throbber
United States Patent [19J
`Chang et al.
`
`I IIIII IIIIIIII Ill lllll lllll lllll lllll lllll lllll lllll lllll 111111111111111111
`US005958016A
`[11] Patent Number:
`[45] Date of Patent:
`
`5,958,016
`Sep.28,1999
`
`[54]
`
`[75]
`
`[73]
`
`INTERNET-WEB LINK FOR ACCESS TO
`INTELLIGENT NETWORK SERVICE
`CONTROL
`
`Inventors: Te-An Chang, Laytonsville; Joseph R.
`Rostock, Davidsonville, both of Md.
`
`Assignee: Bell Atlantic Network Services, Inc.,
`Arlington, Va.
`
`[21]
`
`Appl. No.: 08/904,117
`
`[22]
`
`Filed:
`
`Jul. 13, 1997
`
`[51]
`[52]
`
`[58]
`
`[56]
`
`Int. Cl.6
`...................................................... H04M 1/24
`U.S. Cl. .......................... 709/229; 709/202; 709/203;
`709/219; 709/224; 709/225
`Field of Search ......................... 395/200.59, 200.55,
`395/200.54, 200.49, 200.33, 200.32; 709/229,
`225,224,219,203,202
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`4,768,150
`4,855,905
`5,241,588
`5,247,571
`5,287,103
`5,309,437
`5,327,486
`5,377,186
`5,392,357
`5,406,557
`5,423,003
`5,436,957
`5,469,500
`5,471,459
`5,495,521
`5,499,290
`5,517,562
`5,519,772
`5,526,413
`
`................... 379/201
`
`8/1988 Chang et al..
`8/1989 Estrada et al. .
`8/1993 Babson, III et al.
`9/1993 Kay et al..
`2/1994 Kasprzyk et al. .
`5/1994 Perlman et al. .
`7/1994 Wolff et al..
`12/1994 Wegner et al..
`2/1995 Bulfer et al. .
`4/1995 Baudoin.
`6/1995 Berteau.
`7/1995 McConnell.
`11/1995 Satter et al. .
`11/1995 Gut.
`2/1996 Rangachar.
`3/1996 Koster.
`5/1996 McConnell.
`5/1996 Akman et al..
`6/1996 Cheston, III et al. .
`
`5,526,489
`5,539,886
`5,566,235
`5,572,581
`5,572,583
`5,586,177
`5,623,601
`5,721,908
`5,802,146
`5,826,029
`
`6/1996 Nilakantan et al. .
`7 /1996 Aldred et al. .
`10/1996 Hetz .
`11/1996 Sattar et al. .
`11/1996 Wheeler, Jr. et al. .
`12/1996 Farris et al. .
`4/1997 Vu ...................................... 395/187.01
`2/1998 Lagarde et al. ... ... .... ... ... ... ... ... 395 /610
`9/1998 Dulman ..................................... 379/34
`10/1998 Gore et al. ......................... 395/200.57
`
`Primary Examiner-Zarni Maung
`Assistant Examiner-Saleh Najjar
`Attorney, Agent, or Firm-McDermott, Will & Emery
`
`[57]
`
`ABSTRACT
`
`A web page type interface is provided, which enables
`subscriber access to control and reporting functionalities of
`a communication network, such as the advanced intelligent
`telephone network, via a public packet data network, typi(cid:173)
`cally the network now commonly known as the Internet. The
`web page based Internet access opens the personal control of
`services provided by the communication network to any
`subscriber who also uses the Internet, for example using the
`subscriber's existing PC and browser software or their
`Web-TV terminal. A secure access platform provides the
`interface and communicates via a private data network with
`various systems used to manage the communication net(cid:173)
`work. The secure access platform includes a firewall coupled
`between the public data network and the private data net(cid:173)
`work. The firewall implements the web page interface and
`validates certain users of the public data network as sub(cid:173)
`scribers to services of the communication network. The
`secure access platform also includes a web services man(cid:173)
`agement system, which communicates with the firewall and
`with the communication network management systems via
`the private data network. The platform enables persons
`surfing the web to control their services and receive various
`reports relating to status and/or usage of their network
`services.
`
`27 Claims, 5 Drawing Sheets
`
`PC
`
`OS ,fil
`TERMINAL
`
`COMPUTER
`
`WEB SERVICE
`MGMT. SYS. APPL'N
`
`OS~
`WSMS
`
`ISCP 242 / \
`
`~~ 19
`
`~-@P0
`
`1
`
`(SPACE)
`
`' ' : : ,
`
`23~
`
`<--241
`
`<--241
`
`BHN, et al. v. FOCAL IP, LLC
`FOCAL IP, LLC EX2049 - 1
`U.S. Patent No. 5,958,016
`IPR2016-01262
`
`

`

`25~ SECURE
`ACCESS
`PLATFORM
`
`~ 24
`~
`
`I\
`
`1 9 -+~
`I
`I
`l
`l----------
`
`r - -- -- -
`
`I
`
`I
`
`I
`
`I
`
`I
`
`I
`
`I
`
`1
`
`SS7 1
`
`31 A1 ____ 1 ·---------,
`:cusT. :PREM.:
`:~1 :
`fA'\ :
`'
`}t
`: USER
`: TERM.
`:
`
`
`I
`
`1
`
`I
`
`I
`
`i i
`I
`I
`I
`I
`
`
`
`SSa7 __ ' :
`
`FIG. 1
`
`\
`
`\
`
`~ / '
`
`\
`
`\
`
`\
`
`\ \SS7
`'
`11
`I
`I
`T~:??~>;,"-"\~:{~jOs 8::
`I
`I
`' -::J5S7
`STP
`
`:
`:
`,_ -- --- -- --- -- - - --- ---- -- ---- -- -- - - - ---- - - - - -- - --_,
`I
`I
`1 SS7
`1
`'
`I
`I
`
`'
`
`1
`1 '
`I en1
`
`29A
`
`A
`
`15
`
`L
`
`11E
`- -~ - - __ ._ -1_1
`(CO)
`:
`:
`:
`I
`:
`.------------'~
`
`.__l
`
`~ 1
`~ . -
`
`fA"._1
`
`CENTRAL I~
`OFFICE
`(CO)
`
`TR
`
`IIC _____ ~J~NA~JN~.r.;1 _ _1
`
`11E
`
`11
`
`VOICE CHANNELS
`
`23
`
`I
`I
`I
`I
`
`, i ~i , ___ 1_1 ______________ ---------··:··------------1-1 ___ , i ~i i r11E
`1 -1 - - ' - - - - ,_ _ _
`L. en
`:
`:
`(CO)
`~ t
`:
`: ~ :
`~ ,._,.1-r------'--,
`:
`en
`~I CENTRAL
`OFFICE
`(CO)
`
`'
`
`15
`
`I
`
`1
`' 1
`I en1
`
`1
`I
`
`I
`:
`
`:
`
`TR
`TR
`
`TR
`
`23
`
`l
`SIGNALING
`IP 1---------------------------•
`
`VOICE CHANNELS
`
`.J
`
`1-+/M
`
`11 E
`
`d •
`r:JJ.
`•
`~
`~ .....
`~ = .....
`
`'JJ.
`~ '?
`N
`~CIO
`"'""
`\C
`\C
`\C
`
`'JJ. =(cid:173)~
`~ ....
`"'"" 0 ....,
`
`Ul
`
`Ul
`....
`\C
`Ul
`00
`
`.... = ~
`
`0--,
`
`BHN, et al. v. FOCAL IP, LLC
`FOCAL IP, LLC EX2049 - 2
`U.S. Patent No. 5,958,016
`IPR2016-01262
`
`

`

`PC r 293
`I \
`os m
`TERMINAL ~ MGMT SYS's
`
`I
`
`237
`
`-
`
`r,
`
`I sw,rcH lsoAcs I
`231-+I 8 RAO
`
`I ~,\
`
`,' \ \ \ _J
`
`I
`I (SPACE)
`, - - , , ,
`46
`2
`~ \ \ \
`I l"'IATA I
`'. 'J--,
`
`d •
`r:JJ.
`•
`~
`~ .....
`~ = .....
`
`;{1
`'?
`N
`QC
`~
`\C
`\C
`\C
`
`'JJ. =(cid:173)~
`~ ....
`N
`0 ....,
`Ul
`
`Ul
`....
`\C
`Ul
`00
`
`.... = ~
`
`0--,
`
`233 235EJ
`
`MARCH
`
`.-241
`
`COMPUTER
`
`WEB SERVICE
`MGMT. SYS. APPL'NI
`
`OS 259
`WSMS
`
`FIG. 2
`
`BHN, et al. v. FOCAL IP, LLC
`FOCAL IP, LLC EX2049 - 3
`U.S. Patent No. 5,958,016
`IPR2016-01262
`
`

`

`r - - - - -
`I
`1 LAN
`I
`-l- --J
`
`I
`
`I
`
`328
`
`290
`
`251
`FIREWALL
`
`f330
`- - -
`
`r -
`I
`1 LAN
`
`I
`
`\
`
`\
`
`\
`
`\
`
`\
`
`\
`
`\
`
`\
`
`~ ' . / f
`IRou1ERr·,,. 338
`
`\
`
`\
`
`\
`
`,
`
`FIG. 3
`
`'
`UI/\L·Ut'
`-
`-------------------------------------------------'
`
`\
`
`316
`
`INFO.
`.PROVIDER
`
`I
`I
`I
`I
`I
`I
`: DIAL-UP NETWORK
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`: 318
`I
`I
`INFO.
`I
`PROVIDER
`
`I
`
`I
`
`I
`
`I
`
`DIAL-UP NETWORK
`
`~
`292
`LAPTOP
`
`332
`
`I
`
`I
`
`---- ---- -- -------- --- -- -- _ --- _ -- -- _ -- ____ -- -- _ -- -- --- -- ----- ---,
`27
`ij
`
`324
`
`INFO.
`PROVIDER
`
`~ •
`00
`•
`~
`
`~ ....
`~ = ....
`
`'JJ,
`
`~ '?
`N
`~CIO
`"'""
`\C
`\C
`\C
`
`'JJ, =(cid:173)~
`~ ....
`0 ....,
`Ul
`
`~
`
`0-.
`,.,.
`\,Q
`0-.
`00
`
`,.,. = ~
`
`O'\
`
`BHN, et al. v. FOCAL IP, LLC
`FOCAL IP, LLC EX2049 - 4
`U.S. Patent No. 5,958,016
`IPR2016-01262
`
`

`

`DISPLAY
`
`._447
`
`FIG. 4
`
`,------------------------------,,-----------------------------------------,
`1 431_
`445_
`TERMINAL PC -29-
`:
`t
`..-----. I
`PR INTER t<:
`PORT
`
`DISPLAY
`DRIVER
`
`ROM
`
`DRAM
`
`MICROPROCESSOR
`
`TO PRINTER
`>
`
`BUS 4431
`437
`
`441
`
`I
`I
`t
`1453
`I
`I
`I
`I
`I
`t
`I
`\ -
`
`- -,
`
`PORTS
`
`439
`
`HARO
`
`I/0 I DISK
`
`459~L m~L
`OTHER
`FLOPPY
`LAN
`STORAGE
`DISK
`I MODEM I I INT I
`MEDIA
`DRIVE
`DRIVE
`I -------------------------------------------L
`_J----L
`~
`~
`
`449 ~u t::451
`
`,.......___..._--,.
`
`I
`
`I
`
`KEYBOARD
`
`OTHER
`DEVICES
`
`_J-
`
`TELE. LINE
`
`LAN
`
`~
`
`TO/FROM
`>INTERNET
`
`~ •
`rJ'J.
`•
`~
`~ .....
`~ = .....
`
`'JJ.
`~ '?
`N
`~CIO
`"'""
`\C
`\C
`\C
`
`'JJ. =(cid:173)~
`~ ....
`0 ....,
`Ul
`
`,i;;..
`
`tit
`....
`\C
`tit
`QO
`....
`Q
`~
`~
`
`BHN, et al. v. FOCAL IP, LLC
`FOCAL IP, LLC EX2049 - 5
`U.S. Patent No. 5,958,016
`IPR2016-01262
`
`

`

`5201
`510
`
`COMPUTER
`
`INTERNETI Q ~ I
`
`1sERVER
`
`SERVER
`
`521
`
`1
`
`FIG. 5
`
`I
`HOST
`525- SOFTWARE
`I I
`PROXY HI WEB I APPL 'N
`524
`SERVERII H g
`523 ,~--- I
`11__
`OS 521
`
`-l m
`:::0
`
`I
`
`I
`
`ACCESS
`CTRL
`
`DB
`
`FIREW~LL I
`
`251
`
`I
`
`550-~
`
`COMPUTER
`
`I 560"'"1 I
`
`IH
`
`SECURITY
`APPLICATION
`
`553
`
`TNS
`253
`
`I
`
`OS 551
`
`H§g FO/FROM
`
`m z
`;o
`
`OSN
`
`I I
`I
`
`I
`I
`
`d •
`r:JJ.
`•
`~
`~ .....
`~ = .....
`
`'JJ.
`~ '?
`N
`~CIO
`"'""
`\C
`\C
`\C
`
`'JJ. =-~
`~ ....
`Ul
`0 ....,
`Ul
`
`Ul
`....
`\C
`Ul
`00
`
`.... = ~
`
`0--,
`
`BHN, et al. v. FOCAL IP, LLC
`FOCAL IP, LLC EX2049 - 6
`U.S. Patent No. 5,958,016
`IPR2016-01262
`
`

`

`5,958,016
`
`1
`INTERNET-WEB LINK FOR ACCESS TO
`INTELLIGENT NETWORK SERVICE
`CONTROL
`
`TECHNICAL FIELD
`
`2
`Transmission Control Protocol/Internet Protocol (TCP/IP)
`TRunk (TR)
`Trusted Network System (TNS)
`Universal Resource Locator (URL)
`5 Web Service Management System (WSMS)
`BACKGROUND
`For some years, the telephone industry has been devel(cid:173)
`oping an enhanced telephone network, sometimes referred
`to as an Advanced Intelligent Network (AIN), for providing
`a wide array of new voice grade telephone service features.
`In an AIN type system, local and/or toll offices of the public
`telephone network detect one of a number of call processing
`events identified as AIN "triggers". An office which detects
`a trigger suspends processing of a call, compiles a call data
`15 message and forwards that message via a common channel
`interoffice signaling ( CCIS) link to a database system, such
`as an Integrated Service Control Point (ISCP) which
`includes a Multi-Services Application Platform (MSAP)
`database. If needed, the ISCP can instruct the central office
`20 to obtain and forward additional information. Once suffi-
`cient information about the call has reached the ISCP, the
`ISCP accesses its stored data tables in the MSAP database to
`translate the received message data into a call control
`message and returns the call control message to the office of
`the network via CCIS link. The network offices then use the
`call control message to complete the particular call. For an
`ordinary telephone service call, there would be no event to
`trigger AIN processing; and the local and toll office switches
`function normally and process such a call without referring
`to the central database for instructions. An AIN type network
`30 for providing an Area Wide Centrex service, for example,
`was disclosed and described in detail in commonly assigned
`U.S. Pat. No. 5,247,571 to Kay et al.
`In an AIN network developed by the Regional Bell
`Operating Companies (RBOCs) and Bell Communications
`35 Research (Bellcore ), a terminal and software system referred
`to as 'SPACE' functions as the service creation environment
`and/or service provisioning system for the AIN control
`functions in the central database system. For example, as
`disclosed in U.S. Pat. No. 5,241,588 Babson, III et al.,
`40 customized call processing information records are created
`and/or modified in a graphical environment, by creating or
`modifying a customer's service graph-on the display termi(cid:173)
`nal. Data corresponding to the service graph is then stored
`in a service control point (SCP) database. Other terminal and
`45 software systems could be used to create and provision the
`AIN services. For AIN services today, however, telephone
`company personnel utilize the SPACE system to create
`templates for the service logic for new services. When
`customers subscribe to the services, the templates are filled
`50 in with the subscribers' data to create individual call pro(cid:173)
`cessing records (CPRs). The CPRs are stored in the database
`in the SCP or in an ISCP, for controlling actual call pro(cid:173)
`cessing.
`Many of the enhanced communication services offered by
`55 the AIN permit a subscriber to input control information, to
`manage services as desired. For example, in a simple
`forwarding or redirection service, the subscriber might
`change the 'forward to' number from time to time to route
`calls to different destinations. As another example, a sub(cid:173)
`scriber might want to block calls unless they are to or from
`numbers on a list, and the subscriber would want to change
`the list of numbers from time to time. Some subscribers need
`to change certain information quite frequently, even for
`relatively simple AIN services. It is too cumbersome to
`65 require the subscriber to call the local telephone company's
`business office and request each and every one of the routine
`changes.
`
`The present invention relates to a system and methodol(cid:173)
`ogy for providing telephone service customers with a stan(cid:173)
`dardized interface for access to service control and manage(cid:173)
`ment elements of a communication network, such as the 10
`telephone network, via a public packet switched data
`network, such as the Internet.
`
`Acronyms
`
`The written description uses a large number of acronyms
`to refer to various services, messages and system compo(cid:173)
`nents. Although generally known, use of several of these
`acronyms is not strictly standardized in the art. For purposes
`of this discussion, acronyms therefore will be defined as
`follows:
`
`25
`
`Advanced Intelligent Network (AIN)
`Automatic Message Accounting (AMA)
`Autonomous System (AS)
`Call Processing Record (CPR)
`Central Office (CO)
`Common Channel Interoffice Signaling (CCIS)
`Competing Local Exchange Carrier (CLEC)
`Customer Premises Equipment (CPE)
`Data Distributor (DD)
`Data Reporting System (DRS)
`File Transfer Protocol (FTP)
`Generic Data Interface (GDI)
`HyperText Mark-Up Language (HTML)
`HyperText Transfer Language Protocol (HTTP)
`Integrated Service Control Point (ISCP)
`Integrated Services Digital Network (ISDN)
`Intelligent Peripheral (IP)
`IntereXchange Carrier (IXC)
`Internet Service Provider (ISP)
`ISDN Users Part (ISDN-UP)
`Local Area Network (LAN)
`Local Exchange Carrier (LEC)
`Memory Administration Recent Change System (MARCH)
`Multipurpose Internet Mail Extension (MIME)
`Multi-Services Application Platform (MSAP)
`Office Equipment (OE) number
`Operations Systems Network (OSN)
`Personal Computer (PC)
`Personal Identification Number (PIN)
`Plain Old Telephone Service (POTS)
`Point In Call (PIC)
`Primary Rate Interface (PRI)
`Public Switched Telephone Network (PSTN)
`Regional Bell Operating Companies (RBOCs)
`Revenue Accounting Office (RAO)
`Service Control Point (SCP)
`Service Creation Environment (SCE)
`Service Management System (SMS)
`Service Order Administration and Control System (SOACS) 60
`Service Switching Point (SSP)
`Signaling Point (SP)
`Signaling System 7 (SS7)
`Signaling Transfer Point (STP)
`Simplified Message Desk Interface (SMDI)
`Station Message Detail Recording (SMDR)
`Transaction Capabilities Application Part (TCAP)
`
`BHN, et al. v. FOCAL IP, LLC
`FOCAL IP, LLC EX2049 - 7
`U.S. Patent No. 5,958,016
`IPR2016-01262
`
`

`

`5,958,016
`
`3
`4
`activate the communication services, for example identify(cid:173)
`At present, automated subscriber interactions to modify
`the subscribers' AIN services rely mainly on a voice
`ing the particular line(s) for which service will be active and
`response type interaction. The subscriber calls a special
`the on and off times. When the representative has entered
`and confirmed the data for activating the service, the PC
`number, hears recorded announcements or synthesized voice
`prompts and inputs a PIN number and service related
`5 downloads that data to the SMS within the ISCP. The SMS
`updates the appropriate records in the ISCP, after which the
`information. Typically, the subscriber inputs the various
`ISCP activates services from the subscriber lines in accord
`information by keying buttons on a Touch Tone telephone,
`with the most recently entered data.
`but use of speech recognition technology has been proposed
`to enable a subscriber to vocally input the information.
`Commonly assigned U.S. Pat. No. 5,526,413 issued Jun.
`10 11, 1996 to Frank C. Cheston, III, James E. Curry and
`Consider for example, commonly assigned U.S. Pat. No.
`5,572,583 to David F. Wheeler, Jr. and Robert D. Farris. This
`Robert D. Farris suggests extending AIN into customer
`premises equipment (CPE). The CPE system includes a
`Patent discloses an intelligent peripheral (IP) for providing
`signaling transfer point (STP) coupled to the CCIS system of
`enhanced call processing functions, such as announcement
`the public telephone network as well as an ISCP database.
`and digit collection, voice recognition, facsimile mail and
`15 The ISCP on the customer premises may be implemented in
`voice mail, in an AIN type telephone network. The IP
`connects through telephone line groups to one or more
`software in a personal computer. Although not disclosed in
`Service Switching Point (SSP) offices of the telephone
`detail in the issued Cheston, III, et al. Patent, a related
`application (Ser. No. 08/508,428) adds the teaching of
`network. The IP also communicates with an ISCP via a
`customer programming of the network ISCP from the CPE
`signaling network separate from the voice circuits and from
`the CCIS network that interconnects the ISCP to the SSP 20
`equipment. In accord with this aspect of the Cheston et al.
`offices. One major use for the disclosed IP relates to provi(cid:173)
`invention, a PC or other computer on the customer premises
`sioning and/or modifying services. The IP provides prompts
`will run telephone service programming software. The sig(cid:173)
`and receives dual-tone-multi-frequency tone signals or
`naling communication link to the CCIS network of the
`speech inputs from subscribers.
`exchange carriers permits the subscriber using the
`Typically, a telephone company technician initially sets 25 on-premises PC and software to load AIN service informa(cid:173)
`tion into the relevant CPE devices as well as into the ISCPs
`up a subscriber's service using the Service Creation Envi(cid:173)
`and switches of the local exchange carrier network and the
`ronment or SCE in the ISCP. As part of this procedure, the
`interexchange carrier (IXC) network.
`technician establishes one or more data tables for the sub(cid:173)
`scriber in the service control point (SCP) database 43.
`Although the PC or terminal based solutions offer some
`Subsequently, the subscriber controls the service by input- 30
`enhanced subscriber access to control AIN services, the
`ting data to populate the subscriber's data table(s) through
`solutions proposed to date have inherent limitations. Any of
`an interaction with the IP. The newly input control data is
`these prior art implementations using a PC or terminal to
`transferred from the IP to the ISCP for storage and for
`access the network require specialized terminals and/or
`subsequent control of the subscriber's communication ser(cid:173)
`software and provide only limited access. Also, in most
`vices. The IP also may provide a data interface for PC based 35
`cases, the local operating company must maintain the local
`area network or a bank of modems to provide the PC access
`access,
`service.
`Such interactive voice response processing provides only
`A need therefore still exists for a technique which will
`limited input capabilities and is subject to input errors,
`because the subscriber accidently hits the wrong button or
`enable any subscriber to personally access and control their
`incorrectly pronounces a spoken input. Many of the AIN
`AIN services from a general purpose computer without
`services require subscriber inputs, for example combinations
`specially developed hardware or software interfaces.
`of blocked numbers, time of day and day of the week, that
`are too complex for the average subscriber to input using the
`interactive voice response procedures.
`Several other patents have suggested data terminal or PC
`access, through a local area network or direct dial-up links
`to a host computer in the telephone network.
`For example, commonly assigned U.S. Pat. No. 5,436,957
`to Von K. McConnell relates to an AIN-based technique 50
`enabling a commercial telephone subscriber to selectively
`activate service through a group of lines assigned to the
`subscriber. To facilitate input of the data for controlling the
`selective service activation, McConnell suggested use of PC
`type data terminals. One PC connects to the service man- 55
`agement system (SMS) in the ISCP via a dedicated data
`communication line. Another PC communicates with the
`SMS via a dial-up modem session through the telephone
`network. Either PC may store information relating to the
`subscriber's products and services and preset tables or forms
`for entry of the necessary data to control that subscriber's
`restricted access communication services.
`With the McConnell system, when the subscriber wants to
`activate communication services in relation to one or a series
`of products or services ( e.g., a delayed or canceled airline 65
`flight), the representative accesses the necessary data relat(cid:173)
`ing to products or services and completes the data tables to
`
`The present invention addresses the above-stated needs by
`providing a web page type interface, for accessing control of
`intelligent network type telephone services, via a public
`packet data network, such as the network now commonly
`known as the Internet. Typically, a person's PC or other
`terminal runs common software, such as a 'browser' to
`obtain various web pages of information from the network.
`While viewing web pages using the browser, the invention
`enables persons surfing the web to access the telephone
`network, to control their telephone services and receive
`various reports relating to their telephone services. The
`inventive web access also provide an architecture, which
`maintains the necessary security of the telephone network
`and associated network management systems.
`Thus, one aspect of the invention relates to a communi-
`60 cation network. The overall network includes a traffic net-
`work for providing selective communications to subscriber
`stations and an operations network. One example of such a
`communication network is a public switched telephone
`network. At least one network management system is
`coupled to the operations network, for managing selective
`communication services provided through nodes of the
`traffic network. The overall communication network also
`
`45
`
`40
`
`DISCLOSURE OF THE INVENTION
`
`BHN, et al. v. FOCAL IP, LLC
`FOCAL IP, LLC EX2049 - 8
`U.S. Patent No. 5,958,016
`IPR2016-01262
`
`

`

`5,958,016
`
`5
`
`6
`network security system passes message to and from the
`firewall only if the messages are valid in accord with certain
`security restrictions.
`As noted, in the preferred embodiment, the traffic network
`is an intelligent telephone network. The nodes of the traffic
`network, for example, include various central office switch(cid:173)
`ing systems of the telephone network. The central offices are
`interconnected by trunks for carrying interoffice traffic and
`by a signaling network, which carries call set-up related
`10 messages and other signaling communications. The intelli(cid:173)
`gent implementation of the telephone network also includes
`a service control point. The service control point stores data
`for controlling certain call processing operations of the
`central office switching systems.
`The operations network provides communications
`between one or more provisioning systems and the elements
`of the telephone network, such as the central office switching
`systems and/or the service control point. The operations
`network also carries communications between the telephone
`20 network elements and one or more data processing systems,
`which generate usage reports and bills.
`Through the web page access provided by the platform,
`telephone subscribers can review the status of their services
`25 and modify or upgrade their telephone services, including
`switch-based services and intelligent network services con(cid:173)
`trolled through the data stored in the service control point.
`Subscribers also may review reports of usage of their
`services or review account or billing statements.
`Additional objects, advantages and novel features of the
`invention will be set forth in part in the description which
`follows, and in part will become apparent to those skilled in
`the art upon examination of the following or may be learned
`by practice of the invention. The objects and advantages of
`35 the invention may be realized and attained by means of the
`instrumentalities and combinations particularly pointed out
`in the appended claims.
`
`15
`
`5
`includes a secure access platform coupled to the operations
`network and for coupling to a public data network.
`The secure access platform validates predetermined users
`of the public data network as subscribers to services of the
`communication network. The platform implements a stan(cid:173)
`dard graphical user interface of the public data network,
`preferably an Internet type web page interface, enabling
`communications with terminals on the public data network.
`The platform also communicates with the management
`system. The platform enables validated subscribers to
`review service data from the network management system
`and to input control data to the network management system.
`In response to the control data, the network management
`system modifies operations of the traffic network as selected
`by the validated subscribers.
`Examples of network management systems include pro(cid:173)
`visioning systems and usage and/or billing data processing
`systems. The provisioning systems establish or modify data
`files or records, in various elements of the traffic network,
`that control subscribers' services. The data processing sys(cid:173)
`tems receive operational data from the elements of the traffic
`network and process that data, for example to generate
`subscriber usage reports or bills.
`The control data input by the subscribers may control
`services facilitated through high level network control
`points. In an intelligent network implementation of a tele(cid:173)
`phone network, for example, the control data is used to
`establish or modify call processing records stored in a
`service control point. The control data also may be used to
`modify individual subscriber profiles in central office
`switching systems of the telephone network.
`The service related data presented to the users through the
`graphical user interface may relate to existing services
`provided by the communication network, e.g. stored in a
`provisioning system. For example, this data may relate to
`current status of intelligent network services to which each
`customer subscribes. The service related data also may relate
`to usage of the communication network services and/or to
`the account or billing for services used, as supplied from a 40
`data processing system.
`Another aspect of the invention relates to a specific
`implementation of the secure access platform. The platform
`includes a firewall and a service management system. The
`firewall is coupled to the public data network. The firewall 45
`comprises a proxy server, an application server and an
`access control. The application server provides the standard
`graphical user interface through the proxy server for users
`accessing the firewall via the public data network. The
`access control authenticates users of the packet data network 50
`as valid subscribers of communication network services.
`The service management system communicates with the
`application server and the network management system. The
`service management system receives subscriber inputs via
`the application server and processes at least some of the 55
`subscriber inputs to provide data to the network manage(cid:173)
`ment system. The service management system also sends at
`least some information, relating to services provided to
`subscribers by the communication network, from the net(cid:173)
`work management system through the application server and
`the public data network to subscribers.
`The preferred embodiment also includes a further security
`system logically operating between the firewall and the
`service management system. All messages going to and
`from the firewall via the operation network, including com- 65
`munications between the firewall and the service manage(cid:173)
`ment system, pass through this network security system. The
`
`30
`
`BRIEF DESCRIPTION OF DRAWINGS
`
`The drawing figures depict the present invention by way
`of example, not by way of limitations. In the figures, like
`reference numerals refer to the same or similar elements.
`FIG. 1 is a high level functional block diagram of an
`intelligent telephone network, systems for managing ser(cid:173)
`vices provided by that telephone network and a system for
`providing secure Internet type access to subscribers to allow
`them to manage their telephone services via the Internet, in
`accord with the invention.
`FIG. 2 is a somewhat more detailed block diagram useful
`in understanding the secure customer access, in accord with
`the invention.
`FIG. 3 is a block diagram of the public packet switched
`data network now commonly referred to as the Internet.
`FIG. 4 is a block diagram of one embodiment of a
`terminal, in the example a personal computer, for accessing
`the management systems of the intelligent telephone net(cid:173)
`work in accord with the invention.
`FIG. 5 is a detailed block diagram of the firewall and the
`60 trusted network system used in the system of FIG. 2.
`
`BEST MODE FOR CARRYING OUT THE
`INVENTION
`Recently, considerable public attention has focused on the
`packet data network known as the Internet and the range of
`information and multimedia services available via the
`'World Wide Web' portion of that network. Typically, a
`
`BHN, et al. v. FOCAL IP, LLC
`FOCAL IP, LLC EX2049 - 9
`U.S. Patent No. 5,958,016
`IPR2016-01262
`
`

`

`5,958,016
`
`7
`person's PC runs common software referred to as a
`'browser' to obtain various web pages of information from
`the network. Several vendors also now offer a 'Web-TV'
`terminal device for coupling to a television set, to provide
`web browsing and other Internet services using a remote
`control and a television screen. While viewing pages using
`either type of terminal, the user can enter requests by
`clicking on text or icons or can send typed inputs to a server.
`The invention enables persons surfing the web using such
`common technology to access a communication network,
`preferably the AIN telephone network, to control their
`services and receive various reports relating to their services.
`The inventive Internet access opens the personal control
`of AIN telephone services to any subscriber who also uses
`the Internet, using the subscriber's existing PC and software
`or their Web-TV terminal. However, Internet access raises
`serious security concerns. The inventive web access there(cid:173)
`fore entails an access architecture, which provides the web
`page type user interface via the Internet and maintains the
`necessary security of the telephone network and associated
`network management systems. The inventive access system
`also offers efficient service management, both for provision(cid:173)
`ing functions and for usage monitoring functions.
`FIG. 1 provides a high level illustration of an intelligent
`telephone network, its control and management systems as 25
`well as the customer access thereto provided by the inven(cid:173)
`tion. To understand the invention, it may be helpful first to
`review the structure and operation of the telephone network.
`The overall communication network illustrated in FIG. 1
`includes a telephone type traffic network as well as a private
`operations data network and management systems coupled
`thereto to provision and report on operations of the tele(cid:173)
`phone network. The communication network connects to a
`public packet switched data network, such as the Internet,
`and through that network to a variety of users terminal
`devices. A secure access platform interfaces the public
`packet switched data network to the private data network
`associated with the telephone system. The access through
`the secure platform allows users to operate their terminals to
`access the telephone network management systems via the
`Internet.
`In the example depicted in FIG. 1, the telephone network
`is an advanced intelligent network or 'AIN'. As shown, the
`telephone network includes a switched traffic network and a 45
`common channel signaling network carrying the control
`signaling messages for the switched telephone traffic net(cid:173)
`work. The telephone or traffic network, operated by one
`carrier or a combination of local carriers and interexchange
`carriers, includes a number of nodes, typically end office and 50
`tandem office type central office (CO) switching systems 11
`interconnected by trunk circuits TR.
`FIG. 1 shows a number of subscriber stations, depicted as
`telephones 1, connected to a series of central office switches
`11. In the preferred implementation, the connections to the 55
`central office switches 11 utilize telephone lines ( e.g. POTS
`or ISDN), and the switches are telephone

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket