1. Field of the Invention
The present invention relates to a system and method for emergency access in Voice over Internet Protocol systems (VoIP), allowing limited communication connections when access is not otherwise authorized. Specifically, the present invention relates to a system and method for recognizing 911 emergency call requests and establishing and controlling a limited connection between the requesting device and server.
2. Description of the Related Art
A predominant goal of 911 access is the ubiquitous availability to emergency services. For both existing wired and wireless telephony services, 911 access is mandated from any device that has access to service, regardless of the user's subscription status or service restrictions.
For a wired telephone, when there is dial-tone present the network must permit a 911 call to be made. In the case of wireless telephones, if the handset can “see” the wireless system, the system must permit the handset to generate a 911 call. Both of these situations result as both networks can readily detect a request for a 911 call or a location specific Enhanced 911 (E911) call.
For Voice over Internet Protocol services (VoIP), providing 911 access without regard for service status is much more difficult. As can be appreciated by one skilled in the art, Voice over Internet Protocol is a communication technique for transmitting ordinary telephone calls over the Internet using packet-linked routes. A VoIP system captures, packetizes, and transports telephone conversations over a network, such as the Internet, which was originally designed to transport computer-generated data. However, because services such as VoIP are packet-based and use a layered protocol, VoIP communication systems require a software application on the device, such as a personal computer, to enable the device to make a call, and an IP services layer at the network to transport the call. The VoIP application can use one of several different signaling protocols, such as H.323, SIP, or Megaco, to initiate a 911 call and, as a consequence, a request for a 911 call may become embedded in a high-level protocol, which is not easily detected by the IP transport layer.
In providing 911 access, a VoIP client and IP services are assumed to be available and usable at the user device. Any additional capabilities required by the 911 service, such as user identification or caller location for enhanced 911 service (E911), are assumed to be provided by the VoIP client. Further details regarding E911 caller location services are set forth in IETF document entitled “Providing Emergency Call Services For SIP-Based Internet Telephony”, Jul. 13, 2000, the entire content being incorporated herein by reference.
The initial identification of 911 calls at a user device may involve the use of a special key on the user device, indicating a 911 call when pressed, or a predetermined key sequence, indicating a 911 call. Further details regarding identifying 911 calls at a user device are described in U.S. Pat. No. 6,073,005 entitled “Systems and Methods For Identifying Emergency Calls In Radio Communication Systems”, issued Jun. 6, 2000, the entire content being incorporated herein by reference.
Once a VoIP system 911 call is successfully initiated, existing call switching mechanisms can be used to complete the call. In most cases, a 911 call is merely switched from the IP network to a PSTN network for completion. Details regarding switching VoIP system 911 calls to PSTN networks are described in U.S. Pat. No. 6,363,065 entitled “Apparatus For A Voice Over IP (VoIP) Telephony Gateway And Methods For Use Therein”, issued Mar. 26, 2002, the entire content being incorporated herein by reference.
Providing VoIP system 911 call access without regard for service status may require bypassing multiple layers of security and access control in the network. For example, a device may have physical access to a network, such as a LAN, WAN or wireless system, but may not be authorized for IP services over the connection. Even if the device does have IP services available, it may not be authorized for access to the requested VoIP services or equipment. Arbitrary bypasses to security and access controls can be made to allow access, however, this can expose the network to theft of services or other potential attacks.
Accordingly, a need exists for a system and method for 911 access in Voice over IP systems in which 911 call requests are detected and restriction controls may be bypassed without compromising network security.
An object of the present invention is to provide a system and method for detection of a 911 call request from a user device by IP transport layers, regardless of high level signaling protocols used by the device.
Another object of the present invention is to provide a system and method for establishing a limited connection between a 911 call requesting user device and a network server, allowing IP traffic between the device and server while bypassing network security and access restrictions without compromising network security.
A further object of the present invention is to provide a system and method of control over a limited connection made between a 911 call requesting user device and a network server.
These and other objects are substantially achieved by providing a system and method of 911 access where upon the initiation and detection of a request for a 911 call to the network server, the network server establishes a limited connection with the requesting user device. To achieve this, the network layer at the requesting user device detects the 911 call request and initiates a request to a network server for a 911 call. The network server determines whether any special handling is required, and if so, establishes and controls an IP tunnel to the requesting device.
These and other objects, features and characteristics of the present invention will become more apparent to those skilled in the art from a study of the following detailed description in conjunction with the appended claims and drawings, all of which form a part of this specification. In the drawings:
In the embodiment shown in
As can be appreciated by one skilled in the art, the nodes 102, 106 and 107 are capable of communicating with each other directly, or via one or more other nodes 102, 106 or 107 operating as a router or routers for data packets being sent between nodes, as described in U.S. Pat. No. 5,943,322 entitled “Communications Method For A Code Division Multiple Access System Without A Base Station”, issued Aug. 24, 1999, the entire content being incorporated herein by reference. Further details of these types of ad-hoc networks are described in U.S. Pat. No. 7,072,650 entitled “Ad Hoc Peer-to-Peer Mobile Radio Access System Interfaced to the PSTN and Cellular Networks”, issued on Jul. 4, 2006, and in U.S. Pat. No. 6,807,165 entitled “Time Division Protocol for an Ad-Hoc, Peer-to-Peer Radio Network Having Coordinating Channel Access to Shared Parallel Data Channels with Separate Reservation Channel”, issued on Oct. 19, 2004, the entire content of both applications being incorporated herein by reference.
Specifically, as shown in
Each node 102, 106 and 107 further includes a memory 114, such as a random access memory (RAM), that is capable of storing, among other things, routing information pertaining to itself and other nodes 102, 106 or 107 in the network 100. The nodes 102, 106 and 107 exchange their respective routing information, referred to as routing advertisements or routing table information, with each other periodically via a broadcasting mechanism, for example, when a new node 102 enters the network 100, or when existing nodes 102 in the network 100 move.
As further shown in
As shown in
As stated in the Background section, Voice over Internet Protocol is a technique for transmitting calls over the Internet using packet-linked routes and layered protocols. In
In the embodiment of the present invention shown in
Upon detection of an emergency call request at node 102, local network layer 120 then initiates a request to a network server node 124 to allow completion of the call. The network server node 124 can be located by the local network layer 120 at either some well-known address, or discovered via a broadcast mechanism by the requesting node 102. As can be appreciated by one skilled in the art, numerous methods exist to identify an appropriate Public Safety Answer Point (PSAP) for an emergency call, and these same mechanisms can be applied to discover the appropriate server node to which the emergency call from node 102 should be directed.
A specific function of server node 124 is the determination of special handling requirements to allow the emergency call from the user node 102 when a request for a call is received from the local network layer 120. As shown in
If special handling is required, such as bypassing security or access controls, server node 124 establishes an IP “tunnel” to the requesting user node 102 allowing the required IP traffic between the user node 102 and the server node 124, during which, the server node 124 controls the IP tunnel to prevent a compromised local network layer from gaining unauthorized network access. As can be appreciated by one skilled in the art, “tunneling” is a technique which allows a network to send its data via another network's connections. Tunneling is achieved by encapsulating a first network protocol within packets carried by a second network, and is therefore often referred to as encapsulation. The original packet is encapsulated inside a new packet which provides routing information allowing the packet to travel through internetworks, as directed by an encapsulation header, which may otherwise be restricted. Once the encapsulated packet arrives, the encapsulation header is removed and the original packet is routed to its final destination. Further details regarding IP Tunneling and Encapsulation are set forth in RFC 1853 entitled “IP In IP Tunneling”, October 1995, and in RFC 2003 entitled “IP Encapsulation Within IP”, October 1996, the entire content of each being incorporated herein by reference.
The direct path taken by the encapsulated data is called a “tunnel” and also serves to restrict incorrectly directed data. Where special handling is required in
The tunnel established between nodes 102 and 124 in
Although only a few exemplary embodiments of the present invention have been described in detail above, those skilled in the art will readily appreciate that many modifications are possible in the exemplary embodiments without materially departing from the novel teachings and advantages of this invention. Accordingly, all such modifications are intended to be included within the scope of this invention as defined in the following claims.
Number | Name | Date | Kind |
---|---|---|---|
4494192 | Lew et al. | Jan 1985 | A |
4617656 | Kobayashi et al. | Oct 1986 | A |
4736371 | Tejima et al. | Apr 1988 | A |
4742357 | Rackley | May 1988 | A |
4747130 | Ho | May 1988 | A |
4910521 | Mellon | Mar 1990 | A |
5034961 | Adams | Jul 1991 | A |
5068916 | Harrison et al. | Nov 1991 | A |
5231634 | Giles et al. | Jul 1993 | A |
5233604 | Ahmadi et al. | Aug 1993 | A |
5241542 | Natarajan et al. | Aug 1993 | A |
5317566 | Joshi | May 1994 | A |
5392450 | Nossen | Feb 1995 | A |
5412654 | Perkins | May 1995 | A |
5424747 | Chazelas | Jun 1995 | A |
5502722 | Fulghum | Mar 1996 | A |
5517491 | Nanni et al. | May 1996 | A |
5555425 | Zeller et al. | Sep 1996 | A |
5555540 | Radke | Sep 1996 | A |
5572528 | Shuen | Nov 1996 | A |
5615212 | Ruszczyk et al. | Mar 1997 | A |
5618045 | Kagan et al. | Apr 1997 | A |
5621732 | Osawa | Apr 1997 | A |
5623495 | Eng et al. | Apr 1997 | A |
5627976 | McFarland et al. | May 1997 | A |
5631897 | Pacheco et al. | May 1997 | A |
5644576 | Bauchot et al. | Jul 1997 | A |
5652751 | Sharony | Jul 1997 | A |
5680392 | Semaan | Oct 1997 | A |
5684794 | Lopez et al. | Nov 1997 | A |
5687194 | Paneth et al. | Nov 1997 | A |
5696903 | Mahany | Dec 1997 | A |
5701294 | Ward et al. | Dec 1997 | A |
5706428 | Boer et al. | Jan 1998 | A |
5717689 | Ayanoglu | Feb 1998 | A |
5745483 | Nakagawa et al. | Apr 1998 | A |
5774876 | Wooley et al. | Jun 1998 | A |
5781540 | Malcolm et al. | Jul 1998 | A |
5787080 | Hulyalkar et al. | Jul 1998 | A |
5794154 | Bar-On et al. | Aug 1998 | A |
5796732 | Mazzola et al. | Aug 1998 | A |
5796741 | Saito et al. | Aug 1998 | A |
5805593 | Busche | Sep 1998 | A |
5805842 | Nagaraj et al. | Sep 1998 | A |
5805977 | Hill et al. | Sep 1998 | A |
5809518 | Lee | Sep 1998 | A |
5822309 | Ayanoglu et al. | Oct 1998 | A |
5844905 | McKay et al. | Dec 1998 | A |
5845097 | Kang et al. | Dec 1998 | A |
5857084 | Klein | Jan 1999 | A |
5870350 | Bertin et al. | Feb 1999 | A |
5877724 | Davis | Mar 1999 | A |
5881095 | Cadd | Mar 1999 | A |
5881372 | Kruys | Mar 1999 | A |
5886992 | Raatikainen et al. | Mar 1999 | A |
5896561 | Schrader et al. | Apr 1999 | A |
5903559 | Acharya et al. | May 1999 | A |
5909651 | Chander et al. | Jun 1999 | A |
5936953 | Simmons | Aug 1999 | A |
5943322 | Mayor et al. | Aug 1999 | A |
5987011 | Toh | Nov 1999 | A |
5987033 | Boer et al. | Nov 1999 | A |
5991279 | Haugli et al. | Nov 1999 | A |
6028853 | Haartsen | Feb 2000 | A |
6029217 | Arimilli et al. | Feb 2000 | A |
6034542 | Ridgeway | Mar 2000 | A |
6044062 | Brownrigg et al. | Mar 2000 | A |
6047330 | Stracke, Jr. | Apr 2000 | A |
6052594 | Chuang et al. | Apr 2000 | A |
6052752 | Kwon | Apr 2000 | A |
6064626 | Stevens | May 2000 | A |
6067291 | Kamerman et al. | May 2000 | A |
6073005 | Raith et al. | Jun 2000 | A |
6078566 | Kikinis | Jun 2000 | A |
6104712 | Robert et al. | Aug 2000 | A |
6108738 | Chambers et al. | Aug 2000 | A |
6115580 | Chuprun et al. | Sep 2000 | A |
6122690 | Nannetti et al. | Sep 2000 | A |
6130881 | Stiller et al. | Oct 2000 | A |
6132306 | Trompower | Oct 2000 | A |
6147975 | Bowman-Amuah | Nov 2000 | A |
6163699 | Naor et al. | Dec 2000 | A |
6178337 | Spartz et al. | Jan 2001 | B1 |
6192053 | Angelico et al. | Feb 2001 | B1 |
6192230 | Van Bokhorst et al. | Feb 2001 | B1 |
6208870 | Lorello et al. | Mar 2001 | B1 |
6223240 | Odenwald et al. | Apr 2001 | B1 |
6240294 | Hamilton et al. | May 2001 | B1 |
6246875 | Seazholtz et al. | Jun 2001 | B1 |
6249516 | Brownrigg et al. | Jun 2001 | B1 |
6275707 | Reed et al. | Aug 2001 | B1 |
6285892 | Hulyalkar | Sep 2001 | B1 |
6304556 | Haas | Oct 2001 | B1 |
6327300 | Souissi et al. | Dec 2001 | B1 |
6349091 | Li | Feb 2002 | B1 |
6349210 | Li | Feb 2002 | B1 |
6363065 | Thornton et al. | Mar 2002 | B1 |
20010053699 | McCrady et al. | Dec 2001 | A1 |
20020085538 | Leung | Jul 2002 | A1 |
20020146129 | Kaplan | Oct 2002 | A1 |
20030095535 | Le et al. | May 2003 | A1 |
20040203563 | Menard | Oct 2004 | A1 |
Number | Date | Country |
---|---|---|
2132180 | Mar 1996 | CA |
0513841 | Nov 1992 | EP |
0627827 | Dec 1994 | EP |
0924890 | Jun 1999 | EP |
2683326 | Jul 1993 | FR |
WO 9608884 | Mar 1996 | WO |
WO 9724005 | Jul 1997 | WO |
WO 9839936 | Sep 1998 | WO |
WO 9912302 | Mar 1999 | WO |
WO 0034932 | Jun 2000 | WO |
WO 0110154 | Feb 2001 | WO |
WO 0133770 | May 2001 | WO |
WO 0135567 | May 2001 | WO |
WO 0137481 | May 2001 | WO |
WO 0137482 | May 2001 | WO |
WO 0137483 | May 2001 | WO |
WO 0235253 | May 2002 | WO |