Method and device for co-ordinating telecommunications services

ABSTRACT

The present invention relates to a method and to a system ( 6 ) for coordinating the use of telecommunications service providers ( 7 ). The method grants a service request submitted by a user ( 8 ) to a service provider ( 7 ) as a function of the current state of a state diagram of a unique environment of the user ( 8 ) and events associated with the service request. The coordination system ( 6 ) includes an access module ( 11 ), a profile manager module ( 13 ), a user agreement module  14  and at least one environment manager ( 15 ).

[0001] The present invention relates to a method and to a system for coordinating the use of telecommunications service providers.

[0002] The fields of the invention are those of telecommunications services on distributed system architectures and intelligent networks.

[0003] Throughout this text, the expression “telecommunications service provider” refers to any service provider accessible to a user from a telecommunications terminal via a telephone network or a computer network, such as a data network of the Internet type. The telecommunications terminal is either a computer terminal or a telephone terminal. To illustrate the service provider concept, four service providers are listed hereinafter by way of example. A first service provider offers communications with another user, via a link that either carries audio data only or else carries video data also. A second service provider offers consultation of databases. A third service provider offers data processing, for example bank account management. A fourth service provider offers data storage, for example storing a message in a messaging service.

[0004] One highly advantageous application of the invention lies in coordinating different telecommunications services executed on behalf of the same user, even if the services are provided by different telecommunications operators. Thus the invention provides a user with a single service agreement guaranteeing consistent execution of different telecommunications services and a generating a single bill for all the services, even if they are in fact provided by different telecommunications operators or service providers.

[0005] At present, consumers using different telecommunications services are not always guaranteed consistent execution of the services. If an inconsistency is detected, it is usually referred to as “negative interaction”. This problem of negative interaction occurs in particular when services are executed simultaneously or are provided by different telecommunications operators or service providers. Negative interaction may occur if a user accesses a first service provider to communicate via a mobile telephone and a second service provider to access the Internet via a computer terminal and the two service providers are operated by the same telecommunications operator. The user cannot necessarily be sure that use of Internet services via the first communications service provider using a mobile telephone will be identical to or consistent with the use of Internet services via the second service provider, regardless of the capacities of the terminals or the networks themselves. For example, the Internet service provider may fail to recognize that the user is the same person when he accesses the service provider from a mobile telephone and from some other terminal. Each service provider recognizes a user by his user profile, which can include the name of the user, his address, a list of the service providers to which he subscribes, personalized service access profiles, etc. Each service provider defines the content of the user profile that it manages.

[0006] Furthermore, each operator offers service providers to which a user can request access, for example by dialing a particular telephone number, an access code, or a telephone card number. If a user requests access to a service provider and the request is validated, the user is assigned a service session, i.e. an access path to the service provider. Once he is using a particular first service provider, the user may wish to use a second service provider. Despite the agreements entered into with the operator, stringing from the first service provider to the second service provider is not always possible or in accordance with the agreements. For example, this kind of situation arises when using a particular kind of telephone card that can be used to make calls from any telephone. The user can access the call service provider associated with the card from any telephone by dialing an access code followed by a code related to the card. The call service provider then enables the user to use that telephone as if it were a private telephone. In particular, the user can interrogate a telephone information service provided by the operator. If the information requested is a telephone number, the service provider can forward the call to that number, even if a direct call to that person is not permitted by the telephone card service provider. Because the agreement between the cardholder and the service provider related to the card defines the conditions of use of the card, in particular the geographical area within which the user can call another party, there is an inconsistency in stringing from the first service provider, relating to use of the telephone card, to the second service provider, forwarding a call from an information service. The information service has no knowledge of the content of the agreement, and in particular of restrictions limiting the geographical areas that can be called, and forwards the call of the cardholder even if the called party is in a geographical area that the user cannot directly call because of the restrictions in his agreement.

[0007] Methods known in the art are employed to combat negative interaction between service providers. They define a direct dialogue mechanism between different service providers accessed by the same user. The drawback of those methods is that they impose a common architecture on the service providers and consequently make evolution of the service providers interdependent.

[0008] Thus the technical problem to be solved by the present invention is that of providing a method of coordinating the use of telecommunications service providers that does not have the above-mentioned drawbacks and that avoids the problem of negative interaction between different telecommunications service providers that the same user wishes to access.

[0009] According to the invention, a solution to the stated technical problem is for said method to comprise the following steps:

[0010] on each request for access to a service provider from a user, activating a unique environment, consisting of a profile of said user and service sessions associated with said user, and processing validation of the service provider access request,

[0011] assigning each service provider whose access request is validated a unique session forming part of the unique environment of the user,

[0012] managing said unique environment by modeling the states that the environment of the user can take and the relations between its states by means of a state diagram in which changes of state are triggered by given events, some of which are associated with the services offered by the service providers,

[0013] granting a service request submitted by a user to a service provider having a session as a function of the current state of the state diagram of the environment of the user and events associated with the service request, and

[0014] updating the environment of the user on proceeding to the next state of the state diagram of the service provider.

[0015] The invention further provides a system for coordinating the use of telecommunications service providers when the use of a service provider is invoked by a user from a telecommunications terminal and the telecommunications service providers are connected to the coordination system by a network. Said coordination system includes:

[0016] an access module, constituting a first entry point of the coordination system addressed by any service provider, referred to as a requester service provider, which receives an access request from a user,

[0017] a profile manager module connected to the access module and including a user profile and service provider profile database and a profile manager connected to the database,

[0018] a user agreement module containing a list of agreements with the telecommunications service providers entered into by the users, information on the telecommunications service providers, and a list of access and service charges, and

[0019] at least one environment manager connected to the profile manager module and the user agreement module, constituting a second entry point to the coordination system addressed by any service provider whose access request is validated.

[0020] The coordination method and system of the invention solve the stated problem, because centralized management of the user environment associates a user with a single environment address which corresponds to an environment manager. The environment manager dialogues with all of the service providers that the user wishes to access and updates at least one state diagram that is characteristic of the environment of the user and evolves as a function of the service providers the user accesses and the services that the user requires of those service providers.

[0021] The coordination method and system provide the service providers with the information that they need provided that the information can be shared without risk. The coordination method and system thus prohibit a loss of consistency between the data characterizing the user and his environment and guarantee blocking of access to confidential data. They effect operations on behalf of the service providers, guaranteeing compliance with agreements between the service provider and a client. The client and the user can be the same individual or different individuals, or the client can be a body corporate and designate one or more users who are either individuals or bodies corporate.

[0022] Knowing the environment of the user at all times enables the coordination method and system to supply the current location of the user, i.e. his address on the network. This location function can be based on one or more existing servers, such as a GSM network's home location register (HLR).

[0023] The invention solves the problem of negative interaction by means of a dialogue between the coordination system and each of the requester service providers. Thus service providers can evolve independently of each other.

[0024] The coordination method and system of the invention have the advantage that they do not impose a particular development platform, either on the coordination system or on the service providers. Nor do the method and system impose a common architecture on the requester service providers.

[0025] The coordination method and system of the invention can advantageously identify and/or authenticate the user.

[0026] Other features and advantages of the invention become apparent on reading the following description of particular embodiments of the invention. The description is given with reference to the accompanying drawings, which are provided by way of non-limiting example.

[0027]FIG. 1 is a flowchart of a method of the invention.

[0028]FIG. 2 is a block diagram of a coordination system of the invention.

[0029]FIG. 3 is a diagram illustrating the use of a coordination system of the invention with multiple service providers.

[0030] The context of the invention is as follows. A user seeks to use one of several telecommunications service providers from a telecommunications terminal. The telecommunications service providers are connected by a telephone or computer network to a coordination system which implements a method in accordance with the invention which coordinates the use of telecommunications service providers and administers a centralized user profile base.

[0031] The method of the invention for coordinating the use of telecommunications service providers includes the steps described below and shown in FIG. 1.

[0032] In a first step 1, a unique environment based on the user profile is activated on each request by a user to access a service provider. If an environment has already been activated for that user, it is used for the remainder of the processing. The method also processes validation of the request to access the service provider. The access request is refused, i.e. not validated, if the user cannot use the service provider. There are various reasons why a user can be unable to use a service provider. They might be dictated by an agreement between the user and the service provider operator or related to conditions of use of the service provider. For example, a given service provider might be accessible only from certain terminals.

[0033] In a second step 2, a unique service session is assigned to each service provider whose activation has been validated. The session is then part of the unique environment of the user.

[0034] In a third step 3, the unique environment of the user is managed by modeling the states that the environment of the user can take and the relations between those states, using a state diagram in which changes of state are triggered by given events, some of which are associated with services offered by the service providers. The following example corresponds to one particular embodiment in which the environment is managed using a plurality of state diagrams. There is a state diagram for each service session and the environment is associated with another state diagram. The states of a state diagram always include a start state and an end state. The states between these two states depend on the modeling of either the service provider or the environment. For example, an initial state, a charge metering authorization state, and a charge metering state can be defined in the state diagram of a service provider. The initial state is reached from the start state after receiving a request from a user to access the service provider. The charge metering authorization state is reached from the initial state after the service provider access request is validated. The charge metering state is reached from the charge metering authorization state after the service request submitted by the user is granted. The final state is reached from the initial state, charge metering authorization state and charge metering state after the decision is taken to interrupt use of the service provider. The decision can result from an action of a user wishing to interrupt use of the service provider himself or it can be taken by the method as a function of conditions of use of the service provider, as a function of an agreement, or as a function of the amount of credit granted to the user.

[0035] In a fourth step 4, authorization is granted to a service request submitted by a user to a service provider, to which a service session has been assigned, as a function of the current state of the state diagram of the environment of the user, as a function of specifications of use of the service provider indicated in the agreement, and as a function of the nature of the service request and the events associated with the request.

[0036] In a fifth step 5, the environment, in particular the user profile, is updated on proceeding to the next state of the state diagram.

[0037]FIG. 2 is a diagram of a coordination system 6 of the invention which is addressed by a telecommunications service provider 7 when it is invoked by a user 8. The user 8 can invoke one or more telecommunications service providers 7 from a telecommunications terminal 9 such as a landline or mobile telephone or a computer. The telecommunications service providers 7 are connected to the coordination system by a network 10.

[0038] The coordination system 6 includes an access module 11, an identification and authentication module 12, a profile manager module 13, a user agreement module 14, and an environment manager 15.

[0039] The access module 11 is a first entry point of the coordination system 6, which must be addressed by any service provider 7 that receives an access request from a user 8. The service provider 7 sends the access module 11 a request containing information concerning the identity of the user 8, including at least an identifier and, where applicable, a password, an address, etc., and information concerning the service provider 7, such as characteristics defining the session between the user 8 and the service provider 7, the session address, etc. The access module 11 can be a server or any equivalent means.

[0040] The identification and authentication module 12 is connected to the access module 11 and its function is to identify and authenticate the user 8. On the basis of information concerning the identity of the user 8, the identification and authentication module 12 verifies the existence of that identity and authenticates the user 8 for service providers 7 that require authentication, for example verification that a password supplied by the user 8 has previously been assigned to that user. The identification and authentication module 12 communicates the identification and authentication result to the access module 11. The identification and authentication module 12 can be omitted or replaced by an equivalent module external to the coordination system 6. If the identification and authentication module 12 is absent, the user must supply an identifier to access a service provider. In a different embodiment, the identification and authentication functions can be implemented in two separate modules. The identification and authentication module 12 can be installed on the same server as the module 11, on another server or on any equivalent means.

[0041] The profile manager module 13 includes a profile manager and a profile database. The database can be stored in and distributed between local or remote memories. The profile manager module 13 is connected to the access module 11, which supplies it with the identifier of the user 8. The profile manager interrogates the database to obtain the profile that corresponds to the identifier of the user 8 and personalized profiles, if any, of the service providers linked to the profile. The profile manager creates an environment for the user 8 and supplies it to the environment manager 15, or to one of the environment managers 15 if there is more than one. The profile manager module 13 interrogates the environment manager 15 in charge of the profile of the user and obtains in response a service session identifier specific to the interrogated environment manager 15. The profile manager module 13 communicates the service session identifier and the address of the environment manager 15 in the network 10 to the access module 11, which transmits them to the requester service provider 7. Before creating an environment for the user 8, the profile manager module 13 checks that there is no environment manager already working on the environment of the user 8. If there is, the profile manager module 13 supplies it with the information on the requester service provider 7 so that it can modify the environment of the user 8. In return, the environment manager 15 sends a service session identifier to the profile manager module 13, which the latter communicates, together with the address of the environment manager 15 in the network 10, to the access module 11, which transmits them to the requester service provider 7. The exchanges previously described between the profile manager module 13 and the environment manager 15 guarantee a unique environment for the user 8. The profile manager module 13 can be installed on the same server as the access module 11 and the identification and authentication module 12, on another server or on any equivalent means. The profile database can be stored in a memory of the server of the profile manager module 13 or in separate mass memory.

[0042] The environment manager 15 is connected to the profile manager module 13 and the user agreement module 14, and constitutes a second entry point of the coordination system 6. The environment manager 15 carries out various operations on behalf of the service providers based on its knowledge of the utilization context of the service providers that a user 8 can invoke and of the profile of that user 8. In particular, it determines service authorizations, charges to be applied, the cost of a service, and actions to be undertaken with service providers, such as sending a notification and sending a stop instruction, using the user agreement module. The environment manager 15 has its own logic enabling it to conduct the above operations and to dialogue directly with the requester service providers, based on modeling by a state diagram of states that the user environment can take and relations between those states. Changes of state are triggered by given events, some of which are associated with the services offered by the service providers. Each environment manager 15 acts on one or more user environments it has been assigned to manage by the profile manager module 13. The environment manager 15 can be installed on the same server as the profile manager module 13, the access module 11, and the identification and authentication module 12, on another server or any equivalent means.

[0043] The user agreement module 14 includes a charging and added value module, a service catalogue module, and a customer management module. The charging and added value module contains a list of charges and of service costs linked to service providers. The service catalogue module contains information describing services, or service use contexts, common to all the users of the system 6 and to their environments. The customer manager module contains a list of agreements relating to service providers with which users have entered into an agreement. The information from the user agreement module is useful to the environment manager 15 in deciding whether to grant the user 8 access to the service provided by the service provider 7.

[0044] The coordination system 6 can be entirely installed on an intelligent network entity known as the service control point (SCP) or distributed between servers interconnected by a network.

[0045] The procedure when a user 8 wishes to access a service provider 7 is as follows: the service provider 7 supplies to the first entry point 11 a first identifier provided by the user. The user 8 is optionally identified and authenticated. Identification or authentication can have a negative or positive outcome. The outcome is negative, for example, if the user 8 is unknown or if the password supplied is incorrect. When the outcome is positive, identification terminates with the supply of a second identifier. Supplying the first identifier or the second identifier, where applicable, activates the profile of the user 8 and automatically sets an indicator which tells the coordination system 6 that the service provider 7 is requesting to be activated on behalf of the user 8. Knowing his profile, the coordination system 6 creates a unique environment for the user, which consists of the profile of the user and the service sessions assigned to him. The coordination system 6 validates the service provider access request or not, as a function of information on the user it obtains from his profile and information it obtains on the service provider, in particular from the user agreement module. It may not validate the request if the service provider is prohibited to the user, for example. After validating the service provider access request, the coordination system 6 supplies the service provider 7 with a unique session that the service provider 7 must use for all subsequent operations, for which the service provider 7 addresses itself to the second entry point 15 of the coordination system 6 with its session at the time of each operation. For example, these are operations that enable the service provider 7 to obtain authorization to provide a service, to obtain information on the user 8, to request stopping or starting of charging for a service, to modify information on the user 8, or to request notification of an event to the user 8, or operations for requesting invocation of another service provider 7 for the user 8 or indicating the end of use of the current service provider 7 on behalf of the user 8.

[0046] When the user 8 accesses a service provider 7, the latter must interrogate the coordination system 6:

[0047] if the user 8 requests a service that necessitates location of a user that the service provider 7 wishes to contact,

[0048] if the user 8 requests a service that necessitates personalization to identify the user and obtain information concerning him,

[0049] if the user 8 requests a service that necessitates a payment and an invoice,

[0050] if the user 8 requests a service that leads to him being supplied with information from a domain authorization,

[0051] if the user 8 requests a service that leads to an operation being effected on his behalf necessitating authorization,

[0052] if the ending of a service requested by the user 8 necessitates stopping a payment and an invoice that are time-dependent, or

[0053] at the end of use of the service provider 7 on behalf of the user 8, to indicate that use of the service provider 7 is terminating.

[0054]FIG. 3 is a diagram showing the use of a coordination system of the invention with multiple service providers. A coordination system 6 of the invention coordinates the use of different service providers 7 by the same user 8. Exchanges between the service providers 7 and the coordination system 6 take place via links of the network 10. The service providers 7 that address the coordination system 6 have an interface which dialogues with the entry points of the coordination system 6 and commands accessible to the coordination system 6 enable it to send notifications to the service providers 7 and to monitor them if required. For example, one notification is a warning message to inform the user 8 that almost all his credit is used up. Monitoring is necessary to interrupt a service when the credit of the user 8 is all used up, for example.

[0055] A coordination system of the invention is also a multi-user system. It simultaneously coordinates the use of service providers for different users, whether the service providers used by the users are identical or different or overlap. 

1. A method of coordinating the use of telecommunications service providers when the use of a service provider (7) is invoked by a user (8) from a telecommunications terminal (9), which method is characterized in that it includes the following steps: on each request for access to a service provider (7) from a user (8), activating (1) a unique environment, consisting of a profile of said user and service sessions associated with said user (8), and processing validation of the service provider (7) access request, assigning (2) each service provider (7) whose access request is validated a unique session forming part of the unique environment of the user (8), managing (3) said unique environment by modeling the states that the environment of the user (8) can take and the relations between its states by means of a state diagram in which changes of state are triggered by given events, some of which are associated with the services offered by the service providers (7), granting (4) a service request submitted by a user (8) to a service provider (7) having a session as a function of the current state of the state diagram of the environment of the user (8) and events associated with the service request, and updating the environment of the user (8) on proceeding to the next state of the state diagram of the service provider (7).
 2. A method according to claim 1 for coordinating the use of telecommunications service providers, characterized in that said method further includes the following step: on each request from a user (8) to access a service provider (7), identifying the user (8) to an identification module by assigning the user an identifier.
 3. A method according to claim 1 for coordinating the use of telecommunications service providers, characterized in that said method further includes the following steps: on each request from a user (8) to access a service provider (7), authenticating the user (8) by means of an authentication module, and validating the request from the user (8) for access to the service provider (7) as a function of the result of the authentication.
 4. A system (6) for coordinating the use of telecommunications service providers (7) by implementing a method according to any preceding claim when the use of a service provider (7) is invoked by a user (8) from a telecommunications terminal (9) and the telecommunications service providers (7) are connected to the coordination system (6) by a network (10), which system (6) is characterized in that it includes: an access module (11), constituting a first entry point of the coordination system (6) addressed by any service provider (7), referred to as a requester service provider, which receives an access request from a user (8), a profile manager module (13) connected to the access module (11) and including a user profile and service provider profile database and a profile manager connected to the database, a user agreement module (14) containing a list of agreements with the telecommunications service providers (7) entered into by the users (8), information on the telecommunications service providers (7), and a list of access and service charges, and at least one environment manager (15) connected to the profile manager module (13) and the user agreement module (14), constituting a second entry point to the coordination system (6) addressed by any service provider (7) whose access request is validated.
 5. A system (6) according to claim 4 for coordinating the use of telecommunications service providers (7), characterized in that said system (6) further includes: at least one identification and authentication module (12) connected to the access module (11).
 6. A server characterized in that it includes a system (6) according to claim 4 for coordinating the use of telecommunications service providers (7).
 7. A set of servers interconnected by a network, characterized in that it includes a system (6) according to claim 4 for coordinating the use of telecommunications service providers (7) and in that modules of the coordination system (6) are distributed between the servers.
 8. A server characterized in that it includes a profile manager module (13), a user agreement module (14) and an environment manager (15) of a coordination system (6) according to claim
 4. 9. A system (6) according to claim 4 for coordinating use of telecommunications service providers (7), characterized in that the network (10) is the Internet. 