`L0veland
`
`USOO67824-13B1
`(10) Patent No.:
`US 6,782,413 B1
`(45) Date of Patent:
`Aug. 24, 2004
`
`(54) DISTRIBUTED CONFERENCE BRIDGE
`
`(75) Inventor: ty D. Loveland, Redmond, WA
`
`(73) Assignee: Microsoft Corporation, Redmond, WA
`(US)
`
`(*) Notice:
`
`7
`
`(56)
`
`References Cited
`
`6,457.043 B1 * 9/2002 Kwak et al. ................ 709/204
`6,501,740 B1 12/2002 Sun et al. ................... 370/261
`OTHER PUBLICATIONS
`General Magic Corporate Site. PORTICO: Portico Features
`and Overview web page 1999; http://www.generalmagic.
`com/portico/portico Overview.shtml. Accessed Oct. 5,
`-
`1999).
`Subject to any disclaimer, the term of this
`General Magic. PORTICO: Frequently Asked Questions.
`patent is extended or adjusted under 35
`web page 1999; http://www.generalmagic.com/portico/
`U.S.C. 154(b) by 0 days.
`portico fad.shtml. Access Oct. 5, 1999).
`(21) Appl. No.: 09/502,849
`* cited by examiner
`22) Filled
`Feb. 11, 2000
`Primary Examiner-Gl
`B. Burg
`CC
`eD. ,
`findir Examiner-Genton B. BurgeSS
`Assistant Examiner Kimberly Flynn
`8. O'70". (74) Attorney, Agent, or Firm-Leydig, Voit & Mayer, Ltd.
`(58) Field of Search ................................. 709/204, 205,
`(57)
`ABSTRACT
`709/206, 207, 232; 379/202, 203, 204,
`93.21, 120; 370/265, 266 A System is disclosed for enabling communication between
`Server resources and a wide spectrum of end-terminals to
`enable users access to the resources of both converged and
`non-converged networkS via Voice and/or electronically
`U.S. PATENT DOCUMENTS
`generated commands.
`5. A : E. yers alm,..., A configurable distributed conference bridge is incorporated
`5,825.858 A * 10/1998 Shaffer et al. .............. 379/120
`within the converged network architecture model of the
`5,982,870 A * 11/1999 Pershan et al. ............. 379/221
`present invention. The distributed conference bridge enables
`6,005,870 A * 12/1999 Leung et al. ............... 370/466
`local conference resources to be utilized and incorporates
`6,100,882 A
`8/2000 Sharman et al. ............ 345/320
`external Service bureau conference bridge resources when
`6,236,644 B1
`5/2001 Shuman et al. ............. 370/261
`needed to Supplement the internal conference bridge
`6,272.214 B1 * 8/2001 Jonsson ...................... 379/202
`CSOUCCS of System.
`6,339.784 B1 * 1/2002 Morris et al. ............... 709/204
`6,424.994 B1 * 7/2002 Pirich et al. ................ 709/205
`6,448,978 B1 * 9/2002 Salvador et al. ............ 345/741
`
`17 Claims, 9 Drawing Sheets
`
`700
`
`114
`
`
`
`It
`Telephone
`
`Telephone Telephone
`
`Telephone
`
`Telephone
`
`Zoho Corp. and Zoho Corp. Pvt., Ltd.
`Exhibit 1019 – 001
`
`
`
`U.S. Patent
`
`Aug. 24, 2004
`
`Sheet 1 of 9
`
`US 6,782,413 B1
`
`20
`
`- A --4----
`COMPUTER
`
`rea
`
`47
`
`?
`
`(ROM)
`
`(RAM)
`
`eos
`
`a
`
`OPERATING is
`SYSTEM
`
`22
`
`24
`
`21
`
`48
`
`PROCESSING
`UN
`
`25
`
`VIDEO
`ADAPTER
`
`23
`
`53
`
`NETWORK
`INTERFACE
`
`62
`
`APPLICATION
`PROGRAM
`
`ge.
`
`OTHER
`PROGRAMS
`
`32
`
`37
`
`HARD DISK
`DRIVE
`INTERFACE
`
`PROGRAM
`DATA
`
`38
`
`33
`
`34
`
`46
`\
`51
`SERIAL
`MAGDISK OPTICAL DISK
`PORT ck
`drVE
`DRIVE
`INTERFACE
`INTERFACE INTERFACE
`
`RS
`Magnetic disk Optical drive
`drive
`
`
`
`60
`
`sea; 27
`g
`
`28
`
`30
`
`
`
`OPERATING
`SYSTEM
`
`APPLICATION
`PROGRAMS
`
`OTHER
`PROGRAMS
`
`PROGRAM
`DATA
`
`FIG. 1
`
`s
`
`Zoho Corp. and Zoho Corp. Pvt., Ltd.
`Exhibit 1019 – 002
`
`
`
`U.S. Patent
`
`Aug.24, 2004
`
`Sheet 2 of 9
`
`US 6,782,413 B1
`
`[o]/'=|_—___|(meo_|<>ch/Seeff||—_t————yLL][oo]
`200000][o]Obl||“|/|ee,tent
`
`|iooo,-~—4-~}-|J|
`
`[oa0008] aayBr|OF|Seka]ef|=|(EBEBLat—-—-—_——|yewezU}LE—l;=-=||9¢||ia)flGu,||——lperCR/|reredargy||pm[od]
`
`|[rensoon)
`
`oewo
`
`Zhh
`
`¢Old
`
`9ZLxa
`
`Zoho Corp. and Zoho Corp. Pvt., Ltd.
`Exhibit 1019 — 003
`
`Zoho Corp. and Zoho Corp. Pvt., Ltd.
`Exhibit 1019 – 003
`
`
`
`
`U.S. Patent
`
`Aug. 24, 2004
`
`Sheet 3 of 9
`
`US 6,782,413 B1
`
`Applications
`Fio. 4
`
`Applications
`Server
`
`186
`
`184
`
`Remote ACCess
`Server (RAS)
`Manager
`
`182
`
`Call Control APIs
`
`
`
`180
`
`Telephony
`Device
`Object
`
`194
`
`188
`
`199
`
`FIG. 3
`
`User Mod
`Se VOCe
`
`Kernel Mode
`
`
`
`Transport
`Driver
`
`172
`
`Network Device
`Interface and
`Telephony Driver
`
`198
`
`174
`
`160
`
`
`
`Network
`Interface
`
`116
`
`
`
`2
`O
`00
`4
`2
`202
`Personal
`Distributed
`IMR
`Conf. Bridge
`
`Network
`Interface
`
`162
`
`128
`
`O6
`2
`
`208
`
`FG. 4
`
`Call
`Instant
`Messaging Announcement
`e
`
`Zoho Corp. and Zoho Corp. Pvt., Ltd.
`Exhibit 1019 – 004
`
`
`
`U.S. Patent
`
`Aug. 24, 2004
`
`Sheet 4 of 9
`
`US 6,782,413 B1
`
`302 N T 304-306 N
`
`
`
`e.
`
`ERE
`
`PSTNTelephone
`
`IP Telephone
`
`
`
`Video Phone
`
`310-N
`
`see:
`
`Other
`
`Terminal Abstraction 320
`
`Rules Engine
`
`Exchange 1
`electronic
`Calendar
`
`350
`
`202
`
`terminal State
`
`USe
`State
`
`user defined
`options
`
`348
`
`
`
`342
`
`Configuration
`application
`
`configuration
`application
`
`346
`
`FIG. 5
`
`344
`
`Zoho Corp. and Zoho Corp. Pvt., Ltd.
`Exhibit 1019 – 005
`
`
`
`U.S. Patent
`
`Aug. 24, 2004
`
`Sheet 5 of 9
`
`US 6,782.413 B1
`
`400
`
`
`
`
`
`"Caller" attempts to
`contact a person who
`has Subscribed to MR
`402 N
`Call Answered?
`
`FIG. 6
`
`
`
`Yes
`
`"Call" proceeds
`
`
`
`
`
`No
`
`
`
`Rules for this caller
`
`Yes
`
`404
`
`
`
`No
`Determine features
`supported by caller's
`terminal
`
`408
`
`412
`
`414
`
`Present IMR menu of options
`appropriate for "caller" for
`Redistration
`Send e-mail to Send browser | Play or send
`Send instant
`Play voice
`menu to Voice Message to M e-mail terminal
`fenu to IP
`menu in other
`terfinal
`terminal
`terminal
`formats
`
`416
`
`
`
`410
`
`Cueue Caller
`
`Receive appropriate
`response from "caller"
`
`Process Rules
`and Formulate a
`Response --
`Leave
`Message
`
`Find Me
`
`Forward caller
`
`Other action
`
`End
`
`Zoho Corp. and Zoho Corp. Pvt., Ltd.
`Exhibit 1019 – 006
`
`
`
`U.S. Patent
`
`Aug. 24, 2004
`
`Sheet 6 of 9
`
`US 6,782,413 B1
`
`512
`
`s
`EEE
`Telephone
`
`522
`
`51 O
`
`Personal computer
`
`518
`
`e EE
`IP Phone
`
`520
`
`Application
`Servers
`
`524
`
`526
`
`oo
`
`Voice Print S-P
`DOrain
`Application
`1
`
`514
`
`EE
`E
`EEE
`Premise Telephone
`
`o
`
`516
`
`1.
`
`- 1
`1
`
`1.
`
`1. 1.
`
`540
`
`\
`\
`\
`\
`\
`
`532
`
`
`
`1.
`- 1
`
`534
`
`Zoho Corp. and Zoho Corp. Pvt., Ltd.
`Exhibit 1019 – 007
`
`
`
`U.S. Patent
`
`Aug. 24, 2004
`
`Sheet 7 of 9
`
`US 6,782,413 B1
`
`FIG. 8
`
`Receive Call From
`User
`
`600
`
`Route Request to
`Voice Print Application
`
`602
`
`issue User ID Prompt
`
`Receive User
`Identification
`
`604
`
`606
`
`elect a Challenge Query From
`Multiple Available Challenge?
`Response Pairs and issue
`Challence
`
`608
`
`Compare Received Response to
`Pre-stored Expected Response
`
`610
`
`
`
`
`
`612
`
`Voice Print Match?
`
`
`
`
`
`Reject User
`Authentication
`Request
`
`618
`
`614
`
`Logon User and Create
`Application Proxy
`(e.g., Terminal Server)
`
`616
`
`Carry Out User's
`Commands
`
`Zoho Corp. and Zoho Corp. Pvt., Ltd.
`Exhibit 1019 – 008
`
`
`
`U.S. Patent
`
`Aug. 24, 2004
`
`Sheet 8 of 9
`
`US 6,782,413 B1
`
`700
`
`114
`
`
`
`
`
`704
`
`702
`
`H.
`Telephone
`
`E.
`E.
`Telephone Telephone
`
`E.
`Telephone
`
`FIG. 9
`
`V
`\ \ y
`W
`V
`V
`V
`
`N
`M
`
`
`
`E VI
`EE
`V
`M
`Telephone h V
`E \ V
`Telephone
`is
`
`Telephone
`
`Telephone
`
`Zoho Corp. and Zoho Corp. Pvt., Ltd.
`Exhibit 1019 – 009
`
`
`
`U.S. Patent
`
`Aug. 24, 2004
`
`Sheet 9 of 9
`
`US 6,782,413 B1
`
`Configure Distributed
`Conference Bridge
`(set threshold for local bridge)
`
`800
`
`
`
`802
`
`
`
`
`
`Connect Participants To
`Local Conference Bridge
`Until Thresholds Met
`
`804
`
`
`
`
`
`806
`
`
`
`
`
`
`
`Establish Conference
`Connection BetWeen the
`LOCal and External
`Bridges
`
`
`
`issue Redirection Command
`Causing Subsequent
`Conference Paricipants to
`Connect to the External
`Conference Bridge
`
`
`
`FIG 10
`
`Zoho Corp. and Zoho Corp. Pvt., Ltd.
`Exhibit 1019 – 010
`
`
`
`1
`DISTRIBUTED CONFERENCE BRIDGE
`
`US 6,782,413 B1
`
`AREA OF THE INVENTION
`The present invention generally relates to the area of
`networks for providing telephony and data resources and
`more particularly to methods and mechanisms for providing
`access to networked resources via either voice or electronic
`data communications.
`
`15
`
`2
`One aspect of computer Systems accessed remotely via
`Voice commands is the implementation of Security mea
`Sures. Voice interfaces present the opportunity for users to
`connect to a network from Virtually any location. Presently,
`Security mechanisms for restricted acceSS Systems accessed
`via telephone typically rely upon users to enter a number on
`a touch-tone phone to limit access. However, this method is
`highly Susceptible to eavesdropping. Also, the users are
`often required to enter a long Sequence of numbers that can
`easily be forgotten. A Voice-controlled computer System will
`require Speech recognition functionality. Speech recognition
`programs and associated “training databases (used to train
`the Software to recognize voice commands from a user) do
`not guarantee that another user's Speech will not invoke
`protected operations on the computer System. Thus, if the
`computer System is to be Secure, then additional Speaker
`recognition/authentication procedures must be included in
`the System.
`The use of Speaker recognition/authentication processes
`to protect resources in a computer System is known. Such
`Systems have weaknesses that enable imposters to gain
`access to the computer System. The Simplest Voice authen
`tication Scheme requires a user to Speak a password, and the
`authentication System verifies the user by comparing the
`spoken password to an existing copy of the password. An
`obvious weakness to this authentication procedure is that the
`Security System cannot distinguish between whether the user
`is the Source of the Vocalized password or it is merely an
`electronically recorded copy of the user's voice.
`One solution to the well known “electronically-recorded”
`password Scheme is to request the user to utter the password
`multiple times. The multiple utterances, in addition to being
`compared to the digitally Stored vocal password at the
`computer System Site, are compared to one another to ensure
`that the utterances are sufficiently different from one another
`to ensure that a recording of the password is not being
`replayed multiple times by an imposter Seeking to gain
`remote access to protected computer resources. Of course,
`the imposter can circumvent this Safeguard by making
`multiple recordings of the password Spoken multiple times
`by an authorized user. Furthermore, copies of a single
`original Spoken password can be altered and then Stored to
`create variations from the original.
`What is needed is a Speaker authentication Scheme
`wherein imposters cannot use a recording of the user's voice
`to render a valid passwords to gain access to protected
`computer resources. There exist a number of Systems that
`attempt to overcome the shortcomings of Voice-based
`authentication Schemes. Such authentication mechanisms
`include Smart cards, Secure ID's, and retina Scanners.
`However, these mechanisms require Special hardware at the
`Site from which a user calls.
`In accordance with another aspect of a converged wide
`area network interface to a computer System, there is an
`interest to exploit a System wherein telephony and digital
`data Systems share programs and data. Voice-based com
`puter access, described above, is one Such effort to exploit
`converged technology. Once authenticated, a user may
`acceSS computer resources via Voice commands rather than
`issuing commands by means of a remote computer (e.g., a
`laptop computer). The user may access a number of appli
`cations integrated into the converged local network includ
`ing databases, file servers, Interactive Voice Response (IVR)
`Servers, call centers, Voice mail, PBX hubS/endnodes, and
`conference bridges.
`With regard to the last of the listed potential applications,
`it is noted that conference bridges are generally imple
`
`25
`
`BACKGROUND OF THE INVENTION
`The overwhelming majority of access to computer
`resources today from remote locations has been via remote
`electronic data communications. There are many forms of
`Such access including for example modems or digital Sub
`Scriber lines. Remote users communicate with, and acceSS
`the resources of, a local System via a personal computer or
`computer appliance, Such as for example a palm-sized
`Scaled-down version of a personal computer.
`Applications typically Support connected computers hav
`ing graphical user interfaces. However, Similar interface
`functionality is not Supported for end-devices having voice
`user interfaces. As a result, a user's access to the function
`ality of a particular application or resource is dictated by the
`manner in which the user accesses the computer System
`upon which the application or resource resides.
`Businesses typically have two Systems accessed remotely
`on a regular basis by their users. A local area network
`handles data communications, and a private branch
`exchange (PBX) system handles voice communications. The
`local area network provides access by users to file and
`computer applications/servers thereby enabling a user to
`carry out computer applications on a computer from a
`35
`remote location. The PBX system enables users to retrieve
`and respond to voice messages left for the users on the PBX
`voice mail system. The PBX also enables a remote user to
`call multiple persons served by the PBX with a single call.
`The businesses also include two separate and distinct Sets
`of physical communications lines to their places of business.
`A first Set of lines provide communication links between a
`public switched telephone network (PSTN) and a private
`branch exchange (PBX) system including phones and other
`telephony. A set of PSTN lines terminate at a business site
`45
`at a PBX connected to a business internal phone lines. A
`Second Set of lines provide links between external data
`networks and internal local area networks (LANs) for the
`businesses. Examples of such lines are T1, E1, ISDN, PRI,
`and BRI.
`In recognition of the potential efficiencies arising from
`converging two physically and operationally distinct net
`Works into a single network, the network technology indus
`try has Sought to define and implement a Single, converged,
`network meeting the demands for all types of communica
`tions including voice, facsimile, data, etc. AS a result, a new
`telephony/data transmission paradigm is emerging. The new
`paradigm is based upon a packet-based, Switched, multi
`media network. Data and voice, while treated differently at
`the endpoints by distinct applications, share a common
`transport mechanism.
`Convergence presents the opportunity for the creation of
`applications including communication interfaces that not
`only Support computer-generated commands, but also voice
`commands from a remote user. It also presents the oppor
`65
`tunity to enhance the variety and flexibility of uses for PBX
`Systems.
`
`40
`
`50
`
`55
`
`60
`
`Zoho Corp. and Zoho Corp. Pvt., Ltd.
`Exhibit 1019 – 011
`
`
`
`US 6,782,413 B1
`
`3
`mented today in two ways. One way is to purchase a
`Conference Bridge with certain capacity. It is then used as
`a fixed resource like a physical conference room. If a
`conference bridge has 24 ports it can Support one 24-user
`conference call. It could also Support three eight-port con
`ference calls.
`Extending the size of a conference via external conference
`bridging is a challenge to coordinators of a conference. A
`Second conference phone number has to be forwarded to
`each of the participants who is to be bridged into the
`conference via the external bridge. Then the external con
`ference bridge calls in to the internal conference bridge.
`Alternatively, callers could call a number that is received by
`the PBX handling the conference which in turn forwards the
`call to an external conference bridge. However, each for
`warded call uses two trunks in the PBX system.
`Another option is to Subscribe to a conference bureau. A
`bureau is a Service that Supplies an external conference
`bridge (and number to call into the bridge). The bureau
`typically charges a customer based upon the number of users
`and the duration of the use of the bridge (e.g., per user
`minute). External bridges allow for more dynamic meetings
`however the cost for utilizing external bridges on a regular
`basis is Substantial.
`
`15
`
`25
`
`4
`Each user configures a personal IMR System. In a converged
`network environment, the user is provided access to the IMR
`through a personal computer interface, web interface, instant
`message, e-mail, as well as a voice user interface over a
`telephone connection.
`A configurable distributed conference bridge is another
`potential application incorporated within the converged net
`work architecture model of the present invention. The dis
`tributed conference bridge enables local conference
`resources to be utilized and incorporates external Service
`bureau conference bridge resources when needed to Supple
`ment the internal conference bridge resources of a System.
`This may or may not require any user intervention to create
`the bridged conference bridge. The dynamically config
`urable extensible conference bridge application Supports
`Standard Voice conference calls, multimedia conference
`calls, and blended conference calls. As a consequence a
`customer need not provision in-house conference bridge
`resources, Switch resources, or trunks for a worst case
`Scenario and the conference bridge may be used on a more
`ad hock basis Since it can dynamically grow to meet the
`demands of the conference.
`In accordance with an aspect of a preferred embodiment
`of the conference bridge application, in addition to manual
`call set-up with regard to the overflow connections to the
`external bridge, the conference bridge application Supports
`automatic redirecting head end conference phone numbers
`utilizing remote call forward, QSIG, PINT, and/or in-band
`Signaling.
`BRIEF DESCRIPTION OF THE DRAWINGS
`While the appended claims set forth the features of the
`present invention with aa particularity, the invention,
`together with its objects and advantages, may be best
`understood from the following detailed description taken in
`conjunction with the accompanying drawings of which:
`FIG. 1 is a block diagram Schematically depicting an
`exemplary computer System for incorporating the terminal
`abstraction architecture and carrying out the electronic per
`Sonal assistant and Voice print operations in accordance with
`a preferred embodiment of the present invention;
`FIG. 2 is a Schematic drawing depicting an exemplary
`network environment, including a converged network Sup
`porting both voice and data communications over a same
`network interface, into which the present invention may be
`incorporated;
`FIG. 3 is a Schematic drawing of an exemplary interface
`between a public and a private network for implementing an
`embodiment of the present invention;
`FIG. 4 is a diagram identifying a set of Voice-based
`applications Supported on a private network in accordance
`with an embodiment of the present invention;
`FIG. 5 is a block diagram depicting the components of a
`personal interactive multimedia application;
`FIG. 6 is a flowchart Summarizing the Steps of a personal
`IMR application;
`FIG. 7 is a Schematic diagram depicting components
`within a converged computer System for facilitating Voice
`based authentication of a user;
`FIG. 8 summarizes the steps performed by an interface
`Server/controller in accordance with a voice print application
`to determine whether to grant access to network resources to
`which acceSS is Selectively provided to authenticated autho
`rized users,
`FIG. 9 is a schematic depiction of a distributed conference
`bridge, and
`
`35
`
`SUMMARY OF THE INVENTION
`The present invention seeks to exploit the convergence
`paradigm and/or the ability to communicate with a wide
`Spectrum of end-terminals to enable users access to the
`resources of both converged and non-converged networks
`via voice and/or electronically generated commands. For
`example, an electronic personal assistant (ePA) incorporates
`generalizing/abstracting communications channels, data and
`resources provided through a converged computer/
`telephony System interface Such that the data and resources
`are readily accessed by a variety of interface formats includ
`ing a voice interface or data interface. A set of applications
`provide dual interfaces for rendering Services and databased
`upon the manner in which a user accesses the data. An
`40
`electronic personal assistant in accordance with an embodi
`ment of the invention provides Voice/data access to web
`pages, email, file shares, etc.
`The electronic personal assistant enables a user to trans
`mit Voice commands to a voice-based resource Server to
`provide information accessible to the resource Server. In
`accordance with an aspect of an embodiment of the
`invention, a user is authenticated by receiving vocal
`responses by a user to one or more requests variably Selected
`and issued by a speaker recognition-based authentication
`facility-thereby ensuring that every time a user logs into
`the network there is a unique challenge response to gain
`access to the network resources. A spoken response is
`compared to one or more Stored Voice Samples previously
`provided by the user during an enrollment procedure. If the
`spoken response is Sufficiently close to the one or more
`Stored Voice Samples, then the user is authenticated as a
`domain user or logged onto the local System. The Voice
`based authentication facility enables a user to log in to a
`computer without the aid of a keyboard, Smart card or Such.
`This would work in a kiosk environment. Thereafter, an
`application proxy is created. The application proxy acts on
`behalf of the authenticated authorized user.
`In accordance with particular aspects of the Specific
`embodiments of the invention, a set of remotely accessed
`65
`Voice applications are provided. One Such application com
`prises a personal interactive multimedia response (IMR).
`
`55
`
`60
`
`45
`
`50
`
`Zoho Corp. and Zoho Corp. Pvt., Ltd.
`Exhibit 1019 – 012
`
`
`
`S
`FIG. 10 is a flowchart summarizing the steps performed
`to create a distributed conference bridge.
`
`US 6,782,413 B1
`
`6
`programs 36, other programs 37, and program data 38. A
`user may enter commands and information into the com
`puter 20 through input devices such as a keyboard 40, which
`is typically connected to the computer 20 via a keyboard
`controller 62, and a pointing device, Such as a mouse 42.
`Other input devices (not shown) may include a microphone,
`joystick, game pad, Satellite dish, Scanner, or the like. Input
`devices as well as peripheral devices may be connected to
`the processing unit 21 through a Serial port interface 46 that
`is coupled to the System bus, a parallel port, game port,
`universal serial bus (USB), 1394 bus, or other interfaces. A
`monitor 47 or other type of display device is also connected
`to the System buS 23 via an interface, Such as a video adapter
`48. In addition to the monitor, computers typically include
`other devices not shown, Such as Speakers and printers.
`The computer 20 operates in a networked environment
`using logical connections to one or more devices within a
`network 63, including by way of example personal
`computers, Servers, routers, network PCs, a peer device or
`other common network node. These devices typically
`include many or all of the elements described above relative
`to the computer 20.
`The logical connections depicted in FIGS. 1 and 2 include
`one or more network links 51, for which there are many
`possible implementations, including local area network
`(LAN) links and wide area network (WAN) links. Such
`networking links are commonplace in offices, enterprise
`wide computer networks, intranets and the Internet. It will
`be appreciated that the network connections shown are
`exemplary and other means of establishing a data path
`between the computers may be used. When used in a LAN,
`the computer 20 may be connected to the network 63
`through a network interface or adapter 53. When used in a
`WAN, the computer 20 typically includes a modem 54 or
`other means for establishing communications over the net
`work link 51, as shown by the dashed line in FIG. 1. The
`network link 51 may also be created over public networks,
`using technologies Such as dial-up networking, the Internet,
`Digital Subscriber Line (DSL), Asynchronous Transfer
`Mode (ATM), Virtual Private Network (VPN) or any other
`conventional communication method. The modem 54 may
`be connected to the system bus 23 via the serial port
`interface 46, and may be external or internal. In a networked
`environment, programs depicted relative to the computer 20,
`or portions thereof, may be stored on other devices within
`the network 63.
`In the description that follows, the invention will be
`described with reference to acts and Symbolic representa
`tions of operations that are performed by one or more
`computers, unless indicated otherwise. AS Such, it will be
`understood that Such acts and operations, which are at times
`referred to as being executed, include the manipulation by
`the processing unit of the computer of electrical signals
`representing data in a structured form. This manipulation
`transforms the data or maintains it at locations in the
`memory System of the computer, which reconfigures or
`otherwise alters the operation of the computer in a manner
`well understood by those skilled in the art. The data struc
`tures where data is maintained are physical locations of the
`memory that have particular properties defined by the format
`of the data. However, while the invention is being described
`in the foregoing context, it is not meant to be limiting as
`those of skill in the art will appreciate that various of the acts
`and operation described hereinafter may also be imple
`mented in hardware.
`Turning now to FIG. 2, a Schematic diagram depicts
`components of an exemplary communications network envi
`
`15
`
`35
`
`40
`
`25
`
`DETAILED DESCRIPTION OF A PREFERRED
`EMBODIMENT
`Turning to the drawings, wherein like reference numerals
`refer to like elements, the invention is illustrated as being
`implemented in a Suitable computing environment.
`Although not required, the invention will be described in the
`general context of computer-executable instructions, Such as
`programs, being executed by a computer or Similar device.
`Generally, programs include routines, other programs,
`objects, components, data Structures, dynamic-linked librar
`ies (DLLs), executable code, etc. that perform particular
`tasks or implement particular abstract data types. Moreover,
`those skilled in the art will appreciate that the term “com
`puter is not meant to limit the invention to personal
`computers, as the invention may be practiced on multi
`processor Systems, network devices, minicomputers, main
`frame computers, computer appliances, and the like. The
`invention may also be practiced in distributed computing
`environments where tasks are performed by physically dis
`tinct processing devices that are communicatively linked. In
`a distributed computing environment, parts of a program
`may be located in both local and remote memory Storage
`devices.
`With reference to FIG. 1, an exemplary system for imple
`menting the invention is shown. As best shown in FIG. 1, the
`System includes a general purpose computer in the form of
`a conventional computer 20, including a processing unit 21,
`a System memory 22, and a System buS 23 that couples
`various System components including the System memory to
`the processing unit 21. The System buS 23 may be any of
`Several types of bus structures including a memory bus or
`memory controller, a peripheral bus, and a local bus using
`any of a variety of bus architectures. The System memory
`may include read only memory (ROM) 24 and random
`access memory (RAM) 25. A basic input/output system
`(BIOS) 26, containing the basic routines that help to transfer
`information between elements within the computer 20, such
`as during start-up, may be stored in the ROM 24. The
`computer 20 may further include a hard disk drive 27 for
`reading from and writing to a hard disk 60, a magnetic disk
`drive 28 for reading from or writing to a removable magnetic
`45
`disk 29, and an optical disk drive 30 for reading from or
`writing to a removable optical disk 31 such as a CD ROM
`or other optical media.
`If included in the computer 20, the hard disk drive 27,
`magnetic disk drive 28, and optical disk drive 30 may be
`connected to the system bus 23 by a hard disk drive interface
`32, a magnetic disk drive interface 33, and an optical disk
`drive interface 34, respectively. The drives and their asso
`ciated computer-readable media provide nonvolatile Storage
`of computer readable instructions, data Structures, programs
`and other data for the computer 20. Although the exemplary
`environment described herein employs a hard disk 60, a
`removable magnetic disk 29, and a removable optical disk
`31, it will be appreciated by those skilled in the art that other
`types of computer readable media which can Store data that
`is accessible by a computer, Such as magnetic cassettes, flash
`memory cards, digital Video disks, Bernoulli cartridges,
`random access memories, read only memories, and the like
`may also be used in the exemplary operating environment.
`A number of programs may be stored on the hard disk 60,
`magnetic disk 29, optical disk 31, ROM 24 or RAM 25,
`including an operating System 35, one or more applications
`
`50
`
`55
`
`60
`
`65
`
`Zoho Corp. and Zoho Corp. Pvt., Ltd.
`Exhibit 1019 – 013
`
`
`
`7
`ronment for incorporating an architecture wherein multiple
`types of user interfaces, including voice and graphical, are
`Supported for individual applications and other computer
`resources residing on a networked System. Support for
`multiple types of user interfaces is provided by a terminal
`abstraction interposed between remote terminals having
`various user interfaces and individual applications and other
`computer resources on the networked System. The terminal
`abstraction, comprising a Set of modules corresponding to
`user interface types, enables Similar functionality to be
`provided by applications and resources to an extensible Set
`of end-devices having differing user interfaces connected via
`a wide area network (WAN) 110 including by way of
`example any one or more of a set of linking networkS Such
`as a public Switched telephone network (PSTN), integrated
`services data network (ISDN), T1, etc.
`The converged computing/communications environment
`depicted in FIG. 2 includes a local network 112. In the local
`network 112, PSTN voice, IP voice, e-mail, instant
`messaging, Video, fax, IP Fax, and data calls are blended
`together and passed through one routing/rules engine within
`a network interface/server 114. A converged communica
`tions link 116 connects the network interface/server 114 to
`the WAN 110. The converged communications link 116
`Supports both voice and data communications between the
`local network 112 and the WAN 110. While only a single
`link 116 is shown in FIG. 2 for the network interface/server
`114, the network interface/server 114 also includes standard
`telephony interfaces which the network interface/server 114
`utilizes to communicate over the PSTN via ordinary phone
`trunk lines.
`The WAN 110 in turn provides wide area links to a variety
`of connected end-devices including, by way of example, a
`local area network 120, a public telephone 122, a facsimile
`machine, an Internet telephone, and a personal computer
`126. The network interface/server 114 passes packets of
`information for voice phone conversations, voice mail,
`email, internet phone, Video phone, fax, remote data access,
`remote Service access, etc. In accordance with the connec
`tion processing architecture of the present invention, for a
`particular application, data and Voice calls are directed to a
`terminal abstraction that communicates with the application
`according to an end-device independent format. Communi
`cations between the terminal abstraction and the application
`are not distinguished by the mode of access by an end-device
`to the application.
`With regard to the local network 112, a link 128 connects
`the network interface/server 114 to an Ethernet link 128 of
`a local computer network including a set of computing
`devices 130. The computing devices 130 comprise, for
`example, personal computers, Servers, client terminals and
`WorkStations. FIG. 2 explicitly shows two Such Servers, i.e.,
`an email server 132 and a database server 134. The network
`interface/Server 114 is also coupled to a voice