throbber
PCT
`INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT)
`WO 98/54913
`
`WORLD INTELLECTUAL PROPERTY ORGANIZATION
`International Bureau
`
`(51) International Patent Classification 6 :
`H04Q 3/00, H04M 3/42
`
`(11) International Publication Number:
`
`Al
`
`(43) International Publication Date:
`
`3 December 1998 (03.12.98)
`
`(21) International Application Number:
`
`PCT/FI98/00440
`
`(22) International Filing Date:
`
`26 May 1998 (26.05.98)
`
`(30) Priority Data:
`972319
`
`30 May 1997 (30.05.97)
`
`FI
`
`(71) Applicant (for all designated States except US): TELEFONAK(cid:173)
`TIEBOLAGET LM ERICSSON [SE/SE]; S-126 25 Stock(cid:173)
`holm (SE).
`
`(72) Inventor; and
`(75) Inventor/Applicant (for US only): ARKKO, Jari [FIIFI];
`Karppalantie 25 A 7, FIN-02700 Kauniainen (FI).
`
`(74) Agent: BORENIUS & CO. OY AB; Kansakoulukuja 3,
`FIN-00100 Helsinki (FI).
`
`(81) Designated States: AL, AM, AT, AU, AZ, BA, BB, BG, BR,
`BY, CA, CH, CN, CU, CZ, DE, DK, EE, ES, Fl, GB, GE,
`GH, GM, GW, HU, ID, IL, IS, JP, KE, KG, KP, KR, KZ,
`LC, LK, LR, LS, LT, LU, LV, MD, MG, MK, MN, MW,
`MX, NO, NZ, PL, PT, RO, RU, SD, SE, SG, SI, SK, SL,
`TJ, TM, TR, TT, UA, UG, US, UZ, VN, YU, ZW, ARIPO
`patent (GH, GM, KE, LS, MW, SD, SZ, UG, ZW), Eurasian
`patent (AM, AZ, BY, KG, KZ, MD, RU, TJ, TM), European
`patent (AT, BE, CH, CY, DE, DK, ES, FI, FR, GB, GR,
`IE, IT, LU, MC, NL, PT, SE), OAPI patent (BF, BJ, CF,
`CG, CI, CM, GA, GN, ML, MR, NE, SN, TD, TG).
`
`Published
`With international search report.
`Before the expiration of the time limit for amending the
`claims and to be republished in the event of the receipt of
`amendments.
`
`(54) Title: A METHOD AND ARRANGEMENT IN COMMUNICATION NETWORKS FOR MANAGING USER RELATED FEA(cid:173)
`TURES THROUGH A USER INTERFACE
`
`PPP + IP + H1TP
`
`11
`
`1
`
`(57) Abstract
`
`A method and arrangement for managing a communications network such that a user in a communications network environment is
`enabled to manage user related features provided in said network through a user interface (1). The managing method comprises steps for
`(I) establishing a call to a server (12) provided with a feature management service including an individual register (13) of characteristics
`and available features for predetermined user interfaces (1), (II) terminating the user's access into the network through the user interface
`(1) to said server (12), (III) identifying the user interface (1) by means of at least one characteristic of said user interface, (IV) inputting
`said characteristic into said server means (12), and (V) enabling the user to manage the features associated with said at least one inputted
`characteristic through said user interface (1).
`
`Bright House Networks - Ex. 1015, Page 1
`
`

`
`FOR THE PURPOSES OF INFORMATION ONLY
`
`Codes used to identify States party to the PCT on the front pages of pamphlets publishing international applications under the PCT.
`
`AL
`AM
`AT
`AU
`AZ
`BA
`BB
`BE
`BF
`BG
`BJ
`BR
`BY
`CA
`CF
`CG
`CH
`CI
`CM
`CN
`cu
`cz
`DE
`DK
`EE
`
`Albania
`Armenia
`Austria
`Australia
`Azerbaijan
`Bosnia and Herzegovina
`Barbados
`Belgium
`Burkina Paso
`Bulgaria
`Benin
`Brazil
`Belarus
`Canada
`Central African Republic
`Congo
`Switzerland
`Ci\te d'Ivoire
`Cameroon
`China
`Cuba
`Czech Republic
`Germany
`Denmark
`Estonia
`
`ES
`FI
`FR
`GA
`GB
`GE
`GH
`GN
`GR
`HU
`IE
`IL
`IS
`IT
`JP
`KE
`KG
`KP
`
`KR
`KZ
`LC
`LI
`LK
`LR
`
`Spain
`Finland
`France
`Gabon
`United Kingdom
`Georgia
`Ghana
`Guinea
`Greece
`Hungary
`Ireland
`Israel
`Iceland
`Italy
`Japan
`Kenya
`Kyrgyzstan
`Democratic People's
`Republic of Korea
`Republic of Korea
`Kazakstan
`Saint Lucia
`Liechtenstein
`Sri Lanka
`Liberia
`
`LS
`LT
`LU
`LV
`MC
`MD
`MG
`MK
`
`ML
`MN
`MR
`MW
`MX
`NE
`NL
`NO
`NZ
`PL
`PT
`RO
`RU
`SD
`SE
`SG
`
`Lesotho
`Lithuania
`Luxembourg
`Latvia
`Monaco
`Republic of Moldova
`Madagascar
`The former Yugoslav
`Republic of Macedonia
`Mali
`Mongolia
`Mauritania
`Malawi
`Mexico
`Niger
`Netherlands
`Norway
`New Zealand
`Poland
`Portugal
`Romania
`Russian Federation
`Sudan
`Sweden
`Singapore
`
`SI
`SK
`SN
`sz
`TD
`TG
`TJ
`TM
`TR
`TT
`VA
`UG
`us
`uz
`VN
`YU
`zw
`
`Slovenia
`Slovakia
`Senegal
`Swaziland
`Chad
`Togo
`Tajikistan
`Turkmenistan
`Turkey
`Trinidad and Tobago
`Ukraine
`Uganda
`United States of America
`Uzbekistan
`Viet Narn
`Yugoslavia
`Zimbabwe
`
`Bright House Networks - Ex. 1015, Page 2
`
`

`
`wo 98/54913
`
`PCT /FI98/00440
`
`1
`
`A METHOD AND ARRANGEMENT IN COMMUNICATION NETWORKS FOR MANAGING
`USER RELATED FEATURES THROUGH A USER INTERFACE
`
`PJEJ,D OF THE INVENTION
`
`5 The present invention relates to a method for managing
`the configuration and/or operation of various features
`of telecommunication networks. The invention relates
`further to an arrangement for accomplishing the managing
`operations of the telecommunication network features.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`BACKGROilliD OF THE INVENTION
`
`Modern telecommunication networks provide various
`sophisticated features and/or services available to
`subscribers. These services are in most cases provided
`and run by the telephone companies (operators) and
`include features such as call forwarding, wake-up calls,
`answering services, directory services, text and voice
`mails etc. These services may be implemented, e.g. in a
`so-called Intelligent Network (IN) .
`
`Conventionally these services have been relatively
`difficult to use.
`In particular, the configuration
`thereof, e.g. the installation/removal and
`activation/deactivation and/or other changes thereof,
`requires in most cases the assistance of the telephone
`company.
`Some of the configurations are also such that
`they can be accomplished only by the telephone company,
`e.g. by a service person or an authorised clerk of the
`telephone company. To receive this kind of assistance,
`the subscriber has either to visit an office of the
`telephone company or at least to make a telephone call
`to them to order the desired configuration of services.
`
`35
`
`One of the reasons for this lS the substantially
`unsophisticated and limited user interface of
`
`Bright House Networks - Ex. 1015, Page 3
`
`

`
`wo 98/54913
`
`PCT /FI98/00440
`
`2
`
`conventional telephone terminals (a simple keypad with
`numbers 0 ... 9 and hash (#) and star (*)). The required
`key combinations are often long and hard to remember,
`and the lack of guidance to the user causes mistakes, or
`even dissuades the user from even trying.
`In addition,
`the conventional telephone systems and terminals do not
`give much feedback, if at all, after the subscriber has
`keyed in the instructions through the keypad. The
`nature of the user interface also limits the number and
`flexibility of the services that can be effectively and
`readily used.
`
`To overcome the above problems, improved network
`arrangements and/or telephone terminals have been
`suggested. For instance, the performance of
`conventional POTS connections (Plain Old Telephone
`Service) is improved, e.g. by the so-called ISDN
`connection (Integrated Services Digital Network)
`Improved telephone terminals are also suggested,
`especially in connection with advanced connections such
`as the ISDN. These are intended to provide the user
`with an improved interface for setting, configuring, and
`modifying operations of the various features and/or
`services.
`
`5
`
`10
`
`15
`
`20
`
`25
`
`It is characteristic of ISDN that the user may utilise
`several communications services either separately or
`simultaneously. Different applications, which consist
`of a terminal device, a group of terminal devices, a
`30 multiservice switch, a local network, another private
`network etc., are connected to the ISDN by a limited
`user access group. The ISDN network enables the
`development of the conventional telephone to form a part
`of a multiservice terminal, such as a combination of a
`telephone and a PC, which enables simultaneous transfer
`of speech and data. The ISDN interface between the user
`and the network comprises various types of channels
`
`35
`
`Bright House Networks - Ex. 1015, Page 4
`
`

`
`wo 98/54913
`
`PCT /FI98/00440
`
`3
`
`which can be used between the subscriber and the network
`for information transfer.
`
`The ISDN B-channel is a channel operating at a rate of
`64 kbit/s and is provided with timing - it is used for
`transferring all kinds of information, e.g. in different
`manners coded speech or data. The ISDN D-channel, which
`has a transfer rate of either 16 kbit/s or 64 kbit/s, is
`primarily intended as a signalling channel for circuit
`switched connections. By combining the different
`channel structures user accesses are provided. A basic
`access has a 2B+D structure and a basic system access
`has a 30B+D structure. By using the basic access
`system, one or several terminal devices may be connected
`directly to the ISDN network, whereas the basic system
`access is used for connecting large switches and local
`networks to the ISDN network.
`
`The additional features/services referred to above are
`usually adapted to conventional telephone terminals.
`It
`is therefore difficult to introduce more advanced
`features/services, or their introduction is at least
`difficult and/or expensive to accomplish as it is
`necessary to provide subscribers with more advanced
`terminals. This cost factor has been one of the reasons
`for the slow introduction of advanced features/services
`in telecommunications networks, especially amongst home
`users.
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30 There are arrangements utilising open communications
`networks, such as the Internet or MAN (Metropolitan Area
`Network) or similar, which provide for the transmission
`of telephone communications. The skilled person is
`familiar with these, and understands that the Internet
`is a global open communications network connecting
`through PSTNs (Public Switched Telephone Network) and
`suitable gateways to a great number of local area
`
`35
`
`Bright House Networks - Ex. 1015, Page 5
`
`

`
`wo 98/54913
`
`PCT /FI98/00440
`
`4
`
`networks, such as networks of various companies,
`universities and other organisations. The skilled man
`also understands that the MAN is a network covering a
`geographically limited area, such as a city or a
`5 province. The MAN can also be a subnet of the Internet.
`
`The two most often used communication protocols for the
`Internet are TCP and IP protocols (Transport Control
`Protocol and Internet Protocol respectively) .
`In most
`cases, various services are provided utilising so called
`WWW service protocol (World Wide Web) , which provides a
`graphical Internet interface for a data processing
`device, such as a microcomputer. The WWW contains HTML
`documents (HyperText Markup Language), i.e.
`"hyperdocuments", one such document forming one entity
`which can contain text, pictures, even moving pictures,
`sound and links to other documents. One such document
`may also include several pages. A hyperdocument usually
`has a so-called "web master" which updates the document
`data.
`
`10
`
`15
`
`20
`
`SimMARY OF THE INVENTION
`
`30
`
`The above explained graphical interface could give a
`25 wide range of possibilities for managing the different
`features and/or services available in a communications
`network. Features that could be controlled, e.g. by a
`WWW server, could, for instance, consist of the
`following: call forwarding and status information
`thereof, selection of a new feature and/or deletion of
`an existing feature, browsing of various available
`services, advance information and inspection of
`telephone bills, setting and removing charging limits,
`preventing calls from and/or to unwanted telephone
`numbers, telephone directory searches, additional
`services, such as secretary services and short messages
`(text or voice), etc.
`
`35
`
`Bright House Networks - Ex. 1015, Page 6
`
`

`
`wo 98/54913
`
`PCT /FI98/00440
`
`5
`
`In the Internet environment the access calls are usually
`transmitted to a modem pool of some Internet Service
`Provider (ISP), such as EUnet Oy in Finland. As the
`traffic in the Internet rapidly increases, it will
`become necessary to separate the Internet traffic from
`the other telephone communications, and to terminate the
`call, e.g. within a local exchange or somewhere else
`than at the ISP. However, the present telephone
`networks are not capable of terminating Internet access
`calls.
`
`There remain problems which have prevented the large
`scale utilisation of various open communications
`networks for the provision, management and control of
`various services relating to the use and utilisation of
`telephone and other telecommunication arrangements. One
`of the main problems is the lack of reliable way to
`identify and authenticate the users of the networks.
`The other problem has relied on the privacy guarantees
`of the users when using the networks.
`
`The present suggestions for providing authorisation and
`privacy in open networks, such as in the global
`Internet, usually require an agreement between the
`communicating parties. This has to be done beforehand,
`and by some other means than through the open network in
`question, e.g. by visiting the telephone company 1 s
`office. The agreement contains in most cases an
`individual key (number and/or characteristic sequence)
`or similar identification to be dialled-in, to obtain an
`access to a certain service.
`
`So-called public key algorithms have been proposed to
`reduce the need for such agreements, but an
`authentication of the subscriber requires from him/her a
`formation of a private-public key pair so as to enable
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Bright House Networks - Ex. 1015, Page 7
`
`

`
`wo 98/54913
`
`PCT /FI98/00440
`
`6
`
`the subscriber to "sign" his/her messages, commands,
`instructions etc. The widespread use of public keys
`would also require the existence of a suitable public
`key infrastructure (such as key signing authorities)
`5 which, however, do not yet exist.
`In addition, the
`acquiring of these keys requires a level of special
`knowledge which most ordinary users, especially the
`private subscribers, do not necessarily have. Another
`common concern relates to the possibility of
`intercepting and/or breaking of a password as it is
`transferred in the network.
`
`10
`
`15
`
`Thus there is a need to be able to control the various
`features available in telephone or telecommunications
`networks in an easy and reliable manner, and such that a
`secure and authenticated manner for the configuration
`and/or use of the services and/or features in open
`communications networks is provided.
`
`20 Therefore, it is an object of the present invention to
`overcome the disadvantages of the prior art solutions
`and to provide a new type of solution for the management
`of various services available in the communications
`networks.
`
`25
`
`An object of the present invention is also to provide an
`improved method and arrangement for user authentication
`and authorisation in communication networks.
`
`30 A second object of the present invention is to provide a
`method and arrangement by means of which the
`configuration of user features can be facilitated and
`made more flexible.
`
`35 A third object of the present invention is to provide a
`method and an arrangement in which graphical documents
`and displays can be utilised for management operations.
`
`Bright House Networks - Ex. 1015, Page 8
`
`

`
`wo 98/54913
`
`PCT /FI98/00440
`
`7
`
`A fourth object of the present invention is to provide a
`method and an arrangement by means of which it lS no
`longer necessary for the user to use and remember any
`5 particular keys or similar identifications codes when
`accessing various services and/or features of a
`communications network.
`
`A fifth object of the present invention is to provide a
`10 method and an arrangement which provides a secure way
`for configuring features provided by the communication
`networks and such that the privacy of the individual
`users is improved.
`
`15 According to a first aspect of the present invention
`there is provided a method for managing a communication
`network such that a user in a communication network
`environment is enabled to manage user related features
`provided in the network through a user interface, the
`20 method comprising the steps of:
`initiating a call from the user interface to a
`server provided with a feature management service
`including an individual register of characteristics and
`associated available features for user interfaces;
`establishing said call between the user interface
`and said server;
`identifying the user interface by means of at least
`one characteristic thereof transmitted to the server
`during the call initiating step; and
`enabling the user to manage the features associated
`to said at least one characteristic, using said user
`interface.
`
`30
`
`25
`
`35
`
`In a preferred embodiment of the above first aspect of
`the present invention, the communication network is a
`telecommunication network enabling a subscriber to the
`network to make voice and data calls. The user
`
`Bright House Networks - Ex. 1015, Page 9
`
`

`
`wo 98/54913
`
`PCT /FI98/00440
`
`8
`
`interface is connected to the network via a subscriber
`line having a line identifier (e.g. A-number) associated
`with it. More preferably, said at least one
`characteristic used to identify the user interface is
`the line identifier.
`
`Preferably, said call is established between the user
`interface and the server via a restricted access
`telecommunication network. More preferably, said
`network comprises telephone lines controlled by the
`communication network.
`
`According to a second aspect of the present invention
`there is provided apparatus for enabling a user in a
`communications network environment to manage user
`related features provided in said network through a user
`interface, the apparatus comprising:
`a server provided with a feature management service
`including an individual register of characteristics and
`associated available features for user interfaces;
`call connection means for initiating and
`establishing a call from the user interface to the
`server;
`means for identifying the user interface using at
`least one characteristic thereof transmitted to the
`server during call initiation,
`the server being arranged to enable the user to
`manage the features associated to said at least one
`characteristic using said user interface.
`
`According to a third aspect of the invention there is
`provided a server for enabling a user to manage user
`related features provided in a communication network
`environment through a user interface, the server
`comprising:
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Bright House Networks - Ex. 1015, Page 10
`
`

`
`wo 98/54913
`
`PCT /FI98/00440
`
`9
`
`a feature management service including a database
`containing an individual register of characteristics and
`associated available features for user interfaces; and
`means for identifying the user interface using at
`least one characteristic of said user interface
`transmitted to the server during initiation of a call
`between the user interface and the server,
`wherein said server is arranged to terminate the
`user's access into said communication network and to
`enable the user to manage the features associated to
`said at least one transmitted characteristic through
`said user interface.
`
`Several advantages are obtained by embodiments of the
`present invention, as the inventive solution provides a
`simple, reliable, flexible and readily usable manner for
`the management of features provided by the
`communications network. The solution provides a secure
`authentication of the user as it always occurs by means
`of a particular characteristic of the user terminal or a
`group of related user terminals, such as by means of the
`A-number or particular secure code signal
`identification. By means of this the user may avoid
`having to use and remember keys or passwords or using
`some other cryptographic solutions.
`
`The privacy of the user in transactions between the user
`and the server is made secure as no data is allowed to
`enter outside the used communications line, such as
`ISDN/POTS, from the user terminal and terminating at the
`server and thus the transaction signals are not allowed
`to enter, e.g. the global Internet or an open MAN.
`
`As a result of the above, it is possible to use the
`server, such as a WWW server, for purposes that would
`not otherwise be possible in an open communications
`network environment, such as for paying bills or
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Bright House Networks - Ex. 1015, Page 11
`
`

`
`wo 98/54913
`
`PCT/FI98/00440
`
`10
`
`ordering and crediting products and/or services offered
`in the network. This is likely to result in increased
`use of the features or services, which in turn means
`possibilities for larger scale provision and use of
`5 various services.
`
`The invention may be implemented without requiring
`complicated and expensive auxiliary apparatus, but can
`rather be accomplished by already existing means, e.g.
`initially ln the transit networks and later in the local
`exchanges as use of the service increases. The hardware
`costs will not become significant as the proposed
`solution can be readily integrated as an additional
`function in a modem pool, an access server or an access
`server which is integrated to form a part of a telephone
`exchange.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`For a better understanding of the present invention and
`in order to show how the same may be carried into effect
`reference will now be made, by way of example, to the
`accompanying drawings, in which:
`Figure 1 is a schematic representation of one
`embodiment of the present invention;
`Figure 2 is a schematic representation of an
`alternative embodiment of the present invention;
`Figure 3 is an example of a table displayed to the
`user;
`Figure 4 is a schematic representation of the
`principles of certain embodiments of the present
`invention; and
`Figure 5 is a flow chart in accordance with one
`embodiment of the present invention.
`
`DETAII,ED DESCRIPTION OF THE DRAWINGS
`
`!0
`
`!5
`
`20
`
`25
`
`30
`
`35
`
`Bright House Networks - Ex. 1015, Page 12
`
`

`
`wo 98/54913
`
`PCT /FI98/00440
`
`11
`
`Figure 1 is a schematic representation of one preferred
`arrangement according to the present invention.
`In
`accordance with the embodiment, all users, i.e.
`subscribers, of a telecommunication network can
`establish a call from their advanced terminals or user
`interfaces 1, which preferably are in a form of data
`processing devices such as computers, to a common
`telephone number. For the purpose of clarity, Figure 1
`shows only two such terminals 1 but it is to be
`understood that any appropriate number of terminals of
`the same subscriber and/or different subscribers could
`be connected to the network.
`
`The terminal 1 used ln this invention may comprise a
`combination of a PC (personal computer) 2, a telephone
`3, and a modem 4. The other terminal shown in Figure 1
`is arranged such that a handset 5 is connected directly
`to a computer 6, wherein the computer 6 itself includes
`necessary means for establishing telephone calls, i.e.
`an integrated modem card, so that no external modems are
`required.
`
`The above mentioned common telephone number routes a
`call from a subscriber line 8 to a telephone exchange 9
`of the telecommunication network. The call may be
`routed through several exchanges linked to each other
`(not shown) by trunks etc. Associated with the exchange
`9 is a so-called access node 10 owned and/or operated by
`the operator of the telecommunication network. The
`access node 10 may be an integrated part of the exchange
`9 or a separate unit connected to the exchange 9. The
`access node 10 provides a connection to other
`communications networks, such as the networks of other
`operators, or the Internet and/or MAN or similar
`communications network, as is shown by outgoing line 11
`in Figure 1.
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Bright House Networks - Ex. 1015, Page 13
`
`

`
`wo 98/54913
`
`PCT/FI98/00440
`
`12
`
`Further details of the access node 10 can be obtained
`from W097/50230 corresponding to US patent application
`titled "Telecommunications Switch including an
`
`5
`
`Integrated Internet Access Server" filed 24 June 1996
`
`and assigned to Telefonaktiebolaget L M Ericsson/ the
`contents of which is incorporated herein by reference.
`
`10
`
`In this example a special WWW server 12 is connected to
`the access node 10 and is owned or operated by the
`operator of the telecommunication network. However/ the
`WWW server 12 may also be located elsewhere/ e.g. at the
`local exchange or closely adjacent thereto.
`Furthermore/ a centralised WWW server can also be used 1
`15 wherein user terminals outside various local exchanges
`can be connected to the centralised WWW server. The
`centralised WWW server may even be located outside the
`particular network concerned or outside another network.
`
`20
`
`25
`
`30
`
`The connection from the terminal 1 to the server 12 may
`utilise PPP (Point to Point Protocol) or SLIP (Serial
`Line Internet Protocol) or similar protocol. The
`connection from the terminal 1 to the telephone exchange
`9 may for instance be an ISDN or POTS line/ a wireless
`connection/ such as a digital GSM connection (Global
`System for Mobile communications) 1 or an analogue NMT
`(Nordic Mobile Telephone) connection or similar.
`It is
`also possible/ but not necessary/ to control the call by
`means of an intelligent network arrangement (IN). The
`WWW server 12 may also use the IN as a database. The
`connection between the user terminal 1 and the WWW
`server 12 is made secure in a manner which will be
`described in more detail below.
`
`35
`
`The server 12 implements a set of so-called web pages or
`documents 1 which can be accompanied with CGI scripts
`
`Bright House Networks - Ex. 1015, Page 14
`
`

`
`wo 98/54913
`
`PCT /FI98/00440
`
`13
`
`(Computer Graphics Interface), Java™ applets and other
`possible tools. The web pages provide the subscriber
`with a possibility to receive information about
`different features and/or services, and to control and
`5 manage them in an appropriate manner, such as to
`activate or deactivate them or to call for a new service
`or to delete an existing service. The inquiry, request,
`etc., messages can, for example, be sent in the form of
`http messages (hyper text transfer protocol) . The
`server 12 includes a database 13 including all
`subscriber related records and individual web pages for
`each subscriber.
`
`10
`
`Figure 1 shows one exemplary web page 14, which is shown
`to the user through a graphical interface or a display
`of the user terminal 1. The page 14 includes icons 15
`which can be "clicked" by the user if he/she decides to
`
`access a feature which is beyond that particular icon.
`These web pages or documents in general are in the
`Internet environment called "hyperdocuments".
`
`15
`
`20
`
`25
`
`As has already been mentioned, a telephone subscriber is
`connected to the exchange 9 via a subscriber line 8.
`This line 8 may terminate at a local exchange or at a
`locally situated concentrator (multiplexer(cid:173)
`demultiplexer) and has associated with it a line
`identifier. This represents the telephone number of the
`subscriber (A-number). A subscriber's A-number is
`associated with the features which may be accessed,
`30 managed and controlled, using the WWW server 12. This
`association between the A-number and the features to be
`managed is used such that after having identified the
`user terminal on the basis of this characteristic the
`server 12 allows this particular user terminal access to
`the managing operations of the features. The
`arrangement is such that without this association it is
`
`35
`
`Bright House Networks - Ex. 1015, Page 15
`
`

`
`wo 98/54913
`
`PCT /FI98/00440
`
`14
`
`not possible to manage the user related features by the
`particular terminal 1.
`
`It is noted that as the operator knows the identity of
`the subscriber, the operator also has a record of the
`other telephone numbers and terminals of this subscriber
`in the same network. Thus it is possible that a set of
`telephone numbers or other characteristic features is
`associated with the same features to be managed (with
`e.g. one single managing document 6).
`It is also
`possible to extend this to mobile stations of the
`particular subscriber. However, different operators may
`have different policies and thus it is preferred that
`the subscriber is allowed to manage only the numbers of
`that specific operator through a single page.
`
`To provide a secure network connection between the
`subscriber and the server 12, it is necessary that the
`server 12 identifies the terminal 1 or group of
`terminals from which a request originates. One
`preferred way of accomplishing this is to implement the
`server 12 directly in the protocol stack terminating the
`PPP connection 3 from the terminal 1. This means that
`one version of the server software lS entirely reserved
`for a particular subscriber, i.e. in Figure 1 one
`version is reserved for each terminal 1. As explained
`above, the server 12 knows at least one of the
`characteristics of the subscriber terminal, such as the
`A-number.
`
`Figure 2 discloses an alternative arrangement, according
`to which the access server 12 is positioned beyond a
`second network 16.
`In this, the connections from the
`terminal 1 to the telephone exchange 5 and the trunk
`line(s) between the various exchanges of the network
`correspond to those of Figure 1. However, the access
`node 17 in not a part of the telephone network, but is
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Bright House Networks - Ex. 1015, Page 16
`
`

`
`wo 98/54913
`
`PCT /FI98/00440
`
`15
`
`connected thereto by a connection 18. From the access
`node 17 the connection to the server 12 is tunnelled
`through the second network 16. The connection 18 to the
`network 16 (e.g. Internet) and the connection 19 from
`the network 16 may be implemented by way of IP, so that
`the tunnelling protocol above the IP prevents the user's
`data from being visible to the other users of the
`network, prevents other users of the network from
`sending data to the WWW server 12, and transmits the
`characteristics of the subscriber to the WWW server 12.
`
`Figure 3 discloses an example of one possible page 14 to
`be displayed to the user on request. This page 14 lS
`used for managing call forwarding operations. The
`features to be managed by the user are call forwarding
`"on" and "off" and the time and other settings for the
`call forwarding and so on, as is evident from the
`Figure. By clicking "modify", a further page becomes
`visible which may include various other alternatives,
`and even links to further pages.
`
`Figure 4 illustrates schematically the operational
`principles of the preferred embodiment of the invention.
`As is shown, the A-number information lS passed to the
`server 12 as an input. The server 12 is isolated from
`the surrounding communications networks (e.g. Internet
`such that the A-number is the sole input which can be
`given to it. Only after having identified the A-number
`does the server 12 send as a response the main page of
`the hyperdocument to the display of the terminal, such
`as a PC, through the PPP connection and the transfer
`line, such as ISDN or POTS, as is indicated by the
`arrows. As the connection between the server 12 and the
`terminal 1 is "closed" and it can only be established by
`the server 12, it is possible to provide a secure
`response connection for the management of the various
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Bright House Networks - Ex. 1015, Page 17
`
`

`
`wo 98/54913
`
`PCT /FI98/00440
`
`16
`
`In other words, a "closed
`subscriber related features.
`management circuit" becomes established.
`As explained above, the PPP termination can take place
`either in the local exchange or alternatively in a
`centralised server with the help of some tunnelling
`protocol.
`If the PPP is terminated at the centralised
`server, the IP packets carried by the PPP are not
`allowed to access any of the IP networks, i.e. outside
`e.g.
`the ISDN/POTS line, and thus the particular
`instance of the centralised server can interact with
`only one particular PPP connection. This means that one
`instance of the server software is now entirely reserved
`for one subscriber.
`
`The server may be provided with knowledge of the
`telephone number(s) of the subscriber for the
`identification and authorisation purposes in the form of
`a table. Standard tunnelling protocols, such as L2TP
`(Layer 2 Tunnelling Protocol) of IETF, convey this A-
`number information, and thus the server, such as the WWW
`server 12, can terminate the tunnel, extract the
`telephone number information, start a new version of the
`web server

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket