METHOD FOR AUTOMATICALLY REGISTERING A USER IN A DESK-SHARE ENVIRONMENT AND IP TELEPHONE

20200007600 ยท 2020-01-02

    Inventors

    Cpc classification

    International classification

    Abstract

    The present invention relates to a method for automatically registering a user in a desk-share environment comprising a plurality of desks, each desk being equipped with an IP telephone connected to a communication network, in particular, to a local area network, wherein the IP telephone holds a data base comprising data of all desk-share users of the desk-share environment, the data comprising at least a user ID and a MAC address of a terminal device for each user assigned to a user profile, the method comprising the steps of: receiving, at the IP telephone, an IP data packet from a first terminal device via the communication network; verifying the MAC address in the IP data packet received from the first terminal device; and when the MAC address corresponds to a MAC address in the data of the data base, activating the user profile assigned to the MAC address in the IP telephone. Further, the invention relates to an IP telephone which is adapted to carry out the method for automatically registering a user in a desk-share environment.

    Claims

    1. A method for automatically registering a user in a desk-share environment comprising a plurality of desks, each desk being equipped with an IP telephone connected to a communication network, wherein the IP telephone holds a data base comprising data of all desk-share users of the desk-share environment, the data comprising at least a user ID and a MAC address of a terminal device for each user assigned to a user profile, the method comprising the steps of: receiving, at the IP telephone, an IP data packet containing a MAC address from a first terminal device via the communication network; verifying the MAC address in the IP data packet received from the first terminal device; and when the MAC address corresponds to a MAC address in the data of the data base, activating the user profile assigned to that MAC address in the IP telephone.

    2. The method according to claim 1 wherein the IP telephone periodically receives IP data packets from the terminal device.

    3. The method according to claim 1 wherein when in the step of verifying the MAC address, the IP telephone determines that the MAC address does not correspond to the MAC address of the activated user profile and is a new MAC address, then the method further comprises a step of: checking, whether the new MAC address is among the data in the data base; and when it is determined that the new MAC address is among the data in the database, activating the user profile assigned to the new MAC address in the IP telephone.

    4. The method according to claim 3 wherein the method further comprises a step of activating a default user profile when it is determined that the new MAC address is not among the data in the database.

    5. The method according to claim 3 wherein the method further comprises a step of activating the previously activated user profile when it is determined that the new MAC address is not among the data in the database.

    6. The method according to claim 3 wherein the method further comprises a step of activating an emergency calls only mode when it is determined that the new MAC address is not among the data in the database.

    7. The method according to claim 2 wherein the method further comprises a step of detecting one of a stop of the data traffic received from the first terminal device and a change in the periodically received data packets.

    8. The method according claim 7 wherein when a stop of the data traffic received from the first terminal device is detected by the IP telephone, then the IP telephone proceeds according to a preselected option from a number of options selected from the group consisting of activating a default user profile, activating an emergency calls only mode, and maintaining the activated user profile.

    9. The method according to claim 1 wherein the communications network is a local area network

    10. An IP telephone which is adapted to carry out the method according to claim 1 wherein the IP telephone is adapted to hold a database comprising data of a plurality of desk-share users of a desk-share environment, the data comprising at least a user ID and a MAC address of a terminal device for each user assigned to a user profile, the IP telephone comprising: means for receiving an IP data packet from a first terminal device via the LAN; means for verifying the MAC address in the IP data packet received from the first terminal device; and means for activating the user profile assigned to the MAC address in the IP telephone.

    11. The IP telephone according to claim 10 wherein the IP telephone is a VoIP telephone.

    12. The IP telephone according to claim 10, wherein the IP telephone further comprises means for activating a user profile according to a predetermined time schedule.

    Description

    BRIEF DESCRIPTION OF THE DRAWINGS

    [0023] FIG. 1 schematically shows the topology for the automatic registration method according to an embodiment of the invention;

    [0024] FIG. 2 schematically illustrates an IP packet;

    [0025] FIG. 3 shows an automatic registration procedure based on the available options according to an embodiment of the invention;

    [0026] FIG. 4A to FIG. 4C illustrate a log off procedure of a user at a shared desk;

    [0027] FIG. 5A to FIG. 5C illustrate the log in procedure of a new user at a shared desk; and

    [0028] FIG. 6 shows an automatic registration process based on scheduled timeslots.

    DESCRIPTION OF THE PREFERRED EMBODIMENTS

    [0029] FIG. 1 schematically shows the topology for the automatic registration method according to an embodiment of the invention. As already explained above, the method is based on a concept according to which the user in a shared-desktop environment uses a desk shared with other users, the desk being equipped with an IP telephone 1, here a VoIP telephone 1, but he brings his own terminal device 2, here, in the embodiment shown, a laptop computer. This terminal device 2 is connected to a communication network 3, here in the embodiment the company's local area network (LAN) 3, via the VoIP telephone 1. This is a capability that almost all VoIP phone devices offer.

    [0030] The VoIP telephone 1 provides an interface to the user (UI) to configure his phone credentials. Initially, the user enters his phone number or an ID, which can be used to verify the user, his PIN, a code, and/or a password as well as the MAC address of his terminal device 2 or laptop computer. The IP telephone has a port or ports through which the IP telephone is connected to the local area network and to a user's terminal and through which IP data packets are received. The IP telephone also contains a processor and a memory that can verify the MAC address from a terminal that is connected to the IP telephone and activate the user profile that is associated with that MAC address in a database in the IP telephone. The processor may also activate a user profile according to a schedule that is in a memory connected to the processor.

    [0031] Then, all LAN packets from the laptop computer 2 to the communication network 3 are routed via the VoIP phone 2. Periodically, e.g. every 60 seconds, the VoIP phone 2 receives packets from the laptop computer 2 to identify the user that is connected to it. The user identification is effected via the MAC address of the laptop computer 2, which is part of the header of the IP protocol header packets that are sent from the laptop computer 2 to the communication network 3, and is unique for each terminal device or laptop computer 2.

    [0032] FIG. 2 schematically illustrates an IP packet as received by the VoIP phone 1 in the configuration shown in FIG. 1 from the terminal device or laptop computer 2. Indicated by the black arrow is the field that contains the MAC address information for the source of the packet, namely, the terminal device or laptop computer 2.

    [0033] FIG. 3 shows an automatic registration procedure based on the available options according to an embodiment of the invention. The VoIP phone 1 holds a data base with all data concerning the desk-share users that have configured their data, as outlined above, by entering the latter into the VoIP phone 2. Then, after a first user using a first terminal device 2 has entered an office and starts working at his shared desk, the VoIP phone 1 receives IP packets and reads, from the IP packets, the MAC address of the first terminal device 2. The VoIP phone 1 verifies if the MAC address is comprised in the data stored in the data base, and if it is determined that the MAC address present in the data, the VoIP phone 1 loads the corresponding user profile of the first user to whom the identified terminal device 2 belongs. After this has been completed, the first user is able to make phone calls with his own phone number, and is able to use all functionalities assigned in his user profile, as he has configured it initially.

    [0034] Then, the VoIP phone 1 periodically receives further IP packets from the terminal device 2 of the first user 1 which now is logged in, and with every received IP packet, the VoIP device 1 verifies whether the MAC address in the IP packet received still matches the MAC address assigned to the first user which currently is activated. If the VoIP phone 1 determines that a new MAC address is received, which does not match the MAC address of the first user, then the verification procedure is carried out again by checking, whether the new MAC address is comprised in the data of the data base of the VoIP phone 1, and if is determined to be comprised in the data base, then the new user profile assigned to the new user of the new MAC address is loaded or activated in the VoIP phone 1 automatically.

    [0035] If the new MAC address cannot be found in the data of the data base of the VoIP phone 1, then there are the following options to take by the VoIP phone 1: Option 1 is loading a default profile, option 2 is loading the last active user profile, and option 3 is activating an emergency calls only mode.

    [0036] The same options are valid in the beginning of the procedure, when the VoIP phone 1 periodically receives IP packets, and the transmission of IP packets is stopped, for example, because the terminal device 2 has been disconnected. This would mean that no terminal device 2 is connected to the VoIP phone 1, and in this case, either the last valid profile is loaded, or a default profile, or no profile and the VoIP phone 2 can be used for emergency calls only.

    [0037] FIG. 4A, FIG. 4B, and FIG. 4C illustrate a log off procedure for a user at a shared desk. At first, in FIG. 4A, it is assumed in this scenario that as a first user, Bob is connected with his laptop computer 2 via the company's LAN 3 to a VoIP phone 1 at his shared desk. As Bob's laptop computer 2 starts sending IP packets, his MAC address is verified by the VoIP phone 1 and the latter will load Bob's user profile. In the embodiment shown here, the user profile comprises Bob's phone number, in particular, his ext. no. 101. If he makes a call, then the called person will see his phone number and will know who is calling. Also, the calls he receives are stored in his own account assigned to his user profile.

    [0038] As can be seen in FIG. 4B, Bob's laptop computer 2 has been disconnected from the LAN 3, but the VoIP phone 2 is not yet aware of the disconnection. Still, Bob's user profile containing his phone extension no. 101 is active.

    [0039] In FIG. 4C, the disconnection of Bob's terminal device 2 has been recognized by the VoIP phone 1, since the latter no longer receives IP packets from the terminal device 2 via the LAN 3. Upon recognition of this change, the VoIP phone 1 changes its configuration to a predetermined or selected option: option 1 would be loading a default profile with an extension no. 100, option 2 would be maintaining the last user profile, namely, Bob's user profile; and option 3 would be switching to a mode for emergency calls only.

    [0040] FIG. 5A to FIG. 5C illustrate the log in procedure of a new user at a shared desk. This scenario in FIG. 5A starts where the previous scenario described with respect to FIG. 4C has ended, namely, with no terminal device 2 connected via the LAN 3 to the VoIP phone 1, the latter being configured according to either one of the options 1 to 3 mentioned above.

    [0041] As can be seen in FIG. 5B, a new user, Lara, has entered the office with her own terminal device 2, Lara's laptop computer, which now sends IP packets via the LAN 3 to the VoIP phone 1. However, the VoIP phone 1 has not yet realized the change, so that still the VoIP phone 1 is in the state described with respect to FIG. 5A concerning the activated profile.

    [0042] In FIG. 5C, the VoIP phone 1 has identified the change as it has verified the new MAC address of the new terminal device 2 of the new user Lara, by comparing the MAC address with MAC addresses comprised in the data base. After the VoIP phone 1 has determined that the MAC address of the new terminal device 2 is present in the data base, it activates the corresponding user profile assigned to this new MAC address. Now, the new user has been automatically registered at the VoIP phone 1, and the new user can use the VoIP phone 1 with its own extension number, here 102 and other functionalities, which have been configured for this user profile.

    [0043] FIG. 6 shows an automatic registration process based on scheduled timeslots. This embodiment is to a more simple solution which again provides an automatic registration mechanism that is preconfigured. The phone provides again a UI, where each desk-share user selects the hours he/she will be at the office. When his/her shift ends, the system automatically logs off the referenced user and logs on the user that will use the VoIP phone 1 in the following shift. As can be seen in the figures, a first user, Bob, will be working from 9:00 o'clock AM to 17:00 o'clock PM. Thus, he will automatically be logged in at 9:00 o'clock in the morning, and will be automatically logged off at 17:00 o'clock in the afternoon. The second user, Lara, starts her shift from 7:00 o'clock and her shift ends at 01:00 o'clock in the morning. Again, the second user will be automatically logged in at the beginning of her shift, and logged off at the end of her shift. The same procedure applies with respect to the third user, who will be working from 01:00 o'clock in the morning to 9:00 o'clock in the morning.

    [0044] The method according to the present invention can be utilized in any kind of VoIP desktop telephony device as long as this device acts as a gateway for the user's terminal device connection to the LAN network, and it provides an automated way to handle multiple logins from users sharing the same VoIP phone device in shifts, while it prevents a user from making errors during the registration procedure.