US20040038667A1 - Secure remote access in a wireless telecommunication system - Google Patents
Secure remote access in a wireless telecommunication system Download PDFInfo
- Publication number
- US20040038667A1 US20040038667A1 US10/225,997 US22599702A US2004038667A1 US 20040038667 A1 US20040038667 A1 US 20040038667A1 US 22599702 A US22599702 A US 22599702A US 2004038667 A1 US2004038667 A1 US 2004038667A1
- Authority
- US
- United States
- Prior art keywords
- user
- access
- wireless telecommunication
- reason
- screen
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000010200 validation analysis Methods 0.000 claims abstract description 38
- 238000000034 method Methods 0.000 claims description 27
- 238000007726 management method Methods 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 4
- 230000000875 corresponding effect Effects 0.000 description 4
- 230000006978 adaptation Effects 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 230000002596 correlated effect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000002860 competitive effect Effects 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/28—Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Definitions
- the invention relates generally to systems and methods for providing remote access, and more particularly, to systems and methods for providing secure remote access in a wireless telecommunication system.
- wireless telecommunication systems will increasingly be utilized for not only voice data, but also for sending and receiving packetized data for use on the Internet, for example.
- wireless telecommunications providers wish to provide secure remote access to various systems or subsystems within the wireless telecommunication system.
- Wireless telecommunication providers realize a time and a cost savings by remotely accessing systems within the wireless telecommunications system.
- One solution to the remote access problem is to provide an “all or nothing” approach where users are given access to any system in the wireless telecommunications system once access is made.
- a user comprising a system operator in the field or a vendor, may dial into a gateway server in the wireless telecommunications system and given access using conventional methods. Once in, the user is presented with a command line and can then “telnet” to any desired system in the wireless telecommunications system. Telnet is a terminal emulation protocol commonly used on computer networks. It allows a user at a terminal or computer to log onto a remote device and run a program. Great inefficiencies are created in this procedure because, for example, once access is granted, the user can access any system connected to the network.
- this conventional solution does not conveniently allow for the archiving and analysis of logistical data, such as, which users are going to which systems and why. Accordingly, efficiently providing secure remote access in wireless telecommunication systems remains an elusive goal.
- a method for providing secure remote access in a wireless telecommunication system comprises accessing a secure server by a user, validating the user, the validation including a designation of at least a first system within the wireless telecommunication system that the user has been previously granted clearance to access, and providing the user access to the first system within the wireless telecommunication system.
- a system for providing secure remote access in a wireless telecommunication system comprises a secure server accessible by a user, a first component for validating the user, the validation including a designation of at least a first system within the wireless telecommunication system that the user has been previously granted clearance to access, and a second component for providing the user access to the first system within the wireless telecommunication system.
- a computer-readable medium on which is stored a set of instructions for providing secure remote access in a wireless telecommunication system, which when executed perform stages comprising accessing a secure server by a user, validating the user, the validation including a designation of at least a first system within the wireless telecommunication system that the user has been previously granted clearance to access, and providing the user access to the first system within the wireless telecommunication system.
- FIG. 1 is a functional block diagram of an exemplary system for providing secure remote access in a wireless telecommunication system consistent with an embodiment of the present invention
- FIG. 2 is a flow chart of an exemplary method for providing secure remote access in a wireless telecommunication system consistent with an embodiment of the present invention
- FIG. 3 is a flow chart of an exemplary subroutine used in the exemplary method of FIG. 2 for accessing a secure server by a user consistent with an embodiment of the present invention
- FIG. 4 is an illustration an exemplary secure screen consistent with an embodiment of the present invention
- FIG. 5 is a flow chart of an exemplary subroutine used in the exemplary method of FIG. 2 for validating a user consistent with an embodiment of the present invention
- FIG. 6 is an illustration of an exemplary system screen consistent with an embodiment of the present invention.
- FIG. 7 is a flow chart of an exemplary subroutine used in the exemplary method of FIG. 2 for providing a user with access to the first system within a wireless telecommunication system consistent with an embodiment of the present invention.
- FIG. 8 is an illustration of an exemplary reason solicitation screen consistent with an embodiment of the present invention.
- a system for providing secure remote access in a wireless telecommunication system comprises a secure server accessible by a user, a first component for validating the user, the validation including at least a designation of at least a first system within the wireless telecommunication system that the user has been previously granted clearance to access, and a second component for providing the user access to the first system within the wireless telecommunication system.
- a wireless telecommunication system 100 may comprise a base station subsystem (BSS) 105 , a network and switching subsystem (NSS) 110 , a network operation center (NOC) 115 , a mobile station (MS) 130 , a publicly switched telephone network (PSTN) 120 , and a publicly switched packet network (PSPN) 122 .
- BSS base station subsystem
- NSS network and switching subsystem
- NOC network operation center
- MS mobile station
- PSTN publicly switched telephone network
- PSPN publicly switched packet network
- the secure server may comprise a secure server 185 (as described below).
- the first and second components may comprise secure server 185 in conjunction with PSTN 120 and a user device 121 , or may comprise secure server 185 in conjunction with PSPN 122 and a user device 123 .
- System 100 may utilize GSM technology enhanced with GPRS in embodiments of the present invention.
- GSM technology enhanced with GPRS
- Those of ordinary skill in the art will appreciate, however, that other wireless telecommunication technologies standards may be employed, for example, FDMA, TDMA, CDMA, UMTS, EDGE and CDMA2000, without departing from the spirit of the invention.
- Wireless telecommunications may include radio transmission via the airwaves, however, those of ordinary skill in the art will appreciate that various other telecommunication techniques can be used to provide wireless transmission including infrared line of sight, cellular, microwave, satellite, blue-tooth, packet radio, and spread spectrum radio.
- Wireless data may include, but is not limited to, paging, text messaging, e-mail, Internet access, instant messaging, and other specialized data applications specifically excluding or including voice transmission.
- BSS 105 may comprise, for example, a base station controller (BSC) 140 and a base transceiver station (BTS) 135 .
- BSS 105 connects to MS 130 through a radio interface and connects to NSS 115 through an interface 170 .
- BSC 140 controls BTS 135 and may control a plurality of other base transceiver stations in addition to BTS 135 .
- BTS 135 may comprise radio transmission and reception equipment located at an antenna site.
- a transcoder/rate adaptation unit (not shown) may perform speech encoding and speech decoding and rate adaptation for transmitting data.
- the TRAU may be located away from BTS 135 , for example, at a mobile switching center located in NSS 110 .
- the TRAU is located in this way, the low transmission rate of speech code channels allows more compressed transmission between BTS 135 and the TRAU.
- Interface 170 between NSS 110 and BSS 105 , and a wide area network 172 between BSC 140 and NOC 115 may comprise T-1 lines using X.25 or TCP/IP protocol, for example.
- MS 130 may comprise a mobile phone, a personal computer, a hand-held computing device, a multiprocessor system, microprocessor-based or programmable consumer electronic device, a minicomputer, a mainframe computer, a personal digital assistant (PDA), a facsimile machine, a telephone, a pager, a portable computer, or any other device for receiving and/or transmitting information.
- MS 130 may utilize cellular telephone protocols such as wireless application protocol (WAP).
- WAP wireless application protocol
- NSS 110 may comprise a mobile switching center (MSC) 150 , a first network 160 , a home location register/authentication center (HLR/AUC) 135 , and a gateway mobile switching center (GMSC) 155 .
- MSC mobile switching center
- HLR/AUC home location register/authentication center
- GMSC gateway mobile switching center
- NSS 110 manages the communication between subscribers, for example, an operator 125 using MS 130 , and other telecommunications users, for example, those using publicly switched telephone network (PSTN) 120 .
- PSTN 120 may comprise, for example, the worldwide voice telephone network.
- MSC 150 coordinates call set-up to and from subscribers such as operator 125 using MS 130 .
- MSC 150 may control several base station controllers such as, and similar to BSC 140 .
- GMSC 110 is used to interface with external networks for communication with users outside of the wireless system, such users on PSTN 120 .
- HLR/AUC 135 may comprise a stand-alone computer without switching capabilities, a database which contains subscriber information, and information related to the subscriber's current location, but not the actual location of the subscriber.
- the AUC portion of HLR/AUC 135 manages the security data for subscriber authentication.
- Another sub-division of HLR/AUC 135 may include an equipment identity register (EIR) (not shown) which may store data relating to mobile equipment (ME).
- EIR equipment identity register
- NSS 110 may also include a visitor location register (VLR) (not shown).
- VLR visitor location register
- the VLR links to one or more mobile switching center located on other systems, temporarily storing subscription data of subscribers currently served by MSC 150 .
- the VLR holds more detailed data than HLR/AUC 135 .
- the VLR may hold more current subscriber location information than the location information at HLR/AUC 230 .
- GMSC 155 is utilized to interface with PSTN 120 .
- the call is initially routed to GMSC 155 , that finds the correct home location register by knowing the director number of the subscriber.
- GMSC 155 has an interface with an external network, such as PSTN 120 , for gatewaying communications.
- First network 160 may comprise an intelligent network utilizing signal system 7 (SS 7 ) in an ISDN user part (ISUP) protocol.
- ISUP is used for both ISDN and non-ISDN calls. Calls that originate and terminate at the same switch do not use ISUP signaling.
- network operation center (NOC) 115 may comprise a LAN/WAN interface 175 , a local area network (LAN) 180 , a secure server 185 , a validation database 186 , an access log database 187 , an interactive voice response system (IVR) 190 , a fault management system (FMS) 195 , a workstation 197 , and a NOC operator 199 .
- IVR interactive voice response system
- FMS fault management system
- LAN/WAN interface 175 interfaces WAN 172 and LAN 180 , thus connecting the elements connected to LAN 180 with BSC 140 .
- IVR 190 the data may then be pushed onto LAN 180 to a database server (not shown) and stored in database on the database server.
- the database server may comprise a personal computer, a hand-held computing device, a multiprocessor system, microprocessor-based or programmable consumer electronic device, a minicomputer, a mainframe computer, a personal digital assistant (PDA), a facsimile machine, a telephone, a pager, a portable computer, or any other device for receiving and/or transmitting information.
- PDA personal digital assistant
- Secure server 185 may comprise a personal computer, a hand-held computing device, a multiprocessor system, microprocessor-based or programmable consumer electronic device, a minicomputer, a mainframe computer, a personal digital assistant (PDA), a facsimile machine, a telephone, a pager, a portable computer, or any other device for receiving and/or transmitting information as know by those of ordinary skill in the art.
- Validation database 186 and access log database 187 may be located on storage media in secure server 185 or other storage media in systems, servers, or components accessible by secure server 185 .
- PSPN 122 most often a publicly switched packet network such as the Internet, may be accessed by user 124 through user device 123 in a conventional manner as is know by those of ordinary skill in the art.
- PSTN 120 be accessed by user 124 through user device 121 in a conventional manner as is know by those of ordinary skill in the art.
- user 124 may ultimately access secure server 185 .
- FMS 195 is a device used to detect, diagnose, and correct problems on system 100 effecting the security or reliability of system 100 .
- FMS 195 may comprise a personal computer, a hand-held computing device, a multiprocessor system, microprocessor-based or programmable consumer electronic device, a minicomputer, a mainframe computer, a personal digital assistant (PDA), a facsimile machine, a telephone, a pager, a portable computer, or any other device for receiving and/or transmitting information.
- Workstation 197 allows a NOC operator 199 to interface with FMS 195 .
- Workstation 197 may comprise, for example, a scalable performance architecture (SPARC) station marketed by Sun Mircosystem, Inc. of 901 San Antonio Road Palo Alto, Calif. 94303 - 4900 .
- SPARC is a family of 32-bit RISC CPUs developed by Sun Microsystems, Inc.
- FIG. 2 is a flow chart setting forth the general stages involved in exemplary method for providing secure remote access in a wireless telecommunication system consistent with an embodiment of the present invention.
- the implementation of the stages of exemplary method 200 in accordance with an exemplary embodiment of the present invention will be described in greater detail in FIG. 3 through FIG. 8.
- Exemplary method 200 begins at starting block 205 and proceeds to exemplary subroutine 210 where secure server 185 is accessed by user 124 .
- the stages of exemplary subroutine 210 are shown in FIG. 3 and will be described in greater detail below. From exemplary subroutine 210 where secure server 185 is accessed by user 124 , exemplary method 200 continues to exemplary subroutine 220 where user 124 is validated.
- exemplary subroutine 220 The stages of exemplary subroutine 220 are shown in FIG. 5 and will be described in greater detail below.
- exemplary method 200 advances to exemplary subroutine 230 where user 124 is provided access to the first system within wireless telecommunication system 100 .
- the stages of exemplary subroutine 230 are shown in FIG. 7 and will be described in greater detail below.
- exemplary method 200 ends at stage 240 .
- FIG. 3 describes exemplary subroutine 210 from FIG. 2 for accessing secure server 185 by user 124 consistent with an embodiment of the present invention.
- Exemplary subroutine 210 begins at starting block 305 and advances to stage 310 where user 124 is presented with secure screen 405 , as illustrated in FIG. 4.
- user 124 may access secure server 185 through either user device 121 and PSTN 120 , or user device 123 and PSPN 122 .
- secure server 185 may present a screen, such as secure screen 405 in order to obtain, for example, a user identification and name for user 124 .
- exemplary subroutine 210 advances to stage 315 where user 124 enters a user identification. For example, after secure screen 405 is presented to user 124 , user 124 may enter a name and a user identification in name field 410 and identification filed 415 respectively. Once the name and the user identification are entered by user 124 in name field 410 and identification field 415 respectively, user 124 may click on a submit button 420 to send the data on secure screen 405 to secure server 185 .
- exemplary subroutine 210 continues to stage 320 and returns to subroutine 220 of FIG. 2.
- FIG. 5 describes exemplary subroutine 220 from FIG. 2 for validating user 124 consistent with an embodiment of the present invention.
- Exemplary subroutine 220 begins at starting block 505 and advances to stage 510 where user identification is correlated against validation database 186 .
- a correlation programming module located on secure server 185 , for example, may be executed.
- the correlation programming module may open validation database 186 and search for a data record matching the user identification. If a match to the user identification is found, access may be granted to user 124 .
- Validation database 186 may comprise a plurality of data records corresponding to a plurality of user identifications associated with users to whom the wireless telecommunication system wishes to allow access. Associated with the data records of validation database 186 may be a system or systems within wireless telecommunications system 100 that the corresponding users are clear to access remotely.
- exemplary subroutine 220 advances to decision block 515 where it is determined if there is at least one system previously designated as a system user 124 may access. For example, once a match in validation database 186 is found, the matching data record in validation database 186 indicates which system or systems may be accessed by user 124 .
- exemplary subroutine 220 advances to stage 520 where the designation of at least the first system is received from validation database 186 . For example, once a match in validation database 186 is found, the system or systems within wireless telecommunication system 100 that the operator of wireless communications system 100 will allow user 124 to access is obtained from the matching data record in validation database 186 .
- exemplary subroutine 220 continues to stage 525 where user 124 is presented with system screen 605 , as illustrated in FIG. 6, indicating at least the first system.
- a list of systems that the wireless telecommunications system operator will allow user 124 access may be listed on system screen 605 .
- IVR 190 , FMS 195 , and BSC 140 may be listed as the systems with their corresponding selection boxes 410 , 415 , and 420 respectively.
- the first system may comprise IVR 190 , FMS 195 , BSC 140 , BTS 135 , or any other systems or subsystems as they are know by those of ordinary skill in the art.
- exemplary subroutine 220 advances to stage 530 where validation database 187 is maintained with user identifications of users that a delivery system operator wishes to grant access.
- validation database 187 may periodically require the addition or deletion of user identifications corresponding to users cleared to access systems in wireless telecommunications system 100 . This may be due to the fact that vendors may be granted temporary access for a specified period, or operations personnel may become employed or unemployed with the operator of system 100 .
- validation database 187 is maintained with user identifications of users that a delivery system operator wishes to grant access in stage 530
- exemplary subroutine 220 continues to stage 535 where user identifications are maintained within validation database 187 with systems within wireless telecommunication system 100 that the wireless telecommunication system operator wishes to grant access. For example, users may be granted access to a specific system in system 100 , however, that access may latter be restricted.
- exemplary subroutine 220 advances to stage 540 and returns to subroutine 230 of FIG. 2.
- FIG. 7 describes exemplary subroutine 230 from FIG. 2 for providing user 124 with access to the first system within wireless telecommunication system 100 consistent with an embodiment of the present invention.
- Exemplary subroutine 230 begins at starting block 705 and advances to stage 710 where the first system is selected by user 124 from system screen 605 presented by secure server 185 , as shown in FIG. 6. For example, if user 124 wishes to access IVR 190 , user 124 may click on selection box 610 and then click on submit button 625 .
- exemplary subroutine 230 advances to stage 715 where a reason solicitation screen 805 is provided by secure server 185 .
- a reason solicitation screen 805 may comprise an instruction area 810 , an entry box 815 , and a submit button 820 .
- reason solicitation screen 805 is provided by secure server 185
- subroutine 230 advances to stage 720 where a reason is entered into reason solicitation screen 805 .
- a reason is entered into reason solicitation screen 805 .
- user 124 may type a short message into entry box 815 stating why it is necessary to access the selected system.
- exemplary subroutine 230 advances to stage 725 where access log database 187 is updated with at least one of a user identification, a time and date the user accesses the first system, a designation of the first system, and the reason. For example, when user 124 has entered the reason into entry box 815 , user 124 may then click on submit button 820 . When submit button 820 is clicked, the entry of the reason into access log database 187 may be stamped with at least one of a user identification, a time and date the user accesses the first system, and a designation of the first system.
- access log database 187 is updated with at least one of a user identification, a time and date the user accesses the first system, a designation of the first system, and the reason
- exemplary subroutine 230 advances to stage 730 where access log database 187 is updated with a time user 124 logs out of the first system. For example, when user 124 logs out of the system previously selected, the entry of the reason into access log database 187 may be further stamped with the log-out time.
- Access log database 187 may be access in the future to in order to evaluate how systems are being accessed. For example, it may be seen from access log database 187 which users are accessing which systems, and at what time the users enter and exit.
- exemplary subroutine 230 continues to stage 735 and returns to stage 240 of FIG. 2.
- a system in accordance with an embodiment of the invention can be constructed in whole or in part from special purpose hardware or a general purpose computer system, or any combination thereof. Any portion of such a system may be controlled by a suitable program. Any program may in whole or in part comprise part of or be stored on the system in a conventional manner, or it may in whole or in part be provided in to the system over a network or other mechanism for transferring information in a conventional manner.
- the system may be operated and/or otherwise controlled by means of information provided by an operator using operator input elements (not shown) which may be connected directly to the system or which may transfer the information to the system over a network or other mechanism for transferring information in a conventional manner.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
- The invention relates generally to systems and methods for providing remote access, and more particularly, to systems and methods for providing secure remote access in a wireless telecommunication system.
- The use of telephone products and systems in the day-to-day lives of most people is continually growing. With the advent and steady growth of wireless telecommunications, wireless telecommunication systems will increasingly be utilized for not only voice data, but also for sending and receiving packetized data for use on the Internet, for example. In an effort to lower operating costs, increase system availability, and increase value for its subscribers, wireless telecommunications providers wish to provide secure remote access to various systems or subsystems within the wireless telecommunication system. Wireless telecommunication providers realize a time and a cost savings by remotely accessing systems within the wireless telecommunications system.
- Therefore, the need to efficiently provide remote access in wireless telecommunication systems has become a common need for many wireless telecommunication providers. More specifically, providing secure remote access to systems within the wireless telecommunication system has become a critical operation for many wireless telecommunication providers. This is because in an increasingly competitive environment, meeting and exceeding the expectations of subscribers or others who receive services is essential for a wireless telecommunication provider.
- One solution to the remote access problem is to provide an “all or nothing” approach where users are given access to any system in the wireless telecommunications system once access is made. For example, a user comprising a system operator in the field or a vendor, may dial into a gateway server in the wireless telecommunications system and given access using conventional methods. Once in, the user is presented with a command line and can then “telnet” to any desired system in the wireless telecommunications system. Telnet is a terminal emulation protocol commonly used on computer networks. It allows a user at a terminal or computer to log onto a remote device and run a program. Great inefficiencies are created in this procedure because, for example, once access is granted, the user can access any system connected to the network. In addition, this conventional solution does not conveniently allow for the archiving and analysis of logistical data, such as, which users are going to which systems and why. Accordingly, efficiently providing secure remote access in wireless telecommunication systems remains an elusive goal.
- Thus, there remains a need to efficiently provide remote access in wireless telecommunication systems. In addition, there remains a need for providing secure remote access to systems within the wireless telecommunication system.
- Consistent with the present invention, methods and systems for providing secure remote access in a wireless telecommunication system are provided that avoid problems associated with prior methods and systems for providing secure remote access in a wireless telecommunication system as discussed herein above.
- In one aspect, a method for providing secure remote access in a wireless telecommunication system comprises accessing a secure server by a user, validating the user, the validation including a designation of at least a first system within the wireless telecommunication system that the user has been previously granted clearance to access, and providing the user access to the first system within the wireless telecommunication system.
- In another aspect, a system for providing secure remote access in a wireless telecommunication system comprises a secure server accessible by a user, a first component for validating the user, the validation including a designation of at least a first system within the wireless telecommunication system that the user has been previously granted clearance to access, and a second component for providing the user access to the first system within the wireless telecommunication system.
- In yet another aspect, a computer-readable medium on which is stored a set of instructions for providing secure remote access in a wireless telecommunication system, which when executed perform stages comprising accessing a secure server by a user, validating the user, the validation including a designation of at least a first system within the wireless telecommunication system that the user has been previously granted clearance to access, and providing the user access to the first system within the wireless telecommunication system.
- Both the foregoing general description and the following detailed description are exemplary and are intended to provide further explanation of the invention as claimed.
- The accompanying drawings provide a further understanding of the invention and, together with the detailed description, explain the principles of the invention. In the drawings:
- FIG. 1 is a functional block diagram of an exemplary system for providing secure remote access in a wireless telecommunication system consistent with an embodiment of the present invention;
- FIG. 2 is a flow chart of an exemplary method for providing secure remote access in a wireless telecommunication system consistent with an embodiment of the present invention;
- FIG. 3 is a flow chart of an exemplary subroutine used in the exemplary method of FIG. 2 for accessing a secure server by a user consistent with an embodiment of the present invention;
- FIG. 4 is an illustration an exemplary secure screen consistent with an embodiment of the present invention;
- FIG. 5 is a flow chart of an exemplary subroutine used in the exemplary method of FIG. 2 for validating a user consistent with an embodiment of the present invention;
- FIG. 6 is an illustration of an exemplary system screen consistent with an embodiment of the present invention;
- FIG. 7 is a flow chart of an exemplary subroutine used in the exemplary method of FIG. 2 for providing a user with access to the first system within a wireless telecommunication system consistent with an embodiment of the present invention; and
- FIG. 8 is an illustration of an exemplary reason solicitation screen consistent with an embodiment of the present invention.
- Reference will now be made to various embodiments according to this invention, examples of which are shown in the accompanying drawings and will be obvious from the description of the invention. In the drawings, the same reference numbers represent the same or similar elements in the different drawings whenever possible.
- Consistent with the general principles of the present invention, a system for providing secure remote access in a wireless telecommunication system comprises a secure server accessible by a user, a first component for validating the user, the validation including at least a designation of at least a first system within the wireless telecommunication system that the user has been previously granted clearance to access, and a second component for providing the user access to the first system within the wireless telecommunication system.
- As herein embodied and illustrated in FIG. 1, a
wireless telecommunication system 100 may comprise a base station subsystem (BSS) 105, a network and switching subsystem (NSS) 110, a network operation center (NOC) 115, a mobile station (MS) 130, a publicly switched telephone network (PSTN) 120, and a publicly switched packet network (PSPN) 122. The elements ofsystem 100 will be described in greater detail below. Consistent with an embodiment of the invention, the secure server may comprise a secure server 185 (as described below). The first and second components may comprisesecure server 185 in conjunction with PSTN 120 and auser device 121, or may comprisesecure server 185 in conjunction with PSPN 122 and auser device 123. Those of ordinary skill in the art, however, will appreciate that other elements ofsystem 100 may comprise the secure server, the first component, and the second component. -
System 100 may utilize GSM technology enhanced with GPRS in embodiments of the present invention. Those of ordinary skill in the art will appreciate, however, that other wireless telecommunication technologies standards may be employed, for example, FDMA, TDMA, CDMA, UMTS, EDGE and CDMA2000, without departing from the spirit of the invention. - Wireless telecommunications may include radio transmission via the airwaves, however, those of ordinary skill in the art will appreciate that various other telecommunication techniques can be used to provide wireless transmission including infrared line of sight, cellular, microwave, satellite, blue-tooth, packet radio, and spread spectrum radio. Wireless data may include, but is not limited to, paging, text messaging, e-mail, Internet access, instant messaging, and other specialized data applications specifically excluding or including voice transmission.
- As shown in FIG. 1,
BSS 105 may comprise, for example, a base station controller (BSC) 140 and a base transceiver station (BTS) 135. BSS 105 connects to MS 130 through a radio interface and connects to NSS 115 through aninterface 170. BSC 140 controls BTS 135 and may control a plurality of other base transceiver stations in addition to BTS 135. BTS 135 may comprise radio transmission and reception equipment located at an antenna site. Associated withBSS 105, a transcoder/rate adaptation unit (TRAU) (not shown) may perform speech encoding and speech decoding and rate adaptation for transmitting data. As a subpart of BTS 135, the TRAU may be located away from BTS 135, for example, at a mobile switching center located in NSS 110. When the TRAU is located in this way, the low transmission rate of speech code channels allows more compressed transmission between BTS 135 and the TRAU. -
Interface 170 betweenNSS 110 andBSS 105, and awide area network 172 between BSC140 andNOC 115, may comprise T-1 lines using X.25 or TCP/IP protocol, for example. - MS130 may comprise a mobile phone, a personal computer, a hand-held computing device, a multiprocessor system, microprocessor-based or programmable consumer electronic device, a minicomputer, a mainframe computer, a personal digital assistant (PDA), a facsimile machine, a telephone, a pager, a portable computer, or any other device for receiving and/or transmitting information. MS 130 may utilize cellular telephone protocols such as wireless application protocol (WAP). Those of ordinary skill in the art will recognize that other systems and components may be utilized within the scope and spirit of the invention.
- Still referring to FIG. 1, NSS110 may comprise a mobile switching center (MSC) 150, a
first network 160, a home location register/authentication center (HLR/AUC) 135, and a gateway mobile switching center (GMSC) 155. NSS 110 manages the communication between subscribers, for example, anoperator 125 using MS 130, and other telecommunications users, for example, those using publicly switched telephone network (PSTN) 120. PSTN 120 may comprise, for example, the worldwide voice telephone network. - MSC150 coordinates call set-up to and from subscribers such as
operator 125 using MS 130.MSC 150 may control several base station controllers such as, and similar toBSC 140.GMSC 110 is used to interface with external networks for communication with users outside of the wireless system, such users onPSTN 120. - HLR/
AUC 135 may comprise a stand-alone computer without switching capabilities, a database which contains subscriber information, and information related to the subscriber's current location, but not the actual location of the subscriber. The AUC portion of HLR/AUC 135 manages the security data for subscriber authentication. Another sub-division of HLR/AUC 135 may include an equipment identity register (EIR) (not shown) which may store data relating to mobile equipment (ME). -
NSS 110 may also include a visitor location register (VLR) (not shown). The VLR links to one or more mobile switching center located on other systems, temporarily storing subscription data of subscribers currently served byMSC 150. The VLR holds more detailed data than HLR/AUC 135. For example, the VLR may hold more current subscriber location information than the location information at HLR/AUC 230. -
GMSC 155 is utilized to interface withPSTN 120. In order to set up a requested call, the call is initially routed toGMSC 155, that finds the correct home location register by knowing the director number of the subscriber.GMSC 155 has an interface with an external network, such asPSTN 120, for gatewaying communications. - The elements of
NSS 110 are connected usingfirst network 160.First network 160 may comprise an intelligent network utilizing signal system 7 (SS7) in an ISDN user part (ISUP) protocol. ISUP is used for both ISDN and non-ISDN calls. Calls that originate and terminate at the same switch do not use ISUP signaling. - Still referring to FIG. 1, network operation center (NOC)115 may comprise a LAN/WAN interface 175, a local area network (LAN) 180, a
secure server 185, avalidation database 186, anaccess log database 187, an interactive voice response system (IVR) 190, a fault management system (FMS) 195, aworkstation 197, and aNOC operator 199. - LAN/WAN interface175
interfaces WAN 172 andLAN 180, thus connecting the elements connected toLAN 180 withBSC 140. FromIVR 190, the data may then be pushed ontoLAN 180 to a database server (not shown) and stored in database on the database server. The database server may comprise a personal computer, a hand-held computing device, a multiprocessor system, microprocessor-based or programmable consumer electronic device, a minicomputer, a mainframe computer, a personal digital assistant (PDA), a facsimile machine, a telephone, a pager, a portable computer, or any other device for receiving and/or transmitting information. - Also connected to
LAN 180 issecure server 185.Secure server 185 may comprise a personal computer, a hand-held computing device, a multiprocessor system, microprocessor-based or programmable consumer electronic device, a minicomputer, a mainframe computer, a personal digital assistant (PDA), a facsimile machine, a telephone, a pager, a portable computer, or any other device for receiving and/or transmitting information as know by those of ordinary skill in the art.Validation database 186 andaccess log database 187 may be located on storage media insecure server 185 or other storage media in systems, servers, or components accessible bysecure server 185. -
PSPN 122, most often a publicly switched packet network such as the Internet, may be accessed byuser 124 throughuser device 123 in a conventional manner as is know by those of ordinary skill in the art. Likewise,PSTN 120 be accessed byuser 124 throughuser device 121 in a conventional manner as is know by those of ordinary skill in the art. Either throughuser device 121 oruser device 123,user 124 may ultimately accesssecure server 185. -
FMS 195 is a device used to detect, diagnose, and correct problems onsystem 100 effecting the security or reliability ofsystem 100. Likesecure server 185,FMS 195 may comprise a personal computer, a hand-held computing device, a multiprocessor system, microprocessor-based or programmable consumer electronic device, a minicomputer, a mainframe computer, a personal digital assistant (PDA), a facsimile machine, a telephone, a pager, a portable computer, or any other device for receiving and/or transmitting information.Workstation 197 allows aNOC operator 199 to interface withFMS 195.Workstation 197 may comprise, for example, a scalable performance architecture (SPARC) station marketed by Sun Mircosystem, Inc. of 901 San Antonio Road Palo Alto, Calif. 94303-4900. SPARC is a family of 32-bit RISC CPUs developed by Sun Microsystems, Inc. - Method for Providing Secure Remote Access
- FIG. 2 is a flow chart setting forth the general stages involved in exemplary method for providing secure remote access in a wireless telecommunication system consistent with an embodiment of the present invention. The implementation of the stages of
exemplary method 200 in accordance with an exemplary embodiment of the present invention will be described in greater detail in FIG. 3 through FIG. 8.Exemplary method 200 begins at startingblock 205 and proceeds toexemplary subroutine 210 wheresecure server 185 is accessed byuser 124. The stages ofexemplary subroutine 210 are shown in FIG. 3 and will be described in greater detail below. Fromexemplary subroutine 210 wheresecure server 185 is accessed byuser 124,exemplary method 200 continues toexemplary subroutine 220 whereuser 124 is validated. The stages ofexemplary subroutine 220 are shown in FIG. 5 and will be described in greater detail below. Onceuser 124 is validated inexemplary subroutine 220,exemplary method 200 advances toexemplary subroutine 230 whereuser 124 is provided access to the first system withinwireless telecommunication system 100. The stages ofexemplary subroutine 230 are shown in FIG. 7 and will be described in greater detail below. Fromexemplary subroutine 230,exemplary method 200 ends atstage 240. - Accessing Secure Server by User
- FIG. 3 describes
exemplary subroutine 210 from FIG. 2 for accessingsecure server 185 byuser 124 consistent with an embodiment of the present invention.Exemplary subroutine 210 begins at startingblock 305 and advances to stage 310 whereuser 124 is presented withsecure screen 405, as illustrated in FIG. 4. For example,user 124 may accesssecure server 185 through eitheruser device 121 andPSTN 120, oruser device 123 andPSPN 122. Once accessed,secure server 185 may present a screen, such assecure screen 405 in order to obtain, for example, a user identification and name foruser 124. - From
stage 310 whereuser 124 is presented withsecure screen 405,exemplary subroutine 210 advances to stage 315 whereuser 124 enters a user identification. For example, aftersecure screen 405 is presented touser 124,user 124 may enter a name and a user identification inname field 410 and identification filed 415 respectively. Once the name and the user identification are entered byuser 124 inname field 410 andidentification field 415 respectively,user 124 may click on a submitbutton 420 to send the data onsecure screen 405 to secureserver 185. - After
user 124 enters a user identification,exemplary subroutine 210 continues to stage 320 and returns to subroutine 220 of FIG. 2. - Validating User
- FIG. 5 describes
exemplary subroutine 220 from FIG. 2 for validatinguser 124 consistent with an embodiment of the present invention.Exemplary subroutine 220 begins at startingblock 505 and advances to stage 510 where user identification is correlated againstvalidation database 186. For example, once the name and user identification are received bysecure server 185, a correlation programming module located onsecure server 185, for example, may be executed. The correlation programming module may openvalidation database 186 and search for a data record matching the user identification. If a match to the user identification is found, access may be granted touser 124. -
Validation database 186, for example, may comprise a plurality of data records corresponding to a plurality of user identifications associated with users to whom the wireless telecommunication system wishes to allow access. Associated with the data records ofvalidation database 186 may be a system or systems withinwireless telecommunications system 100 that the corresponding users are clear to access remotely. - From
stage 510 where the user identification is correlated againstvalidation database 186,exemplary subroutine 220 advances to decision block 515 where it is determined if there is at least one system previously designated as asystem user 124 may access. For example, once a match invalidation database 186 is found, the matching data record invalidation database 186 indicates which system or systems may be accessed byuser 124. - If it is determined at
decision block 515 that there is at least one system previously designated as asystem user 124 may access,exemplary subroutine 220 advances to stage 520 where the designation of at least the first system is received fromvalidation database 186. For example, once a match invalidation database 186 is found, the system or systems withinwireless telecommunication system 100 that the operator ofwireless communications system 100 will allowuser 124 to access is obtained from the matching data record invalidation database 186. - After the designation of at least the first system is received from
validation database 186 instage 520,exemplary subroutine 220 continues to stage 525 whereuser 124 is presented withsystem screen 605, as illustrated in FIG. 6, indicating at least the first system. For example, a list of systems that the wireless telecommunications system operator will allowuser 124 access may be listed onsystem screen 605. As shown in FIG. 6,IVR 190,FMS 195, andBSC 140 may be listed as the systems with theircorresponding selection boxes IVR 190,FMS 195,BSC 140,BTS 135, or any other systems or subsystems as they are know by those of ordinary skill in the art. - From
stage 525 whereuser 124 is presented withsystem screen 605 indicating at least the first system, or fromdecision block 515, if it is not determined that there is at least one system previously designated as asystem user 124 may access,exemplary subroutine 220 advances to stage 530 wherevalidation database 187 is maintained with user identifications of users that a delivery system operator wishes to grant access. For example,validation database 187 may periodically require the addition or deletion of user identifications corresponding to users cleared to access systems inwireless telecommunications system 100. This may be due to the fact that vendors may be granted temporary access for a specified period, or operations personnel may become employed or unemployed with the operator ofsystem 100. - Once
validation database 187 is maintained with user identifications of users that a delivery system operator wishes to grant access instage 530,exemplary subroutine 220 continues to stage 535 where user identifications are maintained withinvalidation database 187 with systems withinwireless telecommunication system 100 that the wireless telecommunication system operator wishes to grant access. For example, users may be granted access to a specific system insystem 100, however, that access may latter be restricted. - From
stage 535 where user identifications are maintained withinvalidation database 187 with systems withinwireless telecommunication system 100 that the delivery system operator wishes to grant access,exemplary subroutine 220 advances to stage 540 and returns to subroutine 230 of FIG. 2. - Providing User with Access to the First System
- FIG. 7 describes
exemplary subroutine 230 from FIG. 2 for providinguser 124 with access to the first system withinwireless telecommunication system 100 consistent with an embodiment of the present invention.Exemplary subroutine 230 begins at startingblock 705 and advances to stage 710 where the first system is selected byuser 124 fromsystem screen 605 presented bysecure server 185, as shown in FIG. 6. For example, ifuser 124 wishes to accessIVR 190,user 124 may click onselection box 610 and then click on submitbutton 625. - Once the first system is selected by
user 124 fromsystem screen 605 presented bysecure server 185 instage 710,exemplary subroutine 230 advances to stage 715 where areason solicitation screen 805 is provided bysecure server 185. For example, as shown in FIG. 8, anexemplary solicitation screen 805 may comprise aninstruction area 810, anentry box 815, and a submitbutton 820. - After
reason solicitation screen 805 is provided bysecure server 185,subroutine 230 advances to stage 720 where a reason is entered intoreason solicitation screen 805. For example,user 124 may type a short message intoentry box 815 stating why it is necessary to access the selected system. - From
stage 720 where the reason is entered intoreason solicitation screen 805,exemplary subroutine 230 advances to stage 725 whereaccess log database 187 is updated with at least one of a user identification, a time and date the user accesses the first system, a designation of the first system, and the reason. For example, whenuser 124 has entered the reason intoentry box 815,user 124 may then click on submitbutton 820. When submitbutton 820 is clicked, the entry of the reason intoaccess log database 187 may be stamped with at least one of a user identification, a time and date the user accesses the first system, and a designation of the first system. - Once
access log database 187 is updated with at least one of a user identification, a time and date the user accesses the first system, a designation of the first system, and the reason,exemplary subroutine 230 advances to stage 730 whereaccess log database 187 is updated with atime user 124 logs out of the first system. For example, whenuser 124 logs out of the system previously selected, the entry of the reason intoaccess log database 187 may be further stamped with the log-out time.Access log database 187 may be access in the future to in order to evaluate how systems are being accessed. For example, it may be seen fromaccess log database 187 which users are accessing which systems, and at what time the users enter and exit. - After
access log database 187 is updated with atime user 124 logs out of the first system instage 730,exemplary subroutine 230 continues to stage 735 and returns to stage 240 of FIG. 2. - It will be appreciated that a system in accordance with an embodiment of the invention can be constructed in whole or in part from special purpose hardware or a general purpose computer system, or any combination thereof. Any portion of such a system may be controlled by a suitable program. Any program may in whole or in part comprise part of or be stored on the system in a conventional manner, or it may in whole or in part be provided in to the system over a network or other mechanism for transferring information in a conventional manner. In addition, it will be appreciated that the system may be operated and/or otherwise controlled by means of information provided by an operator using operator input elements (not shown) which may be connected directly to the system or which may transfer the information to the system over a network or other mechanism for transferring information in a conventional manner.
- The foregoing description has been limited to a specific embodiment of this invention. It will be apparent, however, that various variations and modifications may be made to the invention, with the attainment of some or all of the advantages of the invention. It is the object of the appended claims to cover these and such other variations and modifications as come within the true spirit and scope of the invention.
- Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
Claims (27)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/225,997 US20040038667A1 (en) | 2002-08-22 | 2002-08-22 | Secure remote access in a wireless telecommunication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/225,997 US20040038667A1 (en) | 2002-08-22 | 2002-08-22 | Secure remote access in a wireless telecommunication system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20040038667A1 true US20040038667A1 (en) | 2004-02-26 |
Family
ID=31887131
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/225,997 Abandoned US20040038667A1 (en) | 2002-08-22 | 2002-08-22 | Secure remote access in a wireless telecommunication system |
Country Status (1)
Country | Link |
---|---|
US (1) | US20040038667A1 (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040203464A1 (en) * | 2002-12-23 | 2004-10-14 | Carol Katz | Analyzing a network problem in a wireless telecommunication system |
US20070033156A1 (en) * | 2005-08-04 | 2007-02-08 | Kimberly-Clark Worldwide, Inc. | System for managing digital assets |
US20080004013A1 (en) * | 2006-06-30 | 2008-01-03 | Advanced Micro Devices, Inc. | Mechanism for remotely accessing a portable computer including wireless communication functionality |
US20090193143A1 (en) * | 2002-12-11 | 2009-07-30 | Jeyhan Karaoguz | Media exchange network supporting remote peripheral access |
US10884592B2 (en) | 2015-03-02 | 2021-01-05 | Apple Inc. | Control of system zoom magnification using a rotatable input mechanism |
US10921976B2 (en) | 2013-09-03 | 2021-02-16 | Apple Inc. | User interface for manipulating user interface objects |
US10928907B2 (en) | 2018-09-11 | 2021-02-23 | Apple Inc. | Content-based tactile outputs |
US11068128B2 (en) | 2013-09-03 | 2021-07-20 | Apple Inc. | User interface object manipulations in a user interface |
US11068083B2 (en) * | 2014-09-02 | 2021-07-20 | Apple Inc. | Button functionality |
US11157143B2 (en) | 2014-09-02 | 2021-10-26 | Apple Inc. | Music user interface |
US20210377240A1 (en) * | 2020-06-02 | 2021-12-02 | FLEX Integration LLC | System and methods for tokenized hierarchical secured asset distribution |
US11250385B2 (en) | 2014-06-27 | 2022-02-15 | Apple Inc. | Reduced size user interface |
US11402968B2 (en) | 2014-09-02 | 2022-08-02 | Apple Inc. | Reduced size user in interface |
US11435830B2 (en) | 2018-09-11 | 2022-09-06 | Apple Inc. | Content-based tactile outputs |
US11656751B2 (en) | 2013-09-03 | 2023-05-23 | Apple Inc. | User interface for manipulating user interface objects with magnetic properties |
US11743221B2 (en) | 2014-09-02 | 2023-08-29 | Apple Inc. | Electronic message user interface |
US12050766B2 (en) | 2013-09-03 | 2024-07-30 | Apple Inc. | Crown input for a wearable electronic device |
US12287962B2 (en) | 2013-09-03 | 2025-04-29 | Apple Inc. | User interface for manipulating user interface objects |
US12299642B2 (en) | 2023-06-16 | 2025-05-13 | Apple Inc. | Reduced size user interface |
Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5455863A (en) * | 1993-06-29 | 1995-10-03 | Motorola, Inc. | Method and apparatus for efficient real-time authentication and encryption in a communication system |
US6453159B1 (en) * | 1999-02-25 | 2002-09-17 | Telxon Corporation | Multi-level encryption system for wireless network |
US20030017822A1 (en) * | 2001-07-02 | 2003-01-23 | Martin Kissner | Method and network arrangement for accessing protected resources using a mobile radio terminal |
US20030163733A1 (en) * | 2002-02-28 | 2003-08-28 | Ericsson Telefon Ab L M | System, method and apparatus for federated single sign-on services |
US6614888B1 (en) * | 1999-03-02 | 2003-09-02 | Telefonaktiebolaget Lm Ericsson (Publ) | Device and method for telecommunication systems |
US20030166397A1 (en) * | 2002-03-04 | 2003-09-04 | Microsoft Corporation | Mobile authentication system with reduced authentication delay |
US6657538B1 (en) * | 1997-11-07 | 2003-12-02 | Swisscom Mobile Ag | Method, system and devices for authenticating persons |
US20030224756A1 (en) * | 2002-05-30 | 2003-12-04 | Janne Kallio | System and method for services access |
US6678516B2 (en) * | 2001-05-21 | 2004-01-13 | Nokia Corporation | Method, system, and apparatus for providing services in a privacy enabled mobile and Ubicom environment |
US20040022216A1 (en) * | 2002-08-02 | 2004-02-05 | Shi Guangming Carl | Multimode wireless device system provision validation and acquisition method and apparatus |
US20040029565A1 (en) * | 2000-08-29 | 2004-02-12 | Junji Shibata | Voice response unit, method thereof and telephone communication system |
US20040097217A1 (en) * | 2002-08-06 | 2004-05-20 | Mcclain Fred | System and method for providing authentication and authorization utilizing a personal wireless communication device |
US20040203595A1 (en) * | 2002-08-12 | 2004-10-14 | Singhal Tara Chand | Method and apparatus for user authentication using a cellular telephone and a transient pass code |
US6823457B1 (en) * | 1999-11-22 | 2004-11-23 | International Business Machines Corporation | Method and system for verifying control accesses between a device on a non-proprietary bus and a device on a proprietary bus |
US6839409B1 (en) * | 1997-09-11 | 2005-01-04 | Siemens Aktiengesellschaft | Method for handling telecommunications connections via a public exchange |
US6856800B1 (en) * | 2001-05-14 | 2005-02-15 | At&T Corp. | Fast authentication and access control system for mobile networking |
US20050043014A1 (en) * | 2002-08-08 | 2005-02-24 | Hodge Stephen L. | Telecommunication call management and monitoring system with voiceprint verification |
US6870921B1 (en) * | 1999-11-12 | 2005-03-22 | Metro One Telecommunications, Inc. | Enhanced directory assistance service providing individual or group directories |
-
2002
- 2002-08-22 US US10/225,997 patent/US20040038667A1/en not_active Abandoned
Patent Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5455863A (en) * | 1993-06-29 | 1995-10-03 | Motorola, Inc. | Method and apparatus for efficient real-time authentication and encryption in a communication system |
US6839409B1 (en) * | 1997-09-11 | 2005-01-04 | Siemens Aktiengesellschaft | Method for handling telecommunications connections via a public exchange |
US6657538B1 (en) * | 1997-11-07 | 2003-12-02 | Swisscom Mobile Ag | Method, system and devices for authenticating persons |
US6453159B1 (en) * | 1999-02-25 | 2002-09-17 | Telxon Corporation | Multi-level encryption system for wireless network |
US6614888B1 (en) * | 1999-03-02 | 2003-09-02 | Telefonaktiebolaget Lm Ericsson (Publ) | Device and method for telecommunication systems |
US6870921B1 (en) * | 1999-11-12 | 2005-03-22 | Metro One Telecommunications, Inc. | Enhanced directory assistance service providing individual or group directories |
US6823457B1 (en) * | 1999-11-22 | 2004-11-23 | International Business Machines Corporation | Method and system for verifying control accesses between a device on a non-proprietary bus and a device on a proprietary bus |
US20040029565A1 (en) * | 2000-08-29 | 2004-02-12 | Junji Shibata | Voice response unit, method thereof and telephone communication system |
US6856800B1 (en) * | 2001-05-14 | 2005-02-15 | At&T Corp. | Fast authentication and access control system for mobile networking |
US6678516B2 (en) * | 2001-05-21 | 2004-01-13 | Nokia Corporation | Method, system, and apparatus for providing services in a privacy enabled mobile and Ubicom environment |
US20030017822A1 (en) * | 2001-07-02 | 2003-01-23 | Martin Kissner | Method and network arrangement for accessing protected resources using a mobile radio terminal |
US20030163733A1 (en) * | 2002-02-28 | 2003-08-28 | Ericsson Telefon Ab L M | System, method and apparatus for federated single sign-on services |
US20030166397A1 (en) * | 2002-03-04 | 2003-09-04 | Microsoft Corporation | Mobile authentication system with reduced authentication delay |
US20030224756A1 (en) * | 2002-05-30 | 2003-12-04 | Janne Kallio | System and method for services access |
US20040022216A1 (en) * | 2002-08-02 | 2004-02-05 | Shi Guangming Carl | Multimode wireless device system provision validation and acquisition method and apparatus |
US20040097217A1 (en) * | 2002-08-06 | 2004-05-20 | Mcclain Fred | System and method for providing authentication and authorization utilizing a personal wireless communication device |
US20050043014A1 (en) * | 2002-08-08 | 2005-02-24 | Hodge Stephen L. | Telecommunication call management and monitoring system with voiceprint verification |
US20040203595A1 (en) * | 2002-08-12 | 2004-10-14 | Singhal Tara Chand | Method and apparatus for user authentication using a cellular telephone and a transient pass code |
Cited By (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090193143A1 (en) * | 2002-12-11 | 2009-07-30 | Jeyhan Karaoguz | Media exchange network supporting remote peripheral access |
US8208425B2 (en) * | 2002-12-11 | 2012-06-26 | Broadcom Corporation | Media exchange network supporting remote peripheral access |
US20040203464A1 (en) * | 2002-12-23 | 2004-10-14 | Carol Katz | Analyzing a network problem in a wireless telecommunication system |
US20070033156A1 (en) * | 2005-08-04 | 2007-02-08 | Kimberly-Clark Worldwide, Inc. | System for managing digital assets |
US20080004013A1 (en) * | 2006-06-30 | 2008-01-03 | Advanced Micro Devices, Inc. | Mechanism for remotely accessing a portable computer including wireless communication functionality |
US7890138B2 (en) * | 2006-06-30 | 2011-02-15 | Advanced Micro Devices, Inc. | Mechanism for remotely accessing a portable computer including wireless communication functionality |
US12287962B2 (en) | 2013-09-03 | 2025-04-29 | Apple Inc. | User interface for manipulating user interface objects |
US10921976B2 (en) | 2013-09-03 | 2021-02-16 | Apple Inc. | User interface for manipulating user interface objects |
US12050766B2 (en) | 2013-09-03 | 2024-07-30 | Apple Inc. | Crown input for a wearable electronic device |
US11068128B2 (en) | 2013-09-03 | 2021-07-20 | Apple Inc. | User interface object manipulations in a user interface |
US11656751B2 (en) | 2013-09-03 | 2023-05-23 | Apple Inc. | User interface for manipulating user interface objects with magnetic properties |
US11829576B2 (en) | 2013-09-03 | 2023-11-28 | Apple Inc. | User interface object manipulations in a user interface |
US11720861B2 (en) | 2014-06-27 | 2023-08-08 | Apple Inc. | Reduced size user interface |
US11250385B2 (en) | 2014-06-27 | 2022-02-15 | Apple Inc. | Reduced size user interface |
US12001650B2 (en) | 2014-09-02 | 2024-06-04 | Apple Inc. | Music user interface |
US11157143B2 (en) | 2014-09-02 | 2021-10-26 | Apple Inc. | Music user interface |
US11474626B2 (en) | 2014-09-02 | 2022-10-18 | Apple Inc. | Button functionality |
US11644911B2 (en) | 2014-09-02 | 2023-05-09 | Apple Inc. | Button functionality |
US11402968B2 (en) | 2014-09-02 | 2022-08-02 | Apple Inc. | Reduced size user in interface |
US12197659B2 (en) | 2014-09-02 | 2025-01-14 | Apple Inc. | Button functionality |
US11743221B2 (en) | 2014-09-02 | 2023-08-29 | Apple Inc. | Electronic message user interface |
US12118181B2 (en) | 2014-09-02 | 2024-10-15 | Apple Inc. | Reduced size user interface |
US11068083B2 (en) * | 2014-09-02 | 2021-07-20 | Apple Inc. | Button functionality |
US11941191B2 (en) | 2014-09-02 | 2024-03-26 | Apple Inc. | Button functionality |
US10884592B2 (en) | 2015-03-02 | 2021-01-05 | Apple Inc. | Control of system zoom magnification using a rotatable input mechanism |
US11921926B2 (en) | 2018-09-11 | 2024-03-05 | Apple Inc. | Content-based tactile outputs |
US10928907B2 (en) | 2018-09-11 | 2021-02-23 | Apple Inc. | Content-based tactile outputs |
US12277275B2 (en) | 2018-09-11 | 2025-04-15 | Apple Inc. | Content-based tactile outputs |
US11435830B2 (en) | 2018-09-11 | 2022-09-06 | Apple Inc. | Content-based tactile outputs |
US20210377240A1 (en) * | 2020-06-02 | 2021-12-02 | FLEX Integration LLC | System and methods for tokenized hierarchical secured asset distribution |
US12149516B2 (en) * | 2020-06-02 | 2024-11-19 | Flex Integration, LLC | System and methods for tokenized hierarchical secured asset distribution |
US12299642B2 (en) | 2023-06-16 | 2025-05-13 | Apple Inc. | Reduced size user interface |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20040038667A1 (en) | Secure remote access in a wireless telecommunication system | |
US8010159B2 (en) | Providing contact data in a wireless telecommunication system | |
US7996013B2 (en) | Method, call setup device and computer product for controlling and setting up calls with reduced costs | |
EP1482702B1 (en) | System and methods for provisioning a service for a communication device | |
US20110142024A1 (en) | System and method for routing a wireless connection in a hybrid network | |
EP2541398A1 (en) | Interactive control of access to services and capabilities of a mobile device | |
WO2002082725A1 (en) | Framework for a dynamic management system | |
US9826053B2 (en) | Content caching with remote charging services in a radio access network | |
US20040077331A1 (en) | System and method for tracking dropped calls in a wireless telecommunication system | |
EP1560369B1 (en) | Communication system, communication terminal, and communication program for network selection | |
US20040202292A1 (en) | Mobile station tracking in a wireless telecommunication system | |
US7231182B2 (en) | Tracking network problems in a wireless telecommunication system | |
US7562167B2 (en) | Managing heterogeneous data streams for remote access | |
US7269407B2 (en) | Validating an invoice in a wireless telecommunication system | |
US20020177438A1 (en) | Method of registering services in mobile-communication system | |
US20090028314A1 (en) | System and method to identify the operator of a call number stored in memory in a user's terminal | |
US20090088125A1 (en) | System and Method for Locating a Cellular Telephone in an Emergency | |
CA2446689A1 (en) | Requests in a communication system | |
US6546242B1 (en) | Systems, methods and apparatuses for maintaining services within a telecommunications network having separate service providers and network providers | |
US20040203464A1 (en) | Analyzing a network problem in a wireless telecommunication system | |
US20050027808A1 (en) | Method for utilizing software in terminal equipment and terminal equipment | |
US20040058669A1 (en) | Tracking credit associated with at least one circuit outage in a wireless telecommunication system | |
EP1488657B1 (en) | A method for exchanging user-specific data from a mobile network to a service application of an external service provider using a unique application user id code | |
EP1584208B1 (en) | Two steps database interrogation for supporting the implementation of a fall-back at call set-up | |
KR100651732B1 (en) | Location based information service using open service platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CINGULAR WIRELESS II, INC.,GEORGIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CINGULAR WIRELESS, LLC;REEL/FRAME:016480/0826 Effective date: 20041027 Owner name: CINGULAR WIRELESS II, INC., GEORGIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CINGULAR WIRELESS, LLC;REEL/FRAME:016480/0826 Effective date: 20041027 |
|
AS | Assignment |
Owner name: CINGULAR WIRELESS II, LLC, GEORGIA Free format text: CERTIFICATE OF CONVERSION;ASSIGNOR:CINGULAR WIRELESS II, INC.;REEL/FRAME:017147/0063 Effective date: 20041027 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |