throbber
(12) United States Patent
`L0veland
`
`USOO67824-13B1
`(10) Patent No.:
`US 6,782,413 B1
`(45) Date of Patent:
`Aug. 24, 2004
`
`(54) DISTRIBUTED CONFERENCE BRIDGE
`
`(75) Inventor: ty D. Loveland, Redmond, WA
`
`(73) Assignee: Microsoft Corporation, Redmond, WA
`(US)
`
`(*) Notice:
`
`7
`
`(56)
`
`References Cited
`
`6,457.043 B1 * 9/2002 Kwak et al. ................ 709/204
`6,501,740 B1 12/2002 Sun et al. ................... 370/261
`OTHER PUBLICATIONS
`General Magic Corporate Site. PORTICO: Portico Features
`and Overview web page 1999; http://www.generalmagic.
`com/portico/portico Overview.shtml. Accessed Oct. 5,
`-
`1999).
`Subject to any disclaimer, the term of this
`General Magic. PORTICO: Frequently Asked Questions.
`patent is extended or adjusted under 35
`web page 1999; http://www.generalmagic.com/portico/
`U.S.C. 154(b) by 0 days.
`portico fad.shtml. Access Oct. 5, 1999).
`(21) Appl. No.: 09/502,849
`* cited by examiner
`22) Filled
`Feb. 11, 2000
`Primary Examiner-Gl
`B. Burg
`CC
`eD. ,
`findir Examiner-Genton B. BurgeSS
`Assistant Examiner Kimberly Flynn
`8. O'70". (74) Attorney, Agent, or Firm-Leydig, Voit & Mayer, Ltd.
`(58) Field of Search ................................. 709/204, 205,
`(57)
`ABSTRACT
`709/206, 207, 232; 379/202, 203, 204,
`93.21, 120; 370/265, 266 A System is disclosed for enabling communication between
`Server resources and a wide spectrum of end-terminals to
`enable users access to the resources of both converged and
`non-converged networkS via Voice and/or electronically
`U.S. PATENT DOCUMENTS
`generated commands.
`5. A : E. yers alm,..., A configurable distributed conference bridge is incorporated
`5,825.858 A * 10/1998 Shaffer et al. .............. 379/120
`within the converged network architecture model of the
`5,982,870 A * 11/1999 Pershan et al. ............. 379/221
`present invention. The distributed conference bridge enables
`6,005,870 A * 12/1999 Leung et al. ............... 370/466
`local conference resources to be utilized and incorporates
`6,100,882 A
`8/2000 Sharman et al. ............ 345/320
`external Service bureau conference bridge resources when
`6,236,644 B1
`5/2001 Shuman et al. ............. 370/261
`needed to Supplement the internal conference bridge
`6,272.214 B1 * 8/2001 Jonsson ...................... 379/202
`CSOUCCS of System.
`6,339.784 B1 * 1/2002 Morris et al. ............... 709/204
`6,424.994 B1 * 7/2002 Pirich et al. ................ 709/205
`6,448,978 B1 * 9/2002 Salvador et al. ............ 345/741
`
`17 Claims, 9 Drawing Sheets
`
`700
`
`114
`
`
`
`It
`Telephone
`
`Telephone Telephone
`
`Telephone
`
`Telephone
`
`CSCO-1017
`CISCO SYSTEMS, INC. / Page 1 of 23
`
`

`

`U.S. Patent
`
`Aug. 24, 2004
`
`Sheet 1 of 9
`
`US 6,782,413 B1
`
`20
`
`- A --4----
`COMPUTER
`
`rea
`
`47
`
`?
`
`(ROM)
`
`(RAM)
`
`eos
`
`a
`
`OPERATING is
`SYSTEM
`
`22
`
`24
`
`21
`
`48
`
`PROCESSING
`UN
`
`25
`
`VIDEO
`ADAPTER
`
`23
`
`53
`
`NETWORK
`INTERFACE
`
`62
`
`APPLICATION
`PROGRAM
`
`ge.
`
`OTHER
`PROGRAMS
`
`32
`
`37
`
`HARD DISK
`DRIVE
`INTERFACE
`
`PROGRAM
`DATA
`
`38
`
`33
`
`34
`
`46
`\
`51
`SERIAL
`MAGDISK OPTICAL DISK
`PORT ck
`drVE
`DRIVE
`INTERFACE
`INTERFACE INTERFACE
`
`RS
`Magnetic disk Optical drive
`drive
`
`
`
`60
`
`sea; 27
`g
`
`28
`
`30
`
`
`
`OPERATING
`SYSTEM
`
`APPLICATION
`PROGRAMS
`
`OTHER
`PROGRAMS
`
`PROGRAM
`DATA
`
`FIG. 1
`
`s
`
`CSCO-1017
`CISCO SYSTEMS, INC. / Page 2 of 23
`
`

`

`US 6,782,413 B1
`
`
` XL|youalu;LE—/-7||TO||||9¢||ia)flGu,||a|cel/9ZLfe|eyaayeasesFloor_—~—-|[ese'Cion|>8zl/or0t(“‘<é‘i‘ihé*iSOOUCURRO||—_1--_-——yLL][69]
`[o50860)[o]Obl
`
`aa10,|2ZLSrl|Sc|=|Gel|zy=|§1=|
`=——=|TT“)(oOoheS_/LoLo|Lovee|
`oeso|[rensoon)
`en||ae
`||||———===|/SHUNNVM|
`
`
`
`
`
`U.S. Patent
`
`Aug.24, 2004
`
`Sheet 2 of 9
`
`||||
`
`Ty
`
`*}LNOS!‘NLSd“6'3)
`
`Zbb
`
`c¢Old
`
`CSCO-1017
`CISCO SYSTEMS, INC. / Page 3 of 23
`
`CSCO-1017
`CISCO SYSTEMS, INC. / Page 3 of 23
`
`
`

`

`U.S. Patent
`
`Aug. 24, 2004
`
`Sheet 3 of 9
`
`US 6,782,413 B1
`
`Applications
`Fio. 4
`
`Applications
`Server
`
`186
`
`184
`
`Remote ACCess
`Server (RAS)
`Manager
`
`182
`
`Call Control APIs
`
`
`
`180
`
`Telephony
`Device
`Object
`
`194
`
`188
`
`199
`
`FIG. 3
`
`User Mod
`Se VOCe
`
`Kernel Mode
`
`
`
`Transport
`Driver
`
`172
`
`Network Device
`Interface and
`Telephony Driver
`
`198
`
`174
`
`160
`
`
`
`Network
`Interface
`
`116
`
`
`
`2
`O
`00
`4
`2
`202
`Personal
`Distributed
`IMR
`Conf. Bridge
`
`Network
`Interface
`
`162
`
`128
`
`O6
`2
`
`208
`
`FG. 4
`
`Call
`Instant
`Messaging Announcement
`e
`
`CSCO-1017
`CISCO SYSTEMS, INC. / Page 4 of 23
`
`

`

`U.S. Patent
`
`Aug. 24, 2004
`
`Sheet 4 of 9
`
`US 6,782,413 B1
`
`302 N T 304-306 N
`
`
`
`e.
`
`ERE
`
`PSTNTelephone
`
`IP Telephone
`
`
`
`Video Phone
`
`310-N
`
`see:
`
`Other
`
`Terminal Abstraction 320
`
`Rules Engine
`
`Exchange 1
`electronic
`Calendar
`
`350
`
`202
`
`terminal State
`
`USe
`State
`
`user defined
`options
`
`348
`
`
`
`342
`
`Configuration
`application
`
`configuration
`application
`
`346
`
`FIG. 5
`
`344
`
`CSCO-1017
`CISCO SYSTEMS, INC. / Page 5 of 23
`
`

`

`U.S. Patent
`
`Aug. 24, 2004
`
`Sheet 5 of 9
`
`US 6,782.413 B1
`
`400
`
`
`
`
`
`"Caller" attempts to
`contact a person who
`has Subscribed to MR
`402 N
`Call Answered?
`
`FIG. 6
`
`
`
`Yes
`
`"Call" proceeds
`
`
`
`
`
`No
`
`
`
`Rules for this caller
`
`Yes
`
`404
`
`
`
`No
`Determine features
`supported by caller's
`terminal
`
`408
`
`412
`
`414
`
`Present IMR menu of options
`appropriate for "caller" for
`Redistration
`Send e-mail to Send browser | Play or send
`Send instant
`Play voice
`menu to Voice Message to M e-mail terminal
`fenu to IP
`menu in other
`terfinal
`terminal
`terminal
`formats
`
`416
`
`
`
`410
`
`Cueue Caller
`
`Receive appropriate
`response from "caller"
`
`Process Rules
`and Formulate a
`Response --
`Leave
`Message
`
`Find Me
`
`Forward caller
`
`Other action
`
`End
`
`CSCO-1017
`CISCO SYSTEMS, INC. / Page 6 of 23
`
`

`

`U.S. Patent
`
`Aug. 24, 2004
`
`Sheet 6 of 9
`
`US 6,782,413 B1
`
`512
`
`s
`EEE
`Telephone
`
`522
`
`51 O
`
`Personal computer
`
`518
`
`e EE
`IP Phone
`
`520
`
`Application
`Servers
`
`524
`
`526
`
`oo
`
`Voice Print S-P
`DOrain
`Application
`1
`
`514
`
`EE
`E
`EEE
`Premise Telephone
`
`o
`
`516
`
`1.
`
`- 1
`1
`
`1.
`
`1. 1.
`
`540
`
`\
`\
`\
`\
`\
`
`532
`
`
`
`1.
`- 1
`
`534
`
`CSCO-1017
`CISCO SYSTEMS, INC. / Page 7 of 23
`
`

`

`U.S. Patent
`
`Aug. 24, 2004
`
`Sheet 7 of 9
`
`US 6,782,413 B1
`
`FIG. 8
`
`Receive Call From
`User
`
`600
`
`Route Request to
`Voice Print Application
`
`602
`
`issue User ID Prompt
`
`Receive User
`Identification
`
`604
`
`606
`
`elect a Challenge Query From
`Multiple Available Challenge?
`Response Pairs and issue
`Challence
`
`608
`
`Compare Received Response to
`Pre-stored Expected Response
`
`610
`
`
`
`
`
`612
`
`Voice Print Match?
`
`
`
`
`
`Reject User
`Authentication
`Request
`
`618
`
`614
`
`Logon User and Create
`Application Proxy
`(e.g., Terminal Server)
`
`616
`
`Carry Out User's
`Commands
`
`CSCO-1017
`CISCO SYSTEMS, INC. / Page 8 of 23
`
`

`

`U.S. Patent
`
`Aug. 24, 2004
`
`Sheet 8 of 9
`
`US 6,782,413 B1
`
`700
`
`114
`
`
`
`
`
`704
`
`702
`
`H.
`Telephone
`
`E.
`E.
`Telephone Telephone
`
`E.
`Telephone
`
`FIG. 9
`
`V
`\ \ y
`W
`V
`V
`V
`
`N
`M
`
`
`
`E VI
`EE
`V
`M
`Telephone h V
`E \ V
`Telephone
`is
`
`Telephone
`
`Telephone
`
`CSCO-1017
`CISCO SYSTEMS, INC. / Page 9 of 23
`
`

`

`U.S. Patent
`
`Aug. 24, 2004
`
`Sheet 9 of 9
`
`US 6,782,413 B1
`
`Configure Distributed
`Conference Bridge
`(set threshold for local bridge)
`
`800
`
`
`
`802
`
`
`
`
`
`Connect Participants To
`Local Conference Bridge
`Until Thresholds Met
`
`804
`
`
`
`
`
`806
`
`
`
`
`
`
`
`Establish Conference
`Connection BetWeen the
`LOCal and External
`Bridges
`
`
`
`issue Redirection Command
`Causing Subsequent
`Conference Paricipants to
`Connect to the External
`Conference Bridge
`
`
`
`FIG 10
`
`CSCO-1017
`CISCO SYSTEMS, INC. / Page 10 of 23
`
`

`

`1
`DISTRIBUTED CONFERENCE BRIDGE
`
`US 6,782,413 B1
`
`AREA OF THE INVENTION
`The present invention generally relates to the area of
`networks for providing telephony and data resources and
`more particularly to methods and mechanisms for providing
`access to networked resources via either voice or electronic
`data communications.
`
`15
`
`2
`One aspect of computer Systems accessed remotely via
`Voice commands is the implementation of Security mea
`Sures. Voice interfaces present the opportunity for users to
`connect to a network from Virtually any location. Presently,
`Security mechanisms for restricted acceSS Systems accessed
`via telephone typically rely upon users to enter a number on
`a touch-tone phone to limit access. However, this method is
`highly Susceptible to eavesdropping. Also, the users are
`often required to enter a long Sequence of numbers that can
`easily be forgotten. A Voice-controlled computer System will
`require Speech recognition functionality. Speech recognition
`programs and associated “training databases (used to train
`the Software to recognize voice commands from a user) do
`not guarantee that another user's Speech will not invoke
`protected operations on the computer System. Thus, if the
`computer System is to be Secure, then additional Speaker
`recognition/authentication procedures must be included in
`the System.
`The use of Speaker recognition/authentication processes
`to protect resources in a computer System is known. Such
`Systems have weaknesses that enable imposters to gain
`access to the computer System. The Simplest Voice authen
`tication Scheme requires a user to Speak a password, and the
`authentication System verifies the user by comparing the
`spoken password to an existing copy of the password. An
`obvious weakness to this authentication procedure is that the
`Security System cannot distinguish between whether the user
`is the Source of the Vocalized password or it is merely an
`electronically recorded copy of the user's voice.
`One solution to the well known “electronically-recorded”
`password Scheme is to request the user to utter the password
`multiple times. The multiple utterances, in addition to being
`compared to the digitally Stored vocal password at the
`computer System Site, are compared to one another to ensure
`that the utterances are sufficiently different from one another
`to ensure that a recording of the password is not being
`replayed multiple times by an imposter Seeking to gain
`remote access to protected computer resources. Of course,
`the imposter can circumvent this Safeguard by making
`multiple recordings of the password Spoken multiple times
`by an authorized user. Furthermore, copies of a single
`original Spoken password can be altered and then Stored to
`create variations from the original.
`What is needed is a Speaker authentication Scheme
`wherein imposters cannot use a recording of the user's voice
`to render a valid passwords to gain access to protected
`computer resources. There exist a number of Systems that
`attempt to overcome the shortcomings of Voice-based
`authentication Schemes. Such authentication mechanisms
`include Smart cards, Secure ID's, and retina Scanners.
`However, these mechanisms require Special hardware at the
`Site from which a user calls.
`In accordance with another aspect of a converged wide
`area network interface to a computer System, there is an
`interest to exploit a System wherein telephony and digital
`data Systems share programs and data. Voice-based com
`puter access, described above, is one Such effort to exploit
`converged technology. Once authenticated, a user may
`acceSS computer resources via Voice commands rather than
`issuing commands by means of a remote computer (e.g., a
`laptop computer). The user may access a number of appli
`cations integrated into the converged local network includ
`ing databases, file servers, Interactive Voice Response (IVR)
`Servers, call centers, Voice mail, PBX hubS/endnodes, and
`conference bridges.
`With regard to the last of the listed potential applications,
`it is noted that conference bridges are generally imple
`
`25
`
`BACKGROUND OF THE INVENTION
`The overwhelming majority of access to computer
`resources today from remote locations has been via remote
`electronic data communications. There are many forms of
`Such access including for example modems or digital Sub
`Scriber lines. Remote users communicate with, and acceSS
`the resources of, a local System via a personal computer or
`computer appliance, Such as for example a palm-sized
`Scaled-down version of a personal computer.
`Applications typically Support connected computers hav
`ing graphical user interfaces. However, Similar interface
`functionality is not Supported for end-devices having voice
`user interfaces. As a result, a user's access to the function
`ality of a particular application or resource is dictated by the
`manner in which the user accesses the computer System
`upon which the application or resource resides.
`Businesses typically have two Systems accessed remotely
`on a regular basis by their users. A local area network
`handles data communications, and a private branch
`exchange (PBX) system handles voice communications. The
`local area network provides access by users to file and
`computer applications/servers thereby enabling a user to
`carry out computer applications on a computer from a
`35
`remote location. The PBX system enables users to retrieve
`and respond to voice messages left for the users on the PBX
`voice mail system. The PBX also enables a remote user to
`call multiple persons served by the PBX with a single call.
`The businesses also include two separate and distinct Sets
`of physical communications lines to their places of business.
`A first Set of lines provide communication links between a
`public switched telephone network (PSTN) and a private
`branch exchange (PBX) system including phones and other
`telephony. A set of PSTN lines terminate at a business site
`45
`at a PBX connected to a business internal phone lines. A
`Second Set of lines provide links between external data
`networks and internal local area networks (LANs) for the
`businesses. Examples of such lines are T1, E1, ISDN, PRI,
`and BRI.
`In recognition of the potential efficiencies arising from
`converging two physically and operationally distinct net
`Works into a single network, the network technology indus
`try has Sought to define and implement a Single, converged,
`network meeting the demands for all types of communica
`tions including voice, facsimile, data, etc. AS a result, a new
`telephony/data transmission paradigm is emerging. The new
`paradigm is based upon a packet-based, Switched, multi
`media network. Data and voice, while treated differently at
`the endpoints by distinct applications, share a common
`transport mechanism.
`Convergence presents the opportunity for the creation of
`applications including communication interfaces that not
`only Support computer-generated commands, but also voice
`commands from a remote user. It also presents the oppor
`65
`tunity to enhance the variety and flexibility of uses for PBX
`Systems.
`
`40
`
`50
`
`55
`
`60
`
`CSCO-1017
`CISCO SYSTEMS, INC. / Page 11 of 23
`
`

`

`US 6,782,413 B1
`
`3
`mented today in two ways. One way is to purchase a
`Conference Bridge with certain capacity. It is then used as
`a fixed resource like a physical conference room. If a
`conference bridge has 24 ports it can Support one 24-user
`conference call. It could also Support three eight-port con
`ference calls.
`Extending the size of a conference via external conference
`bridging is a challenge to coordinators of a conference. A
`Second conference phone number has to be forwarded to
`each of the participants who is to be bridged into the
`conference via the external bridge. Then the external con
`ference bridge calls in to the internal conference bridge.
`Alternatively, callers could call a number that is received by
`the PBX handling the conference which in turn forwards the
`call to an external conference bridge. However, each for
`warded call uses two trunks in the PBX system.
`Another option is to Subscribe to a conference bureau. A
`bureau is a Service that Supplies an external conference
`bridge (and number to call into the bridge). The bureau
`typically charges a customer based upon the number of users
`and the duration of the use of the bridge (e.g., per user
`minute). External bridges allow for more dynamic meetings
`however the cost for utilizing external bridges on a regular
`basis is Substantial.
`
`15
`
`25
`
`4
`Each user configures a personal IMR System. In a converged
`network environment, the user is provided access to the IMR
`through a personal computer interface, web interface, instant
`message, e-mail, as well as a voice user interface over a
`telephone connection.
`A configurable distributed conference bridge is another
`potential application incorporated within the converged net
`work architecture model of the present invention. The dis
`tributed conference bridge enables local conference
`resources to be utilized and incorporates external Service
`bureau conference bridge resources when needed to Supple
`ment the internal conference bridge resources of a System.
`This may or may not require any user intervention to create
`the bridged conference bridge. The dynamically config
`urable extensible conference bridge application Supports
`Standard Voice conference calls, multimedia conference
`calls, and blended conference calls. As a consequence a
`customer need not provision in-house conference bridge
`resources, Switch resources, or trunks for a worst case
`Scenario and the conference bridge may be used on a more
`ad hock basis Since it can dynamically grow to meet the
`demands of the conference.
`In accordance with an aspect of a preferred embodiment
`of the conference bridge application, in addition to manual
`call set-up with regard to the overflow connections to the
`external bridge, the conference bridge application Supports
`automatic redirecting head end conference phone numbers
`utilizing remote call forward, QSIG, PINT, and/or in-band
`Signaling.
`BRIEF DESCRIPTION OF THE DRAWINGS
`While the appended claims set forth the features of the
`present invention with aa particularity, the invention,
`together with its objects and advantages, may be best
`understood from the following detailed description taken in
`conjunction with the accompanying drawings of which:
`FIG. 1 is a block diagram Schematically depicting an
`exemplary computer System for incorporating the terminal
`abstraction architecture and carrying out the electronic per
`Sonal assistant and Voice print operations in accordance with
`a preferred embodiment of the present invention;
`FIG. 2 is a Schematic drawing depicting an exemplary
`network environment, including a converged network Sup
`porting both voice and data communications over a same
`network interface, into which the present invention may be
`incorporated;
`FIG. 3 is a Schematic drawing of an exemplary interface
`between a public and a private network for implementing an
`embodiment of the present invention;
`FIG. 4 is a diagram identifying a set of Voice-based
`applications Supported on a private network in accordance
`with an embodiment of the present invention;
`FIG. 5 is a block diagram depicting the components of a
`personal interactive multimedia application;
`FIG. 6 is a flowchart Summarizing the Steps of a personal
`IMR application;
`FIG. 7 is a Schematic diagram depicting components
`within a converged computer System for facilitating Voice
`based authentication of a user;
`FIG. 8 summarizes the steps performed by an interface
`Server/controller in accordance with a voice print application
`to determine whether to grant access to network resources to
`which acceSS is Selectively provided to authenticated autho
`rized users,
`FIG. 9 is a schematic depiction of a distributed conference
`bridge, and
`
`35
`
`SUMMARY OF THE INVENTION
`The present invention seeks to exploit the convergence
`paradigm and/or the ability to communicate with a wide
`Spectrum of end-terminals to enable users access to the
`resources of both converged and non-converged networks
`via voice and/or electronically generated commands. For
`example, an electronic personal assistant (ePA) incorporates
`generalizing/abstracting communications channels, data and
`resources provided through a converged computer/
`telephony System interface Such that the data and resources
`are readily accessed by a variety of interface formats includ
`ing a voice interface or data interface. A set of applications
`provide dual interfaces for rendering Services and databased
`upon the manner in which a user accesses the data. An
`40
`electronic personal assistant in accordance with an embodi
`ment of the invention provides Voice/data access to web
`pages, email, file shares, etc.
`The electronic personal assistant enables a user to trans
`mit Voice commands to a voice-based resource Server to
`provide information accessible to the resource Server. In
`accordance with an aspect of an embodiment of the
`invention, a user is authenticated by receiving vocal
`responses by a user to one or more requests variably Selected
`and issued by a speaker recognition-based authentication
`facility-thereby ensuring that every time a user logs into
`the network there is a unique challenge response to gain
`access to the network resources. A spoken response is
`compared to one or more Stored Voice Samples previously
`provided by the user during an enrollment procedure. If the
`spoken response is Sufficiently close to the one or more
`Stored Voice Samples, then the user is authenticated as a
`domain user or logged onto the local System. The Voice
`based authentication facility enables a user to log in to a
`computer without the aid of a keyboard, Smart card or Such.
`This would work in a kiosk environment. Thereafter, an
`application proxy is created. The application proxy acts on
`behalf of the authenticated authorized user.
`In accordance with particular aspects of the Specific
`embodiments of the invention, a set of remotely accessed
`65
`Voice applications are provided. One Such application com
`prises a personal interactive multimedia response (IMR).
`
`55
`
`60
`
`45
`
`50
`
`CSCO-1017
`CISCO SYSTEMS, INC. / Page 12 of 23
`
`

`

`S
`FIG. 10 is a flowchart summarizing the steps performed
`to create a distributed conference bridge.
`
`US 6,782,413 B1
`
`6
`programs 36, other programs 37, and program data 38. A
`user may enter commands and information into the com
`puter 20 through input devices such as a keyboard 40, which
`is typically connected to the computer 20 via a keyboard
`controller 62, and a pointing device, Such as a mouse 42.
`Other input devices (not shown) may include a microphone,
`joystick, game pad, Satellite dish, Scanner, or the like. Input
`devices as well as peripheral devices may be connected to
`the processing unit 21 through a Serial port interface 46 that
`is coupled to the System bus, a parallel port, game port,
`universal serial bus (USB), 1394 bus, or other interfaces. A
`monitor 47 or other type of display device is also connected
`to the System buS 23 via an interface, Such as a video adapter
`48. In addition to the monitor, computers typically include
`other devices not shown, Such as Speakers and printers.
`The computer 20 operates in a networked environment
`using logical connections to one or more devices within a
`network 63, including by way of example personal
`computers, Servers, routers, network PCs, a peer device or
`other common network node. These devices typically
`include many or all of the elements described above relative
`to the computer 20.
`The logical connections depicted in FIGS. 1 and 2 include
`one or more network links 51, for which there are many
`possible implementations, including local area network
`(LAN) links and wide area network (WAN) links. Such
`networking links are commonplace in offices, enterprise
`wide computer networks, intranets and the Internet. It will
`be appreciated that the network connections shown are
`exemplary and other means of establishing a data path
`between the computers may be used. When used in a LAN,
`the computer 20 may be connected to the network 63
`through a network interface or adapter 53. When used in a
`WAN, the computer 20 typically includes a modem 54 or
`other means for establishing communications over the net
`work link 51, as shown by the dashed line in FIG. 1. The
`network link 51 may also be created over public networks,
`using technologies Such as dial-up networking, the Internet,
`Digital Subscriber Line (DSL), Asynchronous Transfer
`Mode (ATM), Virtual Private Network (VPN) or any other
`conventional communication method. The modem 54 may
`be connected to the system bus 23 via the serial port
`interface 46, and may be external or internal. In a networked
`environment, programs depicted relative to the computer 20,
`or portions thereof, may be stored on other devices within
`the network 63.
`In the description that follows, the invention will be
`described with reference to acts and Symbolic representa
`tions of operations that are performed by one or more
`computers, unless indicated otherwise. AS Such, it will be
`understood that Such acts and operations, which are at times
`referred to as being executed, include the manipulation by
`the processing unit of the computer of electrical signals
`representing data in a structured form. This manipulation
`transforms the data or maintains it at locations in the
`memory System of the computer, which reconfigures or
`otherwise alters the operation of the computer in a manner
`well understood by those skilled in the art. The data struc
`tures where data is maintained are physical locations of the
`memory that have particular properties defined by the format
`of the data. However, while the invention is being described
`in the foregoing context, it is not meant to be limiting as
`those of skill in the art will appreciate that various of the acts
`and operation described hereinafter may also be imple
`mented in hardware.
`Turning now to FIG. 2, a Schematic diagram depicts
`components of an exemplary communications network envi
`
`15
`
`35
`
`40
`
`25
`
`DETAILED DESCRIPTION OF A PREFERRED
`EMBODIMENT
`Turning to the drawings, wherein like reference numerals
`refer to like elements, the invention is illustrated as being
`implemented in a Suitable computing environment.
`Although not required, the invention will be described in the
`general context of computer-executable instructions, Such as
`programs, being executed by a computer or Similar device.
`Generally, programs include routines, other programs,
`objects, components, data Structures, dynamic-linked librar
`ies (DLLs), executable code, etc. that perform particular
`tasks or implement particular abstract data types. Moreover,
`those skilled in the art will appreciate that the term “com
`puter is not meant to limit the invention to personal
`computers, as the invention may be practiced on multi
`processor Systems, network devices, minicomputers, main
`frame computers, computer appliances, and the like. The
`invention may also be practiced in distributed computing
`environments where tasks are performed by physically dis
`tinct processing devices that are communicatively linked. In
`a distributed computing environment, parts of a program
`may be located in both local and remote memory Storage
`devices.
`With reference to FIG. 1, an exemplary system for imple
`menting the invention is shown. As best shown in FIG. 1, the
`System includes a general purpose computer in the form of
`a conventional computer 20, including a processing unit 21,
`a System memory 22, and a System buS 23 that couples
`various System components including the System memory to
`the processing unit 21. The System buS 23 may be any of
`Several types of bus structures including a memory bus or
`memory controller, a peripheral bus, and a local bus using
`any of a variety of bus architectures. The System memory
`may include read only memory (ROM) 24 and random
`access memory (RAM) 25. A basic input/output system
`(BIOS) 26, containing the basic routines that help to transfer
`information between elements within the computer 20, such
`as during start-up, may be stored in the ROM 24. The
`computer 20 may further include a hard disk drive 27 for
`reading from and writing to a hard disk 60, a magnetic disk
`drive 28 for reading from or writing to a removable magnetic
`45
`disk 29, and an optical disk drive 30 for reading from or
`writing to a removable optical disk 31 such as a CD ROM
`or other optical media.
`If included in the computer 20, the hard disk drive 27,
`magnetic disk drive 28, and optical disk drive 30 may be
`connected to the system bus 23 by a hard disk drive interface
`32, a magnetic disk drive interface 33, and an optical disk
`drive interface 34, respectively. The drives and their asso
`ciated computer-readable media provide nonvolatile Storage
`of computer readable instructions, data Structures, programs
`and other data for the computer 20. Although the exemplary
`environment described herein employs a hard disk 60, a
`removable magnetic disk 29, and a removable optical disk
`31, it will be appreciated by those skilled in the art that other
`types of computer readable media which can Store data that
`is accessible by a computer, Such as magnetic cassettes, flash
`memory cards, digital Video disks, Bernoulli cartridges,
`random access memories, read only memories, and the like
`may also be used in the exemplary operating environment.
`A number of programs may be stored on the hard disk 60,
`magnetic disk 29, optical disk 31, ROM 24 or RAM 25,
`including an operating System 35, one or more applications
`
`50
`
`55
`
`60
`
`65
`
`CSCO-1017
`CISCO SYSTEMS, INC. / Page 13 of 23
`
`

`

`7
`ronment for incorporating an architecture wherein multiple
`types of user interfaces, including voice and graphical, are
`Supported for individual applications and other computer
`resources residing on a networked System. Support for
`multiple types of user interfaces is provided by a terminal
`abstraction interposed between remote terminals having
`various user interfaces and individual applications and other
`computer resources on the networked System. The terminal
`abstraction, comprising a Set of modules corresponding to
`user interface types, enables Similar functionality to be
`provided by applications and resources to an extensible Set
`of end-devices having differing user interfaces connected via
`a wide area network (WAN) 110 including by way of
`example any one or more of a set of linking networkS Such
`as a public Switched telephone network (PSTN), integrated
`services data network (ISDN), T1, etc.
`The converged computing/communications environment
`depicted in FIG. 2 includes a local network 112. In the local
`network 112, PSTN voice, IP voice, e-mail, instant
`messaging, Video, fax, IP Fax, and data calls are blended
`together and passed through one routing/rules engine within
`a network interface/server 114. A converged communica
`tions link 116 connects the network interface/server 114 to
`the WAN 110. The converged communications link 116
`Supports both voice and data communications between the
`local network 112 and the WAN 110. While only a single
`link 116 is shown in FIG. 2 for the network interface/server
`114, the network interface/server 114 also includes standard
`telephony interfaces which the network interface/server 114
`utilizes to communicate over the PSTN via ordinary phone
`trunk lines.
`The WAN 110 in turn provides wide area links to a variety
`of connected end-devices including, by way of example, a
`local area network 120, a public telephone 122, a facsimile
`machine, an Internet telephone, and a personal computer
`126. The network interface/server 114 passes packets of
`information for voice phone conversations, voice mail,
`email, internet phone, Video phone, fax, remote data access,
`remote Service access, etc. In accordance with the connec
`tion processing architecture of the present invention, for a
`particular application, data and Voice calls are directed to a
`terminal abstraction that communicates with the application
`according to an end-device independent format. Communi
`cations between the terminal abstraction and the application
`are not distinguished by the mode of access by an end-device
`to the application.
`With regard to the local network 112, a link 128 connects
`the network interface/server 114 to an Ethernet link 128 of
`a local computer network including a set of computing
`devices 130. The computing devices 130 comprise, for
`example, personal computers, Servers, client terminals and
`WorkStations. FIG. 2 explicitly shows two Such Servers, i.e.,
`an email server 132 and a database server 134. The network
`interface/Server 114 is also coupled to a voice mail System
`135 and includes a link to the Internet 136. While not shown
`in FIG. 1,

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket