Method and system for user equipment configuration
10110416 · 2018-10-23
Assignee
Inventors
- Alistair James Campbell (Kent, GB)
- Tuomas Syrjänen (Helsinki, FI)
- Sampsa Vehkamäki (Helsinki, FI)
- Timo Hyväjoa (Espoo, FI)
- Jukka Rantala (Espoo, FI)
- Seppo Pientarinen (Helsinki, FI)
- Oliver James Bradley (Surrey, GB)
- Christopher Hugh Gibson (London, GB)
- Gavin Ronald Paul Miller (Middlesex, GB)
Cpc classification
H04L41/0266
ELECTRICITY
B65H2220/01
PERFORMING OPERATIONS; TRANSPORTING
B65H2220/01
PERFORMING OPERATIONS; TRANSPORTING
H04L41/0806
ELECTRICITY
B65H2220/02
PERFORMING OPERATIONS; TRANSPORTING
B65H2220/02
PERFORMING OPERATIONS; TRANSPORTING
B65H2220/03
PERFORMING OPERATIONS; TRANSPORTING
H04L67/34
ELECTRICITY
H04L41/028
ELECTRICITY
H04L67/565
ELECTRICITY
B65H2220/03
PERFORMING OPERATIONS; TRANSPORTING
H04L67/289
ELECTRICITY
H04L41/0226
ELECTRICITY
International classification
G06F13/00
PHYSICS
Abstract
A method of managing configuration of user equipment that has a configuration database modifiable with configuration data in a first format, and a communications unit for receiving configuration data in a second format is described. The method comprises storing a user agent at the user equipment; providing received configuration data in the second format to the user agent; using the user agent to transform the configuration data into the first format in the user equipment; and modifying the configuration database with the configuration data in the first format.
Claims
1. A method of managing configuration of user equipment adapted for use in a cellular telecommunications network, the method comprising: receiving a user agent for installation on the user equipment; wherein the user equipment has (a) a processor, (b) an over the air (OTA) interface for receiving configuration data and a user agent, (c) a configuration data store for defining a configuration of the user equipment, and (d) a configuration manager for receiving configuration data in a compatible format which can be processed by the configuration manager for modifying the configuration data store; installing the user agent on the user equipment; receiving the configuration data to be used by the configuration manager for modifying the configuration data store, wherein the configuration data is in a format other than the compatible format, wherein the configuration data comprises an International Mobile Subscriber Identity Number transforming, using the installed user agent on the user equipment, the configuration data into the compatible format, and modifying, using the configuration manager on the user equipment, the configuration data store with the configuration data in the compatible format which can be processed by the configuration manager.
2. A method according to claim 1, wherein receiving configuration data comprises the user agent receiving configuration data.
3. A method according to claim 1, wherein receiving configuration data comprises receiving configuration data over the OTA interface.
4. A method according to claim 1, wherein receiving configuration data does not comprise receiving configuration data over the OTA interface.
5. A method according to claim 4, wherein receiving configuration data comprises receiving configuration data over a local wireless network.
6. A method according to claim 1, wherein receiving configuration data comprises one or more SMS messages received by the user equipment.
7. A method according to claim 6, wherein receiving configuration data comprises one or more SMS messages received by the user equipment which are concatenated to form a full data set.
8. A method according to claim 1, wherein the user equipment comprises an inbox from which the configuration data store receives configuration data in the compatible format and the method comprises inputting the configuration data transformed into the compatible format into the inbox.
9. A method according to claim 1, comprising seeking authorization from the user of the user equipment and receiving a response from the user, wherein the modifying step occurs only if the response confirms user-authorization.
10. A method according to claim 1, wherein the user agent comprises a generic user agent and the method further comprises reusing the user agent for transforming subsequent configuration messages.
11. A method according to claim 1, wherein the user equipment comprises a local radio communications unit and the method comprises receiving, with the local radio communications unit, the user agent and the configuration data together in a local configuration package message.
12. A method according to claim 11, comprising: delivering the configuration data to a network node, and transferring the configuration data from the network node to the user equipment over a local communication interface between the network node and the local radio communications unit of the user equipment.
13. A method according to claim 11, wherein the configuration data comprises information enabling the IMSI number to be used at the user equipment.
14. A method according to claim 1, wherein the configuration data comprises one or more International Mobile Station Equipment Identity (IMEI) number.
15. A method according to claim 1, wherein the configuration data comprises an International IMEI or IMSI such that the user is enabled to roam between multiple unique identifiers whilst still keeping the same subscriber account.
16. User equipment adapted for use in a cellular telecommunications network, the user equipment comprising: a processor; an interface block comprising of at least an over the air (OTA) interface wherein the interface block is adapted for receiving a configuration communication from a cellular telecommunications network, said configuration communication comprising configuration data to be used for modifying a configuration of the user equipment; wherein said OTA interface receives a user agent and the user agent is installed on the user equipment; a memory comprising a configuration data store for defining the configuration of the user equipment, a configuration manager executed by the processor for receiving the configuration data in a compatible format which can be processed by the configuration manager for modifying the configuration data store, wherein said OTA interface receives the configuration data in a format other than the compatible format; and wherein the installed user agent executed by the processor receives the configuration data and transforms the configuration data into the compatible format for processing by the configuration manager.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) In the following the invention will be described in greater detail by means of preferred embodiments with reference to the accompanying drawings, in which:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
DETAILED DESCRIPTION OF THE PRESENTLY PREFERRED EMBODIMENTS OF THE INVENTION
(15) The embodiments of the present invention described below are applicable to any communication system capable of providing communication services that may be individually provisioned to users of the communication system. Such systems include mobile communication systems, fixed telecommunication systems, and a variety of clustered combinations of them. However, in the following, the present embodiments are described in the context of configuring mobile user equipment.
(16) Referring to
(17)
(18)
(19) A mobile network refers generally to any telecommunications network that subscribers may access, and wherein the access point to the system may change when users are moving within the service area of the network. A typical mobile communications system is a Public Land Mobile Network (PLMN). The mobile communications network is often an access network providing a user with wireless access to external networks, hosts, or services offered by service providers. The configuration of PLMN will be discussed in more detail with reference to
(20) As an example of external networks,
(21)
(22) The user equipment 10 is also capable of communicating locally with a network node (NN) 14. Local communication in this context refers to any communication that may be performed without involving the network connection, here without the cellular resources of the PLMN 11. Examples of the technologies available for the local communication comprise Wireless Local Area Network (WLAN), Bluetooth, Infrared, use of cables, etc. The network node 14 is connected to the IP packet data network 12 and is thus capable of exchanging information with the provisioning server 13.
(23) As illustrated in
(24) The core network CN may be logically divided into a circuit-switched (CS) domain 216, a packet-switched (PS) domain 218, 220 and an IP multimedia subsystem (IMS) 222.
(25) The CS domain refers to a set of all the CN entities offering CS type of connection for user traffic as well as all the entities supporting the related signalling. A CS type of connection is a connection for which dedicated network resources are allocated when a connection is established and released when the connection is released.
(26) A PS type of connection transfers the user information using packets so that each packet can be routed independently from the previous one. An example of the PS domain may be the GPRS (General Packet Radio Service), and the typical entities may include a serving GPRS support node (SGSN) 228 and a gateway GPRS support node (GGSN) 230. The IP multimedia subsystem comprises CN elements for provision of multimedia services. The IP multimedia subsystem IMS utilizes the PS domain to transport multimedia signalling and bearer traffic. Consequently, UE accessing the PS core network, and the PS core network itself, utilizes the services provided by the radio access network to provide packet-mode communication between the UE and the PS CN subsystem. The multiple access method employed in the air interface in the RAN may be Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Code Division Multiple Access (CDMA), or any other method or a combination thereof.
(27) For delivery of configuration messages, mobile networks also provide an additional service for short messages (SMS). The radio interface of mobile network provides a service access point for short messages. This allows the messages in SMS to be transported as if they were signaling messages meant for a network entity, but they are, in a sense, user traffic because they are delivered to and consumed by the user in the user equipment.
(28) In order to provide media communication services to the user equipment through the communication system, a packet based media communication system 226 may be provided on top of the mobile network. In
(29) As shown in
(30)
(31) Examples of said input unit in network elements 13, 14 comprise plug-in units acting as a gateway for information delivered to its external connection points. For receiving information from the operator of the network element, the interface block 33 of the network element may also comprise a keypad, or a touch screen, a microphone, or the like (not shown). Examples of said output unit 35 in network elements 13,14 include plug-in unit feeding information to the lines connected to its external connection points. For outputting information to the operator of the network element 14, they may also comprise a screen, a touch screen, a loudspeaker, or the like (not shown).
(32) The interface block 33 of the user equipment 10 typically comprises at least a user interface unit for communicating with the user and a radio interface unit for communication over the cellular mobile network. In addition, the user equipment may comprise additional interface units, for communication over another type of cellular network, or in another frequency, or for local communication. Examples of the technologies used for the local communication comprise Wireless Local Area Network (WLAN), Wi-Fi, Wi-Max Bluetooth, Infrared, use of cables, etc. Depending on the application, the implementation of such interface units may comprise a plug-in unit exchanging information through lines connected to external connection points of the user equipment, or light/radio transceiver units with appropriate protocol stacks in the user equipment.
(33) The processing unit 31, memory unit 32, and interface block 33 are electrically interconnected for performing systematic execution of operations on the received and/or stored data according to the predefined, essentially programmed processes of the element. In the present embodiments, the operations comprise functions for implementing the logical units, operations and interfaces of the elements 10, 13, 14 as will be described in the following.
(34)
(35) The provisioning message generator 401 of the embodied provisioning server 13 is further configured to compile the provisioning message msg.sub.cf into a data packet, address the data packet to a network node 14 authorized to handle configuration messages of the user of the user equipment 10, and forward the data packet to the network unit 404 of the provisioning server. The operation to send the configuration message 416 through the network unit 404 may be the primary, or sole functionality of the provisioning message generator 401, or it may be an alternative or secondary functionality initiated when delivery through the radio unit 402 is detected to fail. The network unit 404 sends the data packet through the IP packet data network, illustrated as crossing the network interface (NIF) 405.
(36) The user equipment 10 comprises a configuration database 406 that comprises information on, for example, access points, Session Initiation Protocol (SIP) profiles 406a, and Voice over IP (VOIP) profiles 406b. This information may be modified with a formatted message from an authorized source. In the conventional way, the short message from the provisioning server 13 is received by the radio unit 407 of the user equipment 10, and forwarded to the signal processor 408 of the user equipment. The signal processor 408 detects the message to be a configuration message, implements necessary authorization procedures and if the authorization succeeds, implements a requested database operation in the configuration database 406 of the user equipment 10. Authorization procedures related to over-the-air (OTA) configuration are generally known to a person skilled in the art and will not be disclosed in more detail herein.
(37) In the embodied solution, the network node 14 receives the data packet from the provisioning server 13 through a network unit 409. The network unit 409 forwards the data packet to the signal-processing unit 410 of the network node, which detects the data packet to comprise a configuration message msg.sub.cf comprising the configuration information for delivery to the user equipment 10. The signal-processing unit 410 of the network node creates a local configuration package lcp.sub.cf 414 comprising a user agent 415, and the configuration message msg.sub.cf 416 (see
(38) The local communication unit 411 of the network node 14 sends the data package 414 to the user equipment 10 locally, illustrated in
(39) The local configuration package lcp.sub.cf 414 from the local network node 14 is received by the corresponding local communications unit 413 of the user equipment 10, and again forwarded to the signal processor 408 of the user equipment. This time the signal processor 408 detects the message to be a user agent 415, implements necessary authorization procedures and if the authorization succeeds, installs the user agent 415 in the user equipment 10.
(40)
(41) The different data streams are input to a pre-processor 53 that detects an input dataflow, determines its type and, according to the determined type, implements a predefined pre-processing algorithm 57a which utilises one of a plurality of transforms 57b stored in a local data store 59, and forwards the data stream using a predefined functionality. Typically, a data stream related to a configuration message msg.sub.cf 416 received over the radio interface 407 in one format is manipulated with a predetermined format transformation algorithm 58 into another format applicable for controlling the configuration database operations. This predetermined format transformation algorithm 58 is provided by the user equipment manufacturer to enable the user equipment to be configured, typically, remotely using over-the messages such as SMS messages and information relating to it requires involving the user equipment manufacturer. Due to the provision of this format transformation algorithm 58, the network node 14 of a third party cannot directly submit a configuration message msg.sub.cf 416 received from the provisioning server 13 to the user equipment 10 in order to implement a configuration database operation.
(42) The modified configuration message msg.sub.cf,P 60 received from the radio interface is forwarded to the inbox 54 of the messaging service used in the radio interface 50. In the present embodiment this relates to an SMS inbox 54 of the user equipment 10. Reception of the configuration data stream in the inbox 54 initiates a user authorization procedure. During the user authorization procedure, the inbox 54 stores the received data, forwards a message informing the user about an incoming message to the user interface 52, and receives through the use interface 52 the response of the user. In the case the authorization succeeds, the inbox 54 forwards the configuration data to the configuration manager 55. The configuration manager 55 is a logical module of the signal-processing unit that, according to the information in the received data streams, performs database operations on the configuration database 406. In the embodied example, the configuration manager 55 amends the records (such as the SIP profiles 406a, the VOIP profiles 406b and other stored user equipment configuration variables) in the configuration database 406 according to the parsed information of the XML document (configuration message 416).
(43) A local configuration package lcp.sub.cf 414 arriving to the user equipment 10 through IF2 51 is detected by the pre-processor 53 to be an application and, typically without substantial pre-processing, forwarded to an application manager 56. The application in this embodiment is the user agent 415. The application manager 56 is a logical module of the signal processing unit 408 that, according to the information in the received application data streams, performs operations for initiating, ending, and pausing applications, installing the applications and de-installing them, mediating input information to the applications and output information from the applications, and any other tasks necessary for maintaining and running the applications in the user equipment 10.
(44) On receiving a data stream, the application manager 56 performs the application operations according to the received application message, for example installs a user agent 415 in the user equipment by storing the received program code of the user agent 415 in the application database 57.
(45) In the present embodiment, a local configuration package lcp.sub.cf 414 comprises a user agent 415, and the configuration message msg.sub.cf 416 (see
(46) It should be noted that the division of the operations of the network node 14, the configuration manager 55 and the inbox 54 is merely illustrative. For example, the functionality for initiating an authorization for a configuration operation may be implemented in the inbox or in the configuration manager. Correspondingly, the functionality for initiating an authorizing for an application operation may be implemented in the inbox or in the application manager.
(47) Through the above disclosed device structures and functions, configuring of the user equipment 10 may be performed locally by a third party, i.e. a party that is not the equipment manufacturer or the service provider. This has not been possible before and therefore the present embodiment provides a significant advantage for the configuration operations in challenging or non-existent radio environment, for example in the areas of poor network coverage. The above structures and functions may be implemented without major changes to the configurations, protocols and/or interfaces of the equipment involved. Additionally, the operations in the network node comprise substantially combining a received configuration message with a generic user agent. This is a straightforward operation, and does not require high technical skills from the operator of the network node 14 (in most of the cases the owner of the user equipment 10). The embodiment of the present invention thus provides an easy to use mechanism that may be comfortably distributed to a plurality of users.
(48) The use of a user agent 415 and an inbox 54 provides a possibility for interaction with the user, and thus provides a further advantage of the present embodiment. The user agent 415 may be configured to provide the user with two or more alternative configurations, of which the user may choose the one most advantageous to the current purpose. Alternatively, the user agent 415 may be configured to output the current configuration to the user, and provide him or her with the possibility to edit one or more of the parameters of the configuration. This gives a feeling of control, and improves the user-friendliness of the provisioned service.
(49) The signalling chart of
(50) Steps 6-6 to 6-9 illustrate an optional acknowledgement mechanism that may be added to the implementation. The user agent 415 may be configured to monitor the progress of the configuration procedure in the user equipment 10, and detect whether the procedure was successful or not. In response to the detection, the user equipment 10 may thus return at Step 6-6 to the local network node 14 an OK/NOK message. The network node 14 packages this into a format corresponding to a conventional over-the-air acknowledgement message and sends at Step 6-8 the message to the provisioning server 13. The provisioning server 13 marks the configuration completed and ends the configuration session at Step 6-9.
(51) The flow chart of
(52) The flow chart of
(53) In case the optional acknowledgement mechanism is in use, the user agent 415 monitors at Step 87 the progress of the configuration procedure. If the configuration is successfully completed at Step 87, the user agent 415 generates an OK message that the user equipment 10 sends at Step 89 to the network node 14, and the configuration procedure in the user equipment ends. Otherwise a NOK message is sent at Step 88 and the configuration procedure in the user equipment ends.
(54) A second aspect of the present invention is now described in a further embodiment with reference to
(55) Whilst the present embodiment is described in the context of a mobile telecommunications device, such as a mobile telephone, the second aspect of the present invention is not limited to this application. Rather, the present invention can be applied to any method or system for securely registering and authenticating subscribers of a communications service.
(56) The term user device as used herein after refers to user equipment, which in this non-limiting embodiment is a mobile telecommunications device (handset). The term provisioning server has the same meaning as that described in the previous embodiment namely to a provisioning system. The term user credentials as set out in the present embodiment refers to a username and password. However, this term has a broader meaning, which extends to any means for identifying a user and then permitting verification of that user's identity. An example of this could be a user account number and a PIN.
(57) Referring now to
(58) The user device 502 has a structure as described generally in
(59) The server 504 also has a structure as described previously in
(60) Referring now to
(61) The method 600 continues with the configuration program 511 determining at Step 604 whether the user of the device 502 wishes to register with the service provided by the provisioning server 504. If the user indicates that they do not wish to register, then a warning is displayed at Step 606 to the user on the user device 502 and the method ends, at Step 608. However, if the configuration program 511 determines that the user does wish to register then the configuration program 511 retrieves, at Step 610, the unique device identity and the device's network identity, namely the IMEI 508 and the IMSI 510; these identifiers are simply read from the data store 32.
(62) The device 502 constructs and then sends, also at Step 610, via the communications channel 506 an asynchronous pre-access request message 611 to the server 504 containing the unique identifiers 508, 510. It is also possible to send some of the other identifiers 513 at this stage such as the ICCID, though this is not essential.
(63) The server 504 receives, at Step 612, the asynchronous message and determines if any of the identifiers 508, 510 is previously known by searching the plurality of user records 520 stored in its database 518 for a match. If an identifier match for any of the received identifiers occurs, then an asynchronous response message, for example an SMS message, is constructed at Step 614 and sent back to the device 502 via the communications channel 506 which is part of a public communications network that can be assumed to be relatively secure. The response message 615 indicates that the user is known to the server 504, typically by a flag being set in the response message. The purpose of sending the response message 615 back to the device 502 is to enable subsequent verification that the user controls the device whose identifiers were passed to the server previously. This can be considered within a mobile environment to be a GSM check, which can be a requirement of the configuration program 511 running on the device 502. If the received identifiers 508, 510 are unknown, the response message 615 is still sent but indicating that that the user is unknown.
(64) Also, whether or not there is a match at Step 614, the details of the pre-access request 611 are recorded in the server session log (not shown). This can be of use later if an access request 639 needs to be verified as being authentic.
(65) The program 511 then processes at Step 622 the response message and determines at Step 624 whether the identifiers were known to the server 504. If the device and network identifier pair 508,510 are unknown, the program 511 determines at Step 626 whether a new account record 520 is required or whether an existing account record 520 is to be updated with the new information. If a new account record is required, the method continues at Step 628 as is shown in
(66) If the device and network identifier pair 508, 510 were known from Step 622, the user is prompted at Step 630 to enter the user credentials 512 which relate to that account record 520.
(67) If such user credentials 512 are not entered, then the program 511 displays at Step 632 a warning to the user and the method ends at Step 634. If, however, the user credentials 512 are entered at Step 636 (or the device simply retrieves the stored set of credentials 512, such as username and password), then an access request message 639 is constructed which includes the user credentials 512 and the unique information which relates to the previously transmitted identifier pair 508, 510.
(68) The device 502 then sends at Step 638 the access request message 639 to the server 504 as a synchronous message, for example an HTTPS post. The program 511 expects with a synchronous message to receive an automatic confirmation of delivery of the message within the messaging protocol. This assists in the security of the program as such a response can be a requirement of proceeding with the next steps in the operation of the device 502.
(69) The server 504 receives at Step 640 the synchronous access request message 639 and searches at Step 642 for the credentials 512 in its database 518. It determines at Step 642 if the credentials 512 are correct, and if so, returns a synchronous authentication response message 643 to the device 502 confirming success. If the credentials 512 are incorrect the server 514 returns a synchronous authentication response message 643 to the device 502 indicating failure.
(70) The device receives, at Step 644, the synchronous authentication result message 643 from the server 504. If the device credentials 512 are incorrect as determined at Step 646, the program 511 informs the user of the failure at Step 648 and determines at Step 650 whether the user wishes to retry. If the user does wish to retry, the user is taken back to the user credential entry stage at Step 636. Alternatively, a warning is presented at Step 652 to the user and the method exits at Step 652. If however the device credentials 512 are determined to be correct at Step 646, then the method 600 progresses to the updating an existing account stage at Step 656 as described below with reference to
(71) Referring to
(72) The configuration program 511 constructs at Step 658 a synchronous update message 659, which contains the device and network identifier pair 508, 510, and all the other identifiers 513 for the programs on the device 502, including the source of the configuration program 511. The device 502 then sends at Step 658 the synchronous update message 659 to the server 504.
(73) The server 504 receives, at Step 660, the update message 659 from the user device 502 and compares at Step 662 its details with those of the user's existing user account record 520 previously determined. If the details stored in the user's account record 520 do not match those provided in the update message 659, the server program 516 knows that there is new information in the update message 659 which has to be added to the user's account record 520. The program 516 then instructs the user database 518 to update, at Step 664, the user account record 520 with the new details. The server then constructs and sends, at Step 666, an update response message 671 which confirms a successful update of the user's account record 520. This response message 671 is sent as a synchronous message to the user device 502.
(74) Also the device 502 is sent at Step 668 a further update confirmation message (not shown) which is an asynchronous message, such as an SMS message which simple confirms at a user level that the update has been successful.
(75) Alternatively, if the details stored in the user's account record 520 all match those provided in the update message 659, then there is no new data to update the user account record with. In this case, the server constructs at Step 670, an update response message 671 which confirms an unsuccessful update of the user's account record 520. This response message 671 is then sent as a synchronous message to the user device 502.
(76) The user device receives at Step 672 the update response message 671 and determines at Step 674 whether or not the update was successful.
(77) If the server has updated the user's account record 520, then the user device's account settings (such as those provided in the SIP profiles 406a and the VoIP profiles 406b) are updated, at Step 676, with the new identifiers (new details) to enable the user to try to use this identifier pair at the next time the user device must obtain authorisation from the server. The user is then informed, at Step 678, of the successful updating of the user device's account settings and the method 600 ends at Step 680.
(78) If the server has indicated an error/failure in the update response message 671, the configuration program 511 informs, at Step 682, the user of this and offers, at Step 684, the user the option of retrying the update procedure. If the user declines this option the method 600 ends at Step 680. Alternatively, if the user accepts, the configuration program retries, at Step 658, constructing and sending the update message 659 to the server 504.
(79) Referring now to
(80) The method 600 continues with the terms and conditions for the service being presented, at Step 686, to the user. The method then determines, at Step 688, whether the user accepts these terms and conditions. If they do not, the method ends at Step 690.
(81) If the user accepts, then the configuration program 511 constructs at Step 692 a synchronous new account message 693 which contains the device and network identifier pair 508, 510, and all the other identifiers 513 for the programs on the device 502, including the source of the configuration program 511. The device 502 then sends at Step 692 the new account message 693 to the server 504.
(82) The server 504 receives, at Step 694, the new account message 693 from the user device 502 and compares, at Step 696, the identifiers 508, 510 provided in the new account message 693 with those stored in any of the user account records 520. If none of the identifiers 508, 510, stored in any one of the account records 520, match those provided in the new account message 693, the server program 516 instructs the user database 518 to create, at Step 698, a new user account record 520 comprising all of the new user details. The server 504 then constructs and sends, at Step 700, a new account response message 701 to the user device 502. The new account response message 701 confirms a successful creation of a new user account record 520 and includes details of the new user account record 520, such as the new user credentials 512 which have been assigned to this account record 520. This new account response message 693 is sent as a synchronous message to the user device 502, in view of the user account credentials contained therein.
(83) Alternatively, if any of the identifiers 508, 510 stored in any of the user account records 520 match those provided in the new account message 693, the server constructs and sends, at Step 702, a new account response message 701 which confirms an unsuccessful creation of a new user account record 520. This new account response message 701 is sent as a synchronous message to the user device 502.
(84) The user device 502 receives, at Step 704, the new account response message 701 and determines, at Step 706, whether or not the new account record 520 was successfully created.
(85) If the server has created a new user account record 520, then the user device's account settings (such as those provided in the SIP profiles 406a and the VoIP profiles 406b) are saved, at Step 708, with the new identifiers to enable the user to try to use this identifier pair at the next time the user device 502 must obtain authorisation from the server 504. The user is then informed, at Step 710, of the successful creation of the new user account record 520 and the method 600 ends at Step 690.
(86) If the server 504 has indicated an error/failure in the new account response message 701, the configuration program 511 informs, at Step 712, the user of this and offers, at Step 714, the user the option of retrying the new account set up procedure. If the user declines this option, a customer service department is notified, at Step 716, and the method 600 ends at Step 690. Alternatively if the user accepts, the configuration program 511 retries, at Step 692, constructing and sending the new account message 693 to the server 504.
(87) Accordingly, the above embodiment can be considered to be a method and system for securely registering and authorising users of a telephony service where multiple unique identifiers may be required by each device and network identifier, using both synchronous and asynchronous messaging, whilst preventing the creation of duplicate accounts and ensuring that each unique identifier is verified for the prevention of fraud and other illegal activities. In another aspect, the present invention provides a computer program product encoding a computer program of instructions for executing a computer process.
(88) In another aspect, the present invention provides a computer program distribution medium readable by a computer and encoding a computer program of instructions for executing a computer process.
(89) The distribution medium may include a computer readable medium, a program storage medium, a record medium, a computer readable memory, a computer readable software distribution package, a computer readable signal, a computer readable telecommunications signal, and/or a computer readable compressed software package.
(90) Embodiments of the computer process are shown and described in conjunction with
(91) It will be obvious to a person skilled in the art that, as the technology advances, the inventive concept can be implemented in various ways. The invention and its embodiments are not limited to the examples described above but may vary within the spirit and scope of the claims.