Network session management for telephony over hybrid networks

Information

  • Patent Grant
  • 9215254
  • Patent Number
    9,215,254
  • Date Filed
    Wednesday, October 31, 2007
    16 years ago
  • Date Issued
    Tuesday, December 15, 2015
    8 years ago
Abstract
A communication system providing telephony communication across combined circuit switched and packet switched networks, such as a telephone network and the Internet, which are connectable to terminals, such as telephones and computers, for selective communication therebetween. The communication system includes an authorization and account control object in the packet switched network, multiple gateways between the circuit switched and packet switched networks providing controlled connectivity between those networks, and an information retrieval object in the packet switched network.
Description
FIELD OF INVENTION

This invention relates to methods and systems for managing signaling and communication sessions across networks, and particularly relates to a scalable methodology and system for managing telephony over hybrid networks such as combined switched telephone networks and packet switched internetworks, such as the Internet.


RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 10/979,317, filed Nov. 2, 2004, entitled “Network Session Management”, which is a continuation of U.S. patent application Ser. No. 08/931,159, filed Sep. 16, 1997, entitled “Network Session Management”, now U.S. Pat. No. 6,137,869, and which is a continuation-in-part application of U.S. patent application Ser. No. 08/931,480, filed Sep. 16, 1997, titled “Network Session Management”, now U.S. Pat. No. 6,839,340, each of the application being incorporated herein by reference in its entirety.


BACKGROUND OF THE INVENTION

Attention recently has been directed to implementing a variety of communication services, including voice telephone service, over the worldwide packet data network now commonly known as the Internet. The Internet had its genesis in U.S. Government programs funded by the Advanced Research Projects Agency (ARPA). That research made possible national internetworked data communication systems. This work resulted in the development of network standards as well as a set of conventions, known as protocols, for interconnecting data networks and routing information across the networks. These protocols are commonly referred to as TCP/IP. The TCP/IP protocols were originally developed for use only through ARPANET but have subsequently become widely used in the industry. TCP/IP is flexible and robust. TCP takes care of the integrity, and IP moves the data.


Internet provides two broad types of services: connectionless packet delivery service and reliable stream transport service. The Internet basically comprises several large computer networks joined together over high-speed data links ranging from ISDN to T1, T3, FDDI, SONET, SMDS, ATM, OT1, etc. The most prominent of these national nets are MILNET (Military Network), NSFNET (National Science Foundation NETwork), and CREN (Corporation for Research and Educational Networking). In 1995, the Government Accounting Office (GAO) reported that the Internet linked 59,000 networks, 2.2 million computers and 15 million users in 92 countries. However, since then it is estimated that the number of Internet users continues to double approximately annually.


In simplified fashion the Internet may be viewed as a series of packet data switches or ‘routers’ connected together with computers connected to the routers. The Information Providers (IPs) constitute the end systems which collect and market the information through their own servers. Access providers are companies such as UUNET, PSI, MCI and SPRINT which transport the information. Such companies market the usage of their networks.



FIG. 3 shows a simplified diagram of the Internet and various types of systems which are typically connected. Generally speaking the Internet consists of Autonomous Systems (AS) type packet data networks which may be owned and operated by Internet Service Providers (ISPs) such as PSI, UUNET, MCI, SPRINT, etc. Three such AS/ISPs appear in FIG. 3 at 310, 312 and 314. The Autonomous Systems (ASs) are linked by Inter-AS Connections 311, 313 and 315. Information Providers (IPs) 316 and 318, such as America Online (AOL) and CompuServe, connect to the Internet via high speed lines 320 and 322, such as T1/T3 and the like. Information Providers generally do not have their own Internet based Autonomous Systems but have or use Dial-Up Networks such as SprintNet (X.25), DATAPAC and TYMNET.


By way of current illustration, MCI is both an ISP and an IP, SPRINT is an ISP, and the Microsoft Network (MSN) is an IP using UUNET as an ISP. Other information providers, such as universities, are indicated in exemplary fashion at 324 and are connected to the AS/ISPs via the same type connections here illustrated as T1 lines 326. Corporate Local Area Networks (LANs), such as those illustrated in 328 and 330, are connected through routers 332 and 334 and high speed data links such as T1 lines 336 and 338. Laptop computers 340 and 342 are representative of computers connected to the Internet via the public switched telephone network (PSTN), and are shown connected to the AS/ISPs via dial up links 344 and 346.


In the addressing scheme of the Internet, an address comprises four numbers separated by dots. This is called the Internet Protocol address, or IP address. An example of an IP address would be 164.109.211.237. Each machine on the Internet has a unique number assigned to it which constitutes one of these four numbers. In the IP address, the leftmost number has the greatest weight. By analogy this would correspond to the ZIP code in a mailing address. At times the first two numbers constitute this portion of the address indicating a network or a locale. That network is connected to the last router in the transport path. In differentiating between two computers in the same destination network only the last number field changes. In such an example the next number field 211 identifies the destination router.


When a packet bearing a destination address leaves the source router, the router examines the first two numbers in a matrix table to determine how many hops are the minimum to get to the destination. It then sends the packet to the next router as determined from that table, and the procedure is repeated. Each router has a database table that finds the information automatically. This continues until the packet arrives at the destination computer. The separate packets that constitute a message may not travel the same path depending on traffic load. However, they all reach the same destination and are assembled in their original order in a connectionless fashion. This is in contrast to connection oriented routing modes, such as frame relay and ATM or voice.


It would be difficult for most people to remember the four separate numbers (sometimes having ten or more digits) comprising each numeric IP address. In addition numeric IP addresses occasionally change, making it even more of a problem for people to keep track of them. The Domain Name System (DNS) was developed to provide some relief from these problems. In the DNS system words, which are more easily remembered, are used instead of numbers.


An example of a textual Domain Name is Evoit@HUT.MB.COM. Each of the names separated by a dot is called a domain. The significance of each of the domains is the reverse of that of the numeric IP address. In the numeric IP address, the most significant numbers were on the left and the least significant on the right. The textual Domain Name System begins with the least significant on the left and proceeds to the most significant on the right.


The top-level domains, those of the most general significance, are as follows:


1. COM A commercial operation


2. EDU A university, college or other educational institution


3. GOV A government organization


4. MIL A military site


5. ORG Any organization that does not fit into any of the preceding


6. NET A network


There are now two-letter domains, each denoting a different country, which are atop the above original domain names. An address ending in “COM.AU,” for example, would be a commercial operation in Australia. Over a hundred different countries are now connected to the Internet so the list of two-letter country codes is ever increasing. Computers associated with the Internet called domain name servers convert textual domain names into numeric IP addresses.


Recently, one or more companies have developed software for use on personal computers to permit two-way transfer of real-time voice information via an Internet data link between two personal computers. In one of the directions, the sending computer converts voice signals from analog to digital format. The software facilitates data compression down to a rate compatible with modem communication via a POTS telephone line, in some cases as low as 2.4 kbits/s. The software also facilitates encapsulation of the digitized and compressed voice data into the TCP/IP protocol, with appropriate addressing to permit communication via the Internet. At the receiving end, the computer and software reverse the process to recover the analog voice information for presentation to the other party. Such programs permit telephone-like communication between Internet users registered with Internet Phone Servers.


Such programs have relied on servers coupled to the Internet to establish voice communication links through the networks. Each person active on the network, who is willing to accept a voice call, must register with a server. A calling party can call only those persons registered on the voice communication server. Also, the address management provided by these servers, like that provided by the domain name servers, has not permitted any individualized control of routing. For example, a user could register only one current address and must reregister each time the user comes on-line with a new address. The registration server provides no automatic selection of alternate destinations.


Concurrent with recent developments in public packet data communications such as the Internet, outlined above, the telephone industry has been developing an enhanced telephone network, sometimes referred to as an Advanced Intelligent Network (AIN), for providing a wide array of new voice grade telephone service features. In an AIN type system, local and/or toll offices of the public telephone network detect one of a number of call processing events identified as AIN “triggers”. For ordinary telephone service calls, there would be no event to trigger AIN processing. The local and toll office switches would function normally and process such calls without referring to the central database for instructions. An office which detects a trigger will suspend call processing, compile a call data message and forward that message via a common channel interoffice signaling (CCIS) link to a database system, such as an Integrated Service Control Point (ISCP). Each ISCP includes a Multi-Services Application Platform (MSAP) database.


If needed, an ISCP can instruct the central office to obtain and forward additional information. Once sufficient information about the call has reached the ISCP, the ISCP accesses its stored data tables in the MSAP database. Using those tables it translates the received message data into a call control message and returns the call control message to the switching office of the network via CCIS link. The network switching offices then use the call control message to complete the particular call. An AIN type network for providing an Area Wide Centrex service, for example, was disclosed and described in detail in commonly assigned U.S. Pat. No. 5,247,571 to Kay et al., the disclosure of which is entirely incorporated herein by reference.


As shown by the art discussed above, the Internet and the AIN have remained separate, independent areas of technical development. Many telephone service subscribers are accustomed to enhanced telephone features, such as those provided by AIN processing. However, the wide range of conditional routing options offered by AIN type processing have not been available on the Internet. For example, the address processing provided by the domain name servers and the registration servers used to exchange addresses for voice communication have not permitted alternate treatments for different times, different calling parties, different destinations of roaming subscribers, etc. An enhanced domain name server which enables conditional routing and which is capable of wide database applications was disclosed and described in detail in the above-referenced parent Eric A. Voit U.S. application Ser. No. 08/812,075.


As use of the Internet expands, particularly for transport of voice telephone communications, a need exists not only for enhanced address management but also for distributed and scalable customer account authentication, authorization, usage recording, usage pricing billing account management, and inter carrier interfaces. The enhanced domain server described in the above incorporated Voit application Ser. No. 08/812,075 lends itself to serving in this capacity.


Voice over internetworks, and particularly the Internet (V/IP), involves terminal equipment affiliated with various networks. V/IP services can be divided into at least four categories based on the type of network to which the users' terminal equipment is attached, such as Internet/Intranet or narrowband Public Switched Telephone Network (PSTN) or POTS (plain old telephone service) telephone network. These four categories are:

    • 1. Personal Computer (PC)—PC
    • 2. PC—Telephone
    • 3. Telephone—PC
    • 4. Telephone—Telephone


Existing V/IP implementations over the Internet are subject to best-effort quality of service (QoS). Typically, this is noticeably degraded as compared to “toll quality” service. In addition, it is subject to significant variations. There is a need for improvement over these existing implementations both in level and consistency of QoS. The QoS should be such as to be perceived by end users as consistently supporting comfortable conversation similar to that which users are accustomed. Preferably the QoS should be equivalent to “toll quality” voice service.


Residential and business customers on the PSTN are accustomed to the availability of enhanced calling features and it is desirable to provide personal dialing directories, ability to use multiple point to point connections at the same time, multi-line conferencing capabilities, and full duplex operation. Authorization and security features should be supplied, as well as user access to billing and usage accounting relating to their own accounts.


DISCLOSURE OF THE INVENTION

It is a primary objective of the present invention to satisfy the needs which have been described.


The present invention addresses those needs by providing a robust and scalable customer account management database within the packet switched network. This database may act as manager of all transactions for a particular customer account. Each Internet telephone service subscriber will have at least one billing and authorization account maintained in a database on the Internet. During set-up of a call, the hop-off gateway will obtain identification and password information from the caller. The gateway then communicates with the database to determine if the call is authorized and to negotiate the overall billing algorithm. When the call is finished, the gateway will report usage data to the database for billing purposes.


Another objective is to provide an overall internetwork architecture that will permit the development of Internet Telephony Gateways (ITGs) capable of dealing with existing problems on a scalable basis. For example, in view of the fact that there is no “originating switch” to generate billing records for an internetwork caller, there is no present system for providing a generation site which will implement a unitary presentation of customer account usage, and also support extraction of data from the network on a real time basis. There is no present architecture or methodology to provide for customer access to his/her account or accounts records without intermixing requests for account information with requests for implementing services. Such an intermixing would subject the fulfillment of services to the traffic load of information requests and vice versa. There is no present architecture for ensuring customer authentication and billing beyond a limited number of customers.


It is another objective of the invention to implement a system to inform a customer of the pricing rules for a call prior to call connection and to report the price of the call in real time visually or orally.


It is another objective of the invention to provide customers with ready access to information in their account records without allowing the customer to access the account database which is used in implementing services, or updating or maintaining or storing such databases.


It is yet another objective of the invention to provide a system to implement the handling of multiple, concurrent calls terminating at different ITGs using the same billing account number and preventing overrun of a preset account spending limit.


It is another object of the invention to provide an architecture which will provide downloading of billing data to external service providers in isolation from the account information maintained and utilized in implementing Internet voice telephony.


It is a still further objective of the invention to ensure that such a system will operate properly in situations where the ITG is owned by a different company than the owner of the customer account.


It is another objective of the invention to provide a mechanism for reducing the potential for fraud.


According to the invention usage recording, pricing, and authorization are bundled into one logical object. This eliminates the separation between authorization and billing processes and significantly reduces the potential for fraud in a regionally deployed system. By having a single logical database which is managing customer authentication, authorization, and usage pricing for the overall network, a transaction-based approach to updating data is possible. This minimizes opportunities for fraud based on exploitation of temporary inconsistencies of partitioned or replicated data bases. There is no requirement that this logical object be implemented as a single physical system.


The single logical element or object is invoked during a call when an authorization request is received. This request may consist of an account number and password provided by a PC user to be authenticated. At this point the logical database processor checks the account password and available account balance. If the password is correct and the remaining balance in the account permits the call to be established, the object responds affirmatively to the Internet Telephony Network (ITN) Call Control Object which includes the Internet Telephony Gateway (ITG). The database retains data indicating that a call associated with that account is in progress. In such an architecture mutual authentication by the Call Control Object and ITG and the database is preferable, as is a secure (such as by encryption) call transaction between them.


In providing the authorization, the database object will evaluate the customer account status to determine if there are multiple connections currently in service, possibly across multiple ITGs. With this state information, the authorization function of the system may ensure that only one call per account is being handled by the network, and/or ensure that the maximum billing limit is not being circumvented by multiple concurrent sessions. In the absence of such a precaution, a second PC caller using the same account and password might receive authorization for a call prior to the posting of the first caller's usage record. Optionally, in order to handle low billing amount availability without denying a call completely, the database object may respond to the ITN with a maximum allowable call duration.


Another feature is that the database object may reserve a predetermined remaining balance on the account for the call so that additional calls related to that account will not result in exceeding the account's limit. The database object may return the pricing algorithm for the usage to the Call Control Object and ITG, which will pass it on to the PC user. In this way the PC user knows the initial charge and ongoing per minute rate for the usage. This is particularly important when the Call Control Object and ITG is owned by a different company than the database object. The user desires to know the rates that will be charged prior to completing the call. The PC is such as to be able to receive and utilize the algorithm, and display pricing to the PC user. The PC may also present the total charge being incurred by the user on a real time basis as the call progresses.


After the completion of the call, the database object is also responsible for accepting usage recording data which has been generated by the Call Control Object and ITG, pricing the usage, and decrementing that priced amount from a customer's available balance. The database object then logs the final call data. Preferably the Call Control Object and ITG also logs and maintains the call detail information. This feature is very useful in the situation where the Call Control Object and ITG and the database objects are owned by different companies. In this case, the database object data can be used by the owner of the database object to manage the customer account. In addition, the Call Control Object and ITG data can be used by the owner of the Call Control Object and ITG to charge the database object for the completion of the call over its facilities. In effect this Call Control Object and ITG data becomes the basis for a usage based settlement interface between carriers.


Preferably the database object is partitioned and may be distributed. A database object partition may be made by a field identifying the carrier owning the customer account, a sub-field within the customer account number (such as NPA-NXX), the customer's telephone number, the customer's e-mail domain name, the customer's originating IP address, or some other field. Each partitioned database may then be placed on its own physical system. With such a partitioned customer account data architecture, it becomes possible to divide the totality of all managed accounts into implementable sub-groups in a straight forward manner.


It is an objective of the invention to provide a code based means of querying a distributed database of codes which allows automatic accessing of the pertinent physical instance of the database for approval.


It is another objective of the invention to provide such a database and functionality on a scalable basis.


Additional objects, advantages and novel features of the invention will be set forth in part in the description which follows, and in part will become apparent to those skilled in the art upon examination of the following or may be learned by practice of the invention. The objects and advantages of the invention may be realized and attained by means of the instrumentalities and combinations particularly pointed out in the appended claims.





BRIEF DESCRIPTION OF DRAWINGS


FIG. 1A is a high level (partition 1 level) diagram of a PC to Phone Internet Telephony architecture of one embodiment of the system of the invention.



FIG. 1B is another simplified high level diagram of the generic system.



FIG. 2 is a diagram of one embodiment of a preferred architectural implementation showing interfaces between IP network elements.



FIG. 3 shows a simplified diagram of the Internet and various types of systems typically connected thereto.



FIG. 4 is an Internet Telephony Network (ITN) block diagram showing the ITN system at a second level of partitioning (partition 2 level).



FIG. 5 illustrates the V/IP objects and interface relationships between users and the network, including external objects and interfaces.



FIG. 6 illustrates the V/IP objects and interface relationships which have been defined between internal ITN objects.



FIG. 7 is a diagram of a typical control plane message flow.



FIG. 8 is a diagram of another typical control plane message flow.



FIG. 9 provides a high level diagrammatic illustration of a typical PC which may be utilized by a user in the system of the invention.



FIG. 10 illustrates a typical client software state machine.



FIG. 11 shows the PC software interface and the relationship to the ITM interfaces.



FIG. 12 is a simplified diagram illustrating another aspect of the invention showing an architecture wherein a separate intermediary information server provides substantially real time retrieval of account information across the entire communication system.





BEST MODE FOR CARRYING OUT THE INVENTION

Referring to FIG. 1A there is illustrated a high level (partition 1) reference model of the Internet Telephony Network or ITN. The center block 100 is the Internet Telephony Network or ITN, is shown in this illustration as managing a customer call between a PC and a POTS telephone. This ITN is in the Network Provider Domain and is responsible for all functions required of a traditional POTS network, i.e., call set-up, usage accounting, surveillance, etc. The ITN spans both the circuit switched network (such as a Public Switched Telephone Network or PSTN) and the packet switched (Internet Protocol or IP—frame relay, etc.) networks. The PC Internet Telephony User (ITU or computer or PC user) is shown at 102 in the Subscriber Domain and the called POTS Internet Telephony User (ITU or telephone user) is shown at 104 in the Called Party Domain. The interface between the PC user and the ITN is designated I1, while the interface between the POTS user and the PSTN is designated I9. I9 represents a standard analog or digital telephone interface.



FIG. 1B shows a different high level depiction of the generic system wherein the packet switched and circuit switched networks are separately shown at 106 and 108. In this figure the end-to-end system connects a laptop computer 110 and a telephone 112. These constitute respectively the PC user call control object U1 and the U3 POTS U1 service user, as is presently described in further detail in relation to FIG. 2. The directory services object 114 and authentication and security accounting object 116 are coupled to the packet switched IP routed network 106. These constitute respectively the C1 ITN directory object and the C3 authorization, usage recording and pricing object, as presently described in further detail.


The Internet Telephony Gateway or ITG 118 connects the packet switched and circuit switched networks. This is sometimes referred to herein as the C2 ITN call control object. The computer may be linked to the packet switched network via any available computer to Internet link. Similarly the connection between the circuit switched network and the telephone may be any of the conventional links including POTS.


In order to manage a call across the circuit switched and packet switched and packet switched networks, it is necessary to provide an architecture, a set of interfaces, and a call flow. FIG. 2 is a diagram showing the interfaces between IP network elements in one architectural implementation. Referring to that figure there is shown at 202 the PC user System Block in the subscriber domain, which includes the U1 PC User Call Control Object. At 200 there is shown the Network System Block or network provider domain, which includes the PSTN Control Plane and C4 PSTN Call Control Object. At 204 there is shown the POTS User System Block or called party domain, which includes the U3 POTS U1 Service User. Within the Network System Block the ITN Control Plane functions are illustrated at 206. The ITN Control Plane functions are those which establish and tear-down communication paths across the User Plane. Three Control Plane Objects are illustrated, namely:


C1: The Internet Telephony Gateway Directory Object


C2: The Internet Telephony Call Control Object


C3: The Internet Telephony Authorization and Usage Recording Object


These objects are shown respectively at 208, 210, and 212. Not shown in this figure is the PSTN Call Control Object C4 since neither the PSTN network elements nor the PSTN protocols are modified by the ITN system.


The C3 object represents the network element required in this architecture to perform customer authentication, call authorization, usage accounting, and usage pricing for a particular PC user's customer account. By bundling usage recording, pricing, and authorization into this one logical object, it is possible to eliminate the conventional separation between authorization and billing processes and significantly reduce the potential for fraud in a regionally deployed system. By having a single logical database which is managing customer authentication, authorization, and usage pricing for the network, a transaction-based approach to updating data is possible. This minimizes opportunities for fraud based on exploitation of the conventional temporary inconsistencies which are encountered with partitioned or replicated data bases. There is no requirement that this unitary logical object be implemented as a single physical system. Although not shown in FIG. 2, C3 can also respond to real time requests from external OSS systems for usage record details and account status information for the customer account.


The C3 object ensures coordination between User Authorization and Usage Recording for a single PC user's customer account. C3 also responds to external requests for that information.


According to the invention the C3 object is implemented in a manner such that multiple sites maintain their own database servers and no single site on the Internet is in possession of all of the authentication, authorization, usage pricing, and account data. The overall data constitutes a distributed database which forms a unitary logical object which relies on the database servers at the individual sites. Operation is such that a local C3 database or server receives a request for data. If the local server database cannot locate the requested information it sends a request to a second database server asking it to locate the information and send the results back to the requester. The second database server locates the information and sends a message to the requester. If the second database server cannot locate the information in its database it (or the local server database) sends a similar request to the next database server until the desired information is located. Alternatively, the account number may be coded so as to indicate the proper database instance. Database servers with this capability are described in detail in the common assignee's copending Sistanizadeh application Ser. No. 08/634,544, filed Apr. 18, 1996. That application is incorporated by reference herein in its entirety.


The C3 object is invoked during a call when an Authorization request is relayed over the interface C3.I4. This interface is responsible for allowing an authorization of ITG usage by a service subscriber, and for maintaining the current state of a subscriber's connections within C3, as well as passing ITG generated usage records from C2 to C3 in real time. Communication through the C3.I4 interface is preferably encrypted and secure. The authorization request relayed over C3.I4 typically consists of an account number and password provided by the PC User to be authenticated by C3. At this point. C3 checks the account password and available account balance. If the password is correct and the account remaining balance permits the call to be established, then C3 responds affirmatively to C2. C3 also retains data indicating that a call associated with that account is in progress. In such an architecture, mutual authentication of C2 and C3, and a secure transaction between them is preferred.


In providing the authorization, C3 evaluates the customer account status to determine if there are multiple connections currently in service (possibly across multiple ITGs). It should be appreciated that while FIG. 2 shows only a single gateway between a PC user and the ITN (via the PSTN), a plurality of gateways exist serving the various regional areas from which subscribers may request service. With the state information obtained from the C3 status evaluation the authorization system may ensure that only one call per account is being handled by the network, and/or ensure that the maximum billing limit is not being circumvented by multiple concurrent sessions. If this precaution is not provided a second PC caller using the same account and password might receive authorization for a call prior to the posting of the first caller's usage record. Optionally, in order to handle low billing amount availability without denying a call completely, C3 can respond to C2 with a maximum allowable call duration.


Another feature is that C3 may reserve a certain remaining balance on the account for the call so that additional calls related to that account will not result in exceeding that account's limit. C3 may return the pricing algorithm for the usage to C2 which will pass it on to the PC user. In this way the PC user knows the initial charge and ongoing per minute rate for the requested usage. This is particularly important when C2 is owned by a different company than C3, and the user wants to know the overall rates that will be charged prior to completing the call. The PC is such as to be able to receive and utilize the algorithm, and display pricing to the user. The PC is also able to present the total charge being incurred by the user as time goes on during the call.


After the completion of the call, the C3 object is also responsible for accepting usage recording data from C2, pricing the usage, and decrementing that priced amount from a customer's available balance. C3 then logs the final call data. Preferably C2 also logs and maintains the call detail information. This feature is very useful in the situation where C2 and the C3 database objects are owned by different companies. In this case, the database object data can be used by its owner to manage the customer account. In addition, the C2 data can be used by the owner of the C2 object to charge the C3 database object for the completion of the call over its facilities. In effect this C2 data becomes the basis for a usage based settlement interface between carriers.


Preferably the C3 system is partitioned. Such a partition may be made by a field identifying the carrier owning the customer account, a sub-field within the customer account number (such as NPA-NXX), the customer's telephone number, the customer's e-mail domain name, the customer's originating IP address, or some other field. Each partitioned database may then be placed on its own physical system on a geographical or other basis. With such a partitioned customer account data architecture, the domain of all managed accounts may be divided into efficiently implementable sub-groups.


Referring to FIG. 4 there is provided an illustration of the ITN system at a second level of partitioning. Within this partitioning there are three planes (types of processes which span all the network elements involved with a service), and four types of network functions (domains of individual transport networks (e.g., PSTN or IP) over which communication must cross).


The three planes are:


The ITN User Plane Functions: These functions are those which are directly involved with real time communications transport and signal manipulation within a network.


The ITN Control Plane Functions: These are the functions which establish or set-up and tear-down communication paths across the User Plane.


The ITN Management Plane and Operations Support Systems Functions (OSS): These are the functions needed to provision and maintain the elements of the User Plane and Control Plane.


The four network functions are:


IP Access Network Functions (right or PC User Side): The IP access network is used locally on the PC user side simply to reach the IP network. This access may be direct via a LAN, or over a circuit switched PPP link connected to a Point of Presence (POP).


IP Network Functions: The IP network is the involved Intranet backbone and associated support systems (such as the DNS), this network provides the IP transport functions.


V/IP Gateway Functions: These are the network functions (and elements) which are involved primarily with supporting a Voice over IP service.


PSTN Access Network Functions (POTS User Side): The PSTN access network consists of the traditional PSTN connecting the Internet Telephony Gateway (ITG) to the called telephone user.


The V/IP Gateway Functions and relationships to the other elements involved with the V/IP service are now described in relation to FIGS. 4 and 5. FIG. 4 illustrates interface references defined between the different User Planes and the different Network Functions. Although this partitioning has been done at the logical level, it is not necessary that physical systems be partitioned in this manner. As an example, an Internet Telephony Gateway may have functions spanning both the Control Plane (call setup) and User Plane (Vocoding).


The internal interface references designated within FIG. 4 are:


1. The interface between the Control Plane and the Management Plane functions is shown at I5. Management functions such as directory table maintenance, surveillance, and periodic billing exports cross the I5 interface.


2. The interface between the User Plane and the Control Plane Functions is shown at I4. Interfaces between various elements of the Control Plane are also designated as I4.


3. The interface between the V/IP Gateway and POTS Access Network is shown at I7.


4. The interface between the IP Network and the V/IP Gateway functions is shown at I6.


5. The interface between the IP Network and the PC Access Network is shown at I3.


6. For the sake of simplicity, one additional interface of lower utilization, I10, is not shown in FIG. 4. This interface is an external billing interface to a credit card provider and is shown and detailed in FIG. 5.



FIG. 5 illustrates the V/IP objects and interface relationships between users and the network, including external objects and interfaces. An object is a major process which has been identified within the functional specifications of the system. An interface is a communications path between two objects. External objects are objects which use interfaces that span between different network functions. By defining external objects and interfaces in this way, the V/IP system elements can be defined based on any communication which might be made across interfaces I6, I7, and I10 as shown in FIG. 5.



FIG. 5 shows a second level of partitioning illustrating the user, control and management planes within the network. Only those objects attached to a new or modified object for the V/IP service are shown. Other previously shown objects required for V/IP in the IP Management and Control Planes between I6 and I3 are not shown. The U1 PC to Phone service is a user plane service which is shown and defined in FIGS. 5 and 6.



FIG. 6 illustrates the V/IP objects and interface relationships which have been defined between internal ITN objects. Again only those objects or interfaces that are new or modified for V/IP are shown. Multiple objects may be contained within a single physical entity, and this physical entity may cross several planes.


The more significant objects and interfaces are now described in further detail.


ITN objects are considered to be partitions of the ITN processing requirements into sub-systems. A definition of ITN platform objects in this way, independent from protocol or message set constraints, provides a logical view of the system independent of those constraints.


User Plane Objects


U1 Object: Vocoder


The U1 Object converts packetized voice segments (which are encapsulated with IP) to and from circuit switched voice segments (which are encoded in Pulse Code Modulation (PCM)). The Vocoder performs various functions in order to accomplish this. It buffers a certain amount of packetized voice segments in order to maintain a continual flow on the circuit switched network. It dynamically assesses the delay characteristics of the transport network between the Vocoder and the User's software application in order to minimize those buffer requirements.


The Vocoder is able to handle all ITG ports in service, with all participants (on both sides of each call) talking at the same time. The Vocoder also identifies the level of packet loss resulting from voice transport across the IP network and maintains a record of that packet loss for summary reporting. Based on the level of packet loss, the Vocoder applies corrective algorithms to the voice wave form so that the resulting loss of signal quality is minimized for the called PSTN party.


The U1 Object is able to identify a loss of voice content packets, or a continuous stream of format errors in the encoded voice data incoming on the U1.I1 and U1.I10 interfaces (see FIG. 5). If such a condition is found and there has been no corresponding signaling at the control plane level, U1 will notify C2 to pull down the connection and perform any necessary clean up tasks.


User Plane Interfaces


Two user plane interfaces are defined:


External Entity to V/IP User Plane


1) U1.I1: The Internet Telephony Packetized Voice Interface is an external interface which is responsible for transporting Vocoded, packetized voice segments across the IP Access Network and IP Network.


2) U1.I10: The Circuit Switched Voice Interface is an external interface responsible for transporting PCM voice segments across the PSTN.


Control Plane Objects


Three control plane objects are defined:


1) C1: Internet Telephony Gateway Directory Object


2) C2: Internet Telephony Call Control Object


3) C3: Internet Telephony Authorization and Usage Recording Object (Internal)


The C1 Object: The Internet Telephony Gateway Directory manages which E.164 addresses (telephone numbers) are served within the terminating footprint of a particular ITG. The management of the terminating footprint may be in the form of NPA-NXX ranges which relate to an IP address for a single ITG. When queried with a “called” telephone number by the PC Call Control Object, the C1 object returns the IP address of the Internet Telephony Gateway (ITG) that serves the called telephone number.


The IP address of the V/IP Server is communicated to the PC user or Client software application prior to initiating contact with the C1 object. The object's TCP port number for the C1 directory application is defined, selected, and maintained within the client software.


The C2 Object: Internet Telephony Call Set-Up may be described as follows:


The ITN (ITG) communicates with the PC user to establish a PC-to-Telephone call. The call setup is originated by the PC user and destinated or terminated by the telephone user by supplying the address or number of the called terminal. However, it is the C2 Object or Call Control Object which coordinates the signaling among the involved network elements. Included in this signaling are:


Management of the state of the call with the client PC software (via C2.I1 shown in FIG. 5).


Validation of a PC users' Account number and password (via C3.I4 shown in FIG. 6).


Establishment and tear down of the PSTN circuit (via C4.I7 shown in FIG. 5).


Generation of usage information which is sent for processing and pricing (via C3.I4 shown in FIG. 6).


Managing the state of the connection within C3 (via C3.I4 shown in FIG. 6).


When initiating a V/IP call, the PC user may be required to provide the 10 digit E.164 (ITU-T telecommunication numbering or telephone number) address of the called telephone user, the IP address of the ITG associated with the called telephone user (obtained via the C1 Object), the PC's IP address, as well as the billing account number and associated password.


The C2 object is able to signal various states of a connection (ringing, busy, etc.) to a PC user. If the C2 object receives a maximum call duration from C3 during call set-up, this maximum call duration is sent to the PC software either as an audio message or as information to be presented on the PC screen. C2 generates the raw usage records which are sent to C3. A usage record is not tagged as billable unless the PC application has acknowledged its receipt of a connection establishment message. The C2 object may require a user ID and password to be provided by the PC Client software prior to completing a V/IP call. This information is authenticated via the C3 object.


The C3 Object: User Authorization and Usage Recording


The C3 Object ensures coordination between User Authorization and Usage Recording for a single PC user's customer account. C3 also responds to external requests for that information. C3 is a unitary logical object with distributed instances. That is, physically distributed account, authorization, validation and billing databases are so arranged as to be usable as a single logical object. The data associated with a user subscriber account is typically stored in an instance of C3 which is local to the user subscriber. The C3 Object is invoked during a call when an Authorization request is relayed over C3.I4 (this request typically consists of an account number and password provided by PC User). At this point C3 checks the account's password and available monthly minutes remaining, and responds appropriately to C2. Optionally, C3 can respond to C2 with a maximum allowable minute duration for a call. Successful account validation by the C3 Object is a prerequisite to successful call establishment by the C2 Object.


The C3 Object is also responsible for accepting usage recording data from C2, and decrementing the minutes used from the available minutes (and/or optionally pricing that usage, and decrementing that priced amount from a customer's existing balance), and then logging the information. Preferably, C3 also knows the state of a users connections across multiple ITGs. With this state information, the authorization system may ensure only one call per account is being handled by the network, and/or ensure that the maximum available minute limit is not being circumvented by multiple concurrent sessions (otherwise a second PC caller might receive authorization for a call prior to the posting of the first caller's usage record).


The theory behind bundling usage recording, pricing, and authorization into one logical object is to significantly reduce the potential for fraud when the system is widely deployed. By having a single logical database which is managing customer authentication, authorization, and usage pricing for the network, data synchronization is facilitated, and opportunities for fraud are minimized. As described, it is not necessary that C3 be implemented as a single physical system. The C2 Object will provide C3 with a customer billing account number and a password (originally supplied by the PC user). The C3 Object maintains a current account “minutes remaining” balance and usage records for each user on a monthly basis. This usage information can be extracted in real time based on a request from the M1.I5 interface as shown in FIG. 6.


If a user who is requesting authorization has a low “minutes remaining” balance, and this low balance will result in a maximum call duration which is shorter than the maximum call duration typically allowed by the network, then the Authentication server will transmit a maximum call duration back to the C2 Object.


The Control Plane Interfaces


Four control plane interfaces are defined:


External Entity to V/IP Control Plane

    • 1) C1.I1: The Internet Telephony Directory Interface is an external interface which is responsible for PC to Directory services address resolution (see FIG. 5). The client PC provides the E.164 address (telephone number) of the intended party to be called, and the Directory service returns the IP address of the appropriate hop-off. Internet Telephony Gateway.
    • 2) C2.I1: The Internet Telephony Call Management Interface is an external interface which is responsible for PC to Internet Telephony Gateway signaling for call establishment and tear-down.
    • 3) C4.I7: PSTN Call Management Interface is an external interface which is responsible for managing signaling to the PSTN which is necessary for the PSTN to establish and tear down circuit switched connections to the called party. Signaling from the ITG to the serving PSTN central office is preferably via PRI ISDN. Alternately, T1 E&M PSTN signaling may be used.
    • 4) C3.I4: The Internet Telephony Authorization and Usage Recording Interface is an internal interface shown in FIG. 6, and is responsible for two functions. First the interface must allow for an authorization of ITG usage by a service subscriber. Second, the interface must maintain the current state of a subscriber's connections within C3, as well as pass ITG generated usage records from C2 to C3 in real time.


      Management Plane Objects


Five management plane objects are defined and shown in FIG. 6:


1) M1: ITN Information Server & Feedback Object


2) M2: ITN Subscription Server Object


3) M3: ITN Billing System Object


4) M4: ITN Directory Maintenance Object (Internal)


5) M5: ITN Surveillance Object (Internal)


The M1 Object: The ITN Information & Feedback Server allows the PC user to access information on the V/IP service including general and user-specific information. Essentially, the M1 Object is the HTML interface to the V/IP network for subscribers of the service. Following is the information which the user might request from the ITN via HTML:

    • Descriptions on how to download and install client software and operate the service
    • Descriptions of service availability and pricing plans
    • Graphical (map) areas showing the ITG terminating footprints
    • NPA-NXX ranges supported by the ITG terminating footprints
    • Call usage record details (will extract the data from the control plane in real time via M1.I5)
    • Billing account status & balance (will extract the data real time via M1.I5)
    • Change of the ITN password (will verify old password and update to new password via M1.I5)
    • An introductory page, with links to each of the pages items listed above.


Operationally the M1 Object interface will be accessible via commercial browsers and at least a Netscape 3.0 or Internet Explorer 3.0 web browser. On any customer specific request for usage records or account balance, a PC user will have to provide within the query the same account number and password which is used for call establishment. This information will be validated by C3 when fulfilling the request.


The M2 Object: ITN Subscription Server: The ITP allows the PC user to subscribe to the V/IP service via an on-line process. Information gathered from the potential subscriber will include:


ISP (Internet Service Provider) account number


ISP email address


CPU type of PC, amount of memory


Type of sound card, microphone, and speakers


Operating System and version


Global Service Provider (GSP)


Free disk space


Upon activation the subscriber will receive notification via email. This email will include instructions, the web page URLs (Uniform Resource Locator or www (World Wide Web) address) needed to get started, and an initial password (which can be changed via M1).


The M3 Object: ITN Billing System: Monthly, the M3 Object will poll C3 to extract account balances and credit card numbers in order to request payments from credit card companies. As account balances are processed by the M3 Object, failed billing attempts will be flagged in a report (either formatted as ASCII, or in a PC database product's format).


The M4 Object: ITN Directory Maintenance: Directory data (in the form of NPA-NXX ranges pointing to ITGs) will be created, validated, and managed outside of the network (away from C1, the ITN Directory Object). The M4 object is responsible for this function. M4 will accomplish this by assisting in the creation of the Directory tables in a format which can be exported directly (via M4.I5) to C1. The M4 Object preferably also supports the creation of graphical maps showing the terminating call areas supported by the ITGs. The maps and the NPA-NXX table information may be exported so that it may be presented to the user via M1. Off the shelf software products like Mapinfo may be used to support the requirements of M4.


Operationally the M4 Object is able to import NPA-NXX data, along with supporting graphical central office serving area information. The object is able to graphically define ITG terminating calling areas. The M4 Object automatically generates the NPA-NXX to ITG IP address Directory table based on the graphical information provided above. The M4 Object supports multiple versions of the C1 Object Directory database.


The M5 Object: ITN Surveillance: The V/IP service may cross many network elements within the ITN. Having a centralized surveillance capability which can span multiple platforms ensure its operation. The M5 Object attempts to identify and log critical alarms, and to present these alarms to an administrative console. Such alarms may include: Whether a network based application is under distress (via an SNMP Management Information Block (MIB)), whether the system is alive and communicating with the network (via “Ping” or similar function), whether required application processes are active and if they need to be restarted (via a “ps-eaf” or similar function), whether the processes are sane (via periodic test queries to validate correct responses).


These types of problems may be analyzed by M5, and alarms generated and logged within C5 at four levels: Critical (service affecting), Major (user intervention recommended), Minor (of note), and Informational (components reporting normal operation). These alarms may be used to manage a local database containing managed objects representing the current operational state of ITN platforms and processes. Each managed object and/or platform will be assigned one of three operational states: Red (out of service), Orange (operating with degraded capabilities), and Green (operating normally). A graphical representation of the ITN network is presented to a console via a standard display package such as OpenView. Console operators have the option of directly connecting to any ITN object or system to perform troubleshooting or diagnostic operations. This connection presents the console operator with the same capabilities as a local system administrator.


With respect to M5 addressing requirements, new elements added to the ITN will have their IP addresses and their type of object identified in M5. The M5 Object will create its database of managed objects dynamically (once given the IP address or host name) via the M5x.I5 interfaces.


Management Plane Interfaces


Ten Management Plane Interfaces have been defined:


External Entity to V/IP Management Plane

    • 1) M1.I1: Internet Telephony Data Request Interface
    • 2) M2.I1: Internet Telephony Subscription Interface
    • 3) M3.I10: Credit Card Provider Interface V/IP Management Plane to V/IP Control Plane
    • 4) M1.I5: Internet Telephony Network Data Extraction Interface
    • 5) M2.I5: Internet Telephony Subscription Management Interface
    • 6) M3.I5: Internet Telephony Billing and Usage Extraction Interface
    • 7) M4.I5: Internet Telephony Directory Maintenance Interface
    • 8) M5a.I5: Internet Telephony Call Management Surveillance Interface
    • 9) M5b.I5: Internet Telephony Authorization and Usage Recording Surveillance Interface
    • 10) M5c.I5: Internet Telephony Directory Surveillance Interface


The functions of these interfaces are as follows:


The M1.I1 Interface: The Internet Telephony Data Request external interface is responsible for providing a subscriber with data requested about the ITN in real time.


The M3.I10 Interface: The Credit Card Provider external interface is responsible for allowing an ISP to place a charge against a user's credit card account number.


The M1.I5 Interface: The Internet Telephony Network Data Extraction internal interface is responsible for providing the M1 Object with real time data regarding a subscriber's remaining minutes of use, usage records of the current and previous billing cycle, and/or calls currently in progress. The M1 Object will reformat and present this data to the subscriber who requested it.


The M2.I5 Interface: The Internet Telephony Subscription Management internal interface is responsible for managing the list of account numbers allowed to use the ITN. This interface supports several functions: an initial batch load of subscribers and initial passwords, adding or removing individual account numbers, and resetting individual passwords.


The M3.I5 Interface: The Internet Telephony Billing and Usage Extraction internal interface is responsible for performing a periodic extraction of usage records from the network.


The M4.I5 Interface: The Internet Telephony Directory Maintenance internal interface is responsible for maintaining the NPA-NXX to hop-off ITG directory data.


The M5a.I5 Interface: The Internet Telephony Call Management Surveillance internal interface is responsible for carrying a variety of information which allows M5 to assess the availability, health, and status of the physical computer and software processes of the various Internet Telephony Gateways.


Based on the foregoing descriptions of the interfaces and objects a high level call flow of signaling messages is described. FIG. 7 illustrates an example diagram of such a control plane message flow. This example should be understood to show one version or embodiment of a set of messages which may be implemented for a PC to PSTN service. Converse messages would be utilized for a PSTN initiated PSTN to PC service, as well as appropriate corresponding messages for PC-PC and telephone-telephone service. Additional messages may be added if enhanced functionality is provided.


The call flow starts at the point where the user has established IP layer connectivity with the network, and has invoked the V/IP software application. This preliminary procedure typically entails the following steps by the party initiating the call (not illustrated in FIG. 7):


1. The customer will boot the PC, and connect to the IP network following their existing procedures for network access.


2. The customer will launch their V/IP application, either as a plug-in to an existing browser or as a stand-alone application. When launched, this application will present a template of fields which are required to initiate a call.


3. The customer will populate a “telephone number to be called” data field. The customer will also either populate his/her account number and password, or the application will reapply this data if it has been previously saved within the application.


4. The customer will then initiate the call. During the call, the call's completion status will be presented in real-time to the user by the application (via a visual display. One example of the call initiation procedure is now described.


The following steps commence with the Called Party Address Request step in FIG. 7 and proceed as follows:


1. The user initiates a call via the PC's V/IP software. This software application invokes the Directory (C1 Object) to obtain the IP address of the destination ITG. Based on the dialed number submitted by the PC application as described in the foregoing preliminary procedure, the C1 Object returns the IP address of the associated ITG (C2 Object).


2. The PC's V/IP software application invokes the C2 Object to set up a call by passing to C2 the number to be called, the user's account number, and a password. This is shown as SETUP in FIG. 7.


3. C2 invokes the C3 Object in order to receive authorization to proceed with the call (PSTN Termination Request). This may entail communication among instances of the distributed database to verify the account status of the caller and optionally set a limit on the duration or cost of the call depending upon the account status and/or balance. The pricing of the call may be communicated to C2 for communication to the caller. C3 will pass the authorization information back to the C2 (PSTN Termination Authorization).


4. If authorization was successful, C2 will establish the PSTN connection, and notify the client software that the call is proceeding (SETUP Call Proceeding). C2 may also pass on to the calling PC the pricing information obtained from C3. C2 will continue to update the client software with call establishment information as the call is proceeding and may also pass along to the caller a running account of the cost of the call.


5. After the call has been established, the PC will respond to the network that it recognizes that a connection has been established (Connection Acknowledged), timing of the call's duration can be initiated, and any usage measurements will indicate that the call is billable.


6. Steady state call (Voice Flow).


7. The PC's V/IP software application invokes the C2 service to release the call. The PC application signals release to C2, and C2 releases the call in the PSTN and confirms the release back to PC application. Also, timing of the call's billable duration is completed. Alternatively, the PSTN user may initiate call tear down as well.


8. The C2 Object passes a usage record to C3 for reporting. The C3 Object may also initiate individual call billing by reporting to M3 as shown in FIG. 6.


A modified version or embodiment of the call set up procedure is now described in connection with FIG. 8.


The following steps commence with the Called Party Address Request step in FIG. 7 and proceed as follows:


1. The user initiates a call via the PC's V/IP software. This software application invokes the Directory (C1 Object) to obtain the IP address of the destination ITG. Based on the dialed number submitted by the PC application, the C1 Object returns the IP address of the associated ITG (C2 Object).


2. The PC's V/IP software application invokes the C2 Object to set up a call by passing to C2 the number to be called, the user's account number, and a password (Connection Request).


3. The C2 Object invokes the C1 Object to request the customer account server address (Customer Account Server Address Req), which is then returned (Customer Account Server Address Resp).


4. The C2 Object invokes the C3 Object for account validation (Account Validation) using the Customer Account Server Address (address of the instance of the C3 object database) and receives call authorization (Call Authorization). This may include limitations as described in connection with the description of FIG. 7.


5. If authorization was successful, C2 will establish the PSTN connection, and notify the client software that the call is proceeding. C2 will continue to update the client software with call establishment information as the call is proceeding.


6. After the call has been established, the PC will respond to the network that it recognizes that a connection has been established (Connect Ack), timing of the call's duration can be initiated, and any usage measurements will indicate that the call is billable.


7. Steady state call (U1 Service PC to telephone).


8. The PC's V/IP software application invokes the C2 service to release the call. The PC application signals release to C2, and C2 releases the call in the PSTN and confirms the release back to PC application. Also, timing of the call's billable duration is completed. Alternatively, the PSTN user may initiate call tear down as well.


9. The C2 Object passes a usage record to C3 for reporting and for individual call billing if that option is chosen. The C3 Object acknowledges receipt of the usage record to C2.



FIG. 9 provides a high level diagrammatic illustration of a typical PC which may be utilized by a user in the system of the invention.



FIG. 10 illustrates a typical client software state machine which is executed in the subscriber's PC. The V/IP software state machine correlates operations within the environment of the typical/high end PC of the user. FIG. 10 provides an example of how the end user interacts with the V/IP network via the client software. Interaction between the PC user and the software's state machine utilizes messages which cross between the client software's state machine and the operating system's input/output drivers for each hardware device. The more significant messages and the content which they may carry may be summarized as follows:


Keyboard/Mouse


Call Initiation:


This comprises the input information needed by the state machine (and the V/IP control plane) which is required to establish a call. The information includes the calling party's account number and password, as well as the telephone number being called.


PC User Call Termination Request:


This comprises the input of a notification by the user to the software to conclude the call.


Display/Monitor


Error Notification:


This comprises a dialog which shows the reason for the failure of a particular call.


Call Establishment Notification:


This refers to the display information showing the step-by-step progression of a call as it is established through the network.


Call Completion Notification:


This comprises a dialog which shows the statistics of a completed call.



FIG. 11 shows the PC software interfaces (stack) and the relationship to the ITN interfaces. It is necessary that the VI/IP software state machine fit seamlessly within the environment of a typical high end PC owned by an ISP subscriber. FIG. 11 shows how the state machine interacts with the other software components for Internet connectivity and communication. Using the types of PC shown in FIG. 9, state machine shown in FIG. 10, and interface relationships shown in FIG. 11, the following customer software characteristics and functions are significant:


1. It is not necessary for the client software to validate that IP Access Network or IP Network connectivity has been established prior to attempting to communicate with the network. The availability of connectivity across these layers is assumed. A lack of response by the network to the application's state machine is displayed to the user as a lack of network level connectivity.


2. Each of the five V/IP network interfaces is able to have their transactions traverse seamlessly across the IP Access Network and IP Network. The client software should use the same IP network drivers which are used for their existing ISP Internet connectivity. Client software driver conflicts or adverse interactions should not occur with the installed base of PC software.


3. All management plane interfaces with the user may be via the PC's existing Web Browser. The client software need not take on the task of managing network based customer data.


4. The compressed voice interface, U1.I1, preferably communicates via UDP (User Datagram Protocol), however, RTP (Routing Table Protocol) on top of UDP is also an option. If RTP is used, the client software should validate that it is a valid option over the existing IP network.


5. If RTP is selected, and communication over the IP Access network is performed with a PPP link, RTP header compression should be supported in order to reduce the required IP Access network bandwidth.


6. The software must be able to transmit DTMF digits to the hop-off ITG. Preferably the digits will be transmitted “out of band” (in other words, the PC will not generate DTMF signals which are transmitted as compressed tones).


7. The software should be able to transmit the length (duration) that a DTMF digit a pressed.


8. The software should display to the user the current state of a call as it is made through the Internet Telephony Gateway (ITG).


9. The voice played back to the PC user will be toll quality. The Vocoder includes capabilities such as echo cancellation, it should be able to handle varying levels of packet loss and latency, and it should be able to apply corrective algorithms to the voice stream.


10. A user account number and password should be required within the Call Initiation message to the state machine. If the user so chooses, these items should be able to be saved within the client application.


In order to insure ease of use and maximum utility to the subscriber it is desirable to provide for the subscriber an easy access and instructional tutorial as to the use of the system. At the same time it is also desirable to provide the subscriber with his/her billing account balance, status, and call usage details on a real time basis. This information may include descriptions on how to download and install client software and operate the service, descriptions of service availability and pricing plans, graphical (map) areas showing the ITG terminating footprints, and NPA-NXX ranges supported by the ITG terminating footprints. With respect to account information the data available to the subscriber may include call usage record details, billing account status & balance, and verification of the existing password. All of the foregoing may be conveniently provided through the use of an introductory page with links to pages that provide access to each of the foregoing.


The system of the invention provides the above described features through the architecture illustrated in FIGS. 4, 5, 6, and 12. Thus FIG. 6 shows the authorization and usage object C3 connected to an Information Server Object M1 in the V/IP management plane. This information and feedback object M1 comprises a server separate from the C3 authorization and usage object but connected to the C3 control plane object via the M1.I5 interface between the ITN management plane and control plane functions. The M1 object serves as an HTML interface to the V/IP network for subscribers to the service.


Operationally the M1 Object interface is accessible via commercial browsers and at least a Netscape 3.0 or Internet Explorer 3.0 web browser. On any customer specific request for usage records or account balance, a PC user will have to provide within the query the same account number and password which is used for call establishment. This information will be validated by C3 before fulfilling the request. The M1.I1 link between the PC user browser and M1 information server is shown in FIG. 5. The subscriber, using a commercial browser such as Netscape 3.0 or Internet Explorer 3.0 and HTML by way of example, accesses the information server via M1.I1. The information server validates the password and obtains the information from the authorization, usage and account object C3 via M1.I5, and presents the information to the PC user subscriber with the correct formatting display via M1.I1.


The M1 information server provides real time interface to the authorization, usage and account object C3 while at the same time also providing isolation of the C3 object. The information server thus provides an intermediary which, among other things, prevents undesirable interaction between information retrieval and service implementation in the C3 authorization, usage and account object. Appropriate sizing of the capacity of the information server permits the provision of virtually instant access for subscribers without necessarily requiring interrelated sizing of the authentication, usage and account object.


The combination of the logically unitary distributed authorization, usage and account object with this intermediary information server, which is constantly available to subscriber, presents a unique and powerful tool for information retrieval and usage. As has been previously explained, the distinctive authorization, usage and retrieval object provides tracking of multiple ongoing calls against the same account through separate and geographically distal ITGs and network elements.


The new information server permits a subscriber to engage in real time monitoring of this activity and real time tracking of overall account status and balance. Further, there is no requirement that the subscriber perform such monitoring or information gathering from a fixed locale. The information is as readily available from a hotel room by laptop computer as from the home location of the subscriber. Still further, the information may be retrieved and monitored not only by the subscriber but also by any entity with valid credentials for accessing the service, such as a super account holder or employer. This also provides a mechanism for an employer to act on the obtained information to place a stop on further use of any supervised account.



FIG. 12 provides a simplified illustration of this aspect of the overall communication system. Referring to that figure the IP Routed Internet/Intranet is shown at 400. The Circuit Switched Network, such as a public switched telephone network, is shown at 410. The circuit switched network serves a large number of subscriber terminals, here illustrated as telephone terminals 412, 414, and 416. The telephone terminals may typically be connected to the circuit switched network via end offices or central offices 418, 420, and 422 via local links or loops. It will be appreciated that these terminals may be distributed over a wide geographical area such as the entire United States or North America, by way of example.


The circuit switched network is connected to the packet switched network via a plurality of C2 call control objects or ITGs shown here by way of illustration as 424, 426, 428, 430, and 432. These gateway control objects are connected to routers in the Internet/Intranet as shown at 434, 436, 438, 440, and 442. The ITGs are also connected to end or central offices in the circuit switched network shown here as 444, 446, 448, 450, and 452. Also connected to the Internet/Intranet are voice equipped personal computers or PCs 454, 456, and 458. These PCs are shown connected to routers 460, 462, and 464. It will be appreciated that the particular gateway or ITG chosen to effect a particular communication path is dependent upon multiple factors, such as the lowest cost connection through the telephone network, by way of example. Thus the ITG 424 may be chosen to effect a link between PC 454 and telephone terminal 412.


As has been explained, the gateway controllers are all linked to the C3 authentication, usage and account object 466 as shown here at 468. The authentication, usage and account object in turn is linked to the information server object M1, here shown at 468. This has previously been described in more detail in connection with FIGS. 4, 5, and 6 hereinabove.


It is believed that this simplified diagrammatic illustration in FIG. 12 will facilitate an appreciation of the power of the authentication, usage, and account object C3 acting in conjunction with the information server M1. The arrangement permits the information server to provide to users almost immediate access to information regarding accounts which may actually be locally stored in instances of the authentication, usage and account object dispersed over an enormous geographical area. Such flexibility permits travelers to access their accounts from hotel rooms, while their employers may also access those accounts from the home or any branch office of the business establishment.


While the foregoing has described what are considered to be preferred embodiments of the invention, it is understood that various modifications may be made therein and that the invention may be implemented in various forms and embodiments, and that it may be applied in numerous applications, only some of which have been described herein. It is intended by the following claims to claim all such modifications and variations which fall within the true scope of the invention.

Claims
  • 1. In a hybrid communications network comprising a circuit switched network and a packet-switched network, wherein the hybrid communications network comprises at least one session control object of a first service provider, a method for establishing a given communication session through the session control object comprising: at a unitary logical object of a second service provider different than the first service provider, receiving a request to initiate the given communication session between a calling terminal and a called terminal, the calling terminal communicably coupled to at least one network element of the first service provider, the request identifying a user account associated with the calling terminal and including an address of the called terminal, the unitary logical object including a unitary logical database;at the unitary logical object, authenticating an identity of a user of the calling terminal by accessing authentication information in the unitary logical database, checking a status of the user account by accessing account status information in the unitary logical database, and determining whether to permit establishment of the given communication session through the session control object based on the status of the user account;from the unitary logical object, sending a response signal indicating whether establishment of the given communication session through the session control object is permitted; andwherein the unitary logical object is distributed over multiple physical systems.
  • 2. The method of claim 1, wherein each of the multiple physical systems includes an instance of the unitary logical object.
  • 3. The method of claim 2, wherein the unitary logical object stores a plurality of user accounts, and each instance of the unitary logical object corresponds to a subgroup of the plurality of user accounts.
  • 4. The method of claim 3, wherein the authenticating the identity of the user, checking the status of the user account, and determining whether to permit establishment of the given communication session includes determining the instance of the unitary logical object storing the user account associated with the calling terminal.
  • 5. The method of claim 1, wherein the request to initiate the given communication session is sent from the session control object to the unitary logical object.
  • 6. The method of claim 1, wherein the response signal indicating that the given communication session is authorized is sent from the unitary logical object to the session control object.
  • 7. The method of claim 1, further comprising: receiving usage information associated with the given communication session at the unitary logical object; andlogging the usage information in the unitary logical database.
  • 8. The method of claim 7, further comprising decrementing a balance of the user account in the unitary logical database based on the usage information.
  • 9. The method of claim 8, wherein the usage information comprises at least one of amount of usage or pricing of usage.
  • 10. The method of claim 1, wherein the account status information in the unitary logical database includes information indicating whether a communications session is in progress that is associated with the user account, and the determining whether to permit establishment of the given communication session is based on whether there is already another communications session that is in progress that is associated with the user account.
  • 11. The method of claim 1, wherein the account status information in the unitary logical database includes an available account balance of the user account, and the determining whether to permit establishment of the given communication session includes determining whether an available account balance of the user account permits the given communication session to be established.
  • 12. The method of claim 1, wherein the authenticating the identity of the user of the calling terminal includes receiving a password from the user and verifying that the password corresponds to the authentication information in the unitary logical database.
  • 13. The method of claim 1, wherein the account status information includes information indicating billing arrangements associated with the user account.
  • 14. In a hybrid communications network comprising a circuit switched network and a packet-switched network, wherein the hybrid communications network comprises at least one session control object in a first network domain operated by a first service provider, a method for establishing a given communications session through the session control object comprising: at an authorization and usage recording object in a second network domain operated by a second service provider different than the first service provider, receiving a request to initiate the given communication session between a calling terminal and a called terminal, wherein the calling terminal is communicably coupled to at least one network element in the first network domain, and wherein the request identifies a user account associated with the calling terminal and includes an address of the called terminal, the authorization and usage recording object including a unitary logical database that contains account status information associated with user accounts;at the authorization and usage recording object, determining whether to authorize the establishment of the given communication session through the session control object based on the account status information in the unitary logical database that is associated with the user account;from the authorization and usage recording object, sending a response signal indicating whether establishment of the given communication session through the session control object is authorized; andat the authorization and usage recording object, updating the account status information that is associated with the user account in the unitary logical database based on usage information pertaining to the given communication session;wherein the authorization and usage recording object comprises a single logical object distributed over one or more physical systems.
  • 15. The method of claim 14, further comprising: at the authorization and usage recording object, receiving from the session control object the usage information pertaining to the given communication session, which includes at least one of: initiation of the given communication session, progress of the given communication session, pricing of the given communication session and termination of the given communication session.
  • 16. The method of claim 14, wherein the request to initiate the given communication session is sent from the session control object to the authorization and usage recording object.
  • 17. The method of claim 14, wherein the response signal indicating that establishment of the given communication session is authorized is sent from the authorization and usage recording object to the session control object.
  • 18. The method of claim 14, wherein the account status information in the unitary logical database includes information indicating whether a communications session is in progress that is associated with the user account, and the determining whether to permit establishment of the given communication session is based on whether there is already another communications session that is in progress that is associated with the user account.
  • 19. The method of claim 14, wherein the account status information in the unitary logical database includes an available account balance of the user account, and the determining whether to authorize establishment of the given communication session includes determining whether an available account balance of the user account permits the given communication session to be established.
  • 20. The method of claim 14, wherein each of the multiple physical systems includes an instance of the authorization and usage recording object.
  • 21. The method of claim 14, further comprising: at the authorization and usage recording object, authenticating the identity of a user associated with the calling terminal by accessing authentication information in the unitary logical database.
US Referenced Citations (929)
Number Name Date Kind
4054756 Comella et al. Oct 1977 A
4100377 Flanagan Jul 1978 A
4191860 Weber Mar 1980 A
4201891 Lawrence et al. May 1980 A
4310727 Lawser Jan 1982 A
4313035 Jordon et al. Jan 1982 A
4313036 Jabara et al. Jan 1982 A
4371752 Matthews et al. Feb 1983 A
4375097 Ulug Feb 1983 A
4555594 Friedes et al. Nov 1985 A
4565903 Riley Jan 1986 A
4577066 Bimonte et al. Mar 1986 A
4585906 Matthews et al. Apr 1986 A
4602129 Matthews et al. Jul 1986 A
4609778 Franklin et al. Sep 1986 A
4611094 Asmuth et al. Sep 1986 A
4611096 Asmuth et al. Sep 1986 A
4625081 Lotito et al. Nov 1986 A
4630262 Callens et al. Dec 1986 A
4652700 Matthews et al. Mar 1987 A
4653045 Stanley et al. Mar 1987 A
4672700 Poncy Jun 1987 A
4679190 Dias et al. Jul 1987 A
4685125 Zave Aug 1987 A
4710917 Tompkins et al. Dec 1987 A
4713806 Oberlander et al. Dec 1987 A
4718005 Feigenbaum et al. Jan 1988 A
4730071 Schoenthal Mar 1988 A
4734931 Bourg et al. Mar 1988 A
4741820 Coughlin May 1988 A
4747127 Hansen et al. May 1988 A
4747130 Ho May 1988 A
4748618 Brown et al. May 1988 A
4765924 Inoue Aug 1988 A
4766604 Axberg Aug 1988 A
4771425 Baran et al. Sep 1988 A
4782485 Gollub Nov 1988 A
4788718 McNabb et al. Nov 1988 A
4790003 Kepley Dec 1988 A
4821034 Anderson et al. Apr 1989 A
4827500 Binkerd et al. May 1989 A
4865763 Inoue Sep 1989 A
4866763 Cooper et al. Sep 1989 A
4872157 Hemmady et al. Oct 1989 A
4872159 Hemmady et al. Oct 1989 A
4872160 Hemmady et al. Oct 1989 A
4872197 Pemmaraju Oct 1989 A
4875206 Nichols et al. Oct 1989 A
4877949 Danielson Oct 1989 A
4882476 White Nov 1989 A
4893302 Hemmady et al. Jan 1990 A
4894824 Hemmady et al. Jan 1990 A
4897874 Lidinsky et al. Jan 1990 A
4899333 Roediger Feb 1990 A
4899373 Lee et al. Feb 1990 A
4910794 Mahany Mar 1990 A
4916691 Goodman Apr 1990 A
4918722 Duehren et al. Apr 1990 A
4922348 Gillon et al. May 1990 A
4922486 Lidinsky et al. May 1990 A
4933931 Kokubo Jun 1990 A
4942574 Zelle Jul 1990 A
4958341 Hemmady et al. Sep 1990 A
4969184 Gordon et al. Nov 1990 A
4979206 Padden et al. Dec 1990 A
4996707 O'Malley et al. Feb 1991 A
D315573 Schultz Mar 1991 S
5008906 Reichwein Apr 1991 A
5008926 Misholi Apr 1991 A
5009337 Bimbi Apr 1991 A
5012511 Hanle et al. Apr 1991 A
5018191 Catron May 1991 A
5019699 Koenck May 1991 A
5023868 Davidson Jun 1991 A
5025254 Hess Jun 1991 A
5029196 Morganstein Jul 1991 A
5029199 Jones Jul 1991 A
5029200 Haas Jul 1991 A
5031098 Miller Jul 1991 A
5034975 Grimes Jul 1991 A
5052020 Koenck Sep 1991 A
5052943 Davis Oct 1991 A
5065393 Sibbitt et al. Nov 1991 A
5068888 Scherk et al. Nov 1991 A
5070536 Mahany Dec 1991 A
5098877 Coughlin Mar 1992 A
5107492 Roux et al. Apr 1992 A
5113499 Ankney et al. May 1992 A
5115431 Williams et al. May 1992 A
5115495 Tsuchiya et al. May 1992 A
5123064 Hacker Jun 1992 A
5134647 Pugh et al. Jul 1992 A
5144282 Sutterlin Sep 1992 A
5146488 Okada et al. Sep 1992 A
5146491 Silver Sep 1992 A
5157390 Yoshie et al. Oct 1992 A
5157662 Tadamura et al. Oct 1992 A
5159592 Perkins Oct 1992 A
5159624 Makita Oct 1992 A
5163080 Amoroso Nov 1992 A
5164938 Jurkevich et al. Nov 1992 A
5180232 Chadma Jan 1993 A
5185860 Wu Feb 1993 A
5193110 Jones et al. Mar 1993 A
5195085 Bertsch et al. Mar 1993 A
5195086 Baumgartner et al. Mar 1993 A
5195128 Knitl Mar 1993 A
5195183 Miller Mar 1993 A
5199062 Von Meister et al. Mar 1993 A
5200993 Wheeler et al. Apr 1993 A
5202817 Koenck Apr 1993 A
5202825 Miller Apr 1993 A
5204894 Darden Apr 1993 A
5206901 Harlow et al. Apr 1993 A
5208848 Pula May 1993 A
5215011 Monney Jun 1993 A
5216233 Main Jun 1993 A
5218187 Koenck Jun 1993 A
5218188 Hanson Jun 1993 A
5223699 Flynn et al. Jun 1993 A
5223820 Sutterlin Jun 1993 A
5225071 Coughlin Jul 1993 A
5226075 Funk et al. Jul 1993 A
5227614 Danielson Jul 1993 A
5231492 Dangi et al. Jul 1993 A
5235317 Sutterlin Aug 1993 A
5237604 Ryan Aug 1993 A
5241588 Babson et al. Aug 1993 A
5243645 Bissell et al. Sep 1993 A
5243654 Hunter Sep 1993 A
5247571 Kay et al. Sep 1993 A
5254971 Sutterlin Oct 1993 A
5260986 Pershan Nov 1993 A
5263080 Jones et al. Nov 1993 A
5265155 Castro Nov 1993 A
5272749 Masek Dec 1993 A
5274696 Perelman Dec 1993 A
5280159 Warner Jan 1994 A
5287199 Zoccolillo Feb 1994 A
5289378 Miller Feb 1994 A
5289468 Yoshida Feb 1994 A
5295154 Meier Mar 1994 A
5303297 Hillis Apr 1994 A
5305181 Schultz Apr 1994 A
5308966 Danielson May 1994 A
5309437 Perlman et al. May 1994 A
5311583 Friedes et al. May 1994 A
5313053 Koenck May 1994 A
5317566 Joshi May 1994 A
5317691 Traeger May 1994 A
5318719 Hughes Jun 1994 A
5322991 Hanson Jun 1994 A
5325421 Hou et al. Jun 1994 A
5327421 Hiller et al. Jul 1994 A
5327486 Wolff et al. Jul 1994 A
5329520 Richardson Jul 1994 A
5329578 Brennan et al. Jul 1994 A
5331580 Miller Jul 1994 A
5333266 Boaz Jul 1994 A
5341374 Lewen et al. Aug 1994 A
5345446 Hiller et al. Sep 1994 A
5346611 Coughlin Sep 1994 A
5347633 Ashfield et al. Sep 1994 A
5349497 Hanson Sep 1994 A
5349678 Morris Sep 1994 A
5351286 Nici Sep 1994 A
5353331 Emery et al. Oct 1994 A
5359185 Hanson Oct 1994 A
5361256 Doeringer et al. Nov 1994 A
5365524 Hiller et al. Nov 1994 A
5365546 Koenck Nov 1994 A
5367566 Moe et al. Nov 1994 A
5371858 Miller Dec 1994 A
5375068 Palmer et al. Dec 1994 A
5375159 Williams Dec 1994 A
5377186 Wegner et al. Dec 1994 A
5381465 Carter et al. Jan 1995 A
5384831 Creswell et al. Jan 1995 A
5384840 Blatchford et al. Jan 1995 A
5386467 Ahmad Jan 1995 A
5390175 Hiller et al. Feb 1995 A
5390335 Stephan et al. Feb 1995 A
5392344 Ash et al. Feb 1995 A
5392402 Robrock Feb 1995 A
5394436 Meier Feb 1995 A
5396542 Alger et al. Mar 1995 A
5400393 Knuth Mar 1995 A
5402478 Hluchyj et al. Mar 1995 A
5406557 Baudoin Apr 1995 A
5408237 Patterson et al. Apr 1995 A
5408382 Schultz Apr 1995 A
5410141 Koenck Apr 1995 A
5410754 Koltzbach et al. Apr 1995 A
5416842 Aziz May 1995 A
5418844 Morrisey et al. May 1995 A
5420211 Hughes May 1995 A
5420916 Sekiguchi May 1995 A
5422882 Hiller et al. Jun 1995 A
5422940 Endo et al. Jun 1995 A
5422941 Hasenauer et al. Jun 1995 A
5425028 Britton et al. Jun 1995 A
5425051 Mahany Jun 1995 A
5425085 Weinberger et al. Jun 1995 A
5425090 Orriss Jun 1995 A
5425091 Josephs Jun 1995 A
5426636 Hiller et al. Jun 1995 A
5428608 Freeman et al. Jun 1995 A
5428636 Meier Jun 1995 A
5430719 Weisser, Jr. Jul 1995 A
5430727 Callon Jul 1995 A
5434852 La Porta et al. Jul 1995 A
5434913 Tung et al. Jul 1995 A
5436957 McConnell Jul 1995 A
5436963 Fitzpatrick et al. Jul 1995 A
5440563 Isidoro et al. Aug 1995 A
5440620 Slusky Aug 1995 A
5440621 Castro Aug 1995 A
5442690 Nazif et al. Aug 1995 A
5444709 Riddle Aug 1995 A
5448633 Jamaleddin et al. Sep 1995 A
5450411 Heil Sep 1995 A
5452289 Sharma et al. Sep 1995 A
5452297 Hiller et al. Sep 1995 A
5452350 Reynolds et al. Sep 1995 A
5455821 Schaeffer et al. Oct 1995 A
5457629 Miller Oct 1995 A
5459775 Isono et al. Oct 1995 A
5461611 Drake et al. Oct 1995 A
5463677 Bash et al. Oct 1995 A
5465207 Boatwright Nov 1995 A
5466170 Pavek Nov 1995 A
5468947 Danielson Nov 1995 A
5468950 Hanson Nov 1995 A
5469496 Emery et al. Nov 1995 A
5469497 Pierce et al. Nov 1995 A
5469500 Satter et al. Nov 1995 A
5473608 Gagne et al. Dec 1995 A
5473677 D'Amato et al. Dec 1995 A
5475732 Pester, III Dec 1995 A
5475737 Garner et al. Dec 1995 A
5475748 Jones Dec 1995 A
5475817 Waldo et al. Dec 1995 A
5477531 McKee et al. Dec 1995 A
5479494 Clitherow Dec 1995 A
5481603 Gutierrez et al. Jan 1996 A
5483527 Doshi et al. Jan 1996 A
5483549 Weinberg et al. Jan 1996 A
5483586 Sussman Jan 1996 A
5483587 Hogan et al. Jan 1996 A
5483676 Mahany Jan 1996 A
5487111 Slusky Jan 1996 A
5488575 Danielson Jan 1996 A
5490247 Tung et al. Feb 1996 A
5493568 Sampat et al. Feb 1996 A
5493573 Kobayashi et al. Feb 1996 A
5495521 Rangachar Feb 1996 A
5500859 Sharma et al. Mar 1996 A
5500889 Baker et al. Mar 1996 A
5504746 Meier Apr 1996 A
5506887 Emery et al. Apr 1996 A
5506893 Buscher et al. Apr 1996 A
5511111 Serbetcioglu et al. Apr 1996 A
5513127 Gard et al. Apr 1996 A
5515303 Cargin, Jr. May 1996 A
5517434 Hanson May 1996 A
5517560 Greenspan May 1996 A
5520796 Chen May 1996 A
5521370 Hanson May 1996 A
5521719 Yamada May 1996 A
5521924 Kakuma et al. May 1996 A
5524137 Rhee Jun 1996 A
5524145 Parker Jun 1996 A
5526353 Henley et al. Jun 1996 A
5526416 Dezonno et al. Jun 1996 A
5526489 Nilakantan et al. Jun 1996 A
5528539 Ong Jun 1996 A
5530744 Charalambous et al. Jun 1996 A
5530852 Meske et al. Jun 1996 A
5537470 Lee Jul 1996 A
5539193 Gibbs Jul 1996 A
5539194 Miller Jul 1996 A
5539884 Robrock Jul 1996 A
5539886 Aldred et al. Jul 1996 A
5541398 Hanson Jul 1996 A
5541917 Farris Jul 1996 A
5541927 Kristol et al. Jul 1996 A
5541930 Klingman Jul 1996 A
5544010 Schultz Aug 1996 A
5551025 O'Reilly et al. Aug 1996 A
5551035 Arnold et al. Aug 1996 A
5555276 Koenck Sep 1996 A
5559068 Chen Sep 1996 A
5559721 Ishii Sep 1996 A
5559871 Smith Sep 1996 A
5561670 Hoffert et al. Oct 1996 A
5563882 Bruno et al. Oct 1996 A
5568645 Morris Oct 1996 A
5572583 Wheeler, Jr. et al. Nov 1996 A
5576529 Koenck Nov 1996 A
5579472 Keyworth et al. Nov 1996 A
5583564 Rao Dec 1996 A
5583920 Wheeler, Jr. Dec 1996 A
5583926 Venier et al. Dec 1996 A
5583929 Ardon Dec 1996 A
5586175 Hogan Dec 1996 A
5586177 Farris et al. Dec 1996 A
5587577 Schultz Dec 1996 A
5590127 Bales et al. Dec 1996 A
5590133 Billstrom et al. Dec 1996 A
5590181 Hogan Dec 1996 A
5590346 West Dec 1996 A
5594717 Watanabe et al. Jan 1997 A
5594769 Pellegrino et al. Jan 1997 A
5594784 Velius Jan 1997 A
5594789 Seazholtz et al. Jan 1997 A
5598464 Hess et al. Jan 1997 A
5598487 Hacker Jan 1997 A
5602456 Cargin Feb 1997 A
5602854 Luse Feb 1997 A
5603085 Shedlo Feb 1997 A
5604682 McLaughlin et al. Feb 1997 A
5604737 Iwami et al. Feb 1997 A
5608446 Carr et al. Mar 1997 A
5608447 Farry et al. Mar 1997 A
5608782 Carlsen et al. Mar 1997 A
5608786 Gordon Mar 1997 A
5610910 Focsaneanu et al. Mar 1997 A
5610972 Emery et al. Mar 1997 A
5610976 Uota et al. Mar 1997 A
5610977 Williams et al. Mar 1997 A
5615251 Hogan Mar 1997 A
5617343 Danielson Apr 1997 A
5617422 Litzenberger et al. Apr 1997 A
5617540 Civanlar et al. Apr 1997 A
5619555 Fenton et al. Apr 1997 A
5619557 Van Berkum Apr 1997 A
5619562 Maurer et al. Apr 1997 A
5621787 McKoy et al. Apr 1997 A
5623601 Vu Apr 1997 A
5625180 Hanson Apr 1997 A
5625404 Grady et al. Apr 1997 A
5625407 Biggs et al. Apr 1997 A
5625555 Davis Apr 1997 A
5625675 Katsumaru et al. Apr 1997 A
5625677 Feiertag et al. Apr 1997 A
5625681 Butler, II Apr 1997 A
5625682 Gray et al. Apr 1997 A
5626682 Kobari et al. May 1997 A
5627886 Bowman May 1997 A
5633916 Goldhagen et al. May 1997 A
5633919 Hogan May 1997 A
5636216 Fox et al. Jun 1997 A
5638430 Hogan Jun 1997 A
5640001 Danielson Jun 1997 A
5644471 Schultz Jul 1997 A
5646982 Hogan et al. Jul 1997 A
5651006 Fujino et al. Jul 1997 A
5652787 O'Kelly Jul 1997 A
5654957 Koyama Aug 1997 A
5657250 Park et al. Aug 1997 A
5657317 Mahany Aug 1997 A
5661197 Villiger et al. Aug 1997 A
5661782 Bartholomew et al. Aug 1997 A
5661790 Hsu Aug 1997 A
5661792 Akinpelu et al. Aug 1997 A
5663208 Martin Sep 1997 A
5664005 Emery et al. Sep 1997 A
5664102 Faynberg Sep 1997 A
5668857 McHale Sep 1997 A
5669062 Olds et al. Sep 1997 A
5671436 Morris et al. Sep 1997 A
5672860 Miller et al. Sep 1997 A
5673031 Meier Sep 1997 A
5673080 Biggs et al. Sep 1997 A
5673263 Basso et al. Sep 1997 A
5675507 Bobo Oct 1997 A
5675741 Aggarwal et al. Oct 1997 A
5679943 Koenck Oct 1997 A
5680392 Semaan Oct 1997 A
5680442 Bartholomew et al. Oct 1997 A
5680446 Fleischer et al. Oct 1997 A
5680633 Koenck Oct 1997 A
5682379 Mahany Oct 1997 A
5687167 Bertin et al. Nov 1997 A
5689550 Garson et al. Nov 1997 A
5689553 Ahuja et al. Nov 1997 A
5692039 Brankley et al. Nov 1997 A
5694318 Miller Dec 1997 A
5694463 Christie et al. Dec 1997 A
5696903 Mahany Dec 1997 A
5699089 Murray Dec 1997 A
5699352 Kriete et al. Dec 1997 A
5699528 Hogan Dec 1997 A
5701295 Bales et al. Dec 1997 A
5701465 Baugher et al. Dec 1997 A
5703935 Raissyan et al. Dec 1997 A
5703942 Pinard et al. Dec 1997 A
5706286 Reiman et al. Jan 1998 A
5708680 Gollnick Jan 1998 A
5708833 Kinney Jan 1998 A
5710728 Danielson Jan 1998 A
5710884 Dedrick Jan 1998 A
5712903 Bartholomew et al. Jan 1998 A
5712906 Grady et al. Jan 1998 A
5712907 Wegner et al. Jan 1998 A
5712908 Brinkman et al. Jan 1998 A
5719854 Choudhury et al. Feb 1998 A
5722067 Fougnies Feb 1998 A
5724355 Bruno et al. Mar 1998 A
5724406 Juster Mar 1998 A
5724412 Srinivasan Mar 1998 A
5726984 Kubler et al. Mar 1998 A
5727002 Miller et al. Mar 1998 A
5727129 Barrett et al. Mar 1998 A
5729544 Lev et al. Mar 1998 A
5729599 Plomondon et al. Mar 1998 A
5732078 Arango Mar 1998 A
5732213 Gessel et al. Mar 1998 A
5737333 Civanlar et al. Apr 1998 A
5737395 Irribarren Apr 1998 A
5737404 Segal Apr 1998 A
5737414 Walker et al. Apr 1998 A
5740075 Bigham et al. Apr 1998 A
5740164 Liron Apr 1998 A
5740366 Mahany Apr 1998 A
5742596 Baratz et al. Apr 1998 A
5742668 Pepe et al. Apr 1998 A
5742670 Bennett Apr 1998 A
5742675 Kilander et al. Apr 1998 A
5742905 Pepe et al. Apr 1998 A
5744533 Iwamoto et al. Apr 1998 A
5747785 Miller May 1998 A
5747786 Cargin, Jr. May 1998 A
5748104 Argyroudis et al. May 1998 A
5748468 Notenboom et al. May 1998 A
5748619 Meier May 1998 A
5751706 Land et al. May 1998 A
5751707 Voit et al. May 1998 A
5751961 Smyk May 1998 A
5754639 Flockhart et al. May 1998 A
5754641 Voit et al. May 1998 A
5757784 Liebowitz et al. May 1998 A
5758281 Emery et al. May 1998 A
5761294 Shaffer et al. Jun 1998 A
5763867 Main Jun 1998 A
5764741 Barak Jun 1998 A
5768513 Kuthyar et al. Jun 1998 A
5774530 Montgomery et al. Jun 1998 A
5774533 Patel Jun 1998 A
5774535 Castro Jun 1998 A
5774660 Brendel et al. Jun 1998 A
5774695 Autrey et al. Jun 1998 A
5778313 Fougnies Jul 1998 A
5781550 Templin et al. Jul 1998 A
5781620 Montgomery et al. Jul 1998 A
5781624 Mitra et al. Jul 1998 A
5784617 Greenstein et al. Jul 1998 A
5787160 Chaney et al. Jul 1998 A
5790172 Imanaka Aug 1998 A
5790536 Mahany Aug 1998 A
5790548 Sistani zadeh et al. Aug 1998 A
5790806 Koperda Aug 1998 A
5793762 Penners et al. Aug 1998 A
5793763 Mayes et al. Aug 1998 A
5793771 Darland et al. Aug 1998 A
5796790 Brunner Aug 1998 A
5799072 Vulcan et al. Aug 1998 A
5799156 Hogan Aug 1998 A
5802502 Gell et al. Sep 1998 A
5802510 Jones Sep 1998 A
5802513 Bowie, III Sep 1998 A
5804805 Koenck Sep 1998 A
5805474 Danielson Sep 1998 A
5805587 Norris Sep 1998 A
5805682 Voit et al. Sep 1998 A
5805807 Hanson Sep 1998 A
5809128 McMullin Sep 1998 A
5809279 Oeda et al. Sep 1998 A
5812534 Davis et al. Sep 1998 A
5812639 Bartholomew et al. Sep 1998 A
5812652 Jodoin et al. Sep 1998 A
5812795 Horovitz et al. Sep 1998 A
5812834 Suzuki Sep 1998 A
5812865 Theimer et al. Sep 1998 A
5818836 DuVal Oct 1998 A
5818921 Vander Meiden et al. Oct 1998 A
5825780 Christie Oct 1998 A
5825862 Voit et al. Oct 1998 A
5825863 Walker Oct 1998 A
5825869 Brooks et al. Oct 1998 A
5826268 Schaefer et al. Oct 1998 A
5828737 Sawyer Oct 1998 A
5828740 Khuc et al. Oct 1998 A
5828844 Civanlar et al. Oct 1998 A
5832197 Houji Nov 1998 A
5834753 Danielson Nov 1998 A
5835723 Andrews et al. Nov 1998 A
5838665 Kahn et al. Nov 1998 A
5838682 Dekelbaum et al. Nov 1998 A
5838686 Ozkan Nov 1998 A
5838970 Thomas Nov 1998 A
5841764 Roderique et al. Nov 1998 A
5844893 Gollnick Dec 1998 A
5844896 Marks et al. Dec 1998 A
5845267 Ronen Dec 1998 A
5848143 Andrews et al. Dec 1998 A
5850358 Danielson Dec 1998 A
5850433 Rondeau Dec 1998 A
5854833 Hogan Dec 1998 A
5854975 Fougnies Dec 1998 A
5856364 Martin Jan 1999 A
5862171 Mahany Jan 1999 A
5864604 Moen et al. Jan 1999 A
5864610 Ronen Jan 1999 A
5867495 Elliott et al. Feb 1999 A
5867562 Scherer Feb 1999 A
5867566 Hogan Feb 1999 A
5870565 Glitho Feb 1999 A
5873099 Hogan Feb 1999 A
5878126 Velamuri et al. Mar 1999 A
5878130 Andrews et al. Mar 1999 A
5878212 Civanlar et al. Mar 1999 A
5881134 Foster et al. Mar 1999 A
5883891 Williams et al. Mar 1999 A
5884032 Bateman et al. Mar 1999 A
5888087 Hanson Mar 1999 A
5889774 Mirashrafi et al. Mar 1999 A
5889958 Willens Mar 1999 A
5892754 Kompella et al. Apr 1999 A
5892822 Gottlieb et al. Apr 1999 A
5892971 Danielson Apr 1999 A
5894595 Foladare et al. Apr 1999 A
5895431 Miller Apr 1999 A
5895906 Danielson Apr 1999 A
5898668 Shaffer Apr 1999 A
5898673 Riggan et al. Apr 1999 A
5901140 Van As et al. May 1999 A
5903558 Jones et al. May 1999 A
5905736 Ronen et al. May 1999 A
5907547 Foladare et al. May 1999 A
5907678 Housel et al. May 1999 A
5910946 Csapo Jun 1999 A
5912887 Sehgal Jun 1999 A
5914481 Danielson Jun 1999 A
5915001 Uppaluru Jun 1999 A
5915005 He Jun 1999 A
5915008 Dulman Jun 1999 A
5915012 Miloslavsky Jun 1999 A
5917175 Miller Jun 1999 A
5917424 Goldman et al. Jun 1999 A
5918179 Foladare et al. Jun 1999 A
5923659 Curry et al. Jul 1999 A
5926482 Christie Jul 1999 A
5928292 Miller Jul 1999 A
5930343 Vasquez Jul 1999 A
5930700 Pepper Jul 1999 A
5933425 Iwata Aug 1999 A
5936958 Soumiya et al. Aug 1999 A
5937045 Yaoya et al. Aug 1999 A
5940479 Guy et al. Aug 1999 A
5940598 Strauss et al. Aug 1999 A
5940616 Wang Aug 1999 A
5940771 Gollnick Aug 1999 A
5944795 Civanlar Aug 1999 A
5946299 Blonder Aug 1999 A
5946386 Rogers et al. Aug 1999 A
5949056 White Sep 1999 A
5949776 Mahany Sep 1999 A
5949869 Sink Sep 1999 A
5953322 Kimball Sep 1999 A
5953338 Ma et al. Sep 1999 A
5953504 Sokal et al. Sep 1999 A
5953651 Lu et al. Sep 1999 A
5956391 Melen et al. Sep 1999 A
5956482 Agraharam et al. Sep 1999 A
5956697 Usui Sep 1999 A
5958016 Chang et al. Sep 1999 A
5958052 Bellovin et al. Sep 1999 A
5959998 Takahashi et al. Sep 1999 A
5962837 Main Oct 1999 A
5966431 Reiman et al. Oct 1999 A
5966434 Schafer et al. Oct 1999 A
5969321 Danielson Oct 1999 A
5970065 Miloslavsky Oct 1999 A
5970477 Roden Oct 1999 A
5974043 Solomon Oct 1999 A
5974052 Johnson et al. Oct 1999 A
5978569 Traeger Nov 1999 A
5978840 Nguyen et al. Nov 1999 A
5979768 Koenck Nov 1999 A
5982774 Foladare et al. Nov 1999 A
5987108 Jagadish et al. Nov 1999 A
5987499 Morris Nov 1999 A
5991291 Asai et al. Nov 1999 A
5991292 Focsaneanu et al. Nov 1999 A
5991301 Christie Nov 1999 A
5991308 Fuhrmann et al. Nov 1999 A
5991864 Kinney Nov 1999 A
5995503 Crawley et al. Nov 1999 A
5995606 Civanlar et al. Nov 1999 A
5995608 Detampel et al. Nov 1999 A
5999524 Corbalis et al. Dec 1999 A
5999525 Krishnaswamy Dec 1999 A
6005926 Mashinsky Dec 1999 A
6006100 Koenck Dec 1999 A
6006253 Kumar et al. Dec 1999 A
6011975 Emery et al. Jan 2000 A
6012088 Li et al. Jan 2000 A
6014379 White et al. Jan 2000 A
6014687 Watanabe et al. Jan 2000 A
6016307 Kaplan et al. Jan 2000 A
6016343 Hogan Jan 2000 A
6018360 Stewart et al. Jan 2000 A
6018567 Dulman Jan 2000 A
6021126 White et al. Feb 2000 A
6021263 Kujoory et al. Feb 2000 A
6023147 Cargin Feb 2000 A
6023474 Gardner et al. Feb 2000 A
6026087 Mirashrafi et al. Feb 2000 A
6026091 Christie Feb 2000 A
6028858 Rivers et al. Feb 2000 A
6029062 Hanson Feb 2000 A
6029261 Hartmann Feb 2000 A
6031840 Christie Feb 2000 A
6035028 Ward et al. Mar 2000 A
6036093 Schultz Mar 2000 A
6041109 Cardy et al. Mar 2000 A
6041117 Androski et al. Mar 2000 A
6044081 Bell et al. Mar 2000 A
6046992 Meier Apr 2000 A
6047051 Ginzboorg et al. Apr 2000 A
6047326 Kilkki Apr 2000 A
6049545 Stephenson et al. Apr 2000 A
6049813 Danielson Apr 2000 A
6052445 Bashoura et al. Apr 2000 A
6052450 Allison et al. Apr 2000 A
6058000 Koenck May 2000 A
6064653 Farris May 2000 A
6069890 White et al. May 2000 A
6075783 Voit Jun 2000 A
6078582 Curry et al. Jun 2000 A
6078943 Yu Jun 2000 A
6081525 Christie Jun 2000 A
6084867 Meier Jul 2000 A
6084953 Bardenheuer et al. Jul 2000 A
6088431 LaDue Jul 2000 A
6097804 Gilbert et al. Aug 2000 A
6098094 Barnhouse et al. Aug 2000 A
6101182 Sistanizadeh et al. Aug 2000 A
6104645 Ong Aug 2000 A
6104704 Buhler et al. Aug 2000 A
6104711 Voit Aug 2000 A
6108341 Christie Aug 2000 A
6108704 Hutton Aug 2000 A
6112206 Morris Aug 2000 A
6115458 Taskett Sep 2000 A
6115737 Ely et al. Sep 2000 A
6118936 Lauer et al. Sep 2000 A
6122255 Bartholomew et al. Sep 2000 A
6125113 Farris et al. Sep 2000 A
6125126 Hallenstal Sep 2000 A
6128304 Gardell Oct 2000 A
6131121 Mattaway Oct 2000 A
6134235 Goldman et al. Oct 2000 A
6134433 Joong et al. Oct 2000 A
6134530 Bunting et al. Oct 2000 A
6137792 Jonas et al. Oct 2000 A
6137869 Voit et al. Oct 2000 A
6141404 Westerlage et al. Oct 2000 A
6141412 Smith et al. Oct 2000 A
6144647 Lopez-Torres Nov 2000 A
6144661 Katsube et al. Nov 2000 A
6144667 Doshi et al. Nov 2000 A
6144976 Silva Nov 2000 A
6149062 Danielson Nov 2000 A
6154445 Farris et al. Nov 2000 A
6154777 Ebrahim Nov 2000 A
6157621 Brown et al. Dec 2000 A
6157636 Voit et al. Dec 2000 A
6157648 Voit et al. Dec 2000 A
6157823 Fougnies Dec 2000 A
6163536 Dunn et al. Dec 2000 A
6169735 Allen et al. Jan 2001 B1
6175618 Shah et al. Jan 2001 B1
6181690 Civanlar Jan 2001 B1
6181695 Curry et al. Jan 2001 B1
6181703 Christie Jan 2001 B1
6185184 Mattaway Feb 2001 B1
6185198 LaDue Feb 2001 B1
6188677 Oyama et al. Feb 2001 B1
6192050 Stovall Feb 2001 B1
6192400 Hanson Feb 2001 B1
6195425 Farris et al. Feb 2001 B1
6198738 Chang et al. Mar 2001 B1
6201812 Christie Mar 2001 B1
6205139 Voit Mar 2001 B1
6212162 Horlin Apr 2001 B1
6212193 Christie Apr 2001 B1
6215790 Voit et al. Apr 2001 B1
6222919 Hollatz et al. Apr 2001 B1
6226273 Busuioc et al. May 2001 B1
6226287 Brady May 2001 B1
6226678 Mattaway May 2001 B1
6230203 Koperda et al. May 2001 B1
6233318 Picard et al. May 2001 B1
6233604 Van Horne et al. May 2001 B1
6236851 Fougnies May 2001 B1
6240091 Ginzboorg et al. May 2001 B1
6243373 Turock Jun 2001 B1
6243374 White Jun 2001 B1
6252869 Silverman Jun 2001 B1
6260067 Barnhouse et al. Jul 2001 B1
6263372 Hogan Jul 2001 B1
6266685 Danielson Jul 2001 B1
6278693 Aldred et al. Aug 2001 B1
6278704 Creamer et al. Aug 2001 B1
6279038 Hogan Aug 2001 B1
6282192 Murphy et al. Aug 2001 B1
6282281 Low Aug 2001 B1
6282284 Dezonno et al. Aug 2001 B1
6282574 Voit et al. Aug 2001 B1
6285745 Bartholomew et al. Sep 2001 B1
6289010 Voit et al. Sep 2001 B1
6292478 Farris Sep 2001 B1
6292479 Bartholomew et al. Sep 2001 B1
6292481 Voit et al. Sep 2001 B1
6295292 Voit et al. Sep 2001 B1
6298057 Guy Oct 2001 B1
6298062 Gardell et al. Oct 2001 B1
6298064 Christie Oct 2001 B1
6298120 Civanlar et al. Oct 2001 B1
6301609 Aravamudan et al. Oct 2001 B1
6304566 Schessel Oct 2001 B1
6304567 Rosenberg Oct 2001 B1
6310873 Rainis et al. Oct 2001 B1
6310941 Crutcher et al. Oct 2001 B1
6314103 Medhat et al. Nov 2001 B1
6324264 Wiener et al. Nov 2001 B1
6327258 Deschaine et al. Dec 2001 B1
6330250 Curry et al. Dec 2001 B1
6332023 Porter et al. Dec 2001 B1
6335927 Elliott Jan 2002 B1
6343115 Foladare et al. Jan 2002 B1
6347085 Kelly Feb 2002 B2
6359880 Curry Mar 2002 B1
6363065 Thornton et al. Mar 2002 B1
6363349 Urs et al. Mar 2002 B1
6373929 Johnson et al. Apr 2002 B1
6374302 Galasso et al. Apr 2002 B1
6375344 Hanson Apr 2002 B1
6381321 Brown et al. Apr 2002 B1
6385191 Coffman et al. May 2002 B1
6385193 Civanlar et al. May 2002 B1
6400702 Meier Jun 2002 B1
6407991 Meier Jun 2002 B1
6430195 Christie Aug 2002 B1
6430275 Voit et al. Aug 2002 B1
6438218 Farris Aug 2002 B1
6449259 Allain et al. Sep 2002 B1
6449356 Dezonno Sep 2002 B1
6456617 Oda et al. Sep 2002 B1
6480588 Donovan Nov 2002 B1
6493353 Kelly et al. Dec 2002 B2
6498788 Emilsson et al. Dec 2002 B1
6501753 Lin et al. Dec 2002 B1
6513066 Hutton Jan 2003 B1
6515968 Combar et al. Feb 2003 B1
6529516 Parzych Mar 2003 B1
6539015 Voit et al. Mar 2003 B2
6539077 Ranalli et al. Mar 2003 B1
6542497 Curry Apr 2003 B1
6546003 Farris Apr 2003 B1
6546005 Berkley et al. Apr 2003 B1
6553108 Felger Apr 2003 B1
6570871 Schneider May 2003 B1
6574216 Farris et al. Jun 2003 B1
6574681 White Jun 2003 B1
6584093 Salama et al. Jun 2003 B1
6594254 Kelly Jul 2003 B1
6600733 Deng Jul 2003 B2
6600735 Iwama et al. Jul 2003 B1
6614768 Mahany Sep 2003 B1
6614781 Elliott Sep 2003 B1
6621942 Hacker Sep 2003 B1
6625170 Curry Sep 2003 B1
6633846 Bennett Oct 2003 B1
6643362 Hogan Nov 2003 B2
6654357 Wiedeman Nov 2003 B1
6671285 Kirkby et al. Dec 2003 B1
6678718 Khouri et al. Jan 2004 B1
6681994 Koenck Jan 2004 B1
6687738 Hutton Feb 2004 B1
6688523 Koenck Feb 2004 B1
6690788 Bauer et al. Feb 2004 B1
6694359 Morris Feb 2004 B1
6701365 Hutton Mar 2004 B1
6704287 Moharram Mar 2004 B1
6711241 White et al. Mar 2004 B1
6714559 Meier Mar 2004 B1
6714983 Koenck Mar 2004 B1
6731625 Eastep et al. May 2004 B1
6735191 Hosein May 2004 B1
6754181 Elliott et al. Jun 2004 B1
6760429 Hung et al. Jul 2004 B1
6775519 Wiedeman et al. Aug 2004 B1
6778651 Jost et al. Aug 2004 B1
6792256 Kinney Sep 2004 B1
6798786 Lo et al. Sep 2004 B1
6810033 Derks Oct 2004 B2
6823384 Wilson et al. Nov 2004 B1
6826165 Meier Nov 2004 B1
6829645 Hutton Dec 2004 B1
6839340 Voit et al. Jan 2005 B1
6870827 Voit et al. Mar 2005 B1
6885678 Curry et al. Apr 2005 B2
6895419 Cargin May 2005 B1
6910632 Koerck Jun 2005 B2
6925054 Atterton et al. Aug 2005 B1
6963582 Xu Nov 2005 B1
6990090 Meier Jan 2006 B2
7012898 Farris et al. Mar 2006 B1
7013001 Felger et al. Mar 2006 B1
7079534 Medhat Jul 2006 B1
7085362 Christie Aug 2006 B1
7088705 Curry Aug 2006 B2
7092379 Singh et al. Aug 2006 B1
7120319 Danielson Oct 2006 B2
7145898 Elliott Dec 2006 B1
7149208 Mattaway Dec 2006 B2
7170887 Rosenberg Jan 2007 B2
7206592 Gollnick Apr 2007 B1
7236575 Kim et al. Jun 2007 B2
7260060 Abaye et al. Aug 2007 B1
7269247 Mashinsky Sep 2007 B2
7274662 Kalmanek, Jr. et al. Sep 2007 B1
7286562 Vargo et al. Oct 2007 B1
7295830 Lippelt Nov 2007 B2
7359972 Jorgensen Apr 2008 B2
7492886 Kalmanek et al. Feb 2009 B1
7502339 Pirkola et al. Mar 2009 B1
7646743 Kubler et al. Jan 2010 B2
7693062 Perkins et al. Apr 2010 B2
7797236 Liu et al. Sep 2010 B1
7948968 Voit et al. May 2011 B2
20020006137 Rabenko et al. Jan 2002 A1
20020064149 Elliott May 2002 A1
20020067739 Wilkes et al. Jun 2002 A1
20020083166 Dugan et al. Jun 2002 A1
20020114324 Low et al. Aug 2002 A1
20020133412 Oliver et al. Sep 2002 A1
20020159461 Hamamoto et al. Oct 2002 A1
20030078006 Mahany Apr 2003 A1
20030112767 Meier Jun 2003 A1
20030169767 Christie Sep 2003 A1
20030189941 Christie Oct 2003 A1
20030193933 Jones Oct 2003 A1
20030198218 Farris et al. Oct 2003 A1
20030198335 Porter et al. Oct 2003 A1
20040005046 Deo et al. Jan 2004 A1
20040013253 Hogan et al. Jan 2004 A1
20040018851 Koenck Jan 2004 A1
20040022379 Klos et al. Feb 2004 A1
20040023651 Gollnick Feb 2004 A1
20040038717 Mahany Feb 2004 A1
20040039846 Goss et al. Feb 2004 A1
20040044667 Mahany Mar 2004 A1
20040073933 Gollnick Apr 2004 A1
20040090952 Kubler May 2004 A1
20040093363 Cargin May 2004 A1
20040114567 Kubler Jun 2004 A1
20040125753 Mahany Jul 2004 A1
20040131018 Johnson et al. Jul 2004 A1
20040145775 Kubler Jul 2004 A1
20040146020 Kubler Jul 2004 A1
20040146037 Kubler Jul 2004 A1
20040151150 Kubler Aug 2004 A1
20040151151 Kubler Aug 2004 A1
20040151164 Kubler Aug 2004 A1
20040160912 Kubler Aug 2004 A1
20040160913 Kubler Aug 2004 A1
20040162889 Morris Aug 2004 A1
20040165573 Kubler Aug 2004 A1
20040165793 Hacker Aug 2004 A1
20040166895 Koenck Aug 2004 A1
20040169583 Meier Sep 2004 A1
20040174841 Kubler Sep 2004 A1
20040174842 Kubler Sep 2004 A1
20040174843 Kubler Sep 2004 A1
20040203834 Mahany Oct 2004 A1
20040246940 Kubler Dec 2004 A1
20040264442 Kubler Dec 2004 A1
20050008002 Kubler Jan 2005 A1
20050013266 Kubler Jan 2005 A1
20050021713 Dugan et al. Jan 2005 A1
20050036467 Kubler Feb 2005 A1
20050078647 Meier Apr 2005 A1
20050083872 Kubler Apr 2005 A1
20050087603 Mahany Apr 2005 A1
20050138398 Hansen Jun 2005 A1
20050191989 Plush et al. Sep 2005 A1
20050195859 Mahany Sep 2005 A1
20050232213 Meier Oct 2005 A1
20050242192 Koenck Nov 2005 A1
20050254475 Kubler Nov 2005 A1
20060007951 Meier Jan 2006 A1
20060062240 Meier Mar 2006 A1
20060131420 Koenck Jun 2006 A1
20060233161 Koenck Oct 2006 A1
20060251226 Hogan Nov 2006 A1
20060268806 Meier Nov 2006 A1
20060268807 Meier Nov 2006 A1
20060274732 Allen et al. Dec 2006 A1
20060274735 Allen et al. Dec 2006 A1
20060291752 Hacker Dec 2006 A1
20070001007 Koenck Jan 2007 A1
20070007353 Danielson Jan 2007 A1
20070065046 Hacker Mar 2007 A1
20070076687 Low et al. Apr 2007 A1
20070086445 Mattaway Apr 2007 A1
20070121529 Meier May 2007 A1
20070121591 Donovan May 2007 A1
20070201515 Lewis Aug 2007 A1
20070206576 Radulovic Sep 2007 A1
20070263644 Christie et al. Nov 2007 A1
20080013531 Elliott et al. Jan 2008 A1
20080063161 Joyce et al. Mar 2008 A1
20080232509 Jonsson et al. Sep 2008 A1
20090022147 Farris et al. Jan 2009 A1
20110004808 Anandakumer et al. Jan 2011 A1
Foreign Referenced Citations (37)
Number Date Country
0235257 Feb 1987 EP
0235057 Sep 1987 EP
0335562 Oct 1989 EP
0365885 May 1990 EP
0381365 Aug 1990 EP
0559979 Sep 1993 EP
0729281 Feb 1995 EP
0767568 Oct 1995 EP
0802690 Apr 1996 EP
0722237 Jul 1996 EP
0781016 Jun 1997 EP
0812089 Dec 1997 EP
0823809 Feb 1998 EP
09-168051 Jun 1997 JP
09-168063 Jun 1997 JP
09168064 Jun 1997 JP
09-168065 Jun 1997 JP
09-172459 Jun 1997 JP
09-172462 Jun 1997 JP
9107839 May 1991 WO
9411813 May 1994 WO
9522221 Aug 1995 WO
9529564 Nov 1995 WO
9620448 Jul 1996 WO
9620553 Jul 1996 WO
9632800 Oct 1996 WO
9634341 Oct 1996 WO
9638018 Nov 1996 WO
9714238 Apr 1997 WO
9720424 Jun 1997 WO
9722211 Jun 1997 WO
9723078 Jun 1997 WO
9728628 Aug 1997 WO
9733412 Sep 1997 WO
9812860 Mar 1998 WO
9823080 May 1998 WO
9834391 Aug 1998 WO
Non-Patent Literature Citations (361)
Entry
U.S. Appl. No. 60/023,891, filed Aug. 16, 1996.
Mills, M. (Mar. 8, 1996) “Freebie Heebie-Jeebies: New Long-Distance Calling via the Internet Scares Small Phone Firms”, The Washington Post, sec. F, pp. 1-2.
Hughes, D.T. (Feb. 21, 1995) “What Hath (Net) God Wrought?”, The Journal [Fairfax, Virginia], sec. B, pp. 1-2.
Hughes, D.T. (May 28, 1996) “WebPhone Heading for Serious Telephony”, The Journal, [Fairfax, Virginia], sec. A, p. 8.
Mills, M. (Jan. 23, 1996) “It's the Net's Best Thing to Being There: With Right Software, Computer Becomes Toll-Free Telephone”, The Washington Post, sec. C, pp. 1,5.
Hughes, D.T. (Jan. 2, 1996) “Internet Phone Wars Heating Up: Companies Improve and Encourage Users to Test Products”, The Journal, [Fairfax, Virginia], sec. A, p. 6.
Yang, C. (Feb. 12, 1995), INETPhone: Telephone Services and Serves on Internet. http://ds.internic.net/rfc/rfc/rfc1789.txt.
Kuehn, Richard A. (Jul. 1994) “The Voice of Technology”, [Online text only] Credit World, vol. 82, No. 6, pp. 20-23.
Margulies, Edwin (Aug. 1996) Understanding the Voice-Enabled Internet, Flatiron Publishing, Inc., pp. 4-42 and 12-1 to 12-3.
C. Low, “The Internet Telephony Red Herring,” Hewlett-Packard Laboratories, (May 15, 1996), pp. 1-15.
C. Low et al., WebIN—an architecture for fast deployment of IN-based personal services, Intelligent Network Workshop, 1996, IN '96, IEEE, (Apr. 21-24, 1996), vol. 2, 196+258.
Cady et al., “Mastering the Internet”, Sybex Inc., Alameda, CA 1994, ISBN 94-69309.
Stevens, “TCPIP Illustrated”, vol. 1, 1994, Addison-Wesley, pp. 12-122 and inside cover.
Keiser et al., “Digital Telephony and Network Integration”, 1995, Chapman Hall, Second Edition, pp. 426-428.
Chopra, Manvinder, Exploring Intelligent Peripheral Configuration, Universal Personal Communications, 1994. Record., 1994 Third Annual International Conference on, Sep. 27-Oct. 1, 1994, pp. 635-639.
Weisser et al. “The Intelligence Network and Forward-Looking Technology” IEEE COMM magazine, Dec. 1988, pp. 64-69.
Shah et al. “Application of a New Network Concept for Faster Service Deployment” International Conference on COMM. 88 Jun. 12-15, 1988, IEEE Comm. Soc. Conference. Record, vol. 3, pp. 1327-1329.
Audio Messaging Interchange Specification (AMIS)—Analog Protocol, Version 1, Issue 2, Feb. 1992.
Jabbari, B., “Common Channel Signaling System No. 7 for ISDN and Intelligent Network”, Proceedings of the IEEE, vol. 79, No. 2, Feb. 1991, pp. 155-169.
“Supercharging the Web with Computer Telephony”, CT and the 'Net, Mar. 1996.
“Audio and Video Over the Internet”, CT and the 'Net, Computer Telephony, Mar. 1996.
Grigonis, Richard, “Computer Telephony Over The Internet”, CT and the Net, Mar. 1996.
“Geek of the Week”, Kern, Phil et. al., Internet Talk Radio, Mobile IP Networking, Nov. 1993.
McConnell, Brian, “How to Build an Internet PBX”, Pacific Telephony Design, printed from http://www.phonezone.com/ip-phone.htm Mar. 5, 1997.
“Welcome to the Phone Zone”, Pacific Telephony Design, http://www.phonezone.com/index2.htm, pp. 1-6.
Sears, Andrew, “Innovations in Internet Telephony: The Internet as the Competitor to The Pots Network”, Innovations in Internet Telephony: The Internet as the Successor to the Pots Network, Feb. 28, 1996, pp. 1-6.
“Computer Telephony and The Internet”, Stylus Innovation, http://www.stylus.com/hvml.htm.
Hedrick, C., “Routing Information Protocol”, Jun. 1988, http://www.internic.net/rfc/rfc1058.txt, pp. 1-30.
Mills, D.L., “An Experimental Multiple-Path Routing Algorithm”, Mar. 1986, http://www.internic.net/rfc/rfc981.txt, pp. 1-20.
Lougheed et al., “A Border Gateway Protocol (BGP)”, Jun. 1990, http://www.internic.net/rfc/rfc1163.txt, pp. 1-26.
S. Deering, “Host Extensions for IP Multicasting”, Aug. 1989, http://www.internic.net/rfc/rfc1112.txt, pp. 1-16.
Waitzman et al., “Distance Vector Multicast Routing Protocol”, Nov. 1988, http://www.internic.net/rfc/rfc1075.txt, pp. 1-22.
Hinden et al., “The DARPA Internet Gateway”, Sep. 1982, http://www.internic.net/rfc/rfc823.txt, pp. 1-41.
“VocalTec's Telephony Gateway—The Ultimate Internet Telephony Solution?,” Computer Telephony Magazine, Sep. 1996.
“A Call to Phones,” Wired Magazine, Issue 4.03, http://www.wired.com/wired/archive/4.03/updata.html (Mar. 1996).
Mascoli, Cicchetti & Listanti, “Alternative Scenarios for Data Applications Via Internet-Mobile and DECT-ATM Interworkin,” 4th IEEE International Conference on Universal Personal Communications, pp. 788-792, Nov. 6-10, 1995 published Apr. 1995.
Blackwell et al, “Secure Short-Cut Routing for Mobile IP,” USENIX Summary 1994 Technical Conferences, Jun. 6-10, 1994.
Okada et al. “Mobile Communication Using PHS [Personal Handy Phone System] Communications Server,” National Technical Report, vol. 42, No. 1, pp. 46-54 (Feb. 1996).
Sattler, Michael, “Nautilus Voice Encryption,” May 10, 1995.
Chemov , Andrey A. “SpeakFreely” software, Apr. 18. 1996.
“Netspeak Corporation Introduces Webphone, Industry's First Internet-Based Telephony Solution for Business Users,” PC Forum, Mar. 18, 1996.
“Free World Dialup Beta 2.0a Client,” Feb. 12, 1996.
Kahane et al., “VocalTec IP Forum Contribution”, VocalTec Inc., Seattle, WA, Jan. 15, 1997.
Handley et al., “SIP: Session Initiation Protocol”, Internet. Engineering Task Force, Internet Draft, Jul. 31, 1997, draft-ietf-mmusic-sip-03.txt, Jul. 31, 1997.
“Internet Telephony for Dummies” 2nd Edition, Chapters 14-16, 1997.
Kahane et al., “Call Management Agent System Specification” VoIP Forum Technical Committee, Aug. 14, 1996.
IMTC Voice over IP Forum Service Interoperability Implementation Agreement, Draft 0.91, Document VoIP-008, Jan. 13, 1997.
Sebestyn, I., ITU Telecommunication Standardization Sector, Study Group 15, Q;2&3/15 Rapporteur Meeting, Document AVC-1086, v1, Dec. 5, 1996.
Oppen et al., “The Clearinghouse: A Decentralized Agent for Locating Named Objects in a Distributed Environment”, ACM Transactions on Office Information Systems, vol. 1, No. 3, Jul. 1983, pp. 230-253.
Anthony R. Noerpel et al., “PACS: Personal Access Communications System—A Tutorial,” IEEE Personal Communications, Jun. 1996.
Vijay K. Varma et al., “Architecture for Interworking Data over PCS,” IEEE Communications Magazine, Sep. 1996, 124-130.
Jonathan Rosenberg et al., “SIP for Presence,” 41st IETF, Apr. 3, 1998.
“Overview”, NetSpeak Corporation, Apr. 8, 1997, printed from Edgar Online.
“NetSpeak Corporation to Exhibit First Release of Voice Over IP, IP-to-PSTN Networking Products”, Business Wire, Jun. 2, 1997.
Handley et al., “Session Invitation Protocol”, Internet Engineering Task Force, draft-ietf-mmusic-sip-00, Feb. 22, 1996.
“Camelot Announces Internet Voice Communication Technology Breakthrough”, HighBeam™ Encyclopedia, From: PR Newswire, http://www.encyclopedia.com/doc/1G1-16452259.html?Q=Caml, Feb. 13, 1995, 2 pages.
1979 Annual Technical Report, “A Research Program in Computer Technology”, Oct. 1978-Sep. 1979, Prepared for the Defense Advanced Research Projects Agency, University of Southern California, ISI-SR-80-17.
Cohen et al., “A Network Voice Protocol NVP-11”, Lincoln Laboratory Massachusetts Institute of Technology, Apr. 1, 1981, ISI/RR-81-90.
1982 Annual Technical Report, “A Research Program in Computer Technology”, Jul. 1981-Jun. 1982, University of Southern California, ISI/SR-83-23.
Annual Report to the Defense Communications Agency, “Network Speech Systems Technology Program”, Massachusetts Institute of Technology Lincoln Laboratory, Oct. 1, 1980-Sep. 30, 1981, issued Feb. 4, 1982.
Heggestad et al., “Voice and Date Communication Experiments on a Wideband Satellite/Terrestrial Internetwork System”, IEEE International Conference on Communications, Integrating Communication for World Progress, Jun. 19-22, 1983.
Annual Report to the Defense Communications Agency, “Defense Switched Network Technology and Experiments Technology”, Massachusetts Institute of Technology Lincoln Laboratory, Oct. 1, 1981-Sep. 30, 1982, issued Feb. 5, 1983.
Merritt, “Providing Telephone Line Access to a Packet Voice Network”, University of Southern California, Feb. 1983, ISI/RR-83-107.
Weinstein, “The Experimental Integrated Switched Networks—A System Level Network Text Facility”, Proceedings of 1983 IEE Military Communications Conference, Washington, DC, Oct. 31, 1983-Nov. 2, 1983.
Cesner et al., “Wideband Communications”, 1984 Annual Technical Report, University of Southern California. IS/SR-85-150. Jul. 1983-Jun. 1984.
Annual Report to the Defense Communications Agency, “Defense Switched Network Technology and Experiments Technology”, Massachusetts Institute of Technology Lincoln Laboratory, Oct. 1, 1982-Sep. 30, 1983, issued Feb. 29, 1984.
Gross, “Proceedings of the Oct. 15-17, 1988 Joint Meeting of the Internet Engineering and Internet Architecture Task Forces”. Fourth IETF, The Mitre Corporation.
Corley, “Bellsouth Trail of Wideband Packet Technology”, Bellsouth Services, 1990 IEEE, CH2829-0/90/0000-1000.
Inoue et al., “Evolution Scenario of Broadband Services Based on Granulated Broadband Network Concept”, IEEE Region 10 Conference, Tencon 92, Nov. 11-13, 1992.
Inoue et al., “Granulated Broadband Network Applicable to B-ISDN and PSTN Services”, IEEE Journal on Selected Areas in Communiations, vol. 10, No. 9, Dec. 1992.
Cerf et al., “A Protocol for Packet Network Intercommunication”, IEEE Transactions on Communications, No. 8, May 1974.
Cole, “Dialing in the WB Network”, Information Sciences Institute University of Southern California, Dialing-Cole.83, Apr. 30, 1981.
Hapgood, “Dialing Without Dollars”, Jul. 1995, vol. 17, No. 4. pp. 18. Journal Code, INO.
Yang, “INETPhone: Telephone Services and Servers on Internet”, Network Working Group, RFC 1798, Apr. 1995. http://ds.internic.net/rfc/rfc1798.txt.
Chen et al., “Integrated Voice/Data Switching”, IEEE Communication Magazine, Jun. 1988, vol. 26. No. 6.
Frezza, “The Internet Phone is Poised to Conquer”, Communications Week, Dec. 11, 1995, http://techweb.cmp.com/cw/current.
“Internet Access: Internet Phone-to-Phone Technology Now a Reality . . . ”, EDGE Publishing, Aug. 12, 1996.
“Internet Phone Saves 50% on Long Distance”, 411 Newsletter. Aug. 5, 1996, vol. 17, No. 15, United Communications Group.
“Internet Phone Calls are Cheap but Limited”, New Media Markets, Feb. 23, 1995, Financial Times Business Information, Ltd., ISSN:0265-4717.
“Internet Telephony Seems to be Evolving East, But is There Anyone on the Line?”, Computergram International, Aug. 19, 1996. No. 2980. ISSN: 0268-716X.
“Internet's International Phone Calls are Cheap But Limited”, Telecom Markets, Financial Times Business Information ID, Mar. 2, 1995. ISSN: 0267-1484.
Mills, The Washington Post. “Phone Service via the Internet May Slash Rates”, Aug. 11, 1996.
Sears, “The Effect of Internet Telephone of the Long Distance Voice Market”, Jan. 14, 1995.
National Technical Information Service, Wideband Integrated Voice/Data Technology, ADA132284, Mar. 31, 1983, Massachusetts Inst. of Tech., Lexington, Lincoln Lab.
Detreville et al., “A Distributed Experimental Communications System”, Advances in Local Area Networks, IEEE Press, 1987.
Borden et al., “Integration of Real-Time Services in an IP-ATM Network”, RFC 1821, Internet RFC/STD/FY1/BCP Archives, Aug. 1995.
Laubach, “Classical IP and ARP over ATM” Hewlett-Packard Laboratories, Jan. 1994, http://www.faqs.org/rfc/rfc1577.tx1.
Comer, “Internetworking with TCP/IP”, vol. 1, Principles, Protocols, and Architecture, Department of Computer Sciences, 1995.
Perez et al., “ATM Signaling Support for IP Over ATM”, Network Working Group, RFC 1765, Feb. 1996, http:/www.ietf.org/rfc/rfc1765.txt.
Zellweger, Polle T., et al., “An overview of the etherphone system and its applications,” Xerox Palo Alto Research Center, pp. 160-168, Apr. 1988.
Ng, L.J., et al., “Distributed architectures and databases for intelligent personal communication networks,” Department of Electrical Engineering, U. of British Columbia, pp. 300-304, Feb. 1992.
Malyan, Andrew D., et al., “Network architecture and signaling for wireless Personal communications,” IEEE Journal on Selected Areas in Communications, vol. 11, No. 6, pp. 830-841, Aug. 1993.
Malyan, Andrew D., et al. “A Microcellular Interconnection Architecture for Personal Communications Networks,” Department of Electrical Engineering, University of British Columbia Vancouver, B.C., V6T 1W.5, Canada, pp. 502-505, Feb. 1992.
Bakre, Ajay, et al., “M-RPC: A Remote Procedure Call Service for Mobile Clients,” Department of Computer Science Rutgers, The State University of New Jersey Piscataway, NJ, pp. 97-110, 1995.
O'Malley, Sean W., “A Dynamic Network Architecture,” Department of Computer Science, University of Arizona, ACM Transactions on computer systems, vol. 10, No. 2, pp. 110-143, May 1992.
Cheshire, Stuart, et al., “Internet Mobility 4 by 4,” SIGCOMM 96—Stanford, California, USA, pp. 1-2, Aug. 1996.
Chang, Rong N., et al., “A Service Acquisition Mechanism for the Client/Service Model in Cygnus,” IBM Canada Laboratory Technical Report TR 74.059, pp. 323-345.
Arao, Shinya, et al., “Component-based policy deployment for service level differentiation in converging communication networks,” IEEE, pp. 1388-1392, 1999.
Goyal, Pawan, et al., “Integration of call signaling and resource management for IP telephony,” IEEE Network, pp. 24-32, May/Jun. 1999.
Delatore, J.P., et al., “The 5ESS switching system: Fatory system testing,” AT+T Technical Journal, vol. 64, No. 6, Jul.-Aug. 1985.
Oran, Dave, “Dial plan mapping for voice-over-IP,” Access Engineering, Apr. 11, 1996.
Getting started guide for Internet Phone release 4, http://www.vocaltec.com, 1993-1996 VocalTec Inc.
VocalTec desktop dialer version 3.0, User reference, http://www.vocaltec.com, 1997 VocalTec Ltd.
“Vocaltec's telephony gateway software captures 1996 product of the year honors from computer telephony magazine,” Herzliya, Israel, Dec. 18, 1996, VocalTec, Ltd.
“Introduction to VTG,” Northvale, NJ 07647, Tel. 201-768-9400, info@vocaltec.com, www.vocaltec.com, posted not earlier than Dec. 24, 1996.
Kahane, Opher, et al., “IMTC VoIP Forum Contribution.” Subject: Call management agent system requirements function architecture and protocol, VoIP97-010, pp. 1-44, Seattle, Jan. 1, 1997.
Kahane, Opher, “Introduction to VocalTec's CMA system,” Intelligent switching for a new era of telecom, Nov. 7, 1996.
Newton, Harry, “Newton's Telecom Dictionary,” 22nd edition, pp. 728, 2006.
Braden, R., et al., “Resource ReSerVation Protocol (RSVP)—Version 1 Functional Specification,” Network Working Group, pp. 1-224, Univ. of Michigan, Sep. 1997.
Keiser, Bernhard E., et al., “Digital Telephony and Network Integration,” downloaded Jul. 1, 2008.
Boyle, Jim, et al., “The COPS (Common Open Policy Service) Protocol,” http://www.ietf.orgiinternet-drafts/draft-ietf-rap-cops-07.txt, pp. 1-35, Aug. 16, 1999.
Bellamy, John, “Digital telephony,” Dallas, TX, Oct. 1981.
Open and standardized—the world of IP Protocols, “H.323: The Leading Standard in Voice over IP,” downloaded Jul. 1, 2008.
“Inside APPN—The Essential Guide to the Next-Generation SNA,” IBM, International Technical Support Organization Raleigh Center, Raleigh, NC, Jun. 1997.
Friedes, A., et al. “Integrating the world through communications,” IEEE ICC, vol. 1 of 3, Jun. 22-25, 1986.
Huitema, Christian, “Routing in the internet,” Prentice Hall, Englewood Cliffs, NJ, 1995.
Lucky, R.W., “Applications of communications theory,” Fundamentals of digital switching, AT+T Laboratories, Second Edition, downloaded, Jul. 3, 2008.
Bellamy, John, “Digital telephony,” Second Edition, Wiley Series in Telecommunications, downloaded, Jul. 3, 2008.
Stallings, William, “ISDN and Broadband ISDN with frame relay and ATM,” Prentice Hall, Upper Saddle River, NJ, downloaded, Jul. 3, 2008.
GR-1298-CORE, AINGR: Switching Systems, Telcordia Technologies, Issue 10, Nov. 2004.
GR-2863-CORE, CCS Network Interface Specification (CCSNIS) Supporting Advanced Intelligent Network (AIN), Bellcore, Bell Communications Research, Issue 2, Dec. 1995.
GR-246-CORE, Telcordia technologies specification of signalling system No. 7, Telcordia Technologies, Issue 10, Dec. 2005.
GR-1280-CORE, Advanced intelligent network (AIN) service control point (SCP) generic requirements, Telcordia Technologies, Issue 1, Aug. 1993.
Morris, Christopher, Academic Press Dictionary of Science and Technology, Academic Press, downloaded, Jul. 3, 2008.
GR-1428-CORE, CCS Network Interface Specification (CCSNIS) Supporting Toll-Free Service, Bellcore, Issue 2, May 1995.
Mockapetris, P., “Domain names—concepts and facilities,” Network working group, Nov. 1987.
Mockapetris, P., “Domain names—implementation and specification,” Network Working Group, Nov. 1987.
Finseth, C. “An access control protocol, sometimes called TACACS,” Network Working Group, University of Minnesota, pp. 1-20, Jul. 1993.
Carrel, D., “The TACACS+ Protocol,” Network Working Group, Cisco, Oct. 1996.
ITU-T, “Line transmission of non-telephone signals,” Recommendation H.323, May 28, 1996.
Product releases webpage, VocalTec, info@vocaltec.com, Aug. 26, 1996.
Tutorial on “H.323,” by The International Engineering Consortium, http://www.iec.org, pp. 1-30, downloaded, Jul. 3, 2008.
Everhart, C., et al., “New DNS RR Definitions,” Network Working Group, University of Maryland, pp. 1-11, Oct. 1990.
Handley, M., et al., “SIP: Session Initiation Protocol,” Network Working Group, The Internet Society, Mar. 1999.
Rosenberg, J., et al., “SIP: Session Initiation Protocol,” Network Working Group, The Internet Society, Jun. 2002.
Brannen, Lynn, et al., “Next generation switch,” MCI Telecommunications, May 16, 1997.
Shen, Yi-Shang, “Communications network with flexible call routing and resource allocation,” MCI Invention Disclosure Form, Jan. 8, 1998.
Kahane, Opher, et al, “Call management agent system specification,” VoIP Forum Technical Committee Contribution, Chicago, IL, Aug. 14, 1996.
Pulver, Jeff, “The Internet telephone tookit,” Wiley Computer Publishing, New York, NY, 1996.
Mills, Mike, “Phone service via the internet may slash rates,” The Washington Post, A Section; p. A01, Sunday, Final Edition, Aug. 11, 1996.
Chapman, Martin, et al, “Overall Concepts and Principles of TINA,” TINA-C, Version 1.0, Feb. 17, 1995.
Kahane, Opher, et al, “Call Management Agent System Specification,” Voice over IP Forum Technical Committee in Chicago, Aug. 14, 1996.
Verjinski, Richard D., “PHASE, A Portable Host Access System Environment,” IEEE, May 1989.
Verizon Services Corp., et al., v. Cox Fibernet Virginia, Inc., et al., Report of Herman J. Helgert, Ph.D., Exhibit D, downloaded, Aug. 21, 2008.
Verizon Services Corp., et al., v. Cox Fibernet Virginia, Inc., et al., Report of Herman J. Helgert, Ph.D., Exhibit E, downloaded, Aug. 21, 2008.
Verizon Services Corp., et al., v. Cox Fibernet Virginia, Inc., et al., Report of Herman J. Helgert, Ph.D., Exhibit F, downloaded, Aug. 21, 2008.
The Jeff Pulver Blog: Free World Dialup and Verizon's patent on “name translation,” http://pulverblog.pulver.com/archives/006846.html, pp. 1-19, Apr. 23, 2007.
Lipoff, Stuart, “Operations Support System Framework for Data Over Cable Services,” Data Over Cable Technical Reports, MCNS Holdings, L.P., Oct. 16, 1996.
Sinnreich, H., et al., “Interdomain IP communications with QoS, authorization and usage reporting,” http:www.cs.columbia.edu/-hgs/sip/drafts/draft-sinnreich-sip-qos-osp, Feb. 2000.
Pan, Ping, et al., “Diameter: Policy and Accounting Extension for SIP,” Internet Engineering Task Force, Internet Draft, pp. 1-17, Nov. 15, 1998.
Schulzrinne, Henning, et al., “Interaction of Call Setup and Resource Reservation Protocols in Internet Telephony,” pp. 1-13, Jun. 11, 1999, downloaded, Aug. 21, 2008.
Rosen, E., et al., “Memo re: BGP/MPLS VPNs,” Networking Group, pp. 1-25, Mar. 1999.
Waksberg, M., “Axe 10 and the Intelligent Network,” Commutation .and. Transmission, No. 4, pp. 67-76, Dec. 1993.
Niitsu, Yoshihiro, et al., “Computer-aided stepwise service creation environment for intelligent network,” NTT Communication Switching Laboratories, Tokyo, Japan, IEEE, pp. 454-458, 1992.
Morgan, Michael J., et al., “Service creation technologies for the intelligent network,” At.and.t Technical Journal, Summer 1991.
Fujioka, Masanobu, et al., “Universal service creation and provision environment for intelligent network,” XIII International Switching Symposium, Stockholm, Sweden, Proceedings vol. III, pp. 149-156, May 27-Jun. 1, 1990.
Moy, J., “OSPF Version 2,” Network Working Group, Proteon, Inc., Jul. 1991.
Lantz, Keith A., “Towards a universal directory service,” Operating Systems Review, vol. 20, No. 2, Apr. 1986.
Fang, Wenjia, “Building an Accounting Infrastructure for the Internet,” Princeton University, IEEE, pp. 105-109, 1996.
Aidarous, Salah, et al., “The role of the element management layer in network management,” 1994 IEEE Network Operations and Management Symposium, Feb. 14-17, 1994.
Gareiss, Robin, “Voice over the internet,” Data Communications, pp. 93-100, Sep. 1996.
Bethoney, Herb, “HAHTSite Gives Pros Everything They Need,” PC Week, p. 36, Mar. 10, 1997.
Kolarov, Aleksandar, et al., “End-to-end Adaptive Rate Based Congestion Control Scheme for ABR Service in Wide Area ATM Networks,” IEEE International Conference on Communications, Seattle, Washington, pp. 138-143, Feb. 1995.
Chen, Larry T., et al., “ATM and Satellite Distribution of Multimedia Educational Courseware,” 1996 IEEE International Conference on Communications, pp. 1133-1137, Jun. 23-27, 1996.
Civanlar, M. Reha, et al., “FusionNet: Joining the Internet .and. Phone Networks for Multimedia Applications,” ACM Multimedia 96, pp. 431-432, 1996.
Cobbold, Christopher, et al., “Enhancement for Integrated Wireless Personal Communications over Metropolitan Area Networks,” 1996 IEEE International Conference on Communications, pp. 1370-1376, Jun. 23-27, 1996.
Corner, Douglas E., “Internetworking With TCP/IP,” 3rd ed., V. 1. Principles, protocols, and architecture, Prentice-Hall, Inc., 1995.
Mahadevan, I., et al., “Quality of service achitectures for wireless networks: IntServ andDiffServ models,” http://ieeexplore.ieee.org/xpllabsprintf.jsp?arnumber==778974.and.page . . . , Aug. 6, 2002.
Ahmadi, H., et al., “NBBS Traffic management overview,” IBM Systems Journal, vol. 34, No. 4, pp. 604-628, 1995.
Stoica, Ion, et al., “LIRA: An Approach for Service Differentiation in the internet,” sponsored by DARPA under contract Nos. N66001-96-C-8528 and NOO174-96-K-0002, and by a NSF Career Award under grant No. NCR-9624979. Additional support was provi.
Duan, Juan, et al., “Efficient Utilization of Multiple Channels between two Switches in ATM Networks,” IEEE, pp. 1906-1911, 1995.
Ejiri, Masayoshi, et al., “For Whom the Advancing service/network management,” IEEE, pp. 422-433, 1994.
Lee, Whay Chiou, et al., “Integrated Packet Networks With Quality of Service Constraints,” Globecom, IEEE, pp. 8A.3.1-8A.3.5, 1991.
Elia, Carlo, et al., “Skyplex: Distributed Up-link for Digital Television via Satellite,” IEEE Intelligent Network workshop in, Melbourne, Australia, Apr. 21-24, 1996.
Ely, Tom, “The Service Control Point as a Cross Network Integrator,” Bellcore, IEEE, pp. 1-8, 1996.
Mamais, G., et al., “Efficient buffer management and scheduling in a combined IntServand DiffServ architecture: a performance study,” ATM, 1999. ICATM '99. 1999 2nd International Conference on, pp. 236-242, Jun. 21-23, 1999.
Baumgartner, F., et al., “Differentiated services: a new approach for quality of service in the Internet,” Proceedings of Eighth International Conference on High Performance Networking, pp. 255-273, Sep. 21-25, 1998.
Sibal, Sandeep, et al., “Controlling Alternate Routing in General-Mesh Packet Flow Networks,” SIGCOMM 1994, London, England, pp. 168-179, Aug. 1994.
Jajszczyk, A., et al., “Bringing information to People,” IEEE INFOCOM '95, Proceedings, vol. 3, Apr. 2-6, 1995.
CT and the 'Net, “Webphone,” Computer Telephony pp. 219-221, Mar. 1996.
Sisalem, Dorgham, et al., “The Network Video Terminal,” IEEE Proceedings of HPDC-5, pp. 3-10, 1996.
Baumgartner, H., et al., “Middleware for a New Generation of Mobile Networks: The ACTS OnTheMove Project,” http://www.isoc.org/inet96/proceedings/a6/a6—3.htm, pp. 1-4, Apr. 14, 2008.
“Talk Talk,” tele.com, pp. 68-72, Jun. 1996.
Kreller, Birgit, et al., “UMTS: A Middleware Architecture and Mobile API Approach,” IEEE Personal Communications, pp. 32-38, Apr. 1998.
Low, Colin, et al., “WebIN—An Architecture for Fast Deployment of IN-based Personal Services,” IEEE, 1996.
Grami, A., et al., “The Role of Satellites in the Information Superhighway,” IEEE International Conference on Communications, pp. 1577-1581, Jun. 18-22, 1995.
Gupta, Ranabir, et al., “Technical Assessment of (T)INA—TMN—OSI Technology for Service Management Applications,” IEEE Network Operations and Management Symposium, vol. 3, pp. 877-887, Feb. 14-17, 1994.
Inamori, Hisayoshi, et al., “Applying TMN to a Distributed Communications Node System with Common Platform Software,” NTT Network Service Systems Laboratories, Tokyo, Japan, pp. 83-87, IEEE International Conference on Communications, Seattle, WA, Jun. 18.
Clark, David D., et al., “Supporting Real-Time Applications in an Integrated Services Packet Network: Architecture and Mechanism,” COMM'92, MD, USA, pp. 14-26, Aug. 1992.
Haley, James E., “Pay-per-call blocking using LIDB,” AIN Service Description, Bell Atlantic Easy Number Call Routing Service, Oct. 1996.
American National Standard for Telecommunications—Signalling System No. 7 (SS7)—Signalling Connection Control Part (SCCP), American National Standards Institue, Inc., ANSITI.112-1992, Oct. 26, 1992.
American National Standard for Telecommunications—Signalling System No. 7 (SS7)—Message Transfer Part (MTP), American National Standards Institue, Inc., Mar. 14, 1996.
American National Standard for Telecommunications—Signalling System No. 7 (SS7)—Signalling Connection Control Part (SCCP), American National Standards Institue, Inc., ANSITI.110-1992, Jun. 2, 1992.
Gasman, Lawrence, “Broadband networking,” Van Nostrand Reinhold, Jun. 13, 1994.
Balkovich, Ed, et al., “Project clarity: First internal trial,” Readiness Review, Bell Atlantic Confidential and proprietary, Jul. 21, 1997.
Grigonis, Richard “Zippy,” “Computer telephony over the Internet,” CT and the 'Net, Mar. 1996.
Park, Myung Ah, et al., “Dial-up internet access service system with automatic billing mechanism,” ICICS 1997, Electronics .and. Telecommunications Research Institute, pp. 148-151, Singapore, Sep. 9-12, 1997.
El-Gendy, Hazem, et al., “Computer-supported routing for intelligent networks and personalized wired communications,” ICCS 1994, pp. 1027-1033, Aug. 1994.
“Audio and video over the Internet,” CT and the 'Net, Mar. 1996.
Malamud, Carl, et al., “Internet talk radio: Geek of the week,” Mobile IP Networking, O'Reilly .and. Associates, Inc., transcript of interview, Nov. 1993.
McConnell, Brian, “How to build an Internet PBX,” Pacific Telephony Design, http://www.phonezone.com/ip-phone.htm, pp. 1-9, Oct. 28, 1996.
Sears, Andrew, “Innovations in Internet Telephony: The Internet as the Competitor to the POTS Network,” Innovation in Internet Telephony: The Internet as the Successor to the POTS Network, pp. 1-6, Feb. 28, 1996.
“Supercharging the web with computer telephony,” CT and the 'Net, Mar. 1996.
Anand, Surinder S., et al., “Accounting architecture for cellular networks,” ICPWC '96, IEEE, pp. 184-189, 1996.
Karttunen, Jari, et al., “Cost structure analysis and reference model for SCALEABLE network services,” The Institution of Electrical Engineers, pp. 1-9, 1996.
Jennings, Barbara J., “End-User Requirements for High-Integrity Directory,” Sandia National Laboratories, Albuquerque, IEEE, pp. 1793-1796, 1996.
Botvich, D., et al., “On Charging for Internet Services provided over an A.TIVI network,” IEEE, pp. 669-679, 1997.
Estrin, Deborah, et al., “Design Considerations for Usage Accounting and Feedback in Internetworks,” downloaded, Aug. 19, 2008.
Li, Chung-Sheng, et al., ““Time-driven Priority” Flow Control for Real-time Heterogeneous Internetworking,” IBM T. J. Watson .and.esearch Center, IEEE, pp. 189-197, 1996.
Edell, RJ., et al., “Billing users and pricing for TCP,” IEEE Journal on Selected Areas in Communications, vol. 13, Issue 7, pp. 1162-1175, Sep. 1995.
Margulies, Ed, “CT's Cyberdate With the 'Net,” Computer Telephony Periscope, pp. 28-29, Aug. 1996.
Inamori, Hisayoshi, et al., “Common Software Platform for Realizing a Strategy for Introducing the TMN,” Network Operations and Management Symposium, vol. 2, pp. 579-589, Feb. 1998.
Rajan, R., et al., “A policy framework for integrated and differentiated services inthe Internet,” Network, IEEE, vol. 13, Issue 5, pp. 36-41, Sep./Oct. 1999.
Louth, Nick, “MCI Communications Corp. vaults phone-data divide,” Reuters Limited, News article, Jan. 29, 1998.
Eriksson, Hans, “MBONE: The Multicast Backbone,” fileIIICI/Documents%20and%20Settings/ralbertJDesktopIMBONE%2OThe%20Multicast%20Backbone.htm (1 of 13)Mar. 7, 2008 4:06: 17 PM.
Macedonia, Michael R., et al., “MBone Provides Audio and Video Across the Internet,” file:///Cl/Documents%20and%20Settings/ralbert/Deskt...20Audio%20and%20Video%20Across%20the%20Internet.htm (1 of 13) Mar. 10, 2008 9: 34:00 AM.
Lapolla, Stephanie, “Net call centers, voice to merge,” News, PC Week, Mar. 31, 1997.
Bohn, Roger, et al., “Mitigating the coming Internet crunch: multiple service levels via precedence,” San Diego Supercomputer Center, Mar. 22, 1994.
Weiss, W., “QoS with differentiated services,” Bell Labs Technical Journal vol. 3, No. 4, pp. 48-62, Oct.-Dec. 1998.
Hartanto, Felix, et al., “Policy-Based Billing Architecture for Internet Differentiated Services,” Proceedings of IFIP Fifth International Conference on Broadband Communications (BC '99), Hong Kong, Nov. 10-12, 1999.
Mahadevan, I., et al., “Parallel Architectures, Algorithms, and Networks,” (I-SPAN '99) Proceedings. Fourth InternationalSymposium, pp. 420-425, Jun. 23-25, 1999.
Schulzrinne, H., et al., “A Transport Protocol for Real-Time Applications,” Network Working Group, Audio-Video Transport Working Group, pp. 1-151, Mar. 10, 2008.
Schulzrinne, H., “RTP Profile for Audio and Video Conferences with Minimal Control,” Network Working Group, Audio-Video Video Transport Working Group, pp. 1-18, Jan. 1996.
Kim, Gary, “Talk is cheap voice over the internet,” America's Network, pp. 34-39, Jul. 15, 1996.
Newton, Harry, “Notes from the field: The personal side of CT,” 12 Computer Telephony, Jan. 1997.
Venditto, Gus, “Internet phones the future is calling,” Internet World Magazine, Jun. 1996.
Crowcroft, Jon, et al., “Pricing internet services,” Department of Computer Science, UCL, Gower Street, London, UK, pp. 1-16, downloaded, Aug. 19, 2008.
Newton, Harry, “Telephony Messaging on the Internet,” http://www.dialogweb.com/cgi/dwclient?req=1205770063076 (1 of 5) Mar. 17, 2008 12:08:09 PM.
Maruyama, Katsumi, et al., “A Concurrent Object-Oriented Switching Program in Chill,” 2460 IEEE Communications Magazine, Jan. 29, 1991, No. 1, pp. 60-68, New York.
Rajkumar, R., et al., “A resource allocation model for QoS management,” Proceedings. The 18th IEEE Real-Time Systems Symposium (Cat.No. 97CB36172) p. 298-307, Dec. 2-5, 1997.
Weinrib, A., et al., “Decentralized resource allocation for distributed systems,” IEEE INFOCOM '87. The Conference on Computer Communications. Proceedings. Sixth Annual Conference—Global Networks: Concept to Realization (Cat. No. 87CH2412-5) p. 328-36, M.
Shabana, Mohamed, et al., “Intelligent switch architecture,” 8081 Proceedings of the National Communications Forum 42 Sep. 30, 1988, No. 2, Chicago, IL., pp. 1312-1319.
Nagarajan, Ramesh, et al., “Local Allocation of End-to-End Quality-of-Service in High-Speed Networks,” National Research Foundation under grant NCR-9116183 and the Defense Advanced Projects Research Agency under contract NAG2-578, pp. 1-28, downloaded, A.
Elixmann, Martin, et al., “Open Switching—Extending Control Architectures to Facilitate Applications,” ISS Symposium, pp. 239-243, Apr. 23, 1995.
Chandra, P., et al., “Network support for application-oriented QoS,” (IWQoS 98) 1998 Sixth International Workshop on Quality of Service, pp. 187-195, May 18-20, 1998.
Klein, Rachelle S., et al., “Minimax Resource Allocation With Tree Structured Substitutable Resources,”Operations Research, vol. 39, No. 2, pp. 285-295, Mar.-Apr. 1991.
Nyong, D., et al., “Resource based policies for design of interworking heterogeneous service networks,” Interoperable Communications Networks, vol. 1, Nos. 2-4, pp. 571-580, 1998.
Kabay, S., et al., “The service node-an advanced IN services element,” 8438 BT Technology Journal vol. 13 Apr. 1995, No. 2, pp. 64-72.
Mayer, Robert L., et al., “Service Net-2000: An intelligent network evolution,” 8010 At.and.T Technical Journal 70 (1991) Summer, No. 3/4, pp. 99-110, Short Hills, NJ.
Peeren, Rene, “In in the Hybrid Broadband Network The Intelligent Web,” Presentation, Ericsson, IEEE 1996.
Jain, Surinder K., “Evolving Existing Narrowband Networks Towards Broadband Networks with IN Capabilities,” Bellcore Intelligent Networks, IEEE, Apr. 22, 1996.
Matta, Ibrahim, et al, “Type-of-Service Routing in Dynamic Datagram Networks,” Department of Computer Science, University of Maryland, pp. 992-999, IEEE 1994.
Yeager, Nancy J., et al., “Web Server Technology: The Advanced Guide for World Wide Web Information Providers,” National Center for Supercomputing Applications, pp. 250, Morgan Kaufman Publishers, Inc., 1996.
Kishimoto, Ryozo, “Agent Communication System for Multimedia Communication Services,” IEEE INFOCOM, Fifteenth Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 10-17, Mar. 24-28, 1996.
Willebeek-LeMair, Marc H., “Videoconferencing over Packet-Based Networks,” IEEE Journal on Selected Areas in Communications, vol. 15. No. 6, pp. 1101-1114, Aug. 1997.
Kumar, Vinay, “Internet Multicasting: Internet's Next Big Thing,” ICAST Corporation, pp. 1-13, Sep. 23, 1997.
The Wall Street Journal article on: “MCI's New Service for Corporate Use Sets 1 Line for Net, Phone,” pp. B16, Jan. 30, 1997.
Sharp, C.D., et al., “Advanced Intelligent Networks—now a reality,” Electronics .and. Communication Engineering Journal, pp. 153-162, Jun. 1994.
Pezzutti, David A., “Operations Issues for Advanced Intelligent Networks,” IEEE Communications Magazine, pp. 58-63, Feb. 1992.
Oppen, Derek C., et al., “The Clearinghouse: A Decentralized Agent for Locating Named Objects in a Distributed Environment,” ACM Transactions on Office Information Systems, vol. 1, No. 3, Jul. 1983, pp. 230-253.
Rendleman, John, et al., “ATM Goes Into Orbit . . . While IP Gets Speedy in Space,” Communications Week, Mar. 17, 1997, www.commweek.com.
Miller, Mark A., “Troubleshooting TCP/IP: Analyzing the Protocols of the Internet,” M.and.T Books, pp. 365-389, 1992.
Platt, Richard, “Why IsoEthernet Will Change the Voice and Video Worlds,” IEEE Communications Magazine, pp. 55-59, Apr. 1996.
Quicklook, “Internet by Satellite,” 1 page, http://www.netsatx.net, at least as early as 1990.
Rosalyn, Retkwa, “Telephone Politics,” Internet World, Jun. 1996.
Schreyer, Oliver, et al., “Least Cost Call Routing—A Brilliant Application for Private IN,” IEEE International Conference on Communications, vol. 2 of 3, Jun. 23-27, 1996.
Rodriguez Serrano, Inma, “Evolution of a Hybrid Fibre Coaxial Network for Multimedia Interactive Services,” British Telecommunications Egineering, vol. 15, pp. 249-253, Oct. 1996.
Sunaga, Hiroshi, et al., “A Reliable Communication Switching Platform for Quick Service Provisioning,” IEEE International Conference on Communications, Seattle, WA, Jun. 18-22, 1995.
Marketing materials re: Workshops on “Telephony on the Internet,” to take place on Sep. 24-25, 1996, at The Drake Hotel, Chicago, Illinois.
Gralla, Preston, “How the Internet Works,” Ziff-Davis Press, pp. 118-119, 1996.
Gralla, Preston, “How the Internet Works,” Ziff-Davis Press, pp. 64-67, 1996.
Tsuchida, Hisazumi, et al., “Intelligent Dynamic Service Provisioning Architecture in the Multimedia Era,” NTT Information and Communication Systems Laboratories, IEEE, pp. 1117-1122, 1996.
Low, Colin, “Integrating Communication Services,” IEEE Communications Magazine, pp. 164-169, Jun. 1997.
Fridisch, M., et al., “Terminals for Accessing the Internet—The Internet Telephone,” Alcatel Telecommunications Review, 4th Quarter, pp. 304-309, 1996.
Hurwicz, Michael, “Switched ATM is fast, but not that smart. Routed IP is smart, but not that fast. Why not combine them?,” http://www.ipsilon.com/, Apr. 1997.
Diehl, Standford, “Data's New Voice,” BYTE, Special Report, pp. 129-135, Sep. 1996.
Kahn, Jeffery, “Videoconferencing Debuts on the Internet,” LBL, U.S. Department of Energy, Berkeley, California, University of California, Feb. 28, 1995.
Braun, Hans-Werner, et al., “A framework for flow-based accounting on the Internet,” National Science Foundation (NCR-9119473), downloaded, Aug. 21, 2008.
Kelly, Katy, “Up to their laptops in packed powder: Mountaintop office keeps skiers in touch,” USA Today, Final Edition, News, pp. 1A, Feb. 21, 1997.
Braun, Torsten, “Implementation of an Internet Video Conferencing Application over ATM,” IBM European Networking Center, Heidelberg, Germany, IEEE, pp. 287-294, 1997.
Sclavos, Jean, et al., “Information Model: From Abstraction to Application,” Telecom Paris, France, pp. 1-13, downloaded, Aug. 21, 2008.
Black, Uyless D., “OSI: A model for computer communications standards,” Prentice-Hall, Inc., pp. 157-201, 1991.
Sriram, Kotikalapudi, et al., “Voice Packetization and Compression in Broadband ATM Networks,” IEEE Journal on Selected Areas in Communications, vol. 9, No. 3, pp. 294-304, Apr. 1991.
Arango, Mauricio, et al., “Guaranteed Internet Bandwith,” IEEE, pp. 862-866, Nov. 18, 1996.
Lapolla, Stephanie, “Seagate joins the backup vendors' enterprise forays,” PC Week, The National Newspaper of Corporate Computing, vol. 13, No. 33, Aug. 19, 1996.
Harmer, Julie, et al., “Revised Requirements for Mobile-API-Interim deliverable,” OnTheMove public project, pp. 1-44, Dec. 1996.
Schulzrinne, Henning, “Personal Mobility for Multimedia Services in the Internet,” IDMS '96 (European Workshop on Interactive Distributed Multimedia Systems and Services), Berlin, Germany, pp. 1-18, Mar. 4-6, 1996.
Schulzrinne, “Simple Conference Invitation Protocol,” Internet Engineering Task Force, pp. 1-19, Feb. 22, 1996.
Ash, G.R., et al., “Design and Optimization of Networks With Dynamic Routing,” American Telephone and Telegraph Company, The Bell System Technical Journal, vol. 60, No. 8, pp. 1787-1820, Oct. 1981.
Prosecution history of U.S. Pat. No. 6,332,023, Issued, Dec. 18, 2001.
The Phone Zone, an online reference cite and catalog of PC based telephony and networking solution for business, http://www.phonezone.com/index2.htm, Oct. 29, 1996.
“IDT's Net2Phone Launches Phone-to-Phone Technology via the Internet,” Press release, http://web.net2phone.com/about/press/releases/p2p.asp, Sep. 8, 1997.
“Vocaltec's telephony gateway—the ultimate intemet telephony solution?,” Computer Telephony, pp. 30, Sep. 1996.
Cheriton, David R., “Dissemination-Oriented Communication Systems: Final Report,” ARPA contract No. DABT63-91-K-0001, Nov. 26, 1996.
Johnson, David B., “Scalable Support for Transparent Mobile Host Internetworking,” Proceedings of the Ninth Annual IEEE Worshop on Computer Communications, pp. 1-10, Oct. 1994.
“Specifications of Signalling System No. 7,” International Telecommunication Union, ITU-T Telecommunication Standardization Sector of ITU, Recommendation, Q.700, Mar. 1993.
“Integrated Services Digital Network (ISDN) 1.312,” CCITT The International Telegraph and Telephone Consultative Committee, ITU International Telecommunication Union, Recommendation, I.312/Q.1201, Oct. 1992.
“Interface Recommendation for Intelligent Network CS-1,” International Telecommunication Union, ITU-T Telecommunication Standardization Sector of ITU, ITU-T Recommendation Q.1218, Oct. 1995.
“Series Q: Switching and Signalling,” Intelligent Network, International Telecommunication Union, ITU-T, Telecommunication Standardization Sector of ITU, Recommendation Q.1218—Addendum 1, Sep. 1997.
Imielinski, Tomasz, et al., “Mobile Wireless Computing: Solutions and Challenges in Data Management,” Department of Computer Science, Rutgers University, downloaded, Oct. 22, 2008.
Balmer, R., et al., “A Concept for RSVP Over DiffServ,” Institute of Computer Science and Applied Mathematics, University of Berne, Switzerland, http://www.iam.unibe.ch/˜rvs, pp. 412-417, IEEE, May 2000.
Ziegler, Jr., K., “A Distributed Information System Study,” IBM Syst J, vol. 18, No. 3, pp. 374-401, 1979.
Blake, S., et al., “An Architecture for Differentiated Services,” Network Working Group, pp. 1-36, Dec. 1998.
Walters, Rob, “Computer Telephony Integration,” Second Edition, Artech House, 1999.
IMTC Voice over IP Forum Service Interoperability Implementation Agreement, Draft 0.91, IMTC Voice over IP Forum Technical Committee, VoIP97-008, Jan. 13, 1997.
Braden, R., et al., “Integrated Services in the Internet Architecture: an Overview,” Network Working Group, pp. 1-28, Jul. 1994.
Braun, Torsten, “Internet Protocols for Multimedia Communications,” Part II: Resource Reservation, Transport, and Application Protocols, IEEE MultiMedia, pp. 74-82, Oct.-Dec. 1997.
Black, Uyless D., “Internet Telephony Call Processing Protocols,” Prentice Hall PTR, www.phptr.com, 2001.
Briere, Daniel D., et al., “Internet Telephony for Dummies,” 2nd Edition, IDG Books Worlwide, Inc., 1997.
Vin, Harrick M., et al., “Multimedia Conferencing in the Etherphone Environment,” Xerox Palo Alto Research Center, IEEE, pp. 69-79, Oct. 1991.
Detti, Andrea, et al., “Supporting RSVP in a Differentiated Service Domain: an Architectural Framework and a Scalability Analysis,” http://www-st.influ-dresden.de/elisa/, downloaded, Oct. 27, 2008.
Bernet, Yoram, “The Complementary Roles of RSVP and Differentiated Services in the Full-Service QoS Network,” QoS Mechanisms, Microsoft, downloaded, Oct. 27, 2008.
Herzog, S., et al., “COPS Usage for RSVP,” Network Working Group, pp. 1-15, Jan. 2000.
Sebestyen, Istvan, “What is the position of Q.2, 0.3/15 on Internet Telephony for the IMTC—VoIP Forum Meeting in Seattle,” ITU Telecommunication Standardization Sector, Study Group 15, pp. 1-5, Dec. 5, 1996.
Daniele, M., et al., “Textual Conventions for Internet Network Addresses,” Nework Working Group, pp. 1-16, Jun. 2000.
Handley, M., et al., “SIP: Session Initiation Protocol,” Internet Engineering Task Force, pp. 1-30, Dec. 2, 1996.
Weinstein, Clifford J., “The Experimental Integrated Switched Network—a System-Level Network Test Facility,” IEEE, pp. 449-456, Jan. 1983.
“Computer Telephony and the Internet,” pp. 1-8, downloaded, Jul. 14, 2009.
Jitian, Xiao, et al., “Sharing Model of Netware Node Resources and Real-Time Scheduling,” Mini-Micro Systems, vol. 16, No. 12, pp. 54-59, Dec. 1995.
Swinehart, D.C. et al., “Adding Voice to an Office Computer Network”, IEEE GLOBECOM '83 Conference Record, vol. 1, Nov. 28, 1983, p. 392-398.
Gupta, Amit, “Resource sharing for multi-party real-time communication,” Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communication Societies (INFOCOM '95), pp. 1230-1237, 1995.
Kausar, Nadia, et al., “A Charging Model for Sessions on the Internet,” IEEE, pp. 32-38, Apr. 1999.
Schutzrinne, Henning, “A comprehensive multimedia control architecture for the Internet,” IEEE, pp. 65-76, Sep. 1997.
Tsaoussidis, V., et al., “A CORBA-based Application Service Middleware Architecture and Implementation,” State University, of NY at Stony Brook, pp. 1-7, downloaded, Aug. 19, 2008.
Bernet, Y., et al., “A Framework for Differentiated Services,” The Internet Society, pp. 1-35, Sep. 22, 1999.
Gleeson, B., et al., “A Framework for IP Based Virtual Private Networks,” The Internet Society, pp. 1-62, Feb. 2000.
Yavatkar, Raj, et al., “A Framework for Policy-based Admission Control,” Internet Engineering Task Force, pp. 1-19, Apr. 1999.
Ekstein, Ronnie, et al., “AAA Protocols: Comparison between RADIUS, DIAMETER and COPS,” Internet Engineering Task Force (IETF), pp. 1-17, Aug. 1999.
Hussmann, H., et al., “An edge device for supporting internet integrated services over switched ATM networks,” pp. 1-10, downloaded, Aug. 19, 2008.
Sinnreich, H., et al., “Interdomain IP communications with QoS, authorization and usage reporting,” http:www.ietf.org/internet-drafts . . . , Jan. 2000.
Mascolo, Cecilia, et al., “An XML based Programmable Network Platform,” Dept. of Computer Science, University College London, pp. 1-5, Jun. 10, 2005.
Kumar, Vijay P., et al., “Beyond Best Effort: Router Architectures for the Differentiated Services of Tomorrow's Internet,” IEEE Communications Magazine, pp. 152-164, May 1998.
Pan, Ping, et al., “Diameter-SIP,” Internet Draft, pp. 1-15, Nov. 15, 1998.
Neilson, Rob, et al., “A Discussion of Bandwidth Broker Requirements for Internet2 Qbone Deployment,” Intemet2 Qbone BB Advisory Council, Version 0.7, pp. 1-30, Aug. 1999.
Stojsic, Goran, et al., “Formal Definition of SIP Proxy Behavior,” IEEE, pp. 289-292, Feb. 2001.
Bhuyan, L, et al., “Impact of switch Design on the Application Performance of Cache-Coherent Multiprocessors,” Dept. of Computer Science, Texas A.and.M University and Intel Corp., pp. 1-9, Nov. 15, 2005.
Product Overview, “IP Highway product overview,” http://iphighway.com/prod/, pp. 1-4, Sep. 22, 1999.
Rosenberg, Jonathan, et al., “Internet telephony gateway location,” IEEE, pp. 488-496, Feb. 1998.
Wright, S., et al., “IP “Telephony” vs. ATM: What is There to Discuss?,” IEEE, pp. 400-409, Feb. 1998.
Wedlund, Elin, et al., “Mobility support using SIP,” WoWMoM, Jan. 1999.
Aiken, B., et al., “Network Policy and Services: A report of a Workshop on Middleware,” Network Working Group, pp. 1-26, Feb. 2000.
Aspnes, James, et al., “On-Line Routing of Virtual Circuits willi Applications to Load Balancing and Machine Scheduling,” pp. 486-504, Journal of the ACM, vol. 44, No. 3, May 1997.
Salsano, Stefano, et al., “005 Control by Means of COPS to Support SIP-Based Applications,” IEEE Network, Mar./ Apr. 2007.
White, Paul P., “RSVP and Integrated Services in the Internet: A Tutorial,” IEEE Communications Magazine, pp. 100-106, May 1997.
Beck, Christopher J., et al., “Scheduling alternative activities,” http://www.aaai.org/home.html, 1999.
Flykt, P., et al., “SIP Services and Interworking IPv6,” 3G Mobile Communication Technologies, Mar. 26-28, 2001, Conference Publication No. 477.
Schulzrinne, Henning, et al., “Signaling for internet telephony,” Columbia University, Dept. of Computer Science Technical Report CUCS-005-98, Feb. 2, 1998.
Barzilai, Tsipora, et al., “Design and Implementation of an RSVP-based Quality of Service Architecture for Integrated Services Internet,” IEEE, May 1997.
Hubaux, Jean-Pierre, et al., “The impact of the Internet on telecommunication architectures,” Computer Networks 31 (1999).
Roberts, Erica, “The New Class System,”http://www.data.com/roundups/class—system.html, pp. 1-14, Sep. 22, 1999.
Wroclawski, J., “The Use of RSVP with IETF Integrated Services,” ftp://ftp.isi.edu/in-notes/rfc2210.txt, Sep. 22, 1999.
Sloman, Morris, et al., “Distributed Management for the Networked Millennium,” Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated Network Management—Boston, MA, U.S.A., May 24-28, 1999.
Schulzrinne, Henning, “MIME-Version: 1.0,” email communication dated Oct. 10, 1995.
Garrahan, James J., et al., “Marching toward the global intelligent network,” IEEE Communications Magazine, vol. 31, No. 3, pp. 30-36, Mar. 1993.
Gys, L, et al., “Intelligence in the Network,” Alcatel Telecommunications Review, pp. 13-22, 1st Quarter 1998.
Yang, C., “INETPhone Telephone Services and Servers on Internet,” Network Working Group, pp. 1-6, Apr. 1995.
Perret, Stephane, et al., “MAP: Mobile Assistant Programming for Large Scale Communication Networks,” IEEE, pp. 1128-1132, Apr. 1996.
Plunkett, Bill, “ISCP Service Capacity Improvements,” Bellcore, Feb. 29, 1996.
Murray, Dave, “High speed signalling link interface for ISCP version 6.0,” Bellcore, Feb. 29, 1996.
Evans, Jeff, “Alternative Approaches for Multi-ISCP Locator,” Bell Atlantic, Mar. 13, 1996.
Performance Task Force, “Off-Line Engineering Tool,” Bellcore, Sep. 3, 1996.
Jones, Doug R., “Advanced intelligent network delivering control of network routing,” Bell Atlantic, downloaded, Aug. 20, 2008.
Gorton, Dave, “ISCP Evolution overview,” Telcordia Technologies Inc., Jun. 5, 2001.
Brown, Kathryn C., “Telecom Convergence,” PowerPoint presentation, downloaded Aug. 21, 2008.
Cohen, Danny, “Specifications for the Network Voice Protocol (NVP),” http://www.rfc-archive.org/getrfc.php?rfc=741, Nov. 22, 1977.
Low, Colin, “The Internet Telephony Red Herring,” Hewlett Packard, pp. 1-15, May 15, 1996.
de la Fuente, L.A., et al., “Application of the TINA-C Management Architecture,” Bellcore, Red Bank, NJ, downloaded, Aug. 21, 2008.
Finseth, C. “An access control protocol, sometimes called TACACS,” Network Working Group, University of Minnesota, pp. 1-21, Jul. 1993.
Buchanan, Ken, et al., “IMT-2000: Service Provider's Perspective,” IEEE Personal Communications, pp. 8-13, Aug. 1997.
Pontailler, Catherine, “TMN and New Network Architectures,” IEEE Communications Magazine, pp. 84-88, Apr. 1993.
“Claim Construction of the Patents-In-Suit”, USDC for the Eastern Distric of Virginia, Alexandria Division, “Claim Construction of the Patents-In-Suit” Civil Action No. 08-0157, dated Sep. 3, 2008.
Continuations (2)
Number Date Country
Parent 10979317 Nov 2004 US
Child 11930928 US
Parent 08931159 Sep 1997 US
Child 10979317 US
Continuation in Parts (1)
Number Date Country
Parent 08931480 Sep 1997 US
Child 08931159 US