Title of Invention

VOIP PROXY SERVER

Abstract System and methods to access a company's phone network from an external communication network have been disclosed. A system comprising: an external firewall (120) connected to an external communication network (190) and a DMZ (130); an internal firewall (110) connected to an internal communication network (100) and the DMZ (130); an IP-PBX (150) connected to the internal communication network (100); and a VoIP proxy server (140) connected to the DMZ (130), the VoIP proxy server (140) configured to receive a request from an ePhone, identify a source IP address in the request, push a firewall policy change to the external firewall (120), forward a call control message to the IP-PBX (150) via the internal firewall (110), receive a registration request for the ePhone in response to the call control message from the IP-PBX (150), and forward the registration request to the ePhone through the external firewall (120), the external firewall (120) configured to open a port for the source IP address in response to a firewall policy change.
Full Text

Cross-Reference To Related Applications
[001] This application claims the benefit of prior filed U.S. Provisional
Application no. 60/663,077, filed March 18, 2005, which is incorporated herein by
reference.
Background Of The Invention
[002] The present invention relates to secure communication networks. More
specifically, the invention relates to allowing access to a company's phone
network from an external communications network while maintaining the security
of the secure communications network.
[003] The Internet is an example of an external communications network that
enables remote access to a company's internal communications network without
being directly connected to the company's network. A workstation connected to
the Internet can connect to the company's network and remotely access any of the
allowed network services on the company's network. This is especially convenient
for telecommuters or business travelers that can access the company's network
from their home or away from their office.
[004] Remote access to a company's network, however, increases the risk that an
unauthorized user may gain access to the company's network and steal or damage
information stored on the network. The company's internal network is usually
isolated from the external communications network by a firewall that manages
access to the company's internal network.
[005] Many companies have merged their internal data network with their
telephone system using Voice over Internet Protocol (VoIP). In such a system, the

company's phones are connected to the internal network and access the external
phone system through a PBX that manages the interface between the external
telephone network and the company's internal network.
[006] Merging the company's telephone network with their internal
communication network, enables the remote business traveler or telecommuter to
access their business phone when away from their office. Voice applications,
however, usually require a range of IP addresses and port ranges. The company's
firewall must, therefore, open a range of IP addresses and port ranges to the
external network, which are all possible points of entry for an unauthorized user.
[007] In many situations requiring endpoint-to-endpoint access, a remote
computer establishes a virtual private network (VPN) connection that gives the
remote user access to the internal network. A VPN connection, however,
represents a security risk because there is no assurance that the remote computer is
clean and does not contain viruses or other malware that could compromise the
internal network. Therefore, there remains a need for systems and methods for
enabling transparent remote access to a company's internal phone lines from an
external network without establishing a VPN connection.
Summary Of The Invention
[008] One embodiment of the present invention is directed to a Voice over
Internet Protocol (VoIP) proxy server that is placed in a demilitarized zone (DMZ)
of a company's secure internal communication network. The VoIP proxy server
receives VoIP control messages and VoIP media streams and based on the MAC
address and source IP address contained in the control message, pushes a policy
change to the internal network's external firewall to open call control protocol
ports and Real Time Protocol (RTP) ports only for packets from the source IP
address. The VoIP proxy server manages the hiding of the company's internal

network address and directs incoming VoIP packets to an Internet Protocol Private
Branch Exchange (IP-PBX) connected to the company's internal network.
[009] One embodiment of the present invention is directed to a system
comprising: an external firewall connected to an external communication network
and a DMZ; an internal firewall connected to an internal communication network
and the DMZ; an IP-PBX connected to the internal communication network; and a
VoIP proxy server connected to the DMZ, the VoIP proxy server configured to
receive VoIP messages from the external firewall and forward the received VoIP
messages through the internal firewall to the IP-PBX.
[0010] Another embodiment of the present invention is directed to a method
comprising: receiving a request from a remote user's ePhone; identifying a source
IP address in the request; pushing a firewall policy change to an external firewall,
the firewall in response to the policy change opening a port for the source IP
address; forwarding a call control message from the ePhone to an IP-PBX via an
internal firewall; and forwarding a registration request from the IP-PBX to the
ePhone through the external firewall. A further aspect comprises retrieving a
configuration file for the ePhone based on a MAC address of the ePhone; and
authenticating and authorizing the user based on the retrieved configuration file. In
a further aspect, the step of forwarding the call control message further comprises
replacing a destination IP address of an incoming packet with an IP address of the
IP-PBX. In a further aspect, the step of forwarding the registration request further
comprises replacing a source address of the registration request with an address of
a VoIP proxy server. In another aspect, the step of forwarding the call control
message further comprises adding a header containing an internal IP address of the
IP-PBX. In another aspect, the step of forwarding the registration request further
comprises removing a header containing an internal IP source address from the
forwarded registration request.

Brie f Description Of The Accompanying Drawings
[0011] The invention will be described by reference to the preferred and
alternative embodiments thereof in conjunction with the drawings in which:
[0012] Fig. 1 is a schematic diagram of an embodiment of the present invention;
and
[0013] Fig. 2 is a flow diagram illustrating an embodiment of the present
invention.
Detailed Description
[0014] The description herein should be understood to describe only one preferred
embodiment of the invention. Those skilled in the art will recognize, for example,
that the described embodiment is just one simplified example of the novel system
and method of monitoring trading manager performance. The simplified example
is all that needs to be described in detail in order to enable the more general
system and method that the invention comprises.
[0015] Fig. 1 is a schematic diagram of an embodiment of the present invention.
In Fig. 1, an internal communication network 100 is connected to an external
communication network 190 through an internal firewall 110 and an external
firewall 120. In a preferred embodiment, the external communication network 190
is an internet. In some embodiments, the internal communication network is an
intranet. A local area network, commonly referred to as a DMZ 130 resides
between the internal firewall 100 and the external firewall 120. A Voice over
Internet Protocol (VoIP) proxy server 140 is connected to the DMZ 130. An IP-

PBX 150 is connected to the internal network 100.
[0016] The external firewall 120 provides a secure entry point from the internet
into the company's internal network. The external firewall 120 may filter network
packets from the external network and route allowed or authorized packets to the
DMZ for further processing. In a preferred embodiment, the external firewall 120
also hides the company's internal network addresses by acting as a proxy server
for packets coming from or going to the external network 190. The internal
firewall 110 allows only packets having a restricted range of source IP addresses
to pass through the internal firewall 110 to the internal network 100. In a preferred
embodiment, the external firewall 120 and the internal firewall 110 are physically
separate servers. In some alternate embodiments, the external firewall and the
internal firewall may be hosted by a single server computer. The DMZ 130 is
preferably a local area network that is connected to the external firewall 120 and
internal firewall 110 and acts as a bridge between the internal and external
firewalls.
[0017] The VoIP proxy server 140 is connected to the DMZ 130 and receives
incoming VoIP control messages and VoIP media streams, collectively referred to
as VoIP messages, from the external firewall 120. In a preferred embodiment, the
VoIP proxy server 140 provides network address translation for the VoIP control
and media packets. The VoIP proxy server 140 forwards the control and media
streams through the internal firewall to the internal network 100. An IP-PBX 150
connected to the internal network 100 receives the control and media streams and
transmits return messages and media streams.
[0018] Fig. 2 is a flow diagram illustrating an embodiment of the present
invention. In Fig. 2, the VoIP proxy server receives a request from a remote User
for a trivial file transfer protocol (TFTP) service in 210. In a preferred
embodiment, the remote user may use a traditional phone connected to an analog-

digital converter (ADC), an internet phone or a remote computer executing a
softphone application, referred to collectively as an ePhone. The user may connect
the ePhone to the internet through a local internet service provider (ISP).
[0019] The VoIP proxy server retrieves a configuration file containing
configuration information for user's phone based on the Media Access Control
(MAC) address of the user's internet phone or remote computer in step 220. The
VoIP proxy server identifies a source IP address in the request and pushes a
firewall policy change to the external firewall 120 after the user has been
authenticated and authorized using the internal network's security procedures. The
external firewall 120, in response to the policy change, opens call control protocol
and Real Time Protocol (RTP) ports for that user phone's IP address for a set
period of time.
[0020] In step 230, the VoIP proxy server redirects the incoming VoIP packets to
an internal network address or hides the internal network address for outgoing
packets. For incoming packets, the VoIP proxy server replaces the destination IP
address of the packet with the IP address of the internal IP-PBX. For outgoing
packets, the VoIP proxy server replaces the source address, which is the internal
address of the IP-PBX, with its IP address. Alternatively, instead of replacing the
destination or source B? address, the proxy server may add a header containing an
internal IP destination address to the incoming packet or strip a header containing
an internal IP source address from the outgoing packet.
[0021] In step 240, the VoIP proxy server forwards the received call control
message to the internal D^-PBX. In response to the call control message, the
internal IP-PBX sends a registration request for the user's ePhone back to the VoIP
proxy server. In step 250, the VoIP proxy server receives the registration request
from the internal EP-PBX, replaces the source B° address containing the internal
ff-PBX's IP address with the VoIP proxy server TP address. In step 260, the VoIP

proxy server forwards the registration request to the user's ePhone to complete the
registration of the ePhone. Once the user's ePhone is registered, the user may
place a call, which sends call control messages and media streams to the VoIP
proxy server. The external firewall listens for the user's IP address and only
packets with the user's IP address through the exposed User Datagram Protocol
(UDP) ports. Limiting access to the UDP ports to a specified IP source address
minimizes the risk of an unauthorized intruder gaining access through the UPD
ports while providing remote access to the company's internal phone system.
[0022] Embodiments of the present invention comprise computer components and
computer-implemented steps that will be apparent to those skilled in the art. For
example, it should be understood by one of skill in the art that the computer-
implemented steps may be stored as computer-executable instructions on a
computer-readable medium such as, for example, floppy disks, hard disks, optical
disks, Flash ROMS, nonvolatile ROM, and RAM. For ease of exposition, not
every step or element of the present invention is described herein as part of a
computer system, but those skilled in the art will recognize that each step or
element may have a corresponding computer system or software component. Such
computer system and/or software components are therefore enabled by describing
their corresponding steps or elements (mat is, their functionality), and are within
the scope of the present invention.
[0023] Having thus described at least illustrative embodiments of the invention,
various modifications and improvements will readily occur to those skilled in the
art and are intended to be within the scope of the invention. Accordingly, the
foregoing description is by way of example only and is not intended as limiting.
The invention is limited only as defined in the following claims and the
equivalents thereto.

WE CLAIM:
1. A system comprising:
an external firewall (120) connected to an external communication network
(190) and a DMZ (130);
an internal firewall (110) connected to an internal communication network
(100) and the DMZ (130);
an IP-PBX (150) connected to the internal communication network (100);
and
a VoIP proxy server (140) connected to the DMZ (130), the VoIP proxy
server (140) configured to receive a request from an ePhone, identify a source IP
address in the request, push a firewall policy change to the external firewall (120),
forward a call control message to the IP-PBX (150) via the internal firewall (110),
receive a registration request for the ePhone in response to the call control
message from the IP-PBX (150), and forward the registration request to the
ePhone through the external firewall (120),
the external firewall (120) configured to open a port for the source IP
address in response to a firewall policy change.
2. A method comprising:
receiving, at a VoIP proxy server (140), a request from a remote user's
ePhone;
identifying a source IP address in the request;
pushing a firewall policy change to an external firewall (120);
opening a port for the source IP address in response to the policy change;
forwarding a call control message from the VoIP proxy server (140) to an IP-
PBX (150) via an internal firewall (110); and
forwarding the registration request from the VoIP proxy server (140) to the
ePhone through the external firewall (120).

3. The method as claimed in claim 2 comprising:
retrieving a configuration file for the ePhone based on a MAC address of the
ePhone; and
authenticating and authorizing the user based on the configuration file.
4. The method as claimed in claim 2 wherein the step of forwarding a call
control message comprises replacing a destination IP address of an incoming
packet with an IP address of the IP-PBX (150).
5. The method as claimed in claim 2 wherein the step of forwarding a
registration request comprises replacing a source IP address of the registration
request with an IP address of a VoIP proxy server (140).
6. The method as claimed in claim 2 wherein the step of forwarding a call
control message comprises adding a header containing an internal IP address of
the IP-PBX (150).
7. The method as claimed in claim 2 wherein the step of forwarding a
registration request comprises removing a header containing an internal IP source
address from the registration request.
8. A method comprising:
connecting an ePhone to an external communication network (190);
sending a request to a VoIP proxy server (140);
sending a call control message to an IP-PBX (150) through the VoIP proxy
server (140);
receiving a registration request from the IP-PBX (150) through the VoIP
proxy server (140); and
placing a call on the ePhone in response to the registration request, the call
routed through the VoIP proxy server (140).

9. The method as claimed in claim 8 wherein the VoIP proxy server (140)
resides in a DMZ (130) of an internal communication network (100), the DMZ
(130) connected to the external communication network (190) through an external
firewall (120).



Abstract


System and Methods to Access a Company's Phone
Network from an External Communication Network
System and methods to access a company's phone network from an external
communication network have been disclosed. A system comprising: an external
firewall (120) connected to an external communication network (190) and a DMZ
(130); an internal firewall (110) connected to an internal communication network
(100) and the DMZ (130); an IP-PBX (150) connected to the internal
communication network (100); and a VoIP proxy server (140) connected to the
DMZ (130), the VoIP proxy server (140) configured to receive a request from an
ePhone, identify a source IP address in the request, push a firewall policy change
to the external firewall (120), forward a call control message to the IP-PBX (150)
via the internal firewall (110), receive a registration request for the ePhone in
response to the call control message from the IP-PBX (150), and forward the
registration request to the ePhone through the external firewall (120), the external
firewall (120) configured to open a port for the source IP address in response to a
firewall policy change.

Documents:

03676-kolnp-2007-abstract.pdf

03676-kolnp-2007-claims.pdf

03676-kolnp-2007-correspondence others.pdf

03676-kolnp-2007-description complete.pdf

03676-kolnp-2007-drawings.pdf

03676-kolnp-2007-form 1.pdf

03676-kolnp-2007-form 3.pdf

03676-kolnp-2007-form 5.pdf

03676-kolnp-2007-international publication.pdf

03676-kolnp-2007-pct priority document notification.pdf

3676-KOLNP-2007-(05-04-2013)-CORRESPONDENCE.pdf

3676-KOLNP-2007-(13-01-2014)-CORRESPONDENCE.pdf

3676-KOLNP-2007-(13-01-2014)-OTHERS.pdf

3676-KOLNP-2007-(21-04-2014)-ABSTRACT.pdf

3676-KOLNP-2007-(21-04-2014)-CLAIMS.pdf

3676-KOLNP-2007-(21-04-2014)-CORRESPONDENCE.pdf

3676-KOLNP-2007-(21-04-2014)-DESCRIPTION (COMPLETE).pdf

3676-KOLNP-2007-(21-04-2014)-DRAWINGS.pdf

3676-KOLNP-2007-(21-04-2014)-FORM-2.pdf

3676-KOLNP-2007-(21-04-2014)-FORM-3.pdf

3676-KOLNP-2007-(21-04-2014)-PA.pdf

3676-KOLNP-2007-(21-04-2014)-PETITION UNDER RULE 137.pdf

3676-kolnp-2007-ASSIGNMENT.pdf

3676-kolnp-2007-CORRESPONDENCE-1.1.pdf

3676-KOLNP-2007-CORRESPONDENCE.pdf

3676-kolnp-2007-EXAMINATION REPORT.pdf

3676-KOLNP-2007-FORM 1.pdf

3676-kolnp-2007-FORM 18-1.1.pdf

3676-kolnp-2007-form 18.pdf

3676-KOLNP-2007-FORM 3.pdf

3676-KOLNP-2007-FORM 5.pdf

3676-kolnp-2007-FORM 6-1.1.pdf

3676-KOLNP-2007-FORM 6.pdf

3676-kolnp-2007-GPA.pdf

3676-kolnp-2007-GRANTED-ABSTRACT.pdf

3676-kolnp-2007-GRANTED-CLAIMS.pdf

3676-kolnp-2007-GRANTED-DESCRIPTION (COMPLETE).pdf

3676-kolnp-2007-GRANTED-DRAWINGS.pdf

3676-kolnp-2007-GRANTED-FORM 1.pdf

3676-kolnp-2007-GRANTED-FORM 2.pdf

3676-kolnp-2007-GRANTED-FORM 3.pdf

3676-kolnp-2007-GRANTED-FORM 5.pdf

3676-kolnp-2007-GRANTED-SPECIFICATION-COMPLETE.pdf

3676-kolnp-2007-INTERNATIONAL PUBLICATION.pdf

3676-kolnp-2007-INTERNATIONAL SEARCH REPORT & OTHERS.pdf

3676-kolnp-2007-OTHERS.pdf

3676-KOLNP-2007-PA.pdf

3676-kolnp-2007-PETITION UNDER RULE 137.pdf

3676-kolnp-2007-REPLY TO EXAMINATION REPORT.pdf

abstract-03676-kolnp-2007.jpg


Patent Number 263005
Indian Patent Application Number 3676/KOLNP/2007
PG Journal Number 41/2014
Publication Date 10-Oct-2014
Grant Date 29-Sep-2014
Date of Filing 28-Sep-2007
Name of Patentee LEHMAN BROTHERS INC.
Applicant Address 745 SEVENTH AVE., NEW YORK, NY 10019
Inventors:
# Inventor's Name Inventor's Address
1 MANVILLE JOHN T. 151 ELKWOOD AVE., NEW PROVIDENCE,, NJ 07974
2 PALEVO PHILIP JR. 18 HEATHER HILL WAY, HOLMDEL, NJ 07733
3 SHAW SCOTT 1685 SPRING VALLEY ROAD, OSSING, NY 10562
4 JOHN ANDREW R. 336 N. FULLERTON AVE., MONTCLAIR, NJ 07043
5 ELIAS SABET A. 31 SAINT JOHN'S DRIVE, FREEHOLD, NJ 07728
PCT International Classification Number G06F 9/00
PCT International Application Number PCT/US2006/009947
PCT International Filing date 2006-03-17
PCT Conventions:
# PCT Application Number Date of Convention Priority Country
1 60/663077 2005-03-18 U.S.A.