MXPA99010721A - Internet-based subscriber profile management of a communications system - Google Patents

Internet-based subscriber profile management of a communications system

Info

Publication number
MXPA99010721A
MXPA99010721A MXPA/A/1999/010721A MX9910721A MXPA99010721A MX PA99010721 A MXPA99010721 A MX PA99010721A MX 9910721 A MX9910721 A MX 9910721A MX PA99010721 A MXPA99010721 A MX PA99010721A
Authority
MX
Mexico
Prior art keywords
subscriber
data
screen
services
request
Prior art date
Application number
MXPA/A/1999/010721A
Other languages
Spanish (es)
Other versions
MX9910721A (en
Inventor
Allen Miller James
S Vaidya Ramchandras
Original Assignee
Mci Communications Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US08/862,134 external-priority patent/US6587867B1/en
Priority claimed from PCT/US1998/010227 external-priority patent/WO1998053582A1/en
Application filed by Mci Communications Corporation filed Critical Mci Communications Corporation
Publication of MX9910721A publication Critical patent/MX9910721A/en
Publication of MXPA99010721A publication Critical patent/MXPA99010721A/en

Links

Abstract

A telecommunications system includes multiple services. For example, the system provides multiple communications services with a single number for a subscriber. The subscriber can easily configure, manage and update these services via the Internet, by accessing a service or subscriber profile detailing the services specific to the subscriber. The subscriber profile specifies which communication services the subscriber wishes to provide to different people who call the subscriber's telephone number. The system provides a World Wide Web access method to the subscriber's profile. The system includes security safeguards to ensure security to the system.

Description

ADMINISTRATION OF INTERNET BASED SUBSCRIBER PROFILE OF A COMMUNICATIONS SYSTEM TECHNICAL FIELD The present invention relates generally to telecommunications systems, and particularly to the administration of telecommunications systems, such as systems that have individual telephone number access to multiple communications services.
BACKGROUND OF THE INVENTION In conventional telecommunications systems, many different telecommunications services are offered to subscribers. Each telecommunications service typically requires a unique telephone number. Examples of telecommunications services that require a unique telephone number are automatic routing services, voice mail services, facsimile services, location services, cell phone services and personal 800 numbers. One of the inconveniences that each service requires a different telephone number is that the administration and publication of multiple telephone numbers for a subscriber that uses multiple communications services can prove to be very difficult to manage. For example, a subscriber may have to provide a first telephone number for facsimile services, a second telephone number for voice mail services, and a third telephone number for cellular services. In this way, a subscriber must remember all the unique telephone numbers, and must clarify to the persons to whom the subscriber gives the telephone numbers, what services are associated with which telephone numbers. Frequently, one party confuses the mapping of the telephone numbers to the services, and arrives at the wrong service when dialing the telephone number that was given to the party. For example, a caller can dial a number, thinking it will reach a person, and instead the caller arrives at a facsimile machine. Another inconvenience of conventional systems is the lack of flexibility with respect to the telecommunications services provided to subscribers. A subscriber may need to provide access to different services, to different people, at different times. For example, a subscriber may need to have telephone calls addressed to the subscriber's workplace during the business week, but may need to have phone calls addressed to their home or cell phone on weekends. The subscriber may also wish to limit people who can reach the subscriber by phone on weekends. Still further, the subscriber may wish to provide other people with access to their voice mail.
Unfortunately, with such conventional systems that configurability of telecommunications services is not available. On the other hand, a subscriber has difficulty managing a multitude of communications services, where each service has a different number. For example, if the subscriber wishes to update multiple aspects of their services (eg, voice mail) through a telephone, multiple selections and iterative menu presentations are required. The Patent of the United States of North America Number 5,375,161 describes a telephone system that provides numerous services for a subscriber, using a single telephone number. The subscriber can configure their telephone services by means of numerous voice menus and pressure button inputs or multiple double tone frequencies (DTMF). The subscriber can configure the selected telephone services, and store that configuration in a memory. Unfortunately, the system under this patent suffers from a need to interact with multiple iterative menu selections while programming its memories. Additionally, the subscriber can call back a number associated with each memory and the contents of that memory, to remotely program their telephone services.
COMPENDIUM OF THE INVENTION The aspects of the present invention overcome the problems of the above telecommunication systems, and provide additional benefits, as described in detail herein. Under an exemplary embodiment of the invention, a telecommunications system provides numerous communications services, associated with a single number for a subscriber. The subscriber can easily configure, manage and update these services through a network, such as the Internet. The subscriber accesses a service or subscriber profile that details the specific services to the subscriber through the Internet. The subscriber can quickly identify a specific service that the subscriber wishes to reconfigure, by selecting one of many selections that are visually displayed on a screen simultaneously. That selection of multiple options presented simultaneously on a screen is substantially faster than asking the subscriber to listen to a serial stream of audio messages in an audio-based menu. The rioters may try to automatically access previous telecommunications services, by trying to enter personal identification numbers (PIN) or other codes within those previous systems. The exemplary mode, rather, provides improved security on previous systems. For example, when a subscriber initially accesses a web server under the exemplary mode, a "pass password" is associated with the subscriber's session. The passcode of a subscriber is validated or authenticated, based on the part in the keyword of the subscriber and the Internet address. The present invention encompasses a method implemented by computer, for use in a communication system coupled to the Internet. The method includes the steps of: (a) receiving a request for access, through the Internet, of a subscriber-specific record related to the system; (b) receive, through the Internet, alternative data for registration; and (c) update the record based on the alternative data received. The present invention also encompasses an apparatus in a telecommunications network. The device includes a memory and a network server. The memory stores a subscriber-specific record related to the system. The network server is coupled between memory and the Internet. The server of the network (a) receives a request for access, through the Internet, of the registry, (b) receives via the Internet, alternative data for the registration, and (c) request the alteration of the record in the report, based on "the alternative data received.
BRIEF DESCRIPTION OF THE DRAWINGS An exemplary embodiment of the present invention will now be described in more detail with reference to the following figures. Figure 1A is a block diagram showing a first configuration of the system, which is suitable for practicing the exemplary embodiment of the present invention. Figure IB is a block diagram showing a second configuration of the system, which is suitable for practicing the exemplary embodiment of the present invention. Figure 2 is a block diagram showing details of a portion of the system of Figures IA and IB. Figure 3 is a flowchart of data messages, illustrating an initiation process or identification entry of a subscriber. Figures 4A, 4B and 4C are flow diagrams showing the steps performed by a Web browser, Web server and password pass server, respectively, of the Figure 2, during the identification entry process of Figure 3. Figure 5 is a front view of a computer screen, showing an exemplary subscriber identification entry screen. Figure 6 is a front view of a computer screen, showing a screen of selecting services copy . Figure 7 is a front view of a computer screen, showing an exemplary identification entry failure screen. Figure 8 is a data or message flow diagram illustrating a service selection process. Figures 9A-9C are flowcharts that show the steps performed by the Web browser, the Web server and the passcode server, respectively, of Figure 2, during the service selection process of Figure 8. Figure 10 is a front view of a computer screen, showing an example call routing option screen. Figure 11 is a front view of a computer screen, showing an exemplary guest menu option screen. Figure 12 is a front view of a computer screen, showing a screen of null exemplary routing option. Figure 13 is a front view of a computer screen, showing an exemplary speed dial number selection screen. Figure 14 is a front view of a computer screen, showing an exemplary voice mail options screen.
Figure 15 is a front view of a computer screen, showing an exemplary fax mail options screen. Figure 16 is a front view of a computer screen, showing a screen of exemplary call selection options. Figure 17 is a front view of a computer screen, showing an exemplary error screen. Figure 18 is a front view of a computer screen, showing an exemplary final screen. Figure 19 is a schematic diagram of an exemplary screen arrangement. Figure 20 is an exemplary data flow diagram, including the data flow with respect to passwords, under the portion of the system of Figure 2. Figure 21 is an exemplary subscriber profile with exemplary fields in the same. Figure 22 is an exemplary data structure of a pass password. Figure 23 is an exemplary directory structure used by the Web servers in Figure 2.
DETAILED DESCRIPTION OF THE INVENTION I. General View In the United States of America Patent Application titled, "Single Telephone Number Access to Multiple Communications Services", filed concurrently with the present and assigned to the assignee of the present application, is described in detail a system that overcomes the problems of the prior art. As described in this application, a platform enables multiple telecommunications services to be accessed through a single telephone number. In this way, for example, you can have access to location services, facsimile services, routing services, voice mail services, calling card services, and personal 800 services, through a single telephone number. The subscriber has complete control over access to these services. In particular, the subscriber can specify what services are available to which people at what time. Accordingly, a first subset of the services to which the subscriber subscribes may be available to a first party in a first hour, and a second subset of services may be available to a second party in a second hour. On the other hand, a single party may have access to different subsets of the services, depending on what time it is. The platform of the exemplary embodiment of the present invention it also provides the subscriber with the ability to establish multiple calls from any location, using the same telephone number, and billing all calls to a single account. The subscriber is assigned a single telephone number, such as a toll-free 800 number or an 888 number. This unique telephone number can be used by other parties ("guests") to reach the subscriber at any destination telephone number, programmed by the subscriber. In addition, the unique telephone number can be used to send a fax to the subscriber, to leave a voice mail message for the subscriber, or to locate the subscriber. The subscriber can also schedule the routing, in such a way that a call established in the subscriber's unique telephone number reaches the subscriber in multiple locations. In addition, as mentioned above, different callers can reach different services. As an example, calls from certain callers can automatically cause a pager message to be issued or set automatically in voice mail. A subscriber is assigned multiple personal identification numbers (PINs). Each PIN is a short sequence of alphanumeric characters. Each PIN is associated with a different service configuration. One of the NIPs is assigned only to be used by the subscriber, and when the Subscriber calls their assigned telephone number, and enters their PIN, the platform knows that the subscriber is calling, and offers subscriber-only services. The other NIPs can be assigned for different service profiles. These NIPs can be distributed to the appropriate parties, to specify what services will be available to those parties. For example, a first NIP can be given to the members of a subscriber's family, while a second NIP can be given to the subscriber's business associates. As a result, family members will have access to a first set of services, and business associates will have access to a second set of services. Multiple outgoing calls to domestic destinations or international destinations will be billed to a single account. This account can be a calling card account, a credit card account, or an account that is specially designated for this grouping of services. As a result, a subscriber does not need to enter a calling card number multiple times, when establishing multiple calls. A subscriber can also access their account to make updates to a service profile that is maintained. As an example, the subscriber can change the termination telephone numbers used to reach the subscriber. Similarly, a subscriber can change which callers are sent to voicemail, and which callers automatically trigger a pager message to be sent. Under the United States of America patent application referred to above, subscribers access and alter their service profile by dialing into their account. Unfortunately, typically subscribers can only input a dual-tone multi-frequency (DTMF) input, such as the 12 DTMF buttons on typical telephones. Therefore, the DTMF entry is limited. Under one embodiment of the present invention, subscribers can easily configure, manage and update their subscriber profile service, by means of a graphical user interface, which subscribers access via a computer network or inter-network such as the Internet. When they are on the Internet, subscribers access their profiles through access to The World Wide Web ("Web"), to specify which communications services subscribers wish to provide to different people who call their unique numbers . Under one embodiment of the present invention, a subscriber can use any Web browser and Internet access provider to access his subscriber profile. By entering a specific Internet address in your web browser, subscribers arrive at a Web server that is part of a system under one embodiment of the present invention. The system, including the Web server, authenticates each subscriber. The system then provides a graphical user interface (GUI), in the form of simple-to-use Web pages, which subscribers use to update their subscriber profiles. These updates are recorded and updated in near real time, so that the next call made to a subscriber's number will serve the updated profile.
II. Platform Architecture Figure IA is a block diagram illustrating a first architecture of the system for practicing the exemplary embodiment of the present invention, wherein the architecture of the system is part of a larger telecommunications network. The system includes a platform 10 that includes multiple components. The platform 10 provides a single telephone number with access to multiple telecommunications services for a subscriber. In this context, the subscriber is the customer to whom the unique telephone number is assigned. The unique telephone number can be accessed by both the subscriber and the people who call the subscriber (ie the guests). A call originator 12 illustrated in Figure 1A represents the origination of a call to platform 10. This call it can be from a subscriber or from a person calling platform 10. This call can be from a subscriber or a caller who is looking to reach the telephone number that is assigned to a subscriber. On the other hand, the call can be from a facsimile machine or from a computer. The call arrives at a switched network 14 of the service provider, in any of many different ways, including local exchange carrier, private line, dedicated access line, or international carrier. The switched network 14 routes the call to an automatic call distributor (ACD) 18 inside the platform 10, by means of a main release link (RLT) line 16. The RLT 16 is a main voice line that can be freeing a call, when the call is extended back to the network 14 switched by the ACD 18. The ACD 18 routes the incoming calls to the appropriate components within the platform to properly handle the calls. The ACD 18 is a conventional digital matrix switcher that includes programs to perform the linear list and call distribution. A suitable ACD is the DMS-100 from Northern Telecom. The platform 10 also includes an application processor (AP) 46 that is associated with the ACD 18. The AP can be a dedicated computer system that provides intelligent application processing for the ACD 18. Certainly The functionality that ACD 18 can perform is downloaded to AP 46, to enable the ACD to focus on performing the switching and linear listing functionality. The AP 46 is linked to the ACD 18 by means of an implementation of the Integrated Services Digital Network (ISDN) of a switch / computer application interface (SCAI) link 30. The platform 10 includes an audio response unit (ARU) 20 that provides voice response and menu routing functions to the caller. The ARU 20 facilitates the entry of the caller by means of the selection of DTMF digits, such as by pressing keys on a telephone keypad. The ARU 20 can provide different automated menus, in which the caller can navigate, to reach a desired service. The ARU 20 includes a network audio server (ÑAS) 22, which is a server computer that has a voice telephony interface to the ACD 18. The ÑAS 22 is linked to the ACD 18 by means of multiple main 23 lines of communication. voice and, in general, provides an audio interface to a caller. The ARU 20 also includes an automatic call processor (ACP) 24. ACP 24 provides intelligent call processing functions for ARU 20. ARU 20 is responsible for handling all initial incoming calls for platform 10. ACP 24 operates by executing the manuscripts that carry to callers through a series of menus, accepting the incoming caller, making decisions based on the input of the caller, and performing actions such as transferring a call to another destination, to provide appropriate services. The ACP 24 instructs the ÑAS 22 to reproduce manuscripts or indications to callers, collect the DTMF digits, reproduce different recorded messages, and direct the caller to other destinations. The ACP 24 can be implemented in a high-grade mid-range computer, such as the IBM RS / 6000 from the International Business Machines Corporation, or an Alpha DEC-based computer from the Digital Equipment Corporation. Manuscripts executed by ACP 24 determine what communications services to provide to a caller, and then provide those services by ordering ÑAS 22 to transfer the call to the appropriate service provider. Manuscripts executed by ACP 24 are customized for a subscriber by using a subscriber profile as input data. The subscriber profile is stored for the platform to use, as will also be described in more detail later. The subscriber profile specifies what services are available to a subscriber and guests, and what destination numbers will be used. The AS 22 and the ACP 24 can be linked, for example, by means of an Ethernet® Local Area Network (LAN) 26 (Ethernet® is a registered trademark of the Xerox Corporation). The platform 10 may include one or more operator consoles 28. These operator consoles 28 are specialized work stations that are operated by human operators. The operator consoles 28 can perform much of the same functionality as the ARU 20. In particular, the human operator in the operator console 28 can perform the appropriate manuscripts, give directions and transfer. Platform 10 may have a voice mail / fax mail (VFP) platform 32. This platform gathers, stores, and manages both voice mail messages and facsimile messages. It gathers the voice mail and facsimile messages, through the main lines 33 of Group D of Characteristics (FGD), from the switched network 14. Calls that require voice mail or facsimile services are transferred to VFP 32 from ARU 20, as will be described in more detail later. A transfer occurs with the help of the ACD 18 and the switched network 14. The VFP 32 is also connected to the Ethernet LAN 26. Platform 10 may include multiple network deployment distribution servers (NIDS) 27, 34 and 36. Each of these NIDS can be implemented as a separate computer system. NIDS can be redundant, and generally play the role of storing information from the database, including subscriber profiles. The NIDS 27, 34 and 36 can all be connected to the Ethernet LAN 26, in the system configuration illustrated in Figure IA. The NIDS 27 are displayed as part of the ARU 20, such that the ACP 24 can directly access the subscriber profiles, without having to pass through the Ethernet LAN 26. In general, ACP 24 presents queries from the database to NIDS 27, to obtain data on the subscriber's profile. The subscriber profile is used to determine which manuscripts to reproduce for a caller, to determine which communications services can be offered to a caller, and to determine which telephone numbers of destination and mail identifiers to use. VFP 32 presents queries to NIDS 34 for subscriber profile information and processing of voicemail and facsimile messages. The NIDS 27, 34 and 36 are also interconnected by means of a local area network (LAN) 38 of password pass ring. This LAN 38 is used for updates that are made to the subscriber profiles, and to maintain the databases stored in the different NIDS, consistent with a centralized profile database, which maintains the structure profile management system 40. principal (which is in a dedicated main structure or other suitable computer system). When a modification is made or update in a NIDS 27, 34 or 36, the affected NIDS sends a message to the main structure profile management system 40, which makes the update to the centralized profile database, and then ensures that it is updated every one of the profile databases in the other NIDS. The platform 10 includes one or more Web servers 42 that are connected to the LAN 38 of the pass-through password ring, to provide a Web site to which a subscriber can access via the Internet 44. As described in detail below, the page or Web pages in the Web server 42, enable a subscriber to update the subscriber profile for the subscriber, through the Internet. These updates can be sent to the main structure profile management system 40, which in turn updates the information stored in the NIDS 27, 34 and 36. Alternatively, a NIDS can be resident with the Web server, in such a way that the NIDS associated with the Web server updates the profile information, and passes the update to the main structure profile management system 40. Those skilled in the art will note that the Web server 42 can also be part of an intranet instead of the Internet. Still further, those skilled in the art will note that the Web server 42 may more generally be a program that provides subscribers with a user interface, such that subscribers can update the service profile information through a computer. Accordingly, a program can be a resident program on a server that is part of a distributed system such as a LAN or a wide area network (WAN). Figure IB shows a second configuration of the system, which is suitable for practicing the exemplary embodiment of the present invention. This second configuration differs from the first configuration in many aspects. First, there are no NIDS inside the ARU, and there are no NIDS associated with the VFP. In this second configuration of the system, queries of the Adapt database of ACP 24 in VFP 32 are passed through Ethernet LAN 26 to NIDS 36. Secondly, VFP 32 extends directly to ACD 18 via of lines 33 'FGD. As a result, call transfers from ARU 20 to VFP 32 can be made by ACD 18 inside platform 10. There is no need to transfer the call outside the platform. Those skilled in the art will note that the system configurations shown in Figures IA and IB are intended to be illustrative only. For example, multiple platforms can be implemented within a given telecommunications system. In addition, multiple operator consoles 28 can be provided inside the platform 10, and multiple ACDs can be provided. Each ACD can have its own associated AP. In addition, multiple ARUs can be provided within a given platform, and multiple ACDs can be combined with a single VFP. Still further, the components may be connected by different types of LANs or interconnections that differ from those shown in Figures 1A and IB. In the United States of America Patent Applications entitled, "Single Telephone Number Access to Multiple Communications Services," "Multiple Routing Options Into A Telecommunications Service Platform," "Outbound Calling Services on On-line Telecommunications Service Platform," "Integrated Messaging Platform" ", and" Integrated Voicemail and Faxmail Plat orm for A Communications System ", which were presented concurrently with and are assigned to a common assignee of the present application, describe additional details regarding platform 10 and its services related to greater detail. Referring to Figure 2, the logical architecture of the connection between the platform 10 and the Internet 44 is shown. The architecture is logical, in the sense that many server components can be obtained in a computer that shares resources (for example, memory, processors, etc.). Although three Web servers 42 are shown in Figure 2, platform 10 may employ a smaller or larger number of Web servers, depending on the volume of the Web server.
Internet traffic on the platform. Web servers 42 can use separate application servers (not shown). Each application server is dedicated to one or more applications, such as the administration of subscriber profiles, personal Web spaces for subscribers, message center for email, voice mail and / or fax mail, subscriber profiles for smart cards, etcetera. Additional application services can be added to each Web server 42, as additional applications are added to platform 10. A subscriber employs any of different Web browsers, such as Netscape Corp. Internet Navigator®. Subscriber accesses the Internet 44 by using any Internet service provider (ISP). Through the 60 Web browser, the ISP and the Internet 44, the subscriber accesses one of the 42 Web servers. The Web servers 42 run an appropriate Web operating system such as the Netscape 's Commerce Server HTTP server in secure mode. As generally used herein, "secure" refers to the use of the secure socket layer (SSL) or other method to ensure that the connection between the Web browser and the Web server 42 is secure. The use of SSL prevents data or passwords (described below) from being stolen without having physical access to the subscriber's platform in which The 50 Web browser is operating. In response to a request for access to a subscriber profile, the Web server 42 requests a passcode of a passcode data base 64, by means of a passcode server 62. Although the passcode server 62 is shown in Figure 2 as a separate box coupled to each of the Web servers 42, each of the Web servers can have its own password server pass, and by the same share a common hardware platform. The step password data base 64 maintains the passcode information. The passcode data base 64 stores not only the information regarding the passwords, but also provides additional databases of information, such as keywords, subscriber identification codes, and so on, and therefore, herein, it is referred to interchangeably as the base 64 of password pass data and database 64 of data. The passcode server 62 and the passcode data base 64 are used for the identification entry and the subscriber authentication, as described below, and are particularly useful for the security of the platform 10. When the server Step password 62 issues a validated pass password, the pass password is used to track the status information for the interaction of a subscriber with the 42 Web server ("a Web session"). The passwords issued and validated allow the subscriber to access the subscriber profile stored in one or more of the NIDS 27, 34, and / or 36, through LAN 38. The Web servers 42 perform two main tasks. First, Web servers 42 authenticate users by first authenticating subscribers in the identification entry, as described below. Second, Web servers 42 send at least one page or default service screen to subscribers, which is an initial screen presented to the subscriber, as described below. An optional NIDS 66 may also be coupled to, or reside with, the Web server 42, which communicates with the LAN 38. The NIDS 66 passes the subscriber profile updates to the mainframe profile administration 40, through LAN 38. As described herein, NIDS 66 is isolated from Web server 42 by means of a firewall 117 based on the router (Figure 3). The fire barrier 117 also isolates the passcode data base 64 from the passcode server 62 and the Web server 42. Another firewall 115 protects Web servers 42 from the Internet 44. In general, a "firewall" is a combination of hardware and software that limits the exposure of a computer or group of computers to an external attack.
Therefore, the fire barrier 115 reinforces a boundary between the Internet 44 and the Web servers 42, while the fire barrier 117 reinforces a boundary between the base 64 of password pass data and the NIDS 66 (and other bases of NIDS data), and passcode server 62 and Web server 42. As shown in Figure 3, the platform 10 employs the first fire barrier 115 between the subscriber and the subscriber's Web browser 60, and the Web server 42. The second fire barrier 117 extends between the passcode server 62 and the passcode data base 64. As a result, a data management zone (DMZ) extends between the first and second fire barriers 115 and 117, to separate the Web server 42 and the password server 62 from the Internet (by means of the first fire barrier 115) and the data stored in the step password data base 64 (by means of the second fire barrier 117).
III. System Operation Access to subscriber profiles begins with an identification and authentication entry process. An exemplary authentication and identification entry process for a subscriber is then described, with respect to the data flow diagram of Figure 3, the flow diagrams of Figures 4A-4C and the graphs of screen of Figures 5-7. The flow diagrams of Figures 4A-4C chronologically show the steps performed by the web browser 60, the Web server 42, and the pass-through server 62. A subscriber interacting with the web browser 60 causes the web browser to issue a "get identification entry" request screen to one of the Web servers 42 in step 202 of a routine 200 (Figure 4A). In step 202, the subscriber requests connection to the Web server 202, by entering a uniform resource locator (URL) appropriate, such as "directline.MCI.com." To this URL one or more of the Web servers may be assigned. One of the Web servers 42 is selected from the set of Web servers, using any desired algorithm, such as cyclic circuit addressing. Web servers 42 contain collections of Hypertext documents or pages of Hypertext Markup Language (HTML). The terms "screen" and "page" are used in the present generally interchangeably. The Web browser accesses individual HTML pages, using the known Hypertext Transport Protocol (HTTP). In this way, the URL provided by the Web browser to the Internet 44 has the form "HTTP: // directline. Mci. Com." The password server 62, in general, listens to the appropriate commands in the ports of Control Protocol Transmission (TCP) for the request of passwords from the 42 Web server. The Web server 62, in turn, requests the validation of a pass-through password of the passcode data base 64. . From the Web server 42, an HTML page is sent to the Web browser. As you know, an HTML page describes, among other things, the structure of a document for visual display on a computer screen. The initial HTML page verifies the Web browser to see any required standards or language compliance, and visually displays a welcome message. For example, the initial HTML page confirms that the Web browser is in accordance with, or can interpret, short applications or small applications.
(APPLETS) written in a given language, such as Java. If the web browser 60 does not agree, the web server 42 issues an appropriate message, indicating that the web browser can not be used to access and / or update the subscriber's profile. In response to the request to "obtain the identification entry" of the Web browser, the Web server 42, in step 304 of a routine 300, sends a request for a one-time pass password, for the password server 62. of passage (Figure 4B). In step 304, the Web server 42 also receives the subscriber's IP address, which is associated with the subscriber's initial request. The server 62 of pass-through password, in response to the request of the pass-through password, issues a pass-through password in step 404 of a routine 400 (Figure 4C). The routines 200, 300 and 400 are performed by the Web browser, the Web server 42 and the pass-through server 62, respectively. In step 406, the passcode server 62 updates the passcode data base 64 that has issued the selected passcode, as well as additional data, such as the time of issuance, and identification to receive the web server. . In step 408, the passcode server 62 sends the selected passcode to the Web server 42. In step 310, the Web server 42 registers the identification (ID) of the selected passcode, as well as a network connection address, such as a subscriber's Internet Protocol (IP) address. (Figure 4B). In an exemplary embodiment, the Web server 42, in step 318, selects one of multiple different key encoding or APPLETS stored in a database inside the Web server. The Web server 42 records the selected APPLET in the database, along with the identification of the selected passcode and the subscriber's IP address. In step 312, the Web server 42 sends the identification entry screen to the Web browser. Additionally, the 42 Web server codes the passcode with the selected APPLET, and sends the passcode and the APPLET encoded to the 60 Web browser. In Figure 5 an exemplary initial identification entry screen is displayed, which visually displays the 60 Web browser to the subscriber. The identification entry screen 120, as well as other optic screens described herein, are generated pages of common access door interface (CGI) manuscripts, which contain a built-in one-time passcode, a small one. application program (APPLET), and form fields for the user to identify or enter information, such as the user identification code and the keyword, as described more fully later. In step 214, the web browser 60 receives the login screen 120, which instructs the subscriber to enter certain subscriber data. For example, the subscriber is asked to enter his user identification code and a keyword (Figure 4A). The identification code of the user may be the same as the Subscriber's 800 number (Ethnic Telephone Number), for convenience. The user identification code is likely to be a non-confidential number. Conversely, the keyword is a confidential alphanumeric string that the user selects, such as a six-digit number. The keyword is the same as the keyword that the subscriber uses to access the user's options by means of the ARU 20. In step 216, the Web browser sends the user identification code, the password and the password to the 42 Web server. In step 318, the Web server 42 authenticates the identification entry request. The Web server 42 compares the data recorded in step 310 with the received data, to confirm the subscriber's IP address, the password of the pass-through password, and other correlated data. As a result, the Web server 42, in step 310, confirms that the subscriber has not manipulated the data, such as by altering the passphrase. In step 318, the Web server 42 can also compare the IP address with a table of hostile IP addresses, stored in a database. The table of hostile IP addresses lists the IP addresses of potential attempts to break the security of platform 10. If the received IP addresses match one of the addresses in the table of hostile IP addresses, then the server 42 Web sends an identification entry failure screen (as described later with respect to Figure 7). The table of hostile IP addresses may be stored in the database 64, or in a database on the Web server 42. Each record of hostile IP addresses includes the following fields, where the numbers in parentheses correspond to the number of characters or bytes for each field: 1. Hostile IP address (16), 2. NUMBER of invalid accesses attempted by the IP address; 3. First time the IP address accesses platform 10 (4); and 4.. Last time the IP address failed to access platform 10 (4). In step 320, the web server 42 sends the passphrase to the passcode server 62. In step 422, the passcode server 62 validates the passphrase (Figure 4C). The password server 62 sends a request to, or indeed accesses, the passcode data base 64, for the data corresponding to the previously issued passcode. If the passphrase is still identical to that previously issued in step 404, then the passcode server 62 sends a valid response to the web server 42, in step 424. In step 320, the web server 42 also validates the subscriber's data (for example, the user's identification code and the keyword). Web server 42 sends a request to, or access, database 64 to access a keyword corresponding to the user's code. If the keyword stored in the data base 64 matches the received keyword in the subscriber data, then the Web server 42 validates the subscriber data. By way of Alternatively, if the keywords do not match, or if the passcode has been altered, then the web server 42 invalidates the request, or the passcode server 62 sends an invalid response to the web server. In step 326, the web server 42 sends a screen to select services to the web browser 60, in response to the reply message sent from the passcode server 62 (Figure 4B). The passcode will be incorporated in the screen of selecting services, and all the subsequent screens for the session in progress with the subscriber. As a result, the passphrase traces the ongoing session with the subscriber, until the subscriber closes the session, as described in more detail later. If the Web server 42 determines that the keyword is incorrect, or receives an invalid response message from the passcode server 62, the Web server transmits an identification entry failure screen. In Figure 7 an exemplary identification entry failure screen 124 is shown. The user must then repeat the previous steps to try to enter an identification a second time. During each identification entry attempt, the Web server 42 increments a counter of identification entries, and registers the IP address of the subscribers in the table of hostile IP addresses. If the subscriber is successfully identified, then the ticket counter Identification is reset to O, and the IP address of the subscribers is removed from the table of hostile IP addresses. If the user fails to identify himself after a predetermined number of times (for example, the counter of identification entries = 3), then the web server 42, in step 326, registers the IP address of the subscriber in the address table Hostile IP. After this, whenever that IP address of the subscriber is found, a timeout counter is reset, during each identification entry attempt, which delays its identification entry attempt. In the table of hostile IP addresses, the number of attempts to identify themselves is also recorded. Subsequently, in step 228, the Web browser 60 receives either the select services screen or the identification entry failure screen (Figure 4A). In Figure 6 a screen 122 of selecting services is shown. Now a selection of exemplary subscriber services will be described, with respect to the data flow or signals of the diagram in Figure 8, and the flow diagrams of Figures 9A-9C. After being identified, the subscriber selects an option or changes the data with respect to one of the subscriber's telecommunications services, with respect to a screen displayed visually by the Web browser. For example, the subscriber selects one of the services illustrated on screen 122 to select Figure 6 services. In step 25 of a routine 250, the Web browser 60 passes the selected service to the Web server 42 (Figure 9A). In steps 354 and 356 of a routine 350, the Web server 42 authenticates the subscriber's request (Figure 9B), while the pass-through server 62 validates the request in step 458 of a routine 450, and sends a response v. Inactive or invalid to the Web server, in step 460 (Figure 9C), in a manner substantially similar to that described above with respect to routines 300 and 400. Routines 250, 350 and 450 are performed by the Web browser, the Web server 42, and the passcode server 62, respectively. In step 362, the Web server 42 processes the request and issues a response to the subscriber, possibly with a new screen. The Web server 42 sends any changes to the subscriber profile to the main structure profile management system 40, via LAN 38, as described herein. For example, the subscriber may select one of the service options of the screen 122 of Figure 6, and in response to the same, receives a screen for the selected service, such as the screens shown in Figures 10-16. (described later). If the Web server 42 receives an invalid response message from the passcode server 62, the Web server issues a "service not available" screen. For example, if the IP address of the subscriber matches an address in the table of hostile IP addresses, or if the subscriber pass-through password has expired, then the web server 42 sends the identification entry failure screen 124. In step 264, the Web browser 60 receives the response and / or the 42 Web server screen (Figure 9A). In response to the processed request, the user can select additional services. If so, the steps are repeated under routines 250, 350 and 450, for each additional service request made by the subscriber. As a result, when a subscriber makes his selection in one of the service screens, the selection is accompanied by the passcode initially issued during the identification entry. This pass-through password is validated at each access the subscriber attempts during the selection of the service. Now the selection and updating of the subscriber profile is described, with respect to the screens of Figure 6 and Figures 10-18. In general, the exemplary embodiment of the present invention allows subscribers to update their profiles, including the addition or change of telephone numbers in their routing, to change the schedule in their routing to follow me, to add default or alternate routing, and numerous other possibilities described herein. These updates the subscribers introduce them by means of the user-friendly GUI, which has the screens shown in Figures 5-18, which are provided via the Web server 42 to the subscriber's Web browser. As the subscribers update the services in their profiles, the Web server 42 sends the updated profiles to the main structure profile management system 40, via LAN 38. The main structure profile administration system 40 updates the database profile of the centralized subscriber of the records, and distributes the updated records to the distributed NIDs 27, 34, 36, and 66. After the identification and authentication entry process, the web browser 60 visually displays the screen 122 of selecting service of Figure 6, as noted above. The subscriber can select one of many service options, such as call routing, speed dial numbers, voice mail, fax mail, call selection, and so on. Each of the subscriber service options on the service selection screen 122 has a Hypertext link that is linked to an associated screen as follows: the call routing option is linked to screen 128 of Figure 10 (which once it is linked to screens 130 and 132 of Figures 11 and 12), the option of speed dial numbers is linked to a screen 134 of Figure 13, the voice mail option is linked to a screen 136 of Figure 14, the fax mail option is linked to screen 138 of Figure 15, and the call selection option is linked to a screen 140 of Figure 16. The user can select one of the service options illustrated on the screen of Figure 6 by placing his cursor and pressing the mouse button on the service, or other input and selection methods. of the known user. The service selection screen 122 also includes a session closure button 127. By means of selecting by pressing the mouse button on the session closure button 127, the subscriber can exit immediately from the subscriber's current session. The web server 42 immediately expires a time limit on the pass-through password, and sends the identification entry screen 120 to the web browser 60. Referring to Figure 10, if the subscriber selects the call routing option of the services selection screen 122, the web server 42 routes the display 128 for visual display via the web browser 60 to the subscriber. In a section 144 of accepting calls from screen 128, the subscriber specifies whether calls are accepted in the subscriber's account, by means of selecting one of two buttons displayed visually in the Subscriber computer screen. If the subscriber selects the button to not accept calls, then the people who call the subscriber will receive a message informing them that the subscriber is not accepting calls through the subscriber's unique telephone number. In a section 146 of choosing selections, the subscriber specifies whether a guest caller should receive a guest menu or a routing void deal. By selecting the guest menu selection, the Web server 42 sends the guest menu screen 130 to the Web browser. Alternatively, if the subscriber selects the no menu selection, then the Web server 42 sends the routing cancellation screen 132 to the Web browser, both screens being described later. In a subscriber section 148 not available from screen 128, the subscriber specifies a deal for the calls that are received when the subscriber can not be reached (alternative termination). Under section 148, the subscriber determines if the calls are terminated in the subscriber's voice mail, pager, voice mail and pager, or if the callers invited receive a closing message if the subscriber can not be reached. After selecting or updating any of the options presented on screen 128, or the other screens described herein, web server 42 provides a status message in the screen for the subscriber. For example, after the subscriber selects the closing message option in alternative termination section 148, the Web server 42 sends the subscriber a closing message that "the callers will hear a message asking them to try to call more. evening ", which visually displays a web browser on the screen 128. Referring to Figure 11, if the subscriber selects the guest menu selection on the call routing screen 128, the web server 42 sends the menu screen 130 of guest for visual display through the 60 Web browser. In a routing section 150 Find Me, the guest menu screen 130 presents options for the subscriber to plan the routing of calls to them, and provides up to three numbers to sequentially deal with locating the subscriber. In the exemplary mode, the subscriber enters up to three numbers, and the number of rings that will be made in that number, before dealing with an alternative number. The numbers "1" at the beginning and all numbers that are not numbers (for example, parentheses and hyphens) in the household numbers are separated from any numbers entered in the three boxes shown in section 150. The number of rings is stored preferably in the profile of the subscriber in terms of seconds, based on a formula of six times the number of rings, with a default value of three rings (eighteen seconds) if the subscriber does not enter any value. From zero to eight seconds it is translated to a ring, while any value greater than eight seconds is divided by six, with the result rounded referring to the number of rings, up to a maximum of sixteen. In a second selection section 152, the guest menu screen 130 shows that the invited callers can leave both a voicemail and a fax. The subscriber can also select if invited callers can send a pager message. Certain options can only be deselected, such as sending a fax, by communicating with an operator in the operator console 28 (Figure IA). Referring to Figure 12, the routing cancellation screen 132 provides confirmation to the subscriber that a subscriber wishes to route the guest calls to a specific destination, bypassing the presentation of the guest menu by the same. The subscriber must confirm the selection to abort routing under the screen 132 of voiding routing. Referring to Figure 13, the screen 134 of speed dial numbers allows the subscriber to enter up to nine speed dial numbers by means of the Web browser. As shown in Figure 13, the screen 134 of The speed dial numbers provide a number entry section 154, which provides nine boxes for the user to enter nine speed dial numbers. The Web server 42 preferably validates all the numbers that it receives from the Web browser (according to the subscriber's input). The validation of the numbers entered on screen 134, and entered into other screens here, confirms that a valid international number, which has not been blocked, has been entered for all international telephone numbers. For home numbers, the Web server 42 confirms that ten digits were entered, and that a valid numbering area (NPA) area or "area code" was entered for the ten-digit number. Additionally, the Web server 42 can determine whether an entered number is a "976" number, and if the 976 lock is effective, or if other specified numbers are blocked (for example, certain North American directory plane numbers (NADP)). Assuming that the Web server 42 confirms that the number entered by the subscriber is acceptable, then the Web server sends the number to the main structure profile management system 40 via LAN 38. Referring to Figure 14, the screen 136 Voicemail service allows the subscriber to be located whenever the subscriber receives a voicemail message. In Figure 15, the service screen 138 of Fax mail provides an option to also allow the subscriber to be located whenever the subscriber receives a fax message. The fax mail service screen 138, in the exemplary mode, visually displays the subscriber's fax number. Referring to Figure 16, the call screening service screen 140 provides a call classification selection section 156. In section 156, the subscriber can determine how incoming calls are selected, for example, by name only, by phone number only, or by name and phone number. If a guest caller is unable to provide their name, platform 10 will provide the telephone number of the invited caller. Referring to Figure 17, an exemplary error screen 160 is displayed visually when the subscriber enters, or fails to enter, the appropriate data. A first message 162 on the error screen 160 declares "its first number can not be blank". The web server 42 sends the first message 162 to the web browser 60, if the subscriber fails to enter the first number where it is appropriate, such as in section 150 of the guest menu service screen 130 (Figure 11). A second message section 164 provides an indication to a subscriber that certain numbers that the subscriber has entered or are blocked or invalid. As noted above, if the subscriber enters any numbers, the Web server 42 validates these numbers. If the Web server recognizes an invalid number, the Web server sends the second message 164 to the Web browser. Referring to Figure 18, a final or output 166 screen is shown. If the subscriber enters the appropriate data, which validates and accepts the Web server 42, the Web server transmits the data to the main structure profile management system 40, in order to update the subscriber's profile. After successfully updating the profile, the Web server 42 sends the output screen 166 to the Web browser to provide an appropriate message to the subscriber, indicating that the profile has been successfully updated. For example, screen 166 states "your guest menu options have been successfully updated." Referring to Figure 19, an exemplary HTML layout for pages and screens is shown. The 170 picture frame in a top left corner visually displays a graphic or other image, and can be 40 x 160 pixels (picture elements). The picture 170 of the picture is an exemplary mode visually displays a static icon for continuity between the service screens. A title box 172 is a top right corner of the screen, visually displays a title for the screen. The picture 172 The title can have a height of 40 pixels, and a width determined by a screen size available. The graph displayed visually in the picture 170 of the photograph preferably emphasizes a particular service requested by the subscriber, and displayed visually on the screen. In the exemplary mode, the title box shows the title of the application that the subscriber is accessing. It will also visually display a logo of the service provider, such as "MCI". The information displayed visually in the title box 172, as well as the picture box 170, will not change during the whole session with the subscriber, as long as the subscriber remains inserted within the platform 10. A lower box 174 in a lower part of the page, you will have Hypertext links with other different services provided by the platform 10. The lower table 174 can have a height of 40 pixels, and a width determined by a screen size available. In an exemplary embodiment, the lower frame 174 or other portion of the screen contains Hypertext links to other services operated by the operator of the platform 10, such as the MCI services, as well as other Web sites. These links allow the subscriber to effectively cancel the identification entry process, and move to other services or sites, if desired.
A list box 176 in a left portion of the screen, visually displays the Hypertext links with other applications, specific to the screen, and screens inside the application that the user has accessed. The list box can be 160 pixels wide and have a height determined by the available screen size. A text box 178 visually displays the data requested by the subscriber. The text box 178, as well as the list box 176, visually display the screens illustrated in Figures 5-18, which were described above. Referring to Figure 20, the exemplary data flow is shown within the portion of platform 10 of Figure 2. The data flow shown in Figure 20 corresponds to the above description with respect to Figures 3, 4A -4C, 8, and 9A-9C. In general, the step password data base 64 includes a step password database service, which accesses the step password server 62 to create a new record, read a record for a given step password value , and update a record for the password value given step. The Web server 42 performs a separate update service or application, which accesses the passcode data base 64 and deletes the obsolete records on a periodic basis (eg, every hour). The Web server 42 sequentially scans the base 64 of password pass data, and delete the records with expired passwords. The data provided by the Web server 42 is stateless. The status information is maintained by means of a writing through the database of the cache in the NIDS, and the passwords are indexed (each of which is unique). As a result, you do not need to synchronize data between multiple Web servers. Each server 42 Web also provides more than one service. The services provided by Web servers 42 are distinguished by their location in the root of the Web server document (described later). The passcode server 62 is a client of the passcode data base 64, and transmits passwords to the Web servers during the ID entry attempts. The issued passwords, once validated, are used to track the status information for a connection through one of the 42 Web servers. As a result, step password service 62 performs essentially three tasks: (1) issuing single-pass passwords, during authentication or entry of a subscriber's identification, (2) validates one-pass passwords use, and (3) validate multiple-use passwords (if those passwords are used). As noted above, each passcode must be unique for every identification entry request.
Referring to Figure 21, an exemplary record for a subscriber profile is shown, such as a register 180. Register 180 includes numerous fields, such as speed dial numbers, primary termination numbers, and time out values (number of rings) ) for the guest menu routing service, if the subscriber is located after receiving a message, the call selection states, and so on. The register 180 corresponding to the subscriber profile is stored in the NIDs 27, 34, 36, and 66. The fields of the register 180 are generally self-explanatory with reference to the detailed description that is provided herein. The 42 Web servers, and the 10 platform in general, must be safe against pirates, hackers and other unruly people who wish to adversely affect platform 10, or recover data without authorization. In this way, Web servers 42 preferably run secure daemons. For example, Web servers 42 run the secure HTTP daemon. As is known, a "daemon" is an agent program that operates continuously, such as on a UNIX server, and provides resources to client systems on the network. In general, a daemon is a subordinate priority process that is used to handle low-level operating system tasks. The passwords that are used here also provide security for platform 10.
Referring to Figure 22, an exemplary step password 500 is shown. Passcode 500 includes the following fields, with the exemplary number of bytes or characters represented in parentheses: 1. a version 502 (1); 2. a use flag 504 (single use against multiple) (1); 3. a step password value 506 (16); 4. an IP address of the subscriber 508 (16); 5. a user ID code 510 (16); 6. a time granted 512 (4); and 7. an expiration 514 (4). The IP address field is large enough to contain the addresses of the extended IP version 6, if required. A time-out timer is associated with the granted time values 512 and the expiration time 514 of each pass password, such that the Web server 42 invalidates a pass password that has not been used for a certain period of time ( for example, ten minutes). The step password value 506 includes 16 characters, wherein each character has 62 possible character values, which are selected from the set (0-9, a-z, A-Z). The characters in positions 0, 1 and 2 of step password value 506 are fixed, and are assigned to server 62 of password step. If multiple password servers 62 are used, the characters in positions 0, 1 and 2 only define each passcode server, and in this way each passcode used by the Web servers 42 is unique. The character in the 0 position is used to identify a physical location of the passcode server 62. The character in position 1 identifies the server in the physical location, while the character in position 2 has a reserved value, which can be used to identify the version number of the password server 62, or other information. The remaining 13 characters of pass step value 506 are generated sequentially using the 62 possible character values. The 10-15 character positions are assigned an ongoing time for platform 10 (in the establishment of step password service 62).
The system time (a quantity of 32 bits) is calculated as a 6-digit base number 62 that is placed in positions 10-15. The values of passwords increase sequentially along positions 3-15, with position 3 being the least significant position. Character values assume the following order for high to low digit values: "z" - "a", "Z" - "A", and "9" - "0". As a result, step password server 62 generates unique passwords if system time is calculated in values of 4 bytes, which will calculate about 62 characters with base 6 in positions 10-15. It assumes that the passcode server 62 will not generate more than 627 (35 * 1012) passwords in a second, in any given step password server 62. Therefore, the odds of a pirate actually guessing a step password value are 1 in 4.7 x 10. Even a correctly guessed password value is not a guarantee of successful penetration through the fire barrier 115, because the appropriate IP address of the subscriber must be correct, and the pass password time must not have expired. As noted above, each passcode is incorporated into screens specific to the service, which the Web server 42 sends to the Web browser. If a given screen contains a form, the step password can be inside a hidden field of the form. If the screen contains an APPLET, such as a Java APPLET, the step password can be a parameter of the APPLET. If the screen contains Hypertext links (for example, a Hypertext Reference (HREF) that specifies the name or URL of the file pointed to by the Hypertext link), the passcode may be part of the link itself. In general, a particular value of a given pass password does not necessarily need to be kept secure. The password security step is provided by using an SSL inside the platform 10, expiration pass or time out passwords, and linking the password to the IP address of the subscriber (client). In an exemplary embodiment, all HTML pages sent by the Web servers to the Web browser are generated using common rules in a common language, such as the Perl-based Common Access Gateway (CGI) manuscripts. As is known, a CGI manuscript is a standard method for extending the HTTP daemon, which is commonly written using the Perl, C, or shell manuscripts. All access through the Web browser to the 42 Web server will map to a CGI manuscript. Referring to Figure 23, all CGI manuscripts preferably reside in a directory on the Web server 42, which is not in the root directory of HTTP daemon documents, to provide web servers with the same security. As noted above, the authentication of each request is required, and the issuance of a valid pass-word for every request of the subscriber, and therefore, at the beginning of each manuscript. Each application on the Web server 42 will have its own document path and the associated collection of CGI (container-cgi) manuscripts, templates, (templ), images, Java class libraries, and image map directories if required (map ). Figure 23 shows a directory structure of exemplary welcome server, which resides on the Web server 42. As shown in Figure 23, the document root directory is separate from the root directory of the server. The document root directory contains only the HTML pages of welcome and access failed / denied, for security reasons. The directories are mapped through the managers of the server, so that they are accessible through URLs specific to the application. Many applications can store images and class libraries, as well as CGI manuscripts. As shown in Figure 23, the shared objects are maintained in a separate shared directory tree. There are no URL maps for these shared objects, but rather, the shared objects are accessed by URLs specific to the application, which are linked to the shared objects at the start of platform 10. A root directory of the common server includes parameters of operation for 42 Web servers. That information is maintained in a common database, in order to maintain the same environment for the multiple Web servers. Although specific embodiments of, and examples for, the present invention are described herein, for purposes of illustration, various equivalent modifications may be made, without departing from the spirit and scope of the invention, as will be recognized by those skilled in the relevant art. The teachings of this invention provided herein may be applied to other communications or network systems, not necessarily the exemplary telecommunications systems described above. For example, although the embodiments of the present generally have been described above as employed with the telecommunications platform 10, the present invention is equally applicable to other communication systems, such as a computer network to provide updating of user registers, through The World Wide Web. Although certain operations have been described under the embodiments of the present invention as generally occurring in a serial fashion, those skilled in the relevant art will note that it is completely within the scope of the invention to conduct some operations more or less simultaneously, or in another order different from that described in the present. Earlier aspects of the present invention have been described, in connection with a telecommunications system of a single telephone number, which provides numerous features, such as call routing, speed dial numbers, voice mail, fax mail, call screening. , etc. A single telephone number system may also include additional features, such as email (including voice recognition and text-to-speech capabilities), video mail, voice mail services, telex, etcetera. Alternative embodiments of the invention may include visual display, and provide configuration of electronic mail, video mail, telex services, and so on. For example, a subscriber can access through the Internet a dictionary of voice recognition and text-to-speech words, maintained by the user. Additionally, the subscriber can be presented with a screen that allows the subscriber to select the following preferences: type of voice (for example, male or female voice), graduation (ability to select the voice rating), speed to speak ( ability to define slow, medium, or fast speech), modes (natural speech, one word at a time, or spelling word choices), language / dialect (select spoken language (English, Spanish, etc.) and dialect), etc. Web servers can include not only HTML pages, but also mailboxes for subscribers, which can store voice, facsimile, video, _telex and other messages. Instead of selecting the options using a mouse, keyboard or other text-based pointer / entry on a screen that can be displayed visually, an alternative embodiment of the invention can allow voice navigation between, and within, visually expandable screens, to select and enter options. All Patents and Patent Applications of the Former United States of America, are incorporated herein by reference, as if they were fully disclosed. The embodiments of the present invention can be modified based on the described embodiments of the above Patents and Patent Applications of the United States of America, to provide still further embodiments of the present invention. These and other changes can be made to the embodiments of the invention, in light of the above detailed description. In general, in the following claims, the terms that are used should not be considered to limit the invention to the specific embodiments described in the specification and the claims, but should be considered to include any record updating system that operates under the claims, to provide operations for updating the user's records. In accordance with the foregoing, the invention is not limited by the description, but rather its scope will be fully determined by the following claims.

Claims (39)

1. In a telecommunications system that has a subscriber, the subscriber receiving a plurality of services from the system, a method comprising the steps of: requesting access by the subscriber, through the Internet, from an account register, where the account record specifies the options selected by the subscriber of the services; validate the subscriber's request; provide a menu for the subscriber, if the subscriber's request is validated, where the menu provides options for the subscriber, for at least one of the services; receive, through the Internet, the subscriber's entry corresponding to one of the options provided in the menu; and update the account record based on the received subscriber's entry. The method of claim 1, wherein the Internet includes the World Wide Web which has a plurality of Web pages, and wherein the request step includes the step of retrieving a Web page associated with the system. 3. The method of claim 1, wherein the The validation step includes the steps of: requesting and receiving a password, in response to the step of requesting access; request the entry data of the subscriber; receive the subscriber's input data; compare the input data with the corresponding stored data; and validate the password, if the input data compare favorably with the stored data. The method of claim 1, wherein the step of providing includes the steps of: providing a first screen to the subscriber, the first screen providing at least some of the services; receive the initial entry of the subscriber, the initial entry of the subscriber selecting one of at least some of the services; and provide a second screen to the subscriber, the second screen providing the menu. The method of claim 1, wherein the step of providing includes the step of providing a screen to the subscriber, having the menu, the screen having therein included a validated passcode and an application that can be executed. 6. The method of claim 1, wherein the step of receiving includes the steps of: validating the subscriber's request again; and update the account only if the subscriber's request is validated again. 7. In a communications system coupled to the Internet, a method implemented by computer that includes the steps of: receiving a request for access, through the Internet, of a specific subscriber record related to the system; receive, through the Internet, alternative data for registration; and update the record based on the alternative data received. The method of claim 7, characterized in that it also comprises the step of validating the received request before the updating step. The method of claim 7, characterized in that it also comprises the step of providing a set of options that the subscriber can select, before the step of receiving the alternative data, the options corresponding to entries in the registry. The method of claim 7, wherein the step of receiving a request includes the step of receiving a request to access the record, the record having fields of data corresponding to the options of communication services in the system, which can be selected by the subscriber. The method of claim 7, wherein the step of receiving a request includes the step of receiving a request to access a page associated with the system. The method of claim 7, characterized in that it also comprises the steps of: requesting and receiving a password of passage, in response to the step of receiving a request; receive data associated with the subscriber; compare data associated with subscriber data with corresponding stored data; and validate the password step if the input data compare favorably with the stored data. The method of claim 7, characterized in that it also comprises the steps of: providing a page, the page providing a plurality of options corresponding to the services offered by the system; and receive the subscriber's entry, the subscriber entry by selecting one of the options. The method of claim 7, characterized in that it also comprises the step of providing a screen having a menu, the screen having included with it a password of step with the request for access. The method of claim 7, characterized in that it also comprises the step of providing a screen having a menu, wherein the screen provides options for altering the text-to-speech options in the registry. The method of claim 7, wherein the step of receiving alternate data includes receiving voice data that provides instructions for updating the record. The method of claim 7, characterized in that it also comprises the step of providing access to an electronic mailbox for the subscriber. 18. A computer-readable medium containing instructions for a computer in a communication system, the instructions of the computer readable medium comprising the steps of: receiving a request for access, via the Internet, of a specific subscriber-related record with the system; receive, through the Internet, alternative data for registration; and update the record based on the alternative data received. 19. The computer-readable medium of claim 18, characterized in that it also comprises the step of validating the received request before the step of upgrade . 20. The computer readable medium of claim 18, characterized in that it also comprises the step of providing a set of options that the subscriber can select, before the step of receiving the alternative data, the options corresponding to entries in the registry. 21. The computer readable medium of claim 18, wherein the step of receiving a request includes the step of receiving a request to access a page associated with the system. 2
2. The computer-readable medium of claim 18, characterized in that it also comprises the steps of: requesting and receiving a pass-through password, in response to the step of receiving a request; receive data associated with the subscriber; compare the data associated with the subscriber data with corresponding stored data; and validate the password step if the input data compare favorably with the stored data. 2
3. The computer-readable medium of claim 18, characterized in that it also comprises the steps of: providing a page, the page providing a plurality of options that correspond to the services offered by the system; and receive the subscriber's entry, the subscriber's entry by selecting one of the options. 2
4. The computer-readable medium of claim 18, characterized in that it also comprises the step of providing a screen having a menu, the screen having therewith included a pass-through password with the access request. 2
5. The computer-readable medium of claim 18, characterized in that it also comprises the step of providing a screen having a menu, wherein the screen provides options for altering the text-to-speech options in the record. 2
6. The computer-readable medium of claim 18, wherein the step of receiving alternate data includes receiving voice data that provides instructions for updating the record. 2
7. The computer-readable medium of claim 18, characterized in that it also comprises the step of providing access to an electronic mailbox for the subscriber. 2
8. In a telecommunications network, an apparatus comprising: a memory that stores a specific record of Subscriber related to the system; and a network server coupled between the memory and the Internet, the server of the network (a) receives a request for access, through the Internet, of the registry, (b) receives, through the Internet, alternative data for the registration, and (c) requests the alteration of the record in the report, based on the alternative data received. 2
9. The apparatus of claim 28, wherein the network server validates the received request before requesting the alteration. 30. The apparatus of claim 28, wherein the network server provides a set of options that the subscriber may select, before receiving the alternative data, the options corresponding to entries in the registry. The apparatus of claim 28, characterized in that it also comprises: a pass-through password database; and a step password server coupled between the step password database and the server of the res, wherein the memory stores the corresponding data to a subscriber; and where the network server requests and receives a passcode from the passcode server, receives the data associated with the subscribers, compares the data associated with the subscriber data with the corresponding stored data, and validates the pass password, if the input data compares favorably with the stored data. 32. The apparatus of claim 28, wherein the memory stores a Web page, wherein the page provides a plurality of options that correspond to the services offered by the system; and where the network server provides the page and receives the subscriber's entry, where the subscriber entry selects one of the options. The apparatus of claim 28, characterized in that it also comprises: a platform coupled to the server of the network, to provide single telephone number access to a caller, to multiple services for the benefit of a subscriber to the services, services including: voice messaging services to facilitate voice messaging; facsimile messaging services to facilitate facsimile messaging; and an interface to interconnect the platform with a telephone network. 34. In a telecommunications system that has a subscriber, the subscriber receiving a plurality of system services, wherein the system is coupled to a network of computers, a method comprising the steps of: requesting access by the subscriber, through the computer network, of an account register, wherein the registration of account specifies the options selected from the subscriber of the services; validate the subscriber's request; provide a menu for the subscriber, if the subscriber's request is validated, where the menu provides options for the subscriber, for at least one of the services; receive, through the computer network, the subscriber's entry corresponding to one of the options provided in the menu; and update the account record based on the received subscriber's entry. 35. The method of claim 34, wherein the computer network includes the Internet, and wherein the request step includes the step of accessing a site associated with the system. 36. The method of claim 34, wherein the step of providing includes the step of providing a screen having a menu to the subscriber, the screen having therewith a validated step password. 37. The method of claim 34, characterized because it also includes the step of providing a menu, where the menu provides options to alter the text-to-speech features in the account record. 38. The method of claim 34, wherein the step of receiving subscriber input includes receiving voice data that provides instructions for updating the account record. 39. The method of claim 34, characterized in that it also comprises the step of providing access to an electronic mailbox for the subscriber.
MXPA/A/1999/010721A 1997-05-22 1999-11-19 Internet-based subscriber profile management of a communications system MXPA99010721A (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US08/862,134 1997-05-22
US08/862,134 US6587867B1 (en) 1997-05-22 1997-05-22 Internet-based subscriber profile management of a communications system
US92537097A 1997-09-08 1997-09-08
US08/925,370 1997-09-08
PCT/US1998/010227 WO1998053582A1 (en) 1997-05-22 1998-05-15 Internet-based subscriber profile management of a communications system

Publications (2)

Publication Number Publication Date
MX9910721A MX9910721A (en) 2002-12-13
MXPA99010721A true MXPA99010721A (en) 2003-06-25

Family

ID=

Similar Documents

Publication Publication Date Title
US6587867B1 (en) Internet-based subscriber profile management of a communications system
US6031904A (en) Service order mechanism for telephone subscriber
US7647403B2 (en) Method for processing a request for access to a data network
AU730431B2 (en) A method of establishing a communications call
US6788770B1 (en) Intelligent voice response system with navigator database
WO1998053582A1 (en) Internet-based subscriber profile management of a communications system
US6484263B1 (en) Security profile for web browser
US7443974B2 (en) Methods, systems, and products for processing calls
US6049602A (en) Virtual call center
US6868140B2 (en) Telephony call control using a data network and a graphical user interface and exchanging datagrams between parties to a telephone call
US6968050B1 (en) Methods and apparatus for authenticating and authorizing ENUM registrants
US20020118808A1 (en) Conference system
US6226286B1 (en) Apparatus and method for communication between data network and telecommunication network
AU6288899A (en) Adaptive communication system enabling dissimilar devices to exchange information over a network
WO2002103486A2 (en) Apparatus, systems and methods for managing incoming and outgoing communication
AU728548C (en) Device and method for communication between a data network and a telecommunications network
EP1228623B1 (en) Establishing data connections
US20070110036A1 (en) System and method for establishing long distance call connections using a desktop application
MXPA99010721A (en) Internet-based subscriber profile management of a communications system
EP1104142A1 (en) Network access system
JP2001352411A (en) Dial-up connection system
CA2270046C (en) Device and method for communication between a data network and a telecommunications network
AU772775B2 (en) A method of establishing a communications call
WO2000048378A1 (en) System for establishing a telephone connection
CA2358221A1 (en) Dynamic caller-id substitution