Peer-to-peer, internet protocol telephone system with auto-attendant
First Claim
1. A telephone terminal of a peer-to-peer telephone system comprising a plurality of telephone terminals, the telephone terminal comprising:
- circuitry configured to couple the telephone terminal to an Internet Protocol (IP) network of the peer-to-peer telephone system, store for the telephone terminal system-wide configuration data comprising data used to configure each telephone terminal of the peer-to-peer telephone system for one or more telephony features of the peer-to-peer telephone system, and store files for the telephone terminal; and
a server configured to determine whether the system-wide configuration data references a file not stored by the circuitry, wherein the file comprises further configuration data used to configure each telephone terminal of the peer-to-peer telephone system for one or more telephony features of the peer-to-peer telephone system, and request the file from another telephone terminal of the peer-to-peer telephone system in response to determining that the circuitry does not store the filewherein the circuitry is further configured to store a lock count for each stored file, wherein each lock count tracks active references to its respective stored file, andwherein the server is further configured to increment the lock count of a file in response to determining that the system-wide configuration data newly references the file; and
wherein the server is further configured to decrement the lock count of a file in response to determining that the system-wide configuration data no longer references the file.
0 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments disclosed herein provide a Peer-to-Peer (P2P, Internet Protocol (IP) telephone system. The telephone system includes a plurality of terminals coupled together via an IP network. The terminals cooperate with one another to provide telephony features without a dedicated central controller such as a PBX and/or a KSU controller. The terminals may store system-wide configuration data and files referenced by the system-wide configuration data. The terminals may further determine whether the system-wide configuration data references a file that is not stored in the terminal, and requesting the file from another terminal of the telephone system in response to determining the terminal does not have a copy of the file.
20 Citations
20 Claims
-
1. A telephone terminal of a peer-to-peer telephone system comprising a plurality of telephone terminals, the telephone terminal comprising:
-
circuitry configured to couple the telephone terminal to an Internet Protocol (IP) network of the peer-to-peer telephone system, store for the telephone terminal system-wide configuration data comprising data used to configure each telephone terminal of the peer-to-peer telephone system for one or more telephony features of the peer-to-peer telephone system, and store files for the telephone terminal; and a server configured to determine whether the system-wide configuration data references a file not stored by the circuitry, wherein the file comprises further configuration data used to configure each telephone terminal of the peer-to-peer telephone system for one or more telephony features of the peer-to-peer telephone system, and request the file from another telephone terminal of the peer-to-peer telephone system in response to determining that the circuitry does not store the file wherein the circuitry is further configured to store a lock count for each stored file, wherein each lock count tracks active references to its respective stored file, and wherein the server is further configured to increment the lock count of a file in response to determining that the system-wide configuration data newly references the file; and
wherein the server is further configured to decrement the lock count of a file in response to determining that the system-wide configuration data no longer references the file. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for maintaining configuration data in a peer-to-peer telephone system comprising a plurality of telephone terminals, the method comprising:
-
storing system-wide configuration data and files referenced by the system-wide configuration data in a telephone terminal of the peer-to-peer telephone system, wherein the system-wide configuration data and the referenced files comprise data used to configure each telephone terminal of the peer-to-peer telephone system for one or more telephony features of the peer-to-peer telephone system; determining whether the system-wide configuration data references a file that is not stored in the telephone terminal; and requesting the file from another telephone terminal of the peer-to-peer telephone system in response to determining that the telephone terminal does not have the file stored; storing a lock count for each stored file, wherein each lock count tracks active references to its respective stored file; and incrementing the lock count of a file in response to determining that the system-wide configuration data newly references the file. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium comprising a plurality of instructions, that in response to being executed, configure an Internet Protocol (IP) telephone terminal of a peer-to-peer telephone system comprising a plurality of telephone terminals to:
-
store system-wide configuration data and files referenced by the system-wide configuration data, wherein the system-wide configuration data and the referenced files comprise data used to configure each telephone terminal of the peer-to-peer telephone system for one or more telephone features of the peer-to-peer telephone system; determine whether the system-wide configuration data references a file that is not stored in the IP telephone terminal; and request the file from another telephone terminal of the peer-to-peer telephone system in response to determining the IP telephone terminal does not have the file stored; store a lock count for each stored file, wherein each lock count tracks active references to its respective stored file; and decrement the lock count of the file in response to determining that the system-wide configuration data no longer references the file. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification