[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

EP0876733A1 - Method of accessing a target entity over a communications network - Google Patents

Method of accessing a target entity over a communications network

Info

Publication number
EP0876733A1
EP0876733A1 EP96941768A EP96941768A EP0876733A1 EP 0876733 A1 EP0876733 A1 EP 0876733A1 EP 96941768 A EP96941768 A EP 96941768A EP 96941768 A EP96941768 A EP 96941768A EP 0876733 A1 EP0876733 A1 EP 0876733A1
Authority
EP
European Patent Office
Prior art keywords
die
dns
service
resource
internet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP96941768A
Other languages
German (de)
French (fr)
Inventor
Colin Low
Andrew Franklin Seaborne
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HP Inc
Original Assignee
Hewlett Packard Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=10789104&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=EP0876733(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Hewlett Packard Co filed Critical Hewlett Packard Co
Priority to EP02000568A priority Critical patent/EP1207704B1/en
Priority to EP02000567A priority patent/EP1207703B1/en
Publication of EP0876733A1 publication Critical patent/EP0876733A1/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/4228Systems providing special services or facilities to subscribers in networks
    • H04M3/42306Number translation services, e.g. premium-rate, freephone or vanity number services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4535Network directories; Name-to-address mapping using an address exchange platform which sets up a session between two nodes, e.g. rendezvous servers, session initiation protocols [SIP] registrars or H.323 gatekeepers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4552Lookup mechanisms between a plurality of directories; Synchronisation of directories, e.g. metadirectories
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4557Directories for hybrid networks, e.g. including telephone numbers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/54Arrangements for diverting calls for one subscriber to another predetermined subscriber
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/006Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/0016Arrangements providing connection between exchanges
    • H04Q3/0029Provisions for intelligent networking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/0016Arrangements providing connection between exchanges
    • H04Q3/0029Provisions for intelligent networking
    • H04Q3/0037Provisions for intelligent networking involving call modelling techniques, e.g. modifications to the basic call state model [BCSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/0016Arrangements providing connection between exchanges
    • H04Q3/0029Provisions for intelligent networking
    • H04Q3/0045Provisions for intelligent networking involving hybrid, i.e. a mixture of public and private, or multi-vendor systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/12Arrangements for interconnection between switching centres for working between exchanges having different types of switching equipment, e.g. power-driven and step by step or decimal and non-decimal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13093Personal computer, PC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13097Numbering, addressing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13103Memory
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13106Microprocessor, CPU
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13175Graphical user interface [GUI], WWW interface, visual indication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13176Common channel signaling, CCS7
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13196Connection circuit/link/trunk/junction, bridge, router, gateway
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13204Protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13209ISDN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13345Intelligent networks, SCP
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13389LAN, internet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13517SLEE - service logic execution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13526Indexing scheme relating to selecting arrangements in general and for multiplex systems resource management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13527Indexing scheme relating to selecting arrangements in general and for multiplex systems protocols - X.25, TCAP etc.
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13534Internet - WWW, HTML, browsers etc.
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13546Intelligent Peripheral

Definitions

  • the present invention relates to a method of accessing a target entity over a cornmunications network.
  • the present invention finds particular application to the provision of IN (Intelligent Network) services in a switched telecommunications system.
  • IN Intelligent Network
  • switched telecommunication system means a system comprising a bearer network with switches for setting up a bearer channel through the network.
  • switched telecommunication system is to be taken to include not only the existing public and private telephone systems (whether using analogue phones or ISDN-based), but also broadband (ATM) and other switch-based bearer networks that are currently being implemented or may emerge in the future.
  • ATM broadband
  • switched telecommunication system is sometimes shortened herein to telecommunication system.
  • references to a "call” in the context of a switched telecommunication system is to be understood as meaning a communication through a bearer channel set up across the bearer network, whilst references to call setup, maintenance and takedown are to be taken to mean the processes of setting up, maintaining and taking down a bearer channel through the bearer network. Terms such as “call processing” and “call handling” are to be similarly interpreted.
  • communication system when used herein should be understood as having a broader meaning than switched telecommunication system, and is intended to include datagram-based communication systems where each data packet is independently routed through a bearer network without following a predetermined bearer channel.
  • PSTNs Public Switched Telephone Networks
  • PLMNs Public Land Mobile Networks
  • ITN services 800 number services and call forwarding.
  • WWW World Wide Web
  • the present invention proposes technologies for a more synergetic relationship between these two worlds than is currently envisaged and in order to place the present invention in context, a review will first be given of each of these two worlds.
  • the Basic PSTN The basic service provided by a PSTN (Public Switched Telephone Network) is the interconnection of two telephones (that is, setting up a bearer channel between the telephones) according to a called-party telephone number input at the calling-party telephone.
  • Figure 1 is a simplified representation of a PSTN providing such a service.
  • customer premises equipment, CPE, 10 such as standard analogue telephones, but also more recently ISDN terminals
  • the SPs 12 form nodes in an inter- exchange network 13 made up of interconnecting trunks 14 and SPs that are controlled by control entities 15 in the SPs.
  • the control effected by the control entities 15 is determined by signalling inputs received from the CPEs and other SPs, and involves call setup, maintenance and clearance to provide the desired bearer channel between calling CPE and called CPE.
  • the PSTN may be thought of as a bearer - network and a control (signalling) network, the function of the latter being to effect call control through the bearer network, namely the control of setup, maintenance and take down of bearer channels through the bearer network; in practice, the bearer and signalling networks may use the same physical circuits and even the same logical channels.
  • control signalling between the CPE and its local SP is in-band signalling, that is, the signalling is carried on the same channel as used for voice; this signalling is interpreted and converted at the SPs 12 into signalling between SPs that uses a dedicated common-channel signalling network 16 (implemented nowadays using the SS7 protocol suite).
  • the CPE is an ISDN terminal
  • signalling is carried in a separate channel directly from the CPE on an end- to-end.
  • Modern SPs use the ISUP (ISDN User Part) SS7 protocol for inter-exchange call control signalling whether the CPE is a standard telephone or an ISDN terminal.
  • Telephone Numbering Plans As certain aspects of the present invention are influenced by the structuring of telephone numbers, a brief description will now be given of the structuring of such numbers.
  • Telephone numbers form an international, hierarchical addressing scheme based on groups of decimal digits.
  • the top level of the hierarchy is administered by the ITU-T, which has allocated single-digit numeric codes to the major geographic zones (for example "1 " for North America, "2" for Africa, “3” for Europe, “4" for Europe, "5" for South America and Cuba, etc.). Within each zone countries are assigned 2 or 3 digit codes, so that within zone 3 France is "33", and within zone 4 the UK is "44".
  • the first case has the '0' prefix, a 3 digit area code and a 7 digit local number
  • die second case has the '0' prefix, a 4 digit area code, and a 6 digit local number. Further interpretation of the local number will take place within the area exchange, as even a 6 digit address space is too large for a single switch, and for a typical local area several switches may be needed to host the required number of subscriber lines. This interpretation is opaque and is a matter for the area service provider.
  • an SP may also serve to provide what are called IN (Intelligent Network) services; in this case the SP is termed a service switching point, SSP.
  • An SSP 25 is arranged to suspend call processing at defined points-in-call upon particular criteria being met, and to delegate the continuation of call processing to a service control subsystem providing a service " control function (SCF) either in the form of a service control point, SCP 17 (see Figure 2) or an Adjunct 18.
  • SCF service "control function
  • the Adjunct 18 is directly associated with an SSP 25 whilst the SCP 17 and SSP 25 communicate with each other via an extended common channel signalling (CCS) network 16 that may include signal transfer points (STP) 19.
  • CCS common channel signalling
  • STP signal transfer points
  • the SCP 17 may be associated with more than one SSP 25.
  • Both the SCP 17 and Adjunct 18 provide a service logic execution environment (SLEE) 20 in which instances of one or more service logic programs (SLP) 21 can execute.
  • SLP service logic programs
  • the SLEE 20 and SLP 21 togeu er provide service control functionality for providing services to the SSP 25.
  • Service logic running in an SCP or Adjunct will generally make use of subscriber information stored in a service data function (SDF) 22 that may be integral with the SCP/ Adjunct or partially or wholly separate therefrom.
  • SDF service data function
  • SCF service control function
  • the Figure 2 network includes an intelligent peripheral (IP) 23.
  • IP 23 provides resources to the SSP 25 such as voice announcements and DTMF digit collection capabilities.
  • the network will also include an operation system (not shown) that has a general view of the network and its services and performs functions such as network monitoring and control.
  • the SSP 25 when it receives a call, it examines internal trigger conditions and, possibly, user information (eg dialled digits) to ascertain if the call requires a service to be provided by the service control subsystem 17, 18; the checking of trigger conditions may be carried out at several different points in call processing.
  • the SSP 25 determines that a service is required it messages the service control subsystem (either SCP 17 or Adjunct 18) requesting the desired service and sending it a logic representation of the call in terms of its connectivity and call processing status.
  • the service control subsystem then provides the requested service and this may involve either a single interaction between the SSP and service control subsystem or a session of interactions.
  • a typical service is call forwarding which is a called-party service giving expression to an end-user requirement as simple as "if you call me on number X and it rings ten times, try calling number Y" .
  • it is the SSP local to the called end-user that triggers its associated SCP (or Adjunct) to provide this service; it will, of course, be appreciated that the SSP must be primed to know that the service is to be provided for a called number X.
  • PLMNs Public Land Mobile Networks
  • GSM Global System for Mobile communications
  • Control signalling in the case of a mobile subscriber is more complex because in addition to all the usual signalling requirements, there is also a need to establish where a call to a mobile subscriber should be routed; however, this is not a very different problem from a number of called-party IN services in the PSTN.
  • the service data function is largely located in a system named a Home Location Register (HLR) and the service control function in a system named a Visitor Location Register (VLR) that is generally associated on a one-to-one basis with each SSP (which in GSM terminology is called a Mobile Switching Centre, MSC).
  • HLR Home Location Register
  • VLR Visitor Location Register
  • the HLR and VLR thus constitute a service control subsystem similar to an SCP or Adjunct with their associated databases.
  • the service control function and service data function are generally either integrated into a PABX (Private Automatic Branch Exchange) or provided by a local computer.
  • PABX Primary Automatic Branch Exchange
  • the service control subsystem whilst present, may thus not be a physically distinct from the PABX.
  • the WWW is a client-server application running over the Internet and using a client- server protocol which mandates only the simplest of exchanges between client and server.
  • This protocol is HTTP (Hyper Text Transfer Protocol) which is optimised for use over TCP/IP networks such as the Internet; the HTTP protocol can, however, also be used over networks using different communication protocol stacks.
  • the WWW uses the Internet for interconnectivity.
  • Internet is a system diat connects together networks on a worldwide basis.
  • Internet is based on the TCP/IP protocol suite and provides connectivity to networks that also use TCP/IP.
  • IP addresses are hierarchically structured. Generally an entity will be identified at the user level by a name that can be resolved into the corresponding IP address by the Domain Name System (DNS) of the Internet.
  • DNS Domain Name System
  • the Domain Name System is a global, distributed, database, and without its performance, resilience and scalability much of the Internet would not exist in its current form.
  • the DNS in response to a client request, serves to associate an Internet host domain name with one or more Registration Records (RR) of differing types, the most common being an address (A) record (such as 15.144.8.69) and mail exchanger (MX) records (used to identify a domain host configured to accept electronic mail for a domain).
  • A address
  • MX mail exchanger
  • the RRs are distributed across DNS name servers world-wide, these servers cooperating to provide the domain name translation service; no single DNS server contains more than a small part of the global database, but each server knows how to locate DNS servers which are "closer" to the data dian it is.
  • the main characteristics of the DNS of interest are:
  • the host name space is organised as a tree-structured hierarchy of nodes with each host having a corresponding leaf node; each node has a label (except the root node) and each label begins wi an alphabetic character and is followed by a sequence of alphabetic characters or digits.
  • the full, or "fully qualified" name of a host is the string of node labels, each separated by a ". ", from the corresponding leaf node to the root node of the hierarchy, this latter being represented by a terminating ".” in the name.
  • DNS servers each with responsibility for a subtree of the name space.
  • a DNS server will hold RRs for all or part of its subtree - in the latter case it delegates responsibility for the remainder of die subtree to one or more further DNS servers.
  • a DNS server knows e address of any server to which it has delegated responsibility and also the address of the server which has given it the responsibility for the subtree it manages. The DNS servers thus point to each other in a stmcturing reflecting that of the naming hierarchy.
  • An application wishing to make use of the DNS does so through an associated "resolver" that knows the address of at least one DNS server.
  • a DNS server When a DNS server is asked by this resolver for an RR of a specified host, it will return either the requested RR or the address of a DNS server closer to the server holding the RR in terms of traversal of the naming hierarchy.
  • the hierarchy of the servers is ascended until a server is reached that also has responsibility for the domain name to be resolved; thereafter, the DNS server hierarchy is descended down to the server holding the RR for the domain name to be resolved.
  • the DNS uses a predetermined message format (in fact, it is the same for query and response) and uses the IP protocols.
  • DNS-type a "DNS-type" system always allowing for minor variations such as in label syntax, how the labels are combined (ordering, separators), the message format ietails, evolutions of me IP protocols etc.
  • top-level domains are administered by InterNic (these top-level domains include me familiar 'com' , 'edu' , 'org' , 'int', 'net', 'mil' domains as well as top-level country domains specified by standard two-letter codes such as 'us' , 'uk', 'fr' etc.).
  • Hewlett-Packard Company is responsible for all names ending in 'hp.com' and British Universities are collectively responsible for all names ending in 'ac.uk'.
  • FIG. 3 illustrates me progress of an example query made from within Hewlett-Packard Laboratories.
  • the host domain name to be resolved is 'xy.newcastle.ac.uk', a hypothetical machine at the University of Newcastle, United Kingdom.
  • the query is presented to the DNS server responsible for the "hpl.hp.com" subtree.
  • This server does not hold the requested RR and so responds with the address of the "hp.com” DNS server; this server is then queried and responds with the address of the 'com' DNS server which in turn responds with the address of the ' . ' (root) DNS server. The query then proceeds iteratively down the 'uk' branch until the 'newcastle.ac.uk' server responds with the RR record for the name 'xy' in its subtree.
  • DNS servers are designed to build a dynamic cache, and are initialised with the addresses of several root servers, so in practice most of the iterative queries never take place.
  • me 'hpl.hp.com' DNS server will know the addresses of several root servers, and will likely have the addresses of 'uk' and 'ac.uk' servers in its cache.
  • the first query to the 'hpl.hp.com' server will return the address of the 'ac.uk' server.
  • the second query to the 'ac.uk' server will return the address of the 'newcastle.ac.uk' server, and the third query will return the RR in question.
  • the resolver may specify its first query to be recursive in which case the receiving DNS server * responsible for resolving the query (if it cannot directly return the requested RR, it will itself issue a recursive query to a 'closer' DNS server, and so on).
  • each DNS server will be replicated, that is, organised as a primary and one or more secondaries.
  • a primary DNS nameserver initialises itself from a database maintained on a local file system, while a secondary initialises itself by transferring information from a primary.
  • a subtree will normally - have one primary nameserver and anything up to ten secondaries - the limitation tends to be the time required by the secondaries to update their databases from the primary.
  • the primary database is the master source of subtree information and is maintained by the domain DNS administrator.
  • the secondaries are not simply standby secondaries but each actively participates in the DNS with dependent servers that point to it rather than to the corresponding primary.
  • DNS implementations such as BIND, are widely available as a standard part of most UNIX systems, and can claim to be among the most robust and widely used distributed applications in existence.
  • access to the Internet 30 may be by direct connection to a network that is itself directly or indirectly connected to the Internet; such an arrangement is represented by terminal 31 in Figure 4 (this terminal may, for example, be a Unix workstation or a PC). Having a connection to me Internet of this form is known as having 'network access'. Any entity that has network access to the Internet may act as a server on the Internet provided it has sufficient associated functionality; in Figure 4, entity 32 with file store 37 acts as a server.
  • ISP Internet service provider
  • the user terminal 34 will generally communicate with the ISP 33 over the public telephone system using a modem and employing either SLIP (Serial Line Interface Protocol) or PPP (Point-to-Point Protocol). These protocols allow Internet packets to traverse ordinary telephone lines. Access to me Internet of this form is known as "dialup IP" access. Wim ⁇ is access method, the user terminal 34 is temporarily allocated an IP address during each user session; however, since this IP address may differ between sessions, it is not practical for the entity 34 to act as a server. - A cornerstone of the WWW is its ability to address particular information resources by means of an Uniform Resource Identifier (URI) that will generally be either a
  • URL Uniform Resource Locator
  • a full or "absolute" URL will comprise the following elements: scheme - this is the access scheme to be used to access the resource of interest; host - the Internet host domain name or IP address; port - the host port for the (TCP) connection; abs-path - the absolute path of the resource on the host.
  • the 'port' may be omitted in which case port 80 is assumed.
  • FIG. 5 of the accompanying drawings shows an example URL for the Hewlett- Packard products welcome page.
  • the elements are: scheme - http host - www.hp.com port - omitted (port 80 assumed) abs-path - Products.html
  • the HTTP protocol is based on a request/response paradigm.
  • a client establishes a connection with the server 31 corresponding to the "host" element of the URI and sends a request to the server.
  • This request includes a request method, and the "Request-URI” (which is generally just the absolute path of the resource on the server as identified by the "abs-path” element of the URI); the request may include additional data elements.
  • the server 31 accesses me resource 36 (here held on storage 37) and responds and this response may include an entity of a type identified by a MIME (Multipurpose Internet Mail Extensions) type also included in the response.
  • MIME Multipurpose Internet Mail Extensions
  • the two main request methods are:
  • Request-URI refers to a data-producing process
  • the produced data which is returned as the entity in the response and not the source text of me process.
  • POST - This method is used to request that me destination server accept the entity enclosed in the request as a new subordinate of the resource identified by the Request-URI.
  • the POST method can be used for annotation of existing resources, providing a message to a bulletin board, providing data to a data-handling process (for example, data produced as me result of submitting a form), and extending a database through an append operation.
  • the GET method can be used to directly retrieve data, or to trigger any process that will return an entity (which may either be data or a simply an indication of the result of running the process).
  • the POST method is used for registering data and specifying this method is also effective to trigger a process in the server to handle the posted data appropriately.
  • CGI Common Gateway Interface
  • HTML HyperText Markup Language
  • HTML is used to identify each part of a document, such as a title, or a graphic, and it is then up to the browser running in the client terminal to decide how to display each document part.
  • HTML is more than this - it also enables a URI and a request method to be associated with any element of a document (such as a particular word or an image) so that when a user points to and clicks on that element.
  • the resource identified by the URI is accessed according to the scheme (protocol) and request method specified.
  • This arrangement provides a hyperlink from one document to another. Using such hyperlinks, a user at a client terminal can skip effortlessly from one document downloaded from a server on one side of the world, to another document located on a server on the other side of the world. Since a document created by one author may include a hyperlink to a document created by another, an extremely powerful document cross-referring system results with no central bureaucratic control.
  • Hyperlinks are not the only intelligence that can be built into an HTML document. Another powerful feature is the ability to fill in a downloaded "Form" document on screen and then activate a 'commit' graphical button in order to have the entered information passed to a resource (such as a database) designed to collect such information. This is achieved by associating me POST request method with the 'commit' button together with the URI of the database resource; activating the 'commit' button results in the entered information being posted to the identified resource where it is appropriately handled.
  • a resource such as a database
  • HTML is only one of several currently available scripting languages delivering the functionality outlined above and it may be expected that any serious Web browser will have built-in support for multiple scripting languages.
  • Netscape 2.0 supports HTML 3.0, Java and LiveScript (the latter being Netscape proprietary scripting Language).
  • a Web browser should provide built-in support for standard media types, and the ability to load and execute programs in the client, amongst other features. These browsers may be viewed as operating systems for WWW interaction.
  • Another known example of the cooperative use of the Internet and PSTN is a recently launched service by which an Internet user with a sound card in his/her terminal computer can make a voice call to a standard telephone anywhere in the world. This is achieved by transferring digitised voice over the Internet to a service provider near the destination telephone; this service provider then connects into the local PSTN to access the desired phone and transfers across into die local PSTN me voice traffic received over the Internet. Voice input from me called telephone is handled in the reverse manner. Key to this service is the ability to identify the service provider local (in telephony charging terms) to the destination phone. This arrangement, whilst offering the prospect of competition for the telecom operators for long distance calls, is again a simple chaining together of the Internet and PSTN.
  • a method of accessing a target entity over a communications network comprising the steps of:
  • step ( b) supplying a number string indicative of a target entity and forming the related domain name by said process including parsing at least a substantial part of the number string into at least a part of a domain name; (c) - applying the domain name formed in step (b) to the DNS-type distributed database system to retrieve the communication data held in the corresponding record; and
  • step (d) using the communication data retrieved in step (c) in accessing the target entity.
  • the communications network is a telephone network and the target en t ity is a called party.
  • the number string may comprise a dialed number and the retrieved communication data may be a current telephone number for the t arget - party.
  • die retrieved communication data may be a URI indicative of the location on a computer network of a current telephone number for the target party, said URI being thereafter used to retrieve this current telephone number for use in accessing the target party.
  • the communications network is a computer network and the target entity is a resource item held at a corresponding URI on that network.
  • the number string may comprise a telephone number for the target party and the retrieved communication data may be me URI of the target resource item.
  • This target resource item is, for example, a current telephone number of a target party it is wished to call, said number string being a personal telephone number for that target party.
  • the resource item may be: downloadable data which upon being accessed is intended to be downloaded to me accessing entity; — downloadable service logic which upon being accessed is intended to be downloaded to the accessing entity for execution thereby, service logic intended to be executed in place upon being accessed wid the result of mis execution being returned to the accessing entity;
  • diis can be done by dividing said substantial portion into label segments according to a division scheme which is the same for all number strings.
  • the parsing of this number preferably involves forming a label segment of the country code component of die international telephone number and men forming further label segments from die remainder of the international telephone number according to a division scheme the same for all such numbers.
  • the forming of the further label segments from the remainder of the international telephone number can be effected according to a division scheme that is dependent on die identity of said country code component.
  • the DNS-type distributed database system is adapted to handle a set of domain names diat make up a name space herein referred to as the "telname space".
  • the root of the telname space is the root of the overall name space handled by die DNS-type distributed database system.
  • the DNS-type distributed database system is provided by the DNS of die Internet and in diis case the telname space may be provided by one or more subdomains of die DNS.
  • die telname space may form a "tei" subdomain in the domain .itu.int. of me DNS; alternatively, the telname space may be provided by respective subdomains in at least some of the country domains of the DNS.
  • telname space is a subdomain of a larger name space
  • a predetermined part of the number string may be used to look up a domain name tail corresponding to me root of me telname space in the larger name space.
  • This domain name tail is men added to the domain name part derived by said parsing of at least a substantial portion of die number string.
  • the country code component can be used to look up me domain name tail corresponding to me appropriate subdomain.
  • Figure 1 is a simplified diagram of a standard PSTN
  • Figure 2 is a simplified diagram of a known PSTN w h IN service capability
  • Figure 3 is a diagram illustrating host domain name resolution by the DNS of me Internet;
  • Figure 4 is a diagram illustrating die functioning of the World Wide Web;
  • Figure 5 is a diagram illustrating the format of a standard URL
  • ' is a diagram of a first arrangement in which service resource items are held on HTTP servers accessible both by me service control subsystem of a PSTN and by Web users
  • Figure 7 is a diagram illustrating me processing of a service request by the SCP of Figure 6;
  • Figure 8 is a diagram illustrating the format of a resource code used by the
  • Figure 6 SCP when accessing a service resource item; .
  • Figure 9 is a diagram illustrating the process of accessing a service resource in die case where me service code does not include an RRI part; .
  • Figure 10 is a diagram illustrating the process of accessing a service resource in the case where the service code includes an RRI part;
  • Figure 11 is a diagram illustrating the derivation of the URI of a service resource by parsing an input telephone number in accordance with the present invetion; .
  • Figure 12 A is a diagram depicting a name space (the "telname space") constituted by the domain names derived by a parsing of a predetermined set of telephone numbers; .
  • Figure 12B is a diagram depicting the incorporation of die telname space wimout fragmentation into the DNS;
  • Figure 12C is a diagram depicting the incorporation of die telname space in fragmented form into the DNS; .
  • Figure 13 is a diagram illustrating the overall operation of the Figure 6 arrangement in providing
  • Figure 16 is a diagram illustrating the overall operation of an arrangement in which a call setup gateway is provided between me Internet and the PSTN;
  • Figure 17 is a diagram illustrating the overall operation of an arrangement in which a freephone service is implemented for Web users;
  • Figure 18 is a diagram similar to Figure 6 illustrating the provision of a distributed processing environment for interconnecting elements of the service control subsystem of the PSTN.
  • Figure 6 illustrates an arrangement for me provision of services in a PSTN conventionally comprising an inter-exchange network 13 (including trunks and switches at least some of which are SSPs 41 wi associated LPs), an access network 11 connecting customer permise equipment (here shown as telephones 40) to the network 13, and a service control subsystem 42 including at least one SCP for providing services to die SSPs 41 upon request.
  • an inter-exchange network 13 including trunks and switches at least some of which are SSPs 41 wi associated LPs
  • an access network 11 connecting customer permise equipment (here shown as telephones 40) to the network 13, and a service control subsystem 42 including at least one SCP for providing services to die SSPs 41 upon request.
  • the SCP 43 may operate in a conventional manner responding to service requests from SSPs 41 to run specific service logic on particular data according to information contained in the service request, and to send back to the requesting SSP appropriate instructions for effecting call set up.
  • a service request is generated by e SSP in response to predetermined trigger conditions being met at a trigger check point, mere being one or more such check points in the course of handling a call (it may be noted that where die trigger conditions have been downloaded to die SSP from die SCP men it could be said that die SSP is responding to an information request by the SCP when contacting die SCP upon die trigger conditions being met - however, in the present specification, iis initial communication from the SSP to the SCP will be referred to as a "service request").
  • the SCP 43 is also provided with a network access interface 44 to the Internet 50 in order to make use of certain service resource items 49 (also referred to below simply as "service resources") during the course of processing at least certain service requests from die SSPs 41.
  • service resources 49 are held as WWW pages on HTTP servers 51 (more particularly, on service resource databases 52 of these servers 51).
  • the WWW pages containing these service resources are referred to below as "phone- pages.
  • the servers 51 are connected to the Internet and the phone pages are read accessible using respective URLs or URNs (for convenience, the more general term URI will be used hereinafter to mean the Internet-resolvable indicator of the location of a phone page).
  • the service resources may be service logic or service data and may be used by an otherwise standard service logic program running on the SCP, by accessing the phone page of the required resource using the appropriate URI.
  • the service resources 49 may provide substantially all of the service control and data associated with a particular service.
  • the service logic program running in the SCP 43 is of skeleton form, being instantiated on receipt of a service request and then serving to initiate service resources access and to return the results of this access to the entity that made the service request.
  • the SCP could be implemented simply as a platform for fetching and executing phone-page service logic and would not need to have the complex provisioning and management systems for such logic as is required by standard SCP platforms; SCPs could then become more ubiquitous, possibly being associated with every SSP.
  • FIG 7 is a flow chart illustrating the progress of events in the case where the SCP 43 handles a service request by accessing a phone-page service resource.
  • SCP 43 Upon receipt of a service request in an INAP message (step 100), SCP 43 decodes the TCAP/INAP message structure in standard manner (steps 101 and 102) well understood by persons sk i lled in the art.
  • SCP 43 instantiates a service logic program, SLP, to handle the request (step 103). This SLP is then responsible for looking up the URL of the requ i red service resource as determined from information contained in the service request (steps 104, 105).
  • a resource request (for example, in the form of an HTTP request message ) is sent over the Internet to the corresponding server holding me desired service resource (step 106); a correlation ID is also passed witii die resource request to enable a response from the latter to be linked with die appropriate SLP instance.
  • a timer is also started (step 107).
  • dien me response which is usually in the form of a destination number, is supplied to the appropriate SLP as identified using me correlation ID passed widi die response (step 109).
  • An INAP/TCAP response message is then prepared and sent to the entity that made the original service request (steps 110 and 111) after which me SLP instance is terminated (113).
  • a default response value (generally a default destination number) may be looked up in me customer record and put in an INAP/TCAP message and sent back to me requesting entity (steps 114 to 116). The SLP instance is then terminated (113).
  • Block 46 includes URI determination block 47 for determining the URI of the phone page containing me desired resource on the basis of parameters passed to block 46. Using the URI returned by block 47, die resource access block 46 then accesses die phone page of me required service resource 49 over the Internet through interface 44.
  • each service resource can be considered as being identified by a respective resource code 54 (see Figure 8) made up of a first part UI ("URI Identifier”) used to identify the URI at which the resource is located on the Internet, and a second part RRI (“Relative Resource Identifier”) used to identify the resource amongst plural resources at the same URI.
  • UI URI Identifier
  • RRI Relative Resource Identifier
  • Resource Access Where only one service resource 49 is located on a phone page 58 identif i ed by a unique URI, then the resource code 54 simply comprises the UI , generally either a telephone number alone or a telephone number plus a pic parame t er ( see Figure 9). In this case, accessing a resource simply involves mapping the whole resource code 54 into the corresponding URI (process 55) and then sending a request
  • the resource code 54 comprises both a UI and RRI, the UI generally being a telephone number and the RRI a pic or other parameter for distinguishing between the co-located resources.
  • accessing a resource involves mapping the UI part of the resource code 54 into the corresponding URI ( process 55) and then sending a request 57 to the corresponding phone page (process 56), the request i ncluding the RRI of the resource code.
  • the phone page 58 includes functionality 64 for accessing the required resource on the basis of the RRI in the request message. The result of accessing the required resource 49 is then returned in response message 59.
  • Block 47 may be implemented in a variety of ways, four of which are described below:
  • the calling party may thus input the host id component of the URI required (ehher in the form of a host domain name or host IP address) plus die path component of die URI.
  • the calling party may input the URI of the called party and, indeed, diis input may substitute for me normal input of a telephone number.
  • a leading input string (for example "999") may be used to identify die input as an URI.
  • die input means where a user only has a standard 12 key telephone, input of host domain names and other URI elements requiring alpha characters, will need to be done using one of the standard techniques for alpha input from a phonepad (such techniques are already used, for example, to enable a calling party to "spell" out the name of the called party). It would also be possible to provide users wi i a full alphanumeric keypad to facilitate URI input.
  • Computation Service resource access over the Internet could be restricted to a set of dialled numbers from which it was possible to compute a corresponding URI; in diis case, diis computation would be die responsibility of block 47.
  • a service resource may be required for a called party number on me odier side of me world which implies a rigorous update regime between PSTN operators worldwide in order to keep die association table up-to-date. (Note diat me same implication is not necessarily applicable in respect of marking the called-party number as one required to trigger a service request, since the number may be arranged to be one of a group of numbers all triggering an appropriate service request, in a manner similar to 800 numbers).
  • DNS -Type Lookup An alternative lookup solution is to use a hierarchically-structured distributed database system, similar to (or even part of) the Domain Name System (DNS) of the Internet, in order to resolve the UI part of a resource code to a corresponding URI.
  • DNS Domain Name System
  • This approach would typically involve databases maintained by each PSTN operator for its numbers widi which URIs are associated. These databases would be accessible by all PSTNs dirough a network such as die Internet widi resolution requests being pointed to die appropriate database in a manner similar to me Domain Name System.
  • the block 47 is constituted by an appropriate resolution program arranged to request UI resolution over die Internet through interface 44.
  • a part of the URI pad component can be made standard for all service resources, this standard part being simply added by the block 47 once the rest of the URI has been determined. For example, where a roaming number is to be looked up, it may by convention always be held in a file "roam" in a subdirectory "tei" of a subscriber's directory on a particular server. In this case die URI host component and die subscriber-unique part of the path component are first determined and men the remaining path part "/tel/roam" is added, (ii)
  • the URI patii component can be arranged to be die same as a predetermined part of me resource code, me block 47 needing only to determine die host component and men add me path. For example, it may be agreed that me path must always end wid the telephone number concerned, or sufficient of die terminating digits to have a high probability of uniqueness on the host machine.
  • the patii may also include standard components to be added by block 47.
  • Blocks of telephone numbers may have tiieir corresponding service resources located on the same host server so that it is only necessary to use a part of the telephone number to determine die host component of the URI; in dus case, die path component can conveniendy include all or part of each telephone number. This situation implies a tight degree of control by d e telephone operators and does not offer die telephone user die freedom to choose the host server on which user places their phone page.
  • me host component of the URI may be provided eitiier in the form of a host domain name or a host IP address.
  • a further resolution of URI host name to IP address will subsequendy be carried out in standard manner by interface 44 using the Domain Name System of die Internet. This further resolution can be avoided if d e host identity is directly provided as an IP address.
  • diis database may be independent of, or combined with, a customer database containing odier customer-related information.
  • Factors affec diis choice include, on die one hand, die possible desirability of having die nui. cr-to-URI translation information widely available, and on the odier hand, me possible desirability of restricting access to other customer-related information.
  • DNS-Tvoe URI Lookup A DNS-type lookup implementation for die URI determination block 47 will now be described in some detail for me case where the UI part of the resource code is a telephone number and diere are no constraints on the URI, ⁇ ereby requiring both die full host and padi components of the URI to be returned by die lookup.
  • a key part of the overall process is die formation of die equivalent of a host domain name from the telephone number of interest; diis domain-name equivalent is then resolved into a corresponding URI by a lookup mechanism which in me present example is identical to tiiat employed by die DNS (indeed, die lookup mechanism may be inco ⁇ orated into e DNS though it can also be independently implemented).
  • telname space the name space containing such host domain names for the ?lephone numbers of interest is referred to below as die "telname space"
  • an input telephone number forming, in me present case, die UI part of a resource code 54 is first parsed to form a domain name (step 120) and dien passed to die Duris system (illustrated in Figure 11 as formed by die DNS itself) to retrieve die RR with the corresponding URI (step 121). Following on from the URI lookup, if d e URI returned has its host component as a domain name, die DNS is next used to derive the host IP address (step 122); diis step is, of course not needed if die host component is stored as an IP address in the RR. The URI is dien used to make a resource request to the appropriate server, passing any RRI part of die resource code 54 (step 123). - There are a number of possibilities at the top level as to how a Duris system could be implemented:
  • the telname space constitutes me entire name space to be managed widi die root of the telname space being die " . " name space root (see Figure 12A where me telname space is shown hatched).
  • die Duris system is independent of die DNS itself.
  • the Duris system could, of course, use die same basic infrastructure as die DNS (that is, the Internet) or an entirely separate network.
  • die telname space comprises all the domain names corresponding to all public telephone numbers worldwide, parsing a full international telephone number would give a fully qualified domain name.
  • me telname space could be a much smaller set of names such as tiiose derived from internal extension numbers within a company having worldwide operations.
  • telname space is a domain of the DNS name space and die Duris system is provided by die
  • telname space comprises all domain names derived from public telephone numbers worldwide
  • die telname space could be placed within die domain of die ITU, in a special subdomain “tei", e root of the telname space men being "tel.itu.int. " (see Figure 12B where again, me hatched area represents the telname space).
  • Theoireity for administering the domain "tel.itu.int. " would dien lie widi die ITU. Widi diis latter example, to form a fully qualified domain name from an input telephone number, after the number has been parsed to form the part of the domain name corresponding to die structuring witi ⁇ n die telname space, the tail "tel.itu.int. " is added.
  • the fully qualified domain name is men applied to me DNS and me corresponding
  • die telname space could be all name derived from internal extension numbers within Hewlett-Packard in which case die root of me telname space would be "tel.hp.com. " and Hewlett-Packard would be entirely responsible for managing this domain.
  • die telname space is split between multiple domains of die DNS name space and d e Duris system is provided by die DNS itself.
  • die telname space comprises all domain names derived from public telephone numbers worldwide
  • die telname space could be split between respective "tei" subdomains of each country domain; dius, as illustrated in Figure 12C, die part of die telname space corresponding to French telephone numbers would have a root of "tel.fr. " and die part of die telname space corresponding to UK telephone numbers would have a root of "tel.uk.”.
  • the Spotifyity for administering each "tei" subdomain would dien lie widi each country.
  • Widi di to form a fully qualified domain name from an input telephone number
  • the part of the telephone number following me country code is parsed to form die part of the domain name within a country 'tei' subdomain and dien a host domain name tail is added appropriate for the country concerned.
  • me "33" country code is stripped from the number prior to parsing and used to add a tail of "tel.fr. " .
  • the tail appropriate to each country can be stored in a local lookup table.
  • two commercial organisations (X company and Y company) with respective DNS domains of "xco.com. " and "yco.com.
  • the telephone number "441447456987” which is a UK number (country code “44") with a four digit area code ("1447”) and six digit local number (“456987”) could be divided to form a domain name of 456987.1447.44 (note mat the reversal of label order occassioned by the fact that me DNS labels are arranged least significant first). If die telname space is a subdomain of die DNS widi a placement as illustrated in Figure 12B, the fully qualified domain name derived from die telephone number would be: 456987.1447.44.tel.itu.int.
  • DNS and BIND Paul Albitz and Criket Liu, O'Reilly & Associates, 1992 which describes how to set up a DNS server using the Unix BIND implementation.
  • the type of die RR records is, for example, text.
  • diat DNS labels should not in tiieory start with a digit. If dus convention is retained, dien it is of course a trivial exercise when parsing a telephone number to insert a standard character as the first character of each label. Thus, a 4 digit label of 2826 would become “t2826" where "t" is used as die standard starting character.
  • Duris system implementation has been in terms of translating a telephone number into an URI where the telephone number forms the full UI of a resource code and die Duris system returns a fujl URI. It will be appreciated diat the described Duris implementation can be readily adapted to accommodate die various modification discussed above regarding me form of the UI and what parts of die URI need to be looked up.
  • die service resource or resources associated widi a particular PSTN user (individual or organisation, whether a calling or called party) can be placed on a server 51 over die Internet from a user te ⁇ ninal 53 in one or more WWW pages.
  • the service resource is a service data item such as a telephone number (for example, an alternative number to be tried if die user's telephone corresponding to the number dialled by a calling party is busy).
  • This diversion number could be made die sole service resource of a phone page of the user.
  • the phone page URI could be a URL widi scheme set to HTTP in which case die GET mediod could be used to retrieve the diversion number.
  • die GET mediod could be used to retrieve the diversion number.
  • the diversion number is to be visually presented at a user terminal 53, dien it may be desirable to accompany the number with explanatory material (this will often not be necessary as the diversion number can be arranged to be returned into an existing displayed page diat already provides context information).
  • explanatory material an entity only wishing to make functional use of die phone page, could be arranged to retrieve the phone page and dien extract die diversion number (this would, of course, require a standard way of identifying die information to be extracted from die phone page).
  • An alternative and preferred arrangement for providing for both viewing and functional access to a resource requiring explanatory material for viewing is to use an object- oriented approach to resource design.
  • die resource object would have two different access metiiods associated widi it, one for purely functional use of the resource and the other enabling viewing of associated explanatory material. It would then be up to the accessing entity to access the resource object using the appropriate object method.
  • Yet another arrangement for providing for both viewing and functional use of the diversion number would be to provide separate resources appropriately configured for each use, each resource having its own resource code (generally, both such resources would be placed on the same phone page and in this case the UI part of each resource code would be the same).
  • Retrieval of a phone page for use by a human user will generally not be as time critical as retrieval for operational use by a PSTN.
  • the scheme specif i ed in the URL of a service resource could be HTTP
  • service resource examples include service logic for execution in place (at the server) with the result of this execution being returned to the entity accessing the resource; service logic downloadable from the server to the accessing entity for execution at that entity; and a logging resource for logging information passed to it by the accessing entity (or simply for logging the fac t t hat is has been accessed ) . It will be appreciated that the logging resource is really just a particular case of service logic executable in place.
  • a service resource constituted by execute-in-place service logic can be arranged to implement time-of-day routing, the result of executing the service logic being the telephone number to which a call should be routed taking account of the time of day at the called party's location.
  • An example of a service resource cons t ituted by downloadable service logic is service logic for controlling calling-party option interrogation using the facilities provided by an IP. As regards the logging resource, this can be used for recording the number of calls placed to a particular number.
  • each resource has its own phone page and die resource is present only in its unembellished functional form
  • the HTTP scheme can be employed for access using the GET method for both the downloadable service logic and the execution-in- place service logic, and me POST method for the logging resource. If it is desired to provide an explanatory material widi each service resource, dien any of the solutions discussed above in relation to data items, can be used.
  • each such resource can be placed on a respective phone page with its own URI.
  • die preferred approach is to place all such service resources on the same page and use the RRI part of the corresponding resource codes to enable access to die appropriate resource.
  • the accessed resource is then treated according to its form (executed if execute-in-place service logic, returned if downloadable service data or logic).
  • the diversion-number resource code might have an RRI of " 1 " whilst the time-of day resource code might have an RRI value of "2".
  • a service resource will often be of a complex type, combining service data and/or ⁇ ownloadable service l ⁇ £ and'or execute in place service logic.
  • a particularly powerful combination is die cc ination of the two types of service logic where the downloadable service logic is ..esigned to interact with execute-in-place service logic; using this arrangement, the user can be presented with complex client-server type applications.
  • Example Usage of Service Resource Figure 13 illustrates die operation of a service making use of a resource on a server 51.
  • This service is equivalent to a "personal number" service by which a user can be accessed tiirough a single, unchanging number even when moving between telephones having different real numbers.
  • die user requiring this service (user B in the current example) is allotted a unique personal number (here referred to as die "Webtel" number of B) from a set of numbers all of which have the same leading number string to enable an SSP to readily identify a dialled number as a Webtel number.
  • B has a service resource 49 on a dedicated phone page on HTTP server 51, diis phone page being located at a URL here identified as "URL (B phone page)" .
  • B's phone page when accessed returns die current roaming number (" B-telNb") where B can be reached.
  • B-telNb die current roaming number
  • B's phone page is just a single number that can be modified by B (for example, from a terminal 53) as B moves to a different phone. More likely is that B's phone page is an execute-in-place service logic providing time of day routing.
  • association between B's Webtel number and die URL of B's phone page is stored in an association table accessible to SCP 43.
  • die telephone 40 being used by A passes a call set up request to SSP 41 (note diat in Figure 13 the bearer paths tiirough die telephony network are shown by die diicker lines 60, e odier heavy lines indicating signalling flows).
  • SSP 41 detects die dialled number as a Webtel number and sends a service request to SCP 43 together widi B's Webtel number.
  • SCP 43 on receiving this service request initiates a service logic program for controlling translation of B's Webtel number into a current roaming number for B; in fact, in the present case, this program simply requests the resource access block 46 to access the service resource identified by B's Webtel number, (that is, B's phone page 49) and return die result of this access.
  • block 46 first translates B's Webtel number into the URL of B's phone page and dien uses diis URL to access B's phone page over the Internet (for example, using die 'phone' scheme already referred to with a method corresponding to die HTTP GET mediod). This results in B's current roaming number B-telNb being passed back to block 46 and in due course diis number is returned to die SSP 41 which dien initiates completion of call set up to die telephone 40 corresponding to B-telNb.
  • a service request may be triggered by a variety of triggers including calling-party number, called-party number, or some other user input, such triggers being possibly qualified by call setup progress (for example, called-party number qualified by a busy status or by ringing for more than a certain time).
  • a logging resource could be provided at a different URL for each SCP, it being a simple matter to collect and collate voting from all mese logging resources over the Internet. ⁇ f an SCP widi Internet access is provided at every SSP, then die risk of congestion : greatly reduced.
  • a user's phone page may hold multiple service resources in which case the access request from the accessing SCP needs to contain an appropriate RRI identifying the required resource.
  • a lookup table may need to be provided in the SCP to ensure diat a service request is appropriately handled; such a lookup table can conveniently be combined with me customer record database.
  • a user such as user B
  • This is possible if die Webtel-to-URI databases are available to all operators. Thus multiple operators could be set to access B's phone page or pages.
  • B can obviously chose not to use diat operator (at least where diat operator provides a long haul carrier service subject to user selection). The possibility therefore arises that service provision will cease to command a premium from operators, but that the provision of phone-page utilisation by an operator will become a necessary basic feature of PSTN operation.
  • the service resource must be placed on a server 51 and, secondly, die URI of die service resource must be notified to die PSTN operator along wid die trigger conditions (number plus any other condition such as point in call) calling for access to the resource; if multiple resources are provided at die same URI, then die RRI values needed to retrieve the appropriate resource for a particular trigger condition, must also be notified.
  • This notification process will be referred to hereinafter as 'registering' the service resource with die PSTN operator; registration is, of course, necessary to enable the association tables used by SCP 43 to be set up and for trigger conditions to be set in SSPs 43.
  • die process of placing a service resource on a server 51 how this is carried out will depend on the attitude of die PSTN operator to the possible effects of such service resources on operation of the PSTN.
  • die service resource simply returns a data item to an accessing entity
  • dien an operator may not be too concerned about possible errors (accidental or deliberate) in implementing die service resource.
  • die operator will probably be much more concerned about die proper operation of any service logic that may be returned by a resource; indeed, an operator may not permit such a service resource.
  • dien how a resource is placed on a server 51 will largely depend on die nature of the server concerned. For example, if a user has a computer with network access to die Internet and diis computer is used as server 51, dien die user can simply load a desired resource onto the server as a WWW phone page for external access. A similar situation arises if the server is an organisation server to which the server has access over an internal LAN. In both these latter cases, loading die resource as a WWW phone page does not itself require Internet access.
  • the server 51 is one run by an external Internet service provider, dien a user can arrange to download die required service resource into die user's allocated Web site space on die server; diis may or may not involve Internet access.
  • e PSTN operator provides a special server for user phone pages containing service resources.
  • placing a service resource on a server will generally involve clearing one or more levels of password protection.
  • die origin of die service resource loaded by a user onto server 51 diis may be generated by the user or, particularly where die resource includes service logic, may be provided by a third party (including die PSTN operator).
  • the PSTN operator wishes to have control over die service resources 49 to avoid any adverse effects on operation of the PSTN, two approaches are possible. Firstly, die operator could require diat every resource (or, possibly, a particular subset) had to be subject to a verification process before use, appropriate measures then being taken to avoid subsequent alteration of die resource by the user (except, possibly, for particular data items); in this respect, die operator could require that die resource be placed on a server under the operator's control and to which die user had no write access (except possibly for altering particular data items, as indicated above).
  • a second, more attractive, approach to minimising adverse effects by die service resources 49 is for the operator to provide standard service resources to which a user could add die user's own data (and possibly make limited functional selections in case where die resource included service logic); die customised resource would dien be loaded onto a server 51 controlled by die operator.
  • This process can be convenientiy implemented for a particular resource using an HTML "form" which a user could download over die WWW from the operator-controlled server.
  • HTML "form" which a user could download over die WWW from the operator-controlled server.
  • An advantage of this approach is diat registration of die service resource with the operator is simultaneaously effected. (It may be noted diat if registration needs to be done as a separate act from having a service resource loaded on a server, dien using an HTML form is a very convenient way to implement me registration process).
  • resource update will generally involve communication over die Internet.
  • Web User Interaction Consideration will next be given to odier possible uses of the service resources held in phone pages on me servers 51. For example, if user B's phone page contains a diversion number, then provided diis phone page is read-accessible over die Internet from user A's terminal 53, user A can use a graphical Web browser running on terminal 53 to view B's phone page and discover B's diversion number. As earlier discussed, die diversion number may be passed to user A for display in an existing visual context giving meaning to the number, or may be passed to user A widi accompanying explanatory text.
  • a more useful example is a current roaming number service for user B.
  • B's phone page 49 on server 51 (see Figure 14) is operative when accessed to return a current roaming number where B can be reached.
  • user B has a Web site wid several Web pages written in HTML and each page contains a graphical 'phone' button which when activated uses die GET mediod to access B's phone page by its URL.
  • user A whilst browsing (arrow 66) B's Web site over me WWW from user A's terminal 53, decides diat he would like to call user B to discuss some item of interest, user A simply activates the phone button 65 on die currently viewed page of B. This causes B's phone page to be accessed using the HTTP request "GET URL (B Phone Page)" - see arrow 67.
  • B's current number to be called is dien determined and passed to user A's terminal 53 (see arrow 68) where it is displayed.
  • An explanatory text concerning the number will generally also be displayed; for example die text "Please call me at the following number: " could be displayed, diis text being provided eitiier by die HTML script associated with die phone button, or from the phone page when re rning the current number.
  • die text "Please call me at the following number: " could be displayed, diis text being provided eitiier by die HTML script associated with die phone button, or from the phone page when re rning the current number.
  • it would probably be more helpful to provide user A not only widi die current number for reaching user B, but also with all numbers where B could be reached together widi die times when B was most likely to be at each number. Since this extra information is likely to be subject to frequent change, die only sensible way to provide the information is from the phone page.
  • B's phone page not only provides the current number for reaching B, but
  • B's phone page might include downloadable service logic for execution at user A's terminal. This is useful where choices are to be presented to a user, each choice producing a follow-up action such as fetching a further phone page.
  • the first-accessed phone page may be a family phone page giving die general telephone number for a family but also giving me user die possibility of selecting further phone information on each family member, such as a time-of-day dependent number; in diis case, each family member has their own follow-up phone page.
  • One way of overcoming diis problem would be to have user A's terminal 53, after obtaining die number to call from B's phone page, automatically suspend its Internet session by storing any required state information (for example, current WWW URL being accessed) and dien terminate its SLIP/PPP connection to thereby free up the telephone line.
  • A can men telephone B.
  • A can resume the suspended Internet session, using the stored state information to return to the point where A left off to call B.
  • An alternative approach is to operate a suitable multiplexing modulation scheme on die telephone line to A allowing voice and data to be simultaneously carried. A number of such schemes already exist.
  • the PSTN would dien need to separate die combined data and voice streams coming from A at some point and pass each to its appropriate destination (die Internet data being forwarded to die ISP providing the SLIP/PPP connection for user A and die voice stream being passed to B); of course, data and voice traffic in the reverse direction would also need combining at some point for sending over the last leg to A's te ⁇ ninal.
  • Ratiier than A manually dialling B using a standard telephone, anotiier possibility is tiiat user A's terminal is provided widi functionality enabling A to make a call over die PSTN from his terminal; diis functionality generally comprises a hardware interface 70 ( Figure 14) to a telephone line and phone driver software 71 for driving the interface 70 in response to input from application software such as die Web browser 73.
  • A could call up his phone software and enter die required number or, preferably, A need only "select" on screen the number returned from B's phone page and dien pass it into A's phone software.
  • B's phone page may return to A's terminal program code for automatically dialling B's number upon A confirming mat he wishes to proceed with call placement.
  • A's terminal is equiped widi a suitable modem and controlling software.
  • A could, instead, elect to send a fax or data to B drrough die PSTN eitiier to B's ordinary number or to one specified in B's phone page as die number to be used for such transmissions.
  • placing a call from A's terminal over the PSTN may be subject to the problem already discussed of conflict for use of the telephone line where tins is not an ISDN line and A gains Internet access via a SLIP/PPP connection.
  • die latter can be programmed to detect die return of a busy signal and then automatically look up B's diversion number and redial using diis number. This functionality can be included in service logic downloaded from B's phone page and run on A's terminal.
  • the service resource accessed on B's phone page upon B's telephone being busy may, of course, be more complex than just a diversion number.
  • user A may be presented with a range of options including, for example, B's fax or voice mailbox number, the selection of an option potentially initiating die ⁇ inning of appropriate accessing software.
  • Another possible option would be for A to leave B a call back message using a form downloaded from B's phone page upon this option being chosen; die completed form would be posted back to server 51 and logged for B to check in due course.
  • FIG 14 illustrates a situation where A, after being supplied widi B's current roaming number as in the Figure 14 case, calls B via a route that starts out over the Internet and then passes through a user network interface 80 into the PSTN.
  • Interface 80 is arranged to convert between ISDN-type telephone signalling on die PSTN and corresponding signalling indications carried across the Internet in IP packets; in addition, interface 80 transfers voice data from IP packets onto trunk 60 and vice versa.
  • Internet phone software 81 in A's terminal sends call initiation signalling over the Internet to interface 80, die address of which is already known to A's terminal.
  • the signalling is converted into ISDN- type signalling and passed to SSP 41.
  • Call set up dien proceeds in the normal way and return signalling is transferred back tiirough interface 80, over die Internet, to die software 81 in A's terminal.
  • This software passes call semp progress information to the WWW browser 73 for display to A.
  • A can talk to B through his telephone and A's voice input is first digitised in phone hardware interface 83 and then inserted into IP packets by software 81 to traverse the Internet to interface 80 (see arrow 84); voice traffic from B follows the reverse path.
  • IN services can be provided to this call by SCP in response to a service request from an SSP 41.
  • SCP 43 on receiving a service request will access B's appropriate phone page for call diversion and retrieve the diversion number. If SSP 41 is not set to initiate a service request on B's telephone being busy, die busy indication is returned to A's terminal where it can be handled in the manner already described widi reference to Figure 14.
  • interface 80 can be provided widi functionality similar to an SSP to set trigger conditions and generate a service request to SCP 43 on these conditions being satisfied.
  • Third-Partv Call Semp Gateway Figure 16 illustrates a further arrangement by which A can call B after receiving B's current roaming number.
  • a third-party call set-up gateway 90 is provided diat interfaces both with die Internet 50 and widi an SSP 41.
  • gateway 90 can be co-located with SCP 43 (though this is not essential).
  • Gateway 90 has the capability of commanding SSP 41 to set up a call between specified telephones.
  • a third-party call semp request is sent from A's terminal over the Internet to the gateway 90 (see arrow 91).
  • This semp request includes A's telephone number and B's current roaming number.
  • Gateway 90 first attempts to semp the call to A's telephone (which should generally succeed) and tiiereafter to set up the call to B's identified telephone. Once the call is semp, A and B communicate in standard manner across the PSTN. If B's phone had been busy, dien any of die previously described scenarios may ensue.
  • Gateway 90 can also be arranged to make service requests to SCP 43 upon predetermined trigger conditions being satisfied.
  • gateway 90 might be set to pick up the busy condition on B's telephone and initiate a service request to SCP 43 for a diversion number.
  • passing die busy indication back to A's terminal via gateway 90 is preferred because of die flexibility it gives A regarding further action.
  • Internet communication with the B's phone page and/or gateway 90 are both carried in Internet packets passed over die SLIP/PPP connection to/from A's terminal 53 but as logically distinct flows passed to separate applications running on terminal 53.
  • gateway 90 could equally have been made by service logic held in B's phone page and executed by server 51 (such an arrangement would, of course, require A's telephone number to be passed to B's phone-page service logic and this could be arranged to occur either automatically or through a form presented to user A at terminal A and dien posted back to server 51).
  • interface 80 of Figure 15 and die gateway 90 of Figure 16 provide examples of service requests being passed to die service control subsystem by entities other than SSPs 41.
  • a WWW/PSTN implementation does not necessarily rely either on transferring call charges from the calling to called party or on die use of a special "800" number, two characteristics of standard "Freephone” schemes.
  • the WWW/PSTN implementations do, however, possess the more general characteristic of placing an enquiring party and die party to whom the enquiry is directed, in telephone contact at die expense of die latter party.
  • a user D such as a large department store has a website on a server 51 ; for the sake of simplicity, it will be assumed diat the server is under d e control of user D who has direct computer access to the server over line 125.
  • D's Website may, for example, contain many catalogue-like Web pages illustrating goods offered for sale by D.
  • D has a freephone page 124 for handling enquiries placed on a freephone basis; die URL of diis page is associated with a "freephone" graphical button 122 placed on each of die Website catalogue pages.
  • the enquiry control system is connected to die server 51 via line 125, externally of the Internet; however, it would also be possible to have server 51 communicate with the enquiry control system through the Internet and, indeed, diis may be die most practical arrangement where D's Website is on an ISP server rather tiian on a server controlled by D.
  • the code run in A's terminal upon activation of the freephone graphical button 122 could be arranged to directly forward die enquiry request to the enquiry control system over the Internet rather than passing it back through the server 51.
  • the enquiry control system 126 manages enquiries passed to it to ensure diat tiiey are dealt widi in an ordered manner.
  • the system 126 on receiving a new enquiry preferably estimates approximately how long it will be before the enquiry is dealt widi, this estimation being based on die number of currently queued enquiries and die average time taken to handle an enquiry. This estimation of waiting time is passed back via server 51 to user A in the response to the POST request message.
  • the enquiry control system 126 looks after the distribution of enquiries to a number of agents each of which is equipped widi a telephone 40 and a display 129.
  • A's enquiry will be dealt with as soon as it reaches die head of the queue 127 and tiiere is an agent detected as available to handle die enquiry (thus, for example, the system may be arranged to detect when an agent's telephone goes on hook).
  • a distribution and semp control unit 128 takes A's enquiry and displays A's name and telephone number on die display 129 of die available agent (for clarity, herein referenced as agent D'); if user D keeps a database on D's past customers or credit rating data, dien unit 128 will also look for and display any such further information known about A.
  • unit 128 makes a tiiird-party call semp request (arrow 130) over die Internet to gateway 90 asking for a call to be set up between the telephone of die available agent D' and die telephone of user A, botii telephones being identified by dieir respective numbers. If both D' and A pick up the call, the enquiry then proceeds, die cost of the call being paid for by D as it is D that originated the call over die PSTN. If, for whatever reason, die call remains incomplete (for example, unanswered by A) for a predetermined timeout period, dien unit 128 can be arranged to automatically pass on to the next enquiry at the head of the queue 127.
  • the lattter could send a response to SCP 43 asking it to play an announcement such as "Your freephone enquiry has been registered; please hang up and you will be contacted shortly". This announcement could be played to A by an IP in standard manner. A would dien hang up and be ready to receive a call from D.
  • a significant advantage of die above freephone schemes using WWW is that user D is not running up charges for use of the PSTN during periods when an enquiry is enqueued, waiting to be handled.
  • the SCP 43 may access die HTTP servers 51 through a distributed processing environment, DPE 98, at least logically separate from the Internet.
  • DPE 98 distributed processing environment
  • the servers 51 are controlled by PSTN operators and are thus restricted in number.
  • a dialled personal number triggers a lookup in the DNS-type system with all or part of the personal number being first parsed and then applied to the DNS type system to return a current number for call routing.
  • All dialled numbers could be treated as personal numbers or simply a subset of such numbers, this subset comprising numbers that are readily identifiable as personal numbers by, for example, local lookup at an SSP or the presence of a predetermined leading digit string.
  • the general concept of parsing a telephone number (or similar number) in whole or in part to form a domain name for resolution in a DNS-type distributed database system can be used for the retrieval of other items of information besides URIs and service resource items.
  • the servers 51 have held service resource items concerned primarily with call semp control. It may be noted that in a somewhat different application, Internet servers could be arranged to hold data that could be accessed from the telephone system in response to a user-initiated telephone request and returned to that telephone user. Such a service would be provided, for example, in response to an SSP triggering a service request upon a particular telephone number being input, the service request prompting an SCP to cause an intelligent peripheral to access a particular Internet server (not necessarily an HTTP server) and retrieve the required data for return to the calling party.
  • the intelligent peripheral may include a text-to- voice converter for replaying die data vocally to die user.
  • a telephone user G may subscribe to a service by which calls passed tiirough to G's telephone are to be separated by a minimum of X minutes, X being user settable.
  • G has a phone page on a server 51 that includes a "busy" stams indication.
  • G's local SSP Upon termination of a successful call to G, G's local SSP triggers the sending of a message by die associated SCP over the Internet to G's phone page. This message causes G's busy indication to be set to indicate that G is busy; die message also starts a timer which times out after a period X and causes the busy stams indication to be reset.
  • a call attempt to G will either be rejected at G's SSP because G's line is genuinely busy or will trigger die SSP to enquire via die SCP whether G's phone-page busy stams indication is set. If the busy stams indication is set (which it will be during the period X following termination of a successful call) die call attempt is rejected whereas if die busy stams indication is in its reset condition, the call attempt is allowed to proceed.
  • the busy stams indication mechanism By placing the busy stams indication mechanism on G's phone page, it is possible to arrange for G to be able to easily change the value of X. More General Variants.
  • the service control subsystem of the PSTN has been embodied as an SCP in die foregoing examples, it will be appreciated d i at d i e functionality of the service control subsystem could be provided as part of an SSP or in an associated adjunct.
  • the triggering of service requests can be effected by equipment od i er than SSPs, for example by intercept boxes inserted in the SS7 signalling links.
  • d i at the term "Internet” is to be understood to include not only d i e current specif i cation of die TCP/IP protocols used for the Internet and d i e current addressing scheme, but also evolutions of tiiese features such as may be needed to deal with isochronous media.
  • references to the WWW and the HTTP protocol should equally be understood to encompass tiieir evolved descendants.
  • the present invention can also be applied to telephone systems other than just PSTNs, for example to PLMNs and other mobile networks, and to private systems using PABXs.
  • a LAN or campus- wide computer network serving generally d i e same in t ernal users as the PABX, will take the role of the In t ernet in the described embodiments.
  • the present invention has application where any switched telecommunication system (for example, a broadband ATM system) requires service control and a compu t er network can be used for die delivery of service resources t o d i e service con t rol subsystem of the telecommunication system.
  • switched telecommunication system for example, a broadband ATM system
  • compu t er network can be used for die delivery of service resources t o d i e service con t rol subsystem of the telecommunication system.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephone Function (AREA)
  • Application Of Or Painting With Fluid Materials (AREA)

Abstract

A method of accessing a target entity over a communications network employs a distributed database system similar to the DNS of the Internet; indeed the DNS may be used as the required distributed database. The distributed database stores records each associated with a corresponding domain name and holding communication date for use in accessing a target entity. Each of these domain names is related to a respective number string from which it can be derived by a process including parsing at least a substantial portion of the number string into at least a part of said domain name. Upon the input of a number string indicative of a target entity, the related domain name is formed by parsing the number (step 120) and the domain name is then used to retrieve the corresponding communication data from the DNS-type distributed database system (step 121). This data is then used in accessing the target entity. In one embodiment, the communications network is a telephone network and the target entity is a called party; in this case, the number string comprises a dialed number and the retrieved communication data is a URI indicative of the location on the Internet of a current telephone number for the target party, the URI once retrieved being used to access the current telephone number over the Internet (step 123) for use in setting up a call to the target party.

Description

METHOD OF ACCESSING A TARGET ENTITY OVER A COMMUNICATIONS NETWORK
Field of the Invention
The present invention relates to a method of accessing a target entity over a cornmunications network. The present invention finds particular application to the provision of IN (Intelligent Network) services in a switched telecommunications system.
As used herein, the term "switched telecommunication system" means a system comprising a bearer network with switches for setting up a bearer channel through the network. The term "switched telecommunication system" is to be taken to include not only the existing public and private telephone systems (whether using analogue phones or ISDN-based), but also broadband (ATM) and other switch-based bearer networks that are currently being implemented or may emerge in the future. For convenience, the term "switched telecommunication system" is sometimes shortened herein to telecommunication system.
Reference to a "call" in the context of a switched telecommunication system is to be understood as meaning a communication through a bearer channel set up across the bearer network, whilst references to call setup, maintenance and takedown are to be taken to mean the processes of setting up, maintaining and taking down a bearer channel through the bearer network. Terms such as "call processing" and "call handling" are to be similarly interpreted.
The term "communication system" when used herein should be understood as having a broader meaning than switched telecommunication system, and is intended to include datagram-based communication systems where each data packet is independently routed through a bearer network without following a predetermined bearer channel. Background of the Invention
Telecommunication companies running PSTNs (Public Switched Telephone Networks) and PLMNs (Public Land Mobile Networks) are in the business of providing communication services and in doing so are providing increasing built-in intelligence in the form of "IN services" such as 800 number services and call forwarding. In contrast, the World Wide Web (WWW), which has seen explosive growth in recent times, is an example of an Internet-based global network providing complex information services. These two worlds, that of the large communications utilities and that of the highly dynamic, pioneer-spirit WWW information culture, are uneasy companions and each plans to encroach on the domain previously occupied by the others; thus telephony services will be offered over the WWW and information services over the public communication infrastructure.
The present invention proposes technologies for a more synergetic relationship between these two worlds than is currently envisaged and in order to place the present invention in context, a review will first be given of each of these two worlds.
Telephone Networks with IN Services
The Basic PSTN. The basic service provided by a PSTN (Public Switched Telephone Network) is the interconnection of two telephones (that is, setting up a bearer channel between the telephones) according to a called-party telephone number input at the calling-party telephone. Figure 1 is a simplified representation of a PSTN providing such a service. In particular, customer premises equipment, CPE, 10 (such as standard analogue telephones, but also more recently ISDN terminals) are connected through an access network 11 to switching points, SPs 12. The SPs 12 form nodes in an inter- exchange network 13 made up of interconnecting trunks 14 and SPs that are controlled by control entities 15 in the SPs. The control effected by the control entities 15 is determined by signalling inputs received from the CPEs and other SPs, and involves call setup, maintenance and clearance to provide the desired bearer channel between calling CPE and called CPE. Conceptually, the PSTN may be thought of as a bearer - network and a control (signalling) network, the function of the latter being to effect call control through the bearer network, namely the control of setup, maintenance and take down of bearer channels through the bearer network; in practice, the bearer and signalling networks may use the same physical circuits and even the same logical channels.
Thus, where the CPE is a traditional dumb telephone, control signalling between the CPE and its local SP is in-band signalling, that is, the signalling is carried on the same channel as used for voice; this signalling is interpreted and converted at the SPs 12 into signalling between SPs that uses a dedicated common-channel signalling network 16 (implemented nowadays using the SS7 protocol suite). Where the CPE is an ISDN terminal, signalling is carried in a separate channel directly from the CPE on an end- to-end. Modern SPs use the ISUP (ISDN User Part) SS7 protocol for inter-exchange call control signalling whether the CPE is a standard telephone or an ISDN terminal.
Telephone Numbering Plans - As certain aspects of the present invention are influenced by the structuring of telephone numbers, a brief description will now be given of the structuring of such numbers. Telephone numbers form an international, hierarchical addressing scheme based on groups of decimal digits. The top level of the hierarchy is administered by the ITU-T, which has allocated single-digit numeric codes to the major geographic zones (for example "1 " for North America, "2" for Africa, "3" for Europe, "4" for Europe, "5" for South America and Cuba, etc.). Within each zone countries are assigned 2 or 3 digit codes, so that within zone 3 France is "33", and within zone 4 the UK is "44". Administration of the numbering plan within a country is delegated to a national body, such as the Office of Telecommunications ("Oftel") in the UK. The following further description is based on the UK numbering plan, but the scheme described will be recognised as having widespread applicability.
In the UK all national numbers are prefixed by a code from 01 to 09 (the '0' prefix is dropped in international dialling). The currently assigned codes are "01 " for
Geographic Area Codes, "02" for Additional Geographic Area Codes, "04" for Mobile
Services, "07" for Personal Numbers, and "08" for Special Service (freephone, information). Normal wireline PSTN subscriber telephone numbers are allocated from the Geographic Area Code codes, and currently only codes prefixed by 01 are allocated. Geographic area codes are presently 3 or 4 digits (excluding the leading '0') and there are currently 638 geographic areas each with its own code. A full national UK dialled number takes two forms:
0 171 634 8700 area code local number (7 digit)
0 1447 456 987 area code local number (6 digit) The first case has the '0' prefix, a 3 digit area code and a 7 digit local number, and die second case has the '0' prefix, a 4 digit area code, and a 6 digit local number. Further interpretation of the local number will take place within the area exchange, as even a 6 digit address space is too large for a single switch, and for a typical local area several switches may be needed to host the required number of subscriber lines. This interpretation is opaque and is a matter for the area service provider.
In the current PSTN the inherently hierarchical and geographic interpretation of telephone numbers is mirrored by the physical architecture of the network. A telephone number is structured in a way that makes it easy to route a call through the network. At each step, the prefix of the number provides information about the current routing step, and me suffix (perhaps opaquely) provides information about subsequent routing steps; as long as a switch knows how to parse a prefix and carry out a routing step, it does not need to understand the content of the suffix, which is left for subsequent routing steps. For this reason the international and national switching fabric is also organised hierarchically.
Intelligent Networks. Returning now to a consideration of the current telephone network infrastruture, in addition to basic call handling, an SP may also serve to provide what are called IN (Intelligent Network) services; in this case the SP is termed a service switching point, SSP. An SSP 25 is arranged to suspend call processing at defined points-in-call upon particular criteria being met, and to delegate the continuation of call processing to a service control subsystem providing a service " control function (SCF) either in the form of a service control point, SCP 17 (see Figure 2) or an Adjunct 18. The Adjunct 18 is directly associated with an SSP 25 whilst the SCP 17 and SSP 25 communicate with each other via an extended common channel signalling (CCS) network 16 that may include signal transfer points (STP) 19. The SCP 17 may be associated with more than one SSP 25. Both the SCP 17 and Adjunct 18 provide a service logic execution environment (SLEE) 20 in which instances of one or more service logic programs (SLP) 21 can execute. The SLEE 20 and SLP 21 togeu er provide service control functionality for providing services to the SSP 25.
Service logic running in an SCP or Adjunct will generally make use of subscriber information stored in a service data function (SDF) 22 that may be integral with the SCP/ Adjunct or partially or wholly separate therefrom. The service data function (SDF), like the service control function (SCF) forms part of the service control subsystem of the PSTN. It may be noted that some or all of the service control function may be built into the PSTN switches themselves.
In addition to the SCP 17 and Adjunct 18, the Figure 2 network includes an intelligent peripheral (IP) 23. The IP 23 provides resources to the SSP 25 such as voice announcements and DTMF digit collection capabilities. The network will also include an operation system (not shown) that has a general view of the network and its services and performs functions such as network monitoring and control.
In operation, when the SSP 25 receives a call, it examines internal trigger conditions and, possibly, user information (eg dialled digits) to ascertain if the call requires a service to be provided by the service control subsystem 17, 18; the checking of trigger conditions may be carried out at several different points in call processing. Where the SSP 25 determines that a service is required it messages the service control subsystem (either SCP 17 or Adjunct 18) requesting the desired service and sending it a logic representation of the call in terms of its connectivity and call processing status. The service control subsystem then provides the requested service and this may involve either a single interaction between the SSP and service control subsystem or a session of interactions. A typical service is call forwarding which is a called-party service giving expression to an end-user requirement as simple as "if you call me on number X and it rings ten times, try calling number Y" . In this case, it is the SSP local to the called end-user that triggers its associated SCP (or Adjunct) to provide this service; it will, of course, be appreciated that the SSP must be primed to know that the service is to be provided for a called number X.
The above-described model for the provision of IN services in a PSTN can also be mapped onto PLMNs (Public Land Mobile Networks) such as GSM and other mobile networks. Control signalling in the case of a mobile subscriber is more complex because in addition to all the usual signalling requirements, there is also a need to establish where a call to a mobile subscriber should be routed; however, this is not a very different problem from a number of called-party IN services in the PSTN. Thus in GSM, the service data function (SDF) is largely located in a system named a Home Location Register (HLR) and the service control function in a system named a Visitor Location Register (VLR) that is generally associated on a one-to-one basis with each SSP (which in GSM terminology is called a Mobile Switching Centre, MSC).
Because subscribers are mobile, the subscriber profile is transported from the HLR to whichever VLR happens to be functionally closest to be mobile subscriber, and from there the VLR operates the (fixed) service using the subscriber profile and interacts with the SSP. The HLR and VLR thus constitute a service control subsystem similar to an SCP or Adjunct with their associated databases.
It is, of course, also possible to provide IN services in private telephone systems and, in this case, the service control function and service data function are generally either integrated into a PABX (Private Automatic Branch Exchange) or provided by a local computer. The service control subsystem, whilst present, may thus not be a physically distinct from the PABX.
The above-described general architectural framework for providing IN services has both strengths and flaws. Its main strength is that it works and many services have been successfully deployed, such as 800 number services, credit card calling, voicemail, and various call waiting and redirection services. However, despite years of standardisation, services are still implemented one-at-a-time on proprietary platforms and do not scale well. The approach has been based on large, fault-tolerant systems which provide services for hundreds of thousands or even millions of subscribers and take years to deploy. Furthermore, since the networks used to support these services also constitute the basic telephone infrastructure, anything attached to these networks must be rigorously vetted. Additionally, each country and operator tends to have local variations of the so-called standards making it difficult to supply standard products and thereby braking the dynamics of competition.
The World Wide Web
In contrast to me slow deliberate progress of the telephone infrastructure, the WWW has grown explosively from its inception in 1989 to become the primary electronic information distribution service in terms of spread, availability and richness of information content. Anyone can, for a modest outlay, become an information provider with a world- wide audience in a highly interconnected information architecture.
The WWW is a client-server application running over the Internet and using a client- server protocol which mandates only the simplest of exchanges between client and server. This protocol is HTTP (Hyper Text Transfer Protocol) which is optimised for use over TCP/IP networks such as the Internet; the HTTP protocol can, however, also be used over networks using different communication protocol stacks.
Since the availability of literature concerning the WWW has seen the same sort of growth as the WWW itself, a detailed description of the WWW, HTTP and the Internet will not be given herein. An outline description will, however, be given with attention being paid to certain features of relevance to the present invention.
The WWW uses the Internet for interconnectivity. Internet is a system diat connects together networks on a worldwide basis. Internet is based on the TCP/IP protocol suite and provides connectivity to networks that also use TCP/IP. For an entity to have a presence on the Internet, it needs bo access to a network connected to the Internet and an IP address. IP addresses are hierarchically structured. Generally an entity will be identified at the user level by a name that can be resolved into the corresponding IP address by the Domain Name System (DNS) of the Internet. Because the DNS or adaptions of it are fundamental to at least certain embodiments of the invention described hereinafter, a description will next be given of the general form and operation of the DNS.
The Domain Name System - The DNS is a global, distributed, database, and without its performance, resilience and scalability much of the Internet would not exist in its current form. The DNS, in response to a client request, serves to associate an Internet host domain name with one or more Registration Records (RR) of differing types, the most common being an address (A) record (such as 15.144.8.69) and mail exchanger (MX) records (used to identify a domain host configured to accept electronic mail for a domain). The RRs are distributed across DNS name servers world-wide, these servers cooperating to provide the domain name translation service; no single DNS server contains more than a small part of the global database, but each server knows how to locate DNS servers which are "closer" to the data dian it is. For present purposes, the main characteristics of the DNS of interest are:
The host name space is organised as a tree-structured hierarchy of nodes with each host having a corresponding leaf node; each node has a label (except the root node) and each label begins wi an alphabetic character and is followed by a sequence of alphabetic characters or digits. The full, or "fully qualified" name of a host is the string of node labels, each separated by a ". ", from the corresponding leaf node to the root node of the hierarchy, this latter being represented by a terminating "." in the name. Thus a host machine "fred" of
Hewlett-Packard Laboratories in Bristol, England will have a fully qualified domain name of "fred.hpl.hp.com. " (note that if a host name does not have a terminal " . " it is interpreted relative to the current node of the naming hierarchy). - Each host has one or more associated Registration Records (RRs).
There are a plurality of DNS servers each with responsibility for a subtree of the name space. A DNS server will hold RRs for all or part of its subtree - in the latter case it delegates responsibility for the remainder of die subtree to one or more further DNS servers. A DNS server knows e address of any server to which it has delegated responsibility and also the address of the server which has given it the responsibility for the subtree it manages. The DNS servers thus point to each other in a stmcturing reflecting that of the naming hierarchy.
An application wishing to make use of the DNS does so through an associated "resolver" that knows the address of at least one DNS server. When a DNS server is asked by this resolver for an RR of a specified host, it will return either the requested RR or the address of a DNS server closer to the server holding the RR in terms of traversal of the naming hierarchy. In effect, the hierarchy of the servers is ascended until a server is reached that also has responsibility for the domain name to be resolved; thereafter, the DNS server hierarchy is descended down to the server holding the RR for the domain name to be resolved. ~ The DNS uses a predetermined message format (in fact, it is the same for query and response) and uses the IP protocols.
These characteristics of the DNS may be considered as defining a "DNS-type" system always allowing for minor variations such as in label syntax, how the labels are combined (ordering, separators), the message format ietails, evolutions of me IP protocols etc.
Due to the hierarchical naming structure, it is possible to delegate responsibility for administering domains (subtrees) of the name space recursively. Thus, the top-level domains are administered by InterNic (these top-level domains include me familiar 'com' , 'edu' , 'org' , 'int', 'net', 'mil' domains as well as top-level country domains specified by standard two-letter codes such as 'us' , 'uk', 'fr' etc.). At the next level, by way of example Hewlett-Packard Company is responsible for all names ending in 'hp.com' and British Universities are collectively responsible for all names ending in 'ac.uk'. Descending further, and again by way of example, administration of the domain 'hpl.hp.com' is the responsibility of Hewlett-Packard Laboratories and administration of the subtree (domain) 'newcastle.ac.uk' is the responsibility of the University of Newcastle-upon-Tyne. Figure 3 illustrates me progress of an example query made from within Hewlett- Packard Laboratories. The host domain name to be resolved is 'xy.newcastle.ac.uk', a hypothetical machine at the University of Newcastle, United Kingdom. The query is presented to the DNS server responsible for the "hpl.hp.com" subtree. This server does not hold the requested RR and so responds with the address of the "hp.com" DNS server; this server is then queried and responds with the address of the 'com' DNS server which in turn responds with the address of the ' . ' (root) DNS server. The query then proceeds iteratively down the 'uk' branch until the 'newcastle.ac.uk' server responds with the RR record for the name 'xy' in its subtree.
This looks extremely inefficient, but DNS servers are designed to build a dynamic cache, and are initialised with the addresses of several root servers, so in practice most of the iterative queries never take place. In this case me 'hpl.hp.com' DNS server will know the addresses of several root servers, and will likely have the addresses of 'uk' and 'ac.uk' servers in its cache. The first query to the 'hpl.hp.com' server will return the address of the 'ac.uk' server. The second query to the 'ac.uk' server will return the address of the 'newcastle.ac.uk' server, and the third query will return the RR in question. Any future queries with a 'newcastle.ac.uk' prefix will go direct to the newcastle DNS server as that address will be retained in the "hpl.hp.com" DNS server cache. In practice names within a local subtree are resolved in a single query, and names outside the local subtree are resolved in two or three queries.
Rather than a resolver being responsible for carrying out the series of query iterations required to resolve a domain name, the resolver may specify its first query to be recursive in which case the receiving DNS server * responsible for resolving the query (if it cannot directly return the requested RR, it will itself issue a recursive query to a 'closer' DNS server, and so on).
It should also be noted that in practice each DNS server will be replicated, that is, organised as a primary and one or more secondaries. A primary DNS nameserver initialises itself from a database maintained on a local file system, while a secondary initialises itself by transferring information from a primary. A subtree will normally - have one primary nameserver and anything up to ten secondaries - the limitation tends to be the time required by the secondaries to update their databases from the primary. The primary database is the master source of subtree information and is maintained by the domain DNS administrator. The secondaries are not simply standby secondaries but each actively participates in the DNS with dependent servers that point to it rather than to the corresponding primary.
DNS implementations, such as BIND, are widely available as a standard part of most UNIX systems, and can claim to be among the most robust and widely used distributed applications in existence.
Operation of the WWW Referring now to Figure 4 of the accompanying drawings, access to the Internet 30 may be by direct connection to a network that is itself directly or indirectly connected to the Internet; such an arrangement is represented by terminal 31 in Figure 4 (this terminal may, for example, be a Unix workstation or a PC). Having a connection to me Internet of this form is known as having 'network access'. Any entity that has network access to the Internet may act as a server on the Internet provided it has sufficient associated functionality; in Figure 4, entity 32 with file store 37 acts as a server.
Many users of the WWW do not have network access to the Internet but instead access me Internet via an Internet service provider, ISP, 33 that does have network access. In this case, the user terminal 34 will generally communicate with the ISP 33 over the public telephone system using a modem and employing either SLIP (Serial Line Interface Protocol) or PPP (Point-to-Point Protocol). These protocols allow Internet packets to traverse ordinary telephone lines. Access to me Internet of this form is known as "dialup IP" access. Wim ύ is access method, the user terminal 34 is temporarily allocated an IP address during each user session; however, since this IP address may differ between sessions, it is not practical for the entity 34 to act as a server. - A cornerstone of the WWW is its ability to address particular information resources by means of an Uniform Resource Identifier (URI) that will generally be either a
Uniform Resource Locator (URL) that identifies a resource by location, or a Uniform
Resource Name (URN) that can be resolved into an URL. By way of example, a full or "absolute" URL will comprise the following elements: scheme - this is the access scheme to be used to access the resource of interest; host - the Internet host domain name or IP address; port - the host port for the (TCP) connection; abs-path - the absolute path of the resource on the host.
In fact, the 'port' may be omitted in which case port 80 is assumed.
Figure 5 of the accompanying drawings shows an example URL for the Hewlett- Packard products welcome page. In this case, the elements are: scheme - http host - www.hp.com port - omitted (port 80 assumed) abs-path - Products.html
The HTTP protocol is based on a request/response paradigm. Referring again to Figure 4 of the drawings, given a particular URI identifying a resource 30 to be accessed, a client establishes a connection with the server 31 corresponding to the "host" element of the URI and sends a request to the server. This request includes a request method, and the "Request-URI" (which is generally just the absolute path of the resource on the server as identified by the "abs-path" element of the URI); the request may include additional data elements. The server 31 then accesses me resource 36 (here held on storage 37) and responds and this response may include an entity of a type identified by a MIME (Multipurpose Internet Mail Extensions) type also included in the response.
The two main request methods are:
GET - This method results in the retrieval of whatever information (in the form of an entity) is identified by me Request-URI. It is important to note that if the Request-URI refers to a data-producing process, it is the produced data which is returned as the entity in the response and not the source text of me process.
POST - This method is used to request that me destination server accept the entity enclosed in the request as a new subordinate of the resource identified by the Request-URI. The POST method can be used for annotation of existing resources, providing a message to a bulletin board, providing data to a data-handling process (for example, data produced as me result of submitting a form), and extending a database through an append operation.
In summary, the GET method can be used to directly retrieve data, or to trigger any process that will return an entity ( which may either be data or a simply an indication of the result of running the process). The POST method is used for registering data and specifying this method is also effective to trigger a process in the server to handle the posted data appropriately.
The passing of information to a process triggered to run on a server using either the GET or POST method is currently done according to an interface called the Common Gateway Interface (CGI). The receiving process is often written in a scripting language diough this is not essential. Typically, me triggered server script is used for interfacing to a database to service a query included in a GET request. Another use, already referred to, is to append data associated with a POST request to a database.
Other important factors in the success of the WWW is the use of the HyperText Markup Language (HTML) for representing the makeup of documents transferred over the WWW, and the availability of powerful graphical Web browsers, such as Netscape and Mosaic, for interpreting such documents in a client terminal to present them to a user. Basically, HTML is used to identify each part of a document, such as a title, or a graphic, and it is then up to the browser running in the client terminal to decide how to display each document part. However, HTML is more than this - it also enables a URI and a request method to be associated with any element of a document (such as a particular word or an image) so that when a user points to and clicks on that element. the resource identified by the URI is accessed according to the scheme (protocol) and request method specified. This arrangement provides a hyperlink from one document to another. Using such hyperlinks, a user at a client terminal can skip effortlessly from one document downloaded from a server on one side of the world, to another document located on a server on the other side of the world. Since a document created by one author may include a hyperlink to a document created by another, an extremely powerful document cross-referring system results with no central bureaucratic control.
Hyperlinks are not the only intelligence that can be built into an HTML document. Another powerful feature is the ability to fill in a downloaded "Form" document on screen and then activate a 'commit' graphical button in order to have the entered information passed to a resource (such as a database) designed to collect such information. This is achieved by associating me POST request method with the 'commit' button together with the URI of the database resource; activating the 'commit' button results in the entered information being posted to the identified resource where it is appropriately handled.
Another powerful possibility is the association of program code (generally scripts to be interpreted) with particular documents elements, such as graphical buttons, this code being executed upon the button being activated. This opens up the possibility of users downloading program code from a resource and then running the code.
It will be appreciated by persons skilled in me art that HTML is only one of several currently available scripting languages delivering the functionality outlined above and it may be expected that any serious Web browser will have built-in support for multiple scripting languages. For example, Netscape 2.0 supports HTML 3.0, Java and LiveScript (the latter being Netscape proprietary scripting Language).
The importance of the role of the graphical Web browser itself should not be overlooked. As well as the ability to support multiple scripting languages, a Web browser should provide built-in support for standard media types, and the ability to load and execute programs in the client, amongst other features. These browsers may be viewed as operating systems for WWW interaction.
WWW and the Telephone Network It is possible to provide a telephony service over me Internet between connected terminals by digitising voice input and sending it over the Internet in discrete packets for reassembly at the receiving teπninal. This is an example of a communication service on the Internet. Conversely, it is possible to point to a variety of information services provided over the telephone system, such as the Minitel system widely available in France. However, these encroachments into each anothers traditional territories pose no real threat to either the Internet or the public telephone system.
Of more interest are areas of cooperative use of the Internet and the telephone system. In fact, one such area has existed for some considerable time and has been outlined above with reference to Figure 4, namely the use of a modem link over the PSTN from a user computer 34 to an Internet service provider 33 in order to obtain dialup IP access to me Internet. This cooperative use is of a very simple nature, namely the setting up of a bearer channel over the PSTN for subsequently generated Internet traffic; mere is no true interaction between me Internet and the PSTN.
Another known example of the cooperative use of the Internet and PSTN is a recently launched service by which an Internet user with a sound card in his/her terminal computer can make a voice call to a standard telephone anywhere in the world. This is achieved by transferring digitised voice over the Internet to a service provider near the destination telephone; this service provider then connects into the local PSTN to access the desired phone and transfers across into die local PSTN me voice traffic received over the Internet. Voice input from me called telephone is handled in the reverse manner. Key to this service is the ability to identify the service provider local (in telephony charging terms) to the destination phone. This arrangement, whilst offering the prospect of competition for the telecom operators for long distance calls, is again a simple chaining together of the Internet and PSTN. It may, however, be noted that in this case it is necessary to provide at least a minimum of feedback to the - Internet calling party on the progress of call set to the destination telephone over the PSTN local to that telephone; this feedback need only be in terms of whether or not the call has succeeded.
From the foregoing it can be seen that the current cooperative use of the Internet and telephone system is at a very simple level.
It is an object of the present invention to provide a method of accessing a target entity over a communications network that facilitates the integration of the PSTN and the WWW.
Summary of thp Tηventinn
According to one aspect of the present invention, there is provided a method of accessing a target entity over a communications network, said method comprising the steps of:
(a) - providing a DNS-type distributed database system storing records each associated with a corresponding domain name and holding communication data for use in accessing a target entity, each domain name being related to a respective number string from which it can be derived by a process including parsing at least a substantial portion of the number string into at least a part of the domain name;
(b) - supplying a number string indicative of a target entity and forming the related domain name by said process including parsing at least a substantial part of the number string into at least a part of a domain name; (c) - applying the domain name formed in step (b) to the DNS-type distributed database system to retrieve the communication data held in the corresponding record; and
(d) - using the communication data retrieved in step (c) in accessing the target entity.
In one application, the communications network is a telephone network and the target entity is a called party. In this case, the number string may comprise a dialed number and the retrieved communication data may be a current telephone number for the target - party. Alternatively, die retrieved communication data may be a URI indicative of the location on a computer network of a current telephone number for the target party, said URI being thereafter used to retrieve this current telephone number for use in accessing the target party.
In another application, the communications network is a computer network and the target entity is a resource item held at a corresponding URI on that network. In this case, the number string may comprise a telephone number for the target party and the retrieved communication data may be me URI of the target resource item. This target resource item is, for example, a current telephone number of a target party it is wished to call, said number string being a personal telephone number for that target party. More generally, the resource item may be: downloadable data which upon being accessed is intended to be downloaded to me accessing entity; — downloadable service logic which upon being accessed is intended to be downloaded to the accessing entity for execution thereby, service logic intended to be executed in place upon being accessed wid the result of mis execution being returned to the accessing entity;
As regards the parsing of said at least a substantial part of the number string into at least a part of a domain name, diis can be done by dividing said substantial portion into label segments according to a division scheme which is the same for all number strings. However, where the number string is an international telephone number, the parsing of this number preferably involves forming a label segment of the country code component of die international telephone number and men forming further label segments from die remainder of the international telephone number according to a division scheme the same for all such numbers. As an alternative, the forming of the further label segments from the remainder of the international telephone number can be effected according to a division scheme that is dependent on die identity of said country code component. The DNS-type distributed database system is adapted to handle a set of domain names diat make up a name space herein referred to as the "telname space". In one arrangement, the root of the telname space is the root of the overall name space handled by die DNS-type distributed database system. However, in a preferred implementation, the DNS-type distributed database system is provided by the DNS of die Internet and in diis case the telname space may be provided by one or more subdomains of die DNS. For example, where the number strings are telephone numbers, die telname space may form a "tei" subdomain in the domain .itu.int. of me DNS; alternatively, the telname space may be provided by respective subdomains in at least some of the country domains of the DNS.
Where the telname space is a subdomain of a larger name space, a predetermined part of the number string may be used to look up a domain name tail corresponding to me root of me telname space in the larger name space. This domain name tail is men added to the domain name part derived by said parsing of at least a substantial portion of die number string. Thus, where the number string is an international telephone number and the telname space is split between country subdomains, the country code component can be used to look up me domain name tail corresponding to me appropriate subdomain.
Brief Description of the Drawings
Embodiments of the present invention will now be described, by way of non-limiting example, with reference to die accompanying diagrammatic drawings, in which:
.Figure 1 is a simplified diagram of a standard PSTN;
.Figure 2 is a simplified diagram of a known PSTN w h IN service capability;
.Figure 3 is a diagram illustrating host domain name resolution by the DNS of me Internet; .Figure 4 is a diagram illustrating die functioning of the World Wide Web;
.Figure 5 is a diagram illustrating the format of a standard URL; ' .Figure 6 is a diagram of a first arrangement in which service resource items are held on HTTP servers accessible both by me service control subsystem of a PSTN and by Web users; .Figure 7 is a diagram illustrating me processing of a service request by the SCP of Figure 6;
.Figure 8 is a diagram illustrating the format of a resource code used by the
Figure 6 SCP when accessing a service resource item; .Figure 9 is a diagram illustrating the process of accessing a service resource in die case where me service code does not include an RRI part; .Figure 10 is a diagram illustrating the process of accessing a service resource in the case where the service code includes an RRI part; .Figure 11 is a diagram illustrating the derivation of the URI of a service resource by parsing an input telephone number in accordance with the present invetion; .Figure 12 A is a diagram depicting a name space (the "telname space") constituted by the domain names derived by a parsing of a predetermined set of telephone numbers; .Figure 12B is a diagram depicting the incorporation of die telname space wimout fragmentation into the DNS; .Figure 12C is a diagram depicting the incorporation of die telname space in fragmented form into the DNS; .Figure 13 is a diagram illustrating the overall operation of the Figure 6 arrangement in providing a roaming number service in response to a telephone number being dialled at a standard phone; .Figure 14 is a diagram illustrating the overall operation of the Figure 6 arrangement when utilised by a Web user in setting up a call dirough a telephone interface integrated into the user's Web terminal; .Figure 15 is a diagram illustrating me overall operation of an arrangement in which an interface is provided between die PSTN and the Internet for telephone traffic;
.Figure 16 is a diagram illustrating the overall operation of an arrangement in which a call setup gateway is provided between me Internet and the PSTN; .Figure 17 is a diagram illustrating the overall operation of an arrangement in which a freephone service is implemented for Web users; and
.Figure 18 is a diagram similar to Figure 6 illustrating the provision of a distributed processing environment for interconnecting elements of the service control subsystem of the PSTN.
Best Mode of Carrying Out the Invention
Figure 6 illustrates an arrangement for me provision of services in a PSTN conventionally comprising an inter-exchange network 13 (including trunks and switches at least some of which are SSPs 41 wi associated LPs), an access network 11 connecting customer permise equipment (here shown as telephones 40) to the network 13, and a service control subsystem 42 including at least one SCP for providing services to die SSPs 41 upon request. It will be appreciated ύiat the Figure 6 representation of a PSTN is highly diagrammatic.
The SCP 43 may operate in a conventional manner responding to service requests from SSPs 41 to run specific service logic on particular data according to information contained in the service request, and to send back to the requesting SSP appropriate instructions for effecting call set up. A service request is generated by e SSP in response to predetermined trigger conditions being met at a trigger check point, mere being one or more such check points in the course of handling a call (it may be noted that where die trigger conditions have been downloaded to die SSP from die SCP men it could be said that die SSP is responding to an information request by the SCP when contacting die SCP upon die trigger conditions being met - however, in the present specification, iis initial communication from the SSP to the SCP will be referred to as a "service request").
The SCP 43 is also provided with a network access interface 44 to the Internet 50 in order to make use of certain service resource items 49 (also referred to below simply as "service resources") during the course of processing at least certain service requests from die SSPs 41. These service resources 49 are held as WWW pages on HTTP servers 51 (more particularly, on service resource databases 52 of these servers 51). The WWW pages containing these service resources are referred to below as "phone- pages. The servers 51 are connected to the Internet and the phone pages are read accessible using respective URLs or URNs (for convenience, the more general term URI will be used hereinafter to mean the Internet-resolvable indicator of the location of a phone page).
The service resources may be service logic or service data and may be used by an otherwise standard service logic program running on the SCP, by accessing the phone page of the required resource using the appropriate URI. In certain cases, the service resources 49 may provide substantially all of the service control and data associated with a particular service. In this case, the service logic program running in the SCP 43 is of skeleton form, being instantiated on receipt of a service request and then serving to initiate service resources access and to return the results of this access to the entity that made the service request. In fact, according to this approach, the SCP could be implemented simply as a platform for fetching and executing phone-page service logic and would not need to have the complex provisioning and management systems for such logic as is required by standard SCP platforms; SCPs could then become more ubiquitous, possibly being associated with every SSP.
Figure 7 is a flow chart illustrating the progress of events in the case where the SCP 43 handles a service request by accessing a phone-page service resource. Upon receipt of a service request in an INAP message (step 100), SCP 43 decodes the TCAP/INAP message structure in standard manner (steps 101 and 102) well understood by persons skilled in the art. Next, SCP 43 instantiates a service logic program, SLP, to handle the request (step 103). This SLP is then responsible for looking up the URL of the required service resource as determined from information contained in the service request (steps 104, 105). For example, if the service request relates to a called-party service, then the required resource will be indicated by the dialled number and the latter will be used to derive the URL of the resource. Once the URL of the desired service resource has been ascertained, a resource request (for example, in the form of an HTTP request message) is sent over the Internet to the corresponding server holding me desired service resource (step 106); a correlation ID is also passed witii die resource request to enable a response from the latter to be linked with die appropriate SLP instance. A timer is also started (step 107).
If a response is received from me accessed resource before me expiration of a time-out period (tested in step 108), dien me response, which is usually in the form of a destination number, is supplied to the appropriate SLP as identified using me correlation ID passed widi die response (step 109). An INAP/TCAP response message is then prepared and sent to the entity that made the original service request (steps 110 and 111) after which me SLP instance is terminated (113).
If in step 108, a time-out occurs before a response is received, then a default response value (generally a default destination number) may be looked up in me customer record and put in an INAP/TCAP message and sent back to me requesting entity (steps 114 to 116). The SLP instance is then terminated (113).
Locating & Accessing Service Resources
The functionality associated with accessing a phone-page resource is schematically represented in Figure 6 by resource access block 46. Block 46 includes URI determination block 47 for determining the URI of the phone page containing me desired resource on the basis of parameters passed to block 46. Using the URI returned by block 47, die resource access block 46 then accesses die phone page of me required service resource 49 over the Internet through interface 44.
Resource Codes - It is possible that more than one service resource is associated with a particular telephone number; in diis case the resource access block 46 will need to know additional information (such as current point- in-call, pic) to enable the appropriate service resource to be identified. If me service resources associated widi a number are located on different phone pages, then the additional information is also passed to the URI determination block 47 to enable it to return the URI of me appropriate phone page. It is also possible for all the service resources associated wi i a number to be located on the same phone page. In diis case, die resource access block 46 uses the additional information to pass a resource-identifying parameter with its access request to the phone page concerned; it is then up to the functionality associated with the phone page to access the correct service resource.
Thus, each service resource can be considered as being identified by a respective resource code 54 (see Figure 8) made up of a first part UI ("URI Identifier") used to identify the URI at which the resource is located on the Internet, and a second part RRI ("Relative Resource Identifier") used to identify the resource amongst plural resources at the same URI.
Resource Access - Where only one service resource 49 is located on a phone page 58 identified by a unique URI, then the resource code 54 simply comprises the UI, generally either a telephone number alone or a telephone number plus a pic parameter (see Figure 9). In this case, accessing a resource simply involves mapping the whole resource code 54 into the corresponding URI (process 55) and then sending a request
57 to the corresponding phone page 58, this latter itself constituting the desired service resource 49. The result of accessing resource 49 is then returned in response message 59.
In contrast, where multiple service resources 49 are located on the same phone page
58 (Figure 10), the resource code 54 comprises both a UI and RRI, the UI generally being a telephone number and the RRI a pic or other parameter for distinguishing between the co-located resources. In this case, accessing a resource involves mapping the UI part of the resource code 54 into the corresponding URI (process 55) and then sending a request 57 to the corresponding phone page (process 56), the request including the RRI of the resource code. The phone page 58 includes functionality 64 for accessing the required resource on the basis of the RRI in the request message. The result of accessing the required resource 49 is then returned in response message 59.
An alternative to the Figure 10 method of accessing a service resouce that is co-located with other resources on a phone page, would be to retrieve the whole page across the Internet simply using the URI derived from the UI part of the resource code, and dien to extract me desired resource on me basis of the RRI.
URI Determination from Resource Code - The implementation of the URI determination block 47 that performs process 55 will next be considered. Block 47 may be implemented in a variety of ways, four of which are described below:
Direct Input
It would be possible, diough not necessarily convenient, to arrange for me calling party to input directly the required URI. The calling party may thus input the host id component of the URI required (ehher in the form of a host domain name or host IP address) plus die path component of die URI. For example, in the case where the phone page of a called party is to be accessed, the calling party may input the URI of the called party and, indeed, diis input may substitute for me normal input of a telephone number. A leading input string (for example "999") may be used to identify die input as an URI. As regards die input means, where a user only has a standard 12 key telephone, input of host domain names and other URI elements requiring alpha characters, will need to be done using one of the standard techniques for alpha input from a phonepad (such techniques are already used, for example, to enable a calling party to "spell" out the name of the called party). It would also be possible to provide users wi i a full alphanumeric keypad to facilitate URI input.
Computation Service resource access over the Internet could be restricted to a set of dialled numbers from which it was possible to compute a corresponding URI; in diis case, diis computation would be die responsibility of block 47.
Association Table Lookup Probably the simplest implementation for the block 47 is as an association table
(eid er in memory or held on database disc store 48) associating a URI widi die UI part of each resource code. A potential problem with this approach is that a service resource may be required for a called party number on me odier side of me world which implies a rigorous update regime between PSTN operators worldwide in order to keep die association table up-to-date. (Note diat me same implication is not necessarily applicable in respect of marking the called-party number as one required to trigger a service request, since the number may be arranged to be one of a group of numbers all triggering an appropriate service request, in a manner similar to 800 numbers).
DNS -Type Lookup An alternative lookup solution is to use a hierarchically-structured distributed database system, similar to (or even part of) the Domain Name System (DNS) of the Internet, in order to resolve the UI part of a resource code to a corresponding URI. This approach, which will be described in more detail below, would typically involve databases maintained by each PSTN operator for its numbers widi which URIs are associated. These databases would be accessible by all PSTNs dirough a network such as die Internet widi resolution requests being pointed to die appropriate database in a manner similar to me Domain Name System. In this case, the block 47 is constituted by an appropriate resolution program arranged to request UI resolution over die Internet through interface 44.
Before describing a DNS-type lookup implementation for the URI determination block 47, some further general comments are appropriate. Whatever method is used to determine e URI, certain simplifications are possible if limited constraints are placed on the URIs permitted. In particular, it is not necessary to determine all components of an URI in the following cases:
(i) A part of the URI pad component can be made standard for all service resources, this standard part being simply added by the block 47 once the rest of the URI has been determined. For example, where a roaming number is to be looked up, it may by convention always be held in a file "roam" in a subdirectory "tei" of a subscriber's directory on a particular server. In this case die URI host component and die subscriber-unique part of the path component are first determined and men the remaining path part "/tel/roam" is added, (ii) The URI patii component can be arranged to be die same as a predetermined part of me resource code, me block 47 needing only to determine die host component and men add me path. For example, it may be agreed that me path must always end wid the telephone number concerned, or sufficient of die terminating digits to have a high probability of uniqueness on the host machine.
The patii may also include standard components to be added by block 47.
(iii) Blocks of telephone numbers may have tiieir corresponding service resources located on the same host server so that it is only necessary to use a part of the telephone number to determine die host component of the URI; in dus case, die path component can conveniendy include all or part of each telephone number. This situation implies a tight degree of control by d e telephone operators and does not offer die telephone user die freedom to choose the host server on which user places their phone page.
Another general point worthy of note is tiiat however the URI is determined, me host component of the URI may be provided eitiier in the form of a host domain name or a host IP address. Where die host is identified by a domain name, then a further resolution of URI host name to IP address will subsequendy be carried out in standard manner by interface 44 using the Domain Name System of die Internet. This further resolution can be avoided if d e host identity is directly provided as an IP address.
Where a database lookup is used to provide die number to URI translation, diis database may be independent of, or combined with, a customer database containing odier customer-related information. Factors affec diis choice include, on die one hand, die possible desirability of having die nui. cr-to-URI translation information widely available, and on the odier hand, me possible desirability of restricting access to other customer-related information.
DNS-Tvoe URI Lookup A DNS-type lookup implementation for die URI determination block 47 will now be described in some detail for me case where the UI part of the resource code is a telephone number and diere are no constraints on the URI, Λereby requiring both die full host and padi components of the URI to be returned by die lookup. A key part of the overall process is die formation of die equivalent of a host domain name from the telephone number of interest; diis domain-name equivalent is then resolved into a corresponding URI by a lookup mechanism which in me present example is identical to tiiat employed by die DNS (indeed, die lookup mechanism may be incoφorated into e DNS though it can also be independently implemented).
The nature of die DNS has already been described above widi reference to Figure 3 when the term "DNS-type" system was also introduced. For convenience in die following a DNS-type system organised to provide a telephone number to URI translation facility will be referred to as a "Duris" system (standing for "DNS-type URI Server" system).
The basic principles surrounding operation of a Duris system are:
- every telephone number can be turned into a host domain name (the name space containing such host domain names for the ?lephone numbers of interest is referred to below as die "telname space"); and
- for every host domain name in the host domain space there is a Registration Record held by the Duris system containing me corresponding URI.
Thus, an input telephone number forming, in me present case, die UI part of a resource code 54 (see Figure 11), is first parsed to form a domain name (step 120) and dien passed to die Duris system (illustrated in Figure 11 as formed by die DNS itself) to retrieve die RR with the corresponding URI (step 121). Following on from the URI lookup, if d e URI returned has its host component as a domain name, die DNS is next used to derive the host IP address (step 122); diis step is, of course not needed if die host component is stored as an IP address in the RR. The URI is dien used to make a resource request to the appropriate server, passing any RRI part of die resource code 54 (step 123). - There are a number of possibilities at the top level as to how a Duris system could be implemented:
(a) Independent of the DNS. In diis option, the telname space constitutes me entire name space to be managed widi die root of the telname space being die " . " name space root (see Figure 12A where me telname space is shown hatched).
In diis case, die Duris system is independent of die DNS itself. The Duris system could, of course, use die same basic infrastructure as die DNS (that is, the Internet) or an entirely separate network. Where die telname space comprises all the domain names corresponding to all public telephone numbers worldwide, parsing a full international telephone number would give a fully qualified domain name. Of course, me telname space could be a much smaller set of names such as tiiose derived from internal extension numbers within a company having worldwide operations.
(b) Unfragmented Telname Space within the DNS. In this option, the telname space is a domain of the DNS name space and die Duris system is provided by die
DNS itself. Thus, where he telname space comprises all domain names derived from public telephone numbers worldwide, die telname space could be placed within die domain of die ITU, in a special subdomain "tei", e root of the telname space men being "tel.itu.int. " (see Figure 12B where again, me hatched area represents the telname space). The responsability for administering the domain "tel.itu.int. " would dien lie widi die ITU. Widi diis latter example, to form a fully qualified domain name from an input telephone number, after the number has been parsed to form the part of the domain name corresponding to die structuring witiύn die telname space, the tail "tel.itu.int. " is added. The fully qualified domain name is men applied to me DNS and me corresponding
RR record, holding die required URI, is retrieved. As a further example, die telname space could be all name derived from internal extension numbers within Hewlett-Packard in which case die root of me telname space would be "tel.hp.com. " and Hewlett-Packard would be entirely responsible for managing this domain.
(c) Fragmented Telname Space witiiin me DNS. In diis option, die telname space is split between multiple domains of die DNS name space and d e Duris system is provided by die DNS itself. Thus where die telname space comprises all domain names derived from public telephone numbers worldwide, die telname space could be split between respective "tei" subdomains of each country domain; dius, as illustrated in Figure 12C, die part of die telname space corresponding to French telephone numbers would have a root of "tel.fr. " and die part of die telname space corresponding to UK telephone numbers would have a root of "tel.uk.". The responsability for administering each "tei" subdomain would dien lie widi each country. Widi diis latter example, to form a fully qualified domain name from an input telephone number, the part of the telephone number following me country code is parsed to form die part of the domain name within a country 'tei' subdomain and dien a host domain name tail is added appropriate for the country concerned. Thus for a French telephone number, me "33" country code is stripped from the number prior to parsing and used to add a tail of "tel.fr. " . The tail appropriate to each country can be stored in a local lookup table. As a further example, two commercial organisations (X company and Y company) with respective DNS domains of "xco.com. " and "yco.com. " may agree to operate a common Duris system with a telname space split between "tel.xco.com. " and "tel.yco.com" In this case, any Y company telephone number input from X company will e parsed to a fully qualified domain name terminating "tel.yco.com. " and vice versa.
Consideration will next be given to the parsing of a telephone number into a domain name - in other words, where to insert the ". " characters into me number to provide die structuring of a domain name. Of course, as already explained, telephone numbers are hierarchically strucmred according to each country's numbering plan. Thus one approach would be to follow this numbering plan structuring in dividing up a telephone number to form a domain name. By way of example, the telephone number "441447456987" which is a UK number (country code "44") with a four digit area code ("1447") and six digit local number ("456987") could be divided to form a domain name of 456987.1447.44 (note mat the reversal of label order occassioned by the fact that me DNS labels are arranged least significant first). If die telname space is a subdomain of die DNS widi a placement as illustrated in Figure 12B, the fully qualified domain name derived from die telephone number would be: 456987.1447.44.tel.itu.int.
There are however, difficulties inherent with trying to match the numbering plan hierarchy when parsing a telephone number into a host name. Firstiy, in order to parse an international number correctly, it would be necessary for each entity tasked widi diis operation to know the structuring of each country's numbering plan and where, as in the UK, area codes may be of differing length die required knowledge may need to take the form of a lookup table. Whilst diis is not a complicated computational task, it is a major administrative nuisance as it means tiiat each country will need to inform all others about its numbering plan and any updates. The second problem is that a six or seven digit local number is a very large domain; it would be preferable to create subdomains for performance and scaling reasons but mere is no obvious way of doing diis.
These problems can be overcome by giving up die restriction diat the parsing of telephone number into a domain name should match die structuring of national numbering plans. In fact, there is no strong reason to follow such a scheme as DNS servers know nothing about the meaning of me name space. It is dierefore possible to parse telephone numbers using a deterministic algoridim taking, for example, 4 digits at a time to limit the size of each subdomain and making it possible to 'insert die dots' without knowing die numbering plan concerned. So long as d e DNS domains and zones served by die DNS servers are created correctly it will all work.
For international numbers it would still seem appropriate to separate off the country codes and so a hybrid parsing scheme would be to parse the initial part of a dialled number according to known country codes and tiiereafter use a deterministic scheme (for example 3,7 or 4,6 or 3,3,4) to separate die digits. Of course, if a fragmented telname space is being used as illustrated in Figure UC then die country code is used to look up die host name tail and it is only me national part of the number which would be parsed. Finally, as regards the details of how a DNS server can be set up to hold RR records with URIs, reference can be made, for example, to "DNS and BIND", Paul Albitz and Criket Liu, O'Reilly & Associates, 1992 which describes how to set up a DNS server using the Unix BIND implementation. The type of die RR records is, for example, text.
It should be noted diat DNS labels should not in tiieory start with a digit. If dus convention is retained, dien it is of course a trivial exercise when parsing a telephone number to insert a standard character as the first character of each label. Thus, a 4 digit label of 2826 would become "t2826" where "t" is used as die standard starting character.
It will be appreciated diat as with domain names, where an input telephone number is not me full number (for example, a local call does not require any international or area code prefix), it would be parsed into a domain name in the local domain.
The foregoing discussion of Duris system implementation, has been in terms of translating a telephone number into an URI where the telephone number forms the full UI of a resource code and die Duris system returns a fujl URI. It will be appreciated diat the described Duris implementation can be readily adapted to accommodate die various modification discussed above regarding me form of the UI and what parts of die URI need to be looked up. For example, where there are a number of differents service resources associated widi a subscriber each in its own file and die required source is identified by a pic part of the resource code, dien the input telephone number will be used to look up, not the full URI, but the host component and diat part of the path component up to die relevant subdirectory, die pic part of die UI then being appended to identify die required resource file.
For small local Duris implementations, it may be possible to have a single server; the implementation should still, however, be considered as of a DNS type provided die odier relevant features are present. Nature of Service Resources
Turning now to a consideration of die service resources 49, how these service resources can be provisioned onto die servers 51 will be described more fully below but, by way of present example, die service resource or resources associated widi a particular PSTN user (individual or organisation, whether a calling or called party) can be placed on a server 51 over die Internet from a user teπninal 53 in one or more WWW pages.
Consider the simple case where the service resource is a service data item such as a telephone number (for example, an alternative number to be tried if die user's telephone corresponding to the number dialled by a calling party is busy). This diversion number could be made die sole service resource of a phone page of the user. The phone page URI could be a URL widi scheme set to HTTP in which case die GET mediod could be used to retrieve the diversion number. Such an arrangement is suitable if die phone page is only to be used for functional retrieval of the diversion number. However, if the diversion number is to be visually presented at a user terminal 53, dien it may be desirable to accompany the number with explanatory material (this will often not be necessary as the diversion number can be arranged to be returned into an existing displayed page diat already provides context information). However, where me phone page does include explanatory material as well as the diversion number, an entity only wishing to make functional use of die phone page, could be arranged to retrieve the phone page and dien extract die diversion number (this would, of course, require a standard way of identifying die information to be extracted from die phone page).
An alternative and preferred arrangement for providing for both viewing and functional access to a resource requiring explanatory material for viewing, is to use an object- oriented approach to resource design. In diis case, die resource object would have two different access metiiods associated widi it, one for purely functional use of the resource and the other enabling viewing of associated explanatory material. It would then be up to the accessing entity to access the resource object using the appropriate object method.
Yet another arrangement for providing for both viewing and functional use of the diversion number, would be to provide separate resources appropriately configured for each use, each resource having its own resource code (generally, both such resources would be placed on the same phone page and in this case the UI part of each resource code would be the same).
Retrieval of a phone page for use by a human user will generally not be as time critical as retrieval for operational use by a PSTN. Thus, while for human use the scheme specified in the URL of a service resource could be HTTP, it may be advantageous for operational use to define a special "phone" scheme (access protocol) which would result in the server 51 using an optimised access routine to access the required resource (diversion number, in the current example) and respond to the accessing entity in the minimum possible time.
Besides data items, other possible types of service resource include service logic for execution in place (at the server) with the result of this execution being returned to the entity accessing the resource; service logic downloadable from the server to the accessing entity for execution at that entity; and a logging resource for logging information passed to it by the accessing entity (or simply for logging the fact that is has been accessed). It will be appreciated that the logging resource is really just a particular case of service logic executable in place.
By way of example, a service resource constituted by execute-in-place service logic can be arranged to implement time-of-day routing, the result of executing the service logic being the telephone number to which a call should be routed taking account of the time of day at the called party's location. An example of a service resource constituted by downloadable service logic is service logic for controlling calling-party option interrogation using the facilities provided by an IP. As regards the logging resource, this can be used for recording the number of calls placed to a particular number. Where each resource has its own phone page and die resource is present only in its unembellished functional form, men the HTTP scheme can be employed for access using the GET method for both the downloadable service logic and the execution-in- place service logic, and me POST method for the logging resource. If it is desired to provide an explanatory material widi each service resource, dien any of the solutions discussed above in relation to data items, can be used.
Where more than one service resource is to be associated with a number, then each such resource can be placed on a respective phone page with its own URI. However, die preferred approach is to place all such service resources on the same page and use the RRI part of the corresponding resource codes to enable access to die appropriate resource. The accessed resource is then treated according to its form (executed if execute-in-place service logic, returned if downloadable service data or logic).
Thus if both a diversion-number service-data resource and a time-of-day execution-in- place service-logic resource are placed on the same phone page, the diversion-number resource code might have an RRI of " 1 " whilst the time-of day resource code might have an RRI value of "2".
Where calling/called party options are to be included in a service resource for presentation to such party, then as already indicated, this can convenientiy be done by constituting the service resource as downloadable service logic with the chosen option possibly initiating request for a follow-up service resource.
It will be appreciated that a service resource will often be of a complex type, combining service data and/or αownloadable service lθ£ and'or execute in place service logic. A particularly powerful combination is die cc ination of the two types of service logic where the downloadable service logic is ..esigned to interact with execute-in-place service logic; using this arrangement, the user can be presented with complex client-server type applications.
Example Usage of Service Resource Figure 13 illustrates die operation of a service making use of a resource on a server 51. This service is equivalent to a "personal number" service by which a user can be accessed tiirough a single, unchanging number even when moving between telephones having different real numbers. To achieve diis, die user requiring this service (user B in the current example) is allotted a unique personal number (here referred to as die "Webtel" number of B) from a set of numbers all of which have the same leading number string to enable an SSP to readily identify a dialled number as a Webtel number. User B has a service resource 49 on a dedicated phone page on HTTP server 51, diis phone page being located at a URL here identified as "URL (B phone page)" . B's phone page when accessed returns die current roaming number (" B-telNb") where B can be reached. In die simplest case, B's phone page is just a single number that can be modified by B (for example, from a terminal 53) as B moves to a different phone. More likely is that B's phone page is an execute-in-place service logic providing time of day routing.
In the present example, the association between B's Webtel number and die URL of B's phone page is stored in an association table accessible to SCP 43.
Upon a user A seeking to contact user B by dialling the Webtel number of B, die telephone 40 being used by A passes a call set up request to SSP 41 (note diat in Figure 13 the bearer paths tiirough die telephony network are shown by die diicker lines 60, e odier heavy lines indicating signalling flows). SSP 41 detects die dialled number as a Webtel number and sends a service request to SCP 43 together widi B's Webtel number. SCP 43 on receiving this service request initiates a service logic program for controlling translation of B's Webtel number into a current roaming number for B; in fact, in the present case, this program simply requests the resource access block 46 to access the service resource identified by B's Webtel number, (that is, B's phone page 49) and return die result of this access. To diis end, block 46 first translates B's Webtel number into the URL of B's phone page and dien uses diis URL to access B's phone page over the Internet (for example, using die 'phone' scheme already referred to with a method corresponding to die HTTP GET mediod). This results in B's current roaming number B-telNb being passed back to block 46 and in due course diis number is returned to die SSP 41 which dien initiates completion of call set up to die telephone 40 corresponding to B-telNb.
The Figure 13 example related to a called-party service; it will, of course, be appreciated diat the principle of accessing service resources over the Internet can be applied to all types of services, including botii calling-party and called-party services and hybrids. Thus, standard 800 number services can be implemented widi die dialled 800 number resulting in access to a phone page resource constituted by execute-in-place service logic that returns the most appropriate number for controlling onward call routing.
It will be appreciated diat altiiough in die Figure 13 example the service request from the SSP was triggered by a leading number string of a dialled number, a service request may be triggered by a variety of triggers including calling-party number, called-party number, or some other user input, such triggers being possibly qualified by call setup progress (for example, called-party number qualified by a busy status or by ringing for more than a certain time).
With respect to the logging service resource mentioned above, one possible application for such a resource is in telephone voting. In diis case, dialling die voting number causes the SSP picking up the call to pass a service request to SCP 43 which then contacts die appropriate logging resource over the Internet to register a vote after which the call is terminated. To minimise bottienecks, a logging resource could be provided at a different URL for each SCP, it being a simple matter to collect and collate voting from all mese logging resources over the Internet. τf an SCP widi Internet access is provided at every SSP, then die risk of congestion : greatly reduced.
As already noted, a user's phone page may hold multiple service resources in which case the access request from the accessing SCP needs to contain an appropriate RRI identifying the required resource. In the event diat an SCP is to provide botii a traditional IN service to some users and an equivalent service using an Internet-accessed service resource to other users, then a lookup table may need to be provided in the SCP to ensure diat a service request is appropriately handled; such a lookup table can conveniently be combined with me customer record database.
Once a user, such as user B, has set up one or more phone pages specifying his desired service resources (particularly service logic defining personalised services), it is clearly logical for user B to want any PSTN operator he cares to use, to access and utilise such service resources. This is possible if die Webtel-to-URI databases are available to all operators. Thus multiple operators could be set to access B's phone page or pages. If an operator declines to use B's phone pages, B can obviously chose not to use diat operator (at least where diat operator provides a long haul carrier service subject to user selection). The possibility therefore arises that service provision will cease to command a premium from operators, but that the provision of phone-page utilisation by an operator will become a necessary basic feature of PSTN operation.
Provisioning and Updating Service Resources
Consideration will next be given as to how die service resources 49 are provisioned to the servers 51 and subsequendy updated.
So far as provisioning is concerned, two basic actions are required: firstly, the service resource must be placed on a server 51 and, secondly, die URI of die service resource must be notified to die PSTN operator along wid die trigger conditions (number plus any other condition such as point in call) calling for access to the resource; if multiple resources are provided at die same URI, then die RRI values needed to retrieve the appropriate resource for a particular trigger condition, must also be notified. This notification process will be referred to hereinafter as 'registering' the service resource with die PSTN operator; registration is, of course, necessary to enable the association tables used by SCP 43 to be set up and for trigger conditions to be set in SSPs 43. For certain services, such as that described above widi reference to Figure 13, it is not me user that supplies the triggering number (me Webtel number in the Figure 13 example); instead, die PSTN operator allocates an appropriate number to me user as part of the registration process.
As to die process of placing a service resource on a server 51, how this is carried out will depend on the attitude of die PSTN operator to the possible effects of such service resources on operation of the PSTN. Where die service resource simply returns a data item to an accessing entity, dien an operator may not be too concerned about possible errors (accidental or deliberate) in implementing die service resource. However, die operator will probably be much more concerned about die proper operation of any service logic that may be returned by a resource; indeed, an operator may not permit such a service resource.
Assuming for me moment diat an operator has no concerns about the nature or implementation of service resources, dien how a resource is placed on a server 51 will largely depend on die nature of the server concerned. For example, if a user has a computer with network access to die Internet and diis computer is used as server 51, dien die user can simply load a desired resource onto the server as a WWW phone page for external access. A similar situation arises if the server is an organisation server to which the server has access over an internal LAN. In both these latter cases, loading die resource as a WWW phone page does not itself require Internet access. However, if the server 51 is one run by an external Internet service provider, dien a user can arrange to download die required service resource into die user's allocated Web site space on die server; diis may or may not involve Internet access. One special case of this latter scenario is where e PSTN operator provides a special server for user phone pages containing service resources.
Except where a user's own computer acts as server 51, placing a service resource on a server will generally involve clearing one or more levels of password protection.
As regards die origin of die service resource loaded by a user onto server 51, diis may be generated by the user or, particularly where die resource includes service logic, may be provided by a third party (including die PSTN operator). - If the PSTN operator wishes to have control over die service resources 49 to avoid any adverse effects on operation of the PSTN, two approaches are possible. Firstly, die operator could require diat every resource (or, possibly, a particular subset) had to be subject to a verification process before use, appropriate measures then being taken to avoid subsequent alteration of die resource by the user (except, possibly, for particular data items); in this respect, die operator could require that die resource be placed on a server under the operator's control and to which die user had no write access (except possibly for altering particular data items, as indicated above). A second, more attractive, approach to minimising adverse effects by die service resources 49, is for the operator to provide standard service resources to which a user could add die user's own data (and possibly make limited functional selections in case where die resource included service logic); die customised resource would dien be loaded onto a server 51 controlled by die operator. This process can be convenientiy implemented for a particular resource using an HTML "form" which a user could download over die WWW from the operator-controlled server. After completing the foπn and activating a 'commit' graphical button of the form, die entered information would be 'posted' back to die server where die information would be used to produce a customised service resource diereafter placed on die server for access over die Internet. An advantage of this approach is diat registration of die service resource with the operator is simultaneaously effected. (It may be noted diat if registration needs to be done as a separate act from having a service resource loaded on a server, dien using an HTML form is a very convenient way to implement me registration process).
From the foregoing it can be seen that whilst die provisioning process does not necessarily require information to be passed over the Internet, in many cases diis will be die best solution, particularly if an HTML form exchanged over the WWW can be used to produce a customised service resource. It should be noted diat producing a customised service resource using an HTML form is not limited to cases where the PSTN operator controls die server.
As regards updating service resources, there is likely to be a need to update certain data items on a fairly frequent basis (for example, roaming number). Where die PSTN operator does not place any controls on die service resources 49, then update is a relatively simple matter, only requiring write access to die server concerned (as already indicated, diis will generally involve one or more levels of password protection). However, where die PSTN operator exercises control over the service resources, for example by only permitting customisations of standard service resources, such customised resources being loaded on servers controlled by the operator), then write access to die service resource may be tightly controlled. Again, an HTML form may conveniently be used as die medium for modifying a data item in such cases; to me operator, this has the benefit of limiting die modifications possible whilst to die user, a form interface should provide a simple route to resource modification.
For more complex updates, it may be necessary to go through a process similar to that required for initial provisioning.
Particularly where die service resources are held on a server 51 controlled by die PSTN operator, resource update will generally involve communication over die Internet.
Web User Interaction Consideration will next be given to odier possible uses of the service resources held in phone pages on me servers 51. For example, if user B's phone page contains a diversion number, then provided diis phone page is read-accessible over die Internet from user A's terminal 53, user A can use a graphical Web browser running on terminal 53 to view B's phone page and discover B's diversion number. As earlier discussed, die diversion number may be passed to user A for display in an existing visual context giving meaning to the number, or may be passed to user A widi accompanying explanatory text.
A more useful example is a current roaming number service for user B. Suppose B's phone page 49 on server 51 (see Figure 14) is operative when accessed to return a current roaming number where B can be reached. Further suppose that user B has a Web site wid several Web pages written in HTML and each page contains a graphical 'phone' button which when activated uses die GET mediod to access B's phone page by its URL. Now if user A whilst browsing (arrow 66) B's Web site over me WWW from user A's terminal 53, decides diat he would like to call user B to discuss some item of interest, user A simply activates the phone button 65 on die currently viewed page of B. This causes B's phone page to be accessed using the HTTP request "GET URL (B Phone Page)" - see arrow 67.
B's current number to be called is dien determined and passed to user A's terminal 53 (see arrow 68) where it is displayed. An explanatory text concerning the number will generally also be displayed; for example die text "Please call me at the following number: " could be displayed, diis text being provided eitiier by die HTML script associated with die phone button, or from the phone page when re rning the current number. In fact, it would probably be more helpful to provide user A, not only widi die current number for reaching user B, but also with all numbers where B could be reached together widi die times when B was most likely to be at each number. Since this extra information is likely to be subject to frequent change, die only sensible way to provide the information is from the phone page. Thus, B's phone page not only provides the current number for reaching B, but also a text that includes numbers and times subject to change; scripting B's phone page is, of course, done in a way mat ensures diat variable data need only be altered in one place.
In a further example, B's phone page might include downloadable service logic for execution at user A's terminal. This is useful where choices are to be presented to a user, each choice producing a follow-up action such as fetching a further phone page. For example, the first-accessed phone page may be a family phone page giving die general telephone number for a family but also giving me user die possibility of selecting further phone information on each family member, such as a time-of-day dependent number; in diis case, each family member has their own follow-up phone page.
In the above scenarios, user A has been presented widi a number to call over the PSTN. User A can now pick up his standard telephone and dial the number given. In fact, a complication arises if A only has Internet access via a SLTP/PPP connection over an ordinary, non-ISDN, PSTN line since, in diis case, A's telephone line is already tied up widi making Internet access when gateway 90 seeks to set up a call to A's telephone; with an ISDN connection, as two channels are available, diis problem does not arise. One way of overcoming diis problem would be to have user A's terminal 53, after obtaining die number to call from B's phone page, automatically suspend its Internet session by storing any required state information (for example, current WWW URL being accessed) and dien terminate its SLIP/PPP connection to thereby free up the telephone line. A can men telephone B. At the end of diis call, A can resume the suspended Internet session, using the stored state information to return to the point where A left off to call B. An alternative approach is to operate a suitable multiplexing modulation scheme on die telephone line to A allowing voice and data to be simultaneously carried. A number of such schemes already exist. The PSTN would dien need to separate die combined data and voice streams coming from A at some point and pass each to its appropriate destination (die Internet data being forwarded to die ISP providing the SLIP/PPP connection for user A and die voice stream being passed to B); of course, data and voice traffic in the reverse direction would also need combining at some point for sending over the last leg to A's teπninal.
Ratiier than A manually dialling B using a standard telephone, anotiier possibility is tiiat user A's terminal is provided widi functionality enabling A to make a call over die PSTN from his terminal; diis functionality generally comprises a hardware interface 70 (Figure 14) to a telephone line and phone driver software 71 for driving the interface 70 in response to input from application software such as die Web browser 73. A could call up his phone software and enter die required number or, preferably, A need only "select" on screen the number returned from B's phone page and dien pass it into A's phone software. Indeed, provided user B knew die software interface to the software 71 providing dialling functionality on A's terminal, it would be possible for B's phone page to return to A's terminal program code for automatically dialling B's number upon A confirming mat he wishes to proceed with call placement. As an alternative to placing a voice call, if A's terminal is equiped widi a suitable modem and controlling software. A could, instead, elect to send a fax or data to B drrough die PSTN eitiier to B's ordinary number or to one specified in B's phone page as die number to be used for such transmissions. Of course, placing a call from A's terminal over the PSTN may be subject to the problem already discussed of conflict for use of the telephone line where tins is not an ISDN line and A gains Internet access via a SLIP/PPP connection.
However the call is placed, if B's telephone corresponding to die number tried by A is busy, a number of possibilities exist. Thus if B has a phone page diat specifies a diversion number, and B has registered diis service resource with die PSTN, dien me diversion number should be automatically tried by die PSTN. However, if die diversion number resource has not been registered widi die PSTN, a busy signal will returned to A. Where A has placed die call tiirough a standard telephone, A must now decide how to proceed and A may elect eitiier to give up or to refer again to B's phone page to look up the diversion number and redial using diis number. If A placed die original call using his terminal 53 then die latter can be programmed to detect die return of a busy signal and then automatically look up B's diversion number and redial using diis number. This functionality can be included in service logic downloaded from B's phone page and run on A's terminal.
If A had to terminate his Internet session in order to free up die telephone line for voice use, then referring back to B's phone page requires a new Internet session to be started (in fact, this inconvenience could be avoided if B's diversion number were passed to A's terminal at the time die original number to be dialled for B was supplied).
The service resource accessed on B's phone page upon B's telephone being busy may, of course, be more complex than just a diversion number. In particular, user A may be presented with a range of options including, for example, B's fax or voice mailbox number, the selection of an option potentially initiating die πinning of appropriate accessing software. Another possible option would be for A to leave B a call back message using a form downloaded from B's phone page upon this option being chosen; die completed form would be posted back to server 51 and logged for B to check in due course.
Of course, it may arise that user A wishes to access B's phone page to find out, for example, B's current roaming number, but user A does not know die URI of B's Web site and only has B's Webtel number. A could just call B tiirough the PSTN in which case the translation of B's Webtel number to roaming number would be automatically effected (assuming B is still registered for diis service); however, A may not wish to call B straight away, but just note his current roaming number. In order to solve A's problem, the Webtel-to-URI association tables previously described are preferably made accessible on the Internet at a known address (for example, at a known Web site). All that A need now do is to access diis Web site passing B's Webtel number; B's phone page URI will then be returned to A who can then use it to access B's phone page. This process can, of course be made automatic from the point when A sends B's Webtel number to die association-table Web site.
Internet/PSTN Call Interface In the Figure 14 scenario, A's access to the PSTN was tiirough a standard telephone interface even though die actual form of A's telephone differed from standard by being integrated into A's computer terminal 53. Figure 15 illustrates a situation where A, after being supplied widi B's current roaming number as in the Figure 14 case, calls B via a route that starts out over the Internet and then passes through a user network interface 80 into the PSTN. Interface 80 is arranged to convert between ISDN-type telephone signalling on die PSTN and corresponding signalling indications carried across the Internet in IP packets; in addition, interface 80 transfers voice data from IP packets onto trunk 60 and vice versa.
Thus, upon A initiating a call to B, Internet phone software 81 in A's terminal sends call initiation signalling over the Internet to interface 80, die address of which is already known to A's terminal. At interface 80, the signalling is converted into ISDN- type signalling and passed to SSP 41. Call set up dien proceeds in the normal way and return signalling is transferred back tiirough interface 80, over die Internet, to die software 81 in A's terminal. This software passes call semp progress information to the WWW browser 73 for display to A. Upon die call becoming established, A can talk to B through his telephone and A's voice input is first digitised in phone hardware interface 83 and then inserted into IP packets by software 81 to traverse the Internet to interface 80 (see arrow 84); voice traffic from B follows the reverse path.
IN services can be provided to this call by SCP in response to a service request from an SSP 41. Thus, if B's phone is busy, and B is registered for call diversion, SCP 43 on receiving a service request will access B's appropriate phone page for call diversion and retrieve the diversion number. If SSP 41 is not set to initiate a service request on B's telephone being busy, die busy indication is returned to A's terminal where it can be handled in the manner already described widi reference to Figure 14.
In fact, interface 80 can be provided widi functionality similar to an SSP to set trigger conditions and generate a service request to SCP 43 on these conditions being satisfied.
Third-Partv Call Semp Gateway Figure 16 illustrates a further arrangement by which A can call B after receiving B's current roaming number. In this case, a third-party call set-up gateway 90 is provided diat interfaces both with die Internet 50 and widi an SSP 41. Conveniently, gateway 90 can be co-located with SCP 43 (though this is not essential). Gateway 90 has the capability of commanding SSP 41 to set up a call between specified telephones.
Thus, upon A wishing to call B, a third-party call semp request is sent from A's terminal over the Internet to the gateway 90 (see arrow 91). This semp request includes A's telephone number and B's current roaming number. Gateway 90 first attempts to semp the call to A's telephone (which should generally succeed) and tiiereafter to set up the call to B's identified telephone. Once the call is semp, A and B communicate in standard manner across the PSTN. If B's phone had been busy, dien any of die previously described scenarios may ensue.
Gateway 90 can also be arranged to make service requests to SCP 43 upon predetermined trigger conditions being satisfied. Thus, gateway 90 might be set to pick up the busy condition on B's telephone and initiate a service request to SCP 43 for a diversion number. However passing die busy indication back to A's terminal via gateway 90 is preferred because of die flexibility it gives A regarding further action.
As already generally discussed in relation to Figure 14, a complication arises if A only has Internet access via a SLIP/PPP connection over an ordinary, non-ISDN, PSTN line since, in this case, A's telephone line is already tied up with making Internet access when gateway 90 seeks to set up a call to A's telephone. The solutions discussed in respect of Figure 14 (termination of Internet session; multiplexing voice and Internet data on same telephone line) can also be used here. An alternative approach both for Figure 14 and for Figure 16 scenarios is possible if user A's terminal can handle a voice call as digitised voice passed over die Internet. In this case, the voice call can be placed through an interface 80 of the Figure 15 form, and die voice traffic and die
Internet communication with the B's phone page and/or gateway 90 are both carried in Internet packets passed over die SLIP/PPP connection to/from A's terminal 53 but as logically distinct flows passed to separate applications running on terminal 53.
It may be noted that the third party call semp request made by A's terminal to gateway 90 could equally have been made by service logic held in B's phone page and executed by server 51 (such an arrangement would, of course, require A's telephone number to be passed to B's phone-page service logic and this could be arranged to occur either automatically or through a form presented to user A at terminal A and dien posted back to server 51).
It may also be noted that the interface 80 of Figure 15 and die gateway 90 of Figure 16 provide examples of service requests being passed to die service control subsystem by entities other than SSPs 41. WWW-based "FreePhone" (800 number) Services
It is possible to implement a "FreePhone" or "800 number" type of service using a combination of the WWW and die PSTN. As will be seen from die following description of such a service with reference to Figure 17, a WWW/PSTN implementation does not necessarily rely either on transferring call charges from the calling to called party or on die use of a special "800" number, two characteristics of standard "Freephone" schemes. The WWW/PSTN implementations do, however, possess the more general characteristic of placing an enquiring party and die party to whom the enquiry is directed, in telephone contact at die expense of die latter party.
In the Figure 17 arrangement, a user D such as a large department store has a website on a server 51 ; for the sake of simplicity, it will be assumed diat the server is under d e control of user D who has direct computer access to the server over line 125. D's Website may, for example, contain many catalogue-like Web pages illustrating goods offered for sale by D. In addition, D has a freephone page 124 for handling enquiries placed on a freephone basis; die URL of diis page is associated with a "freephone" graphical button 122 placed on each of die Website catalogue pages.
Suppose user A at terminal 53 is browsing D's Website, looking at the catalogue pages (arrow 121). If A sees an item of interest and wishes to make an enquiry to D about this item, men A can activate at terminal 53 the graphical freephone button 122 associated with the catalogue page concerned. This activation causes code embedded in me catalogue page currently loaded in A's terminal to prompt the user to enter their telephone number and, optionally, tiieir name, after which an HTTP request is sent to D's freephone page using die POST method and enclosing die entered data (arrow 123). D's freephone page on receiving this request executes service logic to enter a new enquiry (including A's name and telephone number) in an enquiry queue 127 maintained in an enquiry control system 126. In die present example, the enquiry control system is connected to die server 51 via line 125, externally of the Internet; however, it would also be possible to have server 51 communicate with the enquiry control system through the Internet and, indeed, diis may be die most practical arrangement where D's Website is on an ISP server rather tiian on a server controlled by D. In fact, the code run in A's terminal upon activation of the freephone graphical button 122 could be arranged to directly forward die enquiry request to the enquiry control system over the Internet rather than passing it back through the server 51.
The enquiry control system 126 manages enquiries passed to it to ensure diat tiiey are dealt widi in an ordered manner. The system 126 on receiving a new enquiry preferably estimates approximately how long it will be before the enquiry is dealt widi, this estimation being based on die number of currently queued enquiries and die average time taken to handle an enquiry. This estimation of waiting time is passed back via server 51 to user A in the response to the POST request message.
The enquiry control system 126 looks after the distribution of enquiries to a number of agents each of which is equipped widi a telephone 40 and a display 129. A's enquiry will be dealt with as soon as it reaches die head of the queue 127 and tiiere is an agent detected as available to handle die enquiry (thus, for example, the system may be arranged to detect when an agent's telephone goes on hook). When tiiese conditions are met, a distribution and semp control unit 128 takes A's enquiry and displays A's name and telephone number on die display 129 of die available agent (for clarity, herein referenced as agent D'); if user D keeps a database on D's past customers or credit rating data, dien unit 128 will also look for and display any such further information known about A. At the same time, unit 128 makes a tiiird-party call semp request (arrow 130) over die Internet to gateway 90 asking for a call to be set up between the telephone of die available agent D' and die telephone of user A, botii telephones being identified by dieir respective numbers. If both D' and A pick up the call, the enquiry then proceeds, die cost of the call being paid for by D as it is D that originated the call over die PSTN. If, for whatever reason, die call remains incomplete (for example, unanswered by A) for a predetermined timeout period, dien unit 128 can be arranged to automatically pass on to the next enquiry at the head of the queue 127.
It would, of course, be possible to dispense with having the unit 128 request call semp through gateway 90 and eitiier have die agent D' dial A's number manually or have unit 126 initiate auto-dialling for D' telephone (agent D' having, for example, a computer-integrated telephone similar to that of A's in Figure 14). The advantageof tiiese approaches is that the existing PSTN could be used widiout adaption and widiout any service installation, in implementing the WWW-based freephone service.
As discussed in relation to Figures 11 and 13, a complication arises in placing a call to A if A only has Internet access via a SLIP/PPP connection over an ordinary, non- ISDN, PSTN line since, in this case, A's telephone line is already tied up widi making Internet access when user D tries to set up a call to A's telephone. The solutions discussed in respect of Figures 11 and 13 can also be used here (termination of Internet session; multiplexing voice and Internet data on same telephone line; and placing the call over the Internet to A's terminal). With respect to the solution based on termination of the Internet session, such termination could be delayed until A's enquiry was about to be dealt with; however, to do diis, it would be necessary to provide feedback from the control system 126 over die Internet to A's terminal 53 and to associate this feedback widi code for bringing about Internet-session termination. One way to achieve this would be to have die response message sent by server 51 in reply to the original POST request message from A, include a correlation code; any subsequent feedback from system 126 passed to A would also include diis code (server A having also passed the code to control system 126) thereby allowing A's terminal to correctly identify this feedback. In fact, the same mechanism could be used to provide user A with updates on how much longer user A is likely to be waiting to be called back, this mechanism being usable independently of whetiier or not there was a conflict problem for use of A's telephone line.
Where user A only has a telephone 40 and no terminal 53, it is still possible to utilise the basic structure of Figure 17 to provide a freephone service for user A without resorting to the complexity of call charge transfer. More particularly, A would dial a special number for user D's freephone service (typically an 800 number), and die SSP 41 would recognise this special number in standard manner and make a service request to SCP 43 including both this special number and A's number. SCP 43 would then ascertain D's freephone-page URL by doing a number-to-URL translation and access D's freephone page using a POST-method HTTP request similar to request 123. Once diis request had been registered as an enquiry by D's freephone page 124, the lattter could send a response to SCP 43 asking it to play an announcement such as "Your freephone enquiry has been registered; please hang up and you will be contacted shortly". This announcement could be played to A by an IP in standard manner. A would dien hang up and be ready to receive a call from D.
A significant advantage of die above freephone schemes using WWW, is that user D is not running up charges for use of the PSTN during periods when an enquiry is enqueued, waiting to be handled.
Variants
Many variants are, of course, possible to the above-described arrangements and a number of these variants are described below.
Distributed Processing Environment. As is illustrated in Figure 18, the SCP 43 may access die HTTP servers 51 through a distributed processing environment, DPE 98, at least logically separate from the Internet. Preferably in this case the servers 51 are controlled by PSTN operators and are thus restricted in number.
Service Resources on DNS-Type Servers. In the foregoing examples, me service resource items have been been placed on servers 51 connected to the Internet and a desired service resource has then been accessed over the Internet by the service control subsystem of the PSTN, and/or by Internet users, through the use of an URI derived from a resource code that identifies the the desired service resource item. In a preferred arrangement for deriving the URI from a resource code in the form of a telephone number, all or part of the telephone number concerned was parsed into domain name form and then resolved into an URI using a DNS-type distributed database system that, indeed, could be integrated into the DNS itself (see Figures 11 and 12, and related description). In fact, it would be possible to place service resource items directiy in Registration Records held by a DNS-type distributed database system so that instead of the parsed telephone number being resolved to an URI which is then used to access the required resource, the parsed telephone number is directly resolved to the required service resource item. The mechanism employed in this process is exactly as already described for resolving a parsed telephone number into an URI. The DNS-type distributed database system used for this would preferably be one accessible over die Internet or die DNS itself so as to provide access to die service resource items for Internet users as well as for the service control subsystem of the PSTN (in the same manner as described above with reference to Figure 18, the DNS-type servers holding the service resource items may be accessible to the service control subsystem by a network other than die Internet). Whilst the placing of service resource items in RRs held on DNS-type servers may not be suitable for all types of service resource items, it is suitable for items such as telephone numbers that do not change frequently. Thus, a suitable usage is to provide number portability; in this case, a dialled personal number triggers a lookup in the DNS-type system with all or part of the personal number being first parsed and then applied to the DNS type system to return a current number for call routing. All dialled numbers could be treated as personal numbers or simply a subset of such numbers, this subset comprising numbers that are readily identifiable as personal numbers by, for example, local lookup at an SSP or the presence of a predetermined leading digit string. The general concept of parsing a telephone number (or similar number) in whole or in part to form a domain name for resolution in a DNS-type distributed database system can be used for the retrieval of other items of information besides URIs and service resource items.
Feedback Mechanisms. In discussing die WWW-based freephone arrangement of Figure 17, it was mentioned that user A could be supplied with feedback on the likely length of waiting time before A would be called back. This is one example of using me Internet to provide a feedback path for a potential or actual telephone user. Another example was provided in relation to Figure 16 where the progress of call setup was reported back by the call setup gateway to user A's terminal. In fact, generally where a user is known to be using a terminal actively on the Internet the opportunity arises to provide the user with feedback on die progress of call setup through the telephone system. In oreder to do this, it is of course necessary to ensure that the feedback can be passed to die appropriate application running on terminal A and this will generally require the application to have made appropriate linking information available. As well as call semp progress information, other information can also be fedback for example during a call holding period. Thus, for example, a special server can be provided on the Internet holding multimedia clips or even videos that could be output to user A during a call holding period.
In the described arrangments, the servers 51 have held service resource items concerned primarily with call semp control. It may be noted that in a somewhat different application, Internet servers could be arranged to hold data that could be accessed from the telephone system in response to a user-initiated telephone request and returned to that telephone user. Such a service would be provided, for example, in response to an SSP triggering a service request upon a particular telephone number being input, the service request prompting an SCP to cause an intelligent peripheral to access a particular Internet server (not necessarily an HTTP server) and retrieve the required data for return to the calling party. The intelligent peripheral may include a text-to- voice converter for replaying die data vocally to die user.
One further feedback process is also worthy of note, in diis case in relation to service resource items themselves. By way of example, a telephone user G may subscribe to a service by which calls passed tiirough to G's telephone are to be separated by a minimum of X minutes, X being user settable. To implement this service, G has a phone page on a server 51 that includes a "busy" stams indication. Upon termination of a successful call to G, G's local SSP triggers the sending of a message by die associated SCP over the Internet to G's phone page. This message causes G's busy indication to be set to indicate that G is busy; die message also starts a timer which times out after a period X and causes the busy stams indication to be reset. A call attempt to G will either be rejected at G's SSP because G's line is genuinely busy or will trigger die SSP to enquire via die SCP whether G's phone-page busy stams indication is set. If the busy stams indication is set (which it will be during the period X following termination of a successful call) die call attempt is rejected whereas if die busy stams indication is in its reset condition, the call attempt is allowed to proceed. By placing the busy stams indication mechanism on G's phone page, it is possible to arrange for G to be able to easily change the value of X. More General Variants. Whilst the service control subsystem of the PSTN has been embodied as an SCP in die foregoing examples, it will be appreciated diat die functionality of the service control subsystem could be provided as part of an SSP or in an associated adjunct. Furthermore, the triggering of service requests can be effected by equipment odier than SSPs, for example by intercept boxes inserted in the SS7 signalling links.
It will be appreciated diat the term "Internet" is to be understood to include not only die current specification of die TCP/IP protocols used for the Internet and die current addressing scheme, but also evolutions of tiiese features such as may be needed to deal with isochronous media. Furthermore, references to the WWW and the HTTP protocol should equally be understood to encompass tiieir evolved descendants.
The present invention can also be applied to telephone systems other than just PSTNs, for example to PLMNs and other mobile networks, and to private systems using PABXs. In this latter case, a LAN or campus- wide computer network serving generally die same internal users as the PABX, will take the role of the Internet in the described embodiments.
Furthermore, the present invention has application where any switched telecommunication system (for example, a broadband ATM system) requires service control and a computer network can be used for die delivery of service resources to die service control subsystem of the telecommunication system.

Claims

1. A method of accessing a target entity over a communications network, said mediod comprising the steps of: (a) - providing a DNS-type distributed database system storing records each associated widi a corresponding domain name and holding communication data for use in accessing said target entity, each said domain name being related to a respective number string from which it can be derived by a process including parsing at least a substantial portion of the number string into at least a part of said domain name;
(b) - supplying a said number string indicative of a said target entity and forming the related said domain name by said process including parsing at least a substantial part of the number string into at least a part of a said domain name;
(c) - applying the domain name formed in step (b) to die DNS-type distributed database system to retrieve the communication data held in the corresponding said record; and
(d) - using the communication data retrieved in step (c) in accessing said target entity.
2. A method according to claim 1, wherein said communications network is a telephone network and the target entity is a called parry, said number string comprising a dialed number and die retrieved communication data being a current telephone number for the target party.
3. A method according to claim 1, wherein said communications network is a telephone network and the target entity is a called party, said number string comprising a dialed number and the retrieved communication data being a URI indicative of die location on a computer network of a current telephone number for die target party, said URI being thereafter used to retrieve said current telephone number for use in accessing said target party.
4. A method according to claim 1, wherein said communications network is a computer network and the target entity is a resource item held at a corresponding URI on that network, said number string comprising a telephone number for the target party and the retrieved communication data being die URI of said resource item.
5. A method according to claim 4, wherein said resource item is a current telephone number of a target party it is wished to call, said number string being a personal telephone number for that target party.
6. A method according to claim 1, wherein the parsing of said at least a substantial part of said number string into at least a part of a said domain name involves dividing said substantial portion into label segments according to a division scheme die same for all number strings.
7. A method according to claim 1, wherein said number string is an international telephone number, the parsing of this number involving forming a label segment of die country code component of die international telephone number and forming further label segments from at least a substantial portion of the remainder of the international telephone number according to a division scheme die same for all such numbers.
8. A method according to claim 1, wherein said number string is an international telephone number, the parsing of this number involving forming a label segment of the country code component of die international telephone number and forming further label segments from at least a substantial portion of the remainder of the international telephone number according to a division scheme diat is dependent on the identity of said country code component.
9. A method according to claim 1, wherein said DNS-type distributed database system is adapted to handle a set of domain names that make up a name space herein referred to as the "telname space", die root of die telname space being die root of die overall name space handled by the DNS-type distributed database system.
10. A method according to claim 9, wherein said DNS-type distributed database system is distributed over the Internet.
11. A method according to claim 1, wherein said DNS-type distributed database system is provided by die DNS of the Internet and is adapted to handle a set of domain names diat make up a name space herein referred to as die "telname space", the telname space being a subdomain of the DNS.
12. A method according to claim 11, wherein said number strings are telephone numbers and the telname space forms a subdomain in die domain .itu.int. of the DNS.
13. A method according to claim 1, wherein said DNS-type distributed database system is provided by the DNS of the Internet and is adapted to handle a set of domain names that make up a name space herein referred to as die "telname space", the telname space being divided between a plurality of subdomains of die DNS.
14. A method according to claim 13, wherein said number strings are telephone numbers and the telname space is provided by respective subdomains in at least some of the country domains of the DNS.
15. A method according to any one of claims 11 to 14, wherein a predetermined part of said number string is used to look up a domain name tail that is then added to die domain name part derived by said parsing of at least a substantial portion of the number string.
16. A method according to claim 15, wherein said number string is an international telephone number the country code component of which constitutes said predetermined part used to look up said domain name tail.
EP96941768A 1996-02-20 1996-12-11 Method of accessing a target entity over a communications network Withdrawn EP0876733A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP02000568A EP1207704B1 (en) 1996-02-20 1996-12-11 DNS-based determination of a telephone number for contacting a target entity
EP02000567A EP1207703B1 (en) 1996-02-20 1996-12-11 Accessing communications data

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
GB9603590 1996-02-20
GBGB9603590.2A GB9603590D0 (en) 1996-02-20 1996-02-20 Method of accessing a target entity over a communciations network
PCT/GB1996/003054 WO1997031490A2 (en) 1996-02-20 1996-12-11 Method of accessing a target entity over a communications network

Related Child Applications (2)

Application Number Title Priority Date Filing Date
EP02000567A Division EP1207703B1 (en) 1996-02-20 1996-12-11 Accessing communications data
EP02000568A Division EP1207704B1 (en) 1996-02-20 1996-12-11 DNS-based determination of a telephone number for contacting a target entity

Publications (1)

Publication Number Publication Date
EP0876733A1 true EP0876733A1 (en) 1998-11-11

Family

ID=10789104

Family Applications (3)

Application Number Title Priority Date Filing Date
EP96941768A Withdrawn EP0876733A1 (en) 1996-02-20 1996-12-11 Method of accessing a target entity over a communications network
EP02000567A Expired - Lifetime EP1207703B1 (en) 1996-02-20 1996-12-11 Accessing communications data
EP02000568A Expired - Lifetime EP1207704B1 (en) 1996-02-20 1996-12-11 DNS-based determination of a telephone number for contacting a target entity

Family Applications After (2)

Application Number Title Priority Date Filing Date
EP02000567A Expired - Lifetime EP1207703B1 (en) 1996-02-20 1996-12-11 Accessing communications data
EP02000568A Expired - Lifetime EP1207704B1 (en) 1996-02-20 1996-12-11 DNS-based determination of a telephone number for contacting a target entity

Country Status (10)

Country Link
EP (3) EP0876733A1 (en)
JP (2) JP4159603B2 (en)
CN (1) CN1209249A (en)
AU (1) AU719651C (en)
CA (1) CA2239495A1 (en)
DE (2) DE69633205T2 (en)
GB (1) GB9603590D0 (en)
NO (1) NO325606B1 (en)
NZ (1) NZ323991A (en)
WO (1) WO1997031490A2 (en)

Families Citing this family (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3084681B2 (en) * 1996-12-06 2000-09-04 財団法人流通システム開発センタ− Integrated information and communication system
US5974453A (en) * 1997-10-08 1999-10-26 Intel Corporation Method and apparatus for translating a static identifier including a telephone number into a dynamically assigned network address
DE19747583B4 (en) * 1997-10-28 2006-04-20 Telefonaktiebolaget Lm Ericsson (Publ) Communication system and method
WO1999029083A1 (en) * 1997-12-02 1999-06-10 Alcatel Usa Sourcing, L.P. Method and apparatus for dynamic domain names
WO1999028979A2 (en) * 1997-12-02 1999-06-10 Alcatel Usa Sourcing, L.P. Digital phone system
GB2356327B (en) * 1997-12-05 2002-06-26 Distrib Systems Res Inst The Integrated information communication system
US6215784B1 (en) * 1997-12-24 2001-04-10 Nortel Networks Limited Method and system for voice call completion using information retrieved from an open application on a computing machine
IL123129A (en) 1998-01-30 2010-12-30 Aviv Refuah Www addressing
IL125432A (en) 1998-01-30 2010-11-30 Easynet Access Inc Personalized internet interaction
EP0964567A3 (en) * 1998-06-12 2002-01-02 Alcatel USA Sourcing, L.P. A programmable telecommunications interface for communication over a data network
GB9815585D0 (en) * 1998-07-18 1998-09-16 Fitton Stuart J Computer network addressing system
WO2000059237A1 (en) * 1999-03-26 2000-10-05 Nortel Networks Limited Control node with intelligent network
EA200101256A1 (en) * 1999-05-27 2003-02-27 Интернет Менеджмент Системз, Инк. SYSTEMS AND METHODS FOR TRANSMITTING DATA IN VARIOUS COMMUNICATION APPLICATIONS USING UNITED ADDRESS SEQUENCES
US6963928B1 (en) 1999-05-27 2005-11-08 Bagley David T Systems and methods for communicating across various communication applications using single address strings
AU773711B2 (en) * 1999-07-09 2004-06-03 Mark J. Harris Network addressing system and method using telephone numbers
NL1012721C2 (en) * 1999-07-28 2001-01-30 Benno Henricus Nicolaas Hijl Device for registration, addressing, structuring and finding entities and data, based on identification codes.
AU1202701A (en) * 1999-10-15 2001-04-30 Nametree, Inc. Domain name searching
SE517354C2 (en) * 1999-12-01 2002-05-28 Ericsson Telefon Ab L M Systems and a procedure for private telecommunications networks
SE517319C2 (en) * 1999-12-01 2002-05-28 Ericsson Telefon Ab L M Systems and devices in private telecommunications systems where IP networks are used for signaling regarding inquiry and response messages
US9781257B2 (en) 2000-01-19 2017-10-03 Sony Mobile Communications Ab Technique for obtaining caller-originated alert signals in IP-based communication sessions
US8400946B2 (en) 2000-01-19 2013-03-19 Sony Corporation System and method for sharing common location-related information between communication devices
US8548010B2 (en) 2000-01-19 2013-10-01 Sony Corporation Method and apparatus for event-based synchronization of information between communication devices
US6826403B1 (en) 2000-09-12 2004-11-30 Phonepages Of Sweden Ab Method and system for identifying a user
DE10053717B4 (en) * 2000-10-28 2004-05-19 Web.De Ag Method and device for establishing a telephone connection via an Internet telephony application
US7027582B2 (en) * 2001-07-06 2006-04-11 Telefonaktiebolaget L M Ericsson (Publ) Method and apparatus for resolving an entity identifier into an internet address using a domain name system (DNS) server and an entity identifier portability database
US20030074461A1 (en) * 2001-10-09 2003-04-17 I-Dns.Net International Pte. Ltd. Method of mapping names or identifiers to telecommunications network resource locations
US11341497B2 (en) * 2001-10-24 2022-05-24 Oleg Serebrennikov Method for performing transactional communication using a universal transaction account identifier assigned to a customer
AU2003216062A1 (en) * 2002-01-15 2003-07-30 Idetic, Inc. Method and system of accessing shared resources using configurable management information bases
US7161933B2 (en) * 2002-09-24 2007-01-09 Intel Corporation Optimistic caching for address translations
FI20030797A0 (en) * 2003-05-27 2003-05-27 Nokia Corp Improving Database Performance on a Name Server System
US7454569B2 (en) * 2003-06-25 2008-11-18 Commvault Systems, Inc. Hierarchical system and method for performing storage operations in a computer network
ES2291970T3 (en) * 2003-12-19 2008-03-01 France Telecom PROCEDURE AND DEVICE FOR ISSUANCE OF APPLICATIONS TOWARDS A SERVER OF DOMAIN NAMES FROM AN APPLICING MACHINE.
CN100359874C (en) * 2004-01-12 2008-01-02 华为技术有限公司 Method for obtaining private network address by multimedia business center of receiving side
CN1314239C (en) * 2004-03-31 2007-05-02 中国科学院计算技术研究所 Method of carrying out field name system in moble self-organizing network
CN1878164A (en) * 2005-06-08 2006-12-13 华为技术有限公司 E.164 number domain name storing and searching method
US20070091878A1 (en) * 2005-09-30 2007-04-26 Marian Croak Method and apparatus for providing endpoint and access independent virtual numbers
WO2007132108A2 (en) * 2006-05-15 2007-11-22 France Telecom Non-standard number routing method in a standard number routing mechanism
US8879545B2 (en) 2007-12-31 2014-11-04 At&T Intelletual Property I, L.P. Methods and apparatus to route a communication session directly to a voicemail mailbox
MX2010009321A (en) * 2008-02-22 2011-05-19 Sage Connex Llc Personal data portal on a pstn and online home with virtual rooms and objects.
JP5753999B2 (en) 2013-09-12 2015-07-22 メタフロンティア合同会社 Terminal device, data processing program, and data management system
CN103905581A (en) * 2014-02-26 2014-07-02 曾宪钊 DNS high-speed analytical solution based on behavior differences and matched flow class attack resistance safety solution
US10673681B2 (en) * 2017-03-15 2020-06-02 Charles Lap San Chan System and method for enabling cross-domain communication over network
CN109787907A (en) * 2017-11-14 2019-05-21 北京星河星云信息技术有限公司 A kind of cloud intelligent DNS scheduling system and its user's access and domain name analytic method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2173304C (en) * 1995-04-21 2003-04-29 Anthony J. Dezonno Method and system for establishing voice communications using a computer network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO9731490A3 *

Also Published As

Publication number Publication date
DE69633205D1 (en) 2004-09-23
EP1207703A2 (en) 2002-05-22
WO1997031490A3 (en) 1997-11-13
NZ323991A (en) 1999-06-29
NO982513D0 (en) 1998-06-02
CA2239495A1 (en) 1997-08-28
JP2004194330A (en) 2004-07-08
GB9603590D0 (en) 1996-04-17
JP3867079B2 (en) 2007-01-10
NO325606B1 (en) 2008-06-23
DE69632495D1 (en) 2004-06-17
AU1104597A (en) 1997-09-10
AU719651C (en) 2007-09-06
JP4159603B2 (en) 2008-10-01
WO1997031490A2 (en) 1997-08-28
EP1207704A3 (en) 2002-09-18
DE69633205T2 (en) 2005-07-14
EP1207704A2 (en) 2002-05-22
NO982513L (en) 1998-08-05
DE69632495T2 (en) 2005-05-12
AU719651B2 (en) 2000-05-11
CN1209249A (en) 1999-02-24
EP1207703B1 (en) 2004-08-18
EP1207704B1 (en) 2004-05-12
JP2000504917A (en) 2000-04-18
EP1207703A3 (en) 2002-09-18

Similar Documents

Publication Publication Date Title
AU719651C (en) Method of accessing a target entity over a communications network
US6131095A (en) Method of accessing a target entity over a communications network
US8938062B2 (en) Method for accessing service resource items that are for use in a telecommunications system
EP0867091B1 (en) Call setup gateway for telecommunications system
EP0867092B1 (en) Method of providing telecommunication services
EP0867093B1 (en) Method of accessing service resource items that are for use in a telecommunications system

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 19980522

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FI FR GB IT LI NL SE

17Q First examination report despatched

Effective date: 19991118

GRAG Despatch of communication of intention to grant

Free format text: ORIGINAL CODE: EPIDOS AGRA

GRAG Despatch of communication of intention to grant

Free format text: ORIGINAL CODE: EPIDOS AGRA

GRAH Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOS IGRA

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: HEWLETT-PACKARD COMPANY, A DELAWARE CORPORATION

GRAH Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOS IGRA

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

18W Application withdrawn

Withdrawal date: 20020617