Ex Parte Fichou et al - Page 5

                Appeal 2007-1410                                                                              
                Application 09/811,038                                                                        

                      4. Should sufficient network capacity be determined, a virtual                          
                connection is established from the ingress node to the egress node (Br. 3:5-                  
                7).                                                                                           
                                                 Kalmanek                                                     
                      5.  Kalmanek relates to reserving and committing network                                
                resources based on an authorized quality of service (col. 1, ll. 23-25).                      
                      6. A service provider may verify the specified quality of service                       
                for a call.  For example, a calling party transferring data may subscribe for a               
                service with a quality of service having a large bandwidth and small latency;                 
                in such an example, a service provider can verify the service subscription for                
                the particular quality of service associated with the call for that particular                
                calling party (col. 9, ll. 25-34).                                                            
                      7. Gate controllers can authenticate signaling messages and                             
                authorize requests for service so that communication services and certain                     
                service features are only provided to authorized subscribers.  Upon receiving                 
                a setup request message from a calling party, the gate controller can                         
                authenticate the identity of the calling party and authorize the service sought               
                by the calling party (col. 6, ll. 56-62).                                                     
                      8.  Kalmanek recognizes that network resource management may                            
                be necessary, because some network edge devices in the communications                         
                network may not have sufficient processing capacity to process a large                        
                number of reservation messages typical for high volume call traffic (col. 10,                 
                ll. 47-56).                                                                                   
                      9. Resource management may be performed on a per-call basis.                            
                When an originating telephony interface unit sends a reservation request to a                 


                                                      5                                                       

Page:  Previous  1  2  3  4  5  6  7  8  9  Next

Last modified: September 9, 2013