EP-4740445-A1 - METHOD AND SYSTEM FOR PROVIDING A COMMUNICATION SERVICE
Abstract
The present invention relates to a system (108) and a method (400) for providing a communication service The method (400) includes steps of, receiving a request from a user for accessing a telephonic feature. Further the method (400) includes the step of determining whether the user requesting access to the telephonic feature is a trusted user or a non-trusted user based on a pre-approved feature list. Based on determination, the method (400) includes the steps of enabling access to the telephonic feature requested by the trusted user and requesting an authentication code from the non- trusted user to access the telephonic feature. Further the method (400) includes the steps of, retrieving the authentication code from the non-trusted user to validate the authentication code and enabling access to the non-trusted user for the requested telephonic feature, in response to the validation of the authentication code.
Inventors
- BHATNAGAR, AAYUSH
- BISHT, BIRENDRA
- SINGH, HARBINDER
- GUPTA, SANDEEP
- RANJAN, Surabhi
- KHAKHIL, Pradeep
- KUMAR, PRADEEP
- Kelkar, Priti
Assignees
- Jio Platforms Limited
Dates
- Publication Date
- 20260513
- Application Date
- 20240627
Claims (18)
- 1. A method (400) for providing a communication service, the method (400) comprises the steps of: receiving, by one or more processors (202), a request from a user for accessing a telephonic feature; determining, by the one or more processors (202), whether the user requesting the access to the telephonic feature is a trusted user or a non-trusted user based on a pre-approved feature list; in response to determining, the user requesting the access to the telephonic feature is the trusted user, enabling, by the one or more processors (202), access to the telephonic feature requested by the trusted user; in response to determining, the user requesting the access to the telephonic feature is the non-trusted user, requesting, by the one or more processors (202), an authentication code from the non-trusted user to access the telephonic feature; retrieving, by the one or more processors (202), the authentication code from the non-trusted user; validating, by the one or more processors (202), the authentication code retrieved from the non-trusted user; and enabling, by the one or more processors (202), access to the non-trusted user for the requested telephonic feature, in response to the validation of the authentication code.
- 2. The method (400) as claimed in claim 1, wherein the telephonic feature includes at least one of an international calling service.
- 3. The method (400) as claimed in claim 1, wherein the pre-approved feature list includes at least one or more approved country codes for International Subscriber Dialling (ISD), blocked country codes for International Subscriber Dialling (ISD), information of the trusted user, approved Mobile Station Integrated Services Digital Network (MSISDN) for ISD, approved authentication code for ISD, and information associated with the telephonic feature.
- 4. The method (400) as claimed in claim 1, wherein the step of validating, the authentication code retrieved from the non-trusted user, includes the steps of: parsing, the pre-approved feature list as defined for the user by an admin; retrieving, the authentication code as defined in the pre-approved feature list; and comparing, the authentication code retrieved from the pre-approved feature list, with the authentication code retrieved from the user.
- 5. The method (400) as claimed in claim 1, wherein the pre-approved feature list is stored in storage means such as at least one of a remote server, and a database (214), the storage means communicably coupled to the one or more processors (202).
- 6. The method (400) as claimed in claim 1 , wherein the trusted users and the nontrusted users interact with the one or more processors (202) to access the telephonic feature and to provide user specific information via at least one of an Interactive Voice Response (IVR) unit.
- 7. The method (400) as claimed in claim 1, wherein the step of determining, whether the user requesting the access for the telephonic feature is a trusted user or a non-trusted user based on a pre-approved feature list, includes the step of: checking, by the one or more processors (202), whether the preapproved feature list includes the information of the user requesting the access for the telephonic feature.
- 8. The method (400) as claimed in claim 7, wherein the one or more processors (202) allows admin to update the pre-approved feature list that facilitates admin to enable or disable the telephonic features in real time.
- 9. A system (108) for providing a communication service, the system (108) comprises: a transceiver (208), configured to, receive, a request from a user for accessing a telephonic feature; a determination unit (210) configured to: determine, whether the user requesting the access to the telephonic feature is a trusted user or a non-trusted user based on a preapproved feature list; in response to determining, the user requesting the access to the telephonic feature is the trusted user, enable, access to the telephonic feature requested by the trusted user; in response to determining, the user requesting the access to the telephonic feature is the non-trusted user, request, an authentication code from the non-trusted user to access the telephonic feature; retrieving, the authentication code from the non-trusted user; a validation unit (212), configured to: validate, the authentication code retrieved from the non-trusted user; and enable, access to the non-trusted user for the requested telephonic feature, in response to the validation of the authentication code.
- 10. The system (108) as claimed in claim 9, wherein the telephonic feature includes at least one of an international calling service.
- 11. The system (108) as claimed in claim 9, wherein the pre-approved feature list includes at least one or more approved country codes for International Subscriber Dialling (ISD), blocked country codes for International Subscriber Dialling (ISD), information of the trusted user, approved Mobile Station Integrated Services Digital Network (MSISDN) for ISD, approved authentication code for ISD, and information associated with the telephonic feature.
- 12. The system (108) as claimed in claim 9, wherein the validation unit (212) validates, the authentication code retrieved from the non-trusted user, by: parsing, the pre-approved feature list as defined for the user by an admin; retrieving, the authentication code as defined in the pre-approved feature list; and comparing, the authentication code retrieved from the pre-approved feature list, with the authentication code retrieved from the user.
- 13. The system (108) as claimed in claim 9, wherein the pre-approved feature list is stored in storage means such as at least one of a remote server, and a database (214), the storage means communicably coupled to the determination unit (210).
- 14. The system (108) as claimed in claim 9, wherein the trusted users and the nontrusted users interact with the system (108) to access the telephonic feature and to provide user specific information via at least one of an Interactive Voice Response (IVR) unit.
- 15. The system (108) as claimed in claim 9, wherein the determination unit (210) determines, whether the user requesting the access for the telephonic feature is a trusted user or a non-trusted user based on a pre-approved feature list, by: checking, whether the pre-approved feature list includes the information of the user requesting the access for the telephonic feature.
- 16. The system (108) as claimed in claim 15, wherein the determination unit (210) allows admin to update the pre-approved feature list that facilitates admin to enable or disable the telephonic features in real time.
- 17. A User Equipment (UE) (102), comprising: one or more primary processors (302) coupled with a memory (304), communicatively coupled to one or more processors (202), wherein said memory (304) stores instructions which when executed by the one or more primary processors (302) causes the UE (102) to: transmit, a request to the one or more processors (202) for accessing a telephonic feature; and wherein the one or more processors (202) is further configured to perform the method as claimed in claim 1.
- 18. A non-transitory computer-readable medium having stored thereon computer- readable instructions that, when executed by a processor (502), causes the processor (502) to: receive, a request from a user for accessing a telephonic feature; determine, whether the user requesting the access to the telephonic feature is a trusted user or a non-trusted user based on a pre-approved feature list; in response to determining, the user requesting the access to the telephonic feature is the trusted user, enable, access to the telephonic feature requested by the trusted user; in response to determining, the user requesting the access to the telephonic feature is the non-trusted user, request, an authentication code from the non-trusted user to access the telephonic feature; retrieve, the authentication code from the non-trusted user; validate, the authentication code retrieved from the non-trusted user; and enable, access to the non-trusted user for the requested telephonic feature, in response to the validation of the authentication code.
Description
METHOD AND SYSTEM FOR PROVIDING A COMMUNICATION SERVICE FIELD OF THE INVENTION [0001] The present invention relates to the field of wireless communication systems, more particularly relates to a method and system for providing a communication service. BACKGROUND OF THE INVENTION [0002] The current enterprise telephone management system is a sophisticated telecommunications solution designed to handle the communication needs of businesses and organizations. It serves as the central platform for managing and facilitating voice -based communication within the enterprise, providing advanced features and functionality to improve productivity and efficiency. [0003] Further the current enterprise telephone management system manages or control the access rights for each fixed telephone device within the telephone network. The access rights are usually pre-defined and set for each fixed telephone device. However, the drawback of the existing management system is the access rights for each fixed telephone device are fixed and cannot be changed in real-time. [0004] Further the existing telephone networks are configured to deal with fixed telephone devices using a combination of hardware and software system. The fixed telephone device may connect with external number or extensions within the organization using conventional fiber optics of voice over internet protocol (VoIP). [0005] Further the current enterprise telephone management system usually relies on Private Branch Exchange (PBX). The PBX is the core component responsible for call routing and handling within the organization. It connects internal extensions, manages call transfers, and facilitates other call management features. Further Unified Communications (UC) software integrates various communication channels, including voice, video, instant messaging, and collaboration tools, into a single unified platform. It enables features like presence of information, voicemail, call recording, and integration with other business applications. [0006] However, the major drawback of the current enterprise system is dynamic handling of access rights for the fixed telephone lines, capturing real-time information. The existing system also fails to adopt wireless communication devices like, mobiles phones or communication tablets. SUMMARY OF THE INVENTION [0007] One or more embodiments of the present disclosure provide a method and system for providing a communication service. [0008] In one aspect of the present invention, a method for providing a communication service is disclosed. The method includes the step of receiving a request from a user for accessing a telephonic feature. The method further includes the step of determining whether the user requesting the access to the telephonic feature is a trusted user or a non-trusted user based on a pre-approved feature list. In response to determining the user requesting the access to the telephonic feature is the trusted user, the method further includes the step of enabling access to the telephonic feature requested by the trusted user. In response to determining the user requesting the access to the telephonic feature is the non-trusted user, the method further includes the step of requesting an authentication code from the non-trusted user to access the telephonic feature. The method further includes the step of retrieving the authentication code from the non-trusted user. The method further includes the step of validating the authentication code retrieved from the non-trusted user. The method further includes the step of enabling access to the non-trusted user for the requested telephonic feature, in response to the validation of the authentication code. [0009] In one embodiment, the telephonic feature includes at least one of an international calling service. [0010] In another embodiment, the pre-approved feature list includes at least one or more approved country codes for International Subscriber Dialing (ISD), blocked country codes for International Subscriber Dialing (ISD), information of the trusted user, approved Mobile Station Integrated Services Digital Network (MSISDN) for ISD, approved authentication code for ISD, and information associated with the telephonic feature. [0011] In yet another embodiment, the step of, validating the authentication code retrieved from the non-trusted user includes the steps of parsing, the pre-approved feature list as defined for the user by an admin; retrieving, the authentication code as defined in the pre-approved feature list and comparing the authentication code retrieved from the pre-approved feature list with the authentication code retrieved from the user. [0012] In yet another embodiment, the pre-approved feature list is stored in storage means such as at least one of a remote server, the remote server communicably coupled to the one or more processors. [0013] In yet another embodiment, the trusted users and the non-trusted users interact with the one or more processor