Telephone Number Binding in a Voice-Over-Internet System
Telephone number binding in a voice-over-Internet system is provided. One embodiment is a method for provisioning a customer voice-over-Internet device for voice-over-Internet service. One such method comprises: providing a customer voice-over-Internet device for communicating with an existing telephone line and a data network; providing a telephone number associated with the existing telephone line to a voice-over-Internet platform; and linking the existing telephone number to a unique identifier associated with the customer voice-over-Internet device.
This application is a continuation of co-pending U.S. patent application Ser. No. 10/964,518, filed on Oct. 13, 2004, the content of which is incorporated herein by reference in its entirety.
BACKGROUNDCurrently, there are a number of solutions that enable customers to place telephone calls over the Internet, rather than over the public-switched telephone network (PSTN). So-called Internet telephony services (e.g., voice-over-Internet-Protocol (VoIP), voice-over-digital-subscriber-line (VoDSL), voice-over-asynchronous-transfer-mode (VoATM), etc.) have become much more prevalent as the number of broadband connections at residential locations has increased.
One of the earliest Internet telephony solutions is a “soft phone.” A soft phone is computer software that may be installed on a typical personal computer. The computer software enables any computer device with a speaker and a microphone to place free Internet calls through an Internet service provider (ISP). Soft phones, however, suffer from various disadvantages and problems. For example, in many cases, soft phones only enable a user to make free Internet calls to other users that have installed the same or similar software on their computer. Furthermore, these software-based solutions offer no or limited calling to the PSTN.
Another Internet telephony solution employs service providers (e.g., Internet telephone service providers (ITSP)) that offer voice-over-Internet services to subscribers. An ITSP usually provides the subscribers with supporting hardware. The supporting hardware may comprise a stand-alone device manufactured by another company (e.g., a VoIP phone) that connects to the Internet. The supporting hardware, software, etc. may also be other equipment that functions as an interface between the customer's standard telephone and the PSTN and Internet connections. Typically, the ITSP sells or leases the hardware to the subscriber and charges the customer a subscription service (e.g., monthly service fee) for the services. In some cases, the potential subscriber may purchase the hardware from another entity and then request service from the ITSP.
ITSP solutions also have a number of disadvantages. Many customers have been slow to adopt this approach because they are unwilling to abandon the familiar expectations of their traditional phone service. Another major disadvantage is that the hardware provided by most ITSPs is difficult for some consumers to use, configure, etc.
In order to configure the hardware provided by the ITSP for communication with other devices, hardware, etc., a provisioning process is typically performed. In general, the provisioning process involves two steps: (1) establishing a terminating ID for the subscriber; and (2) provisioning the hardware with the information necessary to use the terminating ID to facilitate Internet telephony services. The purpose of the provisioning process is to enable the ITSP to associate the terminating ID with the hardware for a particular subscriber. For example, some ITSPs assign the terminating ID during an ordering/activation process with the subscriber. The terminating ID is typically a private number assigned by the service provider at sign-up and is usually specific to the ITSP. In other words, the ITSP defines the terminating ID and then associates the number with the subscriber's account.
After the terminating ID is established by the ITSP, the ITSP may provide the subscriber with basic information (e.g., username, password, IP addresses of gateway servers, etc.), and the subscriber is left with the task of configuring the hardware, software, etc. In some instances, the hardware may be pre-provisioned by the ITSP. For example, at the time of account creation, the hardware may be provisioned, bound to the account, and shipped to the subscriber. After the hardware is installed by subscriber, the hardware may register with an ITSP server, which recognizes the device by its association to the subscriber's account.
Despite the growth of Internet telephony services and products, however, there is still a need for improved voice-over-Internet solutions.
SUMMARYVarious embodiments of systems, methods, computer programs, platforms, etc. for telephone number binding in a voice-over-Internet system are provided. One embodiment is a method for provisioning a customer voice-over-Internet device for voice-over-Internet service. One such method comprises: providing a customer voice-over-Internet device for communicating with an existing telephone line and a data network; providing a telephone number associated with the existing telephone line to a voice-over-Internet platform; and linking the existing telephone number to a unique identifier associated with the customer voice-over-Internet device.
Another such method comprises: simultaneously controlling a data session and a telephone call between a voice-over-Internet platform and a customer device; and linking a telephone number received via the telephone call to the customer device, if a transmitted session identifier received via the telephone call matches a session identifier associated with the data session.
Yet another such method comprises: establishing a data session between a customer device and a voice-over-Internet platform via a data network; receiving a device identifier associated with the customer device via the data session; instructing the customer device, via the data session, to make a telephone call to a predetermined telephone number that terminates at the voice-over-Internet platform; capturing a telephone number corresponding to the customer device via the telephone call; instructing the customer device, via the data session, to transmit a session identifier associated with the data session to the voice-over-Internet platform via the telephone call; and associating the telephone number with the customer device if the transmitted session identifier matches the session identifier.
Another embodiment comprises a voice-over-Internet system. One such system comprises: a customer device comprising a data interface for communicating via a data network and a telephone interface for communicating with the public-switched telephone network (PSTN); a voice-over-Internet platform for communicating with the customer device via the PSTN and a data session that occurs over the data network; and a telephone number binding system associated with the voice-over-Internet platform, the telephone number binding system configured to provision the customer device by linking the customer's existing telephone number to a unique device identifier corresponding to the customer device.
Another embodiment comprises a voice-over-Internet platform. One such platform comprises: means for simultaneously controlling a data session and a telephone call with a customer device; and means for linking an existing telephone number with the customer device, the existing telephone number received via one of the data session and the telephone call.
Other aspects, advantages and novel features of the invention will become more apparent from the following detailed description when considered in conjunction with the following drawings.
Various embodiments of systems, methods, computer programs, communications platforms, etc. that employ telephone number binding in a voice-over-Internet environment will be described with respect to
The exemplary system for providing VOI services comprises a VOI platform which supports communications with one or more customer VOI devices located at the customer premise. The customer VOI device communicates with the customer's existing telephone line to the public-switched telephone network (PSTN) and the customer's data line to a data service provider. The customer VOI device may also connect to the existing telephone or, in alternative embodiments, the customer VOI device may be integrated with appropriate functionality, hardware, etc. for controlling PSTN communications. From the customer's perspective, the customer VOI device is a black-box device that may be easily configured (and, in some embodiments, automatically configured) for communication with the VOI platform. After the device is provisioned, the customer may initiate telephone calls to other individuals without regard to whether the call is being placed over the PSTN or the data network. The customer VOI device and the VOI platform perform the logical functions necessary to support both standard PSTN telephone calls and VOI calls.
A provisioning process may be initiated which configures the customer VOI device for VOI service. The provisioning process may be initiated by the customer, the customer VOI device, or the VOI platform. During the provisioning process, the customer's existing telephone number is provided to the VOI platform. As described below, the existing telephone number is used by the VOI platform as a terminating identifier during the provisioning of VOI and/or PSTN services. In this manner, the existing telephone number may be used to make VOI calls to the corresponding customer VOI device. Therefore, rather than having to assign a new terminating identifier, the VOI platform may use the existing telephone number as the terminating identifier.
It should be appreciated that the existing telephone number may be provided to the VOI platform in a number of ways. For example, in one embodiment, the existing telephone number may be automatically provided to the VOI platform by the customer VOI device, either via the data network or the PSTN. In alternative embodiments, the customer may provide the existing telephone number to the VOI platform. The VOI platform may support an interactive voice response (IVR) system by which the customer interactively supplies the existing telephone number. The VOI platform may also support a web-based (or other data) channel via the data network, which enables the customer, the customer VOI device, or a combination thereof to provide the existing telephone number to the VOI platform.
Although not necessary, in certain embodiments, the VOI platform may also provide a means for authenticating the telephone number provided, in order to confirm that the telephone number is in fact within the control of the customer VOI device. Without any authentication process, it may be possible for a customer to usurp someone else's phone number. Therefore, in certain embodiments, it may be desirable to employ a reliable and accurate authentication scheme to validate the telephone number provided. The authentication mechanism may be fully automated via data and/or PSTN connections between the customer VOI device and the VOI platform. In some embodiments, at least portions of the authentication scheme may involve interactive or manual input from the customer, rather than the customer VOI device.
As described in more detail below, one embodiment of a provisioning method or process may be fully automated in order to minimize (or completely avoid) any burdensome user interaction with the customer VOI device or the VOI platform. The communications between the VOI platform and the customer VOI device occur via parallel PSTN and data connections. The customer connects the customer VOI device to a telephone line and a data network. The customer VOI device establishes communication with the VOI platform via the data network. The customer VOI device transmits a unique device identifier stored in memory to the VOI platform via the data network. The VOI platform may verify the customer VOI device based on the unique device identifier. If the device is verified, the VOI platform may generate a unique session identifier for the data connection. The VOI platform instructs the customer VOI device (via the data network) to make a telephone call to a predetermined telephone number, which terminates at the VOI platform. The customer VOI device initiates the telephone call over the PSTN to the predetermined telephone number. When the VOI platform receives the call from the customer VOI device, the customer's telephone number may be identified through the automatic number identification (ANT) service provided by the supporting telephone service provider. Via the data network, the VOI platform may then instruct the customer VOI device to transmit the session identifier over the telephone call (e.g., using dual tone multi-frequency (DTMF) digits). The VOI platform compares the transmitted information to the session identifier for the data connection to confirm the identity of the customer VOI device. If the correct session identifier is received by the VOI platform, the VOI platform may authenticate the customer VOI device and link the customer VOI device to the corresponding telephone number.
It should be appreciated that additional and/or alternative schemes may be employed to confirm that the telephone number is within the control of the customer VOI device as deemed appropriate by particular system providers, for particular applications or customers, etc. Furthermore, it should be appreciated that the authentication request(s) may be submitted to the customer VOI device via the data channel or the PSTN connection. In the embodiment described above, the call-to-platform request and the transmit-session-identifier request initiated by the VOI platform are performed via the data session and the corresponding actions or responses from the customer VOI device are provided via the PSTN. One of ordinary skill in the art will appreciate that the closed-loop authentication scheme may be reversed so that the requests from the VOI platform are made via the PSTN and the customer VOI device responds via the data session.
Regardless of the authentication scheme (or whether an authentication scheme is even performed), the VOI platform associates (e.g., links, binds, relates, etc.) the existing telephone number to the customer VOI device. In this manner, the VOI platform may develop and maintain a database containing information that links a particular customer VOI device to the existing telephone number. The association between the existing telephone number and the customer VOI device enables the VOI platform to establish VOI calls between customers. For example, when a calling customer associated with a first customer VOI device attempts to place a call to a particular PSTN telephone number, the VOI platform may determine whether the customer at that particular PSTN telephone number has been provisioned by the VOI platform. The VOI platform may access the database and determine whether the PSTN telephone number has been associated with a second customer VOI device. If the PSTN telephone number does not have a corresponding customer VOI device, the first customer VOI device may use the PSTN to place the call to the called customer. However, in the event that the called customer has previously provisioned a second customer VOI device (and, therefore, the VOI platform has a database record or other data structure associating the PSTN telephone number to the customer VOI device), the VOI platform may orchestrate a VOI call between the calling customer and the called customer via the respective customer VOI devices.
Having described the general operation of an exemplary system for providing VOI services, various additional embodiments will be described with respect to
As further illustrated in
As mentioned above briefly, the VOI platform may provision the customer device in various ways.
In general, VOI platform 104 provisions customer VOI device 102 by receiving existing telephone number 210 (arrow 212). VOI platform 104 may also receive a unique device identifier (e.g., device ID 206) associated with customer VOI device 102 (arrow 214). VOI platform 104 may receive existing telephone number 210 in various ways via data network 110 and/or PSTN 108. Furthermore, as described above, existing telephone number 210 may be automatically provided to VOI platform 104 by customer VOI device 102, either via the data network or the PSTN. In alternative embodiments, the customer may provide existing telephone number 210 to VOI platform 104. VOI platform 104 may also support an IVR system by which the customer interactively supplies existing telephone number 210. As further illustrated in
Regardless of the manner in which existing telephone number 210 is provided, VOI platform 104 continues the provisioning process by associating existing telephone number 210 to the unique device identifier (e.g., device ID 206) associated with customer VOI device 102. As illustrated by arrow 216, VOI platform 104 may store existing telephone number 210 and device ID 206 in database 114 as a look-up data pair or binding. Thus, VOI platform 104 may use existing telephone number 210 as the terminating identifier for providing VOI services to customer VOI device 102.
As illustrated by decision block 402, auto-provisioning is not initiated until customer VOI device 102 is connected to PSTN 108 and a data network 110 (
At block 408, VOI platform 104 receives the device identifier and authenticates customer VOI device 102 based on the device identifier. In other words, VOI platform 104 verifies that customer VOI device 102 is an approved device based on the submitted device identifier. Therefore, VOI platform 104 may prevent non-approved devices from attempting to access the platform, as well as provide protection from attacks, forged requests, etc. It should be appreciated that the authentication process may support various encryption schemes, algorithms, etc. to provide suitable security measures and to further guarantee the authenticity of customer VOI device 102. If the customer VOI device 102 is authenticated, at block 408, VOI platform 104 may assign a number to the provisioning request. For instance, VOI platform 104 may generate a unique session number or identifier (e.g., random number, pseudo-random number, etc.) that identifies the provisioning request initiated by customer VOI device 102.
At block 410, VOI platform 104 instructs the authenticated customer VOI device 102 to initiate a telephone call over PSTN 108 to a predetermined telephone number that terminates at VOI platform 104. As described below in more detail, the instructions, messages, requests, commands, data communications, etc. between customer VOI device 102 and VOI platform 104 may use any suitable protocol. It should be appreciated that the device identifier may be provided by VOI platform 104 or, in alternative embodiments, may be locally stored in customer VOI device 102. At block 412, customer VOI device 102 initiates the telephone call via PSTN 108 to the predetermined telephone number. At block 414, VOI platform 104 receives the telephone call initiated by customer VOI device 102 and determines the existing telephone number 210 (
Referring to
At block 420, VOI platform 104 receives the transmitted session number and determines whether it matches the system-generated session identifier (block 408). If VOI platform 104 confirms that the session number transmitted by customer VOI device 102 via the telephone call matches the session number generated by VOI platform 104, at block 422, VOI platform 104 associates the customer's existing telephone number 210 (block 414) with customer VOI device 102. It should be appreciated that the association between the telephone number and the device may be implemented in various ways. For example, in one embodiment, the customer's telephone number may be associated, bound, linked, etc. with the device identifier. It should be appreciated that other implementations may be employed.
As illustrated by reference line A, customer VOI device 102 transmits a device identifier 502 to VOI platform 104 via data network 110. VOI platform 104 may authenticate customer VOI device 102 based on device identifier 502. Furthermore, VOI platform may generate a session number 508 to identify the data session with customer VOI device 102. VOI platform 104 provides a call-to-platform request 504 (reference line B) to customer VOI device 102. Call-to-platform request 504 instructs customer VOI device 102 to initiate the telephone call to VOI platform 104. Customer VOI device 102 initiates the telephone call to VOI platform 104 via PSTN 108 (reference line C). VOI platform 104 determines the existing telephone number 210 corresponding to customer VOI device 102 by, for example, the ANI service mentioned above. VOI platform 104 provides a transmit-session-ID request 506 to customer VOI device 102 via data network 102. Request 506 instructs customer VOI device 102 to transmit session identifier 508 via the telephone call. If the transmitted session identifier matches session identifier 508, VOI platform 104 associates the customer's existing telephone number with customer VOI device 102, and provisions the device for VOI services.
The architecture, operation, and/or functionality of an embodiment of TNBS 112 is described below with reference to
Web server 702 controls communications with customer VOI device(s) 102 via data network 110. Web server 702 may support any suitable communication protocol. For instance, web server 702 may be configured as a secure server which employs the hypertext transfer transport protocol (HTTP) (secure)—HTTPS. Furthermore, some communications may be performed via HTTPS, while other communications may be performed over less secure channels, such as HTTP. In another embodiment, VOI platform 104 employs a session initiation protocol (SIP), which is described in detail in the following Requests for Comment (RFC) of the Internet Engineering Task Force (IETF), each of which are hereby incorporated by reference in their entirety: RFC 2543—SIP: Session Initiation Protocol; RFC 3261—SIP: Session Initiation Protocol; RFC 3262—Reliability of Provisional Responses in SIP; RFC 3263—Location SIP Servers; RFC 3264—An Offer/Answer Model with SDP; and RFC 3265—SIP-Specific Event Notification. In this embodiment, VOI platform 104 comprises a SIP proxy 704 for supporting the session initiation protocol.
Whereas data communications occur via web server 702 (and perhaps SIP proxy 704), communications with customer VOI device 102 via the PSTN 108 are handled via telephone interface 706. Telephone interface 706 comprises any suitable interface for facilitating communication via PSTN 108. As mentioned above, telephone interface 706 may be further integrated with an IVR functionality.
Uniform resource identifier (URI) server 708 provides query capabilities for compatible VOI end points (e.g., customer VOI device 102). A compatible VOI device may query URI server 708 to obtain the identifier of a VOI device stored in database 112. It should be appreciated that, in an alternative embodiment, URI server 708 and/or database 112 may further employ the ENUM system, which is defined in RFC 2916, RFC 2782, and RFC 3403, each of which are hereby incorporated by reference in their entirety.
As known in the art, SIP proxy 704 refers to any of a variety of individual SIP-related functions, roles, etc. (or a collection thereof), which may be distributed over a communications network. By way of example, depending on the particular function, SIP proxy 704 may include any of the following, or other, client and/or server roles: proxy, registrar, back-to-back user agent, etc.
Having described the general components of an embodiment of customer VOI device 102 and VOI platform 104, embodiments of VOI provisioning module 600 and TNBS 112 will be described with reference to
It should be appreciated that VOI provisioning module 600 may support a number of communication protocols. For example, VOI provisioning module 600 may be configured to support HTTP, HTTPS, SIP, as well as any other suitable protocol over data network 110. Where SIP is implemented, VOI provisioning module 600 may initially register with, for example, a SIP proxy 704 associated with VOI platform 104. Furthermore, where HTTPS is implemented, VOI provisioning module 600 may issue a “GET” request to an HTTPS server associated with VOI platform. Regardless of the implementing protocol, at block 906, VOI provisioning module 600 provides device identifier 502 to VOI platform 104. In one embodiment, device identifier 502 comprises a digital certificate which is signed by a root certificate for VOI platform 104.
If device identifier 502 is authenticated by VOI platform 104, VOI provisioning module 600 receives (at block 908) a request from VOI platform 104 (e.g., call-to-platform request 504—
At block 1016, TNBS 112 receives the transmission from customer VOI device 102. At decision block 1018, TNBS 112 determines whether the transmitted information matches session identifier 508. If there is not a match, TNBS 112 may indicate, at block 1022, that the provisioning process has failed. If there is a match, TNBS 112 associates, at block 1020, the customer's existing telephone number to customer VOI device 102.
As mentioned above and described below in more detail, customer VOI device 102 and VOI platform 104 may support various protocols, including the Session Initiation Protocol (SIP). With reference to Tables 1-23, an exemplary implementation of the SIP will be described to illustrate an embodiment of the related communications between customer VOI device 102 and VOI platform 104 to provision VOI service(s). For particular reference, SIP is described in detail in RFCs 3261, 3262, 3263, 3264, and 3265, each of which are hereby incorporated by reference in their entirety. Other protocols, including a Session Description Protocol (SDP) and real-time Transport Protocol (RTP) are used in this exemplary implementation. SDP is described in more detail in RFC 2327 and RTP is described in more detail in RFCs 1889, 1890, and 2833—all of which are hereby incorporated by reference in their entirety.
Table 1 below illustrates various example variables that are referenced in the following description of one of a number of exemplary SIP implementations. Where public addresses appear in the exemplary SIP messages, they are not presented in numeric form as they would otherwise appear to avoid compromising any existing public information. Rather, this information is included as a data variable indicated in bold text. For example, rather than specify the actual public IP address for the customer VOI device, the information is presented as REMOTE-IP-ADDRESS. One of ordinary skill in the art will also appreciate that the exemplary SIP messages may not appear below in a fully SIP-compliant data format due to word wrapping, etc. For example, those of ordinary skill in the art will appreciate that SIP may require certain forms of wrapping in the SIP header lines which are not illustrated in the Tables.
It should be further appreciated that these exemplary SIP messages are merely one of a number of possible SIP implementations. One of ordinary skill in the art will appreciate that various alternative SIP messages may be employed. Furthermore, it should be appreciated that any SIP implementation may include various other SIP messages, sequences, etc. for handling retransmit contingencies and other reliability issues, to name a few.
Although not discussed in the exemplary SIP implementation, one of ordinary skill in the art will appreciate that additional techniques may be employed to traverse Network Address Translation (NAT) in the residential environment. In the examples below, the SIP transactions occur between VOI platform 104 and a particular customer VOI device 102 over a data link via the data network. Therefore, it is assumed that the NAT traversal algorithms and techniques (where appropriate to employ) have been successful, resulting in properly formed and fully operative SIP signaling.
The exemplary SIP implementation will be described by referencing the general function, operation, etc. of the blocks of
Customer VOI device 102 sends a REGISTER request, such as illustrated in Table 2 below.
The VOI platform SIP proxy may authenticate customer VOI device 102. For example, the HTTP Digest authentication method, as specified in RFC 3261 (which is hereby incorporated by reference in its entirety) may be used. The VOI platform SIP proxy may respond with the response illustrated in Table 3 to challenge the REGISTER request.
Customer VOI device 102 then generates the proper credentials and re-issues the REGISTER request with credentials as illustrated in Table 4 below.
Assuming the credentials are valid, the VOI platform SIP proxy may respond as illustrated in Table 5 with an “OK” response.
This registration process enables calls destined for customer VOI device 102. Calls to customer VOI device 102 delivered to the above registration will ring the telephone attached to customer VOI device 102.
In the exemplary SIP implementation, customer VOI device 102 may also register as a separately addressable SIP end-point for its PSTN connection. This creates two virtual addressable paths to the VOI device. This allows the VOI platform to independently interact with the user (phone) and the PSTN (telephone line) through the VOI device.
This second registration is much like the first registration described above, but using a different (auxiliary) username and SIP port as illustrated in Table 6.
The VOI platform SIP proxy may also authenticate this registration, in a manner similar to the previous example, by sending the challenge to customer VOI device 102 as illustrated in Table 7.
Customer VOI device 102 then sends a challenge-response with proper credentials as illustrated in Table 8.
Assuming the credentials are valid, the VOI platform SIP proxy responds with “OK” to complete the registration, as illustrated in Table 9.
This second registration applies to the PSTN connection of customer VOI device 102.
With the above sequences complete, customer VOI device 102 has successfully registered with VOI platform 104. When this process completes, customer VOI device 102 initiates the action shown at block 404 (
Customer VOI device 102 may attempt the action shown at block 404 regardless of the state of the PSTN connection. In other words, it will try to perform telephone phone number binding, whether the PSTN line appears live or not.
Referring again to block 404, customer VOI device 102 may initiate an HTTPS GET request to initiate the binding process. Therefore, it should be appreciated that customer VOI device 102 may comprise HTTP and HTTPS client capabilities. In one embodiment, customer VOI device 102 may function like a browser requesting web pages from remote Internet sites. In this manner, customer VOI device 102 provides a very reliable means of reaching VOI platform 104, even if customer VOI device 102 is connected through a Network Address Translation (NAT) router, firewall, etc.
Customer VOI device 102 may also implement the Secure Socket Layer (SSL) protocol. This enables the VOI device HTTP client to connect to servers using the secure HTTPS protocol. This is the same protocol used universally to secure internet transactions, such as to submit credit card information on web-site purchases, and to obtain bank and investments statements over the Internet. HTTPS encrypts the communication between client and server, protecting the message contents from other intervening network devices. Beyond encryption, HTTPS also provides for the authentication of the server and the client engaged in a secure transaction. This feature ensures that VOI platform 104 and the individual VOI clients cannot be spoofed by other nodes on the network.
The means for server and client authentication in SSL is private key cryptography, and the issuance of public certificates corresponding to private keys. The essential property of private key cryptography is that content encrypted with a public key can only be decrypted by its corresponding private key (and vice versa). Certificates are authenticated in the context of a certificate chain. A certificate authority lies at the root of the chain, with all other certificates ultimately depending on the root authority for authentication.
The VOI platform HTTPS server may be configured with an SSL server certificate that has been signed by the VOI platform root certificate. The firmware running on customer VOI device 102 may recognize such certificates as valid. The clients attempt to authenticate the server certificate when connecting via HTTPS, and will reject any server certificate not signed by the proper authority. This mechanism may protect the VOI system from direct network attacks on the VOI end-point, in which the attacker attempts to spoof a particular VOI platform server. If successful, such an attack would allow the attacker to re-provision the VOI device, presumably to gain configuration information or assume control of the VOI device.
Lacking the private key corresponding to a valid server and root certificates, the attacker will be unable to fake an authorized communication with customer VOI device 102, foiling this attack strategy. Server certificates are the only certificates required in a typical secure web transaction. However, the VOI system described here also uses client certificates to prevent rogue client requests. Each VOI device 102 carries a unique client certificate. Each client certificate is signed by the VOI platform root certificate, and carries identifying information about that specific VOI device 102. The certificate authority root certificate capable of authenticating the VOI device client certificate is used by VOI platform 104 to authenticate and identify VOI devices. Requests from unauthorized clients are rejected by VOI platform 104.
The combination of server certificates and client certificates ensures the secure communication between a remote VOI device 102 and VOI platform 104. VOI device 102 can assert with confidence that it is communicating with the correct VOI platform server and the VOI platform server can assert with confidence the identity of the specific remote VOI device 102 it is communicating with. Furthermore, VOI platform 104 and VOI device 102 can both assert that the transaction is protected from eavesdropping.
VOI device 102 may issue an HTTPS GET request to the VOI platform server. For example, the VOI device may issue a /prov/ft URL request to invoke a CGI (Common Gateway Interface) application on the HTTPS server. As known in the art, CGI is a standard mechanism for invoking external gateway applications on web servers. A CGI program is executed in real-time, so that it can take action and output dynamic information. Other mechanisms for executing an application in real-time on the server based on an HTTPS request could be used, such as Java Server Pages (JSP), Active Server Pages (ASP), PHP, and other similar technologies.
Referring to block 406, the VOI platform HTTPS server may be configured to require client certificates. In this case, the VOI device client certificate contains a unique identifier for the specific individual VOI device 102. The HTTPS server supplies the certificate information to the /prov/ft CGI application.
Referring to block 408, the VOI platform HTTPS server may process requests from VOI devices 102 that provide a valid certificate, as described above. The /prov/ft CGI application processes requests if the VOI device identifier contained in the certificate is valid. State may be maintained on VOI platform 104 about each known VOI device identifier. The /prov/ft CGI application knows the state of the device making the request and can therefore determine the action to take for the VOI device 102. If the /prov/ft CGI application determines that the requesting device is in need of telephone number binding, it sets the state for the VOI device to PENDING and adds the VOI device identifier to the queue of devices requiring number binding. Another application of VOI platform 104 may process the queue and initiate the binding process for each device sequentially. When this application begins the binding process for a given VOI device 102, it allocates a Binding Session ID for the specific binding session associated with a given VOI device. The Binding Session ID is a sequence of digits.
Referring to block 410, the binding application of VOI platform 104 instructs the VOI platform SIP proxy to initiate a call to VOI device 102 for the active binding session. The VOI platform SIP proxy initiates the call using SIP protocol with an INVITE request (Table 10) sent to the VOI Device at the registered location established at block 402 described above.
VOI device 102 uses the HTTP Digest authentication mechanism to authenticate the VOI platform proxy, by responding to the above request with a challenge as illustrated in Table 11.
The VOI platform proxy acknowledges this response as illustrated in Table 12.
The VOI platform proxy then re-issues the INVITE with proper credentials (the challenge-response) as illustrated in Table 13.
Assuming the credentials are valid, VOI device 102 may initiate the call over the PSTN and indicate to VOI platform 104 that the call is proceeding by sending various Informational Responses as defined in SIP RFC 3261, which is hereby incorporated by reference in its entirety. For example, customer VOI device 102 may initiate the process illustrated in Table 14.
This process initiates a call from VOI platform 104 to the VOI device 102 PSTN port with SIP Call-ID 6540e2c22085ee 3708d270086740841b@ PROXY-IP-ADDRESS. The SIP INVITE transaction associated with this Call-ID exists across several steps until terminated with a final SIP response, such as the “200 OK” response described below with respect to block 414.
This Call-ID is part of a SIP INVITE dialog that exists across several of the following steps until the BYE request associated with block 420. Note that the INVITE request includes Session Description Protocol (SDP) information, which indicates the format and acceptable encodings to be used for the media associated with the call. In this case, the media includes an RTP digital audio stream and an RFC 2833 telephone-event payload for carrying dual-tone multiple frequency (DTMF) digits.
Referring to block 412, customer VOI device 102 dials the number specified above using the attached POTS line. The line may indicate ringing and customer VOI device 102 may send an informational response to VOI platform 104 as illustrated in Table 15.
Referring to block 414, the call to the designated number is received at VOI platform 104. VOI platform 104 answers the call and receives ANI information indicating the number of the calling party, which is the existing telephone number of the line used by VOI device 102 to place the call. It should be appreciated that caller-ID or calling party number (CPN) techniques may be employed, but may be less reliable because ANI is used internally by telephone carriers for billing purposes. While CPN is created by the sending equipment, ANI is generated and sent by the telephone network and cannot be blocked by the caller.
When VOI platform 104 answers the call, VOI device 102 detects that condition on its PSTN interface and indicates that the call is established by sending the appropriate SIP response to the INVITE request initiated at block 410 above—as illustrated in Table 16.
This response may include the SDP information for VOI device 102 indicating how the VOI device 102 wishes to receive media for the call, including telephone-event DTMF data. The VOI platform SIP proxy acknowledges this response, per the SIP protocol, sending the SIP message illustrated in Table 17.
At this point the SIP call is established from VOI platform 104 to customer VOI device 102. This call persists across the following steps, until the BYE request associated with block 420. In other words, VOI platform 104 enters into a listening state for DTMF tones on the incoming call from the PSTN.
Referring to block 416, when VOI platform 104 answers the call, it sends the Binding Session ID over the established SIP call to VOI device 102. It does this using the media path established by the SIP INVITE for that call. The DTMF digits may be sent to VOI device 102 using RFC 2833 telephone-event path specified in the 200 OK response from VOI device 102 in block 414 above.
Referring to block 418, as the VOI device receives the DTMF digits sent on the SIP call (over the data link), it translates these digits into the corresponding actual DTMF analog tones and transmits them out the PSTN connection (POTS port).
At block 420, VOI platform 104 receives the DTMF digits over the PSTN connection. When it collects sufficient digits, it performs a check to see if the digits received match the Binding Session ID. Additional functions may be performed to improve the reliability of the DTMF transmission process. For example, customer VOI device 102 may use redundancy by transmitting each digit multiple times, so that if one instance of a DTMF digit gets distorted or interrupted over the PSTN, at least one of the other copies should get through. Furthermore, VOI platform 104 may test for “similarity” of the received digits to the original Binding Session ID using the Levenshtein string distance algorithm, rather than requiring an exact match.
VOI platform 104 may hang up the phone. This is detected by VOI device 102 on its POTS line, and VOI device 102 terminates the SIP call by sending a BYE request to VOI platform 104—as illustrated in Table 18.
VOI platform 104 accepts the BYE request by sending an “OK” response, as illustrated in Table 19.
VOI platform 104 terminates the call initiated at block 410. At this point, the SIP dialog with Call-ID 6540e2c22085ee 3708d270086740841b@ PROXY-IP-ADDRESS is no longer active.
Referring to block 422, if the received digits match the Binding Session ID per the algorithms described above, VOI platform 104 completes the binding process by associating the existing telephone phone number obtained at block 414 with the customer VOI device 102 associated with the active binding request. As mentioned above, the binding or association process may be performed in a variety of ways. For example, in one embodiment, the telephone number may be looked up in a Calling Name Database (CNAM) to determine the name associated with the telephone number. The telephone number and name for customer VOI device 102 are then stored into a name/number to a mapping database (e.g., database 114). If no CNAM data exists for the phone number, the number is still bound to VOI device 102, without any corresponding name data.
Furthermore, a Naming Authority Pointer (NAPTR) (RFC 2915) entry may be added to the VOI platform E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) (ENUM) (RFC 3761). This NAPTR entry maps the E.164 number associated with the phone number to a SIP URI associated with the VOI Device.
VOI platform 104 instructs VOI device 102 to perform an HTTPS action to obtain final configuration parameters. This is performed by VOI platform 104 sending a SIP NOTIFY request to VOI device 102 with a ‘resync’ event specified—as illustrated in Table 20.
The action may be authenticated by VOI device 102. VOI device 102 may challenge the request as illustrated in Table 21.
VOI platform 104 may re-send the NOTIFY request with the proper credentials (challenge-response) as illustrated in Table 22.
Customer VOI device 102 may accept the request as illustrated in Table 23.
At this point, customer VOI device 102 may request, in response to the NOTIFY event above, the HTTPS url with the following message: https://voiprov.televolution.net/prov/ft. When the /prov/ft CGI application executes, it will observe that the telephone number binding process for customer VOI device 102 has completed. As a result, it will then change the state of the device to BOUND, and update customer VOI device 102 parameters as appropriate for final operation.
For example, this may include changing the VOI device configuration such that subsequently the device will obtain configuration data from a static file using the HTTP protocol, rather than executing the /prov/ft CGI application using HTTPS. In this case, separate explicit encryption is used instead of SSL. The configuration data is encrypted using 256-bit AES in CBC mode with a shared secret. This is much more efficient than HTTPS and greatly reduces the load on the VOI platform 104. In this way, the expensive HTTPS method is used during initial provisioning and to safely establish the shared secret used for the static file method, while the much more efficient HTTP protocol and AES encryption is used in production after initial provisioning. This technique provides effective security while ensuring efficiency and scalability to reduce operating costs.
As known in the art, within an SIP infrastructure, calls are placed to SIP URIs. A URI is the generic set of all names/addresses that are short strings that refer to resources. Here the focus will be purely on SIP URIs, or the format of URIs which denote a SIP address. SIP URIs are described in more detail in RFC 3261, which is hereby incorporated by reference in its entirety. The SIP address may take any of the following, or other, forms: (1) sip:user:password@domain:port;uri-parameters?headers; (2) sip:user@domain:port; and (3) sip:user@domain. The user is the name of the user being addressed. The domain is the host providing the SIP resource (in this case the VOI calling service). The domain is typically a fully-qualified domain name, but it may also be a numeric IP address (e.g., IPv4, IPv6, etc.). The port is the port to which the request is to be sent. It is common for this token to be omitted, in which a default port (e.g., port 5060) is established. The port number may also be specified in SRV DNS records, so SIP implementations which support such DNS lookups may obtain the port number via DNS. If the port number is specified in the URI it may override DNS. Customer VOI devices 102 may be configured with a unique SIP URI. The URI is what distinctly identifies a specific device and permits other compatible devices to connect to and start a conversation with any other device.
Prior to a call being initiated, customer VOI devices A and B may register with their respective SIP proxy servers (reference lines 1110). Both devices A and B receive acknowledgement (e.g., a “200 OK”) from the respective SIP proxies indicating that registration succeeded (reference lines 1112). The calling party associated with device A initiates a call by sending an INVITE to proxy A (reference line 1114). The INVITE includes SDP information specifying the media parameters this node supports/desires, including codecs, ports, IP address for the streams, etc. Using DNS lookups, proxy A determines that proxy B is authoritative for the SIP URI being called, and forwards the INVITE to proxy B (reference line 1116). A message (e.g., “100 TRYING” message) may be sent back to device A (reference line 1118).
Proxy B receives the INVITE, checks to see if device B is currently registered, and if so passes the INVITE to device B (as illustrated by reference line 1120). Device B accepts the INVITE and returns an acknowledge (e.g., “180 RINGING” message), as illustrated by reference line 1122, to proxy B.
Proxy B forwards the acknowledgement message to proxy A (reference line 1124). As illustrated by reference line 1126, proxy A forwards the acknowledgement message to device A. When user B finally picks up the telephone corresponding to device B, the device accepts the call and returns another message (reference line 1128) to proxy B (e.g., “a 200 OK” message). The “200 OK” message may include SDP information specifying the media parameters supported by device B, including codecs, ports, and the IP address for the streams.
Proxy B forwards the 200 OK message back to proxy A (reference line 1130). Proxy A forwards the 200 OK message back to device A (reference line 1132). As illustrated by reference line 1134, device A returns an acknowledge (ACK) message to proxy A, which may include appropriate SDP information. Proxy A forwards the ACK message to proxy B (reference line 1136). Proxy B forwards the ACK message to device B (reference line 1138). As illustrated by reference line 1140, device A and device B may then communicate directly with each other without the aid of the corresponding proxies.
The INVITE from device A may require authentication by proxy A. For example, various provisional response packets may be passed between the proxies and the devices, but these should have no affect on the overall call setup. Once the basic call is established, media parameters may be altered via RE-INVITE messages via proxies A and B.
The SIP registration process (reference lines 1110 and 1112) may be implemented as follows. As known in the art, SIP supports a dynamic registration mechanism. SIP end-points send REGISTER requests to a registration server to register their physical location with the SIP service of record. This provides limited mobility for SIP end-points. The REGISTER requests have an expiry and the end-points refresh their registration by sending REGISTER requests periodically, as determined by the end node configuration.
In order for an end-node to receive a call, it should be registered with the service (the proper SIP proxy/registrar). The REGISTER requests tell the proxy/registrar where to route the calls for the given user name. Calls to unregistered destinations result in a SIP error, usually 480 Temporarily Unavailable, which will usually produce a fast-busy tone for the calling party (depending on their phone/software). SIP uses a challenge-based authentication mechanism which is based on HTTP authentication defined in RFC 2617, which is hereby incorporated by reference in its entirety. An exemplary registration sequence may be implemented as follows:
-
- (1) the client device sends a REGISTER packet to the SIP proxy;
- (2) the SIP proxy returns a “401 Unauthorized” packet, which contains a realm and a “nonce” which will be used by the client to construct its response;
- (3) the client responds with a new REGISTER packet with authorization information in it; the response may be a MD5 checksum of the username, the password, the nonce, and the realm;
- (4) the server generates the same MD5 checksum and compares it with that sent by the client; if they match, the registration is accepted and a “200 OK” packet is returned.
As mentioned above, given a SIP URI, a call can be placed from one SIP node to another. Another mechanism may be used to translate numbers dialed by users into corresponding SIP URIs. In effect, a telephone number in a SIP service is nothing more than a simple “label”. The number is only given meaning by the rules used by the system to process the dialed number. The manner in which a dialed number is processed is often referred to as a dialing plan or numbering plan.
A numbering plan is nothing more than making decisions about how to route a call based upon examination of the number dialed by the user. In practice, any processing rules could be used. Furthermore, the routing logic may be configured to process various prefixes. In one embodiment, the logic dialing model is configured to minor the numbering plan of an existing local telephone service to simplify the process for customers.
For instance, customer VOI devices 102 may contain region-specific dialing plan processing rules to support traditional PSTN-style dialing for that region. The region may be specified by the country code associated with customer VOI device 102 or set by factory configuration according to the local (within that country code) PSTN number associated with the device (e.g., determined through the TNBS process for that country-code/region).
Customer VOI devices 102 and VOI platform 104 may be designed to support the ITU-T Recommendation E.164 numbering plan. The system may make use of E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery (ENUM) as defined in RFC 3761. RFC 3761 defines a way to use NAPTR queries to convert an E.164 number to a SIP URI.
For example, a fully-defined E.164 number, as written on paper, looks something like this: +1-555-444-1111”. The plus-sign at the beginning of the number is a notation meaning “what follows should be interpreted as an E.164 number”. An exemplary process may operate as follows.
-
- 1. Strip off all the punctuation from the number (remove all spaces, plus-signs, dashes, etc.) to yield “15554441111”
- 2. Put a period between all the digits —“1.5.5.5.4.4.4.1.1.1.1.”
- 3. Reverse the order —“1.1.1.1.4.4.4.5.5.5.1”
- 4. Append “.e164.arpa”—1.1.1.1.4.4.4.5.5.5.1.e164.arpa
- 5. Now, an NAPTR query on 1.1.1.1.4.4.4.5.5.5.1.e164.arpa may be performed.
The basic format of the NAPTR record is: domain IN NAPTR order pref flags service regexp replacement. The fields have the following meanings:
The domain label for the NAPTR record, e.g., sip.earthlink.net or sip.mindspring.com.
OrderAn integer number specifying the order of preference in the case of multiple NAPTR records for the same domain label. This is similar to the preference field of a MX record in email. Lower numbers mean “more preferred.”
PrefA “preference” value. An integer number specifying order of preference in the event of multiple records having the same domain label and the same value for “order”. Again, lower numbers mean “more preferred.”
FlagsThis field is a character string, enclosed in quotes. RFC 2915 defines four flags: “S”, “A”, “U”, and “P”. The “S” and “U” flags are of primary interest in a SIP infrastructure. The “S” flag means that the “replacement” field from the NAPTR record should be used to do a query on a SRV record. The “U” flag means that the “regexp” field should be applied to the SIP URI, potentially rewriting the URI. This is most commonly used to implement reverse lookups for a phone number.
ServiceA character string which lists the type of service being described by the NAPTR record. The values of this field are completely service-dependent.
An exemplary NAPTR record for an E.164 entry would look as follows: 1.1.1.1.4.4.4.5.5.5.1.e164.arpa IN NAPTR 50 50 “u” “E2U+sip”“!̂\\+15554441111$!sip:12345@sip.voipservice.net!”. When the above steps are performed, the dialed number +15554441111 will be directed to the SIP URI sip:12345@sip.voipservice.net. VOI platform 104 may operate in much the same manner, with exception of the use of a private domain, rather than the “e164.arpa”. The TNBS process ultimately results in a NAPTR record being created for the PSTN number associated with the specific customer VOI device, with the number being represented in full E.164 form. The NAPTR record directs the E.164 number to the SIP URI for the specific customer VOI device.
When placing a call from a customer VOI device 102, the region-specific dialed number processing of the device may perform some local-specific processing to identify local numbers, and other numbers that should be directed to the attached PSTN connection (POTS port). For example, special processing may be performed for 911, 411, etc. The dialed number may be normalized into an E.164 form and a process such as defined in RFC 3761 performed. If a matching NAPTR is found, a SIP call is attempted to the SIP URI specified by the matching NAPTR record. If the SIP call fails, depending on configuration settings, the call may be attempted using the attached PSTN connection (POTS port). When the SIP call is successful, a peer-to-peer session is established between customer VOI devices (or other compatible end-points).
One of ordinary skill in the art will appreciate that VOI provisioning module(s) 600 and TNBS 112 may be implemented in software, hardware, firmware, or a combination thereof. Accordingly, in one embodiment, VOI auto-provisioning module(s) 600 and TNBS 112 are implemented in software or firmware that is stored in a memory and that is executed by a suitable instruction execution system (e.g., processor 606—
In hardware embodiments, VOI auto-provisioning module(s) 600 and TNBS 112 may be implemented with any or a combination of the following technologies, which are all well known in the art: a discrete logic circuit(s) having logic gates for implementing logic functions upon data signals, an application specific integrated circuit (ASIC) having appropriate combinational logic gates, a programmable gate array(s) (PGA), a field programmable gate array (FPGA), etc.
It should be further appreciated that the process descriptions or functional blocks related to
Furthermore, VOI provisioning module(s) 600 and TNBS 112 may be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. In the context of this document, a “computer-readable medium” can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. The computer-readable medium can be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic) having one or more wires, a portable computer diskette (magnetic), a random access memory (RAM) (electronic), a read-only memory (ROM) (electronic), an erasable programmable read-only memory (EPROM or Flash memory) (electronic), an optical fiber (optical), and a portable compact disc read-only memory (CDROM) (optical). Note that the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
Although this disclosure describes the invention in terms of exemplary embodiments, the invention is not limited to those embodiments. Rather, a person skilled in the art will construe the appended claims broadly, to include other variants and embodiments of the invention, which those skilled in the art may make or use without departing from the scope and range of equivalents of the invention.
Claims
1.-16. (canceled)
17. A method for provisioning a customer device for voice-over-Internet service, the method comprising:
- simultaneously controlling a data session and a telephone call between a voice-over-Internet platform and a customer device connected to a customer's telephone; and
- linking a telephone number received via the telephone call to the customer device, if a transmitted session identifier received via the telephone call matches a session identifier associated with the data session.
18. The method of claim 17, wherein the linking a telephone number to a customer device comprises binding the telephone number to a device identifier received via the data session, the device identifier uniquely identifying the customer device.
19. The method of claim 17, wherein the data session involves a session initiation protocol.
20. The method of claim 17, wherein the linking a telephone number to the customer device comprises:
- receiving, via the data session, a device identifier associated with the customer device;
- instructing the customer device to initiate the telephone call;
- capturing the telephone number via the telephone call; and
- instructing the customer device to transmit the session identifier via the telephone call.
21. The method of claim 17, wherein the data session occurs via the Internet.
22. A method for provisioning a customer device for voice-over-Internet service, the method comprising:
- establishing a data session between a customer device and a voice-over-Internet platform via a data network;
- receiving a device identifier associated with the customer device via the data session;
- instructing the customer device, via the data session, to make a telephone call to a predetermined telephone number that terminates at the voice-over-Internet platform;
- capturing a telephone number corresponding to the customer device via the telephone call;
- instructing the customer device, via the data session, to transmit a session identifier associated with the data session to the voice-over-Internet platform via the telephone call; and
- associating the telephone number with the customer device if the transmitted session identifier matches the session identifier.
23. The method of claim 22, wherein the establishing a data session involves a session initiation protocol.
24. The method of claim 22, wherein the establishing a data session comprises registering with an SIP proxy.
25. The method of claim 22, wherein the device identifier comprises a digital certificate stored in the customer device.
26. The method of claim 22, wherein the data session comprises an SIP session.
27. The method of claim 22, wherein the associating the telephone number with the customer device comprises binding the telephone number to the customer device.
28. The method of claim 27, wherein the telephone number is linked to the device identifier.
29. The method of claim 22, wherein the data network comprises the Internet.
30. The method of claim 22, wherein the telephone call is a wireless telephone call.
31.-50. (canceled)
51. A voice-over-Internet platform for binding a telephone number to a customer voice-over-Internet device identifier, the voice-over-Internet platform comprising:
- a first interface for communicating over a data network;
- a telephone number binding system coupled to the first interface and configured to receive a customer voice-Internet device identifier, communicate a request via the data network to a customer device associated with the customer voice-over-Internet device identifier;
- a second interface coupled to the telephone number binding system for communicating over the public-switched telephone network, the second interface configured to receive a call from the customer device associated with the customer voice-over-Internet device identifier, wherein the telephone number binding system upon receipt of the call, transmits a session identifier over the data network along with a request for the customer voice-over-Internet device to communicate the session identifier via the call, and upon receipt of a session identifier in the call that matches the session identifier transmitted via the data network, the telephone number binding system stores a record that includes a telephone number and the device identifier.
52. The voice-over-Internet platform of claim 51, wherein the telephone number binding system uses the customer voice-Internet device identifier to provision the customer voice-over-Internet device for a voice-over-Internet service.
53. The voice-over-Internet platform of claim 52, wherein voice-over-Internet calls originating from a participating origination device can be directed to the customer voice-over-Internet device over the data network.
54. The voice-over-Internet platform of claim 52, wherein voice-over-Internet calls originating from a non-participating origination device can be directed to the customer voice-over-Internet device over the public-switched telephone network.
55. The voice-over-Internet platform of claim 52, wherein the voice-over-Internet service is provided by a provider functioning absent cooperation of a telephone service provider.
Type: Application
Filed: Apr 7, 2010
Publication Date: Aug 5, 2010
Applicant: TELEVOLUTION, INC. (Danville, CA)
Inventor: David S. Beckemeyer (Danville, CA)
Application Number: 12/755,963
International Classification: H04M 3/42 (20060101); H04L 12/66 (20060101);