The present invention relates generally to the field of telecommunications dispatching and, more particularly, to methods and apparatus for providing mobile personnel access to a company shared network.
Telecommunications technicians, such as so-called “Installation and Maintenance” (I&M) technicians, may visit customer sites to install new equipment, set up new services, or to service existing equipment or services. Frequently an I&M technician needs to gather local or district-specific information to complete a “job order” or task. For example, an I&M technician may need to know cross-box locations, pricing information, service information, cable records, plat information, or other information needed to carry out his or her assignment.
For many telephone companies, including Regional Bell Operating Companies (RBOCs), such local information is generally not stored on centralized legacy systems. Accordingly, although I&M technicians can presently access information stored on these central legacy systems using portable laptops and custom software, they are unable to remotely access the local information using their portable laptops.
According to the conventional approach to this problem, an I&M technician seeking local information must make one or more telephone calls to local offices of his or her employer. Several calls may be required. The I&M technician may be put on hold as the call attendant collects the information or tends to other business. The time the I&M technician must spend in collecting local information reduces his or her job efficiency and may increase costs to customers. Furthermore, miscommunications between individuals may cause incorrect information to be transferred. For example, the data retrieved by the call attendant may not be accurately interpreted by the call attendant who has a lower level of technical expertise than the I&M technician. These are significant drawbacks to the current approach.
The present invention is generally directed to a system and method for permitting a user to access an intranet using a computer that is already in communication with legacy systems.
Using an embodiment of the present invention, a user logs a computer into a systems interface which permits access to back-end legacy systems. Preferably, the systems interface is associated with at least a first network address. Preferably, the systems interface includes a first server with middleware for managing the protocol interface. Preferably, the systems interface includes a second server for receiving requests and generating legacy transactions. After the computer is logged in, a request for access to an intranet is made. Preferably, the request results from a technician selecting an icon or engaging a software button from within the currently running application. After the request is processed, one or more messages are sent from the systems interface to the computer. The messages cause the computer to launch a software application that seeks out a separate network address corresponding to the intranet. Preferably, the software application is a browser that seeks out a technician home page on the intranet. The systems interface routes communications from the computer to the separate network address. Preferably, the messages cause the first server to route the computer from the first network address to the separate network address.
The advantages of the present invention are numerous. The invention permits a technician to remotely access local or district-specific information without making a series of phone calls to local offices. The initial log-in to the systems interface provides a measure of security, yet a separate log-in to the intranet is not required. When accessing the intranet, the computer remains logged in to the systems interface so that a return to the systems interface, for example, to access the legacy systems, is readily achieved. Other benefits and advantages exist.
Computer 100 is a computer used by a technician or other service person to access information from back-end legacy systems 140. As used herein, “computer” is used in the broadest sense of the term. A “computer” may be a microcomputer, minicomputer, laptop, personal data assistant, cellular phone, two-way pager, processor, or any computerized device capable of transmitting and receiving data over a shared network. Preferably, computer 100 is a ruggedized laptop computer.
Computer 100 remotely accesses systems interface 130 through communications network 120. Communications network 120 may be any communications network that permits a remote computer to access a remote server. Communications network 120 could be a wireline network, wireless or cellular network, satellite network, and so forth. Preferably, communications network 120 is a Public Switched Telephone Network (PSTN).
Systems interface 130 provides a systems interface between remote (and preferably portable) computers 100 seeking data from back-end legacy systems 140. Legacy systems 140 are generally mainframe-type computer systems that maintain data for a company. In one exemplary example, legacy systems 140 may include one or more legacy systems including a loop facility assignment control system, a loop maintenance operations system, a computer system for main frame operations, a mechanized loop testing system, a secure network element contract server, a mechanized time reporting system, and a work activity statistical sampling plan system. In one specific implementation of the present invention, for example, legacy systems 140 can include one or more of the following systems: Loop Facility Assignment Control System; Loop Maintenance Operations System; Computer System for Main Frame Operations; Mechanized Loop Testing; Secure Network Element Contract Server; Mechanized Time Reporting; and Work Activity Statistical Sampling Plan.
Intranet 150 is a company shared network that includes local information not generally stored or maintained on legacy systems 140. Generally, intranet 150 includes firewalls or similar protections to prevent tampering or intrusion by unauthorized users. Prior to the present invention, intranet 150 was generally inaccessible to technicians operating a computer 100 that is logged-in to the systems interface 130 to legacy systems 140. As used herein, “company” is intended to have the broadest meaning, and should be understood to include a company, corporation, association, partnership, limited liability company, and any other group of persons or entities that may store and share data via a shared intranet. Preferably, intranet 150 is an intranet for a telecommunications entity that stores local or district-specific information not generally stored in centralized back-end legacy systems. According to another embodiment, intranet 150 may be or may include an external computer network, for example, the Internet.
The general operation of the system of
Computer 200 is a remote and preferably portable computer (e.g., a laptop or notebook computer) used by a technician. Computer 200 may be any of the devices discussed above for computer 100 (
Legacy systems 270 and company intranet 280 are similar to and include any of the variations discussed in connection with legacy systems 140 and intranet 150, respectively, of
According to
Generally, protocol servers 240 provide a protocol and middleware interface between computer 200 and transaction servers 250. Protocol servers 240 may receive requests for information or other messages from computer 200; route requests or messages to input queues in transaction servers 250; receive responsive information from transaction servers 250; and route responsive information back to computer 200.
Generally, transaction servers 250 provide an interface to back-end legacy systems 270 so that responsive information can be retrieved. Transaction servers 250 may service requests, generate legacy transactions in response to those requests, and receive responsive information to be forwarded back to protocol servers 240.
In one specific implementation, protocol servers 240 may be NT servers running NetTech software from Broadbeam Corporation of Princeton, N.J. Transaction servers 250 may utilize Unix operating system software running an Informix database management system.
The preferred systems interface 210 (element 130 of
According to an embodiment, the “virtual location” (hereinafter, simply the “location”) of the systems interface comprised of protocol servers 240 and transaction servers 250 is defined by at least one network address. Preferably, the network address comprises an Internet Protocol (IP) address, which is well-known in the art. At least a first network address defines the location of the systems interface. Preferably, the location of the protocol server 240 is defined by a first network address and the location of the transaction server 250 is defined by a second network address.
The company intranet 280 has its own separate network address or addresses. Preferably, the network address defining the company intranet 280 is an IP address. The network address of company intranet 280 is referred to herein as a “separate network address” so as to indicate that company intranet 280 is located at a network address separate from the network address or addresses of the systems interface.
The general operation of the preferred system of
Preferably, upon log-in a primary screen or primary graphical user interface (GUI) is transmitted to computer 200. This is referred to herein as the “TechNet home page.” A technician may make selections from the TechNet home page to access data from back-end legacy systems 270. For example, the technician may select “Get A Job” to get his or her next task or job order. The technician's selection of an icon or software button for “Get A Job” results in the client application generating a request that is transmitted to protocol server 240. The information corresponding to the request (i.e., a job order for that technician) is provided from legacy systems 270. Other requests for information from legacy systems 270 can be initiated by the technician using the TechNet home page.
The TechNet home page also includes an icon or software button that can be selected or engaged in order to access company intranet 280. When the technician selects the button or icon, a request for intranet access is generated by the client application and is forwarded to transaction server 250 via protocol server 240. Transaction server 250 processes the request to determine whether access to intranet 280 shall be granted. For example, transaction server 250 may confirm that the technician is a valid user who is properly logged in to a TechNet session. Transaction server 250 may compare the technician's user ID to a list of authorized (or prohibited) technician intranet users to determine if access to intranet 280 should be granted (or denied). According to an embodiment, a separate password might be required for access to intranet 280.
If the request for intranet access is granted, transaction server 250 sends one or more commands to initiate intranet access. Preferably, the command takes the form of an Application Program Interface (API) command. The command is transmitted by protocol server 240 to computer 200, where it causes computer 200 to launch a software application that seeks out the separate network address corresponding to intranet 280. Preferably, the software application is a browser. Preferably, the separate network address corresponds to a so-called “Technician Intranet Access Home Page.”
The command issued by transaction server 250 also direct protocol server 240 to route communications from computer 200 from the first network address for protocol server 240 to the separate network address for intranet 280. This routing permits computer 200 to leave the zone defined by firewall 260 for the systems interface and enter the zone defined by a firewall (now shown) for the intranet 280.
At this point, the technician using computer 200 has access to local information on intranet 280. The aforementioned client application (e.g., the TechNet client application) is still active and the user is still logged-in to the systems interface (e.g., TechNet system). Preferably, the client application is minimized or its window is hidden behind the browser window. For example, the TechNet home page may be hidden behind the Technician Intranet Access Home Page. Preferably, the user can toggle between the two applications (or windows) because both are active. The technician can return to the systems interface (e.g., TechNet) by closing the browser or simply toggling between the two applications.
For example, intranet 280 may be a telephone company's intranet serving various local offices of the telephone company. In this example, the technician can access district-specific information such as cross-box locations, pricing information, service information, cable records, plat information, or other local information.
The present invention is not limited or constrained by the structure of
In
In step 304, the technician's computer (e.g., computer 200 of
In step 306, the user selects or engages an intranet icon or software button to access an intranet.
In step 308, a software application such as a browser is launched at the user's computer (e.g. computer 200 of
In step 310, the user's computer accesses the intranet. In one embodiment, the user's computer is accesses the intranet at a separate network address that is distinct from the aforementioned first network address. The separate network address is also preferably an IP address.
In step 312, an intranet home page is displayed. For example, a technician's computer 200 (
In step 314, the desired local information on the intranet (e.g., intranet 280 of
In step 316, the user returns to the systems interface to the legacy systems. For example, the user may toggle back to the TechNet client application or the user may close the browser application.
In step 402, a log-in attempt by a user is authenticated. For example, a protocol server 240 (
In step 404, access to a systems interface to back-end legacy systems is provided. For example, computer 200 may be accessing protocol server 240 (
In step 406, a request for intranet access is received. For example, transaction server 250 (
In step 408, the request is processed. For example, transaction server 250 (
In step 410, a message is sent to the client regarding the request for intranet access. For example, the message may be an API command initiated by the transaction server 250 (
In step 412, the client is routed to the intranet. For example, communications from computer 200 (
The foregoing disclosure of the preferred embodiments of the present invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise forms disclosed. Many variations and modifications of the embodiments described herein will be obvious to one of ordinary skill in the art in light of the above disclosure. The scope of the invention is to be defined only by the claims appended hereto, and by their equivalents.
Further, in describing representative embodiments of the present invention, the specification may have presented the method and/or process of the present invention as a particular sequence of steps. However, to the extent that the method or process does not rely on the particular order of steps set forth herein, the method or process should not be limited to the particular sequence of steps described. As one of ordinary skill in the art would appreciate, other sequences of steps may be possible. Therefore, the particular order of the steps set forth in the specification should not be construed as limitations on the claims. In addition, the claims directed to the method and/or process of the present invention should not be limited to the performance of their steps in the order written, and one skilled in the art can readily appreciate that the sequences may be varied and still remain within the spirit and scope of the present invention.
Number | Name | Date | Kind |
---|---|---|---|
4776016 | Hanson | Oct 1988 | A |
4905163 | Garber et al. | Feb 1990 | A |
5038283 | Cavenay | Aug 1991 | A |
5359649 | Rosu et al. | Oct 1994 | A |
5521958 | Selig et al. | May 1996 | A |
5570283 | Shoolery et al. | Oct 1996 | A |
5583937 | Ullrich | Dec 1996 | A |
5623404 | Collins et al. | Apr 1997 | A |
5664110 | Green et al. | Sep 1997 | A |
5687212 | Kinser, Jr. et al. | Nov 1997 | A |
5694323 | Koropitzer et al. | Dec 1997 | A |
5696906 | Peters | Dec 1997 | A |
5754830 | Butts | May 1998 | A |
5799279 | Gould | Aug 1998 | A |
5805775 | Eberman | Sep 1998 | A |
5812977 | Douglas | Sep 1998 | A |
5826270 | Rutkowski | Oct 1998 | A |
5848403 | Gabriner et al. | Dec 1998 | A |
5857201 | Wright et al. | Jan 1999 | A |
5873070 | Bunte | Feb 1999 | A |
5884262 | Wise | Mar 1999 | A |
5884266 | Dvorak | Mar 1999 | A |
5896440 | Reed et al. | Apr 1999 | A |
5909492 | Payne | Jun 1999 | A |
5915001 | Uppaluru | Jun 1999 | A |
5920846 | Storch et al. | Jul 1999 | A |
5923735 | Swartz et al. | Jul 1999 | A |
5931917 | Nguyen et al. | Aug 1999 | A |
5953389 | Pruett | Sep 1999 | A |
5960411 | Hartman et al. | Sep 1999 | A |
5963940 | Liddy | Oct 1999 | A |
5970472 | Allsop | Oct 1999 | A |
5974135 | Breneman | Oct 1999 | A |
6023683 | Johnson et al. | Feb 2000 | A |
6023684 | Pearson | Feb 2000 | A |
6026379 | Haller et al. | Feb 2000 | A |
6035285 | Schlect | Mar 2000 | A |
6052785 | Lin et al. | Apr 2000 | A |
6058373 | Blinn | May 2000 | A |
6080202 | Strickland | Jun 2000 | A |
6081789 | Purcell et al. | Jun 2000 | A |
6092192 | Kanevsky | Jul 2000 | A |
6101472 | Giangarrea et al. | Aug 2000 | A |
6101510 | Stone et al. | Aug 2000 | A |
6115040 | Bladow et al. | Sep 2000 | A |
6115737 | Ely | Sep 2000 | A |
6223541 | Farrag | May 2001 | B1 |
6226623 | Schein | May 2001 | B1 |
6233541 | Butts et al. | May 2001 | B1 |
6311178 | Bi | Oct 2001 | B1 |
6324522 | Petersen et al. | Nov 2001 | B2 |
6341271 | Salvo et al. | Jan 2002 | B1 |
6366829 | Wallace et al. | Apr 2002 | B1 |
6389337 | Kolls et al. | May 2002 | B1 |
6396833 | Zhang et al. | May 2002 | B1 |
6445774 | Kidder | Sep 2002 | B1 |
6473407 | Ditmer | Oct 2002 | B1 |
6487278 | Skladman | Nov 2002 | B1 |
6539548 | Hendricks | Mar 2003 | B1 |
6578005 | Lesaint et al. | Jun 2003 | B1 |
6587822 | Brown | Jul 2003 | B2 |
6587851 | Ditcharo | Jul 2003 | B1 |
6598167 | Devine et al. | Jul 2003 | B2 |
6636831 | Profit et al. | Oct 2003 | B1 |
6671824 | Hyland | Dec 2003 | B1 |
6724406 | Kelley | Apr 2004 | B1 |
6736376 | DeLisle | May 2004 | B1 |
6738815 | Willis et al. | May 2004 | B1 |
6763376 | Devine | Jul 2004 | B1 |
6971072 | Stein | Nov 2005 | B1 |
7111243 | Ballard | Sep 2006 | B1 |
20010016819 | Kolls | Aug 2001 | A1 |
20020099642 | Schwankl | Jul 2002 | A1 |
20020103906 | Knight et al. | Aug 2002 | A1 |
20020138656 | Hickey | Sep 2002 | A1 |
20030006913 | Joyce | Jan 2003 | A1 |
20030008661 | Joyce | Jan 2003 | A1 |
20030023601 | Fortier et al | Jan 2003 | A1 |
20030046397 | Trace et al. | Mar 2003 | A1 |
20030125956 | Lewis | Jul 2003 | A1 |
20030139932 | Shao | Jul 2003 | A1 |
20040014479 | Milman | Jan 2004 | A1 |
20040209602 | Joyce | Oct 2004 | A1 |
Number | Date | Country |
---|---|---|
0 712 227 | May 1996 | EP |
0732850 | Sep 1996 | EP |
2000112746 | Apr 2000 | JP |