, with the electronic data formatted according to the preferred scenario


Other embodiments of this invention describes another method for providing communications services. Here a first data stream is received at a computer, and the first data stream includes packets of data packetized according to a packet protocol. The first data stream is segmented into segments according to a Service Level Agreement. The Service Level Agreement being an agreement defining parameters for communications service for the subscriber. At least one segment is dispersed via a network for a subsequent processing service. A result of the processing service is received. A second data stream is assembled, and the second data stream includes at least one of i) the result of the processing service and ii) another segment. The second data stream is then communicated via the network.


Other embodiments of this invention describe a system for providing communications services. The system includes a Analysis Module stored in a memory device, and a processor communicates with the memory device. The Analysis Module receives a first data stream at a computer, and the first data stream comprises packets of data packetized according to a packet protocol. The Analysis Module segments the first data stream into segments according to a Service Level Agreement. The Service Level Agreement being an agreement defining parameters for communications service for the subscriber. The Analysis Module disperses at least one segment via a network for a subsequent processing service, and the Analysis Module receives a result of the processing service. The Analysis Module assembles a second data stream, and the second data stream includes at least one of i) the result of the processing service and ii) another segment. The Analysis Module then communicates the second data stream via the network.


Other embodiments of this invention describe a computer program product. A computer-readable medium stores a Analysis Module. The Analysis Module receives a first data stream at a computer, and the first data stream includes packets of data packetized according to a packet protocol. The Analysis Module segments the first data stream into segments according to a Service Level Agreement. The Service Level Agreement being an agreement defining parameters for communications service for the subscriber. The Analysis Module disperses at least one segment via a network for a subsequent processing service, and the Analysis Module receives a result of the processing service. The Analysis Module then assembles a second data stream comprising at least one of i) the result of the processing service and ii) another segment, and the Analysis Module communicates the second data stream via the network.


Other systems, methods, and/or computer program products according to embodiments will be or become apparent to one with skill in the art upon review of the following drawings and detailed description. It is intended that all such additional systems, methods, and/or computer program products be included within this description, be within the scope of the present invention, and be protected by the accompanying claims.





BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

These and other features, aspects, and advantages of the embodiments of the present invention are better understood when the following Detailed Description of the Invention is read with reference to the accompanying drawings, wherein:



FIG. 1 is a schematic illustrating a Analysis Module operating within an intelligently-controlled communications network, according to one of the embodiments of this invention;



FIGS. 2 and 3 are schematics illustrating the Analysis Module on-demand, dynamically, and in real-time assessing an availability of routing and bandwidth within the communications network, according to more embodiments of this invention;



FIG. 4 is a schematic illustrating ascertainment of a preferred scenario of segmentation, dispersion, and assemblage of electronic data, according to still more embodiments of this invention;



FIG. 5 is a schematic illustrating fulfillment of formatted data according to the preferred scenario determined in FIG. 4;



FIGS. 6-10 are schematics illustrating the Analysis Module accessing a Service Level Agreement according to another of the embodiments of this invention;



FIG. 11 is a schematic illustrating one or more assertions that indicate the requirements of the Service Level Agreement were satisfied according to more embodiments of this invention; and



FIGS. 12-14 are flowcharts illustrating methods of providing communications services according to still more embodiments of this invention.





DETAILED DESCRIPTION OF THE INVENTION

This invention now will be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. These embodiments are provided so that this disclosure will be thorough and complete and will fully convey the scope of the invention to those of ordinary skill in the art. Moreover, all statements herein reciting embodiments of the invention, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future (i.e., any elements developed that perform the same function, regardless of structure).


Thus, for example, it will be appreciated by those of ordinary skill in the art that the diagrams, schematics, illustrations, and the like represent conceptual views or processes illustrating systems and methods embodying this invention. The functions of the various elements shown in the figures may be provided through the use of dedicated hardware as well as hardware capable of executing associated software. Similarly, any switches shown in the figures are conceptual only. Their function may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the entity implementing this invention. Those of ordinary skill in the art further understand that the exemplary hardware, software, processes, methods, and/or operating systems described herein are for illustrative purposes and, thus, are not intended to be limited to any particular named manufacturer.



FIGS. 1-4 are schematics illustrating one of the embodiments of this invention. FIG. 1 shows a Analysis Module 20 operating within an intelligently-controlled communications network 22. This communications network 22 represents just one of the possible operating environments for the Analysis Module 20. The Analysis Module 20 comprises methods, computer systems, computer programs, and computer program products that provide communications services to subscribers. Each time a subscriber requests communications service, the Analysis Module 20 dynamically, and in real-time, assesses the subscriber's communications needs and the real-time state of the communications network 22. The Analysis Module 20 then determines the best or preferred scenario for providing that requested communications service. If the subscriber has a Service Level Agreement, the Analysis Module 20 determines how to utilize the available network routing/bandwidth to satisfy the Service Level Agreement. As this patent will explain, the Analysis Module 20 assesses the highest quality scenario, the most reliable scenario, the most efficient scenario, the most profitable scenario, or, in general terms, the “preferred scenario” for providing the subscriber's requested communications service that also satisfies the Service Level Agreement.



FIG. 1 shows the Analysis Module 20 operating within the communications network 22. The communications network 22 represents just one of the possible operating environments for the Analysis Module 20. The communications network 22 is a generic term describing any of the Public Switched Telephone Network 26, a data network 30 (e.g., a local area network, a wide area network, and/or a distributed computing network such as the “Internet”), a cellular network (GSM, CDMA, TDMA, and/or an interoperating network), an I.E.E.E. 802 wireless network, an RF wireless network, an ISM wireless network, an IR wireless network, and another wireless network using another portion of the electromagnetic spectrum. The I.E.E.E. 802 wireless network utilizes any of the I.E.E.E 802 family of wireless technology standards. The RF wireless network uses the radio frequency (RF) portion of the electromagnetic spectrum, the ISM wireless network uses the Industrial, Scientific, and Medical (ISM) band of the electromagnetic spectrum, the IR wireless network uses the infrared (IR) portion of the electromagnetic spectrum, and the another wireless network utilizes any other portion/frequency within the electromagnetic spectrum. The communications network 22 includes a communications switch 24 of a Public Switched Telephone Network 26. The communications switch 24 interfaces with an application server 28. The Analysis Module 20 is stored within the memory of the application server 28. The application server 28 controls many features of the communications switch 24. The application server 28, for example, may include Advanced Intelligent Network (AIN) componentry (not shown for simplicity). The application server 28 additionally or alternatively may include and/or voice service protocols, triggers, and/or operations for a “softswitch” packet-network architecture. The communications switch 24 and the application server 28 interface with the Public Switched Telephone Network 26 and the data network 30. Because the application server 28 communicates with Public Switched Telephone Network 26 and the data network 30, the Analysis Module 20 receives data via either network 26, 30. The signaling between the communications switch 24, the Public Switched Telephone Network 26, the application server 28, and the data network 30, however, is well understood in the art and will not be further described. If a reader desires a more detailed explanation, the reader is directed to U.S. Pat. No. 5,430,719 issued to Weisser (Jul. 4, 1995), with the “Summary of the Invention” and the “Detailed Description of the Preferred Embodiment” sections incorporated herein by reference. The reader is also directed to U.S. Pat. No. 5,917,817 issued to Dunn et al. (Jun. 29, 1999), with the “Summary of the Invention” and the “Detailed Description” sections incorporated herein by reference.



FIG. 1 also shows the Analysis Module 20 receiving a request 32 for data. The term “data” includes electronic information, such as, for example, facsimile, electronic mail (e-mail), text, video, audio, and/or voice in a variety of formats, such as dual tone multi-frequency, digital, analog, and/or others. Additionally, the data may include: (1) executable programs, such as a software application, (2) an address, location, and/or other identifier of the storage location for the data, (3) integrated or otherwise combined files, and/or (4) profiles associated with configuration, authenticity, security, and others. The request 32 for data originates from a client communications device 34. The client communications device 34 may include any computer/communications device utilizing a microprocessor and/or a digital signal processor. The client communications device 34 may include, for example, a computer (laptop, desktop, tablet, server, and other computer systems), a personal digital assistant (PDA), a Global Positioning System (GPS) device, an interactive television, an Internet Protocol (IP) phone, a pager, and/or a cellular/satellite phone. The client communications device 34 may issue the request 32 for data using the communications switch 24, the Public Switched Telephone Network 26, the application server 28, and/or the data network 30. The request 32 for data is communicated via the communications network 22 (e.g., the communications switch 24, the Public Switched Telephone Network 26, and/or the data network 30) to the Analysis Module 20 operating within the application server 28.


The embodiments of this invention continue with FIG. 2. When the application server 28 receives the request for data (shown as reference numeral 32 in FIG. 1), the Analysis Module 20 analyzes the request for data and determines what data is requested. The Analysis Module 20 then dynamically, and in real-time, assesses an availability of routing within the communications network 22 to fulfill the request for data. The Analysis Module 20 also dynamically, and in real-time, assesses an availability of bandwidth to fulfill the request for data. That is, each time the client communications device (shown as reference numeral 34 in FIG. 1) requests data, the Analysis Module 20 “on demand” determines the available routing and bandwidth. Because computer/servers and network routes have varying packet capacities, and because some computers/servers experience more congestion than others, the Analysis Module 20 tries to determine the best or preferred scenario for fulfilling the request for data.



FIG. 2 shows various commands, queries, tactics, and instructions for assessing the availability of routing and bandwidth. The Analysis Module 20, for example, may “ping” various computer devices communicating with the application server 28. That is, the Analysis Module 20 sends an addressable “ping” packet 36 to other computer devices communicating with the application server 28. The Analysis Module 20 then measures the elapsed travel time for the “ping” packet 36 to return to the application server 28. The Analysis Module 20 uses the elapsed travel time to determine response times, network congestion, and/or bandwidth. Although FIG. 2 shows the Analysis Module 20 utilizing the “ping” packet 36 via the Public Switched Telephone Network 26, the Analysis Module 20 may also utilize the data network 30 to communicate the “ping” packet 36. The Analysis Module 20 may also issue one or more interrogations 38. Each interrogation 38 is addressed to a particular computer device, and each interrogation asks the particular computer device to assess its activity level. The Analysis Module 20 would then receive an interrogation response 40, and the Analysis Module 20 uses the interrogation response 40 to determine response times, network congestion, and/or bandwidth. Although FIG. 2 also shows the Analysis Module 20 utilizing the interrogation 38 via the data network 30, the Analysis Module 20 may also utilize the Public Switched Telephone Network 26 to communicate the interrogation 38.



FIG. 3 shows more commands, queries, tactics, and instructions for assessing the availability of routing and bandwidth. The Analysis Module 20 may utilize UNIX/LINUX “trace” commands 42 or tracing features to monitor packet activity within a computer device communicating with the application server 28. The Analysis Module 20 may also utilize administrative (“Admin”) commands 44, instruction commands 46, and/or other UNIX/LINUX commands 48 to assess activity within a computer device, within a network path within the communications network 22, and/or within a series of paths within the communications network 22. Although FIG. 3 shows the Analysis Module 20 utilizing either the Public Switched Telephone Network 26 or the data network 30 to communicate the “trace” command 42, the administrative command 44, the instruction command 46, and/or the other UNIX/LINUX command 48, those of ordinary skill in the art understands that the Analysis Module 20m may use one, or both, networks to communicate each command. FIG. 3 also shows the Analysis Module 20 utilizing a software routine 50 to help assess the availability of routing and bandwidth. The software routine 50 autonomously monitors activity within specified path(s), regions, computer devices, and/or the entire communications network 22. The Analysis Module 20 may also utilize allocation tables and/or routines 52 to help assess the availability of routing and bandwidth. These allocation tables and/or routines 52 would contain relationships, preferences, and/or designations for various network routing paths and/or various computer devices. The allocation tables and/or routines 52 would identify, or even mandate, circumstances when certain routings or certain computer devices are required. If, for example, a subscriber wishes to download a large video file, the allocation tables and/or routines 52 may require that a particular network routing, having capacity to communicate the large video file, be utilized. Although the software routine 50, and the allocation tables and/or routines 52, are shown operating as subroutines/subcomponents of the Analysis Module 20, those of ordinary skill in the art now recognize that each may be remotely installed on any computer device communicating with the application server 28.


Once the Analysis Module 20 assesses the communications network 22, the Analysis Module 20 then determines the best or preferred scenario for fulfilling the request for data. As FIG. 4 shows, the Analysis Module 20 analyzes the request 32 for data, determines what data is requested, and compares the requested data with the on demand, real-time availability of routing and bandwidth within the communications network 22. The Analysis Module 20 then ascertains a preferred scenario of segmentation, dispersion, and assemblage of electronic data to fulfill the request for data. That is, the Analysis Module 20 assesses the highest quality scenario, the most reliable scenario, the most efficient scenario, the most profitable scenario, or, in general terms, the “preferred scenario” for fulfilling the request for data. If, for example, the subscriber requires the highest-possible quality of presentation, the Analysis Module 20 selects a combination of segmentation, dispersion, and assemblage of segments that achieves the highest possible quality of presentation. If, however, the subscriber requires the lowest cost when receiving requested data, the Analysis Module 20 selects a combination of segmentation, dispersion, and assemblage of segments that achieves the lowest possible cost to the subscriber, perhaps despite a degraded quality of transmission (e.g., the subscriber might tolerate “lost” packets of data, delayed delivery of packets, and/or a lesser Quality of Presentation).


As FIG. 4 also shows, the Analysis Module 20 issues one or more reservations 52. Once the Analysis Module 20 assesses the preferred scenario of segmentation, dispersion, and assemblage, the Analysis Module 20 may then “reserve” routing paths and/or computer devices. The Analysis Module 20 issues one or more addressable reservations 52 to help ensure the preferred scenario is accomplished. Each reservation 52 instructs a networked computer device to anticipate, and perhaps only accept, packets of data destined for the reserved paths and/or computer devices. Each reservation 52 may instruct networked computer devices to anticipate, and perhaps only accept, packets having recognized header information and/or packet content. Each reservation 52 may also include a chronology component that specifies a “window” within which the reserved packets must be received, processed, and/or communicated. Packets arriving outside this window may not receive preferential access/routing and would be queued according to more conventional strategies (e.g., sequential, first in-first out, chronological). Because the Analysis Module 20 issues one or more of the addressable reservations 52, the Analysis Module 20 is able to reduce/avoid packet infighting for the “best” path.


Now that the preferred scenario is ascertained, FIG. 5 shows the fulfillment of the request. The Analysis Module 20 has analyzed the request for data (shown as reference numeral 32 in FIG. 1), determined what data is requested, and compared the requested data with the real-time availability of routing and bandwidth within the communications network 22. The Analysis Module 20 then ascertained a preferred scenario of segmentation, dispersion, and assemblage of electronic data to fulfill the request for data. The Analysis Module 20 now communicates to the client communications device 34 the electronic data 54 fulfilling the request. Because the electronic data 54 has been at least one of segmented, dispersed for subsequent processing, and then assembled as a data stream, the electronic data 54 has been formatted according to the preferred scenario.



FIGS. 6-10 are schematics illustrating another of the embodiments of this invention. FIG. 6 shows the Analysis Module 20 accessing a Service Level Agreement 56. The Service Level Agreement 56 is an agreement defining one or more parameters for the communications service(s) provided on behalf of the subscriber. The Service Level Agreement 56 may be an agreement by and between the subscriber and a communications service provider. The Service Level Agreement 56 defines how the subscriber wishes to receive electronic data, in what format that electronic data is delivered, when the electronic data is delivered, and to what device (or along what network path) that electronic data is delivered. The Service Level Agreement 56 might define pricing for various bandwidth needs, network utilization, delivery times, and processing charges. Because Service Level Agreements are, in general, known in the art, and because the content of the Service Level Agreement 56 may greatly vary, this patent will not further explain the Service Level Agreement 56.



FIGS. 6 and 7 also illustrate the Analysis Module 20 accessing the Service Level Agreement 56. FIG. 6 shows that an electronic version of the Service Level Agreement 56 may be stored/maintained in a database 58 of Service Level Agreements. The database 58 of Service Level Agreements stores multiple Service Level Agreements for multiple subscribers; each Service Level Agreement corresponds to at least one subscriber. While the database 58 of Service Level Agreements may be stored/maintained on any computer device communicating with the Public Switched Telephone Network 26 and/or the data network 30, FIG. 6 shows the database 58 of Service Level Agreements stored/maintained within memory of the application server 28. FIG. 7 illustrates that the Service Level Agreement 56 may be locally stored in memory on the client communications device 34. When the Analysis Module 20 accesses the Service Level Agreement 56, the Analysis Module 20 may initiate wired and/or wireless communication with the client communications device 34 via the Public Switched Telephone Network 26 and/or the data network 30.



FIG. 8 shows the Analysis Module 20 assessing the availability of routing and bandwidth. The Analysis Module 20 receives the request 32 for data from the client communications device 34. As this patent earlier explained, the Analysis Module 20 may utilize the “ping” packet 36, the interrogation 38, the UNIX/LINUX “trace” command 42, the administrative (“Admin”) command 44, the instruction command 46, and/or other UNIX/LINUX commands 48 to assess activity within a computer device, within a network path within the communications network 22, and/or within a series of paths within the communications network 22. The Analysis Module 20 may also utilize the software routine 50 and allocation tables and/or routines 52 to help assess the availability of routing and bandwidth.



FIG. 9 shows the Analysis Module 20 formatting data according to the Service Level Agreement 56. The Analysis Module 20 receives a first stream 60 of data via the Public Switched Telephone network 26 and/or via the data network 30. The first stream 60 of data typically includes individual packets 62 of information. The Analysis Module 20 acts upon the first stream 60 of data by segmenting the individual packets 62 into segments 64 according to the Service Level Agreement 56. Once a segment 64 is created, if the segment 64 requires subsequent processing, the Analysis Module 20 then disperses that segment 64 for a subsequent processing service. The Analysis Module 20 routes the segment 64 to other devices and/or locations via the Public Switched Telephone network 26 and/or via the data network 30, and the subsequent processing service is performed. If the Service Level Agreement 56 specifies how the segment 64 should be dispersed, or where that segment 64 should be routed, the Analysis Module 20 routes the segment 64 according to the Service Level Agreement 56.


As FIG. 10 shows, the Analysis Module 20 receives the results 66 of the subsequent processing services. When the subsequent processing service is complete, the Analysis Module 20 aggregates the result(s) 66 of the subsequent processing service(s). The Analysis Module 20 may also access the Service Level Agreement 56 to determine how the subscriber wants the results 66 assembled, formatted, and/or communicated. The Analysis Module 20 then assembles those results 66, and any unprocessed segments 64, into a second data stream 68. As FIG. 10 shows, the second data stream 68 is typically communicated via the Public Switched Telephone network 26 and/or via the data network 30 to another destination. That is, the second data stream 68 may be communicated to another computer device, and/or the second data stream 68 may be communicated to a client communications device (not shown for simplicity). The client communications device may then view/execute/present the second data stream 68. Because the Analysis Module 20 consulted the Service Level Agreement 56, the second data stream 68 has been substantially formatted, assembled, and communicated to the requirements/desires of the subscriber. That is, the second data stream 68 has been segmented, dispersed, formatted, transformed, encrypted, scaled, compressed, manipulated, assembled, and/or communicated to suit the subscriber's needs, as specified in the Service Level Agreement 56.



FIG. 11 is a schematic illustrating still more embodiments of this invention. FIG. 11 shows one or more assertions 70. These assertions 70 indicate that the requirements of the Service Level Agreement 56 were satisfied. When the Analysis Module 20 segments, disperses, and assembles data, each assertion 70 confirms that the segmentation, dispersion, and assemblage were performed according to the requirements of the Service Level Agreement 56. The assertions 70 may be sent and received amongst “tier one” service providers and lesser tiered service providers. A first tier service provider, for example, may subcontract some aspect of subsequently processing the segment (shown as reference numeral 64 in FIG. 9). When the subcontractor correctly processed the segment according to the requirements of the Service Level Agreement 56, the first tier service provider would then issue the assertion 70. The subcontractor could then utilize the assertion 70 in advertising, in marketing, and in other efforts to show their commitment to service, performance, and customer requirements.



FIG. 11 also shows a certified assertion 72. The certified assertion 72 still confirms that the requirements of the Service Level Agreement 56 were satisfied. The certified assertion 72, however, is encrypted, digitally “watermarked,” keyed, or otherwise secured to reduce the incidence of fraudulent assertions. Because the concept of assertions may be important to winning, and maintaining, service contracts, some service providers will inevitably attempt to copy, imitate, or even forge assertions. The certified assertion 72, then, would include security capabilities to reduce, or even prevent, the instances of copied, imitated, or, in general, “forged” assertions. The certified assertion 72 could even be used to confirm the identity of the subscriber and the subscriber's ability to pay (e.g., account balance, payment history, accumulation of assertions).



FIG. 11 also shows a subscriber assertion 74. The subscriber assertion 74 is communicated from the client communications device. The subscriber assertion 74 again confirms that the requirements of the Service Level Agreement 56 were satisfied. Here, however, the subscriber assertion 74 is provided by the subscriber. The subscriber assertion 74 acts as “feedback” from the subscriber and, again, may be used in advertising, in marketing, and in other efforts to show a commitment to service, performance, and customer requirements. As many subscribers provide more and more subscriber assertions 74, the volume of subscriber assertions 74 acts as an indication of trust. The more subscriber assertions 74 a service provider acquires, the more “trusted” is the service provider to satisfy whatever a subscriber's Service Level Agreement may require.


The subscriber may be required to provide the subscriber assertion 74. Because the subscriber assertion 74 may act as “feedback,” and thus may be very useful for advertising and marketing efforts, a service provider may require that all subscribers provide the subscriber assertion 74. If the service provider satisfies the subscriber's Service Level Agreement, the subscriber is required to communicate the subscriber assertion 74. The subscriber may be required to communicate the subscriber assertion 74 to the tier one service provider. The subscriber may also be required to communicate the subscriber assertion 74 to each lesser-tiered service provider. A service provider may even deny service for any subscriber or user that will not provide the subscriber assertion 74. Because the subscriber assertion 74 may even be used to confirm the identity of the subscriber and the subscriber's ability to pay, the service provider may further deny service for any subscriber not providing the subscriber assertion 74. The service provider may refuse to provide service when the service provider cannot confirm the identity of the requester and/or an ability to pay.



FIG. 12 is a flowchart illustrating a method of providing communications services. A request for data is received (Block 76), and the request for data originates from a client communications device. The real-time availability of network routing is assessed to fulfill the request (Block 78). The real-time availability of network bandwidth is also assessed to fulfill the request (Block 80). A preferred scenario of segmentation, dispersion, and assemblage of electronic data is ascertained to fulfill the request (Block 82). A routing identified in the preferred scenario is reserved (Block 84). Electronic data fulfilling the request is then communicated to the client communications device (Block 86), and the electronic data is formatted according to the preferred scenario.



FIG. 13 is a flowchart illustrating another method of providing communications services. A request for electronic data is received (Block 88). The request originates from a client communications device. A query is communicated via a network for a first data stream (Block 90). The first data stream is received at a computer, and the first data stream includes packets of data packetized according to a packet protocol (Block 92). The on-demand, real-time availability of network routing is assessed (Block 94), and the on-demand, real-time availability of network bandwidth is also assessed (Block 96). A preferred scenario of segmentation, dispersion, and assemblage of electronic data is ascertained according to the Service Level Agreement (Block 98). A routing identified in the preferred scenario is reserved (Block 100). The first data stream is then segmented into segments according to the Service Level Agreement (SLA) (Block 102). The Service Level Agreement is an agreement defining parameters for communications service for the subscriber. At least one segment is dispersed via the network for a subsequent processing service, perhaps according to the Service Level Agreement (Block 104).


The flowchart continues with FIG. 14. A result of the processing service is received (Block 106) and assembled as a second data stream, perhaps according to the Service Level Agreement (Block 108). The second data stream includes at least one of i) the result of the processing service and ii) another segment. The second data stream is then communicated via the network (Block 110) to a client communications device, perhaps according to the Service Level Agreement. An assertion may be provided to a communications service provider, and the assertion indicates that the Service Level Agreement was satisfied (Block 112). The assertion may be certified to reduce the incidence of fraudulent assertions (Block 114). The subscriber may also provide the assertion (Block 116).


The Analysis Module (shown as reference numeral 20 in FIGS. 1-11) may be physically embodied on or in a transitory or non-transitory computer-readable medium. This computer-readable medium may include CD-ROM, DVD, tape, cassette, floppy disk, memory card, and large-capacity disk (such as IOMEGA®, ZIP®, JAZZ®, and other large-capacity memory products (IOMEGA®, ZIP®, and JAZZ® are registered trademarks of Iomega Corporation, 1821 W. Iomega Way, Roy, Utah 84067, 801.332.1000, www.iomega.com). This computer-readable medium, or media, could be distributed to end-users, licensees, and assignees. These types of computer-readable media, and other types not mention here but considered within the scope of the present invention, allow the Analysis Module to be easily disseminated. A computer program product for providing communications services includes the Analysis Module stored on the computer-readable medium. The Analysis Module segments a first data stream into segments according to a Service Level Agreement. The Analysis Module disperses at least one segment via a network for a subsequent processing service, and the Analysis Module receives a result of the processing service. The Analysis Module assembles a second data stream, and the second data stream includes at least one of i) the result of the processing service and ii) another segment. The Analysis Module then communicates the second data stream via the network.


The Analysis Module may also be physically embodied on or in any addressable (e.g., HTTP, I.E.E.E. 802.11, Wireless Application Protocol (WAP)) wireless device capable of presenting an IP address. Examples could include a computer, a wireless personal digital assistant (PDA), an Internet Protocol mobile phone, or a wireless pager.


While the present invention has been described with respect to various features, aspects, and embodiments, those skilled and unskilled in the art will recognize the invention is not so limited. Other variations, modifications, and alternative embodiments may be made without departing from the spirit and scope of the present invention

Claims
  • 1. A system, comprising: a hardware processor; anda memory device, the memory device storing code, the code when executed causing the hardware processor to perform operations, the operations comprising:receiving electronic packets of data sent via the Internet from a client device, the client device requesting a service associated with a service provider;determining that at least a portion of the service requested by the client device utilizes a subcontracted processing service provided by a different service provider;determining individual packets of the electronic packets of data associated with the subcontracted processing service provided by the different service provider;creating a segment comprising the individual packets associated with the subcontracted processing service provided by the different service provider;subcontracting the segment via the Internet to a server associated with the different service provider to receive the subcontracted processing service;receiving a subcontracted result via the Internet of the subcontracted processing service; andincorporating the subcontracted result of the subcontracted processing service into the service requested by the client device.
  • 2. The system of claim 1, wherein the operations further comprise sending the subcontracted result of the subcontracted processing service to the client device.
  • 3. The system of claim 1, wherein the operations further comprise assembling the subcontracted result of the subcontracted processing service into the service associated with the service provider.
  • 4. The system of claim 1, wherein the operations further comprise reserving a routing path in a network for the segment subcontracted to the different service provider.
  • 5. The system of claim 1, wherein the operations further comprise reserving a routing path in a network to the different service provider.
  • 6. A method, comprising: receiving, at a server, an electronic request sent via the Internet from a client device requesting a service provided by a service provider;determining, by the server, at least a portion of the service requested by the client device is associated with a subcontracted processing service provided by a subcontractor service provider;identifying, by the server, a stream of data associated with the service provided by the service provider;determining, by the server, individual packets in the stream of data that require the subcontracted processing service provided by the different service provider;retrieving, by the server, an Internet protocol address associated with the subcontracted processing service provided by the different service provider;sending, by the server, the individual packets via the Internet to a subcontractor server associated with the Internet protocol address to receive the subcontracted processing service provided by the different service provider;receiving, by the server, a subcontracted result via the Internet of the subcontracted processing service provided by the different service provider; andincorporating, by the server, the subcontracted result of the subcontracted processing service into the service requested by the client device.
  • 7. The method of claim 6, further comprising sending the subcontracted result of the subcontracted processing service to the client device.
  • 8. The method of claim 6, further comprising assembling the subcontracted result of the subcontracted processing service into the service associated with the service provider.
  • 9. The method of claim 6, further comprising reserving a routing path for the individual packets sent to the subcontractor server associated with the server address.
  • 10. The method of claim 6, further comprising reserving a routing path in a network to the subcontractor server associated with the Internet protocol address.
  • 11. A memory device storing instructions that, when executed by a hardware processor, cause the hardware processor to perform operations, the operations comprising: receiving an electronic request sent via the Internet from a client device, the client device requesting a service associated with a service provider;retrieving a stream of data to fulfill the electronic request for the service;determining that at least a portion of the service requested by the client device is associated with a subcontracted processing service provided by a different service provider;creating a segment comprising packets of data in the stream of data that require the subcontracted processing service provided by the different service provider;retrieving an Internet protocol address associated with a subcontractor server that is associated with the subcontracted processing service provided by the different service provider; andsending the segment via the Internet to the subcontractor server associated with the Internet protocol address to receive the subcontracted processing service provided by the different service provider.
  • 12. The memory device of claim 11, wherein the operations further comprise receiving a result of the subcontracted processing service provided by the different service provider.
  • 13. The memory device of claim 12, wherein the operations further comprise sending the result of the subcontracted processing service to the client device.
  • 14. The memory device of claim 12, wherein the operations further comprise incorporating the result of the subcontracted processing service into the service associated with the service provider.
  • 15. The memory device of claim 12, wherein the operations further comprise assembling the result of the subcontracted processing service into the service associated with the service provider.
  • 16. The memory device of claim 11, wherein the operations further comprise reserving a routing path for the segment sent to the subcontractor server associated with the different service provider.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No. 13/015,772 filed Jan. 28, 2011 and since issued as U.S. Pat. No. 9,240,901, which is a continuation of U.S. application Ser. No. 12/357,553 filed Jan. 22, 2009 and since issued as U.S. Pat. No. 7,904,509, which is a continuation of U.S. application Ser. No. 10/720,800 filed Nov. 24, 2003 and since issued as U.S. Pat. No. 7,509,373, with all applications incorporated herein by reference in their entireties.

US Referenced Citations (218)
Number Name Date Kind
5214778 Glider May 1993 A
5361347 Glider Nov 1994 A
5513306 Mills et al. Apr 1996 A
5581479 McLaughlin Dec 1996 A
5604682 McLaughlin Feb 1997 A
5636139 McLaughlin Jun 1997 A
5745754 Lagarde Apr 1998 A
5752186 Malackowski et al. May 1998 A
5771282 Friedes Jun 1998 A
5790176 Craig Aug 1998 A
5862471 Tiedemann et al. Jan 1999 A
5867652 Hurvig Feb 1999 A
5928330 Goetz et al. Jul 1999 A
5941988 Bhagwat et al. Aug 1999 A
5970121 Homayoun Oct 1999 A
5978780 Watson Nov 1999 A
6002689 Christie Dec 1999 A
6016307 Kaplan et al. Jan 2000 A
6018359 Kermode et al. Jan 2000 A
6021464 Yao et al. Feb 2000 A
6032190 Bremer et al. Feb 2000 A
6058301 Daniels May 2000 A
6098108 Sridhar et al. Aug 2000 A
6104718 Christie Aug 2000 A
6112243 Downs et al. Aug 2000 A
6167496 Fechner Dec 2000 A
6178170 Duree Jan 2001 B1
6209024 Armstrong Mar 2001 B1
6226291 Chauvel et al. May 2001 B1
6236642 Shaffer May 2001 B1
6246683 Connery et al. Jun 2001 B1
6249836 Downs et al. Jun 2001 B1
6263358 Lee et al. Jul 2001 B1
6272343 Pon et al. Aug 2001 B1
6278446 Liou et al. Aug 2001 B1
6282207 Lerman Aug 2001 B1
6285871 Daniels Sep 2001 B1
6363411 Dugan Mar 2002 B1
6374336 Peters et al. Apr 2002 B1
6385198 Ofek et al. May 2002 B1
6415373 Peters et al. Jul 2002 B1
6421714 Rai et al. Jul 2002 B1
6442518 Van Thong et al. Aug 2002 B1
6456594 Kaplan Sep 2002 B1
6480861 Kanevsky Nov 2002 B1
6487600 Lynch Nov 2002 B1
6516194 Hanson Feb 2003 B2
6519693 Debey Feb 2003 B1
6522883 Titmuss et al. Feb 2003 B2
6535592 Snelgrove Mar 2003 B1
6567375 Balachandran et al. May 2003 B2
6571016 Mehrotra et al. May 2003 B1
6606502 Chung Kam Chung et al. Aug 2003 B1
6621801 Wright et al. Sep 2003 B1
6640098 Roundtree Oct 2003 B1
6697806 Cook Feb 2004 B1
6710785 Asai et al. Mar 2004 B1
6728267 Giese et al. Apr 2004 B1
6738815 Willis et al. May 2004 B1
6760808 Peters et al. Jul 2004 B2
6772413 Kuznetsov Aug 2004 B2
6789126 Saulpaugh et al. Sep 2004 B1
6801938 Bookman Oct 2004 B1
6836465 Rajan et al. Dec 2004 B2
6836652 Arima et al. Dec 2004 B2
6856963 Hurwitz Feb 2005 B1
6917628 McKinnin et al. Jul 2005 B2
6934530 Engelhart Aug 2005 B2
6941553 Eisler Sep 2005 B2
6950847 Harrisville-Wolff et al. Sep 2005 B2
6957226 Attias Oct 2005 B2
6978308 Boden et al. Dec 2005 B2
6980555 Mar Dec 2005 B2
6999476 Lerman Feb 2006 B2
7043225 Patel et al. May 2006 B1
7043235 Meyer May 2006 B2
7065496 Subbloie et al. Jun 2006 B2
7075889 Shiozawa Jul 2006 B2
7155517 Koponen Dec 2006 B1
7184548 Wee et al. Feb 2007 B2
7191232 Rigori et al. Mar 2007 B2
7191241 Boucher et al. Mar 2007 B2
7249055 Elder Jul 2007 B1
7289489 Kung et al. Oct 2007 B1
7334039 Majkut et al. Feb 2008 B1
7343416 Hodges et al. Mar 2008 B2
7463648 Eppstein et al. Dec 2008 B1
7464165 Vo et al. Dec 2008 B2
7467219 Hodges et al. Dec 2008 B2
7509373 Hodges et al. Mar 2009 B2
7512630 Kling et al. Mar 2009 B2
7519657 Hodges et al. Apr 2009 B2
7577582 Ojha et al. Aug 2009 B1
7693741 Tischer et al. Apr 2010 B2
7818010 Matteo et al. Oct 2010 B2
7831693 Lai Nov 2010 B2
7861156 Wood Dec 2010 B2
7882257 Kerr Feb 2011 B2
7904509 Hodges et al. Mar 2011 B2
8266327 Kumar Sep 2012 B2
8429049 Smith Apr 2013 B2
8478957 Peters et al. Jul 2013 B2
8526298 Gan et al. Sep 2013 B2
8538843 Smith Sep 2013 B2
8606929 Hodges et al. Dec 2013 B2
8792555 Walker et al. Jul 2014 B2
8805919 Plotnick Aug 2014 B1
8843632 Mercuri Sep 2014 B2
9129193 Wood Sep 2015 B2
20010014210 Kang Aug 2001 A1
20010029544 Cousins Oct 2001 A1
20010047264 Roundtree Nov 2001 A1
20010049275 Pierry Dec 2001 A1
20010049277 Meyer Dec 2001 A1
20010055316 Lerman Dec 2001 A1
20010056504 Kuznetsov Dec 2001 A1
20020002548 Roundtree Jan 2002 A1
20020002575 Eisler Jan 2002 A1
20020002594 Roundtree Jan 2002 A1
20020004736 Roundtree Jan 2002 A1
20020058532 Snelgrove et al. May 2002 A1
20020059427 Tamaki et al. May 2002 A1
20020073182 Zakurdaev et al. Jun 2002 A1
20020078130 Thornton et al. Jun 2002 A1
20020083193 Terefenko Jun 2002 A1
20020087674 Guilford et al. Jul 2002 A1
20020087709 Kerr Jul 2002 A1
20020106019 Chaddha et al. Aug 2002 A1
20020112060 Kato Aug 2002 A1
20020120744 Chellis Aug 2002 A1
20020128948 Wiesehuegel et al. Sep 2002 A1
20020138398 Kalin et al. Sep 2002 A1
20020138418 Zarin et al. Sep 2002 A1
20020143621 Donnelly et al. Oct 2002 A1
20020146102 Lang Oct 2002 A1
20020161908 Benitez et al. Oct 2002 A1
20020164018 Wee et al. Nov 2002 A1
20020176378 Hamilton Nov 2002 A1
20030004855 Dutta et al. Jan 2003 A1
20030005103 Narad et al. Jan 2003 A1
20030012136 Walles Jan 2003 A1
20030012376 Wee Jan 2003 A1
20030033238 Oskielunas et al. Feb 2003 A1
20030035072 Hagg Feb 2003 A1
20030043815 Tinsley Mar 2003 A1
20030051054 Redllich et al. Mar 2003 A1
20030055723 English Mar 2003 A1
20030069981 Trovato Apr 2003 A1
20030088778 Lindqvist May 2003 A1
20030093550 Lebizay et al. May 2003 A1
20030093790 Logan May 2003 A1
20030097462 Parent et al. May 2003 A1
20030100315 Rankin May 2003 A1
20030105726 Itoh et al. Jun 2003 A1
20030126610 Ando Jul 2003 A1
20030128454 Basham et al. Jul 2003 A1
20030143978 Cooper et al. Jul 2003 A1
20030156543 Sahinoglu et al. Aug 2003 A1
20030200336 Pal et al. Oct 2003 A1
20030211856 Zilliacus Nov 2003 A1
20030225677 Sandholm et al. Dec 2003 A1
20030233332 Keeler et al. Dec 2003 A1
20040008778 Yang et al. Jan 2004 A1
20040019900 Knightbridge et al. Jan 2004 A1
20040028049 Wan Feb 2004 A1
20040030681 Shannon et al. Feb 2004 A1
20040034870 O'Brien et al. Feb 2004 A1
20040049372 Keller Mar 2004 A1
20040073701 Huangn et al. Apr 2004 A1
20040132449 Kowarsch Jul 2004 A1
20040139208 Tuli Jul 2004 A1
20040151382 Stellenberg et al. Aug 2004 A1
20040160932 Yegoshin Aug 2004 A1
20040205013 DeLaCrus Oct 2004 A1
20040215780 Kawato Oct 2004 A1
20040218895 Samadani et al. Nov 2004 A1
20040220965 Harville et al. Nov 2004 A1
20040221053 Codella et al. Nov 2004 A1
20040243934 Wood Dec 2004 A1
20040249927 Pezutti Dec 2004 A1
20040252681 Rabipour et al. Dec 2004 A1
20040267686 Chayes et al. Dec 2004 A1
20050025124 Mitsumori et al. Feb 2005 A1
20050038637 Balakrishnan Feb 2005 A1
20050044197 Lai Feb 2005 A1
20050060420 Kovacevic Mar 2005 A1
20050066056 Dominic Mar 2005 A1
20050094725 Hui May 2005 A1
20050102135 Goronzy et al. May 2005 A1
20050114439 Hodges et al. May 2005 A1
20050183127 Ngo et al. Aug 2005 A1
20050235047 Li Oct 2005 A1
20060031515 VanGassel et al. Feb 2006 A1
20060041679 Feig Feb 2006 A1
20060058010 Williams et al. Mar 2006 A1
20060111079 Tischer et al. May 2006 A1
20060123102 Vo et al. Jun 2006 A1
20060206619 Dan et al. Sep 2006 A1
20060270413 Matteo et al. Nov 2006 A1
20070005801 Kumar et al. Jan 2007 A1
20070112948 Uhlik May 2007 A1
20070180136 Li Aug 2007 A1
20070192862 Vermeulen et al. Aug 2007 A1
20070203844 Kuhn et al. Aug 2007 A1
20070226118 Gill Sep 2007 A1
20070299771 Brody et al. Dec 2007 A1
20080177830 Vo et al. Jul 2008 A1
20080189429 DaCosta Aug 2008 A1
20090100191 Hodges et al. Apr 2009 A1
20090132325 Hodges et al. May 2009 A1
20110066936 Wood Mar 2011 A1
20110191462 Smith Aug 2011 A1
20120089734 Mercuri Apr 2012 A1
20120137004 Smith May 2012 A1
20130315056 Gan et al. Nov 2013 A1
20140189099 Hurst et al. Jul 2014 A1
20140201373 Smith Jul 2014 A1
20150324670 Wood Nov 2015 A1
Foreign Referenced Citations (2)
Number Date Country
1197837 Apr 2002 EP
WO 0041426 Jul 2000 WO
Non-Patent Literature Citations (2)
Entry
Greene, William, “Sample selection in credit-scoring models”, Mar. 31, 1998, Dept. of Econ, Stern School of Business, NYU, Elsevier Science, Japan and the World Economy, pp. 299-316.
O'Connell, Brian, “Around the World With Global Network”, Oct. 1993, DEC Professional, v12, n10, p. 38(6).
Related Publications (1)
Number Date Country
20160094472 A1 Mar 2016 US
Continuations (3)
Number Date Country
Parent 13015772 Jan 2011 US
Child 14962204 US
Parent 12357553 Jan 2009 US
Child 13015772 US
Parent 10720800 Nov 2003 US
Child 12357553 US