Network Device Management

ABSTRACT

A method is provided to dynamically interact with a plurality of enabled devices within a personal network. Individual ones of the devices are configured to interoperate with a service provider network and configure or alter services to individually identifiable devices.

RELATED APPLICATIONS

This application is a continuation of application Ser. No. 10/626,343,filed Jul. 24, 2003, which claims the benefit of Provisional ApplicationNo. 60/447,436 filed Feb. 14, 2003. Both applications are incorporatedherein by reference.

BACKGROUND

The present invention relates generally to network systems. It findsparticular applicability in conjunction with communication basednetworks and will be described with particular reference thereto. It isto be appreciated however, that the invention finds further applicationin systems and devices where it is desirable to use a single addresswith a plurality of devices.

The first generations of wireless mobile phones were large in size andexpensive to use. However, over time, technology has reduced the size ofthe mobile telephone and lowered its cost of use, thereby enhancingmobility and expanding usage. With each subsequent generation oftechnology, the size of the device has been reduced while thefunctionality and types of devices available have increaseddramatically.

With the introduction of digital cellular telephones, laptop computers,multi-function personal handheld devices, one can now send email, surfthe web, make telephone calls, receive and send instant/short messages,view personal calendars, video conference, and send pictures seamlesslyand continuously while connected to one or more wireless or wirelinecommunications networks.

However, as service providers and equipment manufacturers drovedevice/service integration, complex devices were created that attemptedto be all things to all users. As the complexity of communicationdevices increased, it created user confusion and communication solutionsthat were not optimally designed for any one specific intended use.Miniature thumb-operated keyboards, tiny screens so small the contentand images are compromised, hanging earpieces, amplified speakers, anddangling microphones are prevalent in such devices and are often alsotethered to an automobile cigarette lighter. To further complicatedevice designs, communication appliances are being configured asinformation management devices, and information management devices arebeing configured as communication appliances. These combined functionshave resulted in designs that are unable to do either comfortably. Thesecommunication solutions quickly become tedious and annoying to use sincethe miniaturization and application integration was achieved bycompromising the needs of the user.

SUMMARY

In one embodiment, an increased number of communication devices used byend-users are provided. Particular devices are optimized for specifictasks and applications. Laptop computers, personal digital assistants,video telephones, small telephones for travel, and traditional sizedphones for home or automobile use are designed and optimized for aspecific use.

In another embodiment, a means to effectively manage devices isprovided. The devices are enabled to communicate within and across acommunications network. As service providers consolidate their networksin order to support multiple services (voice, video, data), it isincreasingly common for end-users to subscribe to multiple serviceswhile utilizing multiple appliances on a service providers network.

In another embodiment, a method and system are provided that allow acommunication services user to use and manage a personal network ofdevices that operates as a single account utilizing one or moretelephone number(s) within a service provider's network. This enables ade-centralized means to provide subscriber driven network devicemanagement and service provisioning.

BRIEF DESCRIPTION OF THE DRAWINGS

In the accompanying drawings which are incorporated in and constitute apart of the specification, embodiments are illustrated which, togetherwith the detailed description given below, serve to describe exemplaryembodiments. It will be appreciated that the illustrated boundaries ofelements (e.g. boxes, groups of boxes, or other shapes) in the figuresrepresent but exemplary boundaries. One of ordinary skill in the artwill appreciate, for example, that one element may be designed asmultiple elements or that multiple elements may be designed as oneelement. An element shown as an internal component of another elementmay be implemented as an external component and vice versa.

FIG. 1 is a system diagram illustrating an embodiment of a network.

FIG. 2 is a functional block diagram illustrating an embodiment of anetwork device.

FIG. 3 is a system diagram illustrating another embodiment of a networkand an exemplary record from a computer-readable medium

FIG. 4 is a system diagram illustrating another embodiment of a network.

FIG. 5 is a system diagram illustrating one embodiment of a system formanaging a network.

FIG. 6 illustrates one embodiment of a methodology for managing anetwork of devices.

FIG. 7 is a system diagram illustrating another embodiment of a network.

DESCRIPTION OF THE ILLUSTRATED EMBODIMENTS

The following description includes definitions of selected terms usedthroughout the disclosure. Both singular and plural forms of all termsfall within each meaning:

“Address”, as used herein, includes but is not limited to one or morenetwork accessible addresses, device identifiers, telephone numbers, IPaddresses, url and ftp locations, e-mail addresses, names, adistribution list including one or more addresses, network drivelocations, postal addresses, account numbers or other types of addressesthat can identify a desired destination or device.

“Computer-readable medium”, as used herein, refers to any medium thatparticipates directly or indirectly in providing signals, instructionsand/or data to one or more processors for execution. Such a medium maytake many forms, including but not limited to, non-volatile media,volatile media, and transmission media. Non-volatile media may include,for example, optical or magnetic disks. Volatile media may includedynamic memory. Transmission media may include coaxial cables, copperwire, and fiber optic cables. Transmission media can also take the formof acoustic or light waves, such as those generated during radio-waveand infra-red data communications, or take the form of one or moregroups of signals. Common forms of computer-readable media include, forexample, a floppy disk, a flexible disk, hard disk, magnetic tape, orany other magnetic medium, a CD-ROM, any other optical medium, punchcards, papertape, any other physical medium with patterns of holes, aRAM, a PROM, an EPROM, a FLASH-EPROM, any other memory chip orcartridge, a carrier wave/pulse, or any other medium from which acomputer, a processor or other electronic device can read.

“Logic”, as used herein, includes but is not limited to hardware,firmware, software and/or combinations of each to perform a function(s)or an action(s), and/or to cause a function or action from anothercomponent. For example, based on a desired application or needs, logicmay include a software controlled microprocessor, discrete logic such asan application specific integrated circuit (ASIC), a programmed logicdevice, memory device containing instructions, or the like. Logic mayalso be fully embodied as software.

“Signal”, as used herein, includes but is not limited to one or moreelectrical signals, analog or digital signals, one or more computer orprocessor instructions, messages, a bit or bit stream, or other meansthat can be received, transmitted, and/or detected.

“Software”, as used herein, includes but is not limited to one or morecomputer readable and/or executable instructions that cause a computeror other electronic device to perform functions, actions, and/or behavein a desired manner. The instructions may be embodied in various formssuch as routines, algorithms, modules or programs including separateapplications or code from dynamically linked libraries. Software mayalso be implemented in various forms such as a stand-alone program, afunction call, a servlet, an applet, instructions stored in a memory,part of an operating system or other type of executable instructions. Itwill be appreciated by one of ordinary skill in the art that the form ofsoftware is dependent on, for example, requirements of a desiredapplication, the environment it runs on, and/or the desires of adesigner/programmer or the like.

“User”, as used herein, includes but is not limited to one or morepersons, software, computers or other devices, or combinations of these.

Generally speaking, one embodiment of a system and method is provided toenable a user to define, control and operate a personal network of oneway or bi-directional devices capable of accessing a service provider'snetwork, receiving services, or both. This can be accomplished byassembling a network of personal communications devices that may includetransmitters, receivers or transceivers that share or can be configuredto share the same address. The devices are configured to be compatibleor selectively compatible with the service provider's network. Inaddition to assembling the network of personal communications devices,the user subscribes to one or more services made available by theservice provider. Furthermore, the service provider's network uses asignaling protocol that allows for communications between devicetransceivers within the personal network and database units within theservice provider's network.

In a simple exemplary network, a telephone service provider assigns atelephone number to a subscriber. In this simple network, the subscriberhas multiple telephones, each used in different places and at differenttimes. The subscriber registers each telephone including a unique serialnumber with the telephone service provider's database and a subscriberprofile is created. The assigned “telephone number” actually refers tothe subscriber profile identifying the subscriber's network. Eachtelephone occupies a record in the subscriber profile and isindividually identifiable by the unique serial number. Once established,for example, a mobile telephone is selected to receive all incomingtelephone calls. Once the subscriber returns home, the home phonereplaces the mobile phone as the desired destination for all incomingcalls (either automatically or through manual selection). In anembodiment, incoming signals such as calls, can be directed to thesubscriber profile and a database dip can be configured to return thesubscriber desired routing data to complete the call to a device. In anembodiment, outgoing signals such as calls, can be transmitted from atelephony enabled device over transmission medium to the subscriber'sdatabase, and/or to another device. Conveniently, charges associatedwith any of the devices in the subscriber's network can be aggregatedonto a single bill.

In a more general embodiment, upon user initiation, a devicecommunicates with a service provider's network. The device transmits arequest to authentication logic operated by the service provider foraccess to some or all of the services available to the serviceprovider's network, for example telephone services, text messagingservices, video services and other services. Logic within the device canbe configured to negotiate for access to services available from theservice provider. Responsive to the request, the authentication logicauthenticates the device's request for access and selectively makesavailable to or authorizes the device to use those services availablefrom the service provider's network.

In another embodiment, the user initiates a request to modify orotherwise change the status of one or more devices within his personalnetwork by modifying the service provider's database. The status of adevice includes available services assigned to the device, and thedevice's registration on the network, for example, enabled or disabledfrom network participation. It will be appreciated that one device onthe personal network can be configured to check or alter the status ofthat device, and/or other devices within the personal network. Moreover,device status can alternately be checked or configured via othermechanisms such as over the internet, through communication with acustomer service feature and the like.

One embodiment of the network device management is illustrated inFIG. 1. Network 100 includes a service provider network operationscenter 102, a plurality of personal networks 104 (one shown) and, aplurality of personal network devices 110 (A-D shown). The networkdevices 110 communicate with the service provider's network 102 acrossone or more transmission mediums such as conventional wireline networks120, which include twisted pair, Hybrid Fiber Coaxial (HFC) fiber opticsand the like; terrestrial wireless networks 122; and satellite or otheraloft networks 124. The service provider's network 102 providesinformation such as communication services, voice, video, and/or data topersonal networks 104 of network devices 110. It should be appreciatedthat the service provider may directly provide all of the services, ormay act as a distributor of other providers' services. It should befurther appreciated that network devices 110 include a variety ofportable, mobile, analog cellular or digital devices, video and audioequipment, desk-top computers and the like configurable to have discreteaddresses identifiable from the common address.

The service provider's network 102 uses transceiver equipment (notshown) coupled with one or more of the transmission mediums 120-124 tocommunicate information, network control, and system resource managementto and/or from the personal networks 104. The service provider's network102 includes computer-readable media such as database units that can beeither centralized or distributed. Exemplary database units include anauthentication and authorization database 130, and a subscriber database134. Logic 136 is configured to process requests for access to networkservices accessing authentication and authorization database 130 andaccessing or modifying stored information specific to each user,personal network 104, and network device 110. The subscriber database134 is arranged to identify specific information regarding each user'spersonal network 104, network devices 110 and authorized networkservices. In the illustration, each database unit is in datacommunication with and under the control of logic 136 associated withthe service provider's network 102 but such centralized control can bereadily decentralized or segregated into two or more distinct elementswith no loss of functionality.

With reference to FIG. 2, an embodiment of a network device 110 includesa transceiver 202 in communication with a logic that may take the formof processor 204. The transceiver 202 may be configured to transmit,receive, or both signals including voice, video, and/or datatransmissions formatted under several signaling protocols. While thetransceiver 202 is illustrated connected to an antenna, wiredconnections are also envisioned for network devices 110. The processor204 can also be in data communication with display logic 206 andinput/output logic 208. A storage device medium 210 can be provided tostore encryption algorithms, software programs, algorithms used toprocess signals and/or algorithms or logic used to implementcommunication controls and network system management. Storage device 210can be configured with one or more computer-readable media or operablyconfigured logic.

Additionally, the processor 204 is configured to access identificationcodes, such as the illustrated electronic serial number (ESN) 220,personal network code (PNC) 222, and system identification code (SID)224. As further discussed below, these identification codes 220, 222,224 enable, device management and communication. For example, in oneembodiment ESN 220 corresponds to a device 110, PNC 222 corresponds to apersonal network 104, and SID 224 corresponds to a service provider'snetwork 102.

In one embodiment (ESN) 220 is generated from an individual device'shardware identification code. Typically, hardware identification codesare manufacturer assigned indicia which are unique to each networkdevice. In another embodiment, ESN 220 is assigned by a service providerand held in memory. It should be appreciated that these identificationcodes need not be static, and can cycle or hop for example for security.

In another embodiment, each network device 110 stores or is assigned apersonal network code (PNC) 222. The personal network code 222 ispreferably unique within the communication network 100 but may be commonamong the network devices 110 within a personal network 104. Asillustrated, each personal network 104 can have one or more personalnetwork codes 222 corresponding to, for example, a single devicebelonging to more than one personal network such as in the case of asingle home phone belonging to the personal networks of each occupant.The personal network code 222 may be a hexadecimal number or any addressassigned by the user or the network service provider suitable toidentify the personal network of devices.

Yet another embodiment includes the service provider assigning a networkdevice 110 a system identification code (SID) 224. This systemidentification code 224 can be unique to the service provider and can beassigned to all network devices 110 that operate within the network 100.That is, the system identification code 224 is common to selectedoperable devices in the plurality of personal networks 104 in theoverall network 100. The network device 110 has data access to thesystem identification code 224.

With reference now to FIG. 3, operation of a system according to anembodiment of the present invention is illustrated. Personal network 104comprises one or more network devices 110 subscribing to service(s)provided by or available through the service provider's network 102.Each network device 110 is registered or registerable with the serviceprovider network 102. Registration of each network device 110 may beaccomplished either remotely or locally using either manual or automatedmeans. Registration of each network device 110 can include the creationor modification of data fields within subscriber database 134, andauthentication and authorization database 130. Each user's personalnetwork 104 is represented within the subscriber database 134 with aprofile, for example, profile 350 including individual device records360. These individual device records are populated with fieldsidentifying the device, the network, the like and also various services370 available from the service provider's network. The authenticationand authorization database 130 comprises fields for those identifiersassociated with each device 110 registered, for example, the ESN 220 andPNC 222. Once a user has registered and enabled a network device 110 onthe service provider's network 102, the network devices may communicateon, with, and through the communication network.

In another embodiment, the user can utilize one or more of the networkdevices 110 concurrently. Each device 110 can be used for one or moresimilar or different services 370 provided by the service provider. Forexample, in the telephone context, a device may be configured for audioservices while another device may be configured for text-based services.Alternatively, a single device may be configured for both audio and textservices. In yet another alternative, services may be segregated on anin-coming or out-going basis.

Initiated by the user or upon a triggering event, a network device 110will signal the service provider's network 102 by sending an inboundsignaling word (ISW) 310. As further discussed below, the ISW 310 can beconfigured to manage devices 110 in the personal network 104 byregistering devices or changing services 370 available to specificdevices. In the illustrated embodiment, the ESN 220, personal networkcode 222, system identification code 224, and data payload 240 comprisethe ISW 310, which is used to access the service provider's network 102.The specific format of the ISW 310 is not integral to this invention.However, the ISW 310, or communication link to the service provider'snetwork 102, includes a mechanism to identify the specific network 104and a mechanism to communicate data.

A user can initiate a transmission in a variety of ways including, butnot limited to: using an input device such as a keypad or keyboard,speaking into a microphone, pushing a button, using a pointing device,manipulating a joystick, using a dial or other type of mechanism,placing a device in a cradle, or other triggering mechanisms based ontime, location, motion and the like. Regardless of the means in whichthe ISW 310 is initiated, the result includes transmission of the ISW310. In the illustrated example, the ISW 310 transmits from the personalnetwork 104, through the communications medium 120-124, to the serviceprovider's network 102. The service provider's network 102 receives thetransmission and logic (not shown) decodes the ISW 310 into itscomponent data fields. The authentication and authorization database 130is used to validate the received ISW 310 for access to the networkresources including the personal network user profile 350. Onceauthenticated, components of the ISW 310, for example, the ESN 220, PNC222 and the data payload 240 are communicated to the subscriber database134 where the personal network profile is stored. The logic used tocontrol and manipulate the subscriber database 134 decodes the datapayload 240 of the ISW 310. Using the ESN 220 and PNC 222 (or otherentries or combinations thereof) to index to the correct personalnetwork user profile 350 and the correct field 360 within the profile,the subscriber database 134 will then operate upon the data payload 240.

In one embodiment, the data payload 240 is developed and specified bythe user prior to initiating the ISW 310 transmission. The user createsthe payload 240 through manipulation of the input output logic 208associated with the network device 110. Specific payload signals willvary amongst network devices 110 depending upon the capabilities of eachdevice and the capabilities of the service provider's network 102.However, in general, through the use of each network device 110, theuser can develop payload information to control and manage the services370 available within his personal network 104. Generally, this controloccurs through the manipulation of personal network user profile 350stored within the service provider's subscriber database 134. Examples,of payload commands that can be developed and initiated by the userinclude, but are not limited to: on/off status command; on/off serviceselection commands; addition/deletion of services; addition/deletion ofdevices; addition/deletion of personal network codes; routing to andfrom specific devices 110 and the like. Essentially, the userdynamically defines, controls, manages and operates the servicesavailable to each network device 110 within his personal communicationsnetwork 104. Furthermore, since network devices 110 can share the samepersonal network code 222 (e.g. address, telephone number, and thelike), the user has the ability to use different devices for differenttasks either at the same or different times by manipulating the servicesprofile for each device.

In another embodiment, a user initiates a request to modify or otherwisechange the status of one or more devices 110 within his personal network104 by modifying information in the service provider's network 102 witha particular data payload 240. For example, after successfulauthentication, database manipulation to index to the appropriatepersonal network user profile 350 and the successful decode of the datapayload, the subscriber database 134 is updated to incorporate the datapayload 240. During an update, the subscriber database 134 verifies,establishes, or changes status of the network device fields 360 withinthe profile as directed by the data payload. This updated personalnetwork profile 350 is stored and becomes the profile that defines thepersonal network 104, network devices 110 and/or the services available.

It is understood that the procedures described can be modified toinclude user-initiated manipulation of the personal network user profile350 through means other than using a network device 110. For example inanother embodiment, a user accesses the service provider's subscriberdatabase 134 through a public network such as the Internet 370 using aconnecting device 372. In one embodiment, the user authenticates, forexample via a username/password algorithm. Once authenticated, theuser's personal network user profile 350 can be modified by the user.Once complete, the user logs out of the database and the subscriberdatabase 134 retains and implements any changes made to the profile.

With reference now to FIG. 4, an alternate embodiment of personalnetwork 104 configured as a distributed network includes a personalnetwork logic 400 including distributed subscriber database 434. Thepersonal network logic 400 provides an interface between selecteddevices 110C, 110D and the service provider network 102. To illustrate arouting example, a telephone call directed toward personal network 104is received by the personal network logic 400. The logic 400 receivesthe incoming signal, determines routing instructions from thedistributed subscriber database 434, and routes the call to theparticular device (e.g., 110C) where telephone signals (in this example)are to be received. In one embodiment the personal network logic 400acts as a local switch directing data to particular devices within thepersonal network, for example inside of a home or office. Personalnetwork logic 400 is in data communication with selected devices eithervia hardwiring or wireless links. In the event that a call is directedto a device not within direct communication with the personal networklogic 400, the call is redirected, for example, over telephoneinfrastructure 122 which completes the call to the designatedcall-receiving device, for example 110B.

It can now be appreciated that the personal network logic 400 performs aproxy-like communications service between selected network devices thatmay or may not be configured to communicate directly with thecommunications network and the service provider network. As an example,a caller originating a telephone communication from device 410 connectsthrough the public switched telephone network 412 to the serviceprovider's network 102. Access database 130 recognizes from incomingservice data 414, an inbound called number in this example, that thecall is directed toward a personal network 104. Personal network logic400 receives the call and identifies an attribute from the service data414 suitable to identify the service provided, here a telephone call.Such identification can occur by recognizing attributes of variousservices or by a coded prefix or other identifying data appended to theincoming service data 414. After identifying the service, personalnetwork logic 400 accesses the personal network profile 350 fromdistributed subscriber database 434 to identify the selectedcommunication device setup to receive the service in the network. Thecall, in this example, is then directed to the desired communicationdevice 110 based on the service attribute and the values in the personalnetwork profile 350. It can now be appreciated that the personal networkswitch 400 may also incorporate either partially or entirely all thedatabase functions provided by the service provider network 102.Moreover, while the call is illustrated as being routed through thesubscriber's network 102, under the illustrated system, the call may berouted directly to the personal network 104.

It should be noted that although the service provider's network 102 hasbeen discussed as including both the transmission network 120, 122, 124and the databases 130, 134, this is not a requirement for the invention.Those skilled can appreciate that implementations exist in anenvironment where the access network provider is not the same as theapplication/services provider who operates, maintains and makesavailable services to users with personal networks and network devices.In such cases, one or more networks are used to obtain access to thepersonal network user profile for manipulation and management. Indeed,various services from multiple providers may be available through theservice provider's network. For example video services may be providedfrom one provider, while voice services may be provided from another.

As an example of the above-described process, assume that a personalnetwork Z consists of 3 personal network devices (A, B, C) each with aunique ESN and sharing the same personal network code (555-555-1212).Each of the three devices has been successfully registered and enabledfor operation on service provider D's network. Below is an example ofsome possible attributes of each network device and a personal networkuser profile:

CHART 1 Service Provider D Subscriber Database Personal Network Z UserProfile Personal Device Voice Video Data Device Type Network Code DeviceESN Status Service Service Service Device Portable 555-555-1212 ABC12345On Enabled Disabled Disabled A Telephone Device Pers. Dig. 555-555-1212DEF54321 On Disabled Enabled Enabled B Assistant Device Video555-555-1212 GHI12345 On Disabled Disabled Disabled C Telephone

Assume that the user who manages personal network Z would like toreceive/send his video communications by utilizing his portabletelephone (Device A) while on the road. Video service is currently notenabled on his portable phone. To enable his portable phone toreceive/send video communications, the user will manipulate the menuselection utilizing the soft-keys on his portable telephone to select“enable video communications”. Once selected, the portable telephonewill transmit an ISW that will be received by the service provider D'snetwork. Once received, the ISW will be decoded and the information sentto the authentication and authorization database. Assuming the networkdevice and ISW successfully authenticate, the ISW will be delivered tothe service providers subscriber database. The subscriber database willuse components of the ISW such as the personal network code and the ESN,to index to the specific record in the personal network user Z profile.The subscriber database logic will then operate on the payload dataincluded in the ISW received from personal network device A. In thisinstance, the payload data instructs the service provider subscriberdatabase to change the personal network user Z profile, enabling DeviceA, the portable telephone, to receive/send video communications. Oncechanged, the subscriber database will save the modified version of thepersonal network user Z profile. The modified personal network user Zprofile is shown below:

CHART 2 Service Provider D Subscriber Database Personal Network Z UserProfile (modified) Personal Device Voice Video Data Device Type NetworkCode Device ESN Status Service Service Service Device Portable555-555-1212 ABC12345 On Enabled Disabled A Telephone Device Pers. Dig.555-555-1212 DEF54321 On Disabled Enabled Enabled B Assistant DeviceVideo 555-555-1212 GHI12345 On Disabled Disabled Disabled C Telephone

FIG. 5 illustrates an additional embodiment for managing the personalnetwork. Introduced in FIG. 5 is the concept of the Outbound SignalingWord (OSW) 514 that is incorporated in certain embodiments. The OSW issimilar to the ISW explained above, with the exception that itrepresents data communication from the service provider's network 102 tothe network device 110, for example to transfer signals from thesubscriber database 134 to network devices 110.

Referring to FIG. 5, assume that a personal network 104Z consists of twopersonal network devices 110A, 110C each with a unique ESN and sharingthe same personal network code (555-555-1212). Each device has beensuccessfully registered and enabled for operation on service provider102X's network. Below is an example of some possible attributes of eachnetwork device and a personal network user profile:

CHART 3 Service Provider X Subscriber Database Personal Network Z UserProfile Personal Device Voice Video Data Device Type Network Code DeviceESN Status Service Service Service Device Portable 555-555-1212 ABC12345On Enabled Disabled Disabled A Telephone Device Mobile 555-555-1212GHI12345 Off Disabled Disabled Disabled C Telephone

Assume that the user who manages personal network 104Z is initiallyreceiving and sending voice communications by utilizing portabletelephone 110A. At some point in time later, the user would prefer touse mobile telephone 110C instead of portable telephone 110A. To enablemobile telephone 110C to receive/send voice communications, the userwill manipulate a menu selection or other interface on either portabletelephone 110A or mobile telephone 110C to select “swap profiles fromone device to another”. Assuming the command was sent from portabletelephone 110A, an ISW 310 is transmitted to the service providernetwork 102X. Once received, the ISW will be decoded and the informationauthenticated with database 130X. Assuming the portable telephone 110Aand the sent ISW 310 successfully authenticate, the ISW is delivered tothe service provider's subscriber database 134 which is illustrated inan alternate configuration separate from service provider's network 102Xand authorization database 130X. The subscriber database will use thepersonal network code 222 and the ESN 220, included in the ISW 310 toindex to a specific record in the personal network user Z profile (seee.g. charts 3, 4). The subscriber database logic will then operate onthe payload data included in the ISW received from network device 110A.In this instance, the payload data instructs the service providersubscriber database 134 to swap the personal network user Z profile ofnetwork device 110A with that of network device 110C, enabling themobile telephone to receive/send audio communications and settingnetwork device 110A to “off” status. Once changed, the subscriberdatabase will save the modified version of the personal network User Zprofile. The modified personal network user Z profile is shown below:

CHART 4 Service Provider D Subscriber Database Personal Network Z UserProfile (modified) Personal Device Voice Video Data Device Type NetworkCode Device ESN Status Service Service Service Device Portable555-555-1212 ABC12345 Off Disabled Disabled Disabled A Telephone DeviceMobile 555-555-1212 GHI12345 On Enabled Disabled Disabled C Telephone

After the subscriber database 134 stores the new user profile to memory,an OSW 514A, C is initiated to each of the network devices 110A, 110Ceffected by the previous ISW 310 database transaction. OSW 514A is sentto network device 110A and OSW 514C is delivered to network device 110C.For example, both OSW 514A and OSW 514C include a personal network code222 identifying personal network 104Z. OSW 514A further includes ESN220A identifying device 110A while OSW 514C includes ESN 220Cidentifying device 110C. Each OSW 514 carries the respective datapayload 240A, C representing changes to each respective network deviceprofiles representing the modifications to the user's personal networkprofile requested by the ISW 310. Network device 110A and 110Crespective logic will then operate on their received payload dataincluded in each of the OSW's received from the subscriber database 134.In this instance, the payload data provides device profile modificationsreflective of the updated subscriber database initiated by the ISW. Thefinal result enjoyed by the user is a mobile device enabled for voicecommunications and a portable device that is not.

A method is provided that enables a user to define, control and operatea personal network of devices within a service provider's communicationsystem. In one embodiment, this is accomplished by assembling a networkof personal communications devices incorporating transceivers that sharethe same address, customer account information, telephone number,billing information and are compatible with the service provider'scommunication system. In addition to assembling the network of personalcommunications devices, the user subscribes to one or more services madeavailable by the service provider. Furthermore, service provider'snetwork provides for a signaling protocol that allows for communicationsbetween device transceivers within the personal network and databaseunits within the service provider's network. Thus, communicationsequipment manufacturers and service providers alike can deliver multipleservices to a single user while allowing the user to utilize multipledevices at his convenience. Also provided is a process that enables theuser to utilize more than one personal network device and a mechanism toactively manage his personal network devices and network services.

In yet another embodiment, individual ones of devices hand-offdesignated services in response to a triggering event. The triggeringevent can be user initiated, proximity based or otherwise. For example,when a mobile phone detects a home based phone and an automatic hand-offindicator is present, the home phone can be configured to send an ISWenabling itself for designated services and disabling the mobile phone.In another embodiment the mobile phone can be configured to send an ISWdisabling itself for those designated services. Coordination between thetwo hand-shaking devices could occur over the personal network, over alocal short range network such as Bluetooth, or 802.11 protocol networksand the like.

Referring now to FIG. 6, a methodology implementable in software formanaging a network of devices is illustrated. Upon a triggering event oruser request, a device prepares a signaling word to implement aparticular network device management configuration, (block 610). Thesignaling word is transmitted or otherwise communicated to logicincluding the subscriber database, (block 612). On the subscriberdatabase side, the signaling word is received, (block 620).Authentication logic authenticates, decodes, or otherwise verifies thereceived signaling word as proper, (block 622). The payload is thenapplied to the appropriate data record or records identified by thesignaling word, (block 624). Responsive to success or failure to managethe personal network devices by application of the payload, a returnsignaling word is prepared, (block 626). The signaling word istransmitted or otherwise communicated to logic including the deviceswithin the personal device network, (block 628). The signaling word isreceived on the device side, (block 614). Upon receipt of the signalingword on the device side, the device can be configured to display astatus report for the effected device or selected devices in thenetwork. It can be appreciated that the methodology can be implementedas discussed above through managed network devices, other networkdevices, or through mechanisms that access the subscriber database sidevia network external devices.

In yet another embodiment, the service provider 102 is located andmaintained at the home or other place designated by a user. In thisconfiguration, the databases and associated equipment can be associateduniquely with an individual user's network or scalable up to fullservice provider for multiple users. In the individual configuration,the service provider 102 is configured to adapt to legacy equipment suchas twisted pair, other wireline telephony presently supplied to manyconsumers, cable, satellite or other communications means. Routing canbe redirected back into the legacy equipment or alternately routed overa wireless network as desired.

With reference now to FIG. 7, an embodiment illustrates distribution ofadditional services to individual devices in a personal network 704. Asillustrated, the personal network 704 includes television devices 710A,personal mail and scheduling devices 710B, audio devices 710C, andcomputer devices 710D. A record contained in distributed subscriberdatabase 734 maintains a profile including desired routing for specificincoming signals. For example, an inbound signaling word 740 includes aunique network device identifier 742 and a payload 744 configured, forexample, to create or update a record (not shown) directing incomingtelevision or other motion picture signals toward television device710A. Other signaling words route music, radio and, in certainembodiments audio tracks of associated motion picture signals towardaudio device 710C, and match other services to other devices as desiredby the subscriber. Those skilled in the art can now appreciate thatmultiple devices, for example multiple television devices, areconfigurable to receive a particular incoming signal.

While the present invention has been illustrated by the description ofembodiments thereof, and while the embodiments have been described inconsiderable detail, it is not the intention of the applicants torestrict or in any way limit the scope of the appended claims to suchdetail. Additional advantages and modifications will readily appear tothose skilled in the art. Therefore, the invention, in its broaderaspects, is not limited to the specific details, the representativeapparatus, and illustrative examples shown and described. Accordingly,departures may be made from such details without departing from thespirit or scope of the applicant's general inventive concept.

1. A network comprising: a plurality of network devices configured tohave a common address identifying the network, and an uncommon addresswithin the network where the uncommon address identifies particularnetwork devices; a computer-readable medium configured to store aprofile associated with the common address, each profile configured toinclude at least one record corresponding to at least one of theplurality of network devices, the record including the uncommon addressassociated with the at least one of the network devices; and logicconfigured to manage the network including changing the record tocorrelate services available to the network with particular networkdevices via the uncommon address.
 2. The network as set forth in claim1, where the computer-readable medium is configured to associateservices to selected network devices.
 3. The network as set forth inclaim 1, further comprising: access logic configured to control accessto the computer-readable medium configured to store profiles.
 4. Thenetwork as set forth in claim 3, where the access logic is configured toreceive data from a network device representing a change to be made tothe computer-readable medium, and selectively permit at least a portionof the data to pass to the computer-readable medium.
 5. The network asset forth in claim 3, where the access logic is configured to receivedata from other than a network device representing a change to be madeto the computer-readable medium, and selectively permit at least aportion of the data to pass to the computer-readable medium.
 6. Thenetwork as set forth in claim 1, where the common address comprises atelephone number and the uncommon address comprises an electronic serialnumber.
 7. The network as set forth in claim 1, where the common addresscomprises user account information.
 8. The network as set forth in claim1, where the profile is configured to associate a at least one networkdevice and at least one identifiably distinct network service.
 9. Thenetwork as set forth in claim 1, further comprising a network deviceincluding a plurality of common addresses identifying a plurality ofnetworks.
 10. The network as set forth in claim 1, further comprising:logic configured to provide a service to a particular network device bycomparing the records with a detectable attribute of the service.
 11. Anetwork device configured for communication with a network that includesa user managable database correlating identifiable communications toselected network devices, the network device comprising: acomputer-readable medium configured to store an uncommon addressuniquely identifying a network device on a network identifiable by acommon address; and logic configured to format a signaling wordincluding the uncommon address, and payload data representative of achange request to manage routing of subsequent communications directedgenerally to the network, to particular network devices.
 12. The networkdevice as set forth in claim 11, further comprising transceiver logicconfigured to transmit the signaling word to the network.
 13. Thenetwork device as set forth in claim 11, further comprising: a triggerconfigured to initiate the change request upon a designated occurrence.14. A method of subscriber management of a network of devicescomprising: receiving an inbound signaling word from a subscriberincluding management data corresponding to a network identifiable by acommon address and corresponding to a network device identifiable by anuncommon address; and modifying a computer-readable medium to reflectdesired services relative to the network device.
 15. The method as setforth in claim 14, further comprising: preparing the inbound signalingword including payload data representative of desired servicescorresponding to identifiable network devices; appending the commonaddress to the inbound signaling word; and transmitting the inboundsignaling word to a service provider network.
 16. The method as setforth in claim 14, where the modifying comprises: accessing a profileassociated with the common address; within the accessed profile,accessing a record associated with the uncommon address; and designatingavailability of a service to a device associated with the accessedrecord.
 17. The method as set forth in claim 14, further comprising:verifying propriety of the inbound signaling word.
 18. The method as setforth in claim 14, further comprising: receiving service data directedto the common address; determining an uncommon address identifying adevice designated to receive the service data based on attributes of theservice data; and providing the service data to the device via theuncommon address.
 19. An article of manufacture embodied in acomputer-readable medium for managing a network of identifiable devices,the article of manufacture comprising: first computer executableinstructions for causing a computer to parse an incoming signaling wordfor indicia identifying a network and indicia identifying an individualdevice within the network; and second computer executable instructionsfor causing a computer to modify a record associated with the individualdevice based on payload data in the incoming signaling word, where thepayload data is configured to alter services available to the individualdevice.
 20. The article of manufacture as set forth in claim 19, furthercomprising: third computer executable instructions for causing acomputer to generate an outbound signaling word directed to at least onedevice within the network responsive to the modification of the record.21. The article of manufacture as set forth in claim 19, furthercomprising: fourth computer executable instructions for causing acomputer to parse incoming data for a network identifying indicia and toselect a profile based on the network identifying indicia; and fifthcomputer executable instructions for causing a computer to determine atleast one device in the network designated to receive the incoming databased on content of the incoming data and records in the profile. 22.The article of manufacture as set forth in claim 21, further comprising:sixth computer executable instructions for causing a computer to providethe incoming data to the at least one device.