EP-4736538-A1 - SYSTEM AND METHOD FOR SERVICE BARRING-PROCESS WORKFLOW
Abstract
The system (108) in the present disclosure for service barring workflow is designed to automate and streamline the process of managing service barring actions in a telecommunications network It provides centralized control, efficient processing, and granular control over service restrictions by implementing a method (400) involving various nodes, Tracking Area Code (TAC) and Network administrators. The system (108) offers advantages such as enhanced operational efficiency, accurate enforcement of service barring rules, real-time monitoring, and reporting capabilities. It integrates with network elements and ensures compliance with regulatory requirements. With its flexible and scalable architecture, the system (108) enables administrators and users to efficiently handle service barring requests while maintaining a positive customer experience. Overall, the system (108) for service barring workflow optimizes the service management process, enhances security, and contributes to effective network control and customer satisfaction.
Inventors
- BHATNAGAR, AAYUSH
- BHATNAGAR, PRADEEP KUMAR
- SHANBHAG, UDAY
- KADAM, Hanumant
- KOUL, Rishi
- Tomar, Mahendra
Assignees
- Jio Platforms Limited
Dates
- Publication Date
- 20260506
- Application Date
- 20240529
Claims (17)
- 1. A system (108) for restricting one or more services provided by a telecommunications network, the system comprising: a database (218) configured to store information pertaining to a plurality of nodes pertaining to the telecommunications network, wherein each of the plurality of nodes is associated with a corresponding Tracking Area Code (TAC) value indicative of the one or more services available to each of the plurality of nodes; an input module (210) configured to: receive an instruction to restrict the one or more services, wherein the instruction includes a list of nodes from the plurality of nodes; and a barring module (214) coupled to the input module (210), the barring module (214) is configured to: in response to the instruction, generate a command to change the TAC value of each of the plurality of nodes, with a new TAC value; store the TAC values of each of the plurality of nodes; and execute the command to restrict the one or more services for the list of nodes based on the changed TAC value.
- 2. The system (108) as claimed in claim 1, wherein the instruction is generated by one of a system control logic and a user.
- 3. The system (108) as claimed in claim 2, wherein the system (108) automatically generates the instruction when a pre-defined condition is met.
- 4. The system (108) as claimed in claim 2, wherein the input module (210) is further configured to: validate credential information of the user; and upon successful validation, confirm that the user is authorized to generate the instruction.
- 5. The system (108) as claimed in claim 1, wherein the list of nodes is generated based on a geographical location of the nodes.
- 6. The system (108) as claimed in claim 1, wherein the barring module (214) is further configured to: notify a service restriction start time and a service restriction end time to the list of nodes; and upon expiration of the service restriction end time, restore the TAC values of the list of nodes.
- 7. The system (108) as claimed in claim 1, wherein the instruction comprises a list of services to be restricted and duration of services, wherein the list of services comprises a voice service, a data service, a messaging service, and a multimedia service, and wherein the duration of restriction of services comprises time period during which the list of services are to be restricted.
- 8. The system (108) as claimed in claim 1, wherein the new TAC value is associated with restricting at least one list of services and the time period of the restriction.
- 9. A method for restricting one or more services provided by a telecommunications network having a plurality of nodes, each of the plurality of nodes is associated with a corresponding Tracking Area Code (TAC) value indicative of the one or more services available to each of the plurality of nodes, the method comprising: receiving, by an input module (210), an instruction to restrict the one or more services, wherein the instruction includes a list of nodes from the plurality of nodes; and in response to the instruction, generating, by a barring module (214), a command to change the TAC value of each of the plurality of nodes, with a new TAC value; storing the TAC values of each of the plurality of nodes; and executing the command to restrict the one or more services for the list of nodes based on the changed TAC value.
- 10. The method as claimed in claim 9, wherein the instruction is automatically generated by a system when a pre-defined condition is met.
- 11. The method as claimed in claim 9, when the instruction is generated by a user, the method further comprising: validating, by the input module (210), credential information of the user; and upon successful validation, confirming that the user is authorized to generate the instruction.
- 12. The method as claimed in claim 9, wherein the list of nodes is generated based on a geographical location of the nodes.
- 13. The method as claimed in claim 9, the method further comprising: notifying, by the barring module (214), a service restriction start time and a service restriction end time to the list of nodes; and upon expiration of the service restriction end time, restoring the TAC values of the list of nodes.
- 14. The method (400) as claimed in claim 9, wherein the instruction comprises a list of services to be restricted and duration of services, wherein the list of services comprises a voice service, a data service, a messaging service, and a multimedia service, and wherein the duration of restriction of services comprises time period during which the list of services are to be restricted.
- 15. The method as claimed in claim 9, further comprising associating the new TAC value with restriction on at least one list of services and the time period of the restriction.
- 16. A computer program product comprising a non-transitory computer-readable medium comprising instructions that, when executed by one or more processors, cause the one or more processors to execute a method for restricting one or more services provided by a telecommunications network having a plurality of nodes, each of the plurality of nodes is associated with a corresponding Tracking Area Code (TAC) value indicative of the one or more services available to each of the plurality of nodes, the method comprising: receiving, by an input module (210), an instruction to restrict the one or more services, wherein the instruction includes; and in response to the instruction, generating, by a barring module (214), a command to change the TAC value of each of the plurality of nodes, with a new TAC value; storing the TAC values of each of the plurality of nodes; and executing the command to restrict the one or more services for the list of nodes based on the changed TAC value.
- 17. A user equipment (104) communicatively coupled with a network (106), the coupling comprises steps of: receiving a connection request; sending an acknowledgment of the connection request to the network (106); and transmitting to and receiving data from the network (106), wherein the user equipment (104) is configured to communicatively couple with system (108) for restricting one or more services provided by a telecommunications network having a plurality of nodes as claimed in claim 9.
Description
SYSTEM AND METHOD FOR SERVICE BARRINGPROCESS WORKFLOW RESERVATION OF RIGHTS [0001] A portion of the disclosure of this patent document contains material, which is subject to intellectual property rights such as but are not limited to, copyright, design, trademark, integrated circuit (IC) layout design, and/or trade dress protection, belonging to Jio Platforms Limited (JPL) or its affiliates (hereinafter referred as owner). The owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all rights whatsoever. All rights to such intellectual property are fully reserved by the owner. TECHNICAL FIELD [0002] The present disclosure relates to the field of telecommunications and network management. More precisely, it relates to a system for service-barring process workflow and involves configuration changes on the communication nodes to ensure service barring of type or all types of services and restoring it back to original state as soon as requested. BACKGROUND [0003] Background description includes information that may be useful in understanding the present invention. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed invention, or that any publication specifically or implicitly referenced is prior art. [0004] A service barring workflow refers to the set of processes and actions involved in implementing service restrictions or blocks on specific services within a telecommunications network. It outlines the steps followed to bar or limit access to certain services for a particular user or device. While specific workflows may vary across service providers, the workflow can begin with a user request to bar a specific service, such as outgoing calls, SMS messages, data usage, or international roaming. Alternatively, predefined conditions or events may automatically trigger service barring, such as reaching a usage limit or non-payment of bills. [0005] The user's identity is authenticated to ensure they have the necessary privilege. To request or authorize service barring. This can involve verifying user credentials, account status, or other authentication methods. The system checks the predefined policies and rules to validate whether the requested service barring aligns with the established guidelines. These policies may include barring specific services based on user profiles, subscription plans, time periods, or other criteria. Service Configuration: Once the request and policies are validated, the necessary configurations are applied to the network elements. This involves communicating with switches, routers, firewalls, or other network devices to block or restrict access to the designated services. For example, call barring can be implemented by blocking certain phone numbers or types of calls, while data barring can involve blocking specific data usage or applications. [0006] As part of Legal compliance of operating a telecom network, there is a very important requirement which has to be met of barring a type / category or all services based on request of Law Agencies on a certain geography for a certain duration. This is a very important requirement, and any noncompliance or partial compliance may lead to huge penalties on a telecom operator. It typically involves configuration change on the node to ensure service barring of type or all types of services and restoring it back to original state as soon as requested by the Law Enforcement Agencies. [0007] There are various existing systems and mechanisms used for service barring workflows in telecommunications networks, each with its own drawbacks. Some service providers rely on manual configuration of network elements, such as switches or firewalls, to implement service barring. This approach often requires specialized technical knowledge and manual intervention, which can be timeconsuming and error-prone. It may also lack flexibility and scalability when dealing with a large number of users or complex service barring scenarios. [0008] There are also legacy systems that were designed before advanced service barring requirements may lack robust features and flexibility. These systems may not support granular service barring options, real-time monitoring, or seamless integration with other network management components. They might have limited reporting capabilities and may be challenging to maintain or update. Service barring workflows in certain systems may suffer from delays in applying changes or updates to network configurations. This lag can lead to a window of time where service restrictions are not immediately effective, potentially allowing unauthorized access or usage until the changes are fully implemented. [0009] There is, therefore, a need to overcome the above drawbacks and limitations in the current practices to provide an optimal