Method and control program for operating a communication terminal for packet-oriented data transmission

ABSTRACT

In the English translation document, please add the paragraph at page 11 line 1, after the newly added ABSTRACT section heading, as follows: In order to operate a communication terminal for packet-oriented data transmission, at least one piece of status information is stored, for a communication terminal, in a memory unit associated with the communication terminal. Said status information is provided with a digital signature that is calculated from the status information by means of a private key for an asymmetrical encoding method associated with a first control unit associated with the communication terminal, for the resolution and/or conversion of network addresses. If the first control unit fails, a request is transmitted comprising the status information and the digital signature to associate the communication terminal with at least one second control unit, and the digital signature is checked. In the event of a positive check result, the communication terminal is associated with the second control unit.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is the US National Stage of International Application No. PCT/EP2004/003131, filed Mar. 24, 2004 and claims the benefit thereof. The International Application claims the benefits of German application No. 10314559.1, filed Mar. 31, 2003, both applications are incorporated by reference herein in their entirety.

FIELD OF INVENTION

The invention relates to a method and a control program for operating a communication terminal for packet-oriented data transmission.

SUMMARY OF THE INVENTION

The Internet Protocol (IP) for packet-oriented, connectionless data transmission is not only used purely for data transfer. Due to the increasing installation of IP-based networks, such as Intranets and Extranets, the use of the Internet Protocol is an interesting and cost-effective alternative to traditional communication structures for voice and image signal transmission also. Voice signal transmission using the Internet Protocol, Voice-over-IP (VoIP), competes in particular with classical, connection-oriented voice networks. With regard to the use of the Internet Protocol for voice signal transmission, its real-time behavior is of key importance. This real-time behavior is determined by the minimization of data packet losses and delay times, especially as users only accept minimal delays in the case of voice signal transmission.

The incorporation and use of existing telecommunication systems will also be critical for the acceptance of Voice-over-IP. On the user side, there is in fact major economic interest in the continued use of previous, conventional telecommunication systems including all the familiar features. Voice-over-IP is planned as the replacement for conventional PBX technology and provides a basis for the continuing integration of voice, data and video services, for example in the context of multimedia conferences, application sharing, and call center applications. As a result of the simplification of operating functions for data and voice, potential synergies can be exploited. Moreover, Voice-over-IP makes standardized environments possible with interfaces to conventional telecommunication systems, including public telecommunication networks.

Possible application scenarios for Voice-over-IP in an Intranet envision site-based IP telephone gateways, over which calls are routed from a telecommunication system. Such a gateway has the task of supporting signaling, standard protocols, and also vendor-specific protocols. Currently, Voice-over-IP—including integration in existing telecommunications systems—still displays a number of weak spots with regard to signaling, available features, and suitable network management systems. In the case of the latter, requirements include overall monitoring and management of formerly separate voice and data communication.

In many VoIP telephone networks, VoIP terminals hold data about their status in a memory associated with the respective VoIP terminal. The unit's status includes, for example, information such as directory number, programmed key assignments, and activated features. Usually, a control unit known as a gatekeeper is associated with a VoIP terminal in VoIP telephone networks, which carries out the onward switching of call signaling and also the resolution or conversion of network addresses or telephone numbers, for example. As a rule, therefore, gatekeepers are provided primarily for access authorizations and security aspects. Additionally, gatekeepers can also be allocated tasks in the fields of charge logging, charge allocation or bandwidth management for the purposes of ensuring a prescribed quality of service.

If a gatekeeper in a VoIP telephone network fails, VoIP terminals are affected in particular, losing their association in the VoIP telephone network as a result. The re-association of the affected VoIP terminals with an alterative gatekeeper represents a security problem in this connection, since the affected VoIP terminals have usually not yet been registered by the alternative gatekeeper.

The object underlying the present invention is therefore to specify a method for operating a communication terminal for packet-oriented data transmission and also an efficient implementation of the method, which enables the secure re-association of the communication terminal with an alternative control unit following the failure of a previously associated control unit.

This object is achieved by the claims. Advantageous developments of the present invention are specified in the dependent claims.

An essential aspect of the present invention consists in the fact that a piece of status information stored, for a communication terminal, in an associated memory unit is provided with a digital signature. The digital signature is calculated from the status information by means of a private key for an asymmetrical encoding method, which is associated with a first control unit associated with the communication terminal for the resolution and/or conversion of network addresses. If the first control unit fails, a request is transmitted comprising the status information and the digital signature to associate the communication terminal with at least one second control unit and the digital signature is checked, for example by the second control unit. In the event of a positive check result, the communication terminal is associated with the second control unit. The unauthorized infiltration of a VoIP terminal at a control unit provided for association, such as a gatekeeper, can be prevented in this way.

In the following, the present invention is explained in detail using an exemplary embodiment on the basis of the drawing.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows a schematic representation of an application environment of the present invention, and

FIG. 2 shows a flowchart for a method and control program for operating a communication terminal for packet-oriented data transmission.

DETAILED DESCRIPTION OF INVENTION

The application environment of the present invention represented schematically in FIG. 1 includes a local packet-switching data network 101, which interconnects a plurality of VoIP telephones 111-113, PC-based communication terminals 121-122, gatekeepers 131-133, a router 102, and a gateway 103. The VoIP telephones 111-113 and the PC-based communication terminals 121-122 represent communication terminals for packet-oriented data transmission, where the VoIP telephones 111-113 are only used for voice signal transmission.

The gatekeepers 131-133 are provided as central control elements for the forwarding of call signaling and also the resolution and/or conversion of telephone numbers and network addresses. Apart from this, the gatekeepers 131-133 log charges and allocate them to network users and/or services. The gatekeepers 131-133 represent important components for Voice-over-IP, since software for the management of zones and call services is installed on them and runs there.

The router 102 is provided as a switching element between the local packet-switching data network 101 and a further IP-based network 104, such as the Internet, and connects the local, IP-based packet-switching data network 101 and the further IP-based network 104 to each other on the network layer as defined in the OSI reference model. The router 102 chiefly carries out tasks in the field of protocol conversion and data rate adaptation.

The gateway 103 includes hardware and software in order to interconnect networks of different types. In the present case, the gateway 103 connects a public telephone network 105 to the local, IP-based packet-switching data network 101 by means of protocol conversion. In particular, the gateway 103 has the task of transmitting messages from one network to another, which primarily requires a communication protocol conversion. Furthermore, the gateway 102 is capable of completely resolving protocols and represents an addressable network node both from the viewpoint of the public telephone network 105 and also from the viewpoint of the local packet-switching data network 101. A complete protocol conversion carried out by the gateway 103 includes conversion of addresses and formats, conversion of the coding, buffer storage of data packets, confirmation of packets, flow control, and also speed adaptation.

Status information is stored, for each of the communication terminals 111-113, 121-122, in a memory unit of the respective communication terminal. This status information includes, for example, call lists, redirections, programmed key assignments and activated features, and value-added services. In this respect, the status information is managed in the form of data containers in the respective memory unit and is continuously updated by a gatekeeper 131 to 133 associated with the respective communication terminal 111-113, 121-122. The storage of the status information corresponds to Step 201 in the flowchart shown in FIG. 2, while the updating of the status information corresponds to Step 210.

Furthermore, a digital signature is generated (Step 202), with which the respective status information is provided. The digital signature is calculated respectively from the status information stored in the respective memory by means of a private key for an asymmetrical encoding method and stored in the respective memory unit together with the status information. In the process, the respective digital signature is calculated by means of the private key which is associated with the gatekeeper 131-133 associated with the respective communication terminal 111-113, 121-122. A public key for checking a digital signature of a respective gatekeeper 131-133 is deposited in a form capable of being interrogated in the respective other gatekeepers. In general, the public keys are deposited in such a way that said public keys are available to all gatekeepers within an IP telephone domain.

The continuous updating of the status information is reflected in Step 203, in which an inquiry is made as to whether there is a change to the status information, and in Step 210, in which a piece of status information is updated where relevant. The failure of a gatekeeper 131 initially associated with a communication terminal 111-113, 121-122 is established by the communication terminals affected by the failure whenever a cyclical updating of status information no longer functions. As a result, the communication terminals are capable of recognizing the failure of a gatekeeper (Step 204).

If the initially associated gatekeeper 131 actually fails, then the communication terminals affected by the failure transmit a message containing a request to associate the respective communication terminal with at least one alternative gatekeeper 132-133. The message containing the request to associate the communication terminals affected by the failure includes the status information together with the digital signature stored in the respective communication terminals. A list containing alternative gatekeepers should preferably be stored additionally in each communication terminal in order that communication terminals affected by the failure of a gatekeeper can select an alternative gatekeeper in an evenly distributed manner. An automatic load distribution is ensured in this way. The transmission of the message containing a request to associate an alternative gatekeeper corresponds to Step 205 of the flowchart shown in FIG. 2.

The alternative gatekeeper 132-133, which has received a message containing a request to associate a communication terminal, firstly checks the digital signature included in the message (Step 206). If the digital signature is calculated from a hash value ascertained for the status information for example, a hash value is calculated for the status information transmitted by a communication terminal by one of the alternative gatekeepers 132-133 for the purposes of checking the digital signature and said hash value is compared for a match with a digital signature decoded by using a public key associated with the failed gatekeeper 131. A message digest no. 5 algorithm (MD5) can be used for calculating the digital signature, for example. To complete the checking of the digital signature, the check result is interrogated, as reflected in Step 207 of the flowchart shown in FIG. 2.

If the digital signature cannot be checked successfully, the re-association of the respective communication terminal affected by the failure of the previously associated gatekeeper 131 with an alternative gatekeeper 132-133 is rejected (Step 208). In the event of a positive check result, the communication terminal is associated with the respective alternative gatekeeper 132-133 (Step 209) and the status information for the communication terminal is updated where relevant (Step 210).

The method described for operating a communication terminal for packet-oriented data transmission can be implemented in the form of a control program, for example. In the case of a local implementation of the method, control programs are installed in the communication terminals which can be loaded into a working memory of a respective PC-based communication terminal and which display blocks of code, in the execution of which the steps described in the foregoing are carried out and/or initiated if the respective control program is running on the respective PC-based communication terminal. Steps for checking a digital signature and for associating a new gatekeeper can be carried out by control programs installed in the alternative gatekeepers.

The present invention is not limited to the exemplary embodiment described here. 

1-6. (canceled)
 7. A method for operating a communication terminal for packet-oriented data transmission, the method comprising: storing a status information for a communication terminal in a memory unit associated with the communication terminal; providing the status information with a digital signature calculated from the status information by a private key for an asymmetrical encoding method, wherein the private key is associated with a first control unit associated with the communication terminal for the resolution and/or conversion of network addresses; transmitting a request to associate the communication terminal with at least one second control unit if the first control unit fails, the request comprising the status information and the digital signature; checking the digital signature; and associating the communication terminal with the second control unit in the event of a positive check result.
 8. The method according to claim 7, wherein the status information is updated at least at a predefinable time upon the initiation of the first or second control unit.
 9. The method according to claim 7, wherein the digital signature is calculated from a hash value acquired for the status information.
 10. The method according to claim 8, wherein the digital signature is calculated from a hash value acquired for the status information.
 11. The method according to claim 7, wherein a hash value is calculated for the status information for the purposes of checking the digital signature and said hash value is compared for a match with a digital signature decoded by using a public key associated with the first control unit.
 12. The method according to claim 8, wherein a hash value is calculated for the status information for the purposes of checking the digital signature and said hash value is compared for a match with a digital signature decoded by using a public key associated with the first control unit.
 13. The method according to claim 9, wherein the hash value is calculated for the status information for the purposes of checking the digital signature, and wherein the hash value is compared for a match with a digital signature decoded by using a public key associated with the first control unit.
 14. The method according to claim 10, wherein the hash value is calculated for the status information for the purposes of checking the digital signature, and wherein the hash value is compared for a match with a digital signature decoded by using a public key associated with the first control unit.
 15. The method according to claim 9, wherein a message digest no. 5 algorithm is used for calculating the digital signature.
 16. The method according to claim 10, wherein a message digest no. 5 algorithm is used for calculating the digital signature.
 17. The method according to claim 11, wherein a message digest no. 5 algorithm is used for calculating the digital signature.
 18. The method according to claim 12, wherein a message digest no. 5 algorithm is used for calculating the digital signature.
 19. The method according to claim 13, wherein a message digest no. 5 algorithm is used for calculating the digital signature.
 20. The method according to claim 14, wherein a message digest no. 5 algorithm is used for calculating the digital signature.
 21. A method for operating a communication terminal for packet-oriented data transmission, comprising: storing at least one piece of status information for a communication terminal in a memory unit associated with the communication terminal, wherein said status information is provided with a digital signature that is calculated from the status information by means of a private key for an asymmetrical encoding method associated with a first control unit associated with the communication terminal for the resolution and/or conversion of network addresses, wherein, if the first control unit fails, a request is transmitted comprising the status information and the digital signature to associate the communication terminal with at least one second control unit and the digital signature is checked, and wherein in the event of a positive check result, the communication terminal is associated with the second control unit.
 22. The method according to claim 21, wherein the one piece of status information at least is updated at a predefinable time upon the initiation of the first or second control unit.
 23. The method according to claim 21, wherein the digital signature is calculated from a hash value ascertained for the status information.
 24. The method according to claim 23, wherein a hash value is calculated for the status information for the purposes of checking the digital signature and said hash value is compared for a match with a digital signature decoded by using a public key associated with the first control unit.
 25. The method according to claim 23, wherein a message digest no. 5 algorithm is used for calculating the digital signature.
 26. A control program for operating a communication terminal for packet-oriented data transmission, which can be loaded into a working memory of a computing facility and displays at least one block of code, in the execution of which at least one piece of status information is stored, for a communication terminal, in a memory unit associated with the communication terminal, said status information is provided with a digital signature that is calculated from the status information by means of a private key for an asymmetrical encoding method associated with a first control unit associated with the communication terminal for the resolution and/or conversion of network addresses, if the first control unit fails, a request is transmitted comprising the status information and the digital signature to associate the communication terminal with at least one second control unit and a check of the digital signature is initiated, in the event of a positive check result, the association of the communication terminal with the second control unit is initiated, if the control program is running on the computing facility. 