System and method for controlling access to legacy push protocols based upon a policy
First Claim
1. A telecommunications system, comprising:
- an application, provided as part of an application tier, that initiates a push message to a mobile device, wherein the application tier includes one or more additional applications, and a plurality of protocol adapters, wherein each of said protocol adapters accepts, from one of the plurality of applications, messages implementing a different protocol and converts each of said messages to SIP protocol;
a resource interface, including a plug-in manager and a plurality of instances of a push message plug-in, wherein the plug-in manager selects at least one of the plurality of instances of the push message plug-in to connect with a telecommunications network resource implementing a push message protocol that will transmit the push message to said mobile device;
a messaging pipe that receives the push message from a said push messaging protocol adapter and routes the push message to the telecommunications network resource;
a gatekeeper between the application tier and the telecommunications network resource, wherein the gatekeeper implements the SIP protocol and includes a policy engine that creates, customizes and executes one or more policies based on one or more service level agreements, wherein said policies indicate whether the application is permitted to use the telecommunications network resource;
wherein the gatekeeper intercepts the push message from the messaging pipe, and provides the push message to the policy engine which applies at least one said policy to the push message; and
wherein in response to the policy engine applying said at least one policy to the push message, the gatekeeper provides the push message to the resource interface connecting the gatekeeper with the telecommunications network resource.
2 Assignments
0 Petitions
Accused Products
Abstract
In accordance with embodiments, there are provided mechanisms and methods for controlling access to telecommunications resources implementing a legacy protocol based upon a policy. These mechanisms and methods for controlling access to legacy protocols based upon a policy can enable embodiments to control access by third party created and other applications to network resources implementing legacy telecommunications protocols. The ability of embodiments to control access by third party created and other applications to network resources can enable network providers to provide greater access to network resources without compromising security of other users. Embodiments may further provide the ability to interface with legacy push protocols, multimedia message protocols and short message peer-to-peer protocols.
-
Citations
15 Claims
-
1. A telecommunications system, comprising:
-
an application, provided as part of an application tier, that initiates a push message to a mobile device, wherein the application tier includes one or more additional applications, and a plurality of protocol adapters, wherein each of said protocol adapters accepts, from one of the plurality of applications, messages implementing a different protocol and converts each of said messages to SIP protocol; a resource interface, including a plug-in manager and a plurality of instances of a push message plug-in, wherein the plug-in manager selects at least one of the plurality of instances of the push message plug-in to connect with a telecommunications network resource implementing a push message protocol that will transmit the push message to said mobile device; a messaging pipe that receives the push message from a said push messaging protocol adapter and routes the push message to the telecommunications network resource; a gatekeeper between the application tier and the telecommunications network resource, wherein the gatekeeper implements the SIP protocol and includes a policy engine that creates, customizes and executes one or more policies based on one or more service level agreements, wherein said policies indicate whether the application is permitted to use the telecommunications network resource; wherein the gatekeeper intercepts the push message from the messaging pipe, and provides the push message to the policy engine which applies at least one said policy to the push message; and wherein in response to the policy engine applying said at least one policy to the push message, the gatekeeper provides the push message to the resource interface connecting the gatekeeper with the telecommunications network resource. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for controlling access to a push protocol based upon a policy in a telecommunications system, the method comprising:
-
providing a gatekeeper that implements SIP protocol and includes a policy engine, wherein the policy engine creates, customizes and executes one or more policies based on one or more service level agreements, wherein said policies indicate whether an application is permitted to use a telecommunications network resource; receiving, by a push messaging protocol adapter, a push message from the application provided as part of an application tier, wherein the application tier includes a plurality of additional applications and a plurality of additional protocol adapters, wherein each of said protocol adapters accepts, from one of the plurality of applications, messages implementing a different protocol and converts each of said messages to the SIP protocol; providing a messaging pipe that receives the push message from the push messaging protocol adapter and routes the push message to the telecommunications network resource implementing a push message protocol that will transmit the push message to a mobile device; intercepting, via the gatekeeper, the push message and applying with the policy engine at least one said policy to the push message; and
in response to applying with the policy engine said at least one policy to the push message, providing the push message to the resource interface that contains a plug-in manager and a plurality of instances of a push message plug-in, wherein the plug-in manager selects at least one of the plurality of instances of the push message plug-in to connect with the telecommunications network resource. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer readable storage medium including instructions stored thereon which, when executed by a computer, cause the computer to perform the steps comprising:
-
providing a gatekeeper that implements SIP protocol and includes a policy engine, wherein the policy engine creates, customizes and executes one or more policies based on one or more service level agreements, wherein said policies indicate whether an application is permitted to use a telecommunications network resource; receiving, by a push messaging protocol adapter, a push message from the application provided as part of an application tier, wherein the application tier includes a plurality of additional applications and a plurality of additional protocol adapters, wherein each of said protocol adapters accepts, from one of the plurality of applications, messages implementing a different protocol and converts each of said messages to the SIP protocol; providing a messaging pipe that receives the push message from the push messaging protocol adapter and routes the push message to the telecommunications network resource implementing a push message protocol that will transmit the push message to a mobile device; intercepting, via the gatekeeper, the push message and applying with the policy engine at least one said policy to the push message; and
in response to applying with the policy engine said at least one policy to the push message, providing the push message to the resource interface that contains a plug-in manager and a plurality of instances of a push message plug-in, wherein the plug-in manager selects at least one of the plurality of instances of the push message plug-in to connect with the telecommunications network resource. - View Dependent Claims (14, 15)
-
Specification