MXPA00005961A - Architecture independent application invocation over a telephony network - Google Patents

Architecture independent application invocation over a telephony network

Info

Publication number
MXPA00005961A
MXPA00005961A MXPA/A/2000/005961A MXPA00005961A MXPA00005961A MX PA00005961 A MXPA00005961 A MX PA00005961A MX PA00005961 A MXPA00005961 A MX PA00005961A MX PA00005961 A MXPA00005961 A MX PA00005961A
Authority
MX
Mexico
Prior art keywords
application
subscriber
call
code
service
Prior art date
Application number
MXPA/A/2000/005961A
Other languages
Spanish (es)
Inventor
Shridharan Balachandran
John Kaippallimalil
Original Assignee
Ericsson Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ericsson Inc filed Critical Ericsson Inc
Publication of MXPA00005961A publication Critical patent/MXPA00005961A/en

Links

Abstract

A telephony network (10) that includes a signaling system that provides intelligent network services. The signaling system includes a service control point (34) that interfaces with an application database (38). The application database (38) includes subscriber defined applications that are associated with an application code. The signaling system includes a service switching point (22, 24) in communication with the service control point (34) through one or more signaling transfer points (35). In operation, subscribers (14, 16, 18) to the service may communicate throughvoice traffic and applications over a call connection. The applications may reside in the application database (38) or in a server (48) of the called subscriber. A subscriber (14) inputs the called parties number and an application code. If the application is in the application database (38), the signal switching point (22, 24) establishes a trunk connection between the parties and downloads the application designated by the application code to both of the subscribers'computers (28, 31). If the application resides with the called subscriber (B, C), the signal switching point (22, 24) establishes a trunk connection (44) and instructs the subscriber to download the application over the trunk connection (44).

Description

INVOCATION OF AN INDEPENDENT APPLICATION OF ARCHITECTURE IN A TELEPHONE NETWORK BACKGROUND OF THE INVENTION TECHNICAL FIELD OF THE INVENTION The present invention relates to a telephony network and more particularly to systems and methods for invoking an application stored in an intelligent network node of the telephony network. BACKGROUND OF THE INVENTION The Internet is based on the series of TCP / IP protocols. The Internet protocol or IP specifies the addressing of nodes on the Internet and a method to send data packets from one node to another. The TCP or Transmission Control Protocol is an application implemented over the IP to provide a reliable delivery of data packets. Internet users usually use a web browser to locate files using TCP / IP protocols. A web browser is a program found on the user's computer that can retrieve and view files, and follow links to other files. A web browser generally supports network interconnection, a graphical user interface, and the ability to run remote programs. Using a web browser and the TCP / IP protocol, users can specify a file address, URL or Uniform Resource Locator, on the Internet and download the file to their computer. In addition, a web browser can search for files using keywords. The web browser will locate and present a list of the URLs of files that include these keywords. Once a subscriber selects access to a URL address, the web browser retrieves the file specified by this URL address, which is commonly referred to as a "web page". Web pages are typically files in HTML format (hypertext markup language). The HTML file can include hypertext, that is, links integrated with other files. When the HTML file is downloaded to a user's computer, the user can download other connected files by selecting an icon or another marker for the related file.
A web browser can also access applications on the Internet. There are three different methods to run applications. First, the source code for small applications can be integrated into the HTML file. As a browser reads the HTML file, it formats the text on the screen. When you find a marker that indicates the source code of a small application integrated into the HTML file, the browser executes the source code of the application. Second, the HTML file of a web page can indicate the URL of a CGI (Common Gateway Interface) manuscript. A CGI manuscript is an executable program that works on a server and processes data sent from an HTML file and returns the data to the client in HTML format. To collect data, the HTML file includes form markers, and a set of related markers to specify various formats for data fields. A user can enter data in the fields and then present the "format" to a server designated by a URL in HTML form bookmarks. Finally, there are special markers in HTML files that indicate URLs of applications that are found on servers connected to the Internet. HTML markers inform the browser where to locate the application and download and use it. Thus, the application is executed by the user's computer instead of the server. Frequently, downloaded executable programs (and those integrated into HTML files) are written in independent architecture or platform languages. Examples of architecture-independent languages include JAVA® technology from Sun Microsystems, Inc., of Cupertino, California, the LIMBO® language of AT & T, and somehow for Windows-based platforms, the ACTIVE X® technology from Microsoft Corporation of Redmond, Washington. Programs written in architecture independent languages can work on several types of platforms, regardless of the equipment or the programmatic. For example, if an application is written in JAVASCRIPT®, any web browser or computer system that includes a JAVA VIRTUAL MACHINE® can run the program. The JAVA VIRTUAL MACHINE interprets the JAVA program in code that the platform can execute. Even though the JAVA VIRTUAL MACHINE can be different for different platforms, a program written in JAVA can work on any platform that has a JAVA VIRTUAL MACHINE. As a result, the JAVA program, and therefore the web page or HTML file, does not need to be platform specific, but can be managed by any platform, regardless of the underlying operating system or the computer. Even though the Internet provides access to a wide variety of information and applications, the Internet presents many security problems. HTML files on a web page can sometimes be modified by unauthorized people. It is estimated that 60% of websites have vulnerable aspects that allow unauthorized access or removal of files. Thus, a user must always be cautious when downloading a file in the sense that the web page may have been altered or viruses may have been integrated into the web pages. In addition, companies that have web pages must monitor their content daily to ensure that no unauthorized alteration has occurred. In addition, certain systems are vulnerable to attacks on the Internet. For example, an IP application that is known as a "ping" allows the user to send an IP packet and request acknowledgment. If a ping packet of excessive size is sent to certain systems, the system will bounce when it tries to assemble the packet. Another disadvantage is that not all people have access to the Internet. Frequently, Internet access involves payment to an Internet Service Provider (ISP) for a monthly fee or a fee based on online time. Even if a person has access, due to traffic load, it is often difficult to connect to the Internet. In addition, a computer system is expensive and not all households can afford to have a personal desktop computer. Due to the aforementioned security and access problems of the Internet, the need has arisen in the industry to offer information and applications to a client / user through more secure methods and networks. COMPENDIUM OF THE INVENTION The present invention focuses on a telephony network where applications are stored in a node of a signaling network in a telephony network. Subscribers can request and download applications on the telephone network during a voice call. Thus, both parts of the voice call can access and exchange information using applications invoked in the telephony network and communicate concurrently orally between them in the same truncal connection. The telephone network includes at least one combined voice and data switch in a local exchange connected to several subscribers and a signaling network to offer signaling within the telephony network and interface with other networks of this type. The signaling network includes an application database that stores applications, a service control point (SCP) for connection to the application database, and one or more signaling transfer points in communication with the control point of service. (In addition, the signaling network includes a service switching point in communication with the service control point through the signaling transfer points and connected to the local exchange that has voice and data capacity). The service switching point receives an application code entered by a part of the call, and send the request as in a call to the SCP. The SCP then retrieves the application associated with the application code from the application database and downloads the application to callers. The service control point can include an application reference table to locate the applications stored within the application database.
In operation, the signal switching point receives an application code entered by a part of a call in the telephony network. The signal switching point determines whether the parties connected to the call have the ability to communicate in a voice and data mode. This is achieved by accessing their respective subscriber call records in the telephone network. If the parties have the capacity, the signal switching point tries to identify who is the owner of the application code. The network for the party receiving the call then establishes a truncal connection between the parties and determines whether an application associated with the application code is located within the telephony network or within the control of one of the parties of the call. If the application is located within the telephony network, the signal switching point retrieves the application associated with the application code from the application database and downloads the application database application to the network of telephony to both parties of the call in the truncal connection. If the application is under the control of one of the parties to the call, the switching signal point retrieves an initial application download associated with the application code from the application database and downloads the initial application to the part that controls the application. The initial application or the apleto starts the download of the application associated with the application code to the other party in the truncal connection. The signal switching point retrieves the applications by transmitting a message to the service control point that includes the code specific to the application. The service control point determines whether the application code is a specific or generic code associated with an application. If the application code is generic, the service control point obtains the specific code associated with the application by transmitting an instruction to an intelligent peripheral to ask the person making the call regarding the specific code associated with the application. . The signal control point retrieves the application associated with the specific code in the application database, and transmits the application to the signal switching point in one or more messages, such as a Signaling System Seven (SS7). Once the truncal connection is established and once the initial applications are downloaded, the parties can use the applications to exchange information, communicate orally among them, request additional applications to be transferred in the truncal connection, save data from the applications on a hard disk local, etc. Applications can also automatically request additional applications, as necessary.
BRIEF DESCRIPTION OF THE DRAWINGS For a fuller understanding of the present invention and for additional objects and advantages thereof, reference is now made to the following description in combination with the accompanying drawings in which similar numbers are used for similar parts: FIG. 1 illustrates a telephone network of the present invention; Figure 2 illustrates a block diagram of the protocols of the SS7 network in the telephone network of the present invention; Figures 3A, 3B and 3C illustrate steps in a flow diagram of the process of the present invention during a call connection; and Figure 4 illustrates a flow chart of the process of the present invention during a call in process. DETAILED DESCRIPTION OF THE INVENTION The present invention will now be described more fully below with reference to the accompanying drawings, wherein preferred embodiments of the invention are illustrated. This invention can nevertheless be incorporated in several different ways and should not be considered as limited to the modalities presented here; on the contrary, these modalities are offered for the disclosure to be complete and for the purpose of providing the scope of the invention to those skilled in the In Figure 1, a telephony network of the present invention is illustrated and is generally referred to by the reference number 10. For example, a publicly-switched telephone network (PSTN) 10 includes a network 12 of Signaling System No .7 (SS7) that provides signaling within the PSTN 10 in accordance with the SS7 protocol standards. Several subscribers are connected to the PSTN 10. Each subscriber is connected to the PSTN 10 through an access network. Figure 1 illustrates three subscribers, Subscribers A14, Subscriber Blß, and Subscriber C18. The subscriber A14 is connected to a service switching point A (SSPA) 22 in the SS7 network 12 through an access network line 17 while the subscriber Blß and the subscriber C18 are connected to a switching point of service B (SSPB) 24 through access network lines 17. Access network lines 17 can be common POTS lines (Simple Old Telephone System) or preferably Integrated Services Digital Network (ISDN) lines. If lines 17 are ISDN type lines, the ISDN service is typically either basic rate interface (BRI) or primary rate interface (PRI). BRI includes two carrier channels or B that operate at 64 Kbps and a D-channel or packet-switched data channel operating at 16 Kbps. PRI includes 23 B channels and a D channel that operates at 64 Kbps. Channel D carries out signaling for B channels and provides a mechanism for packet switching user data. Thus, with the ISDN service, Subscriber Al4 and Subscriber B16 can transmit and receive voice and data traffic concurrently on lines 17, respectively. The subscriber Al4 and the subscriber Blß both have a telephone 26 and a computer 28. The telephone 26 is connected to the PSTN 10 through a modem in the computer 28 or alternatively, the computer 28 and the telephone 26 are connected to the PSTN 10 through an external modem 32. The internal modem in computer 28 or external modem 32 allows computer 28 to receive data traffic from PSTN 10 and telephone 26 to receive voice traffic. Alternatively, the computer 28 may incorporate the functions of the telephone 26. For example, the computer 28 may include a microphone and speakers and programmatic to function as a telephone 26. The computer 28 may be a personal desktop computer or preferably a networked computer (NC) A networked computer costs less than a personal desktop computer and is less expensive to manage in a client / server environment. A typical network computer has sufficient processing power to run programs locally, to use data and programs transmitted to it, a pointing device, text entry capabilities, and audio output. The network computer may or may not include a disk unit. Some networked computers include NETWORK STATION® manufactured by IBM Corporation and JAVASTATION 1® of Sun Microsystems of Cupertino, California. The computer 28 also includes a display device 30 for displaying data and a keyboard 31 or another type of input device. Alternatively, the computer 28 may include a signal converter for converting video signals suitable for viewing on a monitor, such as VGA signals, into a video signal, such as the linked signal from the National Television Committee (NTSC) ( National Television Committee). The computer 28 can then display the information and data on a television instead of viewing them on a monitor 30. The computer 28 also includes programmatic or equipment (such as JAVA VIRTUAL MACHINE or browser incorporating a JAVA VIRTUAL MACHINE) that can allow that the computer 28 executes a program written in a language independent of architecture. Subscriber C18 is connected to PSTN 10 through a private branch office (PBX) 6, as understood in the art. The PBX46 directs an incoming call to one of several computers 28. An application / data server 48 is also linked to the PBX46. The application / data server (AS) 48 can provide such services as voice mail or an interactive voice response unit to collect or provide information of people making incoming calls. Each computer 28 has a microphone 47 and a speaker 49 to communicate with people making incoming calls. Alternatively, the computer 28 may be connected to a telephone 26. The computer 28 may be a network computer or a personal desktop computer or a server with connections to other clients. SSPA22 and SSPB24 are connected to subscribers within the 12 SS7 network. SSPA22 and SSPB24 are the local exchanges in PSTN 10. SSPA22 and SSPB24 have voice and data capability, such as through switch 21, or SSPA and SSPB24 are computers attached to a voice switch and data. SSPA22 and SSPB24 initiate voice / data related signals and convert them from voice and data switches into SS7 signaling messages that are sent to other exchanges through the SS7 12 network. SSPA22 and SSPB24 send two types of messages : requests related to circuit and database. The messages related to circuits are used to connect voice and data circuits from one central to another central. SSPA22 and SSPB24 use ISDN User Part (ISUP) or other protocol messages of this type to perform many of these functions. ISUP messages are used to establish and interrupt voice and data circuits in the PSTN 10. A database request provides access to the Intelligent Network (IN) and other databases within the SS7 network 12. Preferably, all database requests are carried out using Transaction Capability Application Part (TCAP) protocols. Figure 2 illustrates a scheme of the protocols in the network 12 SS7. The first three layers are known as "lower layers" and include a message transfer part 1 (MTP 1), a message transfer part 2 (MTP 2), and a message transfer part 3 (MTP 3). MTP 1 is the real physical link of the network, such as pairs of twisted cables, fiber optic cables, etc., and corresponds to the physical link in the reference model of Open System Interconnection (OSI) recommended by the International Organization of Standardization (ISO). MTP 2 corresponds to the data link layer in the OSI model and provides the basic data transmission services for the messages while MTP 3 provides basic message routing. Collectively, MTP 1, MTP 2 and MTP 3 are known as the lower layers. For message in the network PSTN includes a set of information elements for encoding the basic functions of the lower layers 108. The MTP layers are only capable of point-to-point routing in the PSTN network 10. With reference to FIG. 2, the signaling connection control part (SCCP) 110 provides additional end-to-end routing services and together with MTP 3 corresponds to the network layer of the OSI model. The SCCP address provides additional information such as the party making the call / party receiving the call and is used by the MTP to determine the next node in the message route. The ISDN user part or ISUP 112 (also known as ISDN-UP) connects to the lower layers directly or through the SCCP to provide complementary services as understood in the art. Such complementary services include identification of the person making the call, transfer of calls, and user-to-user signaling. As mentioned, the capacity application part Transaction (TCAP) 116 is used to access remote databases and to invoke features on remote network entities. The message units within TCAP 116 have two parts: the transaction part and the component part. The transaction part provides management and information to route the TCAP message to its destination and includes a transaction ID that is used to identify TCAP messages included within a single transaction. The transaction party handles each identified transaction with a unique transaction ID and groups the components into BEGIN messages, CONTINUE, END and ABORT (EMPEZA, CONTINUAR, TERMINAR y ABORTAR). The component part contains the commands and information that are required for the operation, such as a database request. The following types of components are found within the component part: Invoke, Return Result, Return Error, Reject. (Invoke, return result, return error, reject). The ISUP 112, TCAP 116 and SCCP 110 are collectively referred to as the upper layers of the network interface. These upper layers have message information fields separate from those of the lower MTP layers, for use in the PSTN 10 network to encode various features and function of their services. Referring again to Figure 1, SSPA22 and SSPB24 in PSTN network 10 each include an application message buffer 40 that stores applications when they are received, in accordance with what is described in greater detail below in relation to the Figure 3A. SSPA22 and SSPB24 also include a bank of modems 42 that allow the respective subscriber Al4 and subscriber B16 to communicate voice and data traffic concurrently on the same call using a feature similar to a telephone duplicator system when one or more of the lines 17 they are POTS lines instead of ISDN lines. Even when the telephone doubler system is typically implemented with a voice gate on an Internet Service Provider (ISP) server, in the embodiments of the present invention the telephone doubler voice gate is provided through the bank of the modems 42 in the SSPs 22 and 24 of the PSTN 10. The telephone doubler system establishes a voice gate that allows the sending of voice calls on the access network lines 17 while the user is receiving data traffic in the lines 17. The user is alerted of the incoming call with an icon on the computer screen, and can receive the call using the computer microphone or speaker or the telephone 26 while still using or accessing applications. The voice is encoded as in a GSM system and loaded / downloaded as data. The voice (encoded) is then separated in the receiver and sent to the microphone. The SS7 network 12 also preferably includes an intelligent peripheral (IP) 23 connected to SSPB 24, although a person skilled in the art will observe that the IP can be a mode to which it can be addressed separately. The SS7 network 12 illustrated in Figure 1 further includes four signaling transfer points, STP1 to STP4 (35a-d), although a person skilled in the art will note that any number of STPs can be implemented within the SS7 12 network. STP1 through STP4 in Figure 1 are illustrated in a mesh signaling network structure, a typical configuration in North America. However, the SS7 network 12 may alternatively comprise other signaling network structures. The STPs serve as routers and gateways in the SS7 network 12. Typically the STPs are computers associated or attached to voice and data switches in the PSTN 10. The STPs are connected to a service control point SCP34. The SCP34 serves as a database interface within the SS7 12 network. These databases are used to store information regarding subscriber services, to route special service numbers, validate calling cards and protect against fraud. These services are part of the Intelligent Network (IN). The IN provides services such as transfer of 1-800 numbers. Currently, the International Telecommunications Union (ITU) (International Telecommunication Union) and the American National Standards Institute (ANSI) (Institute of Standards Nationals) have issued standard protocols for IN services. The present invention may require extensions to the existing IN protocols, particularly the IN application protocols (INAP), to support the additional services of the present invention, as explained with reference to Figures 2 and 3. SCP 34 it is connected to a service data point (SDP) 36, which provides the database described above with information and data to support the IN services. Even though the SDP 36 is illustrated as a separate node within FIGURE 1, the SDP 36 and its functions can be incorporated as part of the SCP 34. Apart from the typical databases found within the SDP 36 (such as Database Line Identification, Call Management Service Database, and Business Services Database), SDP 36 includes an Application Database (AD) 38. The Application Database 38 includes several brochures , programs or other applications that are described in more detail below. The applications are written preferably in a language independent architecture such as a single version of an application can work on many types of platforms. The operation of the present invention is described below with reference to FIGS. 3A, 3B, and 3C illustrating a block diagram of the steps performed during a voice call initiation / application in the present invention. FIGURE 3A illustrates the initial steps in a call connection for any call. FIGURE 3B illustrates the termination of a call connection where applications and data for the call are located within the data application server of the party receiving the call while FIGURE 3C illustrates the call where applications and data for the call is within the Telephony Network 12. First, for the example mode of FIGURES 3A and 3B, Subscriber Al4 is the originating party or party making the call and Subscriber C18 is the party receiving the call. call. In step 50, Subscriber Al4 initiates a call to Subscriber C18. Subscriber Al4 can raise the telephone 26 horn or initiate the call through a computer 28. Subscriber Al4 then enters a number B, that is, the seven-digit phone number of the part that. receives the call and, if necessary, area code, and an application code, in accordance with what is illustrated in step 52. The application code (for example 0100) signals SSPA 22 that Subscriber Al4 attempts to access an IN service. In step 54, SSPA 22 receives the entered B number and the application code. Typically, in many PSTN 10 architectures SSPA 22 is located within the local exchange or a node attached to the local exchange in PSNT 10. SSPA 22 collects the digits entered and performs a number B analysis in step 56 Particularly, SSPA 22 compares the application code with a code table in an IN initiator table. If the application code corresponds to an application code in the IN initiator table, SSPA 22 knows that Subscriber Al4 attempts to invoke an application and voice call within IN, and determine the calling capabilities of the party performing the request. call. In step 58, SSPA 22 determines whether the party making the call supports voice and data traffic. The voice and data capacity is reviewed to ensure that the person making the call has the physical ability to carry out a voice call from an application and is a Subscriber of the service to receive voice / application calls. Each Subscriber has a Subscriber call record stored in the SSP. The Subscriber call record contains all the information / options to which the customer is subscribed. SSPA 22 has access to the Subscriber call log and determines from the information whether Subscriber Al has the ability to make an application voice call and is Subscriber to the service. If this is not the case, SSPA 22 establishes a truncal connection for a normal voice call using the routing information. If Subscriber Al4 does not support voice and data traffic, SSPA 22 serves to establish a voice and application call.
In addition in step 60, if the dialed number is a number 1-800, a number 1-900 or another number that requires additional routing information, the SSPA 14 determines the additional routing information for that number. SSPA 14 requests SCP 34 in a TCAP BEGIN message that invokes the process to provide routing of the number. The SCP 34 determines the routing information by connection to the SDP 36 and returns the information to the SSPA 22 in a TCAP END message. Step 60 which illustrates in dotted lines because it is carried out only when the SSPA 22 requires routing information about the number B. Whereas the SSPA 22 determines that the application code corresponds with an application code in the table of initiator IN in step 56 and that the calling party supports voice and data calls in step 58, the SSPA 22 sends an ISUP message, such as an initial address message (IAM), to the destination SSP, in this case the SSPB 24, with the information collected, as illustrated in FIGURE 62. The IAM message specifies the application code, the capacity of the calling party and the routing information on the number B. The SSPA 22 also transmits the number A, that is, the seven-digit number of the party making the call and the area code. The SSPB 24 receives the message in step 64. The SSPB 24 determines from the application code that an application / voice call is required, and in response, determines the capacity of the party receiving the call. The SSPB 24 has access to the Subscriber call record for the party receiving the call, in this example, the Subscriber C24, and determines from the information whether Subscriber C24 has the physical ability to carry out an application call. / voice and is Subscriber to the service. Since Subscriber C24 has established an application code within the SS7 network, in most circumstances, Subscriber C18 will support voice and data traffic. However, if the application server 48 of Subscriber C is turned off or if the subscription to the service has expired or if other circumstances prevent the establishment of a data connection, the SSPB 24 will determine in step 66 that Subscriber C does not is able to establish an application / voice call. In step 68, the SSPB 24 determines whether the parties to the call have the ability to carry out a voice and application call. If any of Subscriber C18 or Subscriber Al4 does not have the capability for application call / voice in step 68, then SSPB 24 will establish a normal voice call, as shown in FIGURE 70. If Subscribers have the required capacity in the step 68, then the SSPB 24 will continue to establish an application / voice call. Alternatively, in order to determine the capabilities of the party receiving the call, the SSPA 22 can transmit a TCAP message to the SSPB 24 with a question as to the ability of the party receiving the call and in the sense of whether the The party receiving the call is subscribed to the service. If the party receiving the call meets the requirements, then in a TCAP reply message, the SSPB 24 may indicate that it will provide the necessary support for the voice call in the data, and the truncal connection will be established in accordance with what is described. then. If the party receiving the call does not have the necessary capacity or is not its subscriber, then SSPB 24 will send a response to SSPA 22 rejecting the voice / application call, and SSPA 22 will establish a typical voice call. In step 72, the SSPB 24 transmits the TCAP BEGIN message to the SCP 34 with an invocation component that specifies the application code entered by Subscriber A14. In step 74, the SCP 34 analyzes the application code and determines whether the application code is a generic application code that refers to a set of specific applications. The SCP 34 can access the application database (AD) 38 within the SDP 36 to look up the application code in a base table of application code, as illustrated in FIGURE 1 below. If the application code is generic, SCP 34 responds to TCAP message BEGIN with a TCAP message CONTINUED to SSPB 24 to present a certain announcement or another interactive voice response to collect additional digits from Subscriber A14, as illustrated. in step 76. This process may include the use of the aforementioned Intelligent Peripheral (IP) 23 that connects to SCP 34 to provide interactive voice responses. The IP 23 is illustrated in FIGURE 1 connected to the SSPB 24. The IP 23 is placed with the SSPs or it can be a separate node which can be addressed in the SS7 network 12, according to the configuration of the network operators. The IP 23 includes an interactive voice response unit that requests a person making the call for more information about the requested request, such as the specific application desired and collects the digits dialed by the user in response to the investigations. Once collected by IP 23, IP 23 transmits the specific application codes to SSPB 24 as digits dialed by the user. SSPB 24 performs the required actions and sends a CONTINUED TCAP message to SCP 3"4 with a Return Result component containing the collected digits SCP 34 has access to SDP 36 and determines the specific application code based on the digits collected from an application code database table or other database within SDP 36. Alternatively, the application code database table can be found within SCP 34. An example of a table of Application code database is shown in FIGURE 1 below.Table 1 shows a generic code for two subscribers to the application service: ABC Airlines (1-800-555-1234) and XYZ Computer Store ( 1-214-555-7890.) The generic code includes one or several specific codes as shown in Table 1 below for ABC Airlines, however XYZ Computer Store has only one application and therefore no reference is made. reference to specific codes by the generic code. Table 1 may also include other information regarding the applications, such as whether the applications are within the SS7 12 network, the address of the initiator packet (described below), for the application, the size of the application, etc. Number B Code Code es- Description Specific Generic 1-800-555-1234 0100 0001 Information about flight arrival 1-800-555-1234 0100 0002 Flight departure information 1-800-555-1234 0100 0003 Ticket purchase 1 -800-555-1234 0100 0004 freight information 1-124-555-7890 1000 sales per computer Number B Address 1-800-555-1234 SDP / AD 1230 h 1-800-555-1234 SDP / AD 1330 h 1 -800-555-1234 SDP / AD 1670 h 1-800-555-1234 SPD / AD 1900 h 1-124-555-7890 SDP / AD 2300 h Table 1 Application code database table In step 76 , 'SCP 34 transmits an END TCAP message to SSPB 24 with the Return Result component that contains the specific application code and other information relevant to the application, such as if the application is inside the network or within the destination part. In step 78, the SSPB 24 receives the END TCAP message from the SCP 34 and determined from the Result components of Return in the message if the specific application requested by Subscriber C18 is within the control of the SS7 12 Network or within the control of the party receiving the call. If the application code is within the control of the party receiving the call, in this case, Subscriber C18, the process follows the steps in FIGURE 3B (path A). If the application is within the control of the SS7 12 Network (such as SDP 36), the process follows the steps in FIGURE 3C (path B). In the present example, Subscriber Al4 has called Subscriber C18, the application is within the control of Subscriber C18. Thus, the process follows path A in FIGURE 3B. In FIGURE 3B, the present invention implements an application and voice call wherein the application is under the control of the party receiving the call. In step 80 of FIGURE 3B, the SSPB 24 transmits a TCAP BEGIN message to SCP 34 with invoke component to download an initiator packet associated with the specific application code. The TCAP message includes the code of the specific application. In step 82, the SCP 34 has access to the application code database table within the SDP 36 and determines from the application code database table the initial address for the Initiator package for the specific application. . The SCP 34 retrieves the Application Database 38 Starter Pack and transmits the Starter packet to the SSPB 24 in one or more SCCP XUDT / LUCT or UDT signaling messages, as necessary, in accordance with what is represented in step 84. Since the initiator packet can be long, the SCP 34 can transmit the initiator packet in several subpackets into separate SUDC or XUDT / LUDT SCCP messages. Each message within a transaction has the same invocation number, so that the SSPB 24 can discover the question to which a response belongs. In addition, messages indicate the number of messages and the correct order of messages for subsequent reassembly. The SSPB 24 assembles the entire initiator packet and stores the initiator packet in a message buffer 40, as shown in FIGURE 86. In step 88, in response to the IAM message sent in step 62 of FIGURE 3A to Starting with SSPA 22, SSPB 24 establishes a 44 trunk and the necessary trunks to establish a connection between SSPA and SSPB. In addition, the SSPB 24 transmits an establishment message to Subscriber C18 on the right D (if Subscriber C has an ISDN service) in 1 step 88. The establishment message includes an application download message to Subscriber C18. The establishment message specifies the specific application code and the capacity of the calling party. Subscriber C18 sends an alert message to SSPB 24 acknowledging receipt of the requested call.
In step 90, the SSPB 24 completes the establishment of a voice and data truncal connection between the Subscribers. The SSPB 24 generates and sends a Complete Address Message (ACM) SSPA 22 requesting a voice and data connection (or only a voice connection according to step 84). In response to the ACM message, SSPA 22 sends an alert message to Subscriber A14. When Subscriber C18 answers the call, a connection message is received on channel D in SSPB 24. The SSPB 24 transmits an ISUP Response Message to be sent to the SSPA 22. The SSPA 22 then transmits a connection message to the Subscriber A14. This process establishes a truncal connection between Subscriber A14 and Subscriber C18. In response to the call connection, the SSPB 24 transmits the initiator packet to SSPB 24 through the truncal connection in step 92. The SSPB 24 downloads the initiator packet to the application / data server 48 Subscriber C18 on the D channel of the ISDN lines or to through the POTS lines using the telephone doubler system. When the party receiving the call has control of the application, as in this process of FIGURE 3B, the initiator package associated with the Application Code may include only one application to start. The application to start is written preferably in a language independent of the architecture and initiates the download of the Application Code from the application / data server 48 in Subscriber C18 to Subscriber Al4 in truncal 44 through the connection of call. The Application Code downloaded by Subscriber C18 to Subscriber Al4 preferably includes a communication protocol application that communicates the capabilities of the call parameters, such as data rate, asynchronous, non-transparent, etc. The communication protocol application also specifies a protocol, such as file transfer protocol (ftp), tftp or rpc, for use by subscribers to communicate files. Alternatively, communication protocol application can be downloaded with the initiator package. The IN service designer can specify the protocol to be used and ensure that subscribers are aware of the protocol and support it. In addition, the Application Code downloaded from Subscriber C18 may include a graphical user interface application (GUI), such as an HTML format file or another type of file. A GUI application controls the display of information on computer 28 of Subscriber A14. The three main applications described above (GUI, communication and initiation applications) are simply an example of the applications that can be employed to implement the present invention. Each service designer can select how to submit several applications to a Subscriber. In step 94 of FIGURE 3B, Subscriber C18 downloads the application to Subscriber Al4 through truncal connection 44 and on ISDN lines 17 illustrated in FIGURE 1. If access network lines 17 are ordinary POTS lines, the application can be downloaded through the modem bank 42 using the telephone doubler system. It will be understood that the telephone doubler can also be a POTS with ADSL DMT, which divides the line into subchannels and facilitates the transfer of voice and data at the same time. Alternatively, if line 17 to Subscriber Al4 is only a POTS line but if Subscriber Al4 has an Internet connection through an ISP with the aforementioned telephone doubler system, then Subscriber C18 can download the application through the ISP to Subscriber Al4 using the telephone doubler system. A person skilled in the art will observe that there may be other methods for communicating voice and data traffic in POTS lines as well. Once the application code of Subscriber A14 has been downloaded, a browser (or other programs or equipment that can interpret a language independent of the architecture) manages the communication protocol application in such a way that the information can be exchanged between Subscriber Al4 and Subscriber B16. The browser displays the information, drawings or text, in accordance with what is indicated by the GUI application. The GUI application is preferably an HTML file with links to other HTML files or applications that Subscriber Al4 can download from Subscriber C18. The GUI application can also be an HTML format file where Subscriber Al4 enters various data for processing by a CGI that works on application / server 48 of Subscriber C18. The GUI application may also include applications that are handled by the browser on a computer 28 of Subscriber A14. A further description of an ongoing call is provided with relation in FIGURE 4. FIGURES 3A and 3C illustrate the steps performed by the present invention when an application is within the control of the SS7 Network 12. For example, if the Subscriber Al4 calls Subscriber B16, then the steps described above in FIGURE 3A are carried out again. In accordance with what is described above in relation to FIGURE 3A, Subscriber Al4 enters a number B, that is, the seven-digit number of the party receiving the call, and an application code. The originating SSP, SSPA 22, then performs a number B analysis and determines from the application code that an application / voice call is requested. If Subscriber Al4 has the required capacity, in accordance with what is determined in the subscriber call record, SSPA 22 transmits an ISUP message to the destination SSP, again SSPB 24 in this example, with the application code, the capability of the party making the call and the number B. The SSPB 24 determines the capacity of the party receiving the call, and if both parties have the ability to carry out the operations, the SSPB 24 transmits a TCAP message to the SCP 34 with the application code. SCP 34 collects specific application codes from the calling party if the application code is generic and returns the specific code along with other information about the application to the SSPB 24. However, in this example, the SSPB 24 determines that the specific request required by Subscriber Al4 is within the control of SCP 34, in step 78, and the process proceeds to step B illustrated in FIGURE 3C. In the first step 96 of FIGURE 3C, the destination SSP, SSPB 24 in this example, transmits a TCAP BEGIN message to SCP 34 to look up the associated Application Code in the specific application code entered by Subscriber A14. In step 98, the SCP 34 receives the message and in response, sends a request to the application database (AD) 38 in the SDP 36 to retrieve the Application Code from the application database 38. The SDP 36 may have access to an application database reference table similar to what is illustrated in Table 1 to determine the location and address of the Application Code. Once recovered, SCP 34 transmits the Application Code to SSPB 24 through one or more SCCP UDT / XUDT / LUDT messages, as illustrated in step 100. SSPA 22 removes all message headers or queues, assembles the Application Code and stores said code in a buffer 40, as shown in step 102. Either after or concurrently with steps 96 and 102 to obtain the Application Code, the SSPB 24 completes the process to establish a truncal connection between Subscriber Al4 and Subscriber Blß. The SSPB 24 responds to the ISUP message or to the IAM message sent by the SSPA 22 in step 102. The SSPB 24 transmits an establishment message to the subscriber B16, which in response transmits an alert message SSPB 24. If the subscriber B16 supports voice and data traffic, the SSPB 24 returns an ACM message indicating voice call and application, and a truncation is established between SSPA 22 and SSPB 24 for the application call and voice between the two subscribers, as illustrated in step 104. Once a connection is established, the parties to the call can then communicate with each other through voice traffic or data traffic. The SSPB 24 downloads the Application Code associated with the specific application code to both the subscriber Al4 and the subscriber B16 in step 106 via the truncal connection. If Subscriber Al or Subscriber B16 does not have an ISDN service, the Application Code can be downloaded using the telephone doubler system or other devices in ordinary POTS lines. The Application Code is an application or program defined by the subscriber and may include an application to start, as well as a communication protocol application and GUI application. The communication protocol establishes the parameters for the call connection, such as, for example, data rate and standard communication protocol, such that the subscriber Al4 and the subscriber B16 can communicate data traffic in a call connection. Again, subscribers can communicate files and applications on the call connection using ftp, tftp, rpc protocols or another file transfer protocol that both subscribers support. Preferably, the IN service designer specifies the protocol to be used by the subscribers and informs the subscribers of the need to support the protocol. The GUI application is preferably an HTML file indicating the display on computers 28 for Subscriber Al4 and Subscriber B16. The GUI application can include links to other HTML files stored within the application database (AD) 38. In addition, the GUI application can be an HTML format file that can be processed by CGI manuscripts managed by SCP 34, or the GUI application can include the same applications, such as JAVA aplettes that are managed by the computers 28. These three applications, the start application, the communication protocol and the GUI application are only an example of the applications that can be defined by a subscriber Each service designer or network operator can determine how to present the applications to the subscribers and additional applications to be downloaded according to the service and information that the subscribers wish to communicate. A service provider, such as ABC Airlines, you can create and define your GUI applications or other applications to be stored in your application database and downloaded with the present invention. Again, applications in the Application Code are preferably in a language independent of the architecture that can be handled on different platforms. The computers 28 may include browsers or another program that can interpret the applications in the Application Code, or the computers 28 may have processors that can ctly process the applications. Once the Application Code has been downloaded (either to Subscriber Al from Subscriber B as in FIGURE 3B or to Subscriber Al4 as well as Subscriber Blß from SCP 34 in Figure 3C), voice traffic is exchanged and data between the parties. Additional files or applications can be downloaded by SCP 34 or by the data / application server of the party receiving the call. Data coming from the applications can be stored optionally on a local hard drive of the subscribers. Even though the above modality illustrates that the application may be within the control of the party receiving the call, a person with certain knowledge in the matter will observe that the application may also be under the control of the party making the call. The party making the call can, as in the previous mode, enter the number of the party receiving the call and an application code. The signaling network will determine that the requested application is within the control of the party making the call and downloads a start application to the party making the call instead of downloading said start application to the party receiving the call in the truncal connection. It will be understood that the control of the party making the call is not preferred due to the possibility of viruses and other forms of attacks. FIGURE 4 illustrates the steps involved as the call proceeds after downloading the initial application codes to the parties of the call (step 126). Steps 128, 130, and 132 in FIGURE 4, may occur asynchronously as necessary during the call. In step 128, the parties in the call exchange voice and data communication in the truncal connection by concurrently using the structure communication protocol application. The parties to the call can see the visualization generated by the GUI application while they are chatting with each other. The parties enter information or data required in HTLM form or execute applications. In an alternative embodiment, if an application / server 48 on Subscriber C18 is processing multiple voice and application calls with a limited number of customer service representatives, the application / server 48 may initially block a voice connection with Subscriber A14 . Subscriber Al4 can review the GUI application from the Application Code, submit data, request additional files or additional applications from application / server 48 of Subscriber B16, etc. when Subscriber Al4 requires assistance, Subscriber Al4 can then submit a request for representative / voice connection using a link in a CGI or another application within application / data server 48. Application / data server 48 in Subscriber C18 will process the request and place Subscriber Al4 online to speak with a representative. When the next representative is available, the representative can unblock the voice connection and speak and have access to the same application as Subscriber A14. In step 130, either party may request and download additional applications or files. The additional GUI application may include links to additional files or applications that the party may wish to download. Applications and additional files that are necessary for the execution of an application, required can be invoked automatically as well as by the application. When the need for an additional application arises (either when specifically requested by a party or when automatically requested by an application), the communication application automatically transmits a "flash" and a special code sequence that identifies the required application to the origin SSP. A flash is an event in the middle of a call that the IN network recognizes and informs the SCP so that it is prepared to collect digits. The communication of applications in the IN network uses an IN protocol such as CS1 or AINO.l. The applications executed by the subscribers do not have to act in tandem or synchronously. The same applications do not have to be downloaded on both sides, but the service designer determines the applications required by the parties. In step 132, the parties to the call can store data on a local hard disk. For example, Subscriber Al4 can store data from an HTML file to its hard disk or Subscriber B16 can store data transmitted by Subscriber Blß, such as data from an HTML format file. The application / server 48 may also store information or the computer 28 itself may store information for the C18 subscriber. In step 134, the parties to the call may continue to perform any of the steps 128, 130 or 132, in any sequence or any of the subscribers may terminate the call connection. In step 136, either party can interrupt the call, i.e., by hanging up to the telephone 26 or by entering a disconnection key in the application on the computers 28. Alternatively, an application can be disconnected and an voice call, which would end later by hanging. For example, if the subscriber Al4 and the subscriber B16 are on a voice / application call, subscriber Al4 can hang up the telephone 26 or disconnect from the application. As a result, Subscriber Al4 transmits a disconnection signal to SSPA22. SSPA22 then transmits an ISUP Release message to SSPB24. In response, SSPB24 transmits a complete ISUP Release message to SSPA22, and a disconnection message to Subscriber B16. The Disconnect message may include a termination application, in accordance with what is described below. In response to the reception of a Disconnect message, Subscriber B transmits a Release message to SSPB24 acknowledging receipt of the Release message with a complete Release message. This terminates line 17. Concurrently with the termination of line 20, truncal connection 40 ends upon receipt of the complex release message by SSPA22. SSPA transmits a release message to SSPA 14 that may include a termination application. The termination application erases any application code downloaded during the call session from random access memory (RAM) of computer 28 to subscriber A14, as shown in step 138. Subscriber Al4 transmits a complete message of Release to SSPA 14 and terminate the connection on line 18. Alternatively, the termination application may be downloaded with the initiator packet or be automatically requested during step 136 by the structure communication application in a disconnection message to SSP . Some exemplary applications that may be implemented by the present invention include lines of information, such as account information in the case of a credit card company. Typically, a credit card company requires the entry of the credit card number, zip codes, and / or social security number during account information requests. Due to the increased security of a telephone network, a person will provide your credit card number to your credit card company on a normal voice call in a PSTN network but will not transmit your credit card number, or social security number on the Internet. By downloading applications in the telephony network, the same security can now be achieved in accordance with the system and methodology of the present invention, in such a way that a person making a call can transmit a credit card number or another confidential information in an HTML format file. The person making the call can also talk to a customer representative to request information about the account that both parties can now access on a more secure network. Another example of the implementation of the improvement of the present invention is a person making a call requesting flight information and reservations. Nowadays, in the telephone network in a normal voice call, a person making a call must request individual flight schedules, availability and prices. With the present invention, however, airlines can download to the computer of the person making the call, through the telephone network, a list of schedules and availability for the days requested as well as price information. This would greatly improve the efficiency of communication by providing more information more quickly to the person making the call. The person making the call can then request additional details of a particular flight or additional schedules through the application and pose additional questions to a sales representative. When sales representatives are not available, however, airlines may choose to first place the voice connection on hold while the person making the call is flipping through the applications. The person making the call can request communication with a sales representative when deciding the flight schedules and the price or if some questions arise. Alternatively, an HTML format file can be transmitted to airlines for the person making the call to enter the flight reservation as well as credit card information. Again, due to the increased security of the telephony network provided by the present invention, callers can provide such conventional information in a given telephone network with fewer risks than through the Internet. Airlines can then provide confirmation information, such as receipt, seat number, and flight time, in an HTML file to the person making the call, such confirmation information can be stored on the person's local hard drive that makes the call or print. Other potential uses for the present invention include electronic mail, document editor, spreadsheets, shopping lists, business information, financial information, as well as schedules, such as movie functions, just to indicate some examples. The present invention therefore offers a device for invoking and downloading applications, such as HTML files, data files, or programs, in a telephony network while maintaining a voice connection. This supply of applications in a telephony network has the advantage of an increased security compared to the Internet. The telephone network has clear advantages compared to the Internet because it is without sutures, supports network intelligence, is secure and highly reliable, is designed for circuit switched services, and is more readily available. Most households have a connection to a telephone network while many households do not have Internet connections. The development costs to implement this invention are also low. The changes to the existing telephone network are minimal with the present implementations of the IN network. The present invention allows a user to access a multitude of information and applications in the telephony network with increased security and only with an inexpensive network computer while maintaining a voice connection with the other party. It is believed that the operation and construction of the present invention will be apparent from the foregoing description and, while the invention illustrated and described herein has been characterized as particular embodiments, changes and modifications may be made without departing from the scope of the invention in accordance with that defined in the following claims.

Claims (1)

  1. CLAIMS A telephone network (10) for providing an application call, comprising: at least one switch (21) at a service switching point (22, 24) of the telephony network (10) connected to several subscribers ( 14, 16, 18); and a signaling network (12) for providing signaling within the telephony network (10), said signaling network (12) includes: an application database (38) for storing a multiplicity of applications; a service control point (34) communicating with said application database; a plurality of signaling transfer points (35a, 35b, 35c, 35d) in communication with said service control point (34); and at least one service switching point (22, 24) in communication with said service control point (34) through said signaling transfer points (35a, 35b, 35c, 35d) and connected to said switch ( 21) at said service switching point (22, 24), said at least one service switching point (22, 24) receives applications stored in said application database (38) and transmits the applications to at least one of said subscribers (14, 16, 18). A telephone network (10) according to claim 1, wherein said service switching point (22, 24) further includes an application buffer (40) for storing applications received from said application database (38) . The telephone network (10) according to claim 2, wherein said service switching point (22, 24) receives an application code entered by one of said subscribers (14, 16, 18) and requests said point of service control (34) an application associated with said application code. The telephone network (10) according to claim 3, wherein said service control point (34) further includes an application reference table for locating said applications stored within said application database (38). The telephony network (10) according to claim 4, wherein said application reference table includes a data field for specific application codes associated with a unique application within said application database (38), and a data field for generic application codes associated with various applications within said application database (38). 6. The telephone network (10) of claim 5, further including: an intelligent peripheral (23) for collecting digits dialed by user specifying a specific application code; and wherein said service control point (34) requests said intelligent peripheral (23) to collect said specific application code in response to the reception of a generic code from said service switching point (22, 24). The telephony network (10) according to claim 6, further including a service data point (36) connected to said service control point where said service data point (36) includes said service base (36). application data (38). The telephone network (10) of claim 7, wherein said applications stored within said application database (38) include applications defined by the subscriber. 9. The telephony network (10) according to claim 8, wherein said applications stored within said application database (38) include a startup application for initiating the download of applications from one subscriber to another subscriber. The telephone network (10) according to claim 9, wherein said voice and data switch (21) at said service switching point (22, 24) communicates with said subscribers (14, 16, 18) via lines (17) capable of transmitting voice and data traffic. 11. The telephone network (10) according to claim 10, wherein in said voice and data switch (21) communicates voice traffic and applications stored in said application database (38) concurrently with at least one of the subscribers (14, 16, 18) through said lines (17). The telephone network (10) according to claim 11, wherein said lines (17) are digital lines. 13. The telephone network (10) according to claim 1, further including a service point for use in a telephone network (10), said telephone network (10) has several subscribers (14, 16, 18), said service point comprises: an application database (38) for storing at least one application there, each of said applications having a specific associated application code, and a downloading device for downloading a respective application of said applications to a given subscriber among said subscribers (14, 16, 18) after said given subscriber (14, 6, 18) enters a specific associated application code. . The service point according to claim 13, further including an application reference table for locating said respective application within said applications database (38). . The service point according to claim 14, wherein said application reference table includes a first data field containing respective associated application-specific codes for each of said at least one application and a second data field containing a plurality of generic application codes, each associated with a plurality of said applications within said application database (38). . The service point according to claim 15, wherein said applications stored in said application database (38) comprises: subscriber-specific applications; and startup applications for initiating the download of applications from a subscriber of the telephony network (10) to another subscriber of the telephony network (10). . The service point according to claim 16, wherein said service point is a service control point (34) in a signaling network (12) of the telephony network (10). . The service point according to claim 16, wherein said service point is a service data point (36) in a signaling network (12) of the telephony network (10). . A service switching point (22, 24) for use in a telephony network (10), comprising: an application buffer (40) for storing applications downloaded from an application database (38) in the telephone network (10). The service switching point (22, 24) in claim 19, which further includes a bank of modems (42) to transmit voice and data traffic on analog lines (17) to a subscriber of the telephony network (10). A method for providing a voice / application call in a telephony network (10), comprising the steps of: receiving an application code in the telephony network (10) from a subscriber making a call (14) and receiving a telephone number from a subscriber number receiving the call (18); determining whether the subscriber making the call (14) and the subscriber receiving the call (18) have a double capacity of communication in a voice call / application in the telephony network (10); in response to the determination that the subscribers (14, 18) have the double capacity of communication in a voice / application call, establishing a truncal connection between the subscribers (14, 18); determining an application mode associated with the application code, a first mode corresponding to said application that is within the telephony network (10) and a second mode corresponding to said application that is under the control of one of the subscribers (18) of the call; in response to the determination that the application associated with the application code is located within the telephony network (10), in said first mode, downloading an application associated with the application code from an application database ( 38) in the telephone network (10) both to the subscriber receiving the call (18) as the subscriber making the call (14) in the truncal connection (44); and in response to the determination that the application associated with the application code is under the control of the subscriber receiving the call (18) of a call in said second mode, downloading to the subscriber receiving the call (18) an application of initiate the download of the application to the subscriber making the call (14) in the truncal connection (44). 22. The method according to claim 21, wherein the step of determining whether the subscriber making the call (14) and the subscriber receiving the call (18) have the ability to communicate in a voice call / application in the telephone network (10), includes the steps of: evaluating a first subscriber call record associated with the subscriber making the call (14) to determine the services to which the subscriber making the call (14) is subscribed and to determine the physical capabilities of the subscriber making the call (14); and evaluating a second subscriber call record associated with the subscriber receiving the call (18) to determine the services to which the subscriber receiving the call (18) is subscribed and to determine the physical capabilities of the subscriber receiving the call (18) The method according to claim 21, wherein the step of determining whether an application associated with the application code is located within the telephony network (10) in a first mode or within the control of one of the subscribers (14, 18) of the call in a second mode, comprises the steps of: transmitting the application code received from the subscriber making the call (14) to a control point that connects to an application database ( 38); and receiving a response from said control point indicating a specific code for the application and if the application is within the telephony network (10) or under the control of one of the subscribers (14, 18) of the call . 24. The method according to claim 23, wherein the step of transmitting the application code includes transmitting an invocation message to the control point in a signaling network (12) of the telephony network (10) . The method according to claim 24, wherein the step of downloading an application associated with the application code from an application database (38) in the telephony network (10) to both the subscriber receiving the call (18) as the subscriber making the call (14) in the truncal connection comprises the steps of: transmitting a message to the control point that includes the specific code for the application; receive the application in one or several answers from the control point; combine the application received in the response or the various responses in an application buffer (40); and downloading the application to both the subscriber making the call (14) and the subscriber receiving the call (18) in the truncal connection. . The method according to claim 23, wherein the step of downloading the subscriber (18) with application control, a startup application that initiates the download of the application to the other subscriber (14) in the truncal connection, comprises the steps from: transmitting a message to the control point that includes the code specific to the application; receive the start application in one or several responses from the service control point (34); assembling the initial application received in the response or the various responses in an application buffer (40); and download the start application to the subscriber (18) with control of the application in the truncal connection (44). . The method according to claim 21, further including the step of: determining that the application code received from the subscriber making the call (14) corresponds to a request for voice call / application by accessing a table of initiators . . The method according to claim 27, further including the step of: determining the routing information for the telephone number of the subscriber receiving the call (18). . A method for providing an application in a telephony network (10), comprising: receiving an invocation message with an application code in a signaling network (12) of the telephony network (10) at a control point of service (34), said invocation message is transmitted from a service switching point (22, 24) in response to one of the subscribers (14, 16, 18) entering an application code; determine if the application code is a specific code associated with the application; in response to the determination that the application is not a specific code, obtain the specific code associated with the application by requesting said subscriber (14, lß, 18) a specific code- retrieve the application associated with the specific code in a database of applications (38) in the telephone network (10); and transmitting the application for download to the subscribers (14, 18) to the telephone network (10). 30. The method according to claim 29, wherein the step of determining whether the application code is a specific code associated with an application comprises: accessing an application code database table including data fields specifying codes generic and specific that correspond to several applications; and compare the application code with the generic and specific codes for the plurality of applications. The method according to claim 30, wherein the step of obtaining the specific code associated with the application comprises the steps of: transmitting an instruction to a smart peripheral (23) to ask a subscriber making a call (14) the specific code associated with the application. The method according to claim 31, wherein the step of retrieving the application associated with the specific code in an application database (38) in the telephony network (10) comprises the steps of: accessing an entry in the application code database table corresponding to a specific code, where the entry includes a field specifying the address of the application in the application database (38); have, access to the application database (38) in the application's address. The method according to claim 29, wherein the step of transmitting the application for downloading subscribers (14, 18) to the telephony network (10) comprises the step of transmitting one or more signaling messages to a switching point of services (22, 24) in the signaling system of the telephony network (10). SUMMARY OF THE INVENTION A telephony network (10) is presented that includes a signaling system that offers intelligent network services. The signaling system includes a service control point (34) that communicates with an application database (38). The application database (38) includes subscriber defined applications that are associated with an application code. The signaling system includes a service switching point (22, 24) in communication with the service control point (34) through one or more signaling transfer points (35). In operation, subscribers (14, 16, 18) to the service can communicate through voice traffic and applications in a call connection. The applications can be found in the application database (38) or in a server (48) of the subscriber receiving the call. A subscriber (14) enters the number of the called parties and an application code. If the application is in the application database (38), the signal switching point (22, 24) establishes a truncal connection between the parties and downloads the application designated by the application code to both subscriber computers ( 28, 31). If the application meets the called subscriber (B, C), the signal switching point (22, 24) establishes a truncal connection (44) and instructs the subscriber to download the application on the truncal connection (44).
MXPA/A/2000/005961A 1997-12-19 2000-06-16 Architecture independent application invocation over a telephony network MXPA00005961A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US08994861 1997-12-19

Publications (1)

Publication Number Publication Date
MXPA00005961A true MXPA00005961A (en) 2001-05-17

Family

ID=

Similar Documents

Publication Publication Date Title
EP1040680B1 (en) Architecture-independent application invocation over a telephony network
US5838682A (en) Method and apparatus for establishing communications with a remote node on a switched network based on hypertext dialing information received from a packet network
JP3226929B2 (en) Apparatus and method for coordinating telephone and data communications
CA2249841C (en) Pots/packet bridge
US6144667A (en) Network-based method and apparatus for initiating and completing a telephone call via the internet
CA2283646C (en) Method and apparatus for providing customized voice call processing
US7924816B2 (en) System and method for servicing calls originating via the Internet
US6226286B1 (en) Apparatus and method for communication between data network and telecommunication network
US20030099341A1 (en) Method and system for providing access to a voice mail system
US20070036315A1 (en) Platform for rapid development of telecommunication services
US6671365B2 (en) Method and arrangement for call control using a computer connected to a network
US20080037524A1 (en) Remote Control Telephone Dialing System and Method
US6788774B1 (en) System and method of providing a per-use, auto-generation, personalized web page service
AU728548C (en) Device and method for communication between a data network and a telecommunications network
US7512225B2 (en) Computer-telephony integration
MXPA00005961A (en) Architecture independent application invocation over a telephony network
CN1308817A (en) Hypertext transport protocol interface in an intelligent network node
WO2003107691A1 (en) Service logic context cache for signaling events
EP1288800A2 (en) Split browser
EP1001592A1 (en) Extending internet calls to a telephone call center
JP2001358846A (en) Communications equipment and method for performing communication with specified subscriber device
WO1999026398A1 (en) Arrangement in one or more communication networks, wherein communication channels are established between two or more parties
KR20000052820A (en) Device and method for communication between a data network and a telecommunications network