This invention relates to methods and systems for managing signaling and communication sessions across networks, and particularly relates to a scalable methodology and system for managing telephony over hybrid networks such as combined switched telephone networks and packet switched internetworks, such as the Internet.
Attention recently has been directed to implementing a variety of communication services, including voice telephone service, over the worldwide packet data network now commonly known as the Internet. The Internet had its genesis in U.S. Government programs funded by the Advanced Research Projects Agency (ARPA) That research made possible national internetworked data communication systems. This work resulted in the development of network standards as well as a set of conventions, known as protocols, for interconnecting data networks and routing information across the networks. These protocols are commonly referred to as TCP/IP. The TCP/IP protocols were originally developed for use only through ARPANET but have subsequently become widely used in the industry. TCP/IP is flexible and robust. TCP takes care of the integrity, and IP moves the data.
Internet provides two broad types of services: connectionless packet delivery service and reliable stream transport service. The Internet basically comprises several large computer networks joined together over high-speed data links ranging from ISDN to T1, T3, FDDI, SONET, SMDS, ATM, OT1, etc. The most prominent of these national nets are MILNET (Military Network), NSFNET (National Science Foundation NETwork), and CREN (Corporation for Research and Educational Networking). In 1995, the Government Accounting Office (GAO) reported that the Internet linked 59,000 networks, 2.2 million computers and 15 million users in 92 countries. However, since then it is estimated that the number of Internet users continues to double approximately annually.
In simplified fashion the Internet may be viewed as a series of packet data switches or ‘routers’ connected together with computers connected to the routers. The Information Providers (IPs) constitute the end systems which collect and market the information through their own servers. Access providers are companies such as UUNET, PSI, MCI and SPRINT which transport the information. Such companies market the usage of their networks.
By way of current illustration, MCI is both an ISP and an IP, SPRINT is an ISP, and the Microsoft Network (MSN) is an IP using UUNET as an ISP. Other information providers, such as universities, are indicated in exemplary fashion at 324 and are connected to the AS/ISPs via the same type connections here illustrated as T1 lines 326. Corporate Local Area Networks (LANs), such as those illustrated in 328 and 330, are connected through routers 332 and 334 and high speed data links such as T1 lines 336 and 338. Laptop computers 340 and 342 are representative of computers connected to the Internet via the public switched telephone network (PSTN), and are shown connected to the AS/ISPs via dial up links 344 and 346.
In the addressing scheme of the Internet, an address comprises four numbers separated by dots. This is called the Internet Protocol address, or IP address. An example of an IP address would be 164.109.211.237. Each machine on the Internet has a unique number assigned to it which constitutes one of these four numbers. In the IP address, the leftmost number has the greatest weight. By analogy this would correspond to the ZIP code in a mailing address. At times the first two numbers constitute this portion of the address indicating a network or a locale. That network is connected to the last router in the transport path. In differentiating between two computers in the same destination network only the last number field changes. In such an example the next number field 211 identifies the destination router.
When a packet bearing a destination address leaves the source router, the router examines the first two numbers in a matrix table to determine how many hops are the minimum to get to the destination. It then sends the packet to the next router as determined from that table, and the procedure is repeated. Each router has a database table that finds the information automatically. This continues until the packet arrives at the destination computer. The separate packets that constitute a message may not travel the same path depending on traffic load. However, they all reach the same destination and are assembled in their original order in a connectionless fashion. This is in contrast to connection oriented routing modes, such as frame relay and ATM or voice.
It would be difficult for most people to remember the four separate numbers (sometimes having ten or more digits) comprising each numeric IP address. In addition numeric IP addresses occasionally change, making it even more of a problem for people to keep track of them. The Domain Name System (DNS) was developed to provide some relief from these problems. In the DNS system words, which are more easily remembered, are used instead of numbers.
An example of a textual Domain Name is Evoit@HUT.MB.COM. Each of the names separated by a dot is called a domain. The significance of each of the domains is the reverse of that of the numeric IP address. In the numeric IP address, the most significant numbers were on the left and the least significant on the right. The textual Domain Name System begins with the least significant on the left and proceeds to the most significant on the right.
The top-level domains, those of the most general significance, are as follows:
1. COM A commercial operation
2. EDU A university, college or other educational institution
3. GOV A government organization
4. MIL A military site
5. ORG Any organization that does not fit into any of the preceding
6. NET A network
There are now two-letter domains, each denoting a different country, which are atop the above original. domain names. An address ending in “COM.AU,” for example, would be a commercial operation in Australia. Over a hundred different countries are now connected to the Internet so the list of two-letter country codes is ever increasing. Computers associated with the Internet called domain name servers convert textual domain names into numeric IP addresses.
Recently, one or more companies have developed software for use on personal computers to permit two-way transfer of real-time voice information via an Internet data link between two personal computers. In one of the directions, the sending computer converts voice signals from analog to digital format. The software facilitates data compression down to a rate compatible with modem communication via a POTS telephone line, in some cases as low as 2.4 kbits/s. The software also facilitates encapsulation of the digitized and compressed voice data into the TCP/IP protocol, with appropriate addressing to permit communication via the Internet. At the receiving end, the computer and software reverse the process to recover the analog voice information for presentation to the other party. Such programs permit telephone-like communication between Internet users registered with Internet Phone Servers.
Such programs have relied on servers coupled to the Internet to establish voice communication links through the networks. Each person active on the network, who is willing to accept a voice call, must register with a server. A calling party can call only those persons registered on the voice communication server. Also, the address management provided by these servers, like that provided by the domain name servers, has not permitted any individualized control of routing. For example, a user could register only one current address and must reregister each time the user comes on-line with a new address. The registration server provides no automatic selection of alternate destinations.
Concurrent with recent developments in public packet data communications such as the Internet, outlined above, the telephone industry has been developing an enhanced telephone network, sometimes referred to as an Advanced Intelligent Network (AIN), for providing a wide array of new voice grade telephone service features. In an AIN type system, local and/or toll offices of the public telephone network detect one of a number of call processing events identified as AIN “triggers”. For ordinary telephone service calls, there would be no event to trigger AIN processing. The local and toll office switches would function normally and process such calls without referring to the central database for instructions. An office which detects a trigger will suspend call processing, compile a call data message and forward that message via a common channel interoffice signaling (CCIS) link to a database system, such as an Integrated Service Control Point (ISCP). Each ISCP includes a Multi-Services Application Platform (MSAP) database.
If needed, an ISCP can instruct the central office to obtain and forward additional information. Once sufficient information about the call has reached the ISCP, the ISCP accesses its stored data tables in the MSAP database. Using those tables it translates the received message data into a call control message and returns the call control message to the switching office of the network via CCIS link. The network switching offices then use the call control message to complete the particular call. An AIN type network for providing an Area Wide Centrex service, for example, was disclosed and described in detail in commonly assigned U.S. Pat. No. 5,247,571 to Kay et al., the disclosure of which is entirely incorporated herein by reference.
As shown by the art discussed above, the Internet and the AIN have remained separate, independent areas of technical development. Many telephone service subscribers are accustomed to enhanced telephone features, such as those provided by AIN processing. However, the wide range of conditional routing options offered by AIN type processing have not been available on the Internet. For example, the address processing provided by the domain name servers and the registration servers used to exchange addresses for voice communication have not permitted alternate treatments for different times, different calling parties, different destinations of roaming subscribers, etc. An enhanced domain name server which enables conditional routing and which is capable of wide database applications was disclosed and described in detail in the above-referenced parent Eric A. Voit U.S. application Ser. No. 08/812,075.
As use of the Internet expands, particularly for transport of voice telephone communications, a need exists not only for enhanced address management but also for distributed and scalable customer account authentication, authorization, usage recording, usage pricing billing account management, and inter carrier interfaces. The enhanced domain server described in the above incorporated Voit application Ser. No. 08/812,075 lends itself to serving in this capacity.
Voice over internetworks, and particularly the Internet (V/IP), involves terminal equipment affiliated with various networks. V/IP services can be divided into at least four categories based on the type of network to which the users' terminal equipment is attached, such as Internet/Intranet or narrowband Public Switched Telephone Network (PSTN) or POTS (plain old telephone service) telephone network. These four categories are:
Existing V/IP implementations over the Internet are subject to best-effort quality of service (QoS). Typically, this is noticeably degraded as compared to “toll quality” service. In addition, it is subject to significant variations. There is a need for improvement over these existing implementations both in level and consistency of QoS. The QoS should be such as to be perceived by end users as consistently supporting comfortable conversation similar to that which users are accustomed. Preferably the QoS should be equivalent to “toll quality” voice service.
Residential and business customers on the PSTN are accustomed to the availability of enhanced calling features and it is desirable to provide personal dialing directories, ability to use multiple point to point connections at the same time, multi-line conferencing capabilities, and full duplex operation. Authorization and security features should be supplied, as well as user access to billing and usage accounting relating to their own accounts.
It is a primary objective of the present invention to satisfy the needs which have been described.
The present invention addresses those needs by providing a robust and scalable customer account management database within the packet switched network. This database may act as manager of all transactions for a particular customer account. Each Internet telephone service subscriber will have at least one billing and authorization account maintained in a database on the Internet. During set-up of a call, the hop-off gateway will obtain identification and password information from the caller. The gateway then communicates with the database to determine if the call is authorized and to negotiate the overall billing algorithm. When the call is finished, the gateway will report usage data to the database for billing purposes.
Another objective is to provide an overall internetwork architecture that will permit the development of Internet Telephony Gateways (ITGs) capable of dealing with existing problems on a scalable basis. For example, in view of the fact that there is no “originating switch” to generate billing records for an internetwork caller, there is no present system for providing a generation site which will implement a unitary presentation of customer account usage, and also support extraction of data from the network on a real time basis. There is no present architecture or methodology to provide for customer access to his/her account or accounts records without intermixing requests for account information with requests for implementing services. Such an intermixing would subject the fulfillment of services to the traffic load of information requests and vice versa. There is no present architecture for ensuring customer authentication and billing beyond a limited number of customers.
It is another objective of the invention to implement a system to inform a customer of the pricing rules for a call prior to call connection and to report the price of the call in real time visually or orally.
It is another objective of the invention to provide customers with ready access to information in their account records without allowing the customer to access the account database which is used in implementing services, or updating or maintaining or storing such databases.
It is yet another objective of the invention to provide a system to implement the handling of multiple, concurrent calls terminating at different ITGs using the same billing account number and preventing overrun of a preset account spending limit.
It is another object of the invention to provide an architecture which will provide downloading of billing data to external service providers in isolation from the account information maintained and utilized in implementing Internet voice telephony.
It is a still further objective of the invention to ensure that such a system will operate properly in situations where the ITG is owned by a different company than the owner of the customer account.
It is another objective of the invention to provide a mechanism for reducing the potential for fraud.
According to the invention usage recording, pricing, and authorization are bundled into one logical object. This eliminates the separation between authorization and billing processes and significantly reduces the potential for fraud in a regionally deployed system. By having a single logical database which is managing customer authentication, authorization, and usage pricing for the overall network, a transaction-based approach to updating data is possible. This minimizes opportunities for fraud based on exploitation of temporary inconsistencies of partitioned or replicated data bases. There is no requirement that this logical object be implemented as a single physical system.
The single logical element or object is invoked during a call when an authorization request is received. This request may consist of an account number and password provided by a PC user to be authenticated. At this point the logical database processor checks the account password and available account balance. If the password is correct and the remaining balance in the account permits the call to be established, the object responds affirmatively to the Internet Telephony Network (ITN) Call Control Object which includes the Internet Telephony Gateway (ITG). The database retains data indicating that a call associated with that account is in progress. In such an architecture mutual authentication by the Call Control Object and ITG and the database is preferable, as is a secure (such as by encryption) call transaction between them.
In providing the authorization, the database object will evaluate the customer account status to determine if there are multiple connections currently in service, possibly across multiple ITGs. With this state information, the authorization function of the system may ensure that only one call per account is being handled by the network, and/or ensure that the maximum billing limit is not being circumvented by multiple concurrent sessions. In the absence of such a precaution, a second PC caller using the same account and password might receive authorization for a call prior to the posting of the first caller's usage record. Optionally, in order to handle low billing amount availability without denying a call completely, the database object may respond to the ITN with a maximum allowable call duration.
Another feature is that the database object may reserve a predetermined remaining balance on the account for the call so that additional calls related to that account will not result in exceeding the account's limit. The database object may return the pricing algorithm for the usage to the Call Control Object and ITG, which will pass it on to the PC user. In this way the PC user knows the initial charge and ongoing per minute rate for the usage. This is particularly important when the Call Control Object and ITG is owned by a different company than the database object. The user desires to know the rates that will be charged prior to completing the call. The PC is such as to be able to receive and utilize the algorithm, and display pricing to the PC user. The PC may also present the total charge being incurred by the user on a real time basis as the call progresses.
After the completion of the call, the database object is also responsible for accepting usage recording data which has been generated by the Call Control Object and ITG, pricing the usage, and decrementing that priced amount from a customer's available balance. The database object then logs the final call data. Preferably the Call Control Object and ITG also logs and maintains the call detail information. This feature is very useful in the situation where the Call Control Object and ITG and the database objects are owned by different companies. In this case, the database object data can be used by the owner of the database object to manage the customer account. In addition, the Call Control Object and ITG data can be used by the owner of the Call Control Object and ITG to charge the database object for the completion of the call over its facilities. In effect this Call Control Object and ITG data becomes the basis for a usage based settlement interface between carriers.
Preferably the database object is partitioned and may be distributed. A database object partition may be made by a field identifying the carrier owning the customer account, a sub-field within the customer account number (such as NPA-NXX), the customer's telephone number, the customer's e-mail domain name, the customer's originating IP address, or some other field. Each partitioned database may then be placed on its own physical system. With such a partitioned customer account data architecture, it becomes possible to divide the totality of all managed accounts into implementable sub-groups in a straight forward manner.
It is an objective of the invention to provide a code based means of querying a distributed database of codes which allows automatic accessing of the pertinent physical instance of the database for approval.
It is another objective of the invention to provide such a database and functionality on a scalable basis.
Additional objects, advantages and novel features of the invention will be set forth in part in the description which follows, and in part will become apparent to those skilled in the art upon examination of the following or may be learned by practice of the invention. The objects and advantages of the invention may be realized and attained by means of the instrumentalities and combinations particularly pointed out in the appended claims.
Referring to
The Internet Telephony Gateway or ITG 118 connects the packet switched and circuit switched networks. This is sometimes referred to herein as the C2 ITN call control object. The computer may be linked to the packet switched network via any available computer to Internet link. Similarly the connection between the circuit switched network and the telephone may be any of the conventional links including POTS.
In order to manage a call across the circuit switched and packet switched and packet switched networks, it is necessary to provide an architecture, a set of interfaces, and a call flow.
These objects are shown respectively at 208, 210, and 212. Not shown in this figure is the PSTN Call Control Object C4 since neither the PSTN network elements nor the PSTN protocols are modified by the ITN system.
The C3 object represents the network element required in this architecture to perform customer authentication, call authorization, usage accounting, and usage pricing for a particular PC user's customer account. By bundling usage recording, pricing, and authorization into this one logical object, it is possible to eliminate the conventional separation between authorization and billing processes and significantly reduce the potential for fraud in a regionally deployed system. By having a single logical database which is managing customer authentication, authorization, and usage pricing for the network, a transaction-based approach to updating data is possible. This minimizes opportunities for fraud based on exploitation of the conventional temporary inconsistencies which are encountered with partitioned or replicated data bases. There is no requirement that this unitary logical object be implemented as a single physical system. Although not shown in
The C3 object ensures coordination between User Authorization and Usage Recording for a single PC user's customer account. C3 also responds to external requests for that information.
According to the invention the C3 object is implemented in a manner such that multiple sites maintain their own database servers and no single site on the Internet is in possession of all of the authentication, authorization, usage pricing, and account data. The overall data constitutes a distributed database which forms a unitary logical object which relies on the database servers at the individual sites. Operation is such that a local C3 database or server receives a request for data. If the local server database cannot locate the requested information it sends a request to a second database server asking it to locate the information and send the results back to the requester. The second database server locates the information and sends a message to the requester. If the second database server cannot locate the information in its database it (or the local server database) sends a similar request to the next database server until the desired information is located. Alternatively, the account number may be coded so as to indicate the proper database instance. Database servers with this capability are described in detail in the common assignee's copending Sistanizadeh application Ser. No. 08/634,544, filed Apr. 18, 1996. That application is incorporated by reference herein in its entirety.
The C3 object is invoked during a call when an Authorization request is relayed over the interface C3.I4. This interface is responsible for allowing an authorization of ITG usage by a service subscriber, and for maintaining the current state of a subscriber's connections within C3, as well as passing ITG generated usage records from C2 to C3 in real time. Communication through the C3.I4 interface is preferably encrypted and secure. The authorization request relayed over C3.I4 typically consists of an account number and password provided by the PC User to be authenticated by C3. At this point. C3 checks the account password and available account balance. If the password is correct and the account remaining balance permits the call to be established, then C3 responds affirmatively to C2. C3 also retains data indicating that a call associated with that account is in progress. In such an architecture, mutual authentication of C2 and C3, and a secure transaction between them is preferred.
In providing the authorization, C3 evaluates the customer account status to determine if there are multiple connections currently in service (possibly across multiple ITGs). It should be appreciated that while
Another feature is that C3 may reserve a certain remaining balance on the account for the call so that additional calls related to that account will not result in exceeding that account's limit. C3 may return the pricing algorithm for the usage to C2 which will pass it on to the PC user. In this way the PC user knows the initial charge and ongoing per minute rate for the requested usage. This is particularly important when C2 is owned by a different company than C3, and the user wants to know the overall rates that will be charged prior to completing the call. The PC is such as to be able to receive and utilize the algorithm, and display pricing to the user. The PC is also able to present the total charge being incurred by the user as time goes on during the call.
After the completion of the call, the C3 object is also responsible for accepting usage recording data from C2, pricing the usage, and decrementing that priced amount from a customer's available balance. C3 then logs the final call data. Preferably C2 also logs and maintains the call detail information. This feature is very useful in the situation where C2 and the C3 database objects are owned by different companies. In this case, the database object data can be used by its owner to manage the customer account. In addition, the C2 data can be used by the owner of the C2 object to charge the C3 database object for the completion of the call over its facilities. In effect this C2 data becomes the basis for a usage based settlement interface between carriers.
Preferably the C3 system is partitioned. Such a partition may be made by a field identifying the carrier owning the customer account, a sub-field within the customer account number (such as NPA-NXX), the customer's telephone number, the customer's e-mail domain name, the customer's originating IP address, or some other field. Each partitioned database may then be placed on its own physical system on a geographical or other basis. With such a partitioned customer account data architecture, the domain of all managed accounts may be divided into efficiently implementable sub-groups.
Referring to
The three planes are:
The ITN User Plane Functions: These functions are those which are directly involved with real time communications transport and signal manipulation within a network.
The ITN Control Plane Functions: These are the functions which establish or set-up and tear-down communication paths across the User Plane.
The ITN Management Plane and Operations Support Systems Functions (OSS): These are the functions needed to provision and maintain the elements of the User Plane and Control Plane.
The four network functions are:
IP Access Network Functions (right br PC User Side): The IP access network is used locally on the PC user side simply to reach the IP network. This access may be direct via a LAN, or over a circuit switched PPP link connected to a Point of Presence (POP).
IP Network Functions: The IP network is the involved Intranet backbone and associated support systems (such as the DNS), this network provides the IP transport functions.
V/IP Gateway Functions: These are the network functions (and elements) which are involved primarily with supporting a Voice over IP service.
PSTN Access Network Functions (POTS User Side) The PSTN access network consists of the traditional PSTN connecting the Internet Telephony Gateway (ITG) to the called telephone user.
The V/IP Gateway Functions and relationships to the other elements involved with the V/IP service are now described in relation to
The internal interface references designated within
1. The interface between the Control Plane and the Management Plane functions is shown at I5. Management functions such as directory table maintenance, surveillance, and periodic billing exports cross the I5 interface.
2. The interface between the User Plane and the Control Plane Functions is shown at I4. Interfaces between various elements of the Control Plane are also designated as I4.
3. The interface between the V/IP Gateway and POTS Access Network is shown at I7.
4. The interface between the IP Network and the V/IP Gateway functions is shown at I6.
5. The interface between the IP Network and the PC Access Network is shown at I3.
6. For the sake of simplicity, one additional interface of lower utilization, I10, is not shown in
The more significant objects and interfaces are now described in further detail.
ITN objects are considered to be partitions of the ITN processing requirements into sub-systems. A definition of ITN platform objects in this way, independent from protocol or message set constraints, provides a logical view of the system independent of those constraints.
User Plane Objects
U1 Object: Vocoder
The U1 Object converts packetized voice segments (which are encapsulated with IP) to and from circuit switched voice segments (which are encoded in Pulse Code Modulation (PCM)). The Vocoder performs various functions in order to accomplish this. It buffers a certain amount of packetized voice segments in order to maintain a continual flow on the circuit switched network. It dynamically assesses the delay characteristics of the transport network between the Vocoder and the User's software application in order to minimize those buffer requirements.
The Vocoder is able to handle all ITG ports in service, with all participants (on both sides of each call) talking at the same time. The Vocoder also identifies the level of packet loss resulting from voice transport across the IP network and maintains a record of that packet loss for summary reporting. Based on the level of packet loss, the Vocoder applies corrective algorithms to the voice wave form so that the resulting loss of signal quality is minimized for the called PSTN party.
The U1 Object is able to identify a loss of voice content packets, or a continuous stream of format errors in the encoded voice data incoming on the U1.I1 and U1.I10 interfaces (see FIG. 5),. If such a condition is found and there has been no corresponding signaling at the control plane level, U1 will notify C2 to pull down the connection and perform any necessary clean up tasks.
User Plane Interfaces
Two user plane interfaces are defined:
External Entity to V/IP User Plane
1) U1.I1: The Internet Telephony Packetized Voice Interface is an external interface which is responsible for transporting Vocoded, packetized voice segments across the IP Access Network and IP Network.
2) U1.I10: The Circuit Switched Voice Interface is an external interface responsible for transporting PCM voice segments across the PSTN.
Control Plane Objects
Three control plane objects are defined:
1) C1: Internet Telephony Gateway Directory Object
2) C2: Internet Telephony Call Control Object
3) C3: Internet Telephony Authorization and Usage Recording Object (Internal)
The C1 Object: The Internet Telephony Gateway Directory manages which E.164 addresses (telephone numbers) are served within the terminating footprint of a particular ITG. The management of the terminating footprint may be in the form of NPA-NXX ranges which relate to an IP address for a single ITG. When queried with a “called” telephone number by the PC Call Control Object, the C1 object returns the IP address of the Internet Telephony Gateway (ITG) that serves the called telephone number.
The IP address of the V/IP Server is communicated to the PC user or Client software application prior to initiating contact with the C1 object. The object's TCP port number for the C1 directory application is defined, selected, and maintained within the client software.
The C2 Object: Internet Telephony Call Set-Up may be described as follows:
The ITN (ITG) communicates with the PC user to establish a PC-to-Telephone call. The call setup is originated by the PC user and destinated or terminated by the telephone user by supplying the address or number of the called terminal. However, it is the C2 Object or Call Control Object which coordinates the signaling among the involved network elements. Included in this signaling are:
Management of the state of the call with the client PC software (via C2.I1 shown in
Validation of a PC users' Account number and password (via C3.I4 shown in
Establishment and tear down of the PSTN circuit (via C4.I7 shown in
Generation of usage information which is sent for processing and pricing (via C3.I4 shown in
Managing the state of the connection within C3 (via C3.I4 shown in
When initiating a V/IP call, the PC user may be required to provide the 10 digit E.164 (ITU-T telecommunication numbering or telephone number) address of the called telephone user, the IP address of the ITG associated with the called telephone user (obtained via the C1 Object), the PC's IP address, as well as the billing account number and associated password.
The C2 object is able to signal various states of a connection (ringing, busy, etc.) to a PC user. If the C2 object receives a maximum call duration from C3 during call set-up, this maximum call duration is sent to the PC software either as an audio message or as information to be presented on the PC screen. C2 generates the raw usage records which are sent to C3. A usage record is not tagged as billable unless the PC application has acknowledged its receipt of a connection establishment message. The C2 object may require a user ID and password to be provided by the PC Client software prior to completing a V/IP call. This information is authenticated via the C3 object.
The C3 Object: User Authorization and Usage Recording
The C3 Object ensures coordination between User Authorization and Usage Recording for a single PC user's customer account. C3 also responds to external requests for that information. C3 is a unitary logical object with distributed instances. That is, physically distributed account, authorization, validation and billing databases are so arranged as to be usable as a single logical object. The data associated with a user subscriber account is typically stored in an instance of C3 which is local to the user subscriber. The C3 Object is invoked during a call when an Authorization request is relayed over C3.I4 (this request typically consists of an account number and password provided by PC User). At this point C3 checks the account's password and available monthly minutes remaining, and responds appropriately to C2. Optionally, C3 can respond to C2 with a maximum allowable minute duration for a call. Successful account validation by the C3 Object is a prerequisite to successful call establishment by the C2 Object.
The C3 Object is also responsible for accepting usage recording data from C2, and decrementing the minutes used from the available minutes (and/or optionally pricing that usage, and decrementing that priced amount from a customer's existing balance), and then logging the information. Preferably, C3 also knows the state of a users connections across multiple ITGs. With this state information, the authorization system may ensure only one call per account is being handled by the network, and/or ensure that the maximum available minute limit is not being circumvented by multiple concurrent sessions (otherwise a second PC caller might receive authorization for a call prior to the posting of the first caller's usage record).
The theory behind bundling usage recording, pricing, and authorization into one logical object is to significantly reduce the potential for fraud when the system is widely deployed. By having a single logical database which is managing customer authentication, authorization, and usage pricing for the network, data synchronization is facilitated, and opportunities for fraud are minimized. As described, it is not necessary that C3 be implemented as a single physical system. The C2 Object will provide C3 with a customer billing account number and a password (originally supplied by the PC user). The C3 Object maintains a current account “minutes remaining” balance and usage records for each user on a monthly basis. This usage information can be extracted in real time based on a request from the M1.I5 interface as shown in
If a user who is requesting authorization has a low “minutes remaining” balance, and this low balance will result in a maximum call duration which is shorter than the maximum call duration typically allowed by the network, then the Authentication server will transmit a maximum call duration back to the C2 Object.
The Control Plane Interfaces
Four control plane interfaces are defined:
External Entity to V/IP Control Plane
Five management plane objects are defined and shown in
1) M1: ITN Information Server & Feedback Object
2) M2: ITN Subscription Server Object
3) M3: ITN Billing System Object
4) M4: ITN Directory Maintenance Object (Internal)
5) M5: ITN Surveillance Object (Internal)
The M1 Object: The ITN Information & Feedback Server allows the PC user to access information -on the V/IP service including general and user-specific information. Essentially, the M1 Object is the HTML interface to the V/IP network for subscribers of the service. Following is the information which the user might request from the ITN via HTML:
Operationally the M1 Object interface will be accessible via commercial browsers and at least a Netscape 3.0 or Internet Explorer 3.0 web browser. On any customer specific request for usage records or account balance, a PC user will have to provide within the query the same account number and password which is used for call establishment. This information will be validated by C3 when fulfilling the request.
The M2 Object: ITN Subscription Server: The ITP allows the PC user to subscribe to the V/IP service via an on-line process. Information gathered from the potential subscriber will include:
ISP (Internet Service Provider) account number
ISP email address
CPU type of PC, amount of memory
Type of sound card, microphone, and speakers
Operating System and version
Global Service Provider (GSP)
Free disk space
Upon activation the subscriber will receive notification via email. This email will include instructions, the web page URLs (Uniform Resource Locator or www (World Wide Web) address) needed to get started, and an initial password (which can be changed via M1).
The M3 Object: ITN Billing System: Monthly, the M3 Object will poll C3 to extract account balances and credit card numbers in order to request payments from credit card companies. As account balances are processed by the M3 Object, failed billing attempts will be flagged in a report (either formatted as ASCII, or in a PC database product's format).
The M4 Object: ITN Directory Maintenance: Directory data (in the form of NPA-NXX ranges pointing to ITGs) will be created, validated, and managed outside of the network (away from C1, the ITN Directory Object). The M4 object is responsible for this function. M4 will accomplish this by assisting in the creation of the Directory tables in a format which can be exported directly (via M4.I5) to C1. The M4 Object preferably also supports the creation of graphical maps showing the terminating call areas supported by the ITGs. The maps and the NPA-NXX table information may be exported so that it may be presented to the user via M1. Off the shelf software products like MapInfo may be used to support the requirements of M4.
Operationally the M4 Object is able to import NPA-NXX data, along with supporting graphical central office serving area information. The object is able to graphically define ITG terminating calling areas. The M4 Object automatically generates the NPA-NXX to ITG IP address Directory table based on the graphical information provided above. The M4 Object supports multiple versions of the C1 Object Directory database.
The M5 Object: ITN Surveillance: The V/IP service may cross many network elements within the ITN. Having a centralized surveillance capability which can span multiple platforms ensure its operation. The M5 Object attempts to identify and log critical alarms, and to present these alarms to an administrative console. Such alarms may include: Whether a network based application is under distress (via an SNMP Management Information Block (MIB)), whether the system is alive and communicating with the network (via “Ping” or similar function), whether required application processes are active and if they need to be restarted (via a “ps -eaf” or similar function), whether the processes are sane (via periodic test queries to validate correct responses).
These types of problems may be analyzed by M5, and alarms generated and logged within C5 at four levels: S Critical (service affecting), Major (user intervention recommended), Minor (of note), and Informational (components reporting normal operation). These alarms may be used to manage a local database containing managed objects representing the current operational state of ITN platforms and processes. Each managed object and/or platform will be assigned one of three operational states: Red (out of service), Orange (operating with degraded capabilities), and Green (operating normally). A graphical representation of the ITN network is presented to a console via a standard display package such as OpenView. Console operators have the option of directly connecting to any ITN object or system to perform troubleshooting or diagnostic operations. This connection presents the console operator with the same capabilities as a local system administrator.
With respect to M5 addressing requirements, new elements added to the ITN will have their IP addresses and their type of object identified in M5. The M5 Object will create its database of managed objects dynamically (once given the IP address or host name) via the M5x.I5 interfaces.
Management Plane Interfaces
Ten Management Plane Interfaces have been defined:
External Entity to V/IP Management Plane
The functions of these interfaces are as follows:
The M1.I1 Interface: The Internet Telephony Data Request external interface is responsible for providing a subscriber with data requested about the ITN in real time.
The M3.I10 Interface: The Credit Card Provider external interface is responsible for allowing an ISP to place a charge against a user's credit card account number.
The M1.I5 Interface: The Internet Telephony Network Data Extraction internal interface is responsible for providing the M1 Object with real time data regarding a subscriber's remaining minutes of use, usage records of the current and previous billing cycle, and/or calls currently in progress. The M1 Object will reformat and present this data to the subscriber who requested it.
The M2.I5 Interface: The Internet Telephony Subscription Management internal interface is responsible for managing the list of account numbers allowed to use the ITN. This interface supports several functions: an initial batch load of subscribers and initial passwords, adding or removing individual account numbers, and resetting individual passwords.
The M3.I5 Interface: The Internet Telephony Billing and Usage Extraction internal interface is responsible for performing a periodic extraction of usage records from the network.
The M4.I5 Interface: The Internet Telephony Directory Maintenance internal interface is responsible for maintaining the NPA-NXX to hop-off ITG directory data.
The M5a.I5 Interface: The Internet Telephony Call Management Surveillance internal interface is responsible for carrying a variety of information which allows M5 to assess the availability, health, and status of the physical computer and software processes of the various Internet Telephony Gateways.
Based on the foregoing descriptions of the interfaces and objects a high level call flow of signaling messages is described.
The call flow starts at the point where the user has established IP layer connectivity with the network, and has invoked the V/IP software application. This preliminary procedure typically entails the following steps by the party initiating the call (not illustrated in
1. The customer will boot the PC, and connect to the IP network following their existing procedures for network access.
2. The customer will launch their V/IP application, either as a plug-in to an existing browser or as a stand-alone application. When launched, this application will present a template of fields which are required to initiate a call.
3. The customer will populate a “telephone number to be called” data field. The customer will also either populate his/her account number and password, or the application will reapply this data if it has been previously saved within the application.
4. The customer will then initiate the call. During the call, the call's completion status will be presented in real-time to the user by the application (via a visual display). One example of the call initiation procedure is now described.
The following steps commence with the Called Party Address Request step in
1. The user initiates a call via the PC's V/IP software. This software application invokes the Directory (C1 Object) to obtain the IP address of the destination ITG. Based on the dialed number submitted by the PC application as described in the foregoing preliminary procedure, the C1 Object returns the IP address of the associated ITG (C2 Object).
2. The PC's V/IP software application invokes the C2 Object to set up a call by passing to C2 the number to be called, the user's account number, and a password. This is shown as SETUP in
3. C2 invokes the C3 Object in order to receive authorization to proceed with the call (PSTN Termination Request). This may entail communication among instances of the distributed database to verify the account status of the caller and optionally set a limit on the duration or cost of the call depending upon the account status and/or balance. The pricing of the call may be communicated to C2 for communication to the caller. C3 will pass the authorization information back to the C2 (PSTN Termination Authorization).
4. If authorization was successful, C2 will establish the PSTN connection, and notify the client software that the call is proceeding (SETUP Call Proceeding). C2 may also pass on to the calling PC the pricing information obtained from C3. C2 will continue to update the client software with call establishment information as the call is proceeding and may also pass along to the caller a running account of the cost of the call.
5. After the call has been established, the PC will respond to the network that it recognizes that a connection has been established (Connection Acknowledged), timing of the call's duration can be initiated, and any usage measurements will indicate that the call is billable.
6. Steady state call (Voice Flow).
7. The PC's V/IP software application invokes the C2 service to release the call. The PC application signals release to C2, and C2 releases the call in the PSTN and confirms the release back to PC application. Also, timing of the call's billable duration is completed. Alternatively, the PSTN user may initiate call tear down as well.
8. The C2 Object passes a usage record to C3 for reporting. The C3 Object may also initiate individual call billing by reporting to M3 as shown in
A modified version or embodiment of the call set up procedure is now described in connection with
The following steps commence with the Called Party Address Request step in
1. The user initiates a call via the PC's V/IP software. This software application invokes the Directory (C1 Object) to obtain the IP address of the destination ITG. Based on the dialed number submitted by the PC application, the C1 Object returns the IP address of the associated ITG (C2 Object).
2. The PC's V/IP software application invokes the C2 Object to set up a call by passing to C2 the number to be called, the user's account number, and a password (Connection Request).
3. The C2 Object invokes the C1 Object to request the customer account server address (Customer Account Server Address Req), which is then returned (Customer Account Server Address Resp).
4. The C2 Object invokes the C3 Object for account validation (Account Validation) using the Customer Account Server Address (address of the instance of the C3 object database) and receives call authorization (Call Authorization). This may include limitations as described in connection with the description of
5. If authorization was successful, C2 will establish the PSTN connection, and notify the client software that the call is proceeding. C2 will continue to update the client software with call establishment information as the call is proceeding.
6. After the call has been established, the PC will respond to the network that it recognizes that a connection has been established (Connect Ack), timing of the call's duration can be initiated, and any usage measurements will indicate that the call is billable.
7. Steady state call (U1 Service PC to telephone).
8. The PC's V/IP software application invokes the C2 service to release the call. The PC application signals release to C2, and C2 releases the call in the PSTN and confirms the release back to PC application. Also, timing of the call's billable duration is completed. Alternatively, the PSTN user may initiate call tear down as well.
9. The C2 Object passes a usage record to C3 for reporting and for individual call billing if that option is chosen. The C3 Object acknowledges receipt of the usage record to C2.
Keyboard/Mouse
Call Initiation: This comprises the input of information needed by the state machine (and the V/IP control plane) which is required to establish a call. The information includes the calling party's account number and password, as well as the telephone number being called.
PC User Call Termination Request: This comprises the input of a notification by the user to the software to conclude the call.
Display/Monitor
Error Notification: This comprises a dialog which shows the reason for the failure of a particular call.
Call Establishment Notification: This refers to the display information showing the step-by-step progression of a call as it is established through the network.
Call Completion Notification: This comprises a dialog which shows the statistics of a completed call.
1. It is not necessary for the client software to validate that IP Access Network or IP Network connectivity has been established prior to attempting to communicate with the network. The availability of connectivity across these layers is assumed. A lack of response by the network to the application's state machine is displayed to the user as a lack of network level connectivity.
2. Each of the five V/IP network interfaces is able to have their transactions traverse seamlessly across the IP Access Network and IP Network. The client software should use the same IP network drivers which are used for their existing ISP Internet connectivity. Client software driver conflicts or adverse interactions should not occur with the installed base of PC software.
3. All management plane interfaces with the user may be via the PC's existing Web Browser. The client software need not take on the task of managing network based customer data.
4. The compressed voice interface, U1.I1, preferably communicates via UDP (User Datagram Protocol), however, RTP (Routing Table Protocol) on top of UDP is also an option. If RTP is used, the client software should validate that it is a valid option over the existing IP network.
5. If RTP is selected, and communication over the IP Access network is performed with a PPP link, RTP header compression should be supported in order to reduce the required IP Access network bandwidth.
6. The software must be able to transmit DTMF digits to the hop-off ITG. Preferably the digits will be transmitted “out of band” (in other words, the PC will not generate DTMF signals which are transmitted as compressed tones).
7. The software should be able to transmit the length (duration) that a DTMF digit a pressed.
8. The software should display to the user the current state of a call as it is made through the Internet Telephony Gateway (ITG).
9. The voice played back to the PC user will be toll quality. The Vocoder includes capabilities such as echo cancellation, it should be able to handle varying levels of packet loss and latency, and it should be able to apply corrective algorithms to the voice stream.
10. A user account number and password should be required within the Call Initiation message to the state machine. If the user so chooses, these items should be able to be saved within the client application.
In order to insure ease of use and maximum utility to the subscriber it is desirable to provide for the subscriber an easy access and instructional tutorial as to the use of the system. At the same time it is also desirable to provide the subscriber with his/her billing account balance, status, and call usage details on a real time basis. This information may include descriptions on how to download and install client software and operate the service, descriptions of service availability and pricing plans, graphical (map) areas showing the ITG terminating footprints, and NPA-NXX ranges supported by the ITG terminating footprints. With respect to account information the data available to the subscriber may include call usage record details, billing account status & balance, and verification of the existing password. All of the foregoing may be conveniently provided through the use of an introductory page with links to pages that provide access to each of the foregoing.
The system of the invention provides the above described features through the architecture illustrated in
Operationally the M1 Object interface is accessible via commercial browsers and at least a Netscape 3.0 or Internet Explorer 3.0 web browser. On any customer specific request for usage records or account balance, a PC user will have to provide within the query the same account number and password which is used for call establishment. This information will be validated by C3 before fulfilling the request. The M1.I1 link between the PC user browser and M1 information server is shown in
The M1 information server provides real time interface to the authorization, usage and account object C3 while at the same time also providing isolation of the C3 object. The information server thus provides an intermediary which, among other things, prevents undesirable interaction between information retrieval and service implementation in the C3 authorization, usage and account object. Appropriate sizing of the capacity of the information server permits the provision of virtually instant access for subscribers without necessarily requiring interrelated sizing of the authentication, usage and account object.
The combination of the logically unitary distributed authorization, usage and account object with this intermediary information server, which is constantly available to subscriber, presents a unique and powerful tool for information retrieval and usage. As has been previously explained, the distinctive authorization, usage and retrieval object provides tracking of multiple ongoing calls against the same account through separate and geographically distal ITGs and network elements.
The new information server permits a subscriber to engage in real time monitoring of this activity and real time tracking of overall account status and balance. Further, there is no requirement that the subscriber perform such monitoring or information gathering from a fixed locale. The information is as readily available from a hotel room by laptop computer as from the home location of the subscriber. Still further, the information may be retrieved and monitored not only by the subscriber but also by any entity with valid credentials for accessing the service, such as a super account holder or employer. This also provides a mechanism for an employer to act on the obtained information to place a stop on further use of any supervised account.
The circuit switched network is connected to the packet switched network via a plurality of C2 call control objects or ITGs shown here by way of illustration as 424, 426, 428, 430, and 432. These gateway control objects are connected to routers in the Internet/Intranet as shown at 434, 436, 438, 440, and 442. The ITGs are also connected to end or central offices in the circuit switched network shown here as 444, 446, 448, 450, and 452. Also connected to the Internet/Intranet are voice equipped personal computers or PCs 454, 456, and 458. These PCs are shown connected to routers 460, 462, and 464. It will be appreciated that the particular gateway or ITG chosen to effect a particular communication path is dependent upon multiple factors, such as the lowest cost connection through the telephone network, by way of example. Thus the ITG 424 may be chosen to effect a link between PC 454 and telephone terminal 412.
As has been explained, the gateway controllers are all linked to the C3 authentication, usage and account object 466 as shown here at 468. The authentication, usage and account object in turn is linked to the information server object M1, here shown at 468. This has previously been described in more detail in connection with
It is believed that this simplified diagrammatic illustration in
While the foregoing has described what are considered to be preferred embodiments of the invention, it is understood that various modifications may be made therein and that the invention may be implemented in various forms and embodiments, and that it may be applied in numerous applications, only some of which have been described herein. It is intended by the following claims to claim all such modifications and variations which fall within the true scope of the invention.
This is a continuation of prior U.S. patent application Ser. No. 08/931,480. filed Sep. 16, 1997, titled “NETWORK SESSION MANAGEMENT,” now U.S. Pat. No. 6,839,340, which is related to U.S. patent application Ser. No. 08/931,159, filed Sep. 16, 1997, titled “NETWORK SESSION MANAGEMENT,” now U.S. Pat. No. 6,137,869, which is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
4054756 | Comella et al. | Oct 1977 | A |
4100377 | Flanagan | Jul 1978 | A |
4191860 | Weber | Mar 1980 | A |
4201891 | Lawrence et al. | May 1980 | A |
4310727 | Lawser | Jan 1982 | A |
4313035 | Jordan et al. | Jan 1982 | A |
4313036 | Jabara et al. | Jan 1982 | A |
4371752 | Matthews et al. | Feb 1983 | A |
4375097 | Ulug | Feb 1983 | A |
4555594 | Friedes et al. | Nov 1985 | A |
4565903 | Riley | Jan 1986 | A |
4577066 | Bimonte et al. | Mar 1986 | A |
4585906 | Matthews et al. | Apr 1986 | A |
4602129 | Matthews et al. | Jul 1986 | A |
4609778 | Franklin et al. | Sep 1986 | A |
4611094 | Asmuth et al. | Sep 1986 | A |
4611096 | Asmuth et al. | Sep 1986 | A |
4625081 | Lotito et al. | Nov 1986 | A |
4630262 | Callens et al. | Dec 1986 | A |
4652700 | Matthews et al. | Mar 1987 | A |
4653045 | Stanley et al. | Mar 1987 | A |
4672700 | Poncy | Jun 1987 | A |
4679190 | Dias et al. | Jul 1987 | A |
4685125 | Zave | Aug 1987 | A |
4710917 | Tompkins et al. | Dec 1987 | A |
4713806 | Oberlander et al. | Dec 1987 | A |
4718005 | Feigenbaum et al. | Jan 1988 | A |
4730071 | Schoenthal | Mar 1988 | A |
4734931 | Bourg et al. | Mar 1988 | A |
4741820 | Coughlin | May 1988 | A |
4747130 | Ho | May 1988 | A |
4748618 | Brown et al. | May 1988 | A |
4765924 | Inoue | Aug 1988 | A |
4766604 | Axberg | Aug 1988 | A |
4771425 | Baran et al. | Sep 1988 | A |
4782485 | Gollub | Nov 1988 | A |
4788718 | McNabb et al. | Nov 1988 | A |
4790003 | Kepley | Dec 1988 | A |
4821034 | Anderson et al. | Apr 1989 | A |
4827500 | Binkerd et al. | May 1989 | A |
4865763 | Inoue | Sep 1989 | A |
4866763 | Cooper et al. | Sep 1989 | A |
4872157 | Hemmady et al. | Oct 1989 | A |
4872160 | Hemmady et al. | Oct 1989 | A |
4872197 | Pemmaraju | Oct 1989 | A |
4875206 | Nichols et al. | Oct 1989 | A |
4877949 | Danielson | Oct 1989 | A |
4882476 | White | Nov 1989 | A |
4893302 | Hemmady et al. | Jan 1990 | A |
4894824 | Hemmady et al. | Jan 1990 | A |
4897874 | Lidinsky et al. | Jan 1990 | A |
4899333 | Roediger | Feb 1990 | A |
4899373 | Lee et al. | Feb 1990 | A |
4910794 | Mahany | Mar 1990 | A |
4916691 | Goodman | Apr 1990 | A |
4918722 | Duehran et al. | Apr 1990 | A |
4922486 | Lidinsky et al. | May 1990 | A |
4933931 | Kokubo | Jun 1990 | A |
4942574 | Zelle | Jul 1990 | A |
4958341 | Hemmady et al. | Sep 1990 | A |
4969184 | Gordon et al. | Nov 1990 | A |
4979206 | Padden et al. | Dec 1990 | A |
4996707 | O'Malley et al. | Feb 1991 | A |
D315573 | Schultz | Mar 1991 | S |
5008906 | Reichwein | Apr 1991 | A |
5008926 | Misholi | Apr 1991 | A |
5009337 | Bimbi | Apr 1991 | A |
5012511 | Hanle et al. | Apr 1991 | A |
5018191 | Catron et al. | May 1991 | A |
5019699 | Koenck | May 1991 | A |
5023868 | Davidson | Jun 1991 | A |
5025254 | Hess | Jun 1991 | A |
5029196 | Morganstein | Jul 1991 | A |
5029199 | Jones et al. | Jul 1991 | A |
5029200 | Haas | Jul 1991 | A |
5031098 | Miller | Jul 1991 | A |
5034975 | Grimes | Jul 1991 | A |
5052020 | Koenck | Sep 1991 | A |
5052943 | Davis | Oct 1991 | A |
5065393 | Sibbitt et al. | Nov 1991 | A |
5068888 | Scherk et al. | Nov 1991 | A |
5070536 | Mahany | Dec 1991 | A |
5098877 | Coughlin | Mar 1992 | A |
5107492 | Roux et al. | Apr 1992 | A |
5113499 | Ankney et al. | May 1992 | A |
5115431 | Williams et al. | May 1992 | A |
5115495 | Tsuchiya et al. | May 1992 | A |
5123064 | Hacker | Jun 1992 | A |
5134647 | Pugh et al. | Jul 1992 | A |
5144282 | Sutterlin | Sep 1992 | A |
5146488 | Okada et al. | Sep 1992 | A |
5146491 | Silver et al. | Sep 1992 | A |
5157390 | Yoshie et al. | Oct 1992 | A |
5157662 | Tadamura et al. | Oct 1992 | A |
5159592 | Perkins | Oct 1992 | A |
5159624 | Makita | Oct 1992 | A |
5163080 | Amoroso | Nov 1992 | A |
5164938 | Jurkevich et al. | Nov 1992 | A |
5180232 | Chadma | Jan 1993 | A |
5185860 | Wu | Feb 1993 | A |
5193110 | Jones et al. | Mar 1993 | A |
5195085 | Bertsch et al. | Mar 1993 | A |
5195086 | Baumgartner et al. | Mar 1993 | A |
5195128 | Knitl | Mar 1993 | A |
5195183 | Miller | Mar 1993 | A |
5199062 | Von Meister | Mar 1993 | A |
5200993 | Wheeler et al. | Apr 1993 | A |
5202817 | Koenck | Apr 1993 | A |
5202825 | Miller | Apr 1993 | A |
5204894 | Darden | Apr 1993 | A |
5206901 | Harlow et al. | Apr 1993 | A |
5208848 | Pula | May 1993 | A |
5215011 | Monney | Jun 1993 | A |
5216233 | Main | Jun 1993 | A |
5218187 | Koenck | Jun 1993 | A |
5218188 | Hanson | Jun 1993 | A |
5223699 | Flynn et al. | Jun 1993 | A |
5223820 | Sutterlin | Jun 1993 | A |
5225071 | Coughlin | Jul 1993 | A |
5226075 | Funk et al. | Jul 1993 | A |
5227614 | Danielson | Jul 1993 | A |
5231492 | Dangi et al. | Jul 1993 | A |
5235317 | Sutterlin | Aug 1993 | A |
5237604 | Ryan | Aug 1993 | A |
5241588 | Babso et al. | Aug 1993 | A |
5243645 | Bissell et al. | Sep 1993 | A |
5243654 | Hunter | Sep 1993 | A |
5247571 | Kay et al. | Sep 1993 | A |
5254971 | Sutterlin | Oct 1993 | A |
5260986 | Pershan | Nov 1993 | A |
5263080 | Jones et al. | Nov 1993 | A |
5265155 | Castro | Nov 1993 | A |
5272749 | Masek | Dec 1993 | A |
5274696 | Perelman | Dec 1993 | A |
5280159 | Warner | Jan 1994 | A |
5287199 | Zoccolillo | Feb 1994 | A |
5289378 | Miller | Feb 1994 | A |
5289468 | Yoshida | Feb 1994 | A |
5295154 | Meier et al. | Mar 1994 | A |
5303297 | Hillis | Apr 1994 | A |
5305181 | Schultz | Apr 1994 | A |
5308966 | Danielson | May 1994 | A |
5309437 | Perlman et al. | May 1994 | A |
5311583 | Friedes et al. | May 1994 | A |
5313053 | Koenck | May 1994 | A |
5317566 | Joshi | May 1994 | A |
5317691 | Traeger | May 1994 | A |
5318719 | Hughes | Jun 1994 | A |
5322991 | Hanson | Jun 1994 | A |
5325421 | Hou et al. | Jun 1994 | A |
5327421 | Hiller et al. | Jul 1994 | A |
5327486 | Wolff et al. | Jul 1994 | A |
5329520 | Richardson | Jul 1994 | A |
5329578 | Brennan et al. | Jul 1994 | A |
5331580 | Miller | Jul 1994 | A |
5333266 | Boaz | Jul 1994 | A |
5341374 | Lewen et al. | Aug 1994 | A |
5345446 | Hiller et al. | Sep 1994 | A |
5346611 | Coughlin | Sep 1994 | A |
5347633 | Ashfield et al. | Sep 1994 | A |
5349497 | Hanson et al. | Sep 1994 | A |
5349678 | Morris | Sep 1994 | A |
5351286 | Nici | Sep 1994 | A |
5353331 | Emery et al. | Oct 1994 | A |
5359185 | Hanson | Oct 1994 | A |
5361256 | Doeringer et al. | Nov 1994 | A |
5365524 | Hiller et al. | Nov 1994 | A |
5365546 | Koenck et al. | Nov 1994 | A |
5367566 | Moe et al. | Nov 1994 | A |
5371858 | Miller | Dec 1994 | A |
5375068 | Palmer et al. | Dec 1994 | A |
5375159 | Williams | Dec 1994 | A |
5377186 | Wegner et al. | Dec 1994 | A |
5381465 | Carter et al. | Jan 1995 | A |
5384831 | Creswell et al. | Jan 1995 | A |
5384840 | Blatchford et al. | Jan 1995 | A |
5386467 | Ahmad | Jan 1995 | A |
5390175 | Hiller et al. | Feb 1995 | A |
5390335 | Stephan et al. | Feb 1995 | A |
5392344 | Ash et al. | Feb 1995 | A |
5394436 | Meier | Feb 1995 | A |
5396542 | Alger et al. | Mar 1995 | A |
5400393 | Knuth | Mar 1995 | A |
5402478 | Hluchyj et al. | Mar 1995 | A |
5406557 | Baudoin | Apr 1995 | A |
5408237 | Patterson et al. | Apr 1995 | A |
5408382 | Schultz | Apr 1995 | A |
5410141 | Koenck | Apr 1995 | A |
5410754 | Klotzbach et al. | Apr 1995 | A |
5416842 | Aziz | May 1995 | A |
5418844 | Morrisey et al. | May 1995 | A |
5420211 | Hughes | May 1995 | A |
5420916 | Sekiguchi | May 1995 | A |
5422882 | Hiller et al. | Jun 1995 | A |
5422940 | Endo et al. | Jun 1995 | A |
5422941 | Hasenauer et al. | Jun 1995 | A |
5425028 | Britton et al. | Jun 1995 | A |
5425051 | Mahany | Jun 1995 | A |
5425085 | Weinberger et al. | Jun 1995 | A |
5425090 | Orriss | Jun 1995 | A |
5425091 | Josephs | Jun 1995 | A |
5425780 | Christie | Jun 1995 | A |
5426636 | Hiller et al. | Jun 1995 | A |
5428608 | Freeman et al. | Jun 1995 | A |
5428636 | Meier | Jun 1995 | A |
5430719 | Weisser, Jr. | Jul 1995 | A |
5430727 | Callon | Jul 1995 | A |
5434852 | La Porta et al. | Jul 1995 | A |
5434913 | Tung et al. | Jul 1995 | A |
5436957 | McConnell | Jul 1995 | A |
5436963 | Fitzpatrick et al. | Jul 1995 | A |
5440563 | Isidoro et al. | Aug 1995 | A |
5440620 | Slusky | Aug 1995 | A |
5440621 | Castro | Aug 1995 | A |
5442690 | Nazif et al. | Aug 1995 | A |
5444709 | Riddle | Aug 1995 | A |
5448633 | Jamaleddin et al. | Sep 1995 | A |
5450411 | Heil | Sep 1995 | A |
5452289 | Sharma et al. | Sep 1995 | A |
5452297 | Hiller et al. | Sep 1995 | A |
5452350 | Reynolds et al. | Sep 1995 | A |
5455821 | Schaeffer et al. | Oct 1995 | A |
5457629 | Miller | Oct 1995 | A |
5459775 | Isono et al. | Oct 1995 | A |
5461611 | Drak et al. | Oct 1995 | A |
5463677 | Bash et al. | Oct 1995 | A |
5465207 | Boatwright | Nov 1995 | A |
5466170 | Pavek | Nov 1995 | A |
5468947 | Danielson | Nov 1995 | A |
5468950 | Hanson | Nov 1995 | A |
5469496 | Emery et al. | Nov 1995 | A |
5469497 | Pierce et al. | Nov 1995 | A |
5469500 | Satter et al. | Nov 1995 | A |
5473608 | Gagne et al. | Dec 1995 | A |
5473677 | D'Amato et al. | Dec 1995 | A |
5475732 | Pester, III | Dec 1995 | A |
5475737 | Garner et al. | Dec 1995 | A |
5475748 | Jones | Dec 1995 | A |
5475817 | Waldo et al. | Dec 1995 | A |
5477531 | McKee et al. | Dec 1995 | A |
5479494 | Clitherow | Dec 1995 | A |
5481603 | Gutierrez et al. | Jan 1996 | A |
5483527 | Doshi et al. | Jan 1996 | A |
5483549 | Weinberg et al. | Jan 1996 | A |
5483586 | Sussman | Jan 1996 | A |
5483587 | Hogan et al. | Jan 1996 | A |
5483676 | Mahany | Jan 1996 | A |
5487111 | Slusky | Jan 1996 | A |
5488575 | Danielson | Jan 1996 | A |
5490247 | Tung et al. | Feb 1996 | A |
5493568 | Sampat et al. | Feb 1996 | A |
5493573 | Kobayashi et al. | Feb 1996 | A |
5495521 | Rangachar | Feb 1996 | A |
5500859 | Sharma et al. | Mar 1996 | A |
5500889 | Baker et al. | Mar 1996 | A |
5504746 | Meier | Apr 1996 | A |
5506887 | Emery et al. | Apr 1996 | A |
5506893 | Buscher et al. | Apr 1996 | A |
5511111 | Serbetcioglu et al. | Apr 1996 | A |
5513127 | Gard et al. | Apr 1996 | A |
5515303 | Cargin, Jr. | May 1996 | A |
5517434 | Hanson | May 1996 | A |
5517560 | Greenspan | May 1996 | A |
5521719 | Yamada | May 1996 | A |
5521924 | Kakuma et al. | May 1996 | A |
5524137 | Rhee | Jun 1996 | A |
5524145 | Parker | Jun 1996 | A |
5526353 | Henley et al. | Jun 1996 | A |
5526416 | Dezonno et al. | Jun 1996 | A |
5526489 | Nilakantan et al. | Jun 1996 | A |
5528539 | Ong | Jun 1996 | A |
5530744 | Charalambous et al. | Jun 1996 | A |
5530852 | Mesk et al. | Jun 1996 | A |
5537470 | Lee | Jul 1996 | A |
5539193 | Gibbs | Jul 1996 | A |
5539194 | Miller | Jul 1996 | A |
5539884 | Robrock, II | Jul 1996 | A |
5539886 | Aldred et al. | Jul 1996 | A |
5541398 | Hanson | Jul 1996 | A |
5541917 | Farris | Jul 1996 | A |
5541927 | Kristol et al. | Jul 1996 | A |
5541930 | Klingman | Jul 1996 | A |
5544010 | Schultz | Aug 1996 | A |
5551025 | O'Reilly et al. | Aug 1996 | A |
5551035 | Arnold et al. | Aug 1996 | A |
5555276 | Koenck | Sep 1996 | A |
5559068 | Chen | Sep 1996 | A |
5559721 | Ishii | Sep 1996 | A |
5559871 | Smith | Sep 1996 | A |
5561670 | Hoffert et al. | Oct 1996 | A |
5563882 | Bruno et al. | Oct 1996 | A |
5568645 | Morris | Oct 1996 | A |
5572583 | Wheeler, Jr. et al. | Nov 1996 | A |
5576529 | Koenck | Nov 1996 | A |
5579472 | Keywort et al. | Nov 1996 | A |
5583564 | Rao | Dec 1996 | A |
5583920 | Wheeler, Jr. | Dec 1996 | A |
5583926 | Venier et al. | Dec 1996 | A |
5583929 | Ardon | Dec 1996 | A |
5586175 | Hogan | Dec 1996 | A |
5586177 | Farris et al. | Dec 1996 | A |
5587577 | Schultz | Dec 1996 | A |
5590127 | Bales et al. | Dec 1996 | A |
5590133 | Billstrom et al. | Dec 1996 | A |
5590181 | Hogan | Dec 1996 | A |
5590346 | West | Dec 1996 | A |
5594717 | Watanabe et al. | Jan 1997 | A |
5594769 | Pellegrino et al. | Jan 1997 | A |
5594784 | Velius | Jan 1997 | A |
5594789 | Seazholtz et al. | Jan 1997 | A |
5598464 | Hess et al. | Jan 1997 | A |
5598487 | Hacker | Jan 1997 | A |
5602456 | Cargin | Feb 1997 | A |
5602854 | Luse | Feb 1997 | A |
5603085 | Shedlo | Feb 1997 | A |
5604682 | McLaughlin et al. | Feb 1997 | A |
5604737 | Iwami et al. | Feb 1997 | A |
5608446 | Carr et al. | Mar 1997 | A |
5608447 | Farry et al. | Mar 1997 | A |
5608786 | Gordon | Mar 1997 | A |
5610910 | Focsaneanu et al. | Mar 1997 | A |
5610972 | Emery et al. | Mar 1997 | A |
5610976 | Uota et al. | Mar 1997 | A |
5610977 | Williams et al. | Mar 1997 | A |
5615251 | Hogan | Mar 1997 | A |
5617343 | Danielson | Apr 1997 | A |
5617422 | Litzenberger et al. | Apr 1997 | A |
5617540 | Civanlar et al. | Apr 1997 | A |
5619555 | Fenton et al. | Apr 1997 | A |
5619557 | Van Berkum | Apr 1997 | A |
5619562 | Maurer et al. | Apr 1997 | A |
5621787 | McKoy et al. | Apr 1997 | A |
5623601 | Vu | Apr 1997 | A |
5625180 | Hanson | Apr 1997 | A |
5625404 | Grady et al. | Apr 1997 | A |
5625407 | Biggs et al. | Apr 1997 | A |
5625555 | Davis | Apr 1997 | A |
5625675 | Katsumaru et al. | Apr 1997 | A |
5625677 | Feiertag et al. | Apr 1997 | A |
5625681 | Butler, II | Apr 1997 | A |
5625682 | Gray et al. | Apr 1997 | A |
5627886 | Bowman | May 1997 | A |
5633916 | Goldhagen et al. | May 1997 | A |
5633919 | Hogan | May 1997 | A |
5636216 | Fox et al. | Jun 1997 | A |
5638430 | Hogan | Jun 1997 | A |
5640001 | Danielson | Jun 1997 | A |
5644471 | Schultz | Jul 1997 | A |
5646982 | Hogan et al. | Jul 1997 | A |
5651006 | Fujino et al. | Jul 1997 | A |
5652787 | O'Kelly | Jul 1997 | A |
5654957 | Koyama | Aug 1997 | A |
5657250 | Park et al. | Aug 1997 | A |
5657317 | Mahany | Aug 1997 | A |
5661197 | Villiger et al. | Aug 1997 | A |
5661782 | Bartholomew et al. | Aug 1997 | A |
5661790 | Hsu | Aug 1997 | A |
5661792 | Akinpelu et al. | Aug 1997 | A |
5663208 | Martin | Sep 1997 | A |
5664005 | Emery et al. | Sep 1997 | A |
5664102 | Faynberg | Sep 1997 | A |
5668857 | McHale | Sep 1997 | A |
5669062 | Olds et al. | Sep 1997 | A |
5671436 | Morrison | Sep 1997 | A |
5672860 | Miller | Sep 1997 | A |
5673031 | Meier | Sep 1997 | A |
5673263 | Basso et al. | Sep 1997 | A |
5675507 | Bobo, II | Oct 1997 | A |
5675741 | Aggarwal et al. | Oct 1997 | A |
5679943 | Koenck | Oct 1997 | A |
5680392 | Semaan | Oct 1997 | A |
5680442 | Bartholomew et al. | Oct 1997 | A |
5680446 | Fleischer et al. | Oct 1997 | A |
5680633 | Koenck | Oct 1997 | A |
5682379 | Mahany | Oct 1997 | A |
5687167 | Bertin et al. | Nov 1997 | A |
5689550 | Garson et al. | Nov 1997 | A |
5689553 | Ahuja et al. | Nov 1997 | A |
5692039 | Brankley et al. | Nov 1997 | A |
5694318 | Miller | Dec 1997 | A |
5694463 | Christie et al. | Dec 1997 | A |
5696903 | Mahany | Dec 1997 | A |
5699089 | Murray | Dec 1997 | A |
5699352 | Kriete et al. | Dec 1997 | A |
5699528 | Hogan | Dec 1997 | A |
5701295 | Bales et al. | Dec 1997 | A |
5701465 | Baugher et al. | Dec 1997 | A |
5703935 | Raissyan et al. | Dec 1997 | A |
5703942 | Pinard et al. | Dec 1997 | A |
5706286 | Reiman et al. | Jan 1998 | A |
5708680 | Gollnick | Jan 1998 | A |
5708833 | Kinney | Jan 1998 | A |
5710728 | Danielson | Jan 1998 | A |
5710884 | Dedrick | Jan 1998 | A |
5712903 | Bartholomew et al. | Jan 1998 | A |
5712906 | Grady et al. | Jan 1998 | A |
5712907 | Wegner et al. | Jan 1998 | A |
5712908 | Brinkman et al. | Jan 1998 | A |
5719854 | Choudhury et al. | Feb 1998 | A |
5722067 | Fougnies | Feb 1998 | A |
5724355 | Bruno et al. | Mar 1998 | A |
5724406 | Juster | Mar 1998 | A |
5724412 | Srinivasan | Mar 1998 | A |
5726984 | Kubler et al. | Mar 1998 | A |
5727002 | Miller et al. | Mar 1998 | A |
5727129 | Barrett et al. | Mar 1998 | A |
5729544 | Lev et al. | Mar 1998 | A |
5729599 | Plomondon et al. | Mar 1998 | A |
5732078 | Arango | Mar 1998 | A |
5732213 | Gessel et al. | Mar 1998 | A |
5737333 | Civanlar et al. | Apr 1998 | A |
5737395 | Irribarren | Apr 1998 | A |
5737404 | Segal | Apr 1998 | A |
5737414 | Walker et al. | Apr 1998 | A |
5740164 | Liron | Apr 1998 | A |
5740366 | Mahany | Apr 1998 | A |
5742596 | Baratz et al. | Apr 1998 | A |
5742668 | Pepe et al. | Apr 1998 | A |
5742670 | Bennett | Apr 1998 | A |
5742675 | Kilander et al. | Apr 1998 | A |
5742905 | Pepe et al. | Apr 1998 | A |
5744533 | Iwamoto et al. | Apr 1998 | A |
5747785 | Miller | May 1998 | A |
5747786 | Cargin, Jr. | May 1998 | A |
5748468 | Notenboom et al. | May 1998 | A |
5748619 | Meier | May 1998 | A |
5751706 | Land et al. | May 1998 | A |
5751707 | Voit et al. | May 1998 | A |
5751961 | Smyk | May 1998 | A |
5754639 | Flockhart et al. | May 1998 | A |
5754641 | Voit et al. | May 1998 | A |
5757784 | Liebowitz et al. | May 1998 | A |
5758281 | Emery et al. | May 1998 | A |
5761294 | Shaffer et al. | Jun 1998 | A |
5763867 | Main | Jun 1998 | A |
5764741 | Barak | Jun 1998 | A |
5768513 | Kuthyar et al. | Jun 1998 | A |
5774530 | Montgomery et al. | Jun 1998 | A |
5774533 | Patel | Jun 1998 | A |
5774535 | Castro | Jun 1998 | A |
5774660 | Brendel et al. | Jun 1998 | A |
5774695 | Autrey et al. | Jun 1998 | A |
5778313 | Fougnies | Jul 1998 | A |
5781550 | Templin et al. | Jul 1998 | A |
5781620 | Montgomery et al. | Jul 1998 | A |
5781624 | Mitra et al. | Jul 1998 | A |
5784617 | Greenstein et al. | Jul 1998 | A |
5787160 | Chaney et al. | Jul 1998 | A |
5790172 | Imanaka | Aug 1998 | A |
5790536 | Mahany | Aug 1998 | A |
5790548 | Sistani zadeh et al. | Aug 1998 | A |
5790806 | Koperda | Aug 1998 | A |
5793762 | Penners et al. | Aug 1998 | A |
5793763 | Mayes et al. | Aug 1998 | A |
5793771 | Darland et al. | Aug 1998 | A |
5796790 | Brunner | Aug 1998 | A |
5799072 | Vulcan et al. | Aug 1998 | A |
5799156 | Hogan | Aug 1998 | A |
5802502 | Gell et al. | Sep 1998 | A |
5802510 | Jones | Sep 1998 | A |
5802513 | Bowie, III | Sep 1998 | A |
5804805 | Koenck | Sep 1998 | A |
5805474 | Danielson | Sep 1998 | A |
5805587 | Norris | Sep 1998 | A |
5805682 | Voit et al. | Sep 1998 | A |
5805807 | Hanson | Sep 1998 | A |
5809128 | McMullin | Sep 1998 | A |
5812534 | Davis et al. | Sep 1998 | A |
5812639 | Bartholomew et al. | Sep 1998 | A |
5812795 | Horovitz et al. | Sep 1998 | A |
5812834 | Suzuki | Sep 1998 | A |
5812865 | Theimer et al. | Sep 1998 | A |
5818921 | Vander Meiden et al. | Oct 1998 | A |
5825780 | Christie | Oct 1998 | A |
5825862 | Voit et al. | Oct 1998 | A |
5825863 | Walker | Oct 1998 | A |
5825869 | Brooks et al. | Oct 1998 | A |
5826268 | Schaefer et al. | Oct 1998 | A |
5828737 | Sawyer | Oct 1998 | A |
5828740 | Khuc et al. | Oct 1998 | A |
5828844 | Civanlar et al. | Oct 1998 | A |
5832197 | Houji | Nov 1998 | A |
5834753 | Danielson | Nov 1998 | A |
5835723 | Andrews et al. | Nov 1998 | A |
5838665 | Kahn et al. | Nov 1998 | A |
5838682 | Dekelbaum et al. | Nov 1998 | A |
5838686 | Ozkan | Nov 1998 | A |
5838970 | Thomas | Nov 1998 | A |
5841764 | Roderique et al. | Nov 1998 | A |
5844893 | Gollnick | Dec 1998 | A |
5844896 | Marks et al. | Dec 1998 | A |
5845267 | Ronen | Dec 1998 | A |
5848143 | Andrews et al. | Dec 1998 | A |
5850358 | Danielson | Dec 1998 | A |
5850433 | Rondeau | Dec 1998 | A |
5854833 | Hogan | Dec 1998 | A |
5854975 | Fougnies | Dec 1998 | A |
5862171 | Mahany | Jan 1999 | A |
5864604 | Moen et al. | Jan 1999 | A |
5864610 | Ronen | Jan 1999 | A |
5867495 | Elliott et al. | Feb 1999 | A |
5867562 | Scherer | Feb 1999 | A |
5867566 | Hogan | Feb 1999 | A |
5870565 | Glitho | Feb 1999 | A |
5873099 | Hogan | Feb 1999 | A |
5878126 | Velamuri et al. | Mar 1999 | A |
5878130 | Andrews et al. | Mar 1999 | A |
5878212 | Civanlar et al. | Mar 1999 | A |
5881134 | Foster et al. | Mar 1999 | A |
5883891 | Williams et al. | Mar 1999 | A |
5884032 | Bateman et al. | Mar 1999 | A |
5888087 | Hanson | Mar 1999 | A |
5889774 | Mirashrafi et al. | Mar 1999 | A |
5892754 | Kompella et al. | Apr 1999 | A |
5892822 | Gottlieb et al. | Apr 1999 | A |
5892971 | Danielson | Apr 1999 | A |
5895431 | Miller | Apr 1999 | A |
5895906 | Danielson | Apr 1999 | A |
5898668 | Shaffer | Apr 1999 | A |
5898673 | Riggan et al. | Apr 1999 | A |
5901140 | Van As et al. | May 1999 | A |
5903558 | Jones et al. | May 1999 | A |
5905736 | Ronen et al. | May 1999 | A |
5907547 | Foladare et al. | May 1999 | A |
5910946 | Csapo | Jun 1999 | A |
5912887 | Sehgal | Jun 1999 | A |
5914481 | Danielson | Jun 1999 | A |
5915001 | Uppaluru | Jun 1999 | A |
5915005 | He | Jun 1999 | A |
5915008 | Dulman | Jun 1999 | A |
5915012 | Miloslavsky | Jun 1999 | A |
5917175 | Miller | Jun 1999 | A |
5917424 | Goldman et al. | Jun 1999 | A |
5918179 | Foladare et al. | Jun 1999 | A |
5923659 | Curry et al. | Jul 1999 | A |
5926482 | Christie | Jul 1999 | A |
5928292 | Miller | Jul 1999 | A |
5930343 | Vasquez | Jul 1999 | A |
5930700 | Pepper | Jul 1999 | A |
5933425 | Iwata | Aug 1999 | A |
5936958 | Soumiya et al. | Aug 1999 | A |
5937045 | Yaoya et al. | Aug 1999 | A |
5940479 | Guy et al. | Aug 1999 | A |
5940598 | Strauss et al. | Aug 1999 | A |
5940616 | Wang | Aug 1999 | A |
5940771 | Gollnick | Aug 1999 | A |
5944795 | Civanlar | Aug 1999 | A |
5946299 | Blonder | Aug 1999 | A |
5946386 | Rogers et al. | Aug 1999 | A |
5949056 | White | Sep 1999 | A |
5949776 | Mahany | Sep 1999 | A |
5949869 | Sink | Sep 1999 | A |
5953322 | Kimball | Sep 1999 | A |
5953338 | Ma et al. | Sep 1999 | A |
5953504 | Sokal et al. | Sep 1999 | A |
5953651 | Lu et al. | Sep 1999 | A |
5956391 | Melen et al. | Sep 1999 | A |
5956482 | Agraharam et al. | Sep 1999 | A |
5956697 | Usui | Sep 1999 | A |
5958016 | Chang et al. | Sep 1999 | A |
5958052 | Bellovin et al. | Sep 1999 | A |
5959998 | Takahashi et al. | Sep 1999 | A |
5966431 | Reiman et al. | Oct 1999 | A |
5966434 | Schafer et al. | Oct 1999 | A |
5969321 | Danielson | Oct 1999 | A |
5970065 | Miloslavsky | Oct 1999 | A |
5970477 | Roden | Oct 1999 | A |
5974043 | Solomon | Oct 1999 | A |
5974052 | Johnson et al. | Oct 1999 | A |
5978569 | Traeger | Nov 1999 | A |
5978840 | Nguyen et al. | Nov 1999 | A |
5979768 | Koenck | Nov 1999 | A |
5982774 | Foladare et al. | Nov 1999 | A |
5987108 | Jagadish et al. | Nov 1999 | A |
5987499 | Morris | Nov 1999 | A |
5991291 | Asai et al. | Nov 1999 | A |
5991292 | Focsaneanu et al. | Nov 1999 | A |
5991301 | Christie | Nov 1999 | A |
5991308 | Furhmann et al. | Nov 1999 | A |
5991864 | Kinney | Nov 1999 | A |
5995503 | Crawley et al. | Nov 1999 | A |
5995606 | Civanlar et al. | Nov 1999 | A |
5999524 | Corbalis et al. | Dec 1999 | A |
5999525 | Krishnaswamy | Dec 1999 | A |
6005926 | Mashinsky | Dec 1999 | A |
6006100 | Koenck | Dec 1999 | A |
6006253 | Kumar et al. | Dec 1999 | A |
6011975 | Emery et al. | Jan 2000 | A |
6012088 | Li et al. | Jan 2000 | A |
6014379 | White et al. | Jan 2000 | A |
6014687 | Watanabe et al. | Jan 2000 | A |
6016307 | Kaplan et al. | Jan 2000 | A |
6016343 | Hogan | Jan 2000 | A |
6018360 | Stewart et al. | Jan 2000 | A |
6018567 | Dulman | Jan 2000 | A |
6021126 | White et al. | Feb 2000 | A |
6021263 | Kujoory et al. | Feb 2000 | A |
6023147 | Cargin | Feb 2000 | A |
6023474 | Christie | Feb 2000 | A |
6026087 | Mirashrafi et al. | Feb 2000 | A |
6026091 | Christie | Feb 2000 | A |
6028858 | Rivers et al. | Feb 2000 | A |
6029062 | Hanson | Feb 2000 | A |
6029261 | Christie | Feb 2000 | A |
6031840 | Christie et al. | Feb 2000 | A |
6035028 | Ward et al. | Mar 2000 | A |
6036093 | Schultz | Mar 2000 | A |
6041109 | Cardy et al. | Mar 2000 | A |
6041117 | Androski et al. | Mar 2000 | A |
6044081 | Bell et al. | Mar 2000 | A |
6046992 | Meier | Apr 2000 | A |
6047051 | Ginzboorg et al. | Apr 2000 | A |
6047326 | Kilkki | Apr 2000 | A |
6049545 | Stephenson et al. | Apr 2000 | A |
6049813 | Danielson | Apr 2000 | A |
6052445 | Bashoura et al. | Apr 2000 | A |
6052450 | Allison et al. | Apr 2000 | A |
6058000 | Koenck | May 2000 | A |
6064653 | Farris | May 2000 | A |
6069890 | White et al. | May 2000 | A |
6075783 | Voit | Jun 2000 | A |
6078582 | Curry et al. | Jun 2000 | A |
6078943 | Yu | Jun 2000 | A |
6081525 | Christie | Jun 2000 | A |
6084867 | Meier | Jul 2000 | A |
6084953 | Bardenheuer et al. | Jul 2000 | A |
6088431 | LaDue | Jul 2000 | A |
6097804 | Gilbert et al. | Aug 2000 | A |
6098094 | Barnhouse et al. | Aug 2000 | A |
6101182 | Sistanizadeh et al. | Aug 2000 | A |
6104645 | Ong | Aug 2000 | A |
6104704 | Buhler et al. | Aug 2000 | A |
6104711 | Voit | Aug 2000 | A |
6108341 | Christie | Aug 2000 | A |
6108704 | Hutton et al. | Aug 2000 | A |
6112206 | Morris | Aug 2000 | A |
6115458 | Taskett | Sep 2000 | A |
6115737 | Ely et al. | Sep 2000 | A |
6118936 | Lauer et al. | Sep 2000 | A |
6122255 | Bartholomew et al. | Sep 2000 | A |
6125113 | Farris et al. | Sep 2000 | A |
6125126 | Hallenstal | Sep 2000 | A |
6128304 | Gardell et al. | Oct 2000 | A |
6131121 | Mattaway | Oct 2000 | A |
6134235 | Goldman et al. | Oct 2000 | A |
6134433 | Joong et al. | Oct 2000 | A |
6134530 | Bunting et al. | Oct 2000 | A |
6137792 | Jonas et al. | Oct 2000 | A |
6137869 | Voit et al. | Oct 2000 | A |
6141404 | Westerlage et al. | Oct 2000 | A |
6141412 | Smith et al. | Oct 2000 | A |
6144647 | Lopez-Torres | Nov 2000 | A |
6144661 | Katsube et al. | Nov 2000 | A |
6144667 | Doshi et al. | Nov 2000 | A |
6144976 | Silva | Nov 2000 | A |
6149062 | Danielson | Nov 2000 | A |
6154445 | Farris et al. | Nov 2000 | A |
6154777 | Ebrahim | Nov 2000 | A |
6157621 | Brown et al. | Dec 2000 | A |
6157636 | Voit et al. | Dec 2000 | A |
6157648 | Voit et al. | Dec 2000 | A |
6157823 | Fougnies | Dec 2000 | A |
6169735 | Alle et al. | Jan 2001 | B1 |
6175618 | Shah et al. | Jan 2001 | B1 |
6181690 | Civanlar | Jan 2001 | B1 |
6181695 | Curry et al. | Jan 2001 | B1 |
6181703 | Christie | Jan 2001 | B1 |
6185184 | Mattaway | Feb 2001 | B1 |
6185198 | LaDue | Feb 2001 | B1 |
6188677 | Oyama et al. | Feb 2001 | B1 |
6192050 | Stovall | Feb 2001 | B1 |
6192400 | Hanson | Feb 2001 | B1 |
6195425 | Farris et al. | Feb 2001 | B1 |
6198738 | Chang et al. | Mar 2001 | B1 |
6201812 | Christie | Mar 2001 | B1 |
6205139 | Voit | Mar 2001 | B1 |
6212162 | Horlin | Apr 2001 | B1 |
6212193 | Christie | Apr 2001 | B1 |
6215790 | Voit et al. | Apr 2001 | B1 |
6222919 | Hollatz et al. | Apr 2001 | B1 |
6226287 | Brady | May 2001 | B1 |
6226678 | Mattaway | May 2001 | B1 |
6230203 | Koperda et al. | May 2001 | B1 |
6233318 | Picard et al. | May 2001 | B1 |
6233604 | Van Horne et al. | May 2001 | B1 |
6236851 | Fougnies | May 2001 | B1 |
6240091 | Ginzboorg et al. | May 2001 | B1 |
6243373 | Turock | Jun 2001 | B1 |
6243374 | White | Jun 2001 | B1 |
6252869 | Silverman | Jun 2001 | B1 |
6260067 | Barnhouse et al. | Jul 2001 | B1 |
6263372 | Hogan | Jul 2001 | B1 |
6266685 | Danielson | Jul 2001 | B1 |
6278693 | Aldred et al. | Aug 2001 | B1 |
6278704 | Creamer et al. | Aug 2001 | B1 |
6279038 | Hogan | Aug 2001 | B1 |
6282192 | Murphy et al. | Aug 2001 | B1 |
6282281 | Low | Aug 2001 | B1 |
6282284 | Dezonno et al. | Aug 2001 | B1 |
6282574 | Voit et al. | Aug 2001 | B1 |
6285745 | Bartholomew et al. | Sep 2001 | B1 |
6289010 | Voit et al. | Sep 2001 | B1 |
6292478 | Farris | Sep 2001 | B1 |
6292479 | Bartholomew et al. | Sep 2001 | B1 |
6292481 | Voit et al. | Sep 2001 | B1 |
6295292 | Voit et al. | Sep 2001 | B1 |
6298057 | Guy | Oct 2001 | B1 |
6298062 | Gardell et al. | Oct 2001 | B1 |
6298064 | Christie | Oct 2001 | B1 |
6298120 | Civanlar et al. | Oct 2001 | B1 |
6301609 | Aravamudan et al. | Oct 2001 | B1 |
6304567 | Rosenburg | Oct 2001 | B1 |
6310873 | Rainis et al. | Oct 2001 | B1 |
6310941 | Crutcher et al. | Oct 2001 | B1 |
6314103 | Medhat et al. | Nov 2001 | B1 |
6324264 | Wiener et al. | Nov 2001 | B1 |
6327258 | Deschaine et al. | Dec 2001 | B1 |
6330250 | Curry et al. | Dec 2001 | B1 |
6332023 | Porter et al. | Dec 2001 | B1 |
6335927 | Elliott et al. | Jan 2002 | B1 |
6343115 | Foladare et al. | Jan 2002 | B1 |
6347085 | Kelly | Feb 2002 | B2 |
6359880 | Curry | Mar 2002 | B1 |
6363065 | Thornton et al. | Mar 2002 | B1 |
6373929 | Johnson et al. | Apr 2002 | B1 |
6374302 | Galasso et al. | Apr 2002 | B1 |
6375344 | Hanson | Apr 2002 | B1 |
6381321 | Brown et al. | Apr 2002 | B1 |
6385191 | Coffman et al. | May 2002 | B1 |
6385193 | Civanlar et al. | May 2002 | B1 |
6400702 | Meier | Jun 2002 | B1 |
6407991 | Meier | Jun 2002 | B1 |
6430195 | Christie | Aug 2002 | B1 |
6430275 | Voit et al. | Aug 2002 | B1 |
6438218 | Farris | Aug 2002 | B1 |
6449259 | Allain et al. | Sep 2002 | B1 |
6449356 | Dezonno | Sep 2002 | B1 |
6456617 | Oda et al. | Sep 2002 | B1 |
6480588 | Donovan | Nov 2002 | B1 |
6493353 | Kelly et al. | Dec 2002 | B2 |
6498788 | Emilsson et al. | Dec 2002 | B1 |
6513066 | Hutton | Jan 2003 | B1 |
6529516 | Parzych | Mar 2003 | B1 |
6539015 | Voit et al. | Mar 2003 | B2 |
6539077 | Ranalli et al. | Mar 2003 | B1 |
6542497 | Curry | Apr 2003 | B1 |
6546003 | Farris | Apr 2003 | B1 |
6574216 | Farris et al. | Jun 2003 | B1 |
6574681 | White | Jun 2003 | B1 |
6584093 | Salama et al. | Jun 2003 | B1 |
6594254 | Kelly | Jul 2003 | B1 |
6600733 | Deng | Jul 2003 | B2 |
6600735 | Iwama et al. | Jul 2003 | B1 |
6614768 | Mahany | Sep 2003 | B1 |
6614781 | Elliott | Sep 2003 | B1 |
6621942 | Hacker | Sep 2003 | B1 |
6625170 | Curry et al. | Sep 2003 | B1 |
6633846 | Bennett et al. | Oct 2003 | B1 |
6643362 | Hogan | Nov 2003 | B2 |
6654357 | Wiedeman | Nov 2003 | B1 |
6671285 | Kirkby et al. | Dec 2003 | B1 |
6678718 | Khouri et al. | Jan 2004 | B1 |
6681994 | Koenck | Jan 2004 | B1 |
6687738 | Hutton | Feb 2004 | B1 |
6688523 | Koenck | Feb 2004 | B1 |
6690788 | Bauer et al. | Feb 2004 | B1 |
6694359 | Morris | Feb 2004 | B1 |
6701365 | Hutton | Mar 2004 | B1 |
6704287 | Moharram | Mar 2004 | B1 |
6711241 | White et al. | Mar 2004 | B1 |
6714559 | Meier | Mar 2004 | B1 |
6714983 | Koenck | Mar 2004 | B1 |
6754181 | Elliott et al. | Jun 2004 | B1 |
6760429 | Hung et al. | Jul 2004 | B1 |
6775519 | Wiedeman et al. | Aug 2004 | B1 |
6792256 | Kinney | Sep 2004 | B1 |
6810033 | Derks | Oct 2004 | B2 |
6823384 | Wilson et al. | Nov 2004 | B1 |
6826165 | Meier | Nov 2004 | B1 |
6829645 | Hutton | Dec 2004 | B1 |
6839340 | Voit et al. | Jan 2005 | B1 |
6870827 | Voit et al. | Mar 2005 | B1 |
6885678 | Curry et al. | Apr 2005 | B2 |
6895419 | Cargin | May 2005 | B1 |
6910632 | Koerck | Jun 2005 | B2 |
6925054 | Atterton et al. | Aug 2005 | B1 |
6990090 | Meier | Jan 2006 | B2 |
7012898 | Farris et al. | Mar 2006 | B1 |
7013001 | Felger et al. | Mar 2006 | B1 |
7079534 | Medhat | Jul 2006 | B1 |
7085362 | Christie | Aug 2006 | B1 |
7088705 | Curry | Aug 2006 | B2 |
7092379 | Singh et al. | Aug 2006 | B1 |
7120319 | Danielson | Oct 2006 | B2 |
7149208 | Mattaway | Dec 2006 | B2 |
7170887 | Rosenberg | Jan 2007 | B2 |
7206592 | Gollnick | Apr 2007 | B1 |
7236575 | Kim et al. | Jun 2007 | B2 |
7274662 | Kalmanek, Jr. et al. | Sep 2007 | B1 |
7286562 | Vargo et al. | Oct 2007 | B1 |
7295830 | Lippelt | Nov 2007 | B2 |
7359972 | Jorgensen | Apr 2008 | B2 |
7492886 | Kalmanek, Jr. et al. | Feb 2009 | B1 |
7502339 | Pirkola et al. | Mar 2009 | B1 |
20020064149 | Elliott | May 2002 | A1 |
20020067739 | Wilkes et al. | Jun 2002 | A1 |
20020083166 | Dugan et al. | Jun 2002 | A1 |
20020114324 | Low et al. | Aug 2002 | A1 |
20020159461 | Hamamoto et al. | Oct 2002 | A1 |
20030078006 | Mahany | Apr 2003 | A1 |
20030112767 | Meier | Jun 2003 | A1 |
20030169767 | Christie | Sep 2003 | A1 |
20030189941 | Christie | Oct 2003 | A1 |
20030193933 | Jonas | Oct 2003 | A1 |
20030198218 | Farris et al. | Oct 2003 | A1 |
20030198335 | Porter et al. | Oct 2003 | A1 |
20040005046 | Deo et al. | Jan 2004 | A1 |
20040018851 | Koenck | Jan 2004 | A1 |
20040023651 | Gollnick | Feb 2004 | A1 |
20040038717 | Mahany | Feb 2004 | A1 |
20040039846 | Goss et al. | Feb 2004 | A1 |
20040044667 | Mahany | Mar 2004 | A1 |
20040073933 | Gollnick | Apr 2004 | A1 |
20040090952 | Kubler | May 2004 | A1 |
20040093363 | Cargin | May 2004 | A1 |
20040114567 | Kubler | Jun 2004 | A1 |
20040125753 | Mahany | Jul 2004 | A1 |
20040131018 | Johnson et al. | Jul 2004 | A1 |
20040145775 | Kubler | Jul 2004 | A1 |
20040146020 | Kubler | Jul 2004 | A1 |
20040146037 | Kubler | Jul 2004 | A1 |
20040151150 | Kubler | Aug 2004 | A1 |
20040151151 | Kubler | Aug 2004 | A1 |
20040151164 | Kubler | Aug 2004 | A1 |
20040160912 | Kubler | Aug 2004 | A1 |
20040160913 | Kubler | Aug 2004 | A1 |
20040162889 | Morris | Aug 2004 | A1 |
20040165573 | Kubler | Aug 2004 | A1 |
20040165793 | Hacker | Aug 2004 | A1 |
20040166895 | Koenck | Aug 2004 | A1 |
20040169583 | Meier | Sep 2004 | A1 |
20040174841 | Kubler | Sep 2004 | A1 |
20040174842 | Kubler | Sep 2004 | A1 |
20040174843 | Kubler | Sep 2004 | A1 |
20040203834 | Mahany | Oct 2004 | A1 |
20040246940 | Kubler | Dec 2004 | A1 |
20040264442 | Kubler | Dec 2004 | A1 |
20050008002 | Kubler | Jan 2005 | A1 |
20050013266 | Kubler | Jan 2005 | A1 |
20050021713 | Dugan et al. | Jan 2005 | A1 |
20050036467 | Kubler | Feb 2005 | A1 |
20050078647 | Meier | Apr 2005 | A1 |
20050083872 | Kubler | Apr 2005 | A1 |
20050087603 | Mahany | Apr 2005 | A1 |
20050191989 | Plush et al. | Sep 2005 | A1 |
20050195859 | Mahany | Sep 2005 | A1 |
20050232213 | Meier | Oct 2005 | A1 |
20050242192 | Koenck | Nov 2005 | A1 |
20050254475 | Kubler | Nov 2005 | A1 |
20060007951 | Meier | Jan 2006 | A1 |
20060062240 | Meier | Mar 2006 | A1 |
20060131420 | Koenck | Jun 2006 | A1 |
20060233161 | Koenck | Oct 2006 | A1 |
20060251226 | Hogan | Nov 2006 | A1 |
20060268806 | Meier | Nov 2006 | A1 |
20060268807 | Meier | Nov 2006 | A1 |
20060274732 | Allen, Jr. et al. | Dec 2006 | A1 |
20060274735 | Allen, Jr. et al. | Dec 2006 | A1 |
20060291752 | Hacker | Dec 2006 | A1 |
20070001007 | Koenck | Jan 2007 | A1 |
20070007353 | Danielson | Jan 2007 | A1 |
20070065046 | Hacker | Mar 2007 | A1 |
20070076687 | Low et al. | Apr 2007 | A1 |
20070086445 | Mattaway | Apr 2007 | A1 |
20070121529 | Meier | May 2007 | A1 |
20070121591 | Donovan | May 2007 | A1 |
20070201515 | Lewis | Aug 2007 | A1 |
20070206576 | Radulovic | Sep 2007 | A1 |
20070263644 | Christie et al. | Nov 2007 | A1 |
20080013531 | Elliott | Jan 2008 | A1 |
20080063161 | Joyce et al. | Mar 2008 | A1 |
20090022147 | Farris | Jan 2009 | A1 |
Number | Date | Country |
---|---|---|
0235257 | Feb 1987 | EP |
0235257 | Sep 1987 | EP |
0335562 | Apr 1989 | EP |
0365885 | May 1990 | EP |
0381365 | Aug 1990 | EP |
0559979 | Sep 1993 | EP |
0729281 | Feb 1995 | EP |
0767568 | Oct 1995 | EP |
0802690 | Apr 1996 | EP |
0781016 | Jun 1997 | EP |
0812089 | Dec 1997 | EP |
0823809 | Feb 1998 | EP |
0722237 | Nov 2007 | EP |
09-168051 | Jun 1997 | JP |
09-168063 | Jun 1997 | JP |
09-168064 | Jun 1997 | JP |
09-168065 | Jun 1997 | JP |
09-172459 | Jun 1997 | JP |
09-172462 | Jun 1997 | JP |
9107839 | May 1991 | WO |
9411813 | May 1994 | WO |
9522221 | Aug 1995 | WO |
9529564 | Nov 1995 | WO |
9620448 | Jul 1996 | WO |
9620553 | Jul 1996 | WO |
9632800 | Oct 1996 | WO |
9634341 | Oct 1996 | WO |
9638018 | Nov 1996 | WO |
9714238 | Apr 1997 | WO |
9720424 | Jun 1997 | WO |
9722211 | Jun 1997 | WO |
9723078 | Jun 1997 | WO |
9728628 | Aug 1997 | WO |
9733412 | Sep 1997 | WO |
9812860 | Mar 1998 | WO |
9823080 | May 1998 | WO |
9834391 | Aug 1998 | WO |
Number | Date | Country | |
---|---|---|---|
20050152340 A1 | Jul 2005 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 08931480 | Sep 1997 | US |
Child | 10979317 | US |