System and method for controlling access to legacy push protocols based upon a policy
First Claim
1. A telecommunications system, comprising:
- an application interface to receive at least one invocation to a legacy push protocol from a legacy application;
a gatekeeper to control access through the telecommunications system by applying at least one policy to the invocation;
wherein the at least one policy indicates whether the legacy application is permitted to use a resource of the telecommunications system; and
a resource interface connecting the gatekeeper with at least one resource element implementing the legacy push protocol to receive the at least one invocation to a legacy push protocol when the gatekeeper permits the legacy application to use a resource of the telecommunications system.
2 Assignments
0 Petitions
Accused Products
Abstract
In accordance with embodiments, there are provided mechanisms and methods for controlling access to telecommunications resources implementing a legacy protocol based upon a policy. These mechanisms and methods for controlling access to legacy protocols based upon a policy can enable embodiments to control access by third party created and other applications to network resources implementing legacy telecommunications protocols. The ability of embodiments to control access by third party created and other applications to network resources can enable network providers to provide greater access to network resources without compromising security of other users. Embodiments may further provide the ability to interface with legacy push protocols, multimedia message protocols and short message peer-to-peer protocols.
-
Citations
15 Claims
-
1. A telecommunications system, comprising:
-
an application interface to receive at least one invocation to a legacy push protocol from a legacy application;
a gatekeeper to control access through the telecommunications system by applying at least one policy to the invocation;
wherein the at least one policy indicates whether the legacy application is permitted to use a resource of the telecommunications system; and
a resource interface connecting the gatekeeper with at least one resource element implementing the legacy push protocol to receive the at least one invocation to a legacy push protocol when the gatekeeper permits the legacy application to use a resource of the telecommunications system. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for controlling access to a legacy push protocol based upon a policy in a telecommunications system, the method comprising:
-
receiving, by an application interface, at least one invocation to a legacy push protocol from a legacy application;
controlling access through the telecommunications system by applying at least one policy to the invocation at a gatekeeper;
wherein the at least one policy indicates whether the legacy application is permitted to use a resource of the telecommunications system; and
providing to a resource interface connecting the gatekeeper with at least one resource element implementing the legacy push protocol, the at least one invocation to a legacy push protocol when the gatekeeper permits the legacy application to use a resource of the telecommunications system. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An apparatus for controlling access to legacy push protocols based upon a policy in a telecommunications system, the apparatus comprising:
-
a processor; and
one or more stored sequences of instructions which, when executed by the processor, cause the processor to carry out the steps of;
receive, by an application interface, at least one invocation to a legacy push protocol from a legacy application;
control access through the telecommunications system by applying at least one policy to the invocation at a gatekeeper;
wherein the at least one policy indicates whether the legacy application is permitted to use a resource of the telecommunications system; and
receive, at a resource interface connecting the gatekeeper with at least one resource element implementing the legacy push protocol, the at least one invocation to a legacy push protocol when the gatekeeper permits the legacy application to use a resource of the telecommunications system.
-
Specification