throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2001/0026548A1
`Strathmeyer et al.
`(43) Pub. Date:
`Oct. 4, 2001
`
`US 2001 0026548A1
`
`(54) APPARATUS AND METHOD FOR
`COMPUTER CONTROLLED CALL
`PROCESSINGAPPLICATIONS IN PACKET
`SWITCHED TELEPHONE NETWORKS
`
`(76)
`
`(21)
`(22)
`
`(63)
`
`Inventors: Carl R. Strathmeyer, Reading, MA
`(US); Donald Finnie, Reading (GB)
`Correspondence Address:
`KAPLAN & GILMAN, L.L.P.
`90ONROUTE 9 NORTH
`WOODBRIDGE, NJ 07095 (US)
`Appl. No.:
`09/805,501
`
`Filed:
`
`Mar. 13, 2001
`Related U.S. Application Data
`Continuation-in-part of application No. 08/955,834,
`filed on Oct. 21, 1997, now Pat. No. 6,201,805.
`
`Publication Classification
`
`(51) Int. Cl." ........................... H04L 12/66; HO4L 12/28
`(52) U.S. Cl. ............................................ 370/356; 370/401
`
`(57)
`
`ABSTRACT
`
`A method is presented comprising transmitting, from an
`application computer communicably connected to a call
`controller which is connected to a data network, packetized
`messages indicative of telephone calls in progreSS at an
`endpoint of the data network, or indicative of Such endpoint,
`and transmitting, from the call controller to the application
`computer, packetized messages indicative of a variety of
`information contained in, or relevant to, the telephone calls
`So as to process Such information for a variety of applica
`tions. Apparatus to implement the method is also presented.
`
`101
`
`
`
`EXTERNAL APPLICATION
`SYSTEM ENVIRONMENT
`
`ZONE OF H.323 OREQUIVALENT
`PACKETTELEPHONE SYSTEM
`
`r
`
`'s
`
`GATEKEEPEROR
`EQUINALENT
`IMPLEMENTATION
`
`f
`
`f
`
`EXTERNAL
`APPLICATION
`SYSTEMS
`104
`
`^ PAHOF PROPOSED's
`CT MESSAGEFLOW
`-
`
`-
`
`PROPOSED NEW CT
`MESSAGECAPABILITY OF
`GATEKEEPER IMPLEMENTATION
`
`g
`PONT OF INTERCONNECTION
`NAPPLICATIONSYSTEM OR
`NETWORKOF APPLICATIONSYSTEMS
`
`IPR2018-00884
`Apple Inc. EX1006 Page 1
`
`

`

`Patent Application Publication
`
`Oct. 4, 2001 Sheet 1 of 5
`
`US 2001/0026548A1
`
`
`
`' | '0||
`
`IPR2018-00884
`Apple Inc. EX1006 Page 2
`
`

`

`Patent Application Publication
`
`Oct. 4, 2001 Sheet 2 of 5
`
`US 2001/0026548A1
`
`JIŽNDIMONIQENNOOTW)
`
`
`
`
`
`IPR2018-00884
`Apple Inc. EX1006 Page 3
`
`

`

`mP
`
`.m
`
`n.m
`
`m
`
`2
`
`5
`
`US 2001/0026548 A1
`
`n.
`
`
`
`
`3233353525m_$22205;ozfiogésmgswgaiggz..
`
`222szmozwézs1w2220:;Czamazmamazes;225528_25ngA22%;”
`
`
`
`m$me
`Mam(\ygm(x;gm.(\\(gm
`
`gmmmzonfifzogz558:5;ng
`
`
`
`4.,8m:33BE;wosfiwzoamifimE22525
`
`
`
`
`
`M538535szNzgzoazézzsjs
`s.mzgzoazazazis
`
`<ma:
`
`0%ENEwzzaao
`
`,zo:<oaz_02852;:5
`
`
`22205202852:.25
`
`|PR2018-00884
`
`Apple Inc. EX1006 Page 4
`
`IPR2018-00884
`Apple Inc. EX1006 Page 4
`
`
`

`

`aP
`
`.m
`
`0
`
`0
`
`h
`
`5M4
`
`US 2001/0026548 A1
`
`mm.0:
`
`
`
`m§20555;$2522:5
`
`m29335253:
`m.\\\\\A\\VmEDGE155%NamL;)\9%M2229:“:
`
`
`22952352202252528
`t23%225nggags:25“?m.EEEE
`
`a"OEEEEE
`4_
`m,zgzoazngzgjs
`
`wNEZEBIQEE
`
`mZgzuazsmzzass
`
`
`
`am22557:$2525:5
`
`|PR2018-00884
`
`Apple Inc. EX1006 Page 5
`
`IPR2018-00884
`Apple Inc. EX1006 Page 5
`
`
`

`

`Patent Application Publication
`
`Oct. 4, 2001 Sheet 5 of 5
`
`US 2001/0026548A1
`
`
`
`s
`
`IPR2018-00884
`Apple Inc. EX1006 Page 6
`
`

`

`US 2001/0026548A1
`
`Oct. 4, 2001
`
`APPARATUS AND METHOD FOR COMPUTER
`CONTROLLED CALL PROCESSING
`APPLICATIONS IN PACKET SWITCHED
`TELEPHONE NETWORKS
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`0001. This application is a continuation-in-part applica
`tion of U.S. patent application Ser. No. 08/955,834, filed on
`Oct. 21, 1997.
`
`TECHNICAL FIELD
`0002 This invention relates to computer telephone inte
`gration (CTI) and, more specifically, to an improved method
`and apparatus for utilizing CTI techniques to proceSS tele
`phone calls using various applications in a packet Switched
`telephone network.
`
`BACKGROUND OF THE INVENTION
`0.003 Telephony over packet networks, particularly over
`wide area networkS Such as the Internet, has received
`considerable attention in recent months. Specifically, Scien
`tists have begun exploring the possibility of Sending voice
`and Video information Streams over packet Switched data
`networks. The transmission of Such information Streams
`over packet Switched networks can be more cost efficient
`than traditional telephony, which requires a dedicated circuit
`between the calling and called party.
`0004 Computer telephone integration has been widely
`applied to traditional telephony methods and apparatus, but
`has not as yet been Successfully applied to the methods and
`apparatus used for packet network telephony. This invention
`Specifies novel apparatus and methods, Supplementary to
`known packet network telephony apparatus and methods,
`which enable CTI capabilities in such an environment, and
`use them to proceSS telephone calls.
`0005 One possible set of methods and apparatus for
`completing calls over a packet Switched network, which
`calls can handle Voice and other information Streams, is
`defined by ITU recommendation H.323. The H.323 standard
`is available from the International Telecommunication
`Union, of Geneva, Switzerland, and is hereby incorporated
`herein by this reference. The H.323 standard defines various
`protocols dealing with call control, call Setup, call termina
`tion, and other Similar techniques known to those in the
`packet network telephony art.
`0006. The H.323 standard defines a functional entity
`called a gatekeeper. The gatekeeper handles network func
`tions Such as bandwidth control, Zone management, address
`translation, and admissions control for a designated Set of
`network terminals. While all these functions are further
`defined in the previously incorporated Standard, we set forth
`two examples below.
`0007 Bandwidth control provides a protocol by which
`the gatekeeper allocates a particular amount of network
`bandwidth to a particular connection. The gatekeeper can be
`contacted by either the calling or called party in order to
`change the amount of bandwidth allocated to a particular
`call.
`0008. As another example, the gatekeeper performs Zone
`management. This function, as further defined in the H.323
`
`Standard, provides a mechanism for allocating Sets of dif
`ferent terminals and other nodes in the network to a par
`ticular gateway. The H.323 Standard provides a mechanism
`for dynamically altering the allocation of different network
`nodes to different gatekeeperS.
`0009. The gatekeeper function provides services analo
`gous to the call processing function within a private branch
`exchange (PBX) in conventional telephony. In traditional
`telephony, CTI features are provided by creating an interface
`between external application Software and the call process
`ing function within the PBX. By contrast, in the known
`packet network telephony art, interfaces to the gatekeeper
`are only defined from other gatekeepers, end points, and
`other network entities.
`
`SUMMARY OF THE INVENTION
`0010. The above and other problems of the prior art are
`overcome and a technical advance is achieved in accordance
`with the present invention which relates to a packet network
`telephony call controller (e.g., an H.323 gatekeeper) which
`is arranged to interface with a plurality of external call
`processing applications programs which may be located on
`one or more remote computers. In accordance with the
`teachings of the present invention, a call processing appli
`cation computer is connected to a call controller computer,
`via a data network or otherwise, and these two entities
`eXchange messages in the manner Specified by the invention.
`The call controller computer may be located with one of the
`terminals or may be located on a separate computer.
`0011 AS well, the processing application computer may
`be located with the call controller computer, or remote from
`it.
`0012. The call controller computer and applications com
`puter(s) communicate with one another in order to perform
`various call control and other call processing application
`functions over the data network and to provide call infor
`mation and control to a user of the applications computer. AS
`packet Switched telephone connections are Set up between
`various terminals or other nodes, the call controller com
`municates with one or more application computers in order
`to provide the call information and call control functions
`required by the computer telephony applications residing on
`the application computers. Examples of these functions
`include establishing and tearing down calls, transferring
`calls, call conferencing, asSociating the applications com
`puter with one or more specific end points in the call
`controller Zone for monitoring and control, determining the
`State of calls at a given endpoint, determining the length of
`calls in progreSS at a given endpoint, determining the words
`eXchanged in calls in progreSS at a given endpoint, deter
`mining the originating IP address of calls in progreSS at a
`given endpoint, routing unanswered new calls terminating at
`a given endpoint to another to another endpoint, and various
`other functions.
`0013 For illustrative purposes, the invention will be
`described using Systems based upon the H.323 Standard as
`an example. It is understood that the invention is intended to
`cover any and all other protocols, now known or to be
`known in the art, which address packet telephony, Such as,
`for example, ITU H.248, also known as MEGACO, Session
`Initiation Protocol (“SIP”), and Media Gateway Control
`Protocl (“MGCP”). These protocols describe equivalent
`
`IPR2018-00884
`Apple Inc. EX1006 Page 7
`
`

`

`US 2001/0026548A1
`
`Oct. 4, 2001
`
`modules which are responsible for call Setup, and are thus
`functionally equivalent, within the context of the invention,
`to the gatekeeper of H.323. The names of these modules, of
`course, vary with the given protocol. For example, in SIP the
`gatekeeper functionality is accomplished by what is termed
`a “proxy”, in MEGACO by a “Media Gateway Controller”,
`and in MGCP by a “softswitch.” Like the Shakespearean
`rose, a gatekeeper by any other name is just as Sweet.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`0.014
`FIG. 1 shows a conceptual overview of an exem
`plary embodiment of the present invention as incorporated
`into a packet network telephony System;
`0.015
`FIG. 2 shows exemplary message flow between
`System elements during the establishment of an inbound call
`that is detected by an external Software application using the
`packet network telephony System as enhanced and extended
`by the present invention; and
`0016 FIG. 3 shows an exemplary message flow diagram
`utilizing the invention to establish an outbound call
`requested by an external Software application in a similar
`environment.
`0017 FIG. 4 shows exemplary connections between the
`gatekeeper computer and processing application computers
`controlling the gatekeeper computer.
`
`DETAIL DESCRIPTION OF THE PREFERRED
`EMBODIMENT
`FIG. 1 illustrates an overview of the interconnec
`0.018
`tion of the gatekeeper computer 102 with the applications
`computer 103 according to the teachings of the present
`invention. To enable Such interconnection, gatekeeper com
`puter 102 is enhanced and extended by the addition of
`Software whose functions are described below. Communi
`cations path 105 may be any type of data communications
`path.
`0019. The arrangement of FIG. 1 includes several exter
`nal telephony applications Systems 104, typically imple
`mented as Software, which may be located on applications
`computer 103 or on Separate computers connected via any
`communications network to applications computer 103.
`Typically, the applications computer may be collocated with
`one of the end points described below.
`0020. The arrangement of FIG. 1 also includes end
`points 106, which may be personal computers, network
`computer devices (NCS), or any other node capable of
`interconnection to the packet network telephony environ
`ment.
`0021. In operation, a command is issued from an appli
`cations computer 103 requesting certain telephony Services
`which will be described below. The message requesting Such
`a Service is transmitted through path 105 to gatekeeper
`computer 102 for processing. The message Sent to gate
`keeper 102 causes gatekeeper 102 to exchange appropriate
`Signaling messages with other packet network telephony
`environment nodes in a manner as described, for example, in
`the incorporated H.323 Standard. As a result of this sequence
`of events, the combined System is able to implement the call
`processing functionality requested by applications computer
`103 on behalf of applications 104.
`
`0022. During operation, various call control functions
`requested by applications computer 103 are performed by
`the gatekeeper 102. Additionally, by making appropriate
`requests of gatekeeper 102, applications computer 103 may
`monitor the outcome of various call control functions and
`transmit Such outcome to any of applications 104.
`0023 FIG. 2 shows an exemplary message flow diagram
`for detecting an inbound call from a remote end point to a
`local end point Supervised by an external computer tele
`phony application using the present invention. The Specific
`example shown in FIG. 2 is the monitoring of an incoming
`call to end point 202 using packet network telephony
`methods and apparatus as described in the H.323 Standard,
`enhanced by the present invention to permit the participation
`of an external Software application 201. End points 202 and
`204 represent audio terminals, for example, computer Sys
`tems equipped as H.323 compliant telephone devices. Gate
`keeper 203 is as described, for example, in the H.323
`Standard and as further enhanced by the present invention,
`and the external application 201 may be present on a
`Separate computer as previously discussed.
`0024.
`In operation, the call initially proceeds according to
`the methods of the packet network telephony environment.
`Abandwidth request message 205 is sent to gatekeeper 203
`and bandwidth is granted by the gatekeeper at message 206.
`A call Setup request, message 207, is issued by the initiating
`end point 204, and gatekeeper 203 causes call Setup request
`message 208 to be transmitted to receiving end point 202. A
`call proceeding message 209 is transmitted by the receiving
`end point back to gatekeeper 203 and relayed to initiating
`end point 210 as shown.
`0025. At approximately the same time gatekeeper 203
`relays the call proceeding indication to the initiating end
`point using message 210, gatekeeper 203 also transmits to
`external application 201 a notification that an inbound call is
`being received by the receiving end point 202. Gatekeeper
`203 sends this message because external application 201 has
`previously indicated that it requires notification of telephony
`events occurring at receiving end point 202.
`0026. In order to connect the inbound call, receiving end
`point 202 requires network bandwidth, and such bandwidth
`is requested from and allocated by the gatekeeper 203 using
`messages 212 and 213. Next, the terminal at monitored end
`point 202 rings to alert the user to the arriving call, and an
`indication of Such ringing is transmitted through messages
`214 and 215 to initiating end point 204 through the gate
`keeper 203. When the call is connected at the receiving end
`point 202 because of user action, end point 202 informs
`gatekeeper 203 via message 216.
`0027. At this point, gatekeeper 203 sends an answer
`notification to the external application 201 via message 217.
`0028. At approximately the same time, gatekeeper 203
`indicates to the initiating end point 204 that the requested
`call has been connected via message 218.
`0029. In accordance with the protocol described herein
`before, the detection of the call by an external application is
`accomplished via a protocol of messages transmitted
`between the gatekeeper and the end points to be connected,
`as well as between the gatekeeper 203 and the external
`application 201, thus enabling gatekeeper 203 to inform
`
`IPR2018-00884
`Apple Inc. EX1006 Page 8
`
`

`

`US 2001/0026548A1
`
`Oct. 4, 2001
`
`external application 201 regarding the progreSS of relevant
`calls in the packet telephony network.
`0030 FIGS. 3A and 3B show another example of an
`external call processing application requesting the establish
`ment of an outbound call from initiating end point 386 to
`receiving end point 390. Many of the messages involved in
`this operation are Substantially similar to those previously
`set forth with respect to the monitoring of the inbound call
`described in FIG.2. New messages not previously discussed
`in FIG. 2 are described below. As with the discussion of
`FIG. 2, the external application 392 in FIGS. 3A and 3B is
`assumed to have previously communicated with gatekeeper
`388 in accordance with other methods described by this
`invention to indicate its intention to issue call control
`requests with respect to initiating end point 386.
`0031. In FIGS. 3A and 3B, gatekeeper 388 also includes
`the conference control point function as currently known to
`the packet network telephony art. This function is used by
`the invention to interconnect two call Segments, namely the
`Segment between the initiating end point 386 and the con
`ference control point; and between the conference control
`point and the receiving end point 390. The invention con
`nects the call in two stages in order to overcome certain
`limitations of the known packet network telephony art. For
`clarity of description, the combined gatekeeper and confer
`ence control point apparatus is referred to as a gatekeeper
`388.
`0.032 The sequence of messages begins with a new
`message 301, specified by the current invention, through
`which the external application 392 makes a request that the
`first segment of the call be established from gatekeeper 388
`to initiating end point 386.
`0.033
`Next, according to known packet network tele
`phony art, messages 302 and 303 are exchanged between
`gatekeeper and initiating end point 386 in order to Set up that
`first leg of the call.
`0034) Next, the gatekeeper 388 sends a new message 304
`to external application 392 to alert it that the call request has
`been received and is being processed. Much of the remain
`ing Signaling, relating to the establishment of that Segment
`of the call between initiating end point 386 and gatekeeper
`388 in FIGS. 3a and 3b, is substantially similar to that
`previously described with respect to FIG.2 and thus will not
`be repeated. Similarly, once the first leg of the call has been
`Set up, gatekeeper 388 proceeds in Similar fashion to Set up
`the Second leg of the call from itself to receiving end point
`390.
`0035). However, during the process depicted in FIGS. 3A
`and 3B gatekeeper 388 sends new messages to the external
`application 392 at relevant Stages of call processing, includ
`Ing:
`
`0036 1. Message 305 indicating that initiating end
`point 386 has acquired the necessary network band
`width to place the call;
`0037 2. Message 306 indicating that receiving end
`point 390 is processing the request for the call;
`0038. 3. Message 310 indicating that receiving end
`point 390 is alerting its user to the arriving call; and
`0039 4. Message 312 indicating that receiving end
`point 390 has answered the call and a connection has
`been established.
`
`0040 FIG. 4 shows various possible connections for the
`gatekeeper computer-processing application computer link.
`A gatekeeper computer 410 facilitates calls between the
`various H323 or equivalent endpoints 406. As an example,
`these endpoints can be connected to telephones 420 via
`PSTNS 421. Alternatively, the endpoints can be connected to
`other computers or devices, such as PBXs 481, which then
`interface to, as an example, cellular networks 480.
`0041) The processing application computers (AC) 430
`are connected to the gatekeeper computer (GK) 410 in a
`variety of ways, Some of which are shown as examples in
`FIG. 4. The gatekeeper computer Sets up and controls call
`sessions between the various H.323 or equivalent endpoints
`406.
`0042. One or more ACS 430 can be connected to the GK
`410 via a LAN 473, a generic data network 472, or via
`interprocess Software communication 471, where both the
`GK and AC are Software modules on the same physical
`computing device, shown via the dotted line box 490 drawn
`around these components connected via the interprocess
`Software communication 471.
`0043 Alternatively, the AC 4301 and GK 410 can be
`themselves connected via the Internet 450, or other com
`puter communications network. Or, the GK 410 could write
`to a file, stored, and then itself transmitted to an AC 430, via
`a variety of data transmission channels, as described above,
`or as is otherwise known in the art.
`0044) The ACS 430, communicating with the GK in an
`analogous fashion as described above, can implement, via a
`variety of applications programs, applications and Services
`Such as Voice recognition of the words exchanged in the call,
`rerouting the call if unanswered after a determined number
`of rings, measurement of the length of the call, and Storing
`the word content of calls as determined by the above
`described Voice recognizer and writing Such content to a file
`for analysis by another program, to list a few. AS described
`above these applications are usually implemented in Soft
`ware, but could be implemented, wholly or partially, in
`dedicated hardware as well, especially in complex applica
`tions requiring a lot of processing.
`004.5 The method of the invention relates to software
`functional modules, and holds constant no matter what the
`physical arrangement of those modules might be. For
`example, two modules as described above (for example, the
`Application Computer and the Gatekeeper) might reside on
`Separate computing Systems or may reside on a common
`System; they nonetheless remain Separate modules and com
`municate with each other in a similar fashion. Thus, the
`invention is intended to include any Such rearrangement of
`Software modules on a convenient Set of computing Systems.
`0046) The communication methods described above are
`as well intended to includea wide variety of possible imple
`mentations. Thus, for example, two modules residing in a
`common computing System will eXchange messages, but
`may not do So over a physical “data network” in the Sense
`of Signals travelling over external wires.
`0047 There are various methods by which an application
`(running on the application System) actually requests the
`services available over the CSTA-like link (CSTA being the
`standard abbreviation for Computer Supported Telecommu
`nication Applications). One common method is to provide a
`
`IPR2018-00884
`Apple Inc. EX1006 Page 9
`
`

`

`US 2001/0026548A1
`
`Oct. 4, 2001
`
`Standard Software library on the application machine that
`offers a telephony Application Programming Interface
`(“API”) to the application program. Within the context of the
`invention, this API can be any API that includes call-control
`functions. Two such APIs known to the industry are, for
`example, Microsoft's TAPI (“Telephony API”) and Sun's
`JTAPI (“Java Telephony API”). The APIs are used to pro
`vide convenient access by the application program to the
`services delivered by the invention.
`0.048. There are many possible applications that could
`make use of the capabilities of the invention. These appli
`cations are well known and for the sake of brevity will not
`be exhaustively described herein. Some of the more likely
`applications are the following:
`0049 Call Routing. When a request to handle an incom
`ing call is presented to the call controller (or "gatekeeper” in
`H.323 parlance), the gatekeeper sends a message to the
`application requesting routing instructions. The application
`uses any convenient busineSS logic to decide how the call
`should be routed, and responds to the gatekeeper with
`appropriate instructions. The gatekeeper then routes the call
`to a destination based on those instructions. Several
`examples of Such busineSS logic would include, as examples,
`follow me Services, load balancing, skill based routing,
`Screen pop, universal queueing and unified messaging, each
`of which is summarily described in what follows.
`0050. Follow-me services. A telephone subscriber leaves
`forwarding instructions with the application Specifying the
`telephone endpoint or series of endpoints to which calls
`should be forwarded, and optionally Some rules that govern
`that forwarding. For example, “calls arriving between cer
`tain times of day should be forwarded to this number”; or “I
`am in my car now, Send all calls to my cell phone', or
`“Forward all calls to my voicemail except calls from my
`boss and my children”.
`0051 Load balancing. When a call is made to an enter
`prise and it is determined that any of Several individuals,
`offices or work groups could handle Such a call (for example,
`a call to a customer Service number), the application can
`choose which individual, work group or office should
`receive te call based on its assessment of the current work
`load at each potential destination.
`0.052
`Skill-based routing. When a call is made to an
`enterprise and it is determined that any of Several individu
`als, offices or work groups could handle Such a call (for
`example, a call to a customer Service number), the applica
`tion can choose which individual, work group or office
`should receive the call based on its assessment of the
`capabilities required by the caller (for example, knowledge
`of a particular product or account type, or ability to Speak a
`certain language).
`0.053 Screen pop. When a call is directed to a particular
`endpoint, the gatekeeper Simultaneously alerts the applica
`tion So that the application can retrieve business information
`corresponding to the call (for example, customer or account
`information) and display it for the user at that endpoint.
`0.054
`Universal Queueing. When an application manages
`multiple forms of communications for a user (for example,
`traditional or packet telephone calls, electronic mail mes
`Sages, facsimile documents, communication requests from
`parties viewing web pages, text chat Sessions) by Sequencing
`
`those communications So that they are Served in an equitable
`and/or efficient fashion, that application can use the inven
`tion to acquire the necessary information about packet
`telephony calls and to direct the holding and release of Such
`calls as may be required to implement the desired Sequenc
`Ing.
`0055 Unified Messaging. When an application manages
`multiple forms of Store-and-forward communications for a
`user (for example, electronic mail messages, voice mail
`messages, facsimile documents) by Storing these communi
`cations, presenting an inventory of those communications to
`the user, and presenting Specific Selected messages to the
`user as directed by that user, that application can use the
`invention to create packet telephony connections between
`the message repository and the user for the purposes of
`presenting Said inventory to the user, allowing the user to
`give Said direction, and presenting the Selected messages.
`0056. The above describes the preferred embodiments of
`the invention. It will be appreciated however that various
`other modifications or additions will be apparent to those of
`ordinary skill in the art.
`
`What is claimed is:
`1. A method comprising:
`transmitting, from an application computer connected to
`a data network to a gatekeeper connected to Said data
`network, over Said data network, packetized messages
`indicative of telephone calls in progreSS at an endpoint
`of Said data network, or indicative of Said endpoint,
`Said application computer being located Separately
`from Said endpoint, and
`transmitting, from Said gatekeeper to Said application
`computer over Said data network, packetized messages
`indicative of the length of Said telephone calls.
`2. A method comprising:
`transmitting, from an application computer connected to
`a data network to a gatekeeper connected to Said data
`network, over Said data network, packetized messages
`indicative of a telephone call or calls in progreSS at an
`endpoint of Said data network, or indicative of Said
`endpoint, Said application computer being located Sepa
`rately from Said endpoint; and
`transmitting, from Said gatekeeper to Said application
`computer over Said data network, packetized messages
`indicative of the information associated with, or rel
`evant to, Said telephone calls.
`3. The method of claim 2, where the information includes
`the originating IP address of the call.
`4. The method of claim 2, where the information includes
`the words exchanged by parties in the call.
`5. A method comprising:
`transmitting, from an application computer communica
`bly connected to a gatekeeper which is connected to a
`data network, packetized messages indicative of tele
`phone calls in progreSS at an endpoint of Said data
`network, or indicative of Said endpoint, and
`transmitting, from Said gatekeeper to Said application
`computer, packetized messages indicative of the infor
`mation associated with or contained in Said telephone
`calls.
`
`IPR2018-00884
`Apple Inc. EX1006 Page 10
`
`

`

`US 2001/0026548A1
`
`Oct. 4, 2001
`
`6. A method comprising:
`transmitting, from an application computer connected to
`a data network to a call controller connected to Said
`data network, over Said data network, packetized mes
`Sages indicative of telephone calls in progreSS at an
`endpoint of Said data network, or indicative of Said
`endpoint, Said application computer being located Sepa
`rately from Said endpoint; and
`transmitting, from Said call controller to Said application
`computer over Said data network, packetized messages
`indicative of the length of Said telephone calls.
`7. A method comprising:
`transmitting, from an application computer connected to
`a data network to a call controller connected to Said
`data network, over Said data network, packetized mes
`Sages indicative of telephone calls in progreSS at an
`endpoint of Said data network, or indicative of Said
`endpoint, Said application computer being located Sepa
`rately from Said endpoint; and
`transmitting, from Said call controller to Said application
`computer over Said data network, packetized messages
`indicative of the information associated with or con
`tained in Said telephone calls.
`8. The method of claim 7, where the information includes
`the originating IP address of the call.
`9. The method of claim 7, where the information includes
`the words exchanged in the call.
`10. A method comprising:
`transmitting, from an application computer communica
`bly connected to a call controller which is connected to
`a data network, packetized messages indicative of
`
`telephone calls in progreSS at an endpoint of Said data
`network, or indicative of Said endpoint, and
`transmitting, from Said call controller to Said application
`computer, packetized messages indicative of the infor
`mation contained in, or associated with, Said telephone
`calls.
`11. An article comprising a computer readable medium
`having instructions Stored thereon which when executed
`CSCS
`transmission of, from an application computer communi
`cably connected to a call controller which is connected
`to a data network, packetized messages indicative of
`telephone calls in progreSS at an endpoint of Said data
`network, or indicative of Said endpoint, and
`transmission of, from Said call controller to Said applica
`tion computer, packetized messages indicative of the
`information contained in, or associated with, Said tele
`phone calls.
`12. Apparatus comprising:
`a call controller, able to allocate resources in a data
`network,
`at least two endpoints in Said data network between which
`packetized telephone calls can take place; and
`an application computer, communicably connected to Said
`call controller, capable of issuing instructions to, and
`receiving information from, Said call controller, indica
`tive of information contained in and relating to said
`packetized telephone calls or relating to Said endpoints.
`
`IPR2018-00884
`Apple Inc. EX1006 Page 11
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket