`Chang et al.
`
`I IIIII IIIIIIII Ill lllll lllll lllll lllll lllll lllll lllll lllll 111111111111111111
`US005958016A
`[11] Patent Number:
`[45] Date of Patent:
`
`5,958,016
`Sep.28,1999
`
`[54]
`
`[75]
`
`[73]
`
`INTERNET-WEB LINK FOR ACCESS TO
`INTELLIGENT NETWORK SERVICE
`CONTROL
`
`Inventors: Te-An Chang, Laytonsville; Joseph R.
`Rostock, Davidsonville, both of Md.
`
`Assignee: Bell Atlantic Network Services, Inc.,
`Arlington, Va.
`
`[21]
`
`Appl. No.: 08/904,117
`
`[22]
`
`Filed:
`
`Jul. 13, 1997
`
`[51]
`[52]
`
`[58]
`
`[56]
`
`Int. Cl.6
`...................................................... H04M 1/24
`U.S. Cl. .......................... 709/229; 709/202; 709/203;
`709/219; 709/224; 709/225
`Field of Search ......................... 395/200.59, 200.55,
`395/200.54, 200.49, 200.33, 200.32; 709/229,
`225,224,219,203,202
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`4,768,150
`4,855,905
`5,241,588
`5,247,571
`5,287,103
`5,309,437
`5,327,486
`5,377,186
`5,392,357
`5,406,557
`5,423,003
`5,436,957
`5,469,500
`5,471,459
`5,495,521
`5,499,290
`5,517,562
`5,519,772
`5,526,413
`
`................... 379/201
`
`8/1988 Chang et al..
`8/1989 Estrada et al. .
`8/1993 Babson, III et al.
`9/1993 Kay et al..
`2/1994 Kasprzyk et al. .
`5/1994 Perlman et al. .
`7/1994 Wolff et al..
`12/1994 Wegner et al..
`2/1995 Bulfer et al. .
`4/1995 Baudoin.
`6/1995 Berteau.
`7/1995 McConnell.
`11/1995 Satter et al. .
`11/1995 Gut.
`2/1996 Rangachar.
`3/1996 Koster.
`5/1996 McConnell.
`5/1996 Akman et al..
`6/1996 Cheston, III et al. .
`
`5,526,489
`5,539,886
`5,566,235
`5,572,581
`5,572,583
`5,586,177
`5,623,601
`5,721,908
`5,802,146
`5,826,029
`
`6/1996 Nilakantan et al. .
`7 /1996 Aldred et al. .
`10/1996 Hetz .
`11/1996 Sattar et al. .
`11/1996 Wheeler, Jr. et al. .
`12/1996 Farris et al. .
`4/1997 Vu ...................................... 395/187.01
`2/1998 Lagarde et al. ... ... .... ... ... ... ... ... 395 /610
`9/1998 Dulman ..................................... 379/34
`10/1998 Gore et al. ......................... 395/200.57
`
`Primary Examiner-Zarni Maung
`Assistant Examiner-Saleh Najjar
`Attorney, Agent, or Firm-McDermott, Will & Emery
`
`[57]
`
`ABSTRACT
`
`A web page type interface is provided, which enables
`subscriber access to control and reporting functionalities of
`a communication network, such as the advanced intelligent
`telephone network, via a public packet data network, typi(cid:173)
`cally the network now commonly known as the Internet. The
`web page based Internet access opens the personal control of
`services provided by the communication network to any
`subscriber who also uses the Internet, for example using the
`subscriber's existing PC and browser software or their
`Web-TV terminal. A secure access platform provides the
`interface and communicates via a private data network with
`various systems used to manage the communication net(cid:173)
`work. The secure access platform includes a firewall coupled
`between the public data network and the private data net(cid:173)
`work. The firewall implements the web page interface and
`validates certain users of the public data network as sub(cid:173)
`scribers to services of the communication network. The
`secure access platform also includes a web services man(cid:173)
`agement system, which communicates with the firewall and
`with the communication network management systems via
`the private data network. The platform enables persons
`surfing the web to control their services and receive various
`reports relating to status and/or usage of their network
`services.
`
`27 Claims, 5 Drawing Sheets
`
`PC
`
`OS ,fil
`TERMINAL
`
`COMPUTER
`
`WEB SERVICE
`MGMT. SYS. APPL'N
`
`OS~
`WSMS
`
`ISCP 242 / \
`
`~~ 19
`
`~-@P0
`
`1
`
`(SPACE)
`
`' ' : : ,
`
`23~
`
`<--241
`
`<--241
`
`BHN, et al. v. FOCAL IP, LLC
`FOCAL IP, LLC EX2049 - 1
`U.S. Patent No. 5,958,016
`IPR2016-01261
`
`
`
`25~ SECURE
`ACCESS
`PLATFORM
`
`~ 24
`~
`
`I\
`
`1 9 -+~
`I
`I
`l
`l----------
`
`r - -- -- -
`
`I
`
`I
`
`I
`
`I
`
`I
`
`I
`
`I
`
`1
`
`SS7 1
`
`31 A1 ____ 1 ·---------,
`:cusT. :PREM.:
`:~1 :
`fA'\ :
`'
`}t
`: USER
`: TERM.
`:
`
`
`I
`
`1
`
`I
`
`I
`
`i i
`I
`I
`I
`I
`
`
`
`SSa7 __ ' :
`
`FIG. 1
`
`\
`
`\
`
`~ / '
`
`\
`
`\
`
`\
`
`\ \SS7
`'
`11
`I
`I
`T~:??~>;,"-"\~:{~jOs 8::
`I
`I
`' -::J5S7
`STP
`
`:
`:
`,_ -- --- -- --- -- - - --- ---- -- ---- -- -- - - - ---- - - - - -- - --_,
`I
`I
`1 SS7
`1
`'
`I
`I
`
`'
`
`1
`1 '
`I en1
`
`29A
`
`A
`
`15
`
`L
`
`11E
`- -~ - - __ ._ -1_1
`(CO)
`:
`:
`:
`I
`:
`.------------'~
`
`.__l
`
`~ 1
`~ . -
`
`fA"._1
`
`CENTRAL I~
`OFFICE
`(CO)
`
`TR
`
`IIC _____ ~J~NA~JN~.r.;1 _ _1
`
`11E
`
`11
`
`VOICE CHANNELS
`
`23
`
`I
`I
`I
`I
`
`, i ~i , ___ 1_1 ______________ ---------··:··------------1-1 ___ , i ~i i r11E
`1 -1 - - ' - - - - ,_ _ _
`L. en
`:
`:
`(CO)
`~ t
`:
`: ~ :
`~ ,._,.1-r------'--,
`:
`en
`~I CENTRAL
`OFFICE
`(CO)
`
`'
`
`15
`
`I
`
`1
`' 1
`I en1
`
`1
`I
`
`I
`:
`
`:
`
`TR
`TR
`
`TR
`
`23
`
`l
`SIGNALING
`IP 1---------------------------•
`
`VOICE CHANNELS
`
`.J
`
`1-+/M
`
`11 E
`
`d •
`r:JJ.
`•
`~
`~ .....
`~ = .....
`
`'JJ.
`~ '?
`N
`~CIO
`"'""
`\C
`\C
`\C
`
`'JJ. =(cid:173)~
`~ ....
`"'"" 0 ....,
`
`Ul
`
`Ul
`....
`\C
`Ul
`00
`
`.... = ~
`
`0--,
`
`BHN, et al. v. FOCAL IP, LLC
`FOCAL IP, LLC EX2049 - 2
`U.S. Patent No. 5,958,016
`IPR2016-01261
`
`
`
`PC r 293
`I \
`os m
`TERMINAL ~ MGMT SYS's
`
`I
`
`237
`
`-
`
`r,
`
`I sw,rcH lsoAcs I
`231-+I 8 RAO
`
`I ~,\
`
`,' \ \ \ _J
`
`I
`I (SPACE)
`, - - , , ,
`46
`2
`~ \ \ \
`I l"'IATA I
`'. 'J--,
`
`d •
`r:JJ.
`•
`~
`~ .....
`~ = .....
`
`;{1
`'?
`N
`QC
`~
`\C
`\C
`\C
`
`'JJ. =(cid:173)~
`~ ....
`N
`0 ....,
`Ul
`
`Ul
`....
`\C
`Ul
`00
`
`.... = ~
`
`0--,
`
`233 235EJ
`
`MARCH
`
`.-241
`
`COMPUTER
`
`WEB SERVICE
`MGMT. SYS. APPL'NI
`
`OS 259
`WSMS
`
`FIG. 2
`
`BHN, et al. v. FOCAL IP, LLC
`FOCAL IP, LLC EX2049 - 3
`U.S. Patent No. 5,958,016
`IPR2016-01261
`
`
`
`r - - - - -
`I
`1 LAN
`I
`-l- --J
`
`I
`
`I
`
`328
`
`290
`
`251
`FIREWALL
`
`f330
`- - -
`
`r -
`I
`1 LAN
`
`I
`
`\
`
`\
`
`\
`
`\
`
`\
`
`\
`
`\
`
`\
`
`~ ' . / f
`IRou1ERr·,,. 338
`
`\
`
`\
`
`\
`
`,
`
`FIG. 3
`
`'
`UI/\L·Ut'
`-
`-------------------------------------------------'
`
`\
`
`316
`
`INFO.
`.PROVIDER
`
`I
`I
`I
`I
`I
`I
`: DIAL-UP NETWORK
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`: 318
`I
`I
`INFO.
`I
`PROVIDER
`
`I
`
`I
`
`I
`
`I
`
`DIAL-UP NETWORK
`
`~
`292
`LAPTOP
`
`332
`
`I
`
`I
`
`---- ---- -- -------- --- -- -- _ --- _ -- -- _ -- ____ -- -- _ -- -- --- -- ----- ---,
`27
`ij
`
`324
`
`INFO.
`PROVIDER
`
`~ •
`00
`•
`~
`
`~ ....
`~ = ....
`
`'JJ,
`
`~ '?
`N
`~CIO
`"'""
`\C
`\C
`\C
`
`'JJ, =(cid:173)~
`~ ....
`0 ....,
`Ul
`
`~
`
`0-.
`,.,.
`\,Q
`0-.
`00
`
`,.,. = ~
`
`O'\
`
`BHN, et al. v. FOCAL IP, LLC
`FOCAL IP, LLC EX2049 - 4
`U.S. Patent No. 5,958,016
`IPR2016-01261
`
`
`
`DISPLAY
`
`._447
`
`FIG. 4
`
`,------------------------------,,-----------------------------------------,
`1 431_
`445_
`TERMINAL PC -29-
`:
`t
`..-----. I
`PR INTER t<:
`PORT
`
`DISPLAY
`DRIVER
`
`ROM
`
`DRAM
`
`MICROPROCESSOR
`
`TO PRINTER
`>
`
`BUS 4431
`437
`
`441
`
`I
`I
`t
`1453
`I
`I
`I
`I
`I
`t
`I
`\ -
`
`- -,
`
`PORTS
`
`439
`
`HARO
`
`I/0 I DISK
`
`459~L m~L
`OTHER
`FLOPPY
`LAN
`STORAGE
`DISK
`I MODEM I I INT I
`MEDIA
`DRIVE
`DRIVE
`I -------------------------------------------L
`_J----L
`~
`~
`
`449 ~u t::451
`
`,.......___..._--,.
`
`I
`
`I
`
`KEYBOARD
`
`OTHER
`DEVICES
`
`_J-
`
`TELE. LINE
`
`LAN
`
`~
`
`TO/FROM
`>INTERNET
`
`~ •
`rJ'J.
`•
`~
`~ .....
`~ = .....
`
`'JJ.
`~ '?
`N
`~CIO
`"'""
`\C
`\C
`\C
`
`'JJ. =(cid:173)~
`~ ....
`0 ....,
`Ul
`
`,i;;..
`
`tit
`....
`\C
`tit
`QO
`....
`Q
`~
`~
`
`BHN, et al. v. FOCAL IP, LLC
`FOCAL IP, LLC EX2049 - 5
`U.S. Patent No. 5,958,016
`IPR2016-01261
`
`
`
`5201
`510
`
`COMPUTER
`
`INTERNETI Q ~ I
`
`1sERVER
`
`SERVER
`
`521
`
`1
`
`FIG. 5
`
`I
`HOST
`525- SOFTWARE
`I I
`PROXY HI WEB I APPL 'N
`524
`SERVERII H g
`523 ,~--- I
`11__
`OS 521
`
`-l m
`:::0
`
`I
`
`I
`
`ACCESS
`CTRL
`
`DB
`
`FIREW~LL I
`
`251
`
`I
`
`550-~
`
`COMPUTER
`
`I 560"'"1 I
`
`IH
`
`SECURITY
`APPLICATION
`
`553
`
`TNS
`253
`
`I
`
`OS 551
`
`H§g FO/FROM
`
`m z
`;o
`
`OSN
`
`I I
`I
`
`I
`I
`
`d •
`r:JJ.
`•
`~
`~ .....
`~ = .....
`
`'JJ.
`~ '?
`N
`~CIO
`"'""
`\C
`\C
`\C
`
`'JJ. =-~
`~ ....
`Ul
`0 ....,
`Ul
`
`Ul
`....
`\C
`Ul
`00
`
`.... = ~
`
`0--,
`
`BHN, et al. v. FOCAL IP, LLC
`FOCAL IP, LLC EX2049 - 6
`U.S. Patent No. 5,958,016
`IPR2016-01261
`
`
`
`5,958,016
`
`1
`INTERNET-WEB LINK FOR ACCESS TO
`INTELLIGENT NETWORK SERVICE
`CONTROL
`
`TECHNICAL FIELD
`
`2
`Transmission Control Protocol/Internet Protocol (TCP/IP)
`TRunk (TR)
`Trusted Network System (TNS)
`Universal Resource Locator (URL)
`5 Web Service Management System (WSMS)
`BACKGROUND
`For some years, the telephone industry has been devel(cid:173)
`oping an enhanced telephone network, sometimes referred
`to as an Advanced Intelligent Network (AIN), for providing
`a wide array of new voice grade telephone service features.
`In an AIN type system, local and/or toll offices of the public
`telephone network detect one of a number of call processing
`events identified as AIN "triggers". An office which detects
`a trigger suspends processing of a call, compiles a call data
`15 message and forwards that message via a common channel
`interoffice signaling ( CCIS) link to a database system, such
`as an Integrated Service Control Point (ISCP) which
`includes a Multi-Services Application Platform (MSAP)
`database. If needed, the ISCP can instruct the central office
`20 to obtain and forward additional information. Once suffi-
`cient information about the call has reached the ISCP, the
`ISCP accesses its stored data tables in the MSAP database to
`translate the received message data into a call control
`message and returns the call control message to the office of
`the network via CCIS link. The network offices then use the
`call control message to complete the particular call. For an
`ordinary telephone service call, there would be no event to
`trigger AIN processing; and the local and toll office switches
`function normally and process such a call without referring
`to the central database for instructions. An AIN type network
`30 for providing an Area Wide Centrex service, for example,
`was disclosed and described in detail in commonly assigned
`U.S. Pat. No. 5,247,571 to Kay et al.
`In an AIN network developed by the Regional Bell
`Operating Companies (RBOCs) and Bell Communications
`35 Research (Bellcore ), a terminal and software system referred
`to as 'SPACE' functions as the service creation environment
`and/or service provisioning system for the AIN control
`functions in the central database system. For example, as
`disclosed in U.S. Pat. No. 5,241,588 Babson, III et al.,
`40 customized call processing information records are created
`and/or modified in a graphical environment, by creating or
`modifying a customer's service graph-on the display termi(cid:173)
`nal. Data corresponding to the service graph is then stored
`in a service control point (SCP) database. Other terminal and
`45 software systems could be used to create and provision the
`AIN services. For AIN services today, however, telephone
`company personnel utilize the SPACE system to create
`templates for the service logic for new services. When
`customers subscribe to the services, the templates are filled
`50 in with the subscribers' data to create individual call pro(cid:173)
`cessing records (CPRs). The CPRs are stored in the database
`in the SCP or in an ISCP, for controlling actual call pro(cid:173)
`cessing.
`Many of the enhanced communication services offered by
`55 the AIN permit a subscriber to input control information, to
`manage services as desired. For example, in a simple
`forwarding or redirection service, the subscriber might
`change the 'forward to' number from time to time to route
`calls to different destinations. As another example, a sub(cid:173)
`scriber might want to block calls unless they are to or from
`numbers on a list, and the subscriber would want to change
`the list of numbers from time to time. Some subscribers need
`to change certain information quite frequently, even for
`relatively simple AIN services. It is too cumbersome to
`65 require the subscriber to call the local telephone company's
`business office and request each and every one of the routine
`changes.
`
`The present invention relates to a system and methodol(cid:173)
`ogy for providing telephone service customers with a stan(cid:173)
`dardized interface for access to service control and manage(cid:173)
`ment elements of a communication network, such as the 10
`telephone network, via a public packet switched data
`network, such as the Internet.
`
`Acronyms
`
`The written description uses a large number of acronyms
`to refer to various services, messages and system compo(cid:173)
`nents. Although generally known, use of several of these
`acronyms is not strictly standardized in the art. For purposes
`of this discussion, acronyms therefore will be defined as
`follows:
`
`25
`
`Advanced Intelligent Network (AIN)
`Automatic Message Accounting (AMA)
`Autonomous System (AS)
`Call Processing Record (CPR)
`Central Office (CO)
`Common Channel Interoffice Signaling (CCIS)
`Competing Local Exchange Carrier (CLEC)
`Customer Premises Equipment (CPE)
`Data Distributor (DD)
`Data Reporting System (DRS)
`File Transfer Protocol (FTP)
`Generic Data Interface (GDI)
`HyperText Mark-Up Language (HTML)
`HyperText Transfer Language Protocol (HTTP)
`Integrated Service Control Point (ISCP)
`Integrated Services Digital Network (ISDN)
`Intelligent Peripheral (IP)
`IntereXchange Carrier (IXC)
`Internet Service Provider (ISP)
`ISDN Users Part (ISDN-UP)
`Local Area Network (LAN)
`Local Exchange Carrier (LEC)
`Memory Administration Recent Change System (MARCH)
`Multipurpose Internet Mail Extension (MIME)
`Multi-Services Application Platform (MSAP)
`Office Equipment (OE) number
`Operations Systems Network (OSN)
`Personal Computer (PC)
`Personal Identification Number (PIN)
`Plain Old Telephone Service (POTS)
`Point In Call (PIC)
`Primary Rate Interface (PRI)
`Public Switched Telephone Network (PSTN)
`Regional Bell Operating Companies (RBOCs)
`Revenue Accounting Office (RAO)
`Service Control Point (SCP)
`Service Creation Environment (SCE)
`Service Management System (SMS)
`Service Order Administration and Control System (SOACS) 60
`Service Switching Point (SSP)
`Signaling Point (SP)
`Signaling System 7 (SS7)
`Signaling Transfer Point (STP)
`Simplified Message Desk Interface (SMDI)
`Station Message Detail Recording (SMDR)
`Transaction Capabilities Application Part (TCAP)
`
`BHN, et al. v. FOCAL IP, LLC
`FOCAL IP, LLC EX2049 - 7
`U.S. Patent No. 5,958,016
`IPR2016-01261
`
`
`
`5,958,016
`
`3
`4
`activate the communication services, for example identify(cid:173)
`At present, automated subscriber interactions to modify
`the subscribers' AIN services rely mainly on a voice
`ing the particular line(s) for which service will be active and
`response type interaction. The subscriber calls a special
`the on and off times. When the representative has entered
`and confirmed the data for activating the service, the PC
`number, hears recorded announcements or synthesized voice
`prompts and inputs a PIN number and service related
`5 downloads that data to the SMS within the ISCP. The SMS
`updates the appropriate records in the ISCP, after which the
`information. Typically, the subscriber inputs the various
`ISCP activates services from the subscriber lines in accord
`information by keying buttons on a Touch Tone telephone,
`with the most recently entered data.
`but use of speech recognition technology has been proposed
`to enable a subscriber to vocally input the information.
`Commonly assigned U.S. Pat. No. 5,526,413 issued Jun.
`10 11, 1996 to Frank C. Cheston, III, James E. Curry and
`Consider for example, commonly assigned U.S. Pat. No.
`5,572,583 to David F. Wheeler, Jr. and Robert D. Farris. This
`Robert D. Farris suggests extending AIN into customer
`premises equipment (CPE). The CPE system includes a
`Patent discloses an intelligent peripheral (IP) for providing
`signaling transfer point (STP) coupled to the CCIS system of
`enhanced call processing functions, such as announcement
`the public telephone network as well as an ISCP database.
`and digit collection, voice recognition, facsimile mail and
`15 The ISCP on the customer premises may be implemented in
`voice mail, in an AIN type telephone network. The IP
`connects through telephone line groups to one or more
`software in a personal computer. Although not disclosed in
`Service Switching Point (SSP) offices of the telephone
`detail in the issued Cheston, III, et al. Patent, a related
`application (Ser. No. 08/508,428) adds the teaching of
`network. The IP also communicates with an ISCP via a
`customer programming of the network ISCP from the CPE
`signaling network separate from the voice circuits and from
`the CCIS network that interconnects the ISCP to the SSP 20
`equipment. In accord with this aspect of the Cheston et al.
`offices. One major use for the disclosed IP relates to provi(cid:173)
`invention, a PC or other computer on the customer premises
`sioning and/or modifying services. The IP provides prompts
`will run telephone service programming software. The sig(cid:173)
`and receives dual-tone-multi-frequency tone signals or
`naling communication link to the CCIS network of the
`speech inputs from subscribers.
`exchange carriers permits the subscriber using the
`Typically, a telephone company technician initially sets 25 on-premises PC and software to load AIN service informa(cid:173)
`tion into the relevant CPE devices as well as into the ISCPs
`up a subscriber's service using the Service Creation Envi(cid:173)
`and switches of the local exchange carrier network and the
`ronment or SCE in the ISCP. As part of this procedure, the
`interexchange carrier (IXC) network.
`technician establishes one or more data tables for the sub(cid:173)
`scriber in the service control point (SCP) database 43.
`Although the PC or terminal based solutions offer some
`Subsequently, the subscriber controls the service by input- 30
`enhanced subscriber access to control AIN services, the
`ting data to populate the subscriber's data table(s) through
`solutions proposed to date have inherent limitations. Any of
`an interaction with the IP. The newly input control data is
`these prior art implementations using a PC or terminal to
`transferred from the IP to the ISCP for storage and for
`access the network require specialized terminals and/or
`subsequent control of the subscriber's communication ser(cid:173)
`software and provide only limited access. Also, in most
`vices. The IP also may provide a data interface for PC based 35
`cases, the local operating company must maintain the local
`area network or a bank of modems to provide the PC access
`access,
`service.
`Such interactive voice response processing provides only
`A need therefore still exists for a technique which will
`limited input capabilities and is subject to input errors,
`because the subscriber accidently hits the wrong button or
`enable any subscriber to personally access and control their
`incorrectly pronounces a spoken input. Many of the AIN
`AIN services from a general purpose computer without
`services require subscriber inputs, for example combinations
`specially developed hardware or software interfaces.
`of blocked numbers, time of day and day of the week, that
`are too complex for the average subscriber to input using the
`interactive voice response procedures.
`Several other patents have suggested data terminal or PC
`access, through a local area network or direct dial-up links
`to a host computer in the telephone network.
`For example, commonly assigned U.S. Pat. No. 5,436,957
`to Von K. McConnell relates to an AIN-based technique 50
`enabling a commercial telephone subscriber to selectively
`activate service through a group of lines assigned to the
`subscriber. To facilitate input of the data for controlling the
`selective service activation, McConnell suggested use of PC
`type data terminals. One PC connects to the service man- 55
`agement system (SMS) in the ISCP via a dedicated data
`communication line. Another PC communicates with the
`SMS via a dial-up modem session through the telephone
`network. Either PC may store information relating to the
`subscriber's products and services and preset tables or forms
`for entry of the necessary data to control that subscriber's
`restricted access communication services.
`With the McConnell system, when the subscriber wants to
`activate communication services in relation to one or a series
`of products or services ( e.g., a delayed or canceled airline 65
`flight), the representative accesses the necessary data relat(cid:173)
`ing to products or services and completes the data tables to
`
`The present invention addresses the above-stated needs by
`providing a web page type interface, for accessing control of
`intelligent network type telephone services, via a public
`packet data network, such as the network now commonly
`known as the Internet. Typically, a person's PC or other
`terminal runs common software, such as a 'browser' to
`obtain various web pages of information from the network.
`While viewing web pages using the browser, the invention
`enables persons surfing the web to access the telephone
`network, to control their telephone services and receive
`various reports relating to their telephone services. The
`inventive web access also provide an architecture, which
`maintains the necessary security of the telephone network
`and associated network management systems.
`Thus, one aspect of the invention relates to a communi-
`60 cation network. The overall network includes a traffic net-
`work for providing selective communications to subscriber
`stations and an operations network. One example of such a
`communication network is a public switched telephone
`network. At least one network management system is
`coupled to the operations network, for managing selective
`communication services provided through nodes of the
`traffic network. The overall communication network also
`
`45
`
`40
`
`DISCLOSURE OF THE INVENTION
`
`BHN, et al. v. FOCAL IP, LLC
`FOCAL IP, LLC EX2049 - 8
`U.S. Patent No. 5,958,016
`IPR2016-01261
`
`
`
`5,958,016
`
`5
`
`6
`network security system passes message to and from the
`firewall only if the messages are valid in accord with certain
`security restrictions.
`As noted, in the preferred embodiment, the traffic network
`is an intelligent telephone network. The nodes of the traffic
`network, for example, include various central office switch(cid:173)
`ing systems of the telephone network. The central offices are
`interconnected by trunks for carrying interoffice traffic and
`by a signaling network, which carries call set-up related
`10 messages and other signaling communications. The intelli(cid:173)
`gent implementation of the telephone network also includes
`a service control point. The service control point stores data
`for controlling certain call processing operations of the
`central office switching systems.
`The operations network provides communications
`between one or more provisioning systems and the elements
`of the telephone network, such as the central office switching
`systems and/or the service control point. The operations
`network also carries communications between the telephone
`20 network elements and one or more data processing systems,
`which generate usage reports and bills.
`Through the web page access provided by the platform,
`telephone subscribers can review the status of their services
`25 and modify or upgrade their telephone services, including
`switch-based services and intelligent network services con(cid:173)
`trolled through the data stored in the service control point.
`Subscribers also may review reports of usage of their
`services or review account or billing statements.
`Additional objects, advantages and novel features of the
`invention will be set forth in part in the description which
`follows, and in part will become apparent to those skilled in
`the art upon examination of the following or may be learned
`by practice of the invention. The objects and advantages of
`35 the invention may be realized and attained by means of the
`instrumentalities and combinations particularly pointed out
`in the appended claims.
`
`15
`
`5
`includes a secure access platform coupled to the operations
`network and for coupling to a public data network.
`The secure access platform validates predetermined users
`of the public data network as subscribers to services of the
`communication network. The platform implements a stan(cid:173)
`dard graphical user interface of the public data network,
`preferably an Internet type web page interface, enabling
`communications with terminals on the public data network.
`The platform also communicates with the management
`system. The platform enables validated subscribers to
`review service data from the network management system
`and to input control data to the network management system.
`In response to the control data, the network management
`system modifies operations of the traffic network as selected
`by the validated subscribers.
`Examples of network management systems include pro(cid:173)
`visioning systems and usage and/or billing data processing
`systems. The provisioning systems establish or modify data
`files or records, in various elements of the traffic network,
`that control subscribers' services. The data processing sys(cid:173)
`tems receive operational data from the elements of the traffic
`network and process that data, for example to generate
`subscriber usage reports or bills.
`The control data input by the subscribers may control
`services facilitated through high level network control
`points. In an intelligent network implementation of a tele(cid:173)
`phone network, for example, the control data is used to
`establish or modify call processing records stored in a
`service control point. The control data also may be used to
`modify individual subscriber profiles in central office
`switching systems of the telephone network.
`The service related data presented to the users through the
`graphical user interface may relate to existing services
`provided by the communication network, e.g. stored in a
`provisioning system. For example, this data may relate to
`current status of intelligent network services to which each
`customer subscribes. The service related data also may relate
`to usage of the communication network services and/or to
`the account or billing for services used, as supplied from a 40
`data processing system.
`Another aspect of the invention relates to a specific
`implementation of the secure access platform. The platform
`includes a firewall and a service management system. The
`firewall is coupled to the public data network. The firewall 45
`comprises a proxy server, an application server and an
`access control. The application server provides the standard
`graphical user interface through the proxy server for users
`accessing the firewall via the public data network. The
`access control authenticates users of the packet data network 50
`as valid subscribers of communication network services.
`The service management system communicates with the
`application server and the network management system. The
`service management system receives subscriber inputs via
`the application server and processes at least some of the 55
`subscriber inputs to provide data to the network manage(cid:173)
`ment system. The service management system also sends at
`least some information, relating to services provided to
`subscribers by the communication network, from the net(cid:173)
`work management system through the application server and
`the public data network to subscribers.
`The preferred embodiment also includes a further security
`system logically operating between the firewall and the
`service management system. All messages going to and
`from the firewall via the operation network, including com- 65
`munications between the firewall and the service manage(cid:173)
`ment system, pass through this network security system. The
`
`30
`
`BRIEF DESCRIPTION OF DRAWINGS
`
`The drawing figures depict the present invention by way
`of example, not by way of limitations. In the figures, like
`reference numerals refer to the same or similar elements.
`FIG. 1 is a high level functional block diagram of an
`intelligent telephone network, systems for managing ser(cid:173)
`vices provided by that telephone network and a system for
`providing secure Internet type access to subscribers to allow
`them to manage their telephone services via the Internet, in
`accord with the invention.
`FIG. 2 is a somewhat more detailed block diagram useful
`in understanding the secure customer access, in accord with
`the invention.
`FIG. 3 is a block diagram of the public packet switched
`data network now commonly referred to as the Internet.
`FIG. 4 is a block diagram of one embodiment of a
`terminal, in the example a personal computer, for accessing
`the management systems of the intelligent telephone net(cid:173)
`work in accord with the invention.
`FIG. 5 is a detailed block diagram of the firewall and the
`60 trusted network system used in the system of FIG. 2.
`
`BEST MODE FOR CARRYING OUT THE
`INVENTION
`Recently, considerable public attention has focused on the
`packet data network known as the Internet and the range of
`information and multimedia services available via the
`'World Wide Web' portion of that network. Typically, a
`
`BHN, et al. v. FOCAL IP, LLC
`FOCAL IP, LLC EX2049 - 9
`U.S. Patent No. 5,958,016
`IPR2016-01261
`
`
`
`5,958,016
`
`7
`person's PC runs common software referred to as a
`'browser' to obtain various web pages of information from
`the network. Several vendors also now offer a 'Web-TV'
`terminal device for coupling to a television set, to provide
`web browsing and other Internet services using a remote
`control and a television screen. While viewing pages using
`either type of terminal, the user can enter requests by
`clicking on text or icons or can send typed inputs to a server.
`The invention enables persons surfing the web using such
`common technology to access a communication network,
`preferably the AIN telephone network, to control their
`services and receive various reports relating to their services.
`The inventive Internet access opens the personal control
`of AIN telephone services to any subscriber who also uses
`the Internet, using the subscriber's existing PC and software
`or their Web-TV terminal. However, Internet access raises
`serious security concerns. The inventive web access there(cid:173)
`fore entails an access architecture, which provides the web
`page type user interface via the Internet and maintains the
`necessary security of the telephone network and associated
`network management systems. The inventive access system
`also offers efficient service management, both for provision(cid:173)
`ing functions and for usage monitoring functions.
`FIG. 1 provides a high level illustration of an intelligent
`telephone network, its control and management systems as 25
`well as the customer access thereto provided by the inven(cid:173)
`tion. To understand the invention, it may be helpful first to
`review the structure and operation of the telephone network.
`The overall communication network illustrated in FIG. 1
`includes a telephone type traffic network as well as a private
`operations data network and management systems coupled
`thereto to provision and report on operations of the tele(cid:173)
`phone network. The communication network connects to a
`public packet switched data network, such as the Internet,
`and through that network to a variety of users terminal
`devices. A secure access platform interfaces the public
`packet switched data network to the private data network
`associated with the telephone system. The access through
`the secure platform allows users to operate their terminals to
`access the telephone network management systems via the
`Internet.
`In the example depicted in FIG. 1, the telephone network
`is an advanced intelligent network or 'AIN'. As shown, the
`telephone network includes a switched traffic network and a 45
`common channel signaling network carrying the control
`signaling messages for the switched telephone traffic net(cid:173)
`work. The telephone or traffic network, operated by one
`carrier or a combination of local carriers and interexchange
`carriers, includes a number of nodes, typically end office and 50
`tandem office type central office (CO) switching systems 11
`interconnected by trunk circuits TR.
`FIG. 1 shows a number of subscriber stations, depicted as
`telephones 1, connected to a series of central office switches
`11. In the preferred implementation, the connections to the 55
`central office switches 11 utilize telephone lines ( e.g. POTS
`or ISDN), and the switches are telephone