Systems and methods for facilitating conference calls using security keys

ABSTRACT

Systems and methods are described that facilitate a conference call between a plurality of communication devices. The method may comprise: providing a first primary communication device; providing a second primary communication device; providing a conference call controller; establishing a first control link between the first primary communication device and the conference call controller; communicating first identification data between the first primary communication device and the conference call controller via the first control link; establishing a media link between the first and second primary communication devices via the conference call controller. In certain embodiments, the first identification data corresponds to at least one participation level of the first primary communication device with respect to the media link. The method may further comprise establishing a second control link between the second primary communication device and the conference call controller; communicating second identification data between the second primary communication device and the conference call controller via the second control link; wherein the second identification data establishes a participation level of the second primary communication device with respect to the media link.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.13/619,797, entitled “Systems and Methods for Facilitating ConferenceCalls Using Security Keys,” filed Sep. 14, 2012, which is a continuationof U.S. patent application Ser. No. 12/394,164, filed Feb. 27, 2009, nowU.S. Pat. No. 8,290,135, both of which are incorporated herein byreference in their entirety.

TECHNICAL FIELD

Embodiments described herein relate generally to conference calling, andmore specifically to systems and methods for facilitating conferencecalls using security keys.

BACKGROUND

Some embodiments described herein make use of a mobile station. A mobilestation is a two-way communication device with advanced datacommunication capabilities having the capability to communicate withother computer systems, and is also referred to herein generally as amobile device. A mobile device may also include the capability for voicecommunications. Depending on the functionality provided by a mobiledevice, it may be referred to as a data messaging device, a two-waypager, a cellular telephone with data messaging capabilities, a PDA, aSmartphone, a wireless Internet appliance, or a data communicationdevice (with or without telephony capabilities). A mobile devicecommunicates with other devices through a network of transceiverstations.

Most applications for use with such mobile devices have been designed tobe stand-alone applications (that generally do not interact with otherapplications), with a centralized email server providing email, atelephony system providing voice services, an instant messenger serviceallowing short, informal chats, etc. However, it has been recognisedthat these services or tools may be enhanced and may improve efficiencyif greater interaction between such services was facilitated.

Consider a situation in which clicking on an email while at homeautomatically initiated a call from the user's enterprise PBX (PrivateBranch Exchange) to the email sender, or launched an IM (InstantMessaging) session from a problem tracking system to allow informalcommunications between a support engineer and the customer. Thisinter-working has become known as “unified communications”.

One way to implement a unified communications system within anenterprise may be through the introduction of proprietary protocols.“Glue” applications may be written to tie together the administrationAPI (Application Programming Interface) published by one company with anequivalent API from another. However, such solutions require substantialeffort to introduce inter-operability with services.

BRIEF DESCRIPTION OF THE DRAWINGS

For a better understanding of embodiments described herein, and to showmore clearly how they may be carried into effect, reference will now bemade, by way of example, to the accompanying drawings in which:

FIG. 1A is a block diagram of a network illustrating the implementationof SIP in a telephony application;

FIG. 1B is a block diagram of a mobile device in one exampleimplementation;

FIG. 2 is a block diagram of a communication subsystem component of themobile device of FIG. 1B,

FIG. 3 is a block diagram of a node of a wireless network;

FIG. 4 is a block diagram illustrating components of a communicationsystem in one example configuration;

FIG. 5 is a a flowchart illustrating steps in a method of facilitating aconference call between a plurality of communication devices inaccordance with at least one embodiment;

FIG. 6A is a schematic diagram illustrating components of a conferencecall in accordance with at least one embodiment; and

FIG. 6B is a schematic diagram illustrating components of a conferencecall in accordance with at least one embodiment, upon introduction of analternate media link to a first alternate communication device.

DETAILED DESCRIPTION

The difficulty in implementing a unified communications system within anenterprise has been recognized and a protocol created that allows theestablishment, control and release of sessions between users and serversin a generic and extensible fashion. The Session Initiation Protocol(SIP) has been designed and further enhanced through the IETF (InternetEngineering Task Force). The applicants have recognized that SIPprovides a flexible environment that can be leveraged to bring unifiedcommunications to mobile devices.

SIP is an application-layer control (signalling) protocol for creating,modifying and terminating sessions with one or more participants. Thesesessions include Internet multimedia conferences, Internet telephonecalls and multimedia distribution. Members in a session can communicatevia multicast or via a mesh of unicast relations, or a combination ofthese.

SIP as defined in RFC 2543 and superseded by RFC 3261 is the IETF'sstandard for multimedia session management. SIP is an ASCII-based,application-layer control protocol that supports user mobility. It isused to establish, maintain, modify and terminate multimedia sessionsbetween two or more end points. It is important to note that SIPprovides the control plane for these sessions. The data plane, in SIP isdescribed by Session Description Protocol (SDP). This containsinformation pertaining to the session itself (i.e. subject,time-to-live, media info). RTP is one of many (possible) transportswhich may be described by SDP (as carried in a corresponding SIPmessage). Real-time Transport Protocol in the context of SIP, would bean ‘out of band’ means for delivering audio and/or video. Note other SDPtransports could include IP, UDP, H.320 etc.

There is no requirement that the data plane and control plane follow thesame path through the IP domain.

The SIP protocol allows:

-   -   (a) The determination of the location of the target end point.        This is achieved by services such as address resolution, name        mapping and call redirection.    -   (b) The determination of target end point availability. This not        only provides an indication of whether the end point is        available, but also if a call cannot be completed because the        target end point is unavailable, SIP determines whether the        called party is already on the phone or did not answer in the        allotted number of rings.    -   (c) The determination of the media capabilities of the target        end point. By using the Session Description Protocol (SDP), SIP        can determine what common services exist between the end points.        Thus sessions are established using only the media capabilities        that can be supported by all end points.    -   (d) The establishment of a session between the originating and        target end point.    -   (e) The management of the session. This includes the addition of        new end points, the transfer of the session between end points,        and the modification of the session such as change of codec or        the addition of another data stream.    -   (f) The termination of sessions.

To aid the reader in understanding the implementation of SIP in atelephony application, reference is made to FIG. 1A. An example of anetwork, shown generally as 10, implementing a call from a VoIP phone isshown in FIG. 1A. Illustrated therein is a call originating from amobile (or portable communication) device 100, discussed in greaterdetail below, which in this instance is fulfilling the role of UserAgent Client (UAC). The call establishment signalling goes via aBack-to-Back User Agent (B2BUA) 12 and through a number of User AgentServers (UAS) 14 to the PBX 16 (and ultimately to the receiving phone18) using SIP signalling. As will be understood, alternate embodimentsmight utilize an SIP Proxy or an SIP Gateway. Once the control path isestablished and the call allowed, the voice media stream is sent via RTPto the PBX 16 directly.

FIG. 1A illustrates several different User Agent (UA) roles:

-   -   (a) User Agent Client (UAC)—a client application that initiates        the SIP request. Typical clients are soft-phones (PCs that have        phone applications) and VoIP based phones such as the        BLACKBERRY™ 7270, manufactured by Research in Motion. However,        any initiator of a SIP call is a UAC, including network elements        such as the B2BUA. Gateways to non-SIP based systems can also        act as UACs. A gateway may, for example, map a VoIP based call        onto a traditional circuit-switched PBX.    -   (b) User Agent Server (UAS)—a server application that contacts        the registered user when a SIP request is received and returns a        response on behalf of the user. A server may be a proxy, which        receives SIP messages and forward them to the next SIP server in        the network. Proxy servers can provide functions such as        authentication, authorization, network access control, routing,        reliable request retransmission, and security. Alternatively a        SIP server may act as a redirector, which provides the client        with information about the next hop or hops that a message        should take and then the client contacts the next hop server or        UAS directly. A server also may act as a registrar server, which        processes requests from UACs for registration of their current        location.    -   (c) Back-to-Back User Agent (B2BUA)—a pair of user agents, one a        server and the other a client, that terminates a SIP session on        one side and maps through any requests to a second SIP session        on the other side. A B2BUA provides a way to insert custom        control into a SIP session between two end points. A B2BUA can        act as a gateway into an enterprise domain where security needs        require that all SIP sessions are controlled by a local server.

During any one SIP session, a UA will function either as a UAC or a UASbut not as both simultaneously. SIP provides a means to establish,control and terminate one or more multimedia sessions. However, SIPitself is not an application but a platform on which applications can bebuilt. A SIP application may provide simple voice calling functionalityin a low-end (minimally featured) softphone, or large and complexfunctionality such as for an elearning application that would involvethe transmission of voice, video and slides to a multi-participantconference.

Embodiments described herein are generally directed to systems andmethods that provide users of a communication device, facility inproviding participation levels on a conference call. In particularembodiments, participants in a conference call may be provided withdiffering participation levels.

In a broad aspect, there is provided a method of facilitating aconference call between a plurality of communication devices, the methodcomprising: providing a first primary communication device; providing asecond primary communication device; providing a conference callcontroller; establishing a first control link between the first primarycommunication device and the conference call controller; communicatingfirst identification data between the first primary communication deviceand the conference call controller via the first control link;establishing a media link between the first and second primarycommunication devices via the conference call controller. In certainembodiments, the first identification data corresponds to at least oneparticipation level of the first primary communication device withrespect to the media link.

The method may further comprise establishing a second control linkbetween the second primary communication device and the conference callcontroller; communicating second identification data between the secondprimary communication device and the conference call controller via thesecond control link; wherein the second identification data establishesa participation level of the second primary communication device withrespect to the media link.

In certain embodiments, the first identification data comprises at leastone security key (and in some instances a plurality of security keys).The first identification data may comprise a first security keycorresponding to a first participation level and a second security keycorresponding to a second participation level and wherein the firstparticipation level differs from the second participation level. Theparticipation levels may permit (or conversely restrict) listeningand/or speaking.

Further, in some implementations, the identification data may becommunicated from the first primary communication device to theconference call controller.

In some embodiments, the first media link may comprise a voice signaland/or a multimedia signal.

A computer-readable medium may also be provided which may compriseinstructions executable on the conference call controller forimplementing steps of the method(s). In some further embodiments, asystem may be provided for facilitating a conference call between aplurality of communication devices, the system comprising the conferencecall controller on which an application executes, wherein theapplication is programmed to perform steps of the method(s).

In another aspect, a system is provided for facilitating a conferencecall between a plurality of communication devices. The system maycomprise a conference call controller. The conference call controllermay be configured to establish a first control link with a first primarycommunication device. The conference call controller may also beconfigured to establish a media link between the first primarycommunication device and at least one (and in some instances a pluralityof) second primary communication device(s). The conference callcontroller and the first primary communication device are configured tocommunicate first identification data via the first control link. Theconference call controller may further be configured to establish amedia link between the first and second primary communication devicesvia the conference call controller. The first identification data maycorrespond to at least one participation level of the first primarycommunication device with respect to the media link.

In some further embodiments, the conference call controller may beconfigured to establish a second control link with the second primarycommunication device. The conference call controller and the secondprimary communication device are configured to communicate secondidentification data via the second control link. Furthermore, the secondidentification data establishes a participation level of the secondprimary communication device with respect to the media link.

In certain embodiments, the first identification data comprises at leastone security key (and in some instances a plurality of security keys).The first identification data may comprise a first security keycorresponding to a first participation level and a second security keycorresponding to a second participation level and wherein the firstparticipation level differs from the second participation level. Theparticipation levels may permit (or conversely restrict) listeningand/or speaking.

Further, in some implementations, the identification data may becommunicated from the first primary communication device to theconference call controller.

In some embodiments, the first media link may comprise a voice signaland/or a multimedia signal.

The conference call controller may be operatively coupled to atelecommunications network.

The first (and in some instances the second) primary communicationdevice(s) may comprise a portable communication device.

The media link may comprise a voice signal. In addition or in thealternative, the media link may comprise a multimedia signal. As well,the media link may comprise a telecommunications link.

These and other aspects and features of various embodiments will bedescribed in greater detail below.

To aid the reader in understanding the structure of a mobile device andhow it communicates with other devices, reference is made to FIGS. 1Bthrough 3.

Referring first to FIG. 1B, a block diagram of a mobile device in oneexample implementation is shown generally as 100. Mobile device 100comprises a number of components, the controlling component beingmicroprocessor 102. Microprocessor 102 controls the overall operation ofmobile device 100. Communication functions, including data and voicecommunications, are performed through communication subsystem 104.Communication subsystem 104 receives messages from and sends messages toa wireless network 200. In this example implementation of mobile device100, communication subsystem 104 is configured in accordance with theGlobal System for Mobile Communication (GSM) and General Packet RadioServices (GPRS) standards. The GSM/GPRS wireless network is usedworldwide and it is expected that these standards will be supersededeventually by Enhanced Data GSM Environment (EDGE) and Universal MobileTelecommunications Service (UMTS). New standards are still beingdefined, but it is believed that they will have similarities to thenetwork behaviour described herein, and it will also be understood bypersons skilled in the art that the invention is intended to use anyother suitable standards that are developed in the future. The wirelesslink connecting communication subsystem 104 with network 200 representsone or more different Radio Frequency (RF) channels, operating accordingto defined protocols specified for GSM/GPRS communications. With newernetwork protocols, these channels are capable of supporting both circuitswitched voice communications and packet switched data communications.

Although the wireless network associated with mobile device 100 is aGSM/GPRS wireless network in one example implementation of mobile device100, other wireless networks may also be associated with mobile device100 in variant implementations. Different types of wireless networksthat may be employed include, for example, data-centric wirelessnetworks, voice-centric wireless networks, and dual-mode networks thatcan support both voice and data communications over the same physicalbase stations. Combined dual-mode networks include, but are not limitedto, Code Division Multiple Access (CDMA) or CDMA2000 networks, GSM/GPRSnetworks (as mentioned above), and future third-generation (3G) networkslike EDGE and UMTS. Some older examples of data-centric networks includethe Mobitex™ Radio Network and the DataTAC™ Radio Network. Examples ofolder voice-centric data networks include Personal Communication Systems(PCS) networks like GSM and Time Division Multiple Access (TDMA)systems.

Microprocessor 102 also interacts with additional subsystems such as aRandom Access Memory (RAM) 106, flash memory 108, display 110, auxiliaryinput/output (I/O) subsystem 112, serial port 114, keyboard 116, speaker118, microphone 120, short-range communications 122 and other devicesubsystems 124.

Some of the subsystems of mobile device 100 performcommunication-related functions, whereas other subsystems may provide“resident” or on-device functions. By way of example, display 110 andkeyboard 116 may be used for both communication-related functions, suchas entering a text message for transmission over network 200, anddevice-resident functions such as a calculator or task list. Operatingsystem software used by microprocessor 102 is typically stored in apersistent store such as flash memory 108, which may alternatively be aread-only memory (ROM) or similar storage element (not shown). Thoseskilled in the art will appreciate that the operating system, specificdevice applications, or parts thereof, may be temporarily loaded into avolatile store such as RAM 106.

Mobile device 100 may send and receive communication signals overnetwork 200 after required network registration or activation procedureshave been completed. Network access is associated with a subscriber oruser of a mobile device 100. To identify a subscriber, mobile device 100requires a Subscriber Identity Module or “SIM” card 126 to be insertedin a SIM interface 128 in order to communicate with a network. SIM 126is one type of a conventional “smart card” used to identify a subscriberof mobile device 100 and to personalize the mobile device 100, amongother things. Alternatively, by way of example only, other types of“smart cards” which might be used may include an R-UIM (removable useridentity module) or a CSIM (CDMA (code division multiple access)subscriber identity module) or a USIM (universal subscriber identitymodule) card. Without SIM 126, mobile device 100 is not fullyoperational for communication with network 200. By inserting SIM 126into SIM interface 128, a subscriber can access all subscribed services.Services could include: web browsing and messaging such as e-mail, voicemail, Short Message Service (SMS), and Multimedia Messaging Services(MMS). More advanced services may include: point of sale, field serviceand sales force automation. SIM 126 includes a processor and memory forstoring information. Once SIM 126 is inserted in SIM interface 128, itis coupled to microprocessor 102. In order to identify the subscriber,SIM 126 contains some user parameters such as an International MobileSubscriber Identity (IMSI). An advantage of using SIM 126 is that asubscriber is not necessarily bound by any single physical mobiledevice. SIM 126 may store additional subscriber information for a mobiledevice as well, including datebook (or calendar) information and recentcall information.

Mobile device 100 is a battery-powered device and includes a batteryinterface 132 for receiving one or more rechargeable batteries 130.Battery interface 132 is coupled to a regulator (not shown), whichassists battery 130 in providing power V+ to mobile device 100. Althoughcurrent technology makes use of a battery, future technologies such asmicro fuel cells may provide the power to mobile device 100.

Microprocessor 102, in addition to its operating system functions,enables execution of software applications on mobile device 100. A setof applications that control basic device operations, including data andvoice communication applications, will normally be installed on mobiledevice 100 during its manufacture. Another application that may beloaded onto mobile device 100 would be a personal information manager(PIM). A PIM has functionality to organize and manage data items ofinterest to a subscriber, such as, but not limited to, e-mail, calendarevents, voice mails, appointments, and task items. A PIM application hasthe ability to send and receive data items via wireless network 200. PIMdata items may be seamlessly integrated, synchronized, and updated viawireless network 200 with the mobile device subscriber's correspondingdata items stored and/or associated with a host computer system. Thisfunctionality creates a mirrored host computer on mobile device 100 withrespect to such items. This can be particularly advantageous where thehost computer system is the mobile device subscriber's office computersystem.

Additional applications may also be loaded onto mobile device 100through network 200, auxiliary I/O subsystem 112, serial port 114,short-range communications subsystem 122, or any other suitablesubsystem 124. This flexibility in application installation increasesthe functionality of mobile device 100 and may provide enhancedon-device functions, communication-related functions, or both. Forexample, secure communication applications may enable electroniccommerce functions and other such financial transactions to be performedusing mobile device 100.

Serial port 114 enables a subscriber to set preferences through anexternal device or software application and extends the capabilities ofmobile device 100 by providing for information or software downloads tomobile device 100 other than through a wireless communication network.The alternate download path may, for example, be used to load anencryption key onto mobile device 100 through a direct and thus reliableand trusted connection to provide secure device communication.

Short-range communications subsystem 122 provides for communicationbetween mobile device 100 and different systems or devices, without theuse of network 200. For example, subsystem 122 may include an infrareddevice and associated circuits and components for short-rangecommunication. Examples of short range communication would includestandards developed by the Infrared Data Association (IrDA), Bluetooth,and the 802.11 family of standards developed by IEEE.

In use, a received signal such as a text message, an e-mail message, orweb page download will be processed by communication subsystem 104 andinput to microprocessor 102. Microprocessor 102 will then process thereceived signal for output to display 110 or alternatively to auxiliaryI/O subsystem 112. A subscriber may also compose data items, such ase-mail messages, for example, using keyboard 116 in conjunction withdisplay 110 and possibly auxiliary I/O subsystem 112. Auxiliarysubsystem 112 may include devices such as: a touch screen, mouse, trackball, infrared fingerprint detector, or a roller wheel with dynamicbutton pressing capability. Keyboard 116 is an alphanumeric keyboardand/or telephone-type keypad. A composed item may be transmitted overnetwork 200 through communication subsystem 104.

For voice communications, the overall operation of mobile device 100 issubstantially similar, except that the received signals would be outputto speaker 118, and signals for transmission would be generated bymicrophone 120. Alternative voice or audio I/O subsystems, such as avoice message recording subsystem, may also be implemented on mobiledevice 100. Although voice or audio signal output is accomplishedprimarily through speaker 118, display 110 may also be used to provideadditional information such as the identity of a calling party, durationof a voice call, or other voice call related information.

Referring now to FIG. 2, a block diagram of the communication subsystemcomponent 104 of FIG. 1 is shown. Communication subsystem 104 comprisesa receiver 150, a transmitter 152, one or more embedded or internalantenna elements 154, 156, Local Oscillators (LOs) 158, and a processingmodule such as a Digital Signal Processor (DSP) 160.

The particular design of communication subsystem 104 is dependent uponthe network 200 in which mobile device 100 is intended to operate, thusit should be understood that the design illustrated in FIG. 2 servesonly as one example. Signals received by antenna 154 through network 200are input to receiver 150, which may perform such common receiverfunctions as signal amplification, frequency down conversion, filtering,channel selection, and analog-to-digital (ND) conversion. ND conversionof a received signal allows more complex communication functions such asdemodulation and decoding to be performed in DSP 160. In a similarmanner, signals to be transmitted are processed, including modulationand encoding, by DSP 160. These DSP-processed signals are input totransmitter 152 for digital-to-analog (D/A) conversion, frequency upconversion, filtering, amplification and transmission over network 200via antenna 156. DSP 160 not only processes communication signals, butalso provides for receiver and transmitter control. For example, thegains applied to communication signals in receiver 150 and transmitter152 may be adaptively controlled through automatic gain controlalgorithms implemented in DSP 160.

The wireless link between mobile device 100 and a network 200 maycontain one or more different channels, typically different RF channels,and associated protocols used between mobile device 100 and network 200.An RF channel is a limited resource that must be conserved, typicallydue to limits in overall bandwidth and limited battery power of mobiledevice 100.

When mobile device 100 is fully operational, transmitter 152 istypically keyed or turned on only when it is sending to network 200 andis otherwise turned off to conserve resources. Similarly, receiver 150is periodically turned off to conserve power until it is needed toreceive signals or information (if at all) during designated timeperiods.

Referring now to FIG. 3, a block diagram of a node of a wireless networkis shown as 202. In practice, network 200 comprises one or more nodes202. Mobile device 100 communicates with a node 202 within wirelessnetwork 200. In the example implementation of FIG. 3, node 202 isconfigured in accordance with General Packet Radio Service (GPRS) andGlobal Systems for Mobile (GSM) technologies. Node 202 includes a basestation controller (BSC) 204 with an associated tower station 206, aPacket Control Unit (PCU) 208 added for GPRS support in GSM, a MobileSwitching Center (MSC) 210, a Home Location Register (HLR) 212, aVisitor Location Registry (VLR) 214, a Serving GPRS Support Node (SGSN)216, a Gateway GPRS Support Node (GGSN) 218, and a Dynamic HostConfiguration Protocol (DHCP) 220. This list of components is not meantto be an exhaustive list of the components of every node 202 within aGSM/GPRS network, but rather a list of components that are commonly usedin communications through network 200.

In a GSM network, MSC 210 is coupled to BSC 204 and to a landlinenetwork, such as a Public Switched Telephone Network (PSTN) 222 tosatisfy circuit switched requirements. The connection through PCU 208,SGSN 216 and GGSN 218 to the public or private network (Internet) 224(also referred to herein generally as a shared network infrastructure)represents the data path for GPRS capable mobile devices. In a GSMnetwork extended with GPRS capabilities, BSC 204 also contains a PacketControl Unit (PCU) 208 that connects to SGSN 216 to controlsegmentation, radio channel allocation and to satisfy packet switchedrequirements. To track mobile device location and availability for bothcircuit switched and packet switched management, HLR 212 is sharedbetween MSC 210 and SGSN 216. Access to VLR 214 is controlled by MSC210.

Station 206 is a fixed transceiver station. Station 206 and BSC 204together form the fixed transceiver equipment. The fixed transceiverequipment provides wireless network coverage for a particular coveragearea commonly referred to as a “cell”. The fixed transceiver equipmenttransmits communication signals to and receives communication signalsfrom mobile devices within its cell via station 206. The fixedtransceiver equipment normally performs such functions as modulation andpossibly encoding and/or encryption of signals to be transmitted to themobile device in accordance with particular, usually predetermined,communication protocols and parameters, under control of its controller.The fixed transceiver equipment similarly demodulates and possiblydecodes and decrypts, if necessary, any communication signals receivedfrom mobile device 100 within its cell. Communication protocols andparameters may vary between different nodes. For example, one node mayemploy a different modulation scheme and operate at differentfrequencies than other nodes.

For all mobile devices 100 registered with a specific network, permanentconfiguration data such as a user profile is stored in HLR 212. HLR 212also contains location information for each registered mobile device andcan be queried to determine the current location of a mobile device. MSC210 is responsible for a group of location areas and stores the data ofthe mobile devices currently in its area of responsibility in VLR 214.Further VLR 214 also contains information on mobile devices that arevisiting other networks. The information in VLR 214 includes part of thepermanent mobile device data transmitted from HLR 212 to VLR 214 forfaster access. By moving additional information from a remote HLR 212node to VLR 214, the amount of traffic between these nodes can bereduced so that voice and data services can be provided with fasterresponse times and at the same time requiring less use of computingresources.

SGSN 216 and GGSN 218 are elements added for GPRS support; namely packetswitched data support, within GSM. SGSN 216 and MSC 210 have similarresponsibilities within wireless network 200 by keeping track of thelocation of each mobile device 100. SGSN 216 also performs securityfunctions and access control for data traffic on network 200. GGSN 218provides networking connections with external packet switched networksand connects to one or more SGSNs 216 via an Internet Protocol (IP)backbone network operated within the network 200. During normaloperations, a given mobile device 100 must perform a “GPRS Attach” toacquire an IP address and to access data services. This requirement isnot present in circuit switched voice channels as Integrated ServicesDigital Network (ISDN) addresses are used for routing incoming andoutgoing calls. Currently, all GPRS capable networks use private,dynamically assigned IP addresses, thus requiring a DHCP server 220connected to the GGSN 218. There are many mechanisms for dynamic IPassignment, including using a combination of a Remote AuthenticationDial-In User Service (RADIUS) server and DHCP server. Once the GPRSAttach is complete, a logical connection is established from a mobiledevice 100, through PCU 208, and SGSN 216 to an Access Point Node (APN)within GGSN 218. The APN represents a logical end of an IP tunnel thatcan either access direct Internet compatible services or private networkconnections. The APN also represents a security mechanism for network200, insofar as each mobile device 1 00 must be assigned to one or moreAPNs and mobile devices 100 cannot exchange data without firstperforming a GPRS Attach to an APN that it has been authorized to use.The APN may be considered to be similar to an Internet domain name suchas “myconnection.wireless.com”.

Once the GPRS Attach is complete, a tunnel is created and all traffic isexchanged within standard IP packets using any protocol that can besupported in IP packets. This includes tunneling methods such as IP overIP as in the case with some IPSecurity (IPsec) connections used withVirtual Private Networks (VPN). These tunnels are also referred to asPacket Data Protocol (PDP) Contexts and there are a limited number ofthese available in the network 200. To maximize use of the PDP Contexts,network 200 will run an idle timer for each PDP Context to determine ifthere is a lack of activity. When a mobile device 100 is not using itsPDP Context, the PDP Context can be deallocated and the IP addressreturned to the IP address pool managed by DHCP server 220.

Referring now to FIG. 4, a block diagram is shown illustratingcomponents of a communication system, shown generally as 400, in oneexample configuration. Host system 400 will typically incorporate acorporate office or other local area network (LAN) shown generally as410, but may instead be a home office computer or some other privatesystem, for example, in variant implementations. In the example shown inFIG. 4, communication system 400 incorporates a LAN 410 of anorganization to which a user of a mobile device 100 (with exampleembodiments illustrated as 100A, 100B, 100C) belongs.

As illustrated in FIG. 4, some embodiments of the mobile device 100Aoperate on a cellular network 402 (WAN, “wide area network”), whileother embodiments 100C may operate on the 802.11 WiFi network 404 only(WLAN, “wireless local area network”). Such devices 100C which operateonly on a WLAN 404, may be provided with SIP-based Voice over IP (VoIP)functionality to facilitate external calling. Some embodiments of themobile device 100B may be dual mode and may be configured to operateboth on the cellular network 402 and on the WLAN. The mobile devices100A, 100B, 100C are typically configured to utilize SIP. Preferably,the mobile device 100A, 100B, 100C SIP stack will be configured tocommunicate over both UDP and GME transport simultaneously.

To support multiple SIP applications on a mobile device 100A, 100B, 100Ca SIP UA API (SIP User Agent Application Programming Interface) ispreferably introduced. This API abstracts the applications from the SIPimplementation, thus removing the need for the application programmer toknow about the details of the protocol.

The SIP UA API will provide methods to construct, control and deletedialogs, a dialog being a single session between the device and someendpoint. For example, in a VoIP call a dialog is a call leg between thedevice and the PBX. A dialog may have none, one or multiple mediastreams associated. For example, a video/audio call will have twobidirectional media streams.

In addition the SIP AU API provides means to register, reregister andderegister SIP applications from the associated registrar server. Thiswill be implemented in such a way to abstract the details of theregistration from the application, so the application is unable tomodify the registration parameters or the registrar information.

Finally the SIP UA API will provide a set of methods to allowapplications a way to subscribe for events from a remote server and tonotify a remote server of local application events.

The connectivity of certain embodiments of the mobile devices 100A,100B, 100C are also illustrated in FIG. 4. As can be seen, the WANmobile device 100A is connected through the relay 416 to the enterpriseexternal firewall 414 and on to the Mobile Enterprise Server (MES) 418.The WLAN mobile device 100C sends and receives data by connecting overthe Enterprise WLAN to the MES 418 bypassing the Relay 416. SIP based IPTelephony is provided via a direct UDP connection to the SIP server andsimilarly RTP between the end points. The dual mode mobile device 100Bmay utilize connections available to the other types of mobile devices100A, 100C.

A Service Delivery Platform (SDP) 412 is located within the enterpriseLAN 410 behind the corporate firewall 414. A SIP enabled mobile device100A, 100B, 100C communicates with the SDP 412 usually over the GMEconnection either through the Relay 416 or directly with the MobileEnterprise Server (MES) 418 if operating in serial bypass mode (e.g.WLAN Enterprise Data). On the other side of the firewall 414, the SDP412 communicates with existing enterprise servers.

The SDP 412 typically will be involved in the control flow. The mediaflow, the RTP session in the embodiment illustrated in FIG. 4, routesdirectly to the PBXs, 418D, 418E from the mobile device 100B, 100C.

The SDP 412 is designed to be a platform upon which any number ofapplications may be executed. The control towards the device 100A, 100B,100C will typically utilize a custom or enterprise-specific SIP (ESSIP),but the SDP 412 may utilize different protocols in communicating withother servers. This is illustrated in FIG. 4, where five exampleapplications on the SDP 412, namely Instant Messaging (IM) 430, Presence432, Conference 434, VoIP (voice over internet protocol) 436, and FixedMobile Convergence 438 use a variety of third-party protocols incommunication with the gateway and PBX servers 418A, 418B, 418C, 418Dproviding the application functionality.

The MES 418 may comprise various software and/or hardware elements foradministering certain communication functionality of the mobile devices100A, 100B, 100C. For example, the MES 418 may comprise anadministration server 442, a mobile data server 444, a message server268 (discussed in greater detail below), a database 419, a securitymodule 446 which may be configured to encrypt and decrypt data and/ormessages, an IM server 452 and a media server 454.

LAN 410 may comprise a number of network components connected to eachother by LAN connections. For instance, one or more users' desktopcomputers (not shown), each of which may comprise a cradle, may besituated on LAN 410. Cradles for mobile device 100A, 100B, 100C may becoupled to a desktop computer by a serial or a Universal Serial Bus(USB) connection, for example. Such cradles may facilitate the loadingof information (e.g. PIM data, private symmetric encryption keys tofacilitate secure communications between mobile device 100A, 100B, 100Cand LAN 410) from a desktop computer to mobile device 100A, 100B, 100C,and may be particularly useful for bulk information updates oftenperformed in initializing mobile device 100A, 100B, 100C for use. Theinformation downloaded to mobile device 100A, 100B, 100C may includecertificates used in the exchange of messages. It will be understood bypersons skilled in the art that user computers may also be connected toother peripheral devices not explicitly shown in FIG. 4.

Furthermore, only a subset of network components of LAN 410 are shown inFIG. 4 for ease of exposition, and it will be understood by personsskilled in the art that LAN 410 will comprise additional components notexplicitly shown in FIG. 4, for this example configuration. Moregenerally, LAN 410 may represent a smaller part of a larger network [notshown] of the organization, and may comprise different components and/orbe arranged in different topologies than that shown in the example ofFIG. 4.

In one example implementation, LAN 410 may comprise a wireless VPNrouter [not shown] to facilitate data exchange between the LAN 410 andmobile device 100B, 100C. A wireless VPN router may permit a VPNconnection to be established directly through a specific wirelessnetwork to mobile device 100A, 100B, 100C. With the implementation ofInternet Protocol (IP) Version 6 (IPV6) into IP-based wireless networks,enough IP addresses will be available to dedicate an IP address to everymobile device 100B, 100C, making it possible to push information to amobile device 100B, 100C at any time. An advantage of using a wirelessVPN router is that it could be an off-the-shelf VPN component, notrequiring a separate wireless gateway and separate wirelessinfrastructure to be used. A VPN connection might utilize TransmissionControl Protocol (TCP)/IP or User Datagram Protocol (UDP)/IP connectionto deliver the messages directly to mobile device 100A, 100B, 100C insuch implementation.

The communication system 400 shall preferably comprise the VoIPapplication 436 which is configured to utilize SIP to provide VoIPfunctionality. The SDP 412 is configured to route VoIP ESSIP requestsfrom the mobile device 100B, 100C to the VOIP application 436, therebyenabling IP calling from a mobile device 100B, 100C connected on theWLAN to an existing SIP enabled gateway or PBX server 418A, 418B, 418C,418D, 418E. For example, VoIP functionality may include basic callingfeatures such as make and take a VoIP call, hold and resume, transfer(attended and semi attended), ad-hoc conferencing, among others.

The VoIP telephony functionality in some embodiments may be limited tothose devices (such as, for example, devices 100B, 100C) that areconnected to the WLAN. The use of VPN may allow devices 100B, 100C thatare outside the enterprise to access enterprise VoIP services in asecure fashion.

The inventors have recognized the non-uniform way each third-partymanufacturer's PBX (or other gateway server) 418A, 418B, 418C, 418D,418E uses SIP. Typically, each such gateway 418A, 418B, 418C, 418D, 418Euses its own version of SIP call flow to establish, control and releasecalls. As a result, the SIP call flow between the endpoint (typically acommunication device, such as for example, mobile device 100A, 100B,100C) and the PBX (or gateway) 418A, 418B, 418C, 418D, 418E needs to becustomized for that particular PBX (or gateway) 418A, 418B, 418C, 418D,418E.

The VoIP application 436 incorporates a customized Back-to-Back UserAgent (B2BUA) (not shown) in the Service Delivery Platform 412, therebypositioned between the mobile device 100B, 100C and the gateway 418A,418B, 418C, 418D, 418E. The B2BUA abstracts the details of the PBX callflows, registration, call control and configuration from the mobiledevice 100B, 100C. The B2BUA implements a defined set of ESSIP callflows to the mobile device 100B, 100C that can support a basic set oftelephony procedures. The B2BUA also satisfies the SIP call flows thatare specific to the gateway 418A, 418B, 418C, 418D, 418E for the sameset of telephony procedures.

As each manufacturer's gateway server 418A, 418B, 418C, 418D, 418Etypically requires a different set of call flows for the same feature,the B2BUA encapsulates the gateway 418A, 418B, 418C, 418D, 418Especifics for the basic calling feature set into a PBX Abstraction Layer(PAL), each gateway 418A, 418B, 418C, 418D, 418E having its own specificPAL.

In addition, if necessary the B2BUA can support other PBX-specificfeature extensions, which may be made available to communication devicescoupled to the network 410, such as the mobile devices 100B, 100C. Theseextensions are handled through a PBX Extension Layer (PEL) in the B2BUA,which, like the PAL, abstracts the complexities of each PBX 418A, 418B,418C, 4180, 418E for a given extension feature set. However, as theextension feature sets between different PBX 418A, 418B, 418C, 4180,418E will not be the same, it may not be possible to develop a commonuser interface (UI). Accordingly, a plug-in application may bedownloaded to the communication devices coupled to the network 410, suchas the mobile devices 100B, 100C, to extend the UI and to provide thecommunication device the necessary SIP Application information on how tohandle new features. This plug-in is the Menu and Signalling ExtensionPlug-in (MSP). As will be understood, the PAL, PEL and MSP are all partof Extensible Signalling Framework (ESF).

With respect to the instant messaging services, the MES 418 may comprisean XMPP2SIMPLE (Extensible Messaging and Presence Protocol to SIPInstant Messaging and Presence Leveraging Extensions) SIP application toenable integration of SIP with an IM session. For example, a voice callmay be established over VoIP or over a traditional circuit switchedmedium directly from an IM session screen. The voice connection may berequested by either party in the IM session.

As well as voice, the XMPP2SIMPLE application may also interface SIMPLE(SIP Instant Messaging and Presence Leveraging Extensions) based IMsystems to the IM internal architecture of the mobile devices 100A,100B, 100C.

The MES 418 may use an XMPP (Extensible Messaging and Presence Protocol)based API (Application Programming Interface) over an IPe (IP endpoint)secured socket provided by the XMPP2SIMPLE Application to request thatSIP functions be accessed. This API may provide any user identificationsthat are required and routing information to the VoIP gateway. Thegateway might be the VoIP PBX 418D or it might be a VoIP enabled server.The SDP 412 establishes a SIP session to the device 100A, 100B, 100C anda second to the gateway (such as the PBX 418D). The RTP media flow isrouted directly to the VoIP gateway (such as the PBX 418D).

Consider a situation in which an IM session is in process between afirst mobile device eg. 100B, and a second mobile device 100C. Thesession may use the enterprise-specific IM protocol between the devices100B, 100C and an IM Proxy Server in the MES 418, and the third-party IMprotocol between the IM Proxy Server and the IM server (eg. IM PBX418A).

At some point in time, either device 100B, 100C, may request that thesession be converted into a voice connection. The MES IM Server 452requests over the XMPP based API that XMPP2SIMPLE set up an SIP basedcall. For each mobile device 100B, 100C, the XMPP2SIMPLE acts as aB2BUA, setting up one SIP session with the mobile device 100B, 100Cusing the ESSIP flows, and a second session with the IM Server 418Ausing the IM Server 418A specific SIP. These connections are thenmanipulated to connect the RTP media flow between the two mobile devices100B, 100C. Communication may also be established between mobile devices100A, 100B, 100C and other networked devices, such as, for example,computer 450 (which may be equipped to provide voice communication, forexample using VoIP) and electronic “whiteboard” 456 (via the internet224), and telephones 18 (via the PSTN).

Alternatively, a call may be established over circuit switched media.For example, an IM session running on a WAN mobile device 100A mayrequest the establishment of a voice connection. In this case the MES IMServer 452 could request directly to the Fixed Mobile PBX 418E for acircuit switched call, or through the SDP 412 which would establish twocircuit switched call legs, one to each party, via the PBX 418E.

The communication system 400 may also provide for certain applicationsto interact directly with other application services, e.g. applicationsthat provide media streaming capabilities such as e-learning orMP3/video playback, downloading and sharing. Consider a scenario inwhich an enterprise-wide announcement is to be made. Here theannouncement is stored in a MES service which proceeds to call out toall enterprise mobile devices 100A, 100B, 100C.

These services may require a multimedia session to be establishedbetween a server and the ESSIP enabled devices 100A, 100B, 100C. Inaddition there are a number of other servers such as LightweightDirectory Access Protocol (LDAP) servers, location servers, a databaseapplication, or an extensible markup language (XML) application. Theseapplication services provide back-end services such as directory,authentication, and billing services.

In this case the MES media application or server 454 might again beconfigured to use an API to set up the multimedia session or to obtaininformation from the SDP 412. The SDP 412 acts as a UAS, controlling thesession and setting the RTP or similar stream directly to the MES MediaServer 454. Once the multimedia streaming session has finished, the MESMedia Server 454 terminates the SIP session via an API call.

The communication system 400 may also be configured with a voicemobility module 460 (such as the Voice Mobility Management systemdistributed by Ascendent Systems) which may comprise software andhardware to offer voice mobility anchored at the network between WLAN404 and cellular 402 networks. The system 400 may offer enhancementssuch as single number in and out of the enterprise, conferencing, singlevoice mailbox, etc.

The voice mobility module 460 may use the SIP server through a CSTA(Computer Supported Telecommunication Applications) interface thatallows first party call control. The interface between the SOP 412 andthe PBX 4180, 418E may be SIP Trunk.

In this environment, the voice mobility module 460 controls the mediaflow passing over the RTP session.

The SDP 412 may interface to the MES 418 for signalling to the device100A, 100B, 100C and database support, and to the application serverssuch as the gateway or PBX servers 418A, 418B, 418C, 418D, 418E forapplication support. This section shall describe in more detail howthose interfaces are to be managed.

The SDP 412 may interface to the MES 418 through an ESSIP Connector, aservice that communicates directly with a Dispatcher. The ESSIPConnector terminates the GME protocol and is responsible for pushing theSIP signals to an SIP Server (not shown) over a TLS secured socket. Thisarrangement requires that a new content type be created for SIP, andallows a new ESSIP service book to be pushed to a mobile device 100A,100B, 100C.

On the other side of the SIP/TLS link, the SDP 412 may also comprise aUnified Communications (UC) Server (not shown). The UC Server executesthe SIP applications and communicates to the gateway and PBX servers418A, 418B, 418C, 418D, 418E, MES IM Server 452, IM server 418A, andvoice mobility module 460, etc.

Any number of ESSI P Connectors may support access to a single UCServer, the exact number being limited by the configuration of thecomponents over hardware platforms. All configurations using a single UCServer must be connected to the same mobile device database domain.

Both the ESSIP Connector and the UC Server may read data forconfiguration from the database 419 via an SDP MES Management Serverusing a web services interface. This component also offers the SDPadministration UI.

The UC Server stores information on the MES database 419, which is usedat reset to configure the UC Services and users. The following items maybe included in the basic server configuration: Sip Realm; Sip DomainName; Sip Server Address; Sip Server Port; Sip Server Transport; ProxyServer Address; Proxy Server Port; and Proxy Server Transport.

The following items may also be included as part of the database 419 peruser: Sip User Display Name; Sip User ID; Sip User Password; Sip Realm;Sip Registration Timeout; Sip Local Port; Sip RTP Media Port; Sip DomainName; Sip Server Type; Sip Server Address; Sip Server Port; Sip ServerTransport; Emergency Number; Sip Secondary Server Type; Sip SecondaryServer Address; Sip Secondary Server Port; and Sip Secondary ServerTransport.

The UC Server may also require notification from the database 419 whenan administrator adds a user into the system 400 so that it can updatethe internal table without scanning the whole database 419.

The SDP Management Server (SDP MS) (not shown) may abstract the MESdatabase 419 from the SDP 412 components and provides a user interfacefor administration purposes. The ESSIP Connector and the UC Server willboth obtain configuration through the SDP BMS. As the users of UCServices will also be the general MES users, then those configurationitems that are specific to each user will require additions to existinguser records.

The communications network 400 is preferably also provided with aconference call controller module 440 configured to facilitate andcontrol conference calls between 2 or more parties. As will be discussedin greater detail, below, the controller module 440 may comprise anapplication or other programming and is configured to coordinate theconference call functionality and to facilitate the exchange of voiceand other media between conference call participants. The controllermodule 440 may comprise conference application 440 a and conferenceservices modules 400 b and may reside in or otherwise form part of theSDP 412.

Messages intended for a user of mobile device 100 are initially receivedby a message server 268 of LAN 410, which may form part of the MES 418.Such messages may originate from any of a number of sources. Forinstance, a message may have been sent by a sender from a computer 450within LAN 410, from a different mobile device [not shown] connected towireless network 200 (or 404) or to a different wireless network, orfrom a different computing device (such as computer 450) or other devicecapable of sending messages, via the shared network infrastructure 224,and possibly through an application service provider (ASP) or Internetservice provider (ISP), for example.

Message server 268 typically acts as the primary interface for theexchange of messages, particularly e-mail messages, within theorganization and over the shared network infrastructure 224. Each userin the organization that has been set up to send and receive messages istypically associated with a user account managed by message server 268.One example of a message server 268 is a Microsoft Exchange™ Server. Insome implementations, LAN 410 may comprise multiple message servers 268.Message server 268 may also be adapted to provide additional functionsbeyond message management, including the management of data associatedwith calendars and task lists, for example.

Referring now to FIG. 5, a flowchart illustrating steps in a method offacilitating a conference call between a plurality of communicationdevices in accordance with at least one embodiment is shown generally as500. Additional details of some of the features described below inrespect of the method 500 may be described elsewhere in the presentspecification. Referring simultaneously to FIGS. 6A and 6B, illustratedtherein are schematic diagrams illustrating exemplary aspects of aconference call, shown generally as 600, implemented in accordance withthe present disclosure.

In one embodiment, at least some of the steps of the method areperformed by a conference call application that executes and resides ona conference call controller (e.g. conference call controller 440 ofFIG. 4). In variant embodiments, the conference call application neednot be a stand-alone application, and the functionality of theapplication may be implemented in one or more applications executing andresiding on the controller or other computing device.

Method 500 commences at Block 510 in which a first primary communicationdevice 610 has been provided. For example, mobile communication device100B may be selected for use as a first primary communication device 610in a conference call as contemplated herein. Similarly, a second primarycommunication device 612, for example mobile communication device 100C,may be provided (Block 512). A conference call controller, such ascontroller 440, may also be provided (Block 514).

The conference call may then be initiated, typically utilizing both SIPand RTP protocols, as discussed above (Block 516). A first control link(as indicated by line 614 in FIG. 6A) may be established between theconference call controller 440 and the first primary communicationdevice 610 (Block 517).

Such control link 614 may be in the form of a data signal in which firstidentification data 620 may be communicated between the controller 440and the first primary communication device 610 (Block 518). Suchidentification data 620 may comprise at least one security key 622 whichmay be authenticated. A security key will typically comprise data orother type of signal which can authenticate a device (and/or the userthereof).

In some embodiments, the security key 622 may comprise a public and/orprivate encryption key to provide confidentiality and integrity,utilizing a Public Key Infrastructure (PKI) to provide authenticationand authorization.

In certain embodiments, the security key 622 will be transmitted fromthe first primary communication device 610 to the controller 440 forverification via the control link 614. In alternate configurations, thesecurity key 622 may be transmitted from the controller 440 to the firstprimary communication device 610 for verification. In some embodiments,the security key 622 may be in the form of an alphanumeric password andmay be communicated to the user of the first primary communicationdevice 610 separately, for example via email or separate phoneconversation, which the user may then input using the first primarycommunication device 610 for transmitting to the controller 440.

In addition to authenticating the first primary communication device 610(and hence its permission to participate in the conference call), thesecurity key 622 will also be configured to contain participation leveldata or otherwise correspond to a participation level for the conferencecall (or a segment thereof), and particularly with respect to the medialink 616.

In some instances, a PIN (“personal identification number”) or accesscode may be requested by and/or required to be received by thecontroller 440 in order for the conference call user to be fullyauthenticated and permitted to participate on the call. In suchembodiments, the PIN or access code may be in the form of analphanumeric string and may be communicated to the user of the firstprimary communication device 610 separately, for example via email orseparate phone conversation, which the user may then input using thefirst primary communication device 610 for transmitting to thecontroller 440.

The various permitted participation levels may include the ability to(or restriction from) listen, and the ability to (or restriction from)speak, and combinations thereof. The participation levels may alsoinvolve the ability to (or restriction from) viewing and/or modifyingmultimedia, documents or other data. The participation levels mayfurther involve moderator privileges, with the ability to control andregulate the privilege/participation level of other participants in theconference call. As will be understood, participation levels may also bevaried or adjustable over time. In other words, a security key 622 maycorrespond to a participation level for a particular period of time, ormay be set for the duration of the conference call unless otherwisechanged (for example, by the moderator of the conference call); in suchinstances, the first identification data may comprise a plurality ofsecurity keys over the duration of the conference call.

By way of example, the first primary communication device 610 (and thecorresponding user) may provide (or in some embodiments receive) a firstsecurity key 622 corresponding to a first participation level in whichthe user is permitted to speak on the conference call for a limitedperiod. A subsequent second security key 622 may later be provided tothe first primary communication device 610, which provides a secondparticipation level, different from the first participation level, inwhich the user is restricted from speaking on the conference call. Suchan arrangement might, for example, be used during a teleconferencepresentation having a number of “spectators” who are only permitted tospeak during a designated question period.

By way of further example, a security key 622 might comprise thealphanumeric data string “123adqtalkyeslistenyes5min”, with the “123adq”component functioning as a security identifier and with the“talkyeslistenyes” component thereof providing participation level dataindicating that the device 610 is to be provided with both speaking andlistening privilege in the conference call. The “5 min” component of theexample security key 622 might indicate that the security key 622 (andthe corresponding participation level/communication privileges) willonly last for the next 5 minutes, by which time a new security key 622would need to be communicated.

The conference controller 440 is illustrated in FIG. 4 as residing on orotherwise operatively coupled to the LAN 410. In some embodiments, acorresponding conference client module 140 may be provided on the mobiledevice 100 and operatively coupled to the CPU 102 (and hence to thecommunication subsystem 104) and which contains suitable applicationprogramming or software code (sometimes referred to as a “clientapplication”) for interaction with the conference controller 440 toprovide the conference call functionality.

While the conference controller 440 may directly control the mediastream(s) 616 between participating devices 100 in a conference call andthereby regulate the privileges/functionality provided to the variousdevices 100, in some embodiments, the conference client 140 (through itsinteractions with the conference controller 440 via a control link) mayenable or restrict the functionality (for example, the ability to speakor to listen) of the device 100 on which the conference client 140 isresiding. Some conference call circumstances, for example in which a legof a conference call anchors (and effectively acts as a ‘portal’ for)multiple users in daisy-chain fashion and introduced to the conferencecall via one or more secondary managed or unmanaged conference callcircuits or bridges, provide challenges for a centralized conferencecontroller to manage multiple privilege levels on a single leg. In such“daisy-chain” conference call situations, differing privilege levels maybe accommodated on a single conference call leg by having eachconference client 140 on a device 100 regulate the privilege level orfunctionality of the device 100 participating in a conference call.

Conference parameter data relating to the conference call to beestablished, may also be exchanged between the controller 440 and thefirst primary communication device 610 via the control link 614. Forexample, the conference parameter data may include the time of theconference call, and the invited parties and their corresponding contact“numbers” or communication device identifiers/product identificationnumbers. Information corresponding to the conference parameter data maybe displayed on the display of the communication device 610 or otherwisecommunicated to the user of the device 610 (eg. via an auditory“display”). As will be understood, preferably the control link 614 willbe established in such a way as to securely identify the first primarycommunication device 610 to the controller 440. For example, thecontroller 440 may obtain identification data from or otherwise utilizeSIM 126 to authenticate (or partially authenticate) the device 610.

In some instances, the control link 614 may be initiated by thecommunication device 610, in order for the user of the communicationdevice 610 to set up and commence a conference call. Alternatively, ifthe parameters of the conference call have been previously determined,the controller 440 may communicate with the communication device 610 toestablish the control link 614 and take the other steps necessary toinitiate the conference call in accordance with the previouslydetermined conference call parameters, as discussed below.

A media link (as represented by line 616 in FIG. 6A) between the firstand second primary communication devices 610, 612 via the conferencecall controller 440 may then be established (Block 519). As will beunderstood, the terms “via” or “between” in reference to links with “theconference call controller 440” are intended to refer broadly tosituations in which the link or signal is operatively coupled to thecontroller 440, but also is intended to refer to situations in which thelink is established by, but may not maintain a continuous connection to,the controller 440. In some embodiments, the controller 440 may beprogrammed or otherwise configured to initiate a first communication legto the first primary communication device 610, such as by placing atelephone call to the first primary communication device 610 and toinitiate a second communication leg to the second primary communicationdevice 612, such as by placing a telephone call to the second primarycommunication device 612. The controller 440 may be configured toutilize the mobile devices' assigned MSISDN (Mobile Station IntegratedServices Digital Network) number or assigned PIN number to initiate thecommunication legs. The two communication legs may then be linked by thecontroller 440.

While such media link 616 may comprise a standard voice stream or voicesignal as may be established for typical voice telephony or othercommunications, as will be understood, the media link 616 may compriseother types of media data signals (for example, multimedia signals formultimedia presentations, or videophone applications). In someembodiments, preferably the media link 616 is encrypted, and in someimplementations comprise a telecommunications link.

In some implementations, a second control link (as indicated by line 618in FIG. 6A) may also be established between the conference callcontroller 440 and the second primary communication device 612 (Block520). Such control link 618 may be in the form of a data signal in whichconference parameter data relating to the conference call, may beexchanged between the controller 440 and the second primarycommunication device 612. Such control link 618 may also be establishedprior to the establishing of the media link 616 in Block 518.

As with control link 614, the control link 618 may be in the form of adata signal in which second identification data 624 may be communicatedbetween the controller 440 and the second primary communication device612 (Block 521). Such identification data 624 may comprise a securitykey 626 which may be authenticated. As noted previously, a security keywill typically comprise data or other type of signal which canauthenticate a device (and/or the user thereof).

In certain embodiments, the security key 626 will be transmitted fromthe second primary communication device 612 to the controller 440 forverification via the control link 618. In alternate configurations, thesecurity key 626 may be transmitted from the controller 440 to thesecond primary communication device 612 for verification. In someembodiments, the security key 626 may be in the form of an alphanumericpassword and may be communicated to the user of the second primarycommunication device 612 separately, for example via email or separatephone conversation, which the user may then input using the secondprimary communication device 612 for transmitting to the controller 440.

In addition to authenticating the second primary communication device612 (and hence its permission to participate in the conference call),the security key 626 may also be configured to contain participationlevel data or otherwise correspond to a participation level for theconference call (or a segment thereof) and particularly with respect tothe media link 616.

In some instances, a PIN (“personal identification number”) or accesscode may be requested by and/or required to be received by thecontroller 440 in order for the conference call user to be fullyauthenticated and permitted to participate on the call. In suchembodiments, the PIN or access code may be in the form of analphanumeric string and may be communicated to the user of the secondprimary communication device 612 separately, for example via email orseparate phone conversation, which the user may then input using thesecond primary communication device 612 for transmitting to thecontroller 440.

The various permitted participation levels may include the ability to(or restriction from) listen, and the ability to (or restriction from)speak, and combinations thereof. In some implementations, theparticipation levels may also involve the ability to (or restrictionfrom) view and/or modify multimedia, documents or other data. As will beunderstood, participation levels may also be varied or adjustable overtime. In other words, a security key 622 may correspond to aparticipation level for a particular period of time.

By way of example, the first primary communication device 610 (and thecorresponding user) may provide (or in some embodiments receive) asecurity key 622 corresponding to a participation level in which theuser is permitted to speak on the conference call for a limited period.

By way of further example, a security key 626 might comprise thealphanumeric data string “456zxwtalknolistenyes5min”, with the “456zxw”component functioning as a security identifier and with the“talknolistenyes” component thereof providing participation level dataindicating that the device 612 is to be provided with listeningprivilege, but restricted from speaking, in the conference call. The “5min” component of the example security key 626 might indicate that thesecurity key 626 (and the corresponding participationlevel/communication privileges) will only last for the next 5 minutes,by which time a new security key 626 would need to be communicated. Ofcourse, other security key configurations may be used for the varioussecurity keys 622, 626.

In embodiments in which multiple control links eg. 614, 618 areestablished between multiple communication devices 610, 612, one device610, 612 may be provided with moderator privileges and in suchinstances, one control link (eg. second control link 618) may bedesignated as the moderator link 615. Typically, the intendedmoderator's identity will be one of the parameters of the conferencecall data, and may by default be assigned to a communication device 610,612 initiating the conference call (if appropriate). The communicationdevice 612 having the moderator control link 615 may be provided withtop level privileges and corresponding control over the conference calland amending its parameters, including for example, adding or removingparties as necessary or amending privilege levels, or evenassigning/delegating the moderator privileges. So for example, if thecommunication device 612 having the moderator control link 615 assignsthe moderator privileges to communication device 610, the control link615 may shift to the first control link 614, thereby providing the userof the first primary communication device 610 with the moderatorprivileges to control the conference call.

Once the media link 616 has been established, users of the first andsecond primary communication devices 610, 612, may communicate with eachother (consistent with any communication restrictions/privileges asdiscussed previously).

Referring now to FIG. 6B, consider a situation in which one or moreparticipants of the conference call, for example, the user of the firstprimary communication device 610, desires to introduce another mediastream for use in connection with the conference call. For example, theuser(s) may wish to receive or present a drawing, a document or othermultimedia presentation materials to one or more other participants ofthe conference call. Similarly, for example, the user(s) may wish tointroduce a figure or document for one or other participants in theconference call to jointly draft or revise. One or more suchparticipants may wish to link to such additional media stream, to view,revise or otherwise experience such additional material. Linking to andparticipating in such additional media stream may also requiresufficient permission or participation levels, as will be understood.

A first alternate communication device 620 may be selected or otherwiseprovided. The user may decide to initiate a link request, in order tointroduce the first alternate communication device 620 (such as computer450 and/or white board 456) to the conference call. A conference callmenu may be provided on the display 110 of the communication device 610.Such conference call menu will preferably be provided with the optionfor the user to add or otherwise link an additional communication deviceto the conference call, allowing the user to input or otherwisedesignate the proposed additional communication device (such as thefirst alternate communication device 620 illustrated in FIG. 6B). Thelink identification may comprise an MSISDN number, a mobile device PINnumber, a PBX number, a PBX extension/access number or a URI (UniformResource Identifier as outlined in IETF rfc3986). A URI (e.g. a SIP URI)may also be used to help resolve the service the initiator is looking toinvoke with the additional communication device. Such data identifyingthe additional communication device may be communicated to thecontroller 440 together with the link request, via the control link 614.

The link request may then be evaluated. For example, if the user of thecommunication device 610 has sufficiently high privilege levels, thecontroller 440 might be programmed or otherwise configured to permit andthen initiate the link. Alternatively, the request may be routed by thecontroller 440 to the moderator's communication device 612 via themoderator's control link 615 and displayed on the device 612 display110. The moderator may then grant or deny such link permission byinputting data (in some embodiments through the selection of menuoptions) which is received by the controller via the control link 615,618. In such instances, a new security key may be generated providingsuch upgraded privilege as may be required to enable access.

If the link request is approved or granted, the controller 440 may thenbe configured to establish a second media link 622 between the firstalternate communication device 620 and the conference call controller440. In some embodiments, the controller 440 may be programmed orotherwise configured to initiate a communication leg to the firstalternate communication device 620, such as by placing a telephone callto or otherwise contacting the first alternate communication device 620.As will be understood, the second media link 622 may convey a secondmedia signal which is different than the first media signal conveyed bythe first media link 616. For example, the first media link 616 mayconvey a voice stream signal, and the second media link 622 may convey amultimedia signal. In yet another example, both links 616, 622 mayconvey different multimedia signals. Other signal types and combinationsare possible, as will be understood.

In similar fashion (to that outlined with respect to Blocks 521 to 530),the second media link 622 may also be extended by the controller 440 toa second alternate communication device 630 (such as computer 450 and/orwhite board 456). Such extension of the link 622 to the second alternatecommunication device 630 may be as a result of the controller 440receiving a link request from the first primary communication device 610via the first control link 615. Alternatively, the link 622 may beextended to the second alternate communication device 630 as a result ofthe controller 440 receiving a link request from the second primarycommunication device 612 via the second control link 618.

As will be understood, if the first and second alternate communicationdevices 620, 630 are each an embodiment of a mobile device 100, then theenterprise specific protocols for the LAN 410 may be used inestablishing and extending the second media link 622 to the first andsecond alternate communication devices 620, 630. Alternatively, if thealternate communication device 620, 630 is a PBX type of communicationdevice, then appropriate PBX protocols, such as H.323 transferprotocols, may be used to transfer the media link 616.

As will be understood, while two primary communication devices 610, 612(and two alternate communication devices 620, 630) were illustrated anddescribed as participating in the conference call, additionalcommunication devices may also participate in the conference call.

As will also be understood, while the communication system andembodiments described herein have been illustrated as utilizing SIP, itshould be understood that other protocols (including those which may bedeveloped in the future) may be utilized for establishing andcontrolling sessions as contemplated herein. In addition to “otherprotocols” it is possible that some embodiments may utilize mediationlayers (eg. JAIN/SIP or JAIN/CC) to establish and control sessions ascontemplated herein. As well, other embodiments may utilize othersignalling mechanisms, such as IMS, SS7, ISDN and H323.

The steps of the method of facilitating a conference call in accordancewith any of the embodiments described herein may be provided asexecutable software instructions stored on computer-readable media,which may include transmission-type media.

The invention has been described with regard to a number of embodiments.However, it will be understood by persons skilled in the art that othervariants and modifications may be made without departing from the scopeof the invention as defined in the claims appended hereto.

The invention claimed is:
 1. A method of facilitating a conference call between a plurality of communication devices, the method comprising: providing a first control link between a first communication device and a conference call controller, wherein the first control link facilitates the exchange of a first identification data comprising at least one first security key; and establishing one or more media links between the first communication device and a second communication device via the conference call controller, wherein the at least one first security key is configured to contain participation level data indicating at least one participation level of the first communication device or the second communication device.
 2. The method as claimed in claim 1, wherein the participation level data indicates at least one participation level of the first communication device or the second communication device.
 3. The method as claimed in claim 1 further comprising: providing a second control link between the second communication device and the conference call controller.
 4. The method as claimed in claim 3, wherein the second control link facilitates the exchange of a second identification data comprising at least one second security key configured to contain participation level data indicating a participation level of the second communication device.
 5. The method as claimed in claim 1, wherein the at least one participation level comprises at least one selected from the group consisting of: the ability to listen; the ability to speak; the ability to view media data; and the ability to modify the media data.
 6. The method as claimed in claim 1, wherein the at least one first security key comprises participation level data to control a participation level of the second communication device.
 7. The method as claimed in claim 1, wherein the first identification data comprises a plurality of security keys.
 8. The method as claimed in claim 7, wherein the plurality of security keys comprises a second security key configured to contain participation level data indicating a second participation level of the second communication device which differs from the participation level of the second communication device comprised in the at least one first security key.
 9. The method as claimed in claim 7, wherein the plurality of security keys comprises a second security key configured to contain participation level data indicating a second participation level of the first communication device which differs from the participation level of the first communication device comprised in the at least one first security key.
 10. The method as claimed in claim 1, wherein at least one of the one or more media links comprises a voice signal or a multimedia signal.
 11. The method of claim 1, wherein the second communication device is a communication device or an alternate communication device.
 12. The method of claim 11, wherein the establishing of the one or more media links between the first communication device and the second communication device via the conference call controller further comprises: establishing a first media link between the first communication device and the conference call controller; and establishing a second media link between the conference call controller and the alternate communication device.
 13. The method of claim 11, wherein the establishing of the one or more media links between the first communication device and the second communication device via the conference call controller further comprises: establishing a first media link between the first communication device and the communication device via the conference call controller.
 14. A non-transitory computer-readable medium comprising instructions that, when executed, cause a conference call controller to perform a method, the method comprising: providing a first control link between a first communication device and the conference call controller, wherein the first control link facilitates the exchange of a first identification data comprising at least one first security key; and establishing one or more media links between the first communication device and a second communication device via the conference call controller; wherein the at least one first security key is configured to contain participation level data indicating at least one participation level of the first communication device or the communication device.
 15. A system for facilitating a conference call between a plurality of communication devices, the system comprising: a conference call controller configured to: provide a first control link with a first communication device; establish one or more media links between the first communication device and a second communication device; wherein the first control link facilitates the exchange of a first identification data comprising at least one first security key; and wherein the at least one first security key is configured to contain participation level data indicating at least one participation level of the first communication device or the second communication device.
 16. The system as claimed in claim 15, wherein the participation level data indicates at least one participation level of the first communication device or the second communication device.
 17. The system as claimed in claim 15, wherein the conference call controller is further configured to: provide a second control link with the second communication device.
 18. The system as claimed in claim 17, wherein the second control link facilitates the exchange of a second identification data comprising at least one second security key configured to contain participation level data indicating a participation level of the communication device.
 19. The system as claimed in claim 15, wherein the first identification data is communicated from the first communication device to the conference call controller.
 20. The system as claimed in claim 15, wherein the first identification data comprises a plurality of security keys, which comprises a second security key configured to contain participation level data indicating a second participation level of the first communication device or the second communication device that differs from the respective participation level of the first communication device or the second communication device comprised in the at least one first security key. 