CA2284177C - Use of web technology for subscriber management activities - Google Patents
Use of web technology for subscriber management activities Download PDFInfo
- Publication number
- CA2284177C CA2284177C CA002284177A CA2284177A CA2284177C CA 2284177 C CA2284177 C CA 2284177C CA 002284177 A CA002284177 A CA 002284177A CA 2284177 A CA2284177 A CA 2284177A CA 2284177 C CA2284177 C CA 2284177C
- Authority
- CA
- Canada
- Prior art keywords
- web
- network element
- server
- data
- customer administrative
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q3/00—Selecting arrangements
- H04Q3/0016—Arrangements providing connection between exchanges
- H04Q3/0029—Provisions for intelligent networking
- H04Q3/0033—Provisions for intelligent networking customer-controlled
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0246—Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols
- H04L41/0253—Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols using browsers or web-pages for accessing management information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13098—Mobile subscriber
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13103—Memory
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13109—Initializing, personal profile
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13141—Hunting for free outlet, circuit or channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13175—Graphical user interface [GUI], WWW interface, visual indication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13339—Ciphering, encryption, security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13349—Network management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13389—LAN, internet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13513—UPT - personal as opposed to terminal mobility, inc. number portability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13534—Internet - WWW, HTML, browsers etc.
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13547—Indexing scheme relating to selecting arrangements in general and for multiplex systems subscriber, e.g. profile, database, database access
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99933—Query processing, i.e. searching
Abstract
External entity (36) data access to the customer administrative system (14) and database network elements (16) of a telecommunications network (10) is provided through a web-server (32) and an Internet (30) connection. The integrity and security of any stored data is protected through the use of a firewall (34) implemented at the web-server. In one aspect, an interface (12) is connected between the customer administrative system (14) and database network elements (16) and i s also connected to the web-server (32) to handle external entity (36) requests by specifying not only which actions need to be taken b ut also routing the request to a proper destination. In a second aspect, the interface (12) is by-passed with respect to the handling of external entity (36) requests, with the web-server (32) specifying the actions to be taken and routing the request to the proper destination.</SDOA B>
Description
USE OF WEB TECHNOLOGY FOR
SUBSCRIBER MANAGEMENT ACTIVITIES
CROSS REFERENCE TO RELATED APPLICATION
The present application for patent is related to, and claims priority from U.S. Patent No. 5,999,973 with a priority date of March 28, 1997, entitled "Use of Web Technology for Subscriber Management Activities" by Roch Glitho, et al.
BACKGROUND OF THE INVENTION
Technical Field of the Invention The present invention relates to wireless telecommunications systems and, in particular, to the use of web (i.e., Internet) technology to access and manage data stored in a customer administrative system (CAS) and/or a network element such as a home location register (HLR) database or a wireless service control node (WSCN).
'~'~.c~. 'p~rion of Related art Reference is now made to FIGURE 1 wherein there is shown a block diagram of a portion of a telecommunications network 10 implementing an interface (IF) 12 between a customer administrative system (CAS) I4 and a plurality of database network elements (NE) 16. The interface 12, customer administrative system 14, and.datahase network elements 16 are interconnected using a network preferably comprising a network, such as an X.25 network, separate and apart from the telecommunications network I0. The telecommunications network 10 comprises a wirEless (for example, cellular} communications system, and the database network elements 16 comprise, for example, a home location register (HLR) or a wireless service control node (WSCN). The home location register/wireless service control node functions in a database fashion to store permanent and temporary wireless subscriber data. The permanent data stored in the home location registerlwireless 3D service control node comprises fixed information concerning the communications service subscripted to by each subscriber. The temporary data stored in the home location registerlwireless service control node comprises variable information concerning the current location of each subscriber. With respect to the wireless service control node, further functional operations are supported in connection with the provided of subscriber services {such as intelligent network sexvices).
The customer administrative system 14 is utilized to engage in transactions relating to the administrationof the permanent.data stored in each database network element 16. These administration activities, in general, relate to transactions performed for the purposes of user (i.e., subscriber) creation or definition, service activation, and the like, relating to a given user. More particularly, the transactions relate to subscriber data administration tasks such as:
S - subscription initiation/removal/status, - subscriber activation/cancellation, - service provision/withdrawal/activation/passivation, - C-number (transfer) definition, - pass code changes, and - serial number changes.
The transactions may further relate to authentication administration tasks such as authentication activation/change/deactivation/status. Additionally, the transactions relate to numbering plan configuration including number range assignment, numbering plan deletion and numbering plan viewing.
1 S A service operator is the entity that implements and maintains the infrastructure comprising the telecommunications network Z0. The service operator typically utilizes licensed retailers to market and sell subscriptions for telecommunications services to individual users (i.e., the subscribers). The service operator may further sell blocks of subscriptions to yet another entity referred to as a service provider. The service provider then markets and leases/sells these subscriptions (perhaps also through the use of its own retailers) on an individual or group basis to end user subscribers.
Access to and management of the data stored in the customer administrative system 14 and the database network elements 16 is typically restricted to the service operator. In this regard, the service operator takes responsibility through its customer administrative system 14 for controlling the transactions discussed above relating to the administration of the permanent data stored in each database network element 16. Now that more and more service providers are purchasing blocks of subscriptions for their own management, there is an interest in granting the service provider access to the customer administrative system 14 and each database network element 16 for transactions and/or limited or restricted data entry, review and modification purposes in connection with the permanent data administration tasks.
Similarly, in connection with the establishment of new subscriptions, retailers also desire access to the customer administrative system 14 and each database network element 16 for transactions and/or limited or restricted data entry, review and modification purposes. Furthermore, the users themselves desire access to their home database network element 16 for transactions and/or limited or restricted data entry, review and modification purposes in connection with maintenance of certain aspects of the permanent data comprising their subscription (such as, for example, ' their forward-to, speed dialing, and call screening lists).
Concerns over maintaining the integrity and security of the data stored in the S customer administrative system 14 and each database network element 16 must be addressed before these kinds of external entity accesses are granted.
Furthermore, an economical and user friendly mechanism is needed to provide the service providers, retailers and users with transaction-related data access to the customer administrative system 14 and each database network element I6.
SUMMARY OF THE INVENTION
The present invention addresses the foregoing concerns relating to transaction-related data access to and maintaining the integrity and security of data stored in the customer administrative system and database network elements by I S permitting external entity data access through a web-server and an Internet connection. Sufficient security measures are implemented at the web-server (for example, through the use of a firewall) to restrict external entity rights to access and modify stored data. In a first embodiment, an interface supporting transaction logic, redundancy logic, query oriented logic and data migration logic functionalities is connected between the customer administrative system and database network elements and also to the web-server. All external entity originated data transactions, queries and modifications pass through the interface, with the logic therein utilized to specify, based on the received external entity request, the action or actions that need to be taken to implement the request, and further for proper routing of the request to the appropriate one or ones of the customer administrative system and database network elements for handling. In a second embodiment, the web-server maintains a direct connection to each of the customer administrative system and database network elements thus effectively by-passing the interface with respect to the handling of external entity requests. The transaction logic, redundancy logic, query oriented logic and data migration logic functionalities are then also maintained in the web-server to specify based on the received request the actions to be taken, ' and to route the request accordingly.
BRIEF DESCRIPTION OF THE DRAWINGS
3 5 A more complete understanding of the method and apparatus of the present invention may be acquired by reference to the following Detailed Description when taken in conjunction with the accompanying Drawings wherein:
SUBSCRIBER MANAGEMENT ACTIVITIES
CROSS REFERENCE TO RELATED APPLICATION
The present application for patent is related to, and claims priority from U.S. Patent No. 5,999,973 with a priority date of March 28, 1997, entitled "Use of Web Technology for Subscriber Management Activities" by Roch Glitho, et al.
BACKGROUND OF THE INVENTION
Technical Field of the Invention The present invention relates to wireless telecommunications systems and, in particular, to the use of web (i.e., Internet) technology to access and manage data stored in a customer administrative system (CAS) and/or a network element such as a home location register (HLR) database or a wireless service control node (WSCN).
'~'~.c~. 'p~rion of Related art Reference is now made to FIGURE 1 wherein there is shown a block diagram of a portion of a telecommunications network 10 implementing an interface (IF) 12 between a customer administrative system (CAS) I4 and a plurality of database network elements (NE) 16. The interface 12, customer administrative system 14, and.datahase network elements 16 are interconnected using a network preferably comprising a network, such as an X.25 network, separate and apart from the telecommunications network I0. The telecommunications network 10 comprises a wirEless (for example, cellular} communications system, and the database network elements 16 comprise, for example, a home location register (HLR) or a wireless service control node (WSCN). The home location register/wireless service control node functions in a database fashion to store permanent and temporary wireless subscriber data. The permanent data stored in the home location registerlwireless 3D service control node comprises fixed information concerning the communications service subscripted to by each subscriber. The temporary data stored in the home location registerlwireless service control node comprises variable information concerning the current location of each subscriber. With respect to the wireless service control node, further functional operations are supported in connection with the provided of subscriber services {such as intelligent network sexvices).
The customer administrative system 14 is utilized to engage in transactions relating to the administrationof the permanent.data stored in each database network element 16. These administration activities, in general, relate to transactions performed for the purposes of user (i.e., subscriber) creation or definition, service activation, and the like, relating to a given user. More particularly, the transactions relate to subscriber data administration tasks such as:
S - subscription initiation/removal/status, - subscriber activation/cancellation, - service provision/withdrawal/activation/passivation, - C-number (transfer) definition, - pass code changes, and - serial number changes.
The transactions may further relate to authentication administration tasks such as authentication activation/change/deactivation/status. Additionally, the transactions relate to numbering plan configuration including number range assignment, numbering plan deletion and numbering plan viewing.
1 S A service operator is the entity that implements and maintains the infrastructure comprising the telecommunications network Z0. The service operator typically utilizes licensed retailers to market and sell subscriptions for telecommunications services to individual users (i.e., the subscribers). The service operator may further sell blocks of subscriptions to yet another entity referred to as a service provider. The service provider then markets and leases/sells these subscriptions (perhaps also through the use of its own retailers) on an individual or group basis to end user subscribers.
Access to and management of the data stored in the customer administrative system 14 and the database network elements 16 is typically restricted to the service operator. In this regard, the service operator takes responsibility through its customer administrative system 14 for controlling the transactions discussed above relating to the administration of the permanent data stored in each database network element 16. Now that more and more service providers are purchasing blocks of subscriptions for their own management, there is an interest in granting the service provider access to the customer administrative system 14 and each database network element 16 for transactions and/or limited or restricted data entry, review and modification purposes in connection with the permanent data administration tasks.
Similarly, in connection with the establishment of new subscriptions, retailers also desire access to the customer administrative system 14 and each database network element 16 for transactions and/or limited or restricted data entry, review and modification purposes. Furthermore, the users themselves desire access to their home database network element 16 for transactions and/or limited or restricted data entry, review and modification purposes in connection with maintenance of certain aspects of the permanent data comprising their subscription (such as, for example, ' their forward-to, speed dialing, and call screening lists).
Concerns over maintaining the integrity and security of the data stored in the S customer administrative system 14 and each database network element 16 must be addressed before these kinds of external entity accesses are granted.
Furthermore, an economical and user friendly mechanism is needed to provide the service providers, retailers and users with transaction-related data access to the customer administrative system 14 and each database network element I6.
SUMMARY OF THE INVENTION
The present invention addresses the foregoing concerns relating to transaction-related data access to and maintaining the integrity and security of data stored in the customer administrative system and database network elements by I S permitting external entity data access through a web-server and an Internet connection. Sufficient security measures are implemented at the web-server (for example, through the use of a firewall) to restrict external entity rights to access and modify stored data. In a first embodiment, an interface supporting transaction logic, redundancy logic, query oriented logic and data migration logic functionalities is connected between the customer administrative system and database network elements and also to the web-server. All external entity originated data transactions, queries and modifications pass through the interface, with the logic therein utilized to specify, based on the received external entity request, the action or actions that need to be taken to implement the request, and further for proper routing of the request to the appropriate one or ones of the customer administrative system and database network elements for handling. In a second embodiment, the web-server maintains a direct connection to each of the customer administrative system and database network elements thus effectively by-passing the interface with respect to the handling of external entity requests. The transaction logic, redundancy logic, query oriented logic and data migration logic functionalities are then also maintained in the web-server to specify based on the received request the actions to be taken, ' and to route the request accordingly.
BRIEF DESCRIPTION OF THE DRAWINGS
3 5 A more complete understanding of the method and apparatus of the present invention may be acquired by reference to the following Detailed Description when taken in conjunction with the accompanying Drawings wherein:
FIGURE 1 is a block diagram of a portion of a telecommunications network illustrating a first embodiment of present invention; and FIGURE 2 is a block diagram of a portion of a telecommunications network illustrating a second embodiment of present invention.
DETAILED DESCRIPTION OF THE DRAWINGS
Continued reference is now made to FIGURE 1 for a description of a first embodiment of the present invention.
The interface 12 functions as a service order gateway (SOG) or service management access layer (SMAL) with respect to managing data access among and between the customer administrative system 14, the database network elements and external entities (to be described).
In one aspect, the interface 12 utilizes a transaction logic 20 to support the customer administrative system 14 and external entity operations and transactions concerning the administration of subscriber data (relating to subscriptions, services and the like), authentication data and numbering plan data. This transaction logic receives orders originated at the customer administrative system 14 or external entity, identifies the particular actions) to be taken by the customer administrative system 14 or a database network element 16 in connection with that order, identifies 20 the commands needed to effectuate those actions, converts those commands to a proper format for communication to and/understanding by the customer administrative system or that database network element, and issues the properly formatted commands. The transaction oriented logic 20 further receives any response to the order from the customer administrative system 14 or identified database network element 16, converts the response (if necessary) to a proper format for communication to and/understanding by the customer administrative system or external entity that originated the order, and routes the properly formatted response thereto.
In another aspect, the interface 12 utilizes a redundancy logic 22 to support automated redundancy of customer administration system 14 administered (and perhaps external entity specified) subscriber data (relating to subscriptions, services and the like), authentication data and numbering plan data among and between the customer administrative system 14 and the database network elements 16. This redundancy logic 22, operating in conjunction with transaction logic 20, functions 3 S to identify for each received subscriber data order the customer administrative system 14 and/or plural database network elements 16 that are affected by the order (i.e., both the primary and redundant database network elements), identify the particular actions) to be taken by the customer administrative system and/or each database network element in connection with that order, identify the commands needed to effectuate those actions, convert each of those commands to a proper format for communication to and/understanding by the customer administrative system and/or the identified database network elements, and issues the commands to each of those nodes. To support this redundancy operation, the redundancy logic 22 keeps track of the inter-relationships between the plural database network elements 16 concerning administered subscriber data, authentication data and numbering plan data. The redundancy logic 22 accordingly recognizes for each subscriber which of the plural database network elements 16 comprises the primary database network element, and which of the plural database network elements comprises the redundant database network elements. For each order, the appropriate ones of the plural database network elements 16 are identified and issued appropriately formatted commands. Similarly, the redundancy logic 22 recognizes which instances of redundant administration of subscriber data require updating of the customer administrative system 14, and issues appropriately formatted commands.
In yet another aspect, the interface 12 further utilizes a query oriented logic 24 to support the querying of the customer administrative system 14 and/or the plurality of database network elements 16 regarding the stored permanent information. These queries involve operation to search the permanent data stored in the customer administrative system 14 and/or each database network element 16.
This query oriented logic 24 receives search requests, determines which one or ones of the customer administrative system 14 and database network elements 16 need to be queried to complete the search request, converts those requests into queries having a proper format for communication to and/understanding by each individual one of the necessary customer administrative system and database network elements, and routes properly formatted queries to the necessary customer administrative system and database network element for handling. Following customer administrative system 14 and/or database network element 16 handling of the query, search results are returned back to the interface 12. The query oriented logic then collects the data of the returned search results in a file, signals the requesting entity which originated the search request, and engages in a file transfer of the data (properly formatted) with that originating requesting entity.
In still another aspect, the interface 12 utilizes a data migration logic 26 to support the transfer of subscriber data among and between the customer administrative system 14, the database network elements 16 and external entities.
_6_ This data migration logic 26 receives migration requests, determines which nodes {such as, for example, certain ones of the database network elements 16)'comprise the source and destination nodes for the migration, generates migration commands having a proper format for communication to andlunderstanding by each individual one of the necessary nodes, and routes the properly formatted commands to the necessary nodes for handling.
A more complete descriptioil of the transaction logic 20, redundancy logic 22, query oriented logic 24 and data migration logic 26 of the interface 12 may be obtained by reference U~ the following, commonly assigned U.S. patents:
- CUSTOMER ADMIrIISTRATIVE SYSTEM MANAGEMENT OF
REDUNDANT DATABASE NETWORK E~INTS IN A
TELECOMMUNICATIONS SYSTEM, US-6,494,660, issued on July 25, 2000;
- QUERY SUPPORTING INTERFACE BETWEEN A CUSTOMER
ADMINISTRATIVE SYSTEM AND DATABASE N~'WORK ELEMENTS OF
A TFI Fr_.OMMUNICATIONS SYSTEM, Serial No. US-6,134,544, issued on October 17, 2000; and - MIGRATION OF SUBSCRIBER DATA BETWEEN HOME LOCATION
REGISTERS OF A TELECOMMUNICATIONS SYSTEM, US-6,115,463, issued on September 5, 2000.
External entity access to the telecommunications network 10 and, in particular, the interface 12 is provided through the Internet 30 and a web-server 32.
The interface 12 is connected to the web-server 32 through a TCP/IP type of connection. The web-server 32 is connected to the Internet 30 through a TCPIIP
type of connection. The web-server supports both hyper-text transfer protocol (HTTP) and secure hyper-text transfer protocol {S-HTTP) access over the Internet 30. A firewall 34 is utilized to provide front end security protection against ail accesses to the interior network (i.e., the telecommunicationsnetwork 10 including the customer administrative system 14 and the database network elements 16) except for those designated and authorized as legitimate service accesses.
The external entities at issue herein comprise service providers, retailers and users. Utilizing a terminal (T) or personal computer (PC) 36 having dial-up Internet 30 access capabilities and web-browser software, the service provider, retailer or user may obtain, through the web-server 32, limited and restricted transaction-related data access to the customer administrative system 14 and each database network element 16 of the network 10. The web-server 32 is accordingly provided with a world-wide-web (WWW) address in order to support Internet access. With this data access, and further through use of the transaction logic 20, query oriented logic 24 and data migration logic 26 provided by the interface 12, the service provider, retailer or user may engage in permitted data transactions, query for stored information, and specify data migrations. The redundancy logic 22 of the interface 12 further insures that back-up copies of the data affected by service provider, retailer or user data access are appropriately made and distributed throughout the nodes for storage. It is, of course, understood that the various functionalities provided by the transaction logic 20, query oriented logic 24 and data migration logic 26 may not be available for use by each of the service provider, retailer or user. The firewall 34 and web-server 30 accordingly function in tandem to control the nature of permitted external entity data access to the network 10, and thus restrict each of the service provider, retailer or user to only permitted types of accesses and actions.
The firewall 34 implements a "screened subnet" type of architecture.
Screened subnet type firewalls utilizing a pair of packet filters and a bastion host (all interconnected through a subnet) are well known to those skilled in the art.
Utilizing this firewall architecture, the host platforms for the interface 12 and the web-server 32 are advantageously detached from each other. This firewall supported routing mechanism provides enhanced security. In the event one of the components becomes compromised, the remaining components continue to provide a line of defense against unauthorized intrusion into the network 10 through the Internet 30.
The web-server 32 is programmed to support one or more types of external entity access to the network 10. Each type of access provides a different level of security. Furthermore, the programming may specify that different classes of external entities be given different types of access. For example, a user may be given the most restricted access to network over the Internet 30. Conversely, a service provider may be given almost unrestricted access to the network. The programming further specifies the level of data access to be given to the different classes of external entities. Again, for example, the user may be restricted to a very limited right to access, modify and create data stored on the network 10. The service provider, on the other hand, may not be so restricted.
A first type of network access comprises an "off line" access. The basic 3 S operating scheme of the off line access system is that when an external entity makes a data access request over the Internet 30, the request is temporarily logged in the web-server 32. The external entity receives a return message indicating that the _g_ request has been logged and will be processed as soon as possible (assuming, of course, that the external entity is authorized for the level of data access required to implement their request). Once the connection with the external entity over the Internet 30 is broken, the temporarily logged request is communicated to the interface 12 for handling by the appropriate one or ones of the transaction logic 20, redundancy logic 22, query oriented logic 24 and data migration logic 26. This access solution has an advantage of providing significant security to the network 10.
However, the solution does have a number of drawbacks including the web-server 32 in this type of network access does not support simultaneous connection to the external entity and the information stored in the customer administrative system 14 and the database network elements 16. Accordingly, external entities cannot view this information through their web browser software before specifying data changes or modifications.
A second type of network access comprises an "off line with cache" access.
The basic operating scheme of the off-line with cache access system is the same as with the off line system described above, with the exception that certain customer administrative system 14 and database network element 16 stored data of popular interest to external entities is stored in parallel by the web-server 32 using a cache 38. With this solution, the external entity is able to view the cached portion of the information stored in the customer administrative system 14 and the database network elements 16 during their Internet 30 access session, and further review and consider this information in connection with the making of their data access request.
Another benefit of this solution is the maintenance of a significant level of security to the network 10 (comparable to that provided with the off line system described above). However, the solution does have a number of drawbacks including:
requiring service management command activities affecting the stored data to be duplicated in the network nodes as well as in the cache; synchronizing external entity data management functions with telecommunications network functions; and, providing the web-server 32 with sufficient processing capabilities to handle not only external entity communications but also the updating of the cache 38.
A third type of network access comprises an "on-line" access. The basic operating scheme of the on-line access system is to give the external entity interactive, real-time access to the data stored customer administrative system 14 and database network element 16. When an external entity makes a data access request over the Internet 30, the request is passed on through the web-server 32 to the interface 12 (assuming, of course, that the external entity is authorized for the level of data access required to implement their request). The interface 12 then handles WO 98!44747 PCT/SE98/00519 _g_ the received request using an appropriate one or ones of the transaction logic 20, redundancy logic 22, query oriented logic 24 and data migration logic 26.
Following handling as necessary, a reply is generated for communication back through the web-server 32 to the external entity.
The on-line access system accordingly allows for the establishment of a communications channel over the Internet and through to the data storage and management nodes of the network. This architecture raises significant concerns regarding the provision of adequate security measures to protect against unauthorized data access. Use of the firewall 34 becomes an absolute requirement. In addition, other measures, such as filtering of requests, restricted zone architectures for the web-server and interface, low permission levels, and security measures for the host platforms, are implemented to increase security. Other concerns with the on-line system relate to performance issues such as the web-server handling more pending requests due to the delay between request receipt and issuance of the reply, and bandwidth concerns relating to the communications links among and between the interface 12, customer administrative system 14 and database network element 16.
A fourth type of network access comprises a "hybrid on-line/off-line" access.
The basic operating scheme of the hybrid on-line/off line system is to allow on-line fetching of data from the customer administrative system 14 and database network elements 16 using the query oriented logic 24 of the interface 12 in response to external entity requests in a manner similar to the on-line system described above.
In the event that the web-server further supports the use of a cache 38, the cache is checked by the web-server 32 in response to an external entity request before implementing the query oriented logic 24 of the interface 12. All other data accesses to the customer administrative system 14 and database network elements 16 for the purpose of accessing, modifying and creating data using the transaction logic 20, redundancy logic 22 and data migration logic 26 occur in a manner similar to the off line system described above.
Reference is now made to FIGURE 2 wherein there is shown a block diagram of a portion of a telecommunications network illustrating a second embodiment of present invention. In this embodiment, the interface 12 is by-passed concerning external entity data management operations, and the web-server 32 {using its firewall 34) is connected directly to each of the customer administrative system 14 and database network elements 16 through a local web-server 32' . It is, of course, understood that the interface 12 remains in place with its requisite functionality (20, 22, 24 and 26, not shown, see FIGURE 1 ) to handle transactions originated at the customer administrative system 14, and further to respond, as necessary, to an external entity actions taken directly with the customer administrative system 14 and database network elements 16. The web-server 32 may also implement one or more of the transaction logic 20, redundancy logic 22, query oriented logic 24 and data migration logic 26, as necessary and as shown, to support external entity requests and network 10 operation. The web-server 32 is connected to the local web-server 32' for each of the customer administrative system 14 and database network elements 16 through a TCP/IP type of connection. With this configuration, the interface 12 is no longer utilized to route external entity requests and data management activities among and between the customer administrative system 14 and database network elements 16. Routing is handled by the web-server 32, and processing of the requests to generate responses is handled by the local web-servers 32' .
As there are multiple destinations in the second embodiment for external entity Internet access (i.e., the customer administrative system 14 and each of the database network elements 16} a different WWW address may be provided for each destination. There is, however, a convenience advantage to maintaining only the single WWW address (for example, the address of the web-server 32 (as described above)) for external entity Internet access. Accordingly, proper routing of external entity requests and data management activities concerning that single address to the customer administrative system 14 and each of the database network elements 16 is supported using Javascript and an intelligent proxy in the firewall 34.
The advantages of the architecture of the second embodiment include: one mapping from hyper-text mark-up language (HTML) to the access protocol of the customer administrative system 14 and database network element 16 nodes; local web-server 32' provided by vendor in conjunction with the network node; the web-related communications channels are separated from the telecommunications network 10; and, no need for the presence of an interface 12. The disadvantages of this implementation include: duplicative routing; and, added cost due to the need for local web-servers 32' .
A more complete understanding of the operation of the present invention in supporting external entity data management activities using web technology may be obtained through examination of the following exemplary situations. First, consider the cellular telephone user. A significant amount of subscriber entered and controlled data is stored in the database network elements 16. Conventional telecommunications network 10 operation allows the user to review, modify and create this data, and perhaps engage in some transactions, through the cellular mobile station. The primarily numeric keypad of the cellular mobile station does not conveniently lend itself to accessing and entering this data. Similarly, the small display provided on the cellular mobile station does not conveniently lend itself to efficiently reviewing this data. Through the present invention, the user is given web access to this database network element 16 stored data. It is important to note here S that the security protections afforded by the web-server 32 and firewall 34 prevent the user from gaining access to the customer administrative system 14, and limit database network element 16 access to only that user's subscription. Through the convenience of the user's personal computer, and Internet 30 connection is made with the web-server 32. Query requests may then be made to review this stored data. Furthermore, data management transactions may be ordered to create or modify the stored data. Examples of the data at issue with respect to users comprises forward-to lists, location based services data, speed dialing list, and the like.
Turning next to retailers, in connection with the sale of cellular services to a user, the retailer needs to input certain subscriber information into both the customer administrative system 14 and the database network element 16. The data input into the customer administrative system 14 comprises subscription related data such as the subscriber number (SNB), mobile subscriber number (MSNB), serial number (SRNB) and service related data. The data input into the database network element 16 comprises the same service related data as mentioned above with respect to user access. Retailer access to the customer administrative system 14 and the database network element 16 relating to other actions, activities and transactions, such as those discussed herein, may also be supported. Conventional telecommunications network 10 operation required the retailer to supply the necessary information in hard copy format directly to the service operator.
Through the present invention, the retailer is given web access to the customer administrative system 14 and database network element 16 stored data for the user. It is important to note here that the security protections afforded by the web-server 32 and firewall 34 limit retailer access to the customer administrative system 14 and database network element 16 to only that necessary to establish or support user subscriptions.
Through the convenience of the retailer's personal computer, and Internet 30 connection is made with the web-server 32. Query requests may then be made to review this stored data. Furthermore, data management transactions rnay be ordered to create or modify the stored data.
Turning next to the service provider, in connection with the purchase of blocks of subscriptions and the marketing of those subscriptions, the service provider needs to input certain subscriber information into both the customer administrative system 14 and the database network element 16. The data input into the customer administrative system 14 comprises subscription related data such as the subscriber number (SNB), mobile subscriber number (MSNB) and serial number (SRNB).
Service provider access to the customer administrative system 14 relating to other actions, activities and transactions may also be supported. Data input by the service provider into the database network element 16 would not typically be allowed.
However, access to the database network element for other actions, such as activations, may be permitted. Conventional telecommunications network 10 operation required the service operator to supply the necessary information in hard copy format directly to the service operator. Through the present invention, the service provider is given web access to the customer administrative system 14 and database network element 16 stored data for its block of subscriptions. It is important to note here that the security protections afforded by the web-server 32 and firewall 34 limit service provider access to the customer administrative system 14 and database network element 16 to only that necessary to establish or support its purchased block of subscriptions. Through the convenience of the service provider's personal computer, and Internet 30 connection is made with the web server 32. Query requests may then be made to review this stored data.
Furthermore, data management transactions may be ordered to create or modify the stored data.
Although preferred embodiments of the method and apparatus of the present invention have been illustrated in the accompanying Drawings and described in the foregoing Detailed Description, it will be understood that the invention is not limited to the embodiments disclosed, but is capable of numerous rearrangements, modifications and substitutions without departing from the spirit of the invention as set forth and defined by the following claims.
DETAILED DESCRIPTION OF THE DRAWINGS
Continued reference is now made to FIGURE 1 for a description of a first embodiment of the present invention.
The interface 12 functions as a service order gateway (SOG) or service management access layer (SMAL) with respect to managing data access among and between the customer administrative system 14, the database network elements and external entities (to be described).
In one aspect, the interface 12 utilizes a transaction logic 20 to support the customer administrative system 14 and external entity operations and transactions concerning the administration of subscriber data (relating to subscriptions, services and the like), authentication data and numbering plan data. This transaction logic receives orders originated at the customer administrative system 14 or external entity, identifies the particular actions) to be taken by the customer administrative system 14 or a database network element 16 in connection with that order, identifies 20 the commands needed to effectuate those actions, converts those commands to a proper format for communication to and/understanding by the customer administrative system or that database network element, and issues the properly formatted commands. The transaction oriented logic 20 further receives any response to the order from the customer administrative system 14 or identified database network element 16, converts the response (if necessary) to a proper format for communication to and/understanding by the customer administrative system or external entity that originated the order, and routes the properly formatted response thereto.
In another aspect, the interface 12 utilizes a redundancy logic 22 to support automated redundancy of customer administration system 14 administered (and perhaps external entity specified) subscriber data (relating to subscriptions, services and the like), authentication data and numbering plan data among and between the customer administrative system 14 and the database network elements 16. This redundancy logic 22, operating in conjunction with transaction logic 20, functions 3 S to identify for each received subscriber data order the customer administrative system 14 and/or plural database network elements 16 that are affected by the order (i.e., both the primary and redundant database network elements), identify the particular actions) to be taken by the customer administrative system and/or each database network element in connection with that order, identify the commands needed to effectuate those actions, convert each of those commands to a proper format for communication to and/understanding by the customer administrative system and/or the identified database network elements, and issues the commands to each of those nodes. To support this redundancy operation, the redundancy logic 22 keeps track of the inter-relationships between the plural database network elements 16 concerning administered subscriber data, authentication data and numbering plan data. The redundancy logic 22 accordingly recognizes for each subscriber which of the plural database network elements 16 comprises the primary database network element, and which of the plural database network elements comprises the redundant database network elements. For each order, the appropriate ones of the plural database network elements 16 are identified and issued appropriately formatted commands. Similarly, the redundancy logic 22 recognizes which instances of redundant administration of subscriber data require updating of the customer administrative system 14, and issues appropriately formatted commands.
In yet another aspect, the interface 12 further utilizes a query oriented logic 24 to support the querying of the customer administrative system 14 and/or the plurality of database network elements 16 regarding the stored permanent information. These queries involve operation to search the permanent data stored in the customer administrative system 14 and/or each database network element 16.
This query oriented logic 24 receives search requests, determines which one or ones of the customer administrative system 14 and database network elements 16 need to be queried to complete the search request, converts those requests into queries having a proper format for communication to and/understanding by each individual one of the necessary customer administrative system and database network elements, and routes properly formatted queries to the necessary customer administrative system and database network element for handling. Following customer administrative system 14 and/or database network element 16 handling of the query, search results are returned back to the interface 12. The query oriented logic then collects the data of the returned search results in a file, signals the requesting entity which originated the search request, and engages in a file transfer of the data (properly formatted) with that originating requesting entity.
In still another aspect, the interface 12 utilizes a data migration logic 26 to support the transfer of subscriber data among and between the customer administrative system 14, the database network elements 16 and external entities.
_6_ This data migration logic 26 receives migration requests, determines which nodes {such as, for example, certain ones of the database network elements 16)'comprise the source and destination nodes for the migration, generates migration commands having a proper format for communication to andlunderstanding by each individual one of the necessary nodes, and routes the properly formatted commands to the necessary nodes for handling.
A more complete descriptioil of the transaction logic 20, redundancy logic 22, query oriented logic 24 and data migration logic 26 of the interface 12 may be obtained by reference U~ the following, commonly assigned U.S. patents:
- CUSTOMER ADMIrIISTRATIVE SYSTEM MANAGEMENT OF
REDUNDANT DATABASE NETWORK E~INTS IN A
TELECOMMUNICATIONS SYSTEM, US-6,494,660, issued on July 25, 2000;
- QUERY SUPPORTING INTERFACE BETWEEN A CUSTOMER
ADMINISTRATIVE SYSTEM AND DATABASE N~'WORK ELEMENTS OF
A TFI Fr_.OMMUNICATIONS SYSTEM, Serial No. US-6,134,544, issued on October 17, 2000; and - MIGRATION OF SUBSCRIBER DATA BETWEEN HOME LOCATION
REGISTERS OF A TELECOMMUNICATIONS SYSTEM, US-6,115,463, issued on September 5, 2000.
External entity access to the telecommunications network 10 and, in particular, the interface 12 is provided through the Internet 30 and a web-server 32.
The interface 12 is connected to the web-server 32 through a TCP/IP type of connection. The web-server 32 is connected to the Internet 30 through a TCPIIP
type of connection. The web-server supports both hyper-text transfer protocol (HTTP) and secure hyper-text transfer protocol {S-HTTP) access over the Internet 30. A firewall 34 is utilized to provide front end security protection against ail accesses to the interior network (i.e., the telecommunicationsnetwork 10 including the customer administrative system 14 and the database network elements 16) except for those designated and authorized as legitimate service accesses.
The external entities at issue herein comprise service providers, retailers and users. Utilizing a terminal (T) or personal computer (PC) 36 having dial-up Internet 30 access capabilities and web-browser software, the service provider, retailer or user may obtain, through the web-server 32, limited and restricted transaction-related data access to the customer administrative system 14 and each database network element 16 of the network 10. The web-server 32 is accordingly provided with a world-wide-web (WWW) address in order to support Internet access. With this data access, and further through use of the transaction logic 20, query oriented logic 24 and data migration logic 26 provided by the interface 12, the service provider, retailer or user may engage in permitted data transactions, query for stored information, and specify data migrations. The redundancy logic 22 of the interface 12 further insures that back-up copies of the data affected by service provider, retailer or user data access are appropriately made and distributed throughout the nodes for storage. It is, of course, understood that the various functionalities provided by the transaction logic 20, query oriented logic 24 and data migration logic 26 may not be available for use by each of the service provider, retailer or user. The firewall 34 and web-server 30 accordingly function in tandem to control the nature of permitted external entity data access to the network 10, and thus restrict each of the service provider, retailer or user to only permitted types of accesses and actions.
The firewall 34 implements a "screened subnet" type of architecture.
Screened subnet type firewalls utilizing a pair of packet filters and a bastion host (all interconnected through a subnet) are well known to those skilled in the art.
Utilizing this firewall architecture, the host platforms for the interface 12 and the web-server 32 are advantageously detached from each other. This firewall supported routing mechanism provides enhanced security. In the event one of the components becomes compromised, the remaining components continue to provide a line of defense against unauthorized intrusion into the network 10 through the Internet 30.
The web-server 32 is programmed to support one or more types of external entity access to the network 10. Each type of access provides a different level of security. Furthermore, the programming may specify that different classes of external entities be given different types of access. For example, a user may be given the most restricted access to network over the Internet 30. Conversely, a service provider may be given almost unrestricted access to the network. The programming further specifies the level of data access to be given to the different classes of external entities. Again, for example, the user may be restricted to a very limited right to access, modify and create data stored on the network 10. The service provider, on the other hand, may not be so restricted.
A first type of network access comprises an "off line" access. The basic 3 S operating scheme of the off line access system is that when an external entity makes a data access request over the Internet 30, the request is temporarily logged in the web-server 32. The external entity receives a return message indicating that the _g_ request has been logged and will be processed as soon as possible (assuming, of course, that the external entity is authorized for the level of data access required to implement their request). Once the connection with the external entity over the Internet 30 is broken, the temporarily logged request is communicated to the interface 12 for handling by the appropriate one or ones of the transaction logic 20, redundancy logic 22, query oriented logic 24 and data migration logic 26. This access solution has an advantage of providing significant security to the network 10.
However, the solution does have a number of drawbacks including the web-server 32 in this type of network access does not support simultaneous connection to the external entity and the information stored in the customer administrative system 14 and the database network elements 16. Accordingly, external entities cannot view this information through their web browser software before specifying data changes or modifications.
A second type of network access comprises an "off line with cache" access.
The basic operating scheme of the off-line with cache access system is the same as with the off line system described above, with the exception that certain customer administrative system 14 and database network element 16 stored data of popular interest to external entities is stored in parallel by the web-server 32 using a cache 38. With this solution, the external entity is able to view the cached portion of the information stored in the customer administrative system 14 and the database network elements 16 during their Internet 30 access session, and further review and consider this information in connection with the making of their data access request.
Another benefit of this solution is the maintenance of a significant level of security to the network 10 (comparable to that provided with the off line system described above). However, the solution does have a number of drawbacks including:
requiring service management command activities affecting the stored data to be duplicated in the network nodes as well as in the cache; synchronizing external entity data management functions with telecommunications network functions; and, providing the web-server 32 with sufficient processing capabilities to handle not only external entity communications but also the updating of the cache 38.
A third type of network access comprises an "on-line" access. The basic operating scheme of the on-line access system is to give the external entity interactive, real-time access to the data stored customer administrative system 14 and database network element 16. When an external entity makes a data access request over the Internet 30, the request is passed on through the web-server 32 to the interface 12 (assuming, of course, that the external entity is authorized for the level of data access required to implement their request). The interface 12 then handles WO 98!44747 PCT/SE98/00519 _g_ the received request using an appropriate one or ones of the transaction logic 20, redundancy logic 22, query oriented logic 24 and data migration logic 26.
Following handling as necessary, a reply is generated for communication back through the web-server 32 to the external entity.
The on-line access system accordingly allows for the establishment of a communications channel over the Internet and through to the data storage and management nodes of the network. This architecture raises significant concerns regarding the provision of adequate security measures to protect against unauthorized data access. Use of the firewall 34 becomes an absolute requirement. In addition, other measures, such as filtering of requests, restricted zone architectures for the web-server and interface, low permission levels, and security measures for the host platforms, are implemented to increase security. Other concerns with the on-line system relate to performance issues such as the web-server handling more pending requests due to the delay between request receipt and issuance of the reply, and bandwidth concerns relating to the communications links among and between the interface 12, customer administrative system 14 and database network element 16.
A fourth type of network access comprises a "hybrid on-line/off-line" access.
The basic operating scheme of the hybrid on-line/off line system is to allow on-line fetching of data from the customer administrative system 14 and database network elements 16 using the query oriented logic 24 of the interface 12 in response to external entity requests in a manner similar to the on-line system described above.
In the event that the web-server further supports the use of a cache 38, the cache is checked by the web-server 32 in response to an external entity request before implementing the query oriented logic 24 of the interface 12. All other data accesses to the customer administrative system 14 and database network elements 16 for the purpose of accessing, modifying and creating data using the transaction logic 20, redundancy logic 22 and data migration logic 26 occur in a manner similar to the off line system described above.
Reference is now made to FIGURE 2 wherein there is shown a block diagram of a portion of a telecommunications network illustrating a second embodiment of present invention. In this embodiment, the interface 12 is by-passed concerning external entity data management operations, and the web-server 32 {using its firewall 34) is connected directly to each of the customer administrative system 14 and database network elements 16 through a local web-server 32' . It is, of course, understood that the interface 12 remains in place with its requisite functionality (20, 22, 24 and 26, not shown, see FIGURE 1 ) to handle transactions originated at the customer administrative system 14, and further to respond, as necessary, to an external entity actions taken directly with the customer administrative system 14 and database network elements 16. The web-server 32 may also implement one or more of the transaction logic 20, redundancy logic 22, query oriented logic 24 and data migration logic 26, as necessary and as shown, to support external entity requests and network 10 operation. The web-server 32 is connected to the local web-server 32' for each of the customer administrative system 14 and database network elements 16 through a TCP/IP type of connection. With this configuration, the interface 12 is no longer utilized to route external entity requests and data management activities among and between the customer administrative system 14 and database network elements 16. Routing is handled by the web-server 32, and processing of the requests to generate responses is handled by the local web-servers 32' .
As there are multiple destinations in the second embodiment for external entity Internet access (i.e., the customer administrative system 14 and each of the database network elements 16} a different WWW address may be provided for each destination. There is, however, a convenience advantage to maintaining only the single WWW address (for example, the address of the web-server 32 (as described above)) for external entity Internet access. Accordingly, proper routing of external entity requests and data management activities concerning that single address to the customer administrative system 14 and each of the database network elements 16 is supported using Javascript and an intelligent proxy in the firewall 34.
The advantages of the architecture of the second embodiment include: one mapping from hyper-text mark-up language (HTML) to the access protocol of the customer administrative system 14 and database network element 16 nodes; local web-server 32' provided by vendor in conjunction with the network node; the web-related communications channels are separated from the telecommunications network 10; and, no need for the presence of an interface 12. The disadvantages of this implementation include: duplicative routing; and, added cost due to the need for local web-servers 32' .
A more complete understanding of the operation of the present invention in supporting external entity data management activities using web technology may be obtained through examination of the following exemplary situations. First, consider the cellular telephone user. A significant amount of subscriber entered and controlled data is stored in the database network elements 16. Conventional telecommunications network 10 operation allows the user to review, modify and create this data, and perhaps engage in some transactions, through the cellular mobile station. The primarily numeric keypad of the cellular mobile station does not conveniently lend itself to accessing and entering this data. Similarly, the small display provided on the cellular mobile station does not conveniently lend itself to efficiently reviewing this data. Through the present invention, the user is given web access to this database network element 16 stored data. It is important to note here S that the security protections afforded by the web-server 32 and firewall 34 prevent the user from gaining access to the customer administrative system 14, and limit database network element 16 access to only that user's subscription. Through the convenience of the user's personal computer, and Internet 30 connection is made with the web-server 32. Query requests may then be made to review this stored data. Furthermore, data management transactions may be ordered to create or modify the stored data. Examples of the data at issue with respect to users comprises forward-to lists, location based services data, speed dialing list, and the like.
Turning next to retailers, in connection with the sale of cellular services to a user, the retailer needs to input certain subscriber information into both the customer administrative system 14 and the database network element 16. The data input into the customer administrative system 14 comprises subscription related data such as the subscriber number (SNB), mobile subscriber number (MSNB), serial number (SRNB) and service related data. The data input into the database network element 16 comprises the same service related data as mentioned above with respect to user access. Retailer access to the customer administrative system 14 and the database network element 16 relating to other actions, activities and transactions, such as those discussed herein, may also be supported. Conventional telecommunications network 10 operation required the retailer to supply the necessary information in hard copy format directly to the service operator.
Through the present invention, the retailer is given web access to the customer administrative system 14 and database network element 16 stored data for the user. It is important to note here that the security protections afforded by the web-server 32 and firewall 34 limit retailer access to the customer administrative system 14 and database network element 16 to only that necessary to establish or support user subscriptions.
Through the convenience of the retailer's personal computer, and Internet 30 connection is made with the web-server 32. Query requests may then be made to review this stored data. Furthermore, data management transactions rnay be ordered to create or modify the stored data.
Turning next to the service provider, in connection with the purchase of blocks of subscriptions and the marketing of those subscriptions, the service provider needs to input certain subscriber information into both the customer administrative system 14 and the database network element 16. The data input into the customer administrative system 14 comprises subscription related data such as the subscriber number (SNB), mobile subscriber number (MSNB) and serial number (SRNB).
Service provider access to the customer administrative system 14 relating to other actions, activities and transactions may also be supported. Data input by the service provider into the database network element 16 would not typically be allowed.
However, access to the database network element for other actions, such as activations, may be permitted. Conventional telecommunications network 10 operation required the service operator to supply the necessary information in hard copy format directly to the service operator. Through the present invention, the service provider is given web access to the customer administrative system 14 and database network element 16 stored data for its block of subscriptions. It is important to note here that the security protections afforded by the web-server 32 and firewall 34 limit service provider access to the customer administrative system 14 and database network element 16 to only that necessary to establish or support its purchased block of subscriptions. Through the convenience of the service provider's personal computer, and Internet 30 connection is made with the web server 32. Query requests may then be made to review this stored data.
Furthermore, data management transactions may be ordered to create or modify the stored data.
Although preferred embodiments of the method and apparatus of the present invention have been illustrated in the accompanying Drawings and described in the foregoing Detailed Description, it will be understood that the invention is not limited to the embodiments disclosed, but is capable of numerous rearrangements, modifications and substitutions without departing from the spirit of the invention as set forth and defined by the following claims.
Claims (15)
1. In a telecommunications network having a network element for storing data relating to telecommunication services and subscribers, and a customer administrative system for engaging in transactions relating to the administration of the data stored in the network element, a system for supporting data access and management actions concerning the network element and customer administrative system, such actions being originated by entities external to the telecommunications network, the system comprising:
a web-server having a world-wide-web address and providing Internet connectivity for the communication of requests and responses between the external entities and the network element and customer administrative system; and an interface connected to the web-server and connected between the network element and customer administrative system to handle routing of external entity requests for data access and management and responses thereto.
a web-server having a world-wide-web address and providing Internet connectivity for the communication of requests and responses between the external entities and the network element and customer administrative system; and an interface connected to the web-server and connected between the network element and customer administrative system to handle routing of external entity requests for data access and management and responses thereto.
2. The system as in claim 1 wherein the network element comprises a home location register.
3. The system as in claim 1 wherein the network element comprises a wireless services control node.
4. The system as in claim 1 wherein the web-server includes a firewall for protecting the telecommunications network against unauthorized access from the Internet to the network element and customer administrative system.
5. The system as in claim 1 wherein the web-server supports off-line external entity access to the network element and customer administrative system for purposes of data access and management.
6. The system as in claim 5 wherein the web-server further includes a cache for storing a portion of the data stored in the network element and customer administrative system, and wherein the web-server further supports on-line review of the cache stored data with off line modification to the data as stored in the network element and customer administrative system.
7. The system as in claim 1 wherein the web-server supports on-line external entity access to the network element and customer administrative system for purposes of data access and management.
8. In a telecommunications network having a network element for storing data relating to telecommunication services and subscribers, and a customer administrative system for engaging in transactions relating to the administration of the data stored in the network element, a system for supporting data access and management actions concerning the network element and customer administrative system, such actions being originated by entities external to the telecommunications network, the system comprising:
a web-server having a world-wide-web address and providing Internet connectivity for the communication of requests and responses between the external entities and the network element and customer administrative system; and a communications link connection between the web-server and each of the network element and customer administrative system, the web-server handling routing of external entity requests for data access and management and responses thereto over a proper communications link.
a web-server having a world-wide-web address and providing Internet connectivity for the communication of requests and responses between the external entities and the network element and customer administrative system; and a communications link connection between the web-server and each of the network element and customer administrative system, the web-server handling routing of external entity requests for data access and management and responses thereto over a proper communications link.
9. The system as in claim 8 wherein the network element comprises a home location register.
10. The system as in claim 8 wherein the network element comprises a wireless services control node.
11. The system as in claim 8 wherein the web-server includes a firewall for protecting the telecommunications network against unauthorized access from the Internet to the network element and customer administrative system.
12. The system as in claim 8 wherein the web-server supports off-line external entity access to the network element and customer administrative system for purposes of data access and management.
13. The system as in claim 12 wherein the web-server further includes a cache for storing a portion of the data stored in the network element and customer administrative system, and wherein the web-server further supports on-line review of the cache stored data with off-line modification to the data as stored in the network element and customer administrative system.
14. The system as in claim 8 wherein the web-server supports on-line external entity access to the network element and customer administrative system for purposes of data access and management.
15. The system as in claim 8 further including a local web-server for each of the network element and customer administrative system, the local web-server operating to process received requests and generate responses.
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US4207797P | 1997-03-28 | 1997-03-28 | |
US60/042,077 | 1997-03-28 | ||
US09/041,561 | 1998-03-12 | ||
US09/041,561 US5999973A (en) | 1997-03-28 | 1998-03-12 | Use of web technology for subscriber management activities |
PCT/SE1998/000519 WO1998044747A1 (en) | 1997-03-28 | 1998-03-20 | Use of web technology for subscriber management activities |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2284177A1 CA2284177A1 (en) | 1998-10-08 |
CA2284177C true CA2284177C (en) | 2007-03-06 |
Family
ID=26718290
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002284177A Expired - Fee Related CA2284177C (en) | 1997-03-28 | 1998-03-20 | Use of web technology for subscriber management activities |
Country Status (6)
Country | Link |
---|---|
US (1) | US5999973A (en) |
CN (1) | CN1124003C (en) |
AU (1) | AU746441B2 (en) |
CA (1) | CA2284177C (en) |
DE (1) | DE19882235B4 (en) |
WO (1) | WO1998044747A1 (en) |
Families Citing this family (74)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10361802B1 (en) | 1999-02-01 | 2019-07-23 | Blanding Hovenweep, Llc | Adaptive pattern recognition based control system and method |
US6515968B1 (en) | 1995-03-17 | 2003-02-04 | Worldcom, Inc. | Integrated interface for real time web based viewing of telecommunications network call traffic |
US6195097B1 (en) * | 1997-07-08 | 2001-02-27 | International Business Machines Corporation | Web-based DCE management |
WO1999007106A2 (en) * | 1997-07-31 | 1999-02-11 | Northern Telecom Limited | Internet profile management for radiotelephone subscribers |
NO305420B1 (en) * | 1997-09-02 | 1999-05-25 | Ericsson Telefon Ab L M | Device by computer communication system, especially by communication through firewalls |
US6473407B1 (en) | 1997-09-05 | 2002-10-29 | Worldcom, Inc. | Integrated proxy interface for web based alarm management tools |
JP3300262B2 (en) * | 1997-09-22 | 2002-07-08 | 富士通株式会社 | Mobile communication system and mobile terminal |
US6714979B1 (en) | 1997-09-26 | 2004-03-30 | Worldcom, Inc. | Data warehousing infrastructure for web based reporting tool |
US6381644B2 (en) | 1997-09-26 | 2002-04-30 | Mci Worldcom, Inc. | Integrated proxy interface for web based telecommunications network management |
US6745229B1 (en) | 1997-09-26 | 2004-06-01 | Worldcom, Inc. | Web based integrated customer interface for invoice reporting |
US6574661B1 (en) | 1997-09-26 | 2003-06-03 | Mci Communications Corporation | Integrated proxy interface for web based telecommunication toll-free network management using a network manager for downloading a call routing tree to client |
US6763376B1 (en) | 1997-09-26 | 2004-07-13 | Mci Communications Corporation | Integrated customer interface system for communications network management |
US6134544A (en) * | 1997-11-21 | 2000-10-17 | Telefonaktiebolaget Lm Ericsson (Publ) | Query supporting interface between a customer administrative system and database network elements in a telecommunications system |
US6356543B2 (en) * | 1997-11-25 | 2002-03-12 | Telefonaktiebolaget Lm Ericsson (Publ) | Controlling mobile phone system user views from the world-wide web |
EP0924940B1 (en) * | 1997-12-19 | 2003-03-19 | Telefonaktiebolaget Lm Ericsson | Apparatus and method for controlling basic and supplementary subscriber service in a telephone system |
US6226750B1 (en) | 1998-01-20 | 2001-05-01 | Proact Technologies Corp. | Secure session tracking method and system for client-server environment |
SE521163C2 (en) | 1998-05-08 | 2003-10-07 | Ericsson Telefon Ab L M | Systems and method of communication between clients and managed systems via two communication networks |
AU5292099A (en) * | 1998-08-10 | 2000-03-06 | Sonera Oyj | Method for decentralizing the management of network components in a telecommunication network |
JP4545317B2 (en) | 1998-10-28 | 2010-09-15 | ヤフー! インコーポレイテッド | Internet browser interface control method and controllable browser interface |
US6385642B1 (en) * | 1998-11-03 | 2002-05-07 | Youdecide.Com, Inc. | Internet web server cache storage and session management system |
US6453162B1 (en) * | 1998-12-10 | 2002-09-17 | Nortel Networks Limited | Method and system for subscriber provisioning of wireless services |
US7797193B1 (en) | 1999-06-10 | 2010-09-14 | Simplexity, Llc | Systems and methods for distributing telecommunication services via a network |
DE19927296A1 (en) * | 1999-06-15 | 2000-12-28 | Siemens Ag | Arrangement for charging in a telephone network and method for operating such |
US7213258B1 (en) * | 1999-06-30 | 2007-05-01 | Bellsouth Intellectual Property Corp. | System and method for managing and controlling data |
US7159192B2 (en) | 1999-08-13 | 2007-01-02 | Hotbar.Com, Inc. | System and method for customizing electronic messages |
IL130972A0 (en) | 1999-07-15 | 2001-01-28 | Hotbar Com Israel Ltd | Method for the dynamic improvement of internet browser appearance and connectivity |
US7222303B2 (en) * | 1999-07-15 | 2007-05-22 | Hotbar.Com, Inc. | System and method for the dynamic improvement of internet browser navigability |
US7729944B1 (en) * | 1999-09-03 | 2010-06-01 | Simplexity, Llc | System and methods for buying and selling telecommunication services via a network |
DE19947535A1 (en) | 1999-10-02 | 2001-04-05 | Alcatel Sa | Telecommunications network costs information signalling procedure, requires provision of a call handling function at switching station for laying on a tariff enquiry at the tariff server |
US20020186249A1 (en) | 1999-10-28 | 2002-12-12 | Qi Lu | Method and system of facilitating automatic login to a web site using an internet browser |
US7185333B1 (en) | 1999-10-28 | 2007-02-27 | Yahoo! Inc. | Method and system for managing the resources of a toolbar application program |
US20020186255A1 (en) | 1999-10-28 | 2002-12-12 | Shafron Thomas Joshua | Method and system of facilitating on-line shopping using an internet browser |
US6944654B1 (en) * | 1999-11-01 | 2005-09-13 | Emc Corporation | Multiple storage array control |
CA2400189A1 (en) * | 2000-02-11 | 2001-08-16 | Pangene Corporation | Integrated genomic services |
US7110773B1 (en) * | 2000-04-11 | 2006-09-19 | Telecommunication Systems, Inc. | Mobile activity status tracker |
FI111594B (en) * | 2000-06-05 | 2003-08-15 | Nokia Corp | Handling of subscriber information in telecommunication systems |
US7899173B2 (en) * | 2000-07-14 | 2011-03-01 | Context Connect, Llc | Communication connectivity via context association, advertising sponsorship, and multiple contact databases |
US7340048B2 (en) | 2000-07-14 | 2008-03-04 | Context Connect Llc | System and method for directory services and e-commerce across multi-provider networks |
US6731927B1 (en) | 2000-07-14 | 2004-05-04 | Context Connect, Inc. | System and method for context association |
WO2002013047A2 (en) * | 2000-08-04 | 2002-02-14 | Athenahealth, Inc. | Practice management and billing automation system |
US7325067B1 (en) * | 2000-11-27 | 2008-01-29 | Esaya, Inc. | Personalized account migration system and method |
US6993577B2 (en) | 2000-12-20 | 2006-01-31 | Comverse, Inc. | System and method for migration of subscriber data |
US8660017B2 (en) * | 2001-03-20 | 2014-02-25 | Verizon Business Global Llc | Systems and methods for updating IP communication service attributes using an LDAP |
US20020138603A1 (en) * | 2001-03-20 | 2002-09-26 | Robohm Kurt W. | Systems and methods for updating IP communication service attributes |
US7181017B1 (en) | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
US20020184507A1 (en) * | 2001-05-31 | 2002-12-05 | Proact Technologies Corp. | Centralized single sign-on method and system for a client-server environment |
US20030014504A1 (en) * | 2001-06-29 | 2003-01-16 | Hess Christopher L. | Method and apparatus for dynamic common gateway interface Web site management |
US6782351B2 (en) | 2001-09-11 | 2004-08-24 | Purechoice, Inc. | Air quality monitoring and space management system coupled to a private communications network |
US20030061348A1 (en) * | 2001-09-24 | 2003-03-27 | Jacobs James W. | System and method of providing information from a plurality of information sources |
ES2203295B1 (en) | 2001-10-03 | 2005-06-01 | Airtel Movil, S.A. | SYSTEM AND PROCEDURE FOR ACCESSING THE SUBSCRIBER INFORMATION OF A MOBILE PHONE NETWORK FROM THE TCP / IP NETWORK. |
US20030069954A1 (en) * | 2001-10-05 | 2003-04-10 | Adc Telecommunications, Inc. | Subnet pooling |
EP1313333A1 (en) * | 2001-11-14 | 2003-05-21 | Siemens Aktiengesellschaft | Method of administering subscriber profile data in a mobile radio network |
CN1208732C (en) * | 2002-02-01 | 2005-06-29 | 上海贝尔阿尔卡特移动通信系统有限公司 | Concurrent event processing method and application system based on Web thereby |
US7027569B2 (en) * | 2002-02-11 | 2006-04-11 | Prologue Communications, Inc. | Telephone call screening system and method and caller registration system and method for use therewith |
CN1317849C (en) * | 2002-03-30 | 2007-05-23 | 中兴通讯股份有限公司 | Network management system and method |
US8037299B2 (en) * | 2002-06-18 | 2011-10-11 | Ericsson Ab | Domain-less service selection |
ES2334677T3 (en) * | 2002-07-18 | 2010-03-15 | Telefonaktiebolaget L M Ericsson (Publ) | GENERIC INTERFACE FOR THE MANAGEMENT OF PAYMENTS OR SUBSCRIPTIONS. |
US20040083202A1 (en) * | 2002-08-30 | 2004-04-29 | Arkivio, Inc. | Techniques to control recalls in storage management applications |
US7188359B2 (en) | 2002-12-18 | 2007-03-06 | America Online, Inc. | Optimizing authentication service availability and responsiveness via client-side routing |
US9818136B1 (en) | 2003-02-05 | 2017-11-14 | Steven M. Hoffberg | System and method for determining contingent relevance |
US7721228B2 (en) | 2003-08-05 | 2010-05-18 | Yahoo! Inc. | Method and system of controlling a context menu |
US7379737B2 (en) * | 2003-08-12 | 2008-05-27 | Redknee Inc. | Telecommunications subscriber profile management system |
US7793227B2 (en) | 2003-08-12 | 2010-09-07 | Yahoo! Inc. | Method and system of providing customizable buttons |
US7506260B2 (en) | 2003-10-31 | 2009-03-17 | Yahoo! Inc. | Method and system of providing browser functionality through a browser button |
US7412655B2 (en) | 2004-11-02 | 2008-08-12 | Yahoo! Inc. | Method and system of providing dynamic dialogs |
US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
US7716193B2 (en) * | 2005-10-13 | 2010-05-11 | Oracle International Corporation | Ensuring timely servicing of desired transactions in a database server |
CN100433881C (en) * | 2005-12-22 | 2008-11-12 | 华为技术有限公司 | Device, system and method for managing wireless user information |
WO2007113334A1 (en) * | 2006-04-05 | 2007-10-11 | Ian Phillip Mellor | Remote control of adjustable antennas |
US20080005295A1 (en) * | 2006-06-30 | 2008-01-03 | Microsoft Corporation | Managing Web Service Access via a Portal |
JP4432944B2 (en) * | 2006-08-30 | 2010-03-17 | ブラザー工業株式会社 | Information processing device |
US20080065746A1 (en) | 2006-09-07 | 2008-03-13 | Ace*Comm Corporation | Consumer configurable mobile communication web filtering solution |
US9003296B2 (en) * | 2006-12-20 | 2015-04-07 | Yahoo! Inc. | Browser renderable toolbar |
US9519906B2 (en) * | 2008-12-19 | 2016-12-13 | Genesys Telecommunications Laboratories, Inc. | Method for monitoring and ranking web visitors and soliciting higher ranked visitors to engage in live assistance |
Family Cites Families (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5159592A (en) * | 1990-10-29 | 1992-10-27 | International Business Machines Corporation | Network address management for a wired network supporting wireless communication to a plurality of mobile users |
US5396543A (en) * | 1991-11-27 | 1995-03-07 | At&T Corp. | Signaling arrangements in a cellular mobile telecommunications switching system |
US5642515A (en) * | 1992-04-17 | 1997-06-24 | International Business Machines Corporation | Network server for local and remote resources |
GB2269962B (en) * | 1992-08-19 | 1996-04-10 | Northern Telecom Ltd | Communications systems |
US5440620A (en) * | 1992-08-28 | 1995-08-08 | At&T Corp. | Telecommunications system subscriber profile updating |
WO1994025913A2 (en) * | 1993-04-30 | 1994-11-10 | Novadigm, Inc. | Method and apparatus for enterprise desktop management |
JPH06337831A (en) * | 1993-05-31 | 1994-12-06 | Matsushita Electric Ind Co Ltd | System management information setting device |
US5455953A (en) * | 1993-11-03 | 1995-10-03 | Wang Laboratories, Inc. | Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket |
SE516146C2 (en) * | 1994-04-05 | 2001-11-26 | Ericsson Telefon Ab L M | Method and device for roaming between different types of mobile networks |
AU704869B2 (en) * | 1995-03-09 | 1999-05-06 | Nokia Telecommunications Oy | Method of communication and connection control |
US5734699A (en) * | 1995-05-04 | 1998-03-31 | Interwave Communications International, Ltd. | Cellular private branch exchanges |
US5812819A (en) * | 1995-06-05 | 1998-09-22 | Shiva Corporation | Remote access apparatus and method which allow dynamic internet protocol (IP) address management |
CA2176775C (en) * | 1995-06-06 | 1999-08-03 | Brenda Sue Baker | System and method for database access administration |
US5790868A (en) * | 1995-06-07 | 1998-08-04 | Tandem Computers, Inc. | Customer information control system and method with transaction serialization control functions in a loosely coupled parallel processing environment |
FI98585C (en) * | 1995-06-28 | 1997-07-10 | Nokia Telecommunications Oy | Management of concurrent users on a telecommunications network device |
US5878347A (en) * | 1996-03-26 | 1999-03-02 | Ericsson, Inc. | Routing a data signal to a mobile station within a telecommunications network |
US5768509A (en) * | 1996-04-08 | 1998-06-16 | Adc Newnet, Inc. | Short message server without local customer database |
FI111677B (en) * | 1996-05-21 | 2003-08-29 | Sonera Oyj | System for managing subscriber-specified services in a telephone network |
JP2002514327A (en) * | 1997-01-27 | 2002-05-14 | アルカトル ユーエスエイ ソーシング.エル.ピー. | System and method for monitoring and managing telecommunications equipment using enhanced internet access |
US5901352A (en) * | 1997-02-20 | 1999-05-04 | St-Pierre; Sylvain | System for controlling multiple networks and associated services |
US5926468A (en) * | 1997-04-04 | 1999-07-20 | Telefonaktiebolaget L M Ericsson | Wireless communications systems and methods utilizing data link reset |
-
1998
- 1998-03-12 US US09/041,561 patent/US5999973A/en not_active Expired - Lifetime
- 1998-03-20 AU AU68598/98A patent/AU746441B2/en not_active Ceased
- 1998-03-20 CN CN98805573A patent/CN1124003C/en not_active Expired - Fee Related
- 1998-03-20 WO PCT/SE1998/000519 patent/WO1998044747A1/en active IP Right Grant
- 1998-03-20 CA CA002284177A patent/CA2284177C/en not_active Expired - Fee Related
- 1998-03-20 DE DE19882235T patent/DE19882235B4/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
US5999973A (en) | 1999-12-07 |
WO1998044747A1 (en) | 1998-10-08 |
CA2284177A1 (en) | 1998-10-08 |
DE19882235B4 (en) | 2009-10-29 |
AU6859898A (en) | 1998-10-22 |
AU746441B2 (en) | 2002-05-02 |
DE19882235T1 (en) | 2000-02-24 |
CN1258416A (en) | 2000-06-28 |
CN1124003C (en) | 2003-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2284177C (en) | Use of web technology for subscriber management activities | |
US7272625B1 (en) | Generalized policy server | |
US8136143B2 (en) | Generalized policy server | |
US6408336B1 (en) | Distributed administration of access to information | |
JP4394759B2 (en) | Query method for replica database and network using this method | |
US7580919B1 (en) | Query interface to policy server | |
US9154489B2 (en) | Query interface to policy server | |
US6105027A (en) | Techniques for eliminating redundant access checking by access filters | |
US6615218B2 (en) | Database for executing policies for controlling devices on a network | |
US6170009B1 (en) | Controlling devices on a network through policies | |
CN100367214C (en) | System and method for managing distributed objects as a single representation | |
CA2352755C (en) | Network management system | |
AU733109B2 (en) | Methods and apparatus for controlling access to information | |
US6111883A (en) | Repeater and network system utilizing the same | |
US7143151B1 (en) | Network management system for generating setup information for a plurality of devices based on common meta-level information | |
US7225255B2 (en) | Method and system for controlling access to network resources using resource groups | |
JPH1028144A (en) | System for constituting network with access control function | |
JP3649180B2 (en) | Security management system and routing program | |
JP2006504177A (en) | Hierarchical repository for information about the configuration and performance of computer systems | |
GB2370732A (en) | A network element which has an updateable database of all peer network elements able to support a required security mechanism | |
Cisco | NAM Installation and Configuration | |
AU762061B2 (en) | Generalized policy server | |
US6226643B1 (en) | Subscriber creation and deletion interface between a customer administrative system and database network elements of a communications network | |
JPH04230139A (en) | Network management equipment | |
WO2002054269A1 (en) | A scalable data processing system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |
Effective date: 20180320 |