CA2212377C - Information services provision and management - Google Patents

Information services provision and management Download PDF

Info

Publication number
CA2212377C
CA2212377C CA002212377A CA2212377A CA2212377C CA 2212377 C CA2212377 C CA 2212377C CA 002212377 A CA002212377 A CA 002212377A CA 2212377 A CA2212377 A CA 2212377A CA 2212377 C CA2212377 C CA 2212377C
Authority
CA
Canada
Prior art keywords
agent
user
services
service
software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CA002212377A
Other languages
French (fr)
Other versions
CA2212377A1 (en
Inventor
Martin John Yates
Ian William Marshall
Julian Richard Hill
Patrick Brian Farley
Mark Bagley
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
British Telecommunications PLC
Original Assignee
British Telecommunications PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by British Telecommunications PLC filed Critical British Telecommunications PLC
Publication of CA2212377A1 publication Critical patent/CA2212377A1/en
Application granted granted Critical
Publication of CA2212377C publication Critical patent/CA2212377C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/0016Arrangements providing connection between exchanges
    • H04Q3/0062Provisions for network management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42136Administration or customisation of services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/0016Arrangements providing connection between exchanges
    • H04Q3/0029Provisions for intelligent networking
    • H04Q3/0045Provisions for intelligent networking involving hybrid, i.e. a mixture of public and private, or multi-vendor systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/1305Software aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13502Indexing scheme relating to selecting arrangements in general and for multiplex systems primitives - inc. service-independent building blocks [SIBBs]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13503Indexing scheme relating to selecting arrangements in general and for multiplex systems object-oriented systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13504Indexing scheme relating to selecting arrangements in general and for multiplex systems client/server architectures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13516Indexing scheme relating to selecting arrangements in general and for multiplex systems agents or brokers - user, terminal etc., also OSI agent/managers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13533Indexing scheme relating to selecting arrangements in general and for multiplex systems multivendor and hybrid, e.g. public/private, networks, inc. international
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13535Indexing scheme relating to selecting arrangements in general and for multiplex systems distributed systems - also domains in service creation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99941Database schema or data structure
    • Y10S707/99944Object-oriented database structure
    • Y10S707/99945Object-oriented database structure processing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99941Database schema or data structure
    • Y10S707/99948Application of database or data structure, e.g. distributed, multimedia, or image

Abstract

A services provision system, for use in providing information services over one or more communications networks, has a software infrastructure divided into domains (101, 103, 104, 106). Each domain has an intelligent software agent (102, 107, 109, 110) and this community of agents sits in a computing environment represented in each domain by a DPE kernel (105). The community of agents co-operates to provide service and service management functionality t o a user. At least one of the agents (102, 107, 109, 110) is reconfigurable to change the functionality the system makes available. Reconfigurability is based on the use of a plurality of reusable software modules, the agent reconfiguring by selecting a new combination of modules. The software module s themselves incorporate rules, or policies, which determine process steps offered by the modules at run-time. These policies are external to the modul es and may be loaded at run-time, allowing dynamic modification to functionalit y of the system. The system as a whole offers functionality associated with using services, providing them and managing them and the reconfigurability allows it to offer the different types of functionality in an efficient way. It also allows access control to functionality at different levels with particularly good security against fraudulent use.

Description

2 PCT~GB96/00252 INFORMATION SERVICES PROVISION AND MANA~;EMENT

This invention relates to service provision by means of communications networks. It finds particular application in aspects such as 5 access control, presentation of services to users and management of- those service!s .
Increasingly in the future, different types of services are likely to be offerecl over comrnunications networks. For instance the increasing capability of technology is enabling a future where a wide variety of 10 multimedia services can be delivered to users over comrnunications networks. These services could include simple voice telephony, multimedia conference amongst many users, home shopping and video on demand.
Additionally users may want such services to be delivered over a variety of terminal types such as a portable phone, portable personal computer and 15 domestic television set with a set-top-box.
These services come not only from development of the telecornmunications environment, including telephony and cable television, but also from environments previously separate, such as the computing environment. For instance, there has been major growth of computer network services, such as those available on Internet. Collectively all these services are referrecl to herein as information services.
Although to date (at least in the telephony world) the communication ne1 work operator and the service provider (SP) have generally coincided, this is not essential. Another trend expected in the future is that, increasingly, the service provider will be separate from the network operator. As in the case of Internet, several SPs (vendors) may offer their services (products) over a common network. Indeed, there may be further complexity involved in that the "common network" might in fact comprise multiple networks connected together, managed by many different 3 o network providers .

In circumstances where many different services, supplied by multiple vendors, are available over one, or multiple, communications networks, there is an opportunity for service brokers. Competitive advantage can be gained by such brokers by offering customers better 5 services and more effective access arrangements to those services.
Another name for the service broker is a service retailer.
In the light of this accelerating complexity in the world of communications, with many different entities being involved in the exploitation of a fast growing range of different services, there is a clear 0 need for relatively sophisticated service provision and/or management systems.
According to a first aspect of the present invention, there is provided a service provision system, for making information services available by means of one or more communications network(s), wherein the service provision system comprises intelligent software agents in a computing environment, which agents co-operate to provide access to services for a system user, at least one of the agents being reconfigurable to modify functionality of the system available to the user.
By incorporating a reconfigurable software agent in this way, a service provision system can tailor access appropriately for users having different roles and needs in relation to the system. A user in this context might for example be a customer, needing to be able to request or use a service, a service provider needing to amend parameters of a service, or a retailer needing to add a new service to a portfolio. Further, a customer might not be an entity who actually uses a service, but could be responsible for arranging provision and payment for a service which someone else actually uses. then again, a user might be (or represent) another piece of equipment rather than being (or representing) a person.
An example of the way functionality of the system might need to be 30 modified is where a user of the system could identify themselves as being a customer, a service provider or a service retailer. A customer might need to CA 022l2377 l997-08-06 W O 96t25012 ~CTJ~r~flOD2~2 be able to request ~Ise of a service, which the service provider role would not need, but the system would generally need to be able to bar the customer for security reasons from at least some of the functionality available to a service or network provider. Hence the functionality of the 5 system might need to include service prompts to the customer but not to the ne~work provider, and might need to apply different authentification checks to the service provicler and to the customer.
It is recognised that computing infrastructures in telecommunications can become extremely complex and this could 0 potentially limit manageability, extendibility, scalability and robustness. The approach exploited in embodiments of the present invention, which provides simplicity in the infrastructure, is that of intelligent agent technology, the basis of which is described in "Distributed Artificial Intelligence", ed. Huhns M. N., Pitman, London 1987. An intelligent agent in this context can be 5 broadly described as a software based entity which acts on behalf of another entity. It might comprise updatable data, which might only be locally relevant, and usually some sort of negotiating or decision-making functionality. A community of agents can then perform negotiation tasks amongst themselves to decide a way forward on behalf of multiple entities 20 in a distributed system.
The service provision- system might preferably be structured in domains relevant to different entities in the system. For instance there might be at least a customer-related domain, based on a terminal used by the customer to acc:ess the system, and a service provider/retailer domain.
25 Alternatively, there may be separate domains for the service provider and retailer.
In embodiments of the present invention, the software agents might sit in respective dornains. A reconfigurable agent might appropriately sit in a service retailer clomain, giving access to services and service-related 30 i~fr~ ucture on behalf of the service retailer.

W 096/25012 PCT/~,"~-25 The "portfolio" of available configurations might preferably include a configuration for use by a user who does not or cannot disclose an identity to the system. Such a configuration would generally include the facility of payment, either actual or guaranteed in some way, in advance of a service being provided.
A reconfigurable software agent may comprise, or have access to, a plurality of software modules, reconfigurability being provided at least in part by the agent taking selected sets of the software modules. Each software module is likely to comprise executable code, or code to be 0 interpreted, which the agent invokes and runs as a process. A selected set of software modules invoked by the agent thus provides the run-time realisation of the service provision system, as determined by a particular agent configuration.
The software modules are preferably available to more than one agent configuration, making it possible to build a service provision system which is adaptable while re-using executable code. The system can also be designed so that upgrades are relatively simple to do, for instance by adding to or modifying the software modules. , Preferably, functionality of at least some of the software modules provides service-independent building blocks (SIBBS) for services to be provided by means of the system. "Services" in this context means information services a customer might want to access by means of the system, such as Video-on-Demand. Service independent building blocks are then pieces of software, generally incorporating data and functionality, which provide supporting operations that a customer would need in addition to the services themselves. Examples would be a "Help" facility or a "View-Charges" facility.
SIBBS can be compound, in that they provide a facility as a whole, or they can be even more generic in that they might provide for instance a 3 o data-read operation which forms part only of the functionality needed to operate a "View-Charges" facility.

W 096/25012 PCT~C~9~1 02S2 The use ol SIBBS allows the system to be particularly easy to upgrade For instance in the light of new services becoming desirable.
Many users will also require the service provision to confer an optimum level of effectiveness, performance and quality irrespective of their 5 choice olF terminal type or configuration, or network connection. Services may be provided by more than one communications network and, where a plurality of networlks is involved, they may be of different types, such as mobile and fixed. Embodiments of the present invention can be used to optimise service provision over differing network platforms such as mobile 10 cellular radio or fixed point connection despite different constraints such as restricted bandwidth on mobile networks.
This can be done by providing a type of software module (in addition to SlBBs) whose functionality provides adaptation of functionality of the service provision system, for instance to meet user-specific operating 15 constraints or requirements. Thus the service provision system can for example respond appropriately whether a user is accessing the system by means of a telephone or a computer terminal, or according to the operating systern of a user's terminal. Alternatively, an adaptation module, or "adaptor", might act as a filter or translator of information the system 20 provides to the user, so that for instance technical data is filtered out of information provided to a non-technical user. An adaptor can also tailor the systern ~o responcl appropriately whichever service is required, and from which service provider, in the light of a service provider's or retailer's operal;ional constra~ints. Again, for instance if there is a choice of network 25 provider, there may be operational constraints associated with a particular network aspect.
"Adaptor" software modules of this type would thus contribute proce.sses for est ablishing appropriate interfaces and protocols. The adaptors might either contain standards, interfaces and protocols as data, 30 or might contain means for locating them.

As well as providing adaptation to operational constraints, the adaptors could provide other, related functionality. For instance, an adaptor might be provided which adapts the language in which a service is provided for a foreign user.
Adaptors are not essential but are useful in combination with SlBBs.
If adaptors are not provided, an alternative would be to build their functionality into SlBBs. This however would be likely to increase the number of SlBBs significantly which can be disadvantageous in that complexity is also increased in the system.
0 Two types of software module are described above as potentially available to a reconfigurable agent; SlBBs and adaptors. A third type of software module which might usefully be provided, to control the reconfiguration process, is a co-ordinator module. This can be used to control selection and/or modification of software modules for each 5 configuration. In particular, this module might provide conflict resolution and/or prioritisation for sorting out conflicts in functionality of the other modules in an agent configuration.
According to a second aspect of the present invention, there is provided a service provision system, for making information services 20 available by means of one or more communications network(s), wherein:
(i) the service provision- system comprises software infrastructure arranged in domains, each domain providing functionality and data relevant to a respective aspect of service provision, and each domain comprising an intelligent software agent;
25 ii) information services, and associated management functionality, can be provided to users by means of co-operative interaction between agents of different domains; and iii) at least one of the software agents is provided with an available set of software elements, each element comprising service independent data 30 and functionality but elements of the set in combination supporting specific services, such that the agent can enable provision of a first service by WO96/25012 PCTI~b,.'~2i~

activating a first combination of eiements from said set, and can enable provision of a second, different service by activating a second, different combination of elernents from said set.
~ " Enable" in this context might mean for instance that the agent 5 allows access to a service, to a user of the service provision system.
Alternatively, the agent might provide some functionality which supports the service itself, sulch as a billing or charging operation.
The domains represent the division of the service provision infrastructure into 'areas relevant to the various entities involved. Each 10 domain will provide functionality its relevant entity requires. For instance,the user will need at least to identify themselves and the constraints and facilities (eg facsimile versus a telephone) of their equipment need to be identified. This is clone via the terminal domain. A service provider needs to be able to access the content of a service, for instance to update text, 5 and might need to Ibe able to bill for a service. This is done via a service provider dlomain. A service retailer needs to be able to run a service in their own environment and will need therefore the capability of loading/initiating a servire and controlling a customer interface in terms of quality of service and, aqain, billing. This will be done via a service retailer domain.
In practice, the service retailer and provider domains might be the same domain since the functionality needed by the two roles might coincide. For instance, whether the service provider bills the customer or the service retailer does will be question of the commercial arrangements between them on a case by case basis.
Agents in the terminal and service provider/retailer domains may co-~ operate in use of the system to give appropriate access to a user to an information service or to associated management functionality.
There may be any number of domains as long as there are at least two. In practice the number will probably be kept low to avoid complexity.
30 It will usually be an agent in the service retailer domain or equivalent, as CA 022l2377 l997-08-06 weil as or instead of other agents of the system, which is provided with the available set of software elements.
Agents of the system may have access to the same set of software elements, or to a partly shared set.
Software clearly provides the basis of the i"f~sL~uctures needed in service provision systems according to embodiments of the present invention to implement scalable and deployable solutions. Different types of software technology might be employed, and there are several functional design approaches which could be used. However, a common approach to 0 the design and implementation of software systems in this technical environment uses object oriented software technology. This is known and used by international standards bodies (e.g. Open Software Foundation Object Management Group ~OSF OMG), Open Systems Interconnection (OSI)). Reference might be made for example to "Object Management 5 Architecture Guide", Revision 2.0, Second Edition, September 1, 1992.
OMG reference: OMG TC Document 92.11.1.
In general terms, "objects" in this context comprise units of software which represent entities or concepts of the real world by means of a combination of data and functionality. Data is encapsulated as internal attributes of an object and the associated functionality is encapsulated as methods which use or operate upon the attributes. Although an object may receive a message from another object requesting it to perform a method on its attributes which may result in the return of data, the attributes themselves are not directly accessible by external objects. Such high degrees of encapsulation have not been readily available in earlier software technologies.
Embodiments of the present invention are advantageously based on object-oriented technology. For instance, in embodiments according to the present invention, the software agents may each comprise a set of objects 30 and a way in which an agent can achieve reconfigurability might then be to WO 96/25012 PCT/Gn~ C2~2 change objects of its set, either altering individual objects or adding, subtracting or replacing objects in the set.
Each software module referred to above, whether a SIBB, an adaptor or a co-ordinator, may be an object. This can offer a particularly 5 flexible way of achi~eving reconfiguration. It is possible to control behaviour of an object in response to circumstances by the use of rules expressed as policies. Reconfiguration can be achieved by modifying or substituting policies of objects in an agent. In embodiments of the present invention, a particularly flexible use of policies is to design policies to be external to the 0 relevamt object or objects, only being loaded at run-time of the object.
A co-ordina1:or module in an agent may control not just the set of software modules in a configuration of the agent, such as SlBBs and adaptors, but may also control a set of external policies available to them.
Alternatively, an oblject might self-configure, seeking the correct policy or 5 policies, once a relevant context has been established.
By designing a service provision system according to an embodiment of the present invention, there can be many advantages. One of these is security against unauthorised access. If the reconfigurable agent includes authentification capability, access functionality might simply not exist until an authentification step has been complied with. This is achieved by using an initial configuration of the agent which includes an authentification proress but no access capability. The access capability is only brought into existence in a later, post-authentification configuration of the agent.
Other potential benefits of the access arrangements for an individual user might include the following:

- single contact point for services from different vendors;
- easy invoca1:ion and use of services from different vendors;
30 - consistent presentation of services across different vendors;

- integrated accounting and charging for a service set supplied by multiple vendors;
- security from unauthorised invocation and use of services;
- privacy from unauthorised access to service usage and service 5 content information.

The customer base for information services is particularly wide.
Initially it is anticipated to be particularly businesses, such as multinationallo corporations that have a range of fixed and mobile communication needs including electronic mail, voice and video conference. However, because of the growing installation of high capacity transmission links into domestic properties for entertainment services, and the growth of personal mobility, it is expected that the customer base will extend to the domestic market.
5 Embodiments of the present inverition can allow information service providers to scale their service management infrastructure accordingly.
From the perspective of the enterprises involved in satisfying the overall requirements of users there are likely to be major challenges involved in designing a suitable infrastructure. A potential starting point would 2 o clearly be provision of an architecture (from high-level design to low-level implementation) that can technically and economically support such information services. Software and hardware resources of the computing infra-structure would be enabling components of the information service architecture. An aspect of the computing i"rrasl~ucture is the processing 25 environment and a known environment of suitable type for use in embodiments of the present invention is the distributed processing environment (DPE) which allows multiple processes to be run using multiple computer "nodes". The DPE maintains a view of the multiple nodes and processes and handles message passing between nodes and objects, 30 providing a common language for the exporting of interfaces for different objects residing on different nodes. That is, it assists with aspects of the WO 96/25012 PCT/GB961002~2 software and hardware location transparency and facilitates the provision of scalable and deployable solutions. Standards for DPE already exist and are being extended.
~ A node in this context might conveniently be provided by a 5 computer with processors and memory which is capable of running an operating system, c:ompatible distributed processing platform and objects executed as processes on the computer.
In order to be commercially viable it is advantageous that an information services infra-structure responds rapidly and at low cost, and lo attractive characteristics would be that it is:

- Flexible:
to optimise use of resources by dynamic deployment and execution of software on the harciware infrastructure;
15 - Extenciible:
to add iand evolve functionality and capability to software and hardware;
- Scalable:
to cope with increasing numbers and dispersion of users and computing resources;
20 - Reusable:
to maximise software and hardware reuse and minimise cost of extending and scaling the architecture;
- Adaptable:
to cope with changiing, heterogeneous resources within and connected to 25 the infrastructure;
~ - Manageable:
to exert necessary control over operation and planned change in the infra-structure;
- Robust:
30 to be fault tolerant and easily recoverable in the event of failure.

W O96/25012 PCT/~L,'~v~252 Architectures according to embodiments of the present invention can provide at least some, and may be able to provide all, of these characteristics .
Another advantageous characteristic would be that the communication network (or networks) itself is capable of transmitting a wide range of services. There are network technologies which are capable of supporting multiple service delivery and some examples of these are based on the asynchronous transfer mode (ATM) and synchronous digital hierarchy (SDH) technologies. A common feature of such networks is that 0 they can use a range of transmission rates flexibly, choosing that most appropriate for the service being delivered.
Future information service retailing might be offered across a telecommunication information networking architecture that brings together elements of the multi-service network and DPE technologies mentioned. An example of such an architecture is that being defined by the TINA
Consortium. Reference might be made to "Telecommunications Information Networking Architecture", Oshisanwo A., Boyd T., Proc. 4th IEEE Conf.
Telecommunications, IEEE, London 1993.

As mentioned above, an important aspect of the computational infrastructure of the service retailer is the implementation of the access arrangements for users. According to embodiments of the present invention, the implementation of specific access arrangements supplied by the retailer can confer a number of capabilities for the benefit of users.
These capabilities enable the user to:

- enquire of the retailer the range and specifications of services sold;
- negotiate a subscription to a service for the benefit of end-users;
- view current details of existing service subscription such as usage 3 o permissions;

W 096125012 PCTJ~ r252 - view historical details of existing subscriptions such as usage history~ and accrued charges;
- enter a financial transaction to pay subscription accounts;
- request assistance on any aspect of the retail environment;
5 - supply their identity and undergo authentication procedure;
- view and change their personal customisation preferences for each subscribed service.

Tllese service provision capabilities can all be implemented using 0 intelligent software agent technology.
Embodimen1:s of the present invention will now be described, by way of example only, with reference to the accompanying Figures in which:
Figure 1 slhows schematically elements of a service provision system, according lo an ernbodiment of the present invention, for providing 5 services to users by means of communications networks;
Figure 2 shows different configurations which might be taken up by an access agent in ;3 system as shown in Figure 1;
Figure 3 shows schematically object types which an intelligent software agent of the system of Figure 1 might comprise;
Figure 4 shows a specific set of objects for use in a "Sales Agent"
configuration of an intelligent software agent of the system of Figure 1;
Figure 5 shows a flow diagram of process steps in use of the system of Figure 1 to establish an outgoing service session;
Figure 6 shows allowable transitions between agent configurations in use of a system as shown in Figure 1;
Figure 7 shows a flow diagram of process steps in use of the systerm of Figure 1 to respond to an incoming service session;
Figures 8a, 8b, and 8c show information, computational and engineering represe!ntations of a system architecture for use in designing 30 embociiments of the present invention;
Figure 9 shows the structure of a DPE relevant to Figure 8;

W 096/25012 PCTI~i''~~252 Figure 10 shows a computational view of access and session concepts, by means of objects, in use of embodiments of the present invention; and Figure 11 shows a principally hardware view of platform for use in 5 embodiments of the present invention.

TFCHNICAL CONTFXT

As mentioned above, a suitable technical context for embodiments 10 of the present invention would be an information networking architecture of the type defined by the Telecommunications Information Networking Architecture Consortium (TINA-C). Such an architecture is based on Open Distributed Processing (ODP) principles of object orientation and distribution, applied to telecommunications system design using Telecommunications Management Network (TMN) managed objects and Intelligent Network (IN) concepts for service management and control.
In a TINA-C architecture, there are three sets of concepts, a logical framework architecture, a service architecture, and a management architecture .
The logical framework architecture defines concepts and principles for the design of object-oriented software that operates in a distributed environment. Here a traditional layered computer architecture is defined, with computers and computer networks at the bottom, a distributed processing environment (DPE) in the middle, and (object-oriented) application software on top.
The application software is itself subject to organisation in TINA-C.
The service architecture defines basic object types, and rules for their usage that can be used to design application software that provides services. A
service is defined as a meaningful set of capabilities provided to a user. A
30 service may have many users in different roles. For example, the end-user is the person who uses the service for its intended function, the service Wo 96/25012 PCT~GB96/00252 manager manages the service, and the network provider provides and manacges the underlying resources required by a service. The notion of servicl~ in TINA-C applies to all applications that are accessible to users, including management services. The service architecture contains a call 5 model suitable for a wide range of service types.
The management architecture defines object types, and rules for their usage, that c:an be used to design application software to manage servicl3s, networks and computing systems.
The (knowm) OMG type DPE core provides for communications 10 between objects, provides dynamic bindings via a trader function and ,~rovides notification servers to give management information (such as faults, performance and the like). It provides generic NApplication Programming Interfaces" (APls) and message passing facilities. All application software is assumed to run on a DPE.
Available documentation, in addition to the reference given above, includes a set of cleliverables, such as no-o Modelling and Design", by J
Rumbaugh et al, published by Prentice Hall in 1991, "Overall Architecture"
TINA-C Deliverable! 1994 by M Chapman et al and "Guidelines for the Defini~:ion of Managed Objects", published in "The Management of 2 o Telecc,mmunications Networks" edited by R Smith et al and published by Ellis-Horwood in 1 992 System Design Te~hniques Referring to Figure 8, to enable system design according to a TINA-C architecture, three ODP viewpoints can be selected, these being as follows: -~ Information: a viewpoint on a system that focuses on the semantics of information and information processing activities in the system.

~ Computational: a viewpoint on a system that focuses on the distributable software objects and their interactions.
~ Engineering: a viewpoint on a system that focuses on the deployment and distribution aspects of the system and on the infrastructure to support distribution.

For each of these, a set of modelling concepts are defined, providing a vocabulary that can be used to specify a system in the viewpoint addressed .
0 The information modelling concepts shown in Figure 8a provide the framework for information specifications, describing the types 801, 802 of information used in a system and the activities that are performed on the information. An information specification describes the semantics of the problem domain that the application software is being designed for. For example, in a banking scenario an information model may contain objects such as account, debit, credit, and balance, and relationships such as debits plus credits equals balance.
The fundamental concepts of information modelling are objects, which are information bearing entities, object types 801, 802, that classify objects and define an object's characteristics in terms of attributes and operations that may be performed on objects, and relationships 803 that define links between, and aggregations of, objects.
Within TINA-C the notation chosen for information specifications is the ISO/IEC and ITU-T recommended GDMO (Guidelines for the Definition of Managed Objects) with GRM (General Relationship Model). GDMO is extensively used in the TMN community for information modelling and thus allows TINA-C to directly reuse this work. Rumbaugh's OMT (Object Management Tool) notation (described in "Object-Oriented Modelling and Design", by Rumbaugh et al, published by Prentice-Hall in 1991) is used for 30 graphical representation of information specifications.

WO96/25012 PCTlGB96J002~2 The computational modelling concepts shown in Figure 8b provide the framework for computational specifications. A computational specification describes distributed telecommunications applications in terms of computational objects 805 interacting with each other. Computational objects are definedi without any knowledge of where the computational objects will eventually be deployed i.e. distribution is made transparent.
This allows for the specification of a software system that can tolerate the redeployment of software onto different nodes of a network without affecting the specification. The fundamental concepts of computational 10 modelling are objects 805 and interfaces 806, 807. Objects are the units of programming, and encapsulation. Objects interact with each other by the sending and rec:eiving of information to and from interfaces. An object may provide many interfaces, either of the same or different types. There are t\N~o forms of interface that an object may offer or use: operational interface 806 and stream interface 807. An operational interface 806 is one that has defined operations, that allow for functions of an offering (server) object 809 to be invoked by other ~client) objects. An operation may have arguments and may return results. A stream interface 807 is one without operations (i.e. there is no notion of input/output parameters, 20 requests, results, or notifications). The establishment of a stream between strearn interfaces 807 allows for the passing of other structured information, such as video or voice bit streams.
A notation which might be chosen for computational specifications is TINA-C ODL (Object Definition Language), which is an enhancement of 25 OMG IDL (Object l\/lanagement Group Interface Definition Language). TINA-- C has extended OMG IDL to allow for the definition of objects that have multiple interfaces and for the definition of stream interfaces.
The engineering modelling concepts shown in Figure 8c provide the framework for engineering specifications. An engineering specification 3 o describes the deployment view of a system in terms of which computational objects 805, 809 are placed on what computing node 810.

It also defines - the infrastructure to allow objects to execute and communicate with each other.

DPF and Hardware Context Referring to Figure 9, the infrastructure aspects of the engineering model will define the Distributed Processing Environment (DPE). As mentioned above the DPE is an infrastructure (of known type) that supports the interactions of computational objects. The DPE shields applications 0 programs from the heterogeneous and distributed nature of the underlying environment, and provides the mechanism that allows objects to interact without knowing the computing nodes 810 they are on. The DPE defines four types of entity: DPE kernel 811, kernel transport network 901, DPE
stubs, and DPE servers 809.
The DPE kernel defines a core set of communications, storage and processing capabilities (e.g., protocol stack). This core set is assumed to be present on each node.
The kernel transport network 901 is a communications network to which all DPE kernels are attached in order to exchange messages to 20 facilitate object interaction. It is defined in order to logically separate the computing network from a-transport network which is used for the transmission of voice and video. The logical separation recognises that the two networks may have different requirements on quality of service.
However, they may both be implemented by the same physical network.
DPE stubs are software modules linked with computational objects which intercept interactions on objects, and use the underlying kernel transport network 901 to establish bindings and to transmit and receive invocation messages to and from remote objects. In practice, an interface for an object is designed and compiled. This generates a stub which will 30 receive incoming messages to the object and select which operation is to be invoked by means of the interface.

CA 022l2377 l997-08-06 W 096/25012 PCTlGB9r~ 52 DPE servers 809 provide infrastructure support. Two examples might be a trader and a notification server. A trader provides a run-time mechamism that allows objects to locate the interfaces of other objects. A
notification server enables objects to emit notifications (i.e. significant 5 events that occur during the lifetime of an object) to other objects. Objects wishin/3 to receive notifications register at run-tirne with the notification server.
Referring to Figure 11, the hardware view of a system in which embodiments of the present invention might be built is based on a transport 0 network 11 00 which will carry for instance voice and data services, provided by service providers to users. The users will be connected to the network by different pieces ~f customer premises equipment (~PE) 1101, 1 102. The various parties involved in offering and carrying those services, such as the service retailer, service provider and network provider, are also 5 connected at computational nodes 801 to the transport network 1 100.
Intelligent software agents, for instance a terminal agent 102 and a user agent 107, will sit on either the same or different ones of computational nodes 801 connected to the transport network 1 100.
As shown in Figure 1 1, the terminal agent 102 and user agent 107 sit on the same cornputational node 801. These agents are provided with data oF various typles, including for instance user profiles in a user profile store 1103 which happens to share the computational node 801 with the user agent 107 and terminal agent 102. Other data stores available by means of the transport network 1100, as shown, include a policies data store 1104 and a nnanagement information data store 1105. The policies - data store 1 104, as further described below, allows a user access agent to reconfigure itself in order to change its response to user interactions. The rnanagement informlation data store 1105 may provide global management information in res,oect of services. Each computational node 801 is 30 provided with a DF'E kernel 811, and therefore a protocol stack for use according to DPE principles.

W 096/25012 PCT/~b_'~0252 "SessionN and "Access" Concel~ts Tl NA-C systems make use of "session " concepts and "access concepts. These are as follows.
Session concepts define those objects and interfaces that are required to support the initiation of, interaction with, and termination of services. Although services by their nature are different from each other, they all have a common fundamental property in that they provide a context for relating activities. Such a context is termed a Session. As a generic o definition, the term session represents a temporal period during which activities are carried out with the purpose of achieving a goal. Three types of session have been identified: service session, user session, and communications session.
A Service session is the single activation of a service. It relates the 5 users of the service together so that they can interact with each other and share entities, such as documents or blackboards. A service session logically contains the service logic. A service session is computationally represented by a service session manager. A service session manager offers two types of operational interfaces. The first is a generic session 2 o control interface. This provides operations that allow users to join and leave a service. For certain services it may also offer operations to suspend and resume involvement in a service. The second type of interface will provide service specific operations, and will be dictated by the capabilities offered by the service logic.
2 5 The ability to suspend and resume involvement in a service is a desirable feature for some services. For example, consider a multi-media conference that occurs over several days. During the night, when the conference is not in use, it should be possible to release expensive communications resources. The service session can maintain state about 30 the conference, such as the users and resources involved. Maintenance of CA 022l2377 l997-08-06 W 096/25012 PCT/GB96/002~2 state and the abilit~y to suspend and resume involvement would avoid the need for tearing down and recreating the service each day.
A User sessiion maintains state about a user's activities and the ~ resources allocated lFor their involvement in a service session. Examples of 5 state held in a u~;er session include the user's accumulated charge, suspension and resumption history, and service specific state such as the current page being edited in a distributed document editing service, for example. When a u!;er joins a service session, a user session is created. It is deleted when he leaves. The service session maintains links to the user lo sessions and thus provides a group oriented view.
A Communinvation session is a service oriented abstraction of connec1tions in the transport network. A communication session maintains sltate about the connections of a particular service session, such as the communication paths, end-points and quality of service characteristic. A
15 communication session is required only when stream between computational objects are required. Computationally a communication session manager provides the features of a communication session. It provides a connection graph interface of a service session to manipulate. A
connec1:ion graph is an abstraction that defines concepts such as end-points and lines. A service session expresses connectivity requirements be adding, removing and linking end-poin~s and lines. A service session manager will request connectivity between stream interfaces of computational objects.
The colmmunication session manger calls upon connection management objects to establish physical connections between the network access points of the relevant computing node, and nodal services that allow for a - network: access point to be connected to the software stream interface.
Connec-tion management components are not discussed further in this specification .
A user can be simultaneously involved in multiple service sessions.
30 A service session has one or more users associated with it, and for each associated user there will be a related user session. A service session may CA 022l2377 l997-08-06 have one or more communication sessions if the service involves stream communication. A communication session is related to exactly one service session.
The purpose of these separations is to decouple service oriented 5 activities from connection oriented activities. Many types of services may exist in a future network and not all will require the explicit establishment ofconnections (streams). The service session is therefore a point of control for all service types, creating communication sessions when necessary.
Access concepts define those objects and interfaces that support 0 user and terminal access to services.
Users need to have flexible access to services, in terms of the locations from which they access the service and the types of terminal they use. User access is therefore distinguished from terminal access. An agent concept is used in defining the TINA-C access model. An agent is this 15 context is a computational object, or collection of objects, that acts on behalf of another entity.
A user agent represents and acts on behalf of a user. It receives requests from users to establish service sessions, or to join existing service sessions, and creates or negotiates with existing service sessions as appropriate. The creation of a service session by a user agent is subject to subscription and authentication checks. A user agent also receives and processes requests to join a service session from service sessions themselves. This is a form of in-coming call processing where another user has created a service session and invites the user to join in. User agents 2 5 know the subscribed services that a user may create. This list can be presented to the user when the user logs onto his user agent.
A terminal agent is responsible for representing a terminal. It is responsible for obtaining the precise location of a terminal. Two examples are; the network access point a portable computer is attached to, and the 30 cell in which a mobile phone is currently located.

W O 96125012 PCTIGB96)0~252 In order to access a service, users must associate their user agents with terminal agents. This is part of a logging on process. A user may be simultaneously assc,ciated with many terminals. For example, in a video - conference a user may be using both a workstation and a telephone.
5Similarly a terminal may be simultaneously associated with many users, for example, when in a meeting all users associated their user agents with the telephone in the meeting room.
User and terminal agents are computational objects that should have high relliability properties. These are required so that the network software 0 can rely on a fixed point for locating users and terminals in an environment where both may be moving around.

Communication Access and Setup by Users 5Figure 10 depicts a computational view of the access and the session concepts together. The shaded boxes of user and terminal agents 102, 1 ID7, represent service independent objects and the white boxes 107', 1006 depict service specific objects.
Referring to Figures 10 and 1 1, in an example, a user wishes to engage in voice communication with another user. First, the user selects a terminal on which he will access the network. Assume it is a workstation 1 102 vvith window capabili~ies.
As part of a login procedure the terminal and user agents 102, 107 are found and associated with each other. The user is then presented with a menu of capabilities. He can make inputs to impose some local or global -preferences. Where the terminal is a workstation, this will usually be by screen inputs but v~rith other terminal equipment it may be for instance by means of a keypad or swipe card or the like. Any user inputs are passed to the terminal agent 102 which can act on, or add, information (such as CPE
30 capabilities) to the inputs.

W O 96/25012 PCT/~bi''~ 252 The user selects the voice call option. The terminal agent 102 passes the request to the user agent 107 to establish a voice call service session. The user agent 107 creates a voice call service session manager 1006, makes requests, passing on requirements which the user has set, 5 and joins the user to the session, causing a user session 1010 to be created.
Another menu is presented to the user requesting the identification of the user to be called. On input of the data, the user agent 107 requests to the service session manager 1006 to join the new user into the session 0 1010. The service session manager 1006 uses the identity to locate the called user's user agent 107', and a request to join is passed over to the remote user agent 107'. The remote user agent 107' then alerts its associated terminal agent 102' of the incoming voice call.
The remote terminal agent 102' then alerts the called user's 5 terminal 1 101, by presenting a window on the user's terminal (for simplicity assume the user was already logged on). The called user accepts the call and a response is fed back to the service session manager 1006.
On seeing the acceptance, the service session manager 1006 first creates a user session 10 10' of the new user and then requests a communication session manager 1007 to establish a connection between end-user applications residing-on each of the users' terminals 1101, 1102 (the interface identities of which were passed over in an earlier request or response) .
When the connection is established a response is passed back to the 25 originating user. The two parties can then engage in voice conversation.
At any time either party may leave the session. This will result in the other user being notified and the deletion of the service session. During the voice conversation, subject to permission, each user may request another user to join the conversation. The user session 1010 can be used 3 o to record the duration of the call, and thus be used to calculate a total W 096/25012 PCT/~ 252 charge that can be added to the user's billing records, before termination of the service session.
In the abov~3, the user has selected a voice call option. It is of - course possible to select a more complex option, such as video s conferencing. When the service session manager is created in response to a request for an option, the requests can be acted on by a factory component of the S~ervice Session Manager 1006 to provide a customised version of a Service Session.
Subject to constraints imposed by the Service Session, the user may o now have some leve~l of control over the Service Session. For example, in a video conference the service session class may be set up to give chairman privileg~es to the firs,t entrant. The User Agent 107 now has to ensure that the other participamts in the conference are informed that they're in a conference in progress, with chairman priviledges to first entrant.
Each other user however will also have a measure of customisability and control via their own User Service Session 1010' interface. This interface allows th~em for instance to define the bandwidth of video windows that are not in use, or to define which video streams are to go to a set-top box or which to store via a Personal Computer. They are likely however to have only limited general control over conference conditions, such as how to gain the floor.-The User 'iervice Sessions 1010, 1010' will inherit certain functionality associated with a conference such as the need for video and audio streams and a data stream. This is achieved by creating (via a factory) Connection Sessions managed by a Communication Session I\/lanager 1020. As a result, streams in a conference can be potentially configured directly (~e.g. choose not to send video), as part of the service (reduced bandwidth allocation to a channel not directly involved in the conferemce), or impc~sed by the User Agent 107 (e.g. to take advantage of 30 low tariffs) or the Terminal Agent 102 (terminal capacity constraints).

The Communications Session Manager 1020 sets up Connection Sessions as required (including packet switched virtual connections for file transfer etc.).

The above indicates a technical context in which embodiments of the present invention could sit.
Referring to Figures 1 and 11, a service provision system according 10 to an embodiment of the present invention comprises capabilities, expressed in a combination of hardware and software, which are structured in domains, these being as follows:

i) terminal domain, 101 ii) service retailer domain, 103 iii) service provider domain, 104 iv) communication network provider domain, 106 The domains represent typical areas of supply and management responsibility and will contain, or provide, data and functionality appropriate to their respective areas. Intelligent software agents sit in each one of the domains 101,103,104,106. The agents are responsible in each case for representing a set of local resources, with respect to their particular domains, and they negotiate with each other for the best allocation of their collective resources to fulfil a service request.
Communication between agents is handled by the DPE. This is embodied as a DPE kernel 105 residing in, and part of, the domains 101, 103, 104, 106. Message communication between the agents can then be handled by the DPE kernel. Referring also to Figure 3, each agent is a 3 0 computational object and therefore comprises data and functionality.
Further, each agent comprises several component objects, or object types, W 096/25012 PCTlC~,f'OD252 301, 302, 303. These cornponent objects would usually be run on one or more of the computing nodes that are distributed on a communications networlk. The objects will be implemented by use of an object-oriented software language of which several suitable examples are readily available, such as C+ +. Policies for these objects can be implemented as data structures stored on computer memory devices 1 104, which are interpreted by the cornponent objects and can be dynamically updated.
Use of policies is known and described in written publications such as a special issue of JSAC on network management, Volume 11, No. 9, 0 December 1993, by J D Moffett and M S Slornan.
Each agent uses local knowledge of its resource domain to offer the supply of those resources to other agents at agreed standards and specification. Any of the agents may supply and request resources.

Domains and ResRective Agents Anyone who needs access to the system, who may be a customer or end-user but may also be for instance a service provider or service retailer, interacts with the system via the terminal domain, 101, on which resides the Terminal Agent (TA), 102. A request for a service by a user would trigger interactions between the agents, each agent representing its own domain, which would then lead to a response to the user based on the outcome of those interactions.
The terminal domain 101 "contains" the user and items owned or controlled by the user, such as the user's personal profile and applications, and terrninal. The lrerminal Agent 102 is responsible for representing the terminal resources when interacting with agents in the retailer domain, 103, service provider dornain, 104, and network provider domain, 106. The terminal resources normally include service applications (for example, an 3 o electronic mail editor), communication capabilities, and user-interface W 096/25012 PCT/GB9''~C2S2 platforms. Typically the TA 102 will negotiate standards relating to its resources that include:
- terminal resources - user interface capabilities (e.g. multimedia graphical user interface) 5 - processing capacity;
- memory devices;
- communications ports and capabilities;
- software operating systems;
- applications specification and capabilities (e.g. video on demand);0 - network access point specification (e.g. type, capabilities) - other factors that would be relevant to optimising the service provision .
Looking at the service retailer domain 103, this represents the area of interest of the retailer who needs to:
~ facilitate access to information and communication services and associated tools ~ act as middleman or broker for service providers or network providers ~ offer customised guaranteed services to individual customers ~ manage the services It contains an important agent, responsible for providing and managing the retail services to users and called here an Access Agent (AA) 107. This is a version of the "User Agent" described above in relation to a TINA-C architecture and hence the same reference numeral is used in the Figures.
In addition to agents, the service retailer domain 103 contains a set of management processes to allow facilities such as the following: to monitor activity, make configuration changes, specify and enforce poiicies, maintain quality, performance access etc. as demand and resources vary, enforce payment and security related mechanisms, assess interactions and 3 o add links to third parties, and advertise services. These management processes support the retail services provided and managed by the Access W 096/25012 PCTJGB96J002~2 Agent 107, which services rnay be realised by resources supplied by the retailer such as billing, or may be realised by resources supplied by agents in the network or service provider domains.
- Typically the AA 107 will negotiate standards for its resources that 5 include cost, payrr~ent, quality of service (QoS), security, information content, functional c:ontent, format and control options and constraints.
Looking at 1:he service provider domain 104, this represents the domain of interest of sources of the services which can be purchased in the retailer domain 103. It "contains" a set of disparate service providers, each 10 of which can be represented by agents to negotiate with buyers in the retailer domain 103 on supply and payment for services, and similar issues.
(It could be viewed as a specialisation of the retailer domain 103 with a restricted set of customers and offerings.) The service provider domain 104 contains another important- agent 5 type, called here th,~ Service Session Agent (SSA) 109, which represents the resources of an information service provider. In the usual mode of operation a SSA 109 supplies information services requested by an AA on behalf of the user. Typically the SSA 109 will negotiate standards for its resources that include cost, payment, QoS, security, information content, functional content, format, control options and constraints. The SSA 109 often vvill communication with agents in the network domain 106 for the supply of connection resources.
Looking at the network provider domain 106, this represents the domain of interest of the providers of the network used to convey messages e.g. from the user to the retailer or to other users. It therefore "contains" the network hardware and associated software, and connection control features to enable specific IN services. The user would not have a direct contractual relationship with the network provider which instead can be regarded as a sub-contractor to the retailer.
Another agemt of importance is the Network Agent (NA) 110 which resides in the network provider domain and is responsible for representing W 096/25012 PCTI~L,.'~_252 network resources. The NA 1 10 will negotiate the allocation of network connections to deliver services provided by other agents. Typically the NA
1 10 negotiates standards for its resources that include cost, payment, connection addresses, bandwidth, QoS, mobility, priority, performance, 5 quality, security and control options and constraints.
Referring particularly to Figure 11, each of these domains can be supported by computational nodes 81 0 in a network. As shown, one computational node 810 carries both a terminal domain 101 and a service retailer domain 103. These may alternatively reside on different nodes, or a 10 further domain, such as a service provider domain 104, may additionally be resident on the same node 810.

Intelligent Agent Construction Referring to Figure 3, agents in embodiments of the present invention are particularly advantageous in their novel construction.
Embodiments of the present invention realise characteristics of information services provision such as extendibility, flexibility, scalability, 20 reusability and manageability through the use of a plurality of distributed, co-operating intelligent agents, and by the novel construction of the intelligent agents involved. Each agent shows a design encapsulation that comprises several co-operating component objects. As mentioned above, the agent is constructed from a combination of three component object 25 types 301, 302, 303 that may be added or removed dynamically. These component object types are:
i) service independent building blocks (SlBBs) 301;
ii) adaptors 302; and iii) a co-ordinator 303.

W 096/25012 PCTIG~ 02~2 These are described more fully below.

Policies In embodiments of the present invention, functioning of a 5 component object isi determined by the set of operations programmed at compile time. Such operations act on the object itself and other objects in the system.
The execution of these operations is determined by the object reacting to incoming messages or internal triggers and responding according 10 to the "system state". The system state is information held by objects and shared by inter-object communication. It is determined by the value of attributes in the object itself and those in other objects.
The operation of an object is fundamentally governed by rules (or polic:ies). Policies are embodied as data and they control the task output 15 of an object, the mode of achieving that output and the relationship of a component object with peer component objects. A very simple example of such a rule is:

"if {tests on system attributes give a recognised condition} then do 20 (or do not) perform {operations} on {objects}"

In use of plolicies, they may be embedded in an object. In embodiments of the present invention however, it may be preferable that at least some policies are not embedded but loaded by the object during 25 operation. The objert instead has an embedded instruction to look for the ~ policy, rather than having the policy itself embedded. The policy itself is then external to the object.
If it is desirecl to change behaviour of an object, one can:

W 096/25012 PCT/GB9''~-252 1. change the system attributes. This might not be desirable because external attributes may also govern the behaviour of other objects which should not be changed:
2. change the values held in the object with which the system 5 attributes are compared. This may provide the desired behaviour but could also result in other rules in the object misfiring;
3. change the test performed on the system attributes;
4. change which programmed operations are performed when a rule fires.

The concept of loading policies gives the flexibility of doing any of these dynamically during run time and the policies can be reused amongst many objects. For example suppose that a single object was replaced and the interactions of several objects should be changed to recognise the new 5 one. This can be done fairly easily with external policies.
Known constructions, where policies are embedded in the objects, require rewriting of code in the object to change behaviour. External policies allow not only changes in behaviour to be achieved more easily but also more freely, and can allow extra behaviours (which are composed from 2 o combinations/permutations of a programmed set of operations) to be performed even if these were not originally anticipated.
The concept of policies is such that an object must have access to a 'Policy Interpreter'. This can be internal or external to the object. In order to locate policies, a policy server might be provided, again either internal or 25 external to an object.

Co-or~;"ator For each agent there is a single co-ordinator component object 303 that is responsible for managing the membership of the other component 30 objects to the set that comprises the agent. The co-ordinator 303 uses a set of policies to ensure that member component objects can be used W O 96/25012 PCTIGB96/002~2 co-operatively, to resolve policy conflicts and to establish coliective and inter-wlDrkin9 policies for the whole component object set. (Collective policies are policies that are available to two or more component objects in ~ the set. ~
A co-ordinator 303 in this context might therefore be generally described as a soltware entity having at least selection and conflict resolution functionality. Examples of conflict that might be resolved by a co-ordinator include two objects which both have the instruction "never defer", and two objects which both need the same resource. The co-0 ordinator might modify an object to resolve the conflict, and might use collective policies to ensure no more than a certain proportion of the resource is used by any one of the objects.
The functions of the co-ordinator 303 might in practice be provided from rnore than one object, or distributed amongst objects with other functionality.

Service Independent Building Blocks There are one or more service independent building blocks (SlBBs) that are responsible for the service management and service provision.
2 o SlBBs are units of both information and functionality that provide the services to other agents or -users. A SIBB may use various low-level resources to deliver its service unit. It is the capability of embodiments of the present invention for flexible addition of SlBBs to an agent that contributes significantly to the extendibility, manageability and scalability of25 the information services infrastructure. SlBBs may be atomic or more ~ usually compounded from sets of atomic SlBBs. For example in an AA the compound SIBB called Accounter, which gives subscribers an account enquiry, includes th~e atomic SlBBs data_locate, data_read. It is by the construction of SlBBs from atomic SlBBs that embodiments of the present 3 o invention achieve in part the reusability of the information services infrastructure .

Ad~l~.tors The adaptors of which there may be one or more deliver the core services provided by SlBBs in such a way as to maximise the capability, 5 quality and effectiveness of the service. The agent tunes its service output by presenting it through the choice and configuration of adaptors that are most appropriate for the specific access circumstances of the consumer of the services. Adaptors may be atomic or more usually compounded from sets of atomic Adaptors. For example for an AA the adaptor will support 0 the account enquiry service from a mobile telephone or a personal computer by choosing different terminal adaptors. Alternatively, an adaptor might "tune" service provision to a user in relation to other constraints such as the language in which a service session should appropriately be conducted for that user. Embodiments of the present invention achieve 5 their adaptability at least in part through the flexible agent construction using adaptors.

Service Features 2 o It has been stated that an important aspect of the information services infrastructure is the service provision for users by the information retailer. According to embodiments of the present invention, the implementation of the service provisioning supplied by the retailer will generally confer a minimum number of capabilities for the benefit of users.
25 These capabilities might include:

1. submit identifiers for the chosen usage context and undergo authentication, (Authenticate).
Authenticate gives protection to users by giving various levels of 3 o security against unauthorised service use or access to information. For example, end-users have protection from violation of privacy, subscribers W O 96/25012 PCTJCl~ 0252 from fraudulent use of subscriptions, retailer and service provider from unauthorised access to sensitive management functions and information relating to services 'sessions;

5 2. e~quire of l:he retailer the content and specifications of services sold, (E-nquire).
End-users, subscribers, buyers benefit from this facility because they may search more effectively for services that can provide the required service content. Also retailers and providers can more advantageously 0 advertise their service offerings to interested customers;

3. invoke and use any permitted service to a specified quality and negotiated cost, (Use).
This facility benefits all users by invoking the services required in a way most appropriate for their access circumstances, personal preferences, usage permissions and usage constraints, and guards against cc~nflict between service sessions. For example an end-user may invoke a service only under circumstances that are permitted by a subscription (thus enforcing the contract between retailer and subscriber). When used, the service is personalised to the end-user's declared preferences and optimised by appropriate configuration for the end-user's usage context;

4. view services available for use and associated information such as usage permissions and constraints (View services).
The view fiacility confers advantages to the user by showing information such as capabilities and constraints of the services which they can use; for example restricted film categories in a video on demand service, 3 o 5. view service history, such as usage record and accrued charges, (View charges).

W 096/25012 PCT/GB9"OC252 The advantage of this facility is that users may, if permitted, see the historical use made of services and associated charges. For example, a subscriber can monitor itemised billing for specific end-users in order that the subscription can be administered effectively. An end-user could benefit 5 from being able to monitor for unauthorised use of their identity;
6. enter a financial transaction to pay subscription and bills, (Pay charges) .
The payment capability benefits anonymous users, subscribers and 0 the retailer by providing a financial settlement mechanism. Several alternative means may be implemented, such as credit card transaction, currency submission acceptance, electronic tokens and direct banking instructions;

15 7. request assistance and help on any aspect of the retail environment, (Assistance) .
Immediate access to help on use of services and facilities is of great advantage to all users to give reassurance and aid the most effective performance of tasks. Furthermore the retailer and provider benefit from 20 empowering users to make the most of the facilities;

8. view and change user personalised preferences for each subscribed service, (Set profile).
It is the user profile that customises the service offerings to 25 individual users and empowers users to tailor each service to their changing requirements. For example the end-user may specify a delivery destination specific to each service or aspects such as look-and-feel on a graphical user interface.

W 096/25012 PCTJCn~ 2~2 !~. negotiate iand set-up a new subscription or change the characteristics of an existing subscription such as the permissions of different users in anl organisation (Subscribe).
The facility for subscription gives advantages to the retailer and 5 subscriber in the ability to arrange a contract efficiently and quickly. End-users benefit from rapid availability of services.

It is the availability of these facilities optimised for different access circumstances of the user that gives commercial attractiveness of the retail lo products to customlers. Preferably, these facilities are implemented using the intelligent agent components described above.

AA SE;~*~ lions The set of facilities described above shows the set available in the 15 general case. Ho~wever, the way the agent components (coordinator, adaptors and SlBBs~l are chosen and configured to implement these facilities is specific to the user type. For example an employee end-user of a corporate subscription has different needs from a domestic subscriber arranging services for a family. The present invention in part achieves customisation for user types through a number of AA specialisations that are directed at the needs of specific user types. Each specialisation is a reusable combination of components that satisfy the AA needs of each user type. AA specialisation is further customised when the usage context are established .
These sets are shown in Figure 2 where the capabilities in italics are not available in that Agent specialisation. The facilities common to different specialisations operate differently according to the role of the user. For example a service manager expects the facilities to operate differently to an end-usl_r. However, a user may change the usage context at any time by 30 submitting different usage context identifiers for authentication, for example by entering a different user-name and password. It is implicit that an W 096/25012 PCT/~D5G~C252 identified user has an authority level that may affect the privileges offered by each facility to which the user has access. Such privileges are held in the user profile and can usually only be changed by other users granted responsibility and privileges to make such changes. This would be the case 5 for a user administrator for a corporate subscription.
A presentation of any of the agents is the default version set by the service retailer. This appears unless data in the user profile has been customised by the user. Profile customisation is provided by the Set Profile facility that may incur charges. For example, the end-user, sales and 0 terminal/NAP agents can show advertising by default and a user preference to prevent advertising can carry a charge to the user.
Referring to Figure 2, the AA agent sets can be as follows:

Initial Agent 201 The agent normally encountered when a user or terminal accesses the service retailer domain. It will give access to facilities the retailer chooses to supply without user identifiers being submitted. The only facilities available might be Authenticate and Assistance, for example to contact emergency medical help. In the case of simple voice telephony this agent is analogous to soft-dial tone.

End-User Agent 202 The agent employed when the user has submitted user identifiers that the retailer has authenticated as an end-user of one or more existing subscriptions. This agent will provide the identified end-user with the personal service set derived from subscriptions that grant the end-user privileges. The facilities Enquire, Use, View Services and Set Profile are 3 o restricted to the service subscriptions covering the end-user. The Assistance facility supports the activities of end-user. View charges shows W 096/25012 PCTJ~g.J~D252 only those aspects of service usage and cost that the subscriber (who is paying for the service) has permitted the end-user to see. Set Profile allows customisation of end-user profile data for services but within the con:,~.ai"t:j of the corresponding subscriptions. Subscribe and pay charges 5 are not possible frorn this agent.
The end-user agent has particular application to end-users who are not responsible for carranging provision of services, for example children in a household or corporate employees who expect only to use services. An end-user may be identified personally or by the role they are fulfilling within 10 an identified organi~sations, for example a doctor on-call. (The End-User agent dloes not necessarily however presume that a user is human) Subscriber Agent 2Cl3 The agent employed when the user has submitted identifiers that the retailer has authenticated as that of the subscriber role. This agent gives the subscriber capabilities to administer subscriptions that grant service access to nominated end-users, terminals or network access points.
Enquire helps the sulbscriber find any retailer service that may be purchased by the subscriber, according to the search criteria submitted. Use allows limited invocation for the purp~se of trialing or testing the services on sale.
View Services, View Charges and Pay Charges act upon purchased subscriptions. Set Profile allows the subscriber to set mandatory or optionall defaults in the profiles of the end-users, terminals or NAPS that are covered by the subscriptions. Assistance supports the activities of subscribers .
The subscribl r agent is of particular use for corporate subscriptions where the subscriber (the purchaser) may appoint service administrators to manage the subscriptions for corporate employees who are the end-users.
Terminal and/or Net\r,/ork Access Point (NAP) Agent 204 The agent employed when the terminal and / or network access point to which the terminal is connected have submitted identifiers that the retailer has authenticated as a terminal and / or network access point 5 covered by an existing subscription. This specialisation is similar to the end-User Agent. The profile data does not presume a human user. An example use of this agent is a subscription that covers a mobile phone but not any of the human users carrying it. Another example is for a videophone connected to a fixed NAP to which any office personnel have 0 access. Subscribe and pay charges are not possible from this agent.

Anonymous Agent 205 The agent employed when the user intends to remain anonymous by 5 not submitting any identification. This agent will make free services available where identification is not necessary but will make chargeable services available when credit or payment guarantees have been supplied by the anonymous user and accepted by the service retailer. An example use of the Anonymous Agent is an anonymous call from a public 2 o communication point where the anonymous user pays at time of service usage by cash or electronic-tokens. Enquire finds any retailer service available to an anonymous user, according to the search criteria submitted.
Use allows any free service invocation but for chargeable services will first require the pay charges facility to accept payment guarantees. Some 25 services are provided on a browse basis which will allow the user to sample service content or advertising without payment. The user may choose to invoke and consequently pay for chargeable service usage as appropriate.
Assistance supports the activities of anonymous users. Subscribe and Set Profile are not possible from this agent.

W 096125012 PCT/~_ 'N~252 Management Agenl: 206 The agent employed by a user acting in the role of service manager asking on behalf of the service retailer. Managers have access to sensitive 5 service management activities that the retailer wants to perform. An example is the terrnination of a faulty service session or fraud audit on a service session. The authentication required to identify a service manager is stronger than for other users and may require extra steps and code in the authenticator. Enquire, Use and View Services relate to the services to o which the manager has been granted manager privileges. Use invokes the management facilit;es on services which may include viewing the audit log of a user which contains the history of service usage. Set Profile allows custonnisation of manager profile data. Assistance supports the activities of retail rnanagers. Subscribe allows a manager to change the rnanagement 5 services and facilities available, including granting privileges to other managers with less authority. Pay Charges and View charges are not possible from this agent.

~ales Agent 207 This agent is assigned to users identified to be acting as potential subscribers or end-users in order that they may assess service specifications, performance, retailer facilities and other factors that might influence a purchasing decision. The main purpose of the agent is to sell retail services. Enquire finds any retailer service according to the search criteria submitted. Use allows authorised invocations for the purpose of trialing, testing and using the services on sale. Subscribe takes the potent;al purchaser through the subscription process which includes 3 o submitting payment guarantees, for example credit checks. Assistance W 096/25012 PCT/GB~G;~-2~2 supports the activities of potential purchasers. View Charges, Pay Charges and Set Profile are also possible from this agent.
This agent finds particular application in domestic or small businesses where the end-user may also be the subscriber.

Provider Agent 208 This agent is used by the service provider to access management aspects of service logic or content that are the responsibility of the service 0 provider. For example, a Service Provider may want to update or change library information contained by a video-on-demand service. The strength of authentication is stronger than for most other users and may require extra steps and code in the authenticator. Enquire, Use and View Services facilities operate on the services to which Providbr privilege has been granted. Use allows the provider to invoke the service functions required for provider management of the service. Set Profile allows customisation of provider profile data. Assistance supports the activities of provider managers. View Charges, Pay Charges and Subscribe are not possible from this agent.

Buyer Agent 209 This agent is used by retailer representatives to negotiate wholesale service provision contracts with providers of service components and network capabilities for inclusion into other services. The strength of authentication is stronger than for most other users and may require extra steps and code in the authenticator. Use services is not possible from this agent.

3 o Reconfiguration wo 96r25012 PCT~o~'~C252 Reconfiguration from one agent set to another can be done, for any one object, by usin!~ a policy which relates to context. However, this is relatively complex. Alternatively, the same object can be used but with different policies, or a new object can be introduced. The second two 5 processes will be controlled by the co-ordinator.
For instance, using a policy which relates to context, if the Access Agent i~s to reconfigure from the Initial Agent 201 to the Subscriber Agent 208, then the Authenticate functionality will still be needed but will need to be strengthened. This might be done by using a policy which sets out:
0 " If service requires authentification, then offer a first level of authentification unl~ss the usage context shows user requested any of (End User, Terminal, Anonymous, Subscriber, Sales)-specific functionality, in which case offer a second level of authentification".
In an example of using different policies with an object, in reconfiguring from the Anonymous Agent 205 to the End-User Agent 202, the Locator SIBB will need new policies because the set of service resources to be located will be different in each case.
In an example of introducing a new object, in going from the initial Agent 201 to the Provider Agent 208, the new object "Enquire" will need 20 to be added to the se-t.

AA Compo,le~

Referring to Figure 4, this shows specific adaptors and SlBBs of the 25 AA in its Sales Agent configuration. That is, it shows a set of specific Sales Aglent components which will fulfil all the service provisions of the Sales Agent to a high level of functionality.
The co-ordinator is responsible for the selection and inter-working of AA components and rnanages the interfaces through which communication 30 with the AA can be initiated. When the context of this communication is established by the co-ordinator it may pass on interface references so that W 096/2S012 PCT/~b_~/00252 AA components and external objects can communicate directly. The co-ordinator is responsible for receiving the usage context data when a user first accesses the retail facilities. Usage context data contains technical specification of the specific access arrangements employed by the user, includes user identifiers submitted for authentication (or specifies the absence thereof), and contains information on the purpose for which the user is accessing the system. The usage context data is used by the co-ordinator to select appropriate adaptors and SlBBs having negotiated with the TA for corresponding allocation of terminal resources to match the 10 adaptors.

The following components are compound SlBBs:

Usage Context holds and manages data that describes all aspects of the current usage context ~the user's identity and role) and may include terminal resource specification and identity, NAP specification and identity.

Usage and Account holds and manages data that describes the history of service usage and corresponding usage context, charges incurred, credit limits, charges paid and other data relevant to accounting and usage history.

User Profile holds and manages data that characterises the specific preferences for invoking and receiving services and facilities relevant to the usage context. For example service diversions, or preferred Ul look and feel.

Service Slll,sc.;~,lion holds and manages data specified by the subscriber and retailer that defines the capabilities and constraints of subscriptions 30 that cover the usage context.

W 096125012 PCTJ~_-'.-252 Authenticator implements the "authenticate" function which receives identif;ers corresponding to any of the user, terminal and network access point and by appropriate tests determines that the identifiers are authentic and bein~ used legitimately. The authenticated usage identifiers are made 5 available to the ol:her SlBBs and adaptors to find the associated data records and self configure appropriately.

Locator performs the function of finding resources that correspond to the subscriptions coveriing the current usage context. The importance of the lo locator is that the resource iocations are identified so that when services are invoked by the user there is no appreciable delay to the user. Without the loc,ator real-time trading or object request brokering is necessary.

Accounter implements the acquisition and billing of usage and account data 5 submitted from service sessions and prepares a view of this data for the view charges or pay charges facilities.

Profile Manager implements the "subscribe" facility to negotiate the purchase and provision of a service and change subscription details held in the Service Subscription Data. This component maintains and updates User Profile Data when instructed by the user employing the set profile facility.
User Profile data cantains the information that allows users to customise their preferred default options for services within the constraints of the subscription set by the subscriber and retailer. The View Services facility is implemented in the Profile Manager which uses the usage context and service subscription data to give the user visibility of available services and their constraints or capabilities.

Session Manager is responsible for all aspects of invoking and managing 3 o concurrent service sessions according to subscription permissions and implements the use facility. Session management includes the ability to monitor resource usage and guard against adverse resource or service interactions. For example the session manager is responsible for managing the conflict between a videophone incall when the user has all ~he terminal resources currently occupied with a video-on-demand service.

Navigator is responsible for interacting with directories and DPE traders to search for references to resources available from the DPE. Such resources may be a source of a specific information item, for example a video-on-demand title, or a specific service session or service factory. The 0 navigator implements the facility "enquire".

Assisl~..,l implements the facility "assistance". A number of implementations are made which include form based problem reporting, hypertext help, and direct videophone to a human assistant deployed on 5 behalf of the retailer.

The SIBBS User Profile, Usage and Account, Service Subscription and Usage Context are important because they are persistent although may be inactive processes in storage when the agent is not in use. This is not 20 generally true for other SlBBs. These object components hold and manage key data structures for service provisions which provide services to other SlBBs and adaptors.

The following relates to Adaptors:
The Adaptors are self-configuring using data held in the usage context, user profile and service subscription. In this example adaptors are implemented to support heterogeneity of terminals, applications, user interfaces, users and network access points. The following are examples:

WO 96/25012 PCT/~1~.-'~02S2 The Terminal Adaptor has different versions and configuration to support the difference between terminals based on UNIX and those based on DO~ operating systems.

The User l,.l_rrac~ Adaptor has versions and configuration that support different, popular user interfaces standards such as X-windows and PC Wimdows.

The Application Adaptor supports different application types residing 0 on the terminal, for example equivalent multimedia electronic mail products from different manufacturers. This adaptor would also support different versions of software supplied by a supplier.

A NAP Adaptor accommodates the need for a user to access the 5 service provision from a variety of network access types, such as cellular radio telephone or a Ihigh bandwidth fixed point.

The User Adaptor customises the AA to a specific user by reference to information held in the Usage Context and User Profile Data that includes 2 o personal information and information about preferences for running a service expressed by the user. For instance, this might include filtering information provided to a non-technical user to exclude technical subject matter.

25 Example! Mode of Opleration Two aspects of a preferred mode of operation will be described.
The first aspect is outcall service invocation, where a user requests a multime~dia service session. The second aspect is incall delivery where an 30 end-user of an existing service session requests the delivery of some aspect of that service to another end-user, for example the request to join a multimedia conference or delivery of multimedia electronic mail.

Outcall Example Referring to Figures 2, 4, 5, 10 and 11, the preferred mode for an outcall request will now be described by reference to a video on demand service. However, the way the AA 107 establishes the optimum service provision arrangements with the user access arrangements is common to all AA specialisations. In this mode the user would normally have a computer 10 terminal such as a personal computer, or a television with a user interface provided by a set-top-box.

STEP 501: normally the user enters commands into the terminal application 1120 supporting the information retailer environment.

STEP 502: the terminal application 1 120 then instructs the TA 102 to request that the AA 107 presents the services and facilities supported from the current combination of terminal and network configuration.

STEP 503: the TA 102 sends a message across the distributed processing environment (DPE) to the AA- 107 which would be created or reactivated from storage on a network node in such a way as to consider use of computing resources and quality of service demands. This message from the TA 102 includes information about the usage context.
In this implementation the TA 102 gains information about the network access point by dialogue with the network agents 1 10, information which can then be used if necessary to establish and optimise the inter-operation of the terminal applications with network resources.

STEP 504: the AA 107 receives the NAP information from the TA 102.
Alternatively, in other implementations the information about the network W O 96125012 PCT1~5CJ'~252 access point may reach the AA 107 direct from the network agents 1 10 at the request of the TA 102, or at the request of the AA 107.

STEP 505: the usa,ge context is used by the AA 107 to self-configure as an 5 Initial Agent 201.

STEP 506: the AA will negotiate with the TA 102 for the terminal resources it requires to support the proposed configuration 201 of the AA.
The AA is able to adapt service provision to the circumstances of the 10 specific user, terminal, application and NAP by employing the appropriate choice! and configuration oF the AA adaptors 40 shown in Figure 4. It is the implementation of these components that gives the AA 107 the ability to rnaxirrlise the effectiveness of service provision and management.
The specialisation of the AA first encountered is the Initial Agent 15 201. Because of the limited facilities available from this agent it requires only the adaptors 40 for terminal, user-interface and NAP and the SlBBs 41 Authemticator, and Assistant. The user is then in contact with an AA 107 which will give a minimal set of facilities.

STEP 507: this set can be increased or changed by the direct or indirect request of the user, for example by submitting the authentication details.
This approach maxiimises the responsiveness of the service provision to the user and minimises unnecessary consumption of the retailer's processing resources.

STEP 508: the user may now choose to submit usage context, for example in the form of a username and password identifiers, for authorisation by the AA Initial Agent 2()1. (In another implementation the user identifiers such as username and password submitted for authentication can be sen 30 automatically by the TA 102 when the Initial Agent 201 is first contacted.
This is the case when the identifiers are held in a memory device 1 130 on the terminal 1101. This would be the preferred mode when the user has already logged on to a computer terminal.) In some situations the user may wish to remain anonymous or prefer for a variety of reasons not to have the service usage associated with any particular subscription. In this case the user can use the Anonymous AA 205 by requesting anonymous status via an Authenticate function in other AAs, although usually the choice would be made from the Initial Agent 201.

0 STEP 509: from any other AA the request for the anonymous AA 205 results in the rebuilding of the anonymous AA by adding, replacing or reconfiguring SIBBS 41 and adaptors 40. For example the anonymous AA
request results in reconfiguration of the User adaptor because the anonymous service usage has not been associated with any subscription data or user profile and is therefore set by default. The co-ordinator 42 can now bring in additional SlBBs 41 such as The Accounter so the user can pay charges and the Navigator so the user can use the Enquire facility.
When the user has provided identification from the Initial Agent 201 that has been authenticated by the retailer, the Initial AA co-ordinator 42 adds in all the SlBBs versions that will change the AA specialisation from an Initial AA to an End-User AA 202. For example the Profile Manager to manage subscription data, Accounter so the end-user can view charges (if permitted by the subscriptions), Session Manager to invoke service sessions and Navigator to provide enquire. Some components may be upgraded or reconfigured by policy changes, for example the Assistant which is present in the Initial Agent but usually in a less functional form. The Profile Manager finds the subscription records relating to the end-user and constructs a view of the available services, their consl,ai,-ts and related user profile.

W 096/25012 PCTlGB96J00252 STEP !510: the services available are now returned from the AA 107 to the TA 102 and presented to ~he user, for example on a visual display as a set of icoms on a graphical user interface or as listed menu options.

5 STEP b11: a user c:an now proceed to invoke a service or facility such as the vicieo-on-demand service by selecting the icon corresponding to that service! on their ternninal's visual display. The AA SIBB component Session Manager is responsible for managing concurrent service sessions and will receive the invocation request and determine how to fulfil this by contacting 10 a SSA identified by the Locator. This results in a message, sent via the DPE, which would include information about how the service presentation should be optimised for the user and subscription, such as the usage contexlt, user profille preferences for the VoD service, consLr~ Ls in the service subscription (e.g. film category restrictions) and other factors that 15 would be relevant to optimising the service provision such as those described in relation to SSAs 109.
A SSA 109 is able to negotiate and adapt service provision to the access circumstances of the user in an analogous way as the AA - by a co-ordinated inclusion and configuration of appropriate adaptors 40 and 20 SlBBs 41. The SSA 109 negotiates with the TA 102 in order to ensure appropriate software resource-s such as a video-on-demand application are present or delivered to the terminal 1101 to support the service session. In another implementation the user may directly invoke a video-on-demand application residing on the terminal 1101. In this case the user may not see 2 5 the retail environment and service menus because the selection of the video-on-demand service could be presumed by the terminal agent and this message would be sent to the access agent accordingly.
The SSA 109 also negotiates with the Network Agent 110 which eventually results in an appropriate connection between the terminal and 3 o video service resources so that the user may interact to select a video, CA 022l2377 l997-08-06 W 096/25012 PCT/~b~ 252 control video stream delivery using fast-forward or pause for example, and receive the video stream.
Additionally the service session resources send accounting data to the AA Accounter SIBB component so that service usage can be billed to 5 the subscriber. The subscriber is able to view the charges and arrange payment for the VoD session by using the Subscriber Agent 203.

Incall example In the embodiment of the present invention described above, only 10 one Access Agent 107 is shown and described. In practice, an Access Agent can be allocated to each user of the system. In the case of incall to a user, the called user's AA 107' has a key role in delivering the service output.
Referring to Figure 7 in place of Figure 5, the preferred mode of 5 operation is such that the calling user has a service session that requires participation by, or information delivery to, the called user.

STEP 701: the calling user establishes a service session.

20 STEP 702: the calling user supplies to the Service Session Agent 109 the identity of the called user.

STEP 703: this identity is adequate for the Service Session Agent 109 to find the location of the called user's AA 107', usually with the help of an 25 object request broker.
Because the AA 107' has the responsibility of delivering services it maintains user profile information about how the called user wants that particular service to be delivered. This information will have been registered during earlier interaction between the called user (or terminal only where 30 registration is automatic) and the Set Profile facility of the Profile Manager SIBB component of the AA 107'. For example, if the service was W 096J25~12 P~1I~D5~ 52 multirr1edia electronic mail the called user might want this delivered to an electronic letter-bo~, or in the case of a multimedia conference invitation the incall might be delivered to the called user's multimedia terminal in a ~ lousiness office.

STEP 704: in the case of a multimedia conference service the called AA
SIBB c:omponent Session Manager using incall completion instructions held in the User Profile Data establishes communication with the called TA 102'.

STEP 705: in the preferred operation the terminal agent 102' is able to initiate appropriate terminal resources such as the multimedia conference application to deliver the conference invitation sent by the Session Manager.

STEP ,706: the called AA 107' may request an authentication dialogue with the user if this was not automatically done by the TA when communicating with the AA. Such a dialogue may require that the AA adaptors and TA
have optimised their interaction capability.

STEP .707: if the called user accepts the invitation then the called AA 107' is responsible for telling the Service Session Agent 109 the arrangements that thle called user will be employing to participate or receive from the service session. This includes the usage context.

STEP 708: the result is that the SSA 109 would join the called user to the ~ multimedia confere!nce session resources giving the called user the optimis;ed service provision for the user's access circumstances within the m anagement policies of the retailer.

In embodiments of the present invention, it is advantageous that an entity accessing the system can input data causing the reconfigurable CA 022l2377 l997-08-06 software agent to make a transition between configurations. Referring to Figure 6, it may however be preferable to limit the transitions which are available. As shown in Figure 6, configurations may be ranked for instance according to the level of authentification required. The Initial Agent configuration 201 will often have a low level of authentification since this agent simply provides the means for a user to kick off use of the service provision system. The End-User Agent 202 requires a higher level of authentification, since an authenticated end user is potentially capable of incurring charges but could not for instance trigger the provision of new 10 services (Sales Agent 207) or alter charging rates (Manager Agent 206).
By ranking the configurations, so that multiple authentification steps have to be gone through to reach Agent configurations with increasing management functionality, additional protection against significant fraudulent use of the system is provided. By actually barring some transitions altogether, such as between the Anonymous Agent 205- and any of the Buyer 209, Provider 208 and Manager 206 Agents, protection can also be improved.
As shown in Figure 6, the Sales Agent 207 can provide a reasonable "buffer" between configurations of low functionality and high 2 o functionality.
Although the specific embodiment described above shows an infrastructure arranged in four domains, there may be a different number of domains. For instance, the Service Retailer and Service Provider domains 103,104 might be "coalesced".
The Access Agent 107 is used as an example in the description above of an agent's functionality and structure. Each of the other agents associated with domains, the Network, Terminal and Service Session Agents 106,101,109, might have the same general structure, based on SlBBs, Adaptors and a Co-ordinator. The objects themselves, for instance 30 the SlBBs, will of course need to be different however.

CA 022l2377 l997-08-06 W O 96/25012 PCT/~ C2~2 Although inventive features of embodiments of the present invention are set out in the claims, the following paragraphs also set out inventive concepts.
~ A communications service provision system for providing any one or 5 more olf a set of communications services to a user, in response to a user request, by means alf a communications network, the system comprising i) an input for user requests ii) a plurality of sof tware entities, each having data processing capability, a datastore or access to a data store, and communications 10 capability for comrnunicating with others of said plurality of software entities for use in initiatiny provision of a service over said network to a user, and at least one of said software entities having a control output for signals for said initiation wherein the system has means responsive to a user request to enable one of said software entities for response to inputs, the enabled software entity having a default set of capabilities, the default set including a reconfiguration capability in response to further inputs to the enabled software entity.
A system as above, wherein the capabilities of the enabled software entity are determined at least in part by data structures loaded in the software entity.
A system as above, wherein the enabled software entity has access to a datastore for storing said data structures, and the reconfiguration capability comprises modification of the set of data structures loaded in the software entity.
~ A system as above, wherein the software entities are installed on communications nodes, either on the same or different nodes, which nodes are provided with a distributed computing environment for communication between the software entities.
3 o A system 21S above, wherein communications between software entities installed on different nodes are carried by the communications ~UBSTITUTE SHEET ~RULE 26) network for providing services to a user, according to a distributed processing environment protocol stack established by said environment at each node.
A system as above, wherein the enabled software entity initiates provision of a service by making transitions between different sets of capabilities, and wherein transitions between one or more selected pairs of these sets are barred.
A method of providing one or more communications services to a user by means of a communications network, which method comprises the 0 steps of i) enabling a software entity, in a community of software entities which together are capable of initiating service provision to the user, to respond to a first user input, ii) in response to a further user input, reconfiguring the enabled 5 software entity so as to change its capabilities, said reconfiguration being carried out by modifying a set of data structures loaded in the software entity.
A method as above which further comprises storing a set of data structures, selectively accessible by the enabled software entity so as to 20 provide said reconfiguration.

Claims (24)

1. A service provision system, for providing services to a user by means of one or more communications network(s), wherein the service provision system comprises intelligent software agents in a computing environment, which agents co-operate to provide access to services for a system user by invoking and running executable code, wherein at least one agent is a reconfigurable agent and comprises an input for user information, and further comprises or has access to a plurality of different software modules which provide executable code to the agent for use in providing access to services; and wherein said reconfigurable agent is provided with means to select a set of software modules from said plurality of different software modules, in response to user information received at the input, and to invoke and run the executable code provided by said selected set, each software module comprising at least one process step with one or more associated rules, the behaviour of the system in use being determined at least in part by the outcome of application of said one or more associated rules in the process step, and at least one of said one or more associated rules being external to the software modules and being loaded in a relevant module when that module is run during use of the system.
2. A service provision system, for providing services to a user by means of one or more communications network(s), wherein the service provision system comprises intelligent software agents in a computing environment, which agents co-operate to provide access to services for a system user by invoking and running executable code, wherein at least one agent is a reconfigurable agent and comprises an input for user information, and further comprises or has access to a plurality of different software modules which provide executable code to the agent for use in providing access to services;
wherein said reconfigurable agent is provided with means to select a set of software modules from said plurality of different software modules, in response to user information received at the input, and to invoke and run the executable code provided by said selected set; and wherein the reconfigurable agent adopts a first configuration in response to a user initiating use of the system, by selecting an initial set of software modules, and reconfigures to a second configuration on receiving data associated with the user, by selecting a subsequent set of software modules.
3. A service provision system according to claim 1 wherein the reconfigurable software agent is provided with an available set of software modules and adopts a reconfiguration at least partly by selecting modules from the set to make available to run in use of the system and which further comprises means for changing the available set of software modules for the purpose of upgrading or modifying the service provision system.
4. A service provision system according to claim 1 wherein at least one associated rule is reusable between software modules in that it can be loaded with respect to more than one software module when the respective modules are run during use of the system.
5. A service provision system according to Claim 1 wherein a group of the software modules provide service-independent building blocks in support of services to be provided by the system.
6. A service provision system according to Claim 1 wherein at least one of the software modules provides adaptation of the service provision system to operating constraints and/or capabilities relevant to usage of the system by a user.
7. A service provision system according to Claim 6 wherein said adaptation is in respect of a filter or translator of information provided by the system to the user.
8. A service provision system according to Claim 1 wherein data input to the system in use, by a user, comprises calling entity identification data, identifying a calling entity accessing the system, and the configuration adopted by the reconfigurable software agent is determined at least in part by reference to the calling identity identification data.
9. A service provision system according to Claim 1 wherein the system comprises at least two reconfigurable intelligent software agents, each reconfigurable agent being associated with a respective user of the system.
10. A service provision system according to Claim 1 wherein the intelligent software agents are constructed according to object-oriented technology.
11. A service provision system according to Claim 1 wherein services made available by use of the system are information services.
12. A service provision system according to Claim 1,wherein the reconfigurable agent can adopt either one of a first and a second configuration, the first configuration providing a low level of functionality only and the second configuration providing a higher level of functionality, the second configuration only being selected and loaded for use after a user complies with an authentification step of the first configuration.
13. A service provision system according to Claim 12 wherein, in the first configuration, the functionality comprises authentification and assistance only.
14. A service provision system for providing services to a user by means of one or more communications network(s), wherein the service provision system comprises intelligent software agents in a computing environment, which agents co-operate to provide access to services for a system user by invoking and running executable code, wherein at least one agent is a reconfigurable agent and comprises an input for user information, and further comprises or has access to a plurality of different software modules which provide executable code to the agent for use in providing access to services;
wherein said reconfigurable agent is provided with means to select a set of software modules from said plurality of different software modules, in response to user information received at the input, and to invoke and run the executable code provided by said selected set;
wherein the reconfigurable software agent comprises, or has access to, a plurality of software modules, each software module being provided with a data structure and associated functionality, at least some of the different configurations of the agent incorporating different respective sets of modules selected from said plurality, at least one of the software modules providing adaptation of the service provision system to operating constraints and/or capabilities relevant to usage of the system by a user; and wherein said adaptation of the service provision system is in response to real-time operating constraints and/or capabilities relevant to usage of the system by a user.
15. A service provision system according to Claim 14 wherein said adaptation is in respect of language.
16. A service provision system for providing services to a user by means of one or more communications network(s), wherein the service provision system comprises intelligent software agents in a computing environment, which agents co-operate to provide access to services for a system user by invoking and running executable code, wherein at least one agent is a reconfigurable agent having an input for user information and comprises, or has access to, a plurality of different software modules which provide executable code to the agent for user in providing access to services, at least two configurations of the agent incorporating different respective sets of modules selected from said plurality, wherein at least one of the software modules provides selection and/or modification of other software modules of said plurality between different configurations of the agent.
17. A service provision system according to Claim 16, wherein each software module comprises at least one process step with one or more associated rules, the behaviour of the system in use being determined at least in part by the outcome of application of said one or more associated rules in the process step:
and said modification of the software modules between configurations is provided at least in part by modification or substitution of one or more associated rules of a process step.
18. A service provision system according to Claim 16 wherein each software module comprises at least one process step with one or more associated rules, the behaviour of the system in use being determined at least in part by the outcome of application of said one or more associated rules in the process step:
and said modification of the software modules between configurations is provided at least in part by addition or subtraction of one or more rules to or from the associated rules of a process step.
19. A service provision system for providing services to a user by means of one or more communications network(s), wherein the service provision system comprises intelligent software agents in a computing environment, which agents co-operate to provide access to services for a system user by invoking and running executable code, wherein at least one agent is a reconfigurable agent and comprises an input for user information, and further comprises or has access to a plurality of different software modules which provide executable code to the agent for use in providing access to services;
wherein said reconfigurable agent is provided with means to select a set of software modules from said plurality of different software modules, in response to user information received at the input, and to invoke and run the executable code provided by said selected set; and wherein the reconfigurable software agent comprises, or has access to, a plurality of software modules, each software module being provided with a data structure and associated functionality, at least some of the different configurations of the agent incorporating different respective sets of modules selected from said plurality, at least one of the software modules providing selection and/or modification of other software modules of said plurality between different configurations of the agent; and wherein at least one of said plurality of software modules provides a conflict resolution process for use in resolving conflicts between requirements of software modules of the same selected set.
20. A service provision system for providing services to a user by means of one or more communications network(s), wherein the service provision system comprises intelligent software agents in a computing environment, which agents co-operate to provide access to services for a system user by invoking and running executable code, wherein at least one agent is a reconfigurable agent and comprises an input for user information, and further comprises or has access to a plurality of different software modules which provide executable code to the agent for use in providing access to services;
wherein said reconfigurable agent is provided with means to select a set of software modules from said plurality of different software modules, in response to user information received at the input, and to invoke and run the executable code provided by said selected set; and wherein the reconfigurable software agent comprises, or has access to, a plurality of software modules, each software module being provided with a data structure and associated functionality, at least some of the different configurations of the agent incorporating different respective sets of modules selected from said plurality, at least one software module of the plurality providing conflict resolution functionality for use in co-ordinating presence of other software modules in a selected set.
21. A service provision system for providing services to a user by means of one or more communications network(s), wherein the service provision system comprises intelligent software agents in a computing environment, which agents co-operate to provide access to services for a system user by invoking and running executable code, wherein at least one agent is a reconfigurable agent and comprises an input for user information, and further comprises or has access to a plurality of different software modules which provide executable code to the agent for use in providing access to services;
at least some of the different configurations of the agent incorporating different respective sets of modules selected from said plurality, wherein data input to the system in use, by a user, excludes calling entity identification data, identifying a calling entity accessing the system, and the configuration adopted by the reconfigurable software agent determines that the functionality of the system includes means for providing cost data to the calling entity in advance of service provision by means of the system.
22. A service provision system for providing services to a user by means of one or more communications network(s), wherein the service provision system comprises intelligent software agents in a computing environment, which agents co-operate to provide access to services for a system user by invoking and running executable code, wherein at least one agent is a reconfigurable agent and comprises an input for user information, and further comprises or has access to a plurality of different software modules which provide executable code to the agent for use in providing access to services;
at least some of the different configurations of the agent incorporating different respective sets of modules selected from said plurality, wherein the configuration adopted by the reconfigurable software agent determines that the functionality of the system includes means for accepting payment data from the calling entity in advance of service provision by means of the system.
23. A service provision system for providing services to a user by means of one or more communications network(s), wherein the service provision system comprises intelligent software agents in a computing environment, which agents co-operate to provide access to services for a system user by invoking and running executable code, wherein at least one agent is a reconfigurable agent and comprises an input for user information, and further comprises or has access to a plurality of different software modules which provide executable code to the agent for use in providing access to services;
wherein said reconfigurable agent is provided with means to select a set of software modules from said plurality of different software modules, in response to user information received at the input, and to invoke and run the executable code provided by said selected set; and wherein the reconfigurable agent has a plurality of different configurations available to it, and can reconfigure to make transitions between configurations of said plurality, during use of the system, direct transitions between predetermined pairs of the configurations being unavailable.
24. Service access apparatus for providing access to communications services to a user in a service provision system according to claim 1, the apparatus itself comprising a said self reconfigurable software agent.
CA002212377A 1995-02-07 1996-02-07 Information services provision and management Expired - Fee Related CA2212377C (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
EP95300754.9 1995-02-07
EP95300754 1995-02-07
GB9508283.0 1995-04-24
GBGB9508283.0A GB9508283D0 (en) 1995-02-07 1995-04-24 Information services provision and management
PCT/GB1996/000252 WO1996025012A1 (en) 1995-02-07 1996-02-07 Information services provision and management

Publications (2)

Publication Number Publication Date
CA2212377A1 CA2212377A1 (en) 1996-08-15
CA2212377C true CA2212377C (en) 2003-05-06

Family

ID=8221076

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002212377A Expired - Fee Related CA2212377C (en) 1995-02-07 1996-02-07 Information services provision and management

Country Status (12)

Country Link
US (2) US6330586B1 (en)
EP (1) EP0808545B1 (en)
JP (1) JPH10513325A (en)
KR (1) KR19980702149A (en)
AU (1) AU4629196A (en)
CA (1) CA2212377C (en)
DE (1) DE69635748T2 (en)
FI (1) FI973240A (en)
GB (1) GB9508283D0 (en)
NO (1) NO973623L (en)
SG (1) SG106556A1 (en)
WO (1) WO1996025012A1 (en)

Families Citing this family (180)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7765556B2 (en) * 2002-03-01 2010-07-27 Sap Ag Intelligent and event-based data population
US5835061A (en) 1995-06-06 1998-11-10 Wayport, Inc. Method and apparatus for geographic-based communications service
US8606851B2 (en) 1995-06-06 2013-12-10 Wayport, Inc. Method and apparatus for geographic-based communications service
US6769128B1 (en) 1995-06-07 2004-07-27 United Video Properties, Inc. Electronic television program guide schedule system and method with data feed access
GB2317302A (en) * 1996-09-12 1998-03-18 Sharp Kk A distributed information system
GB2319862A (en) * 1996-11-28 1998-06-03 Ibm Performing computer-based on-line commerce using an intelligent agent
DE69630692D1 (en) * 1996-12-18 2003-12-18 Ericsson Telefon Ab L M Method and system for offering information services to telecommunications subscribers with low network utilization
ES2290986T3 (en) 1997-03-12 2008-02-16 Nomadix, Inc. NAME TRANSMITTER OR ROUTER.
US6061439A (en) * 1997-03-27 2000-05-09 Nortel Networks Corporation Method and apparatus for providing subscriber services to a telephone
NO971605L (en) 1997-04-08 1998-10-09 Ericsson Telefon Ab L M Device for improving accessibility of services in a communication system
BRPI9812104B1 (en) 1997-07-21 2016-12-27 Guide E Inc method for navigating an interactive program guide
JPH1185524A (en) * 1997-09-05 1999-03-30 Toshiba Corp Device and method for processing information and recording medium recording information processing program
DE19744996A1 (en) * 1997-09-25 1999-06-10 Angewandte Digital Elektronik Virtual people to help with the use of devices and communicative networks, in particular to help with the issue of individually usable cards
WO1999027556A2 (en) * 1997-11-20 1999-06-03 Xacct Technologies, Inc. Network accounting and billing system and method
DE59813422D1 (en) * 1998-02-13 2006-04-27 Siemens Ag METHOD AND DEVICE FOR SECURE PROVISION OF FUNCTIONS OF A SIGNALING NETWORK FOR DISTRIBUTED TELECOMMUNICATIONS APPLICATIONS
US6691148B1 (en) * 1998-03-13 2004-02-10 Verizon Corporate Services Group Inc. Framework for providing quality of service requirements in a distributed object-oriented computer system
US6615350B1 (en) 1998-03-23 2003-09-02 Novell, Inc. Module authentication and binding library extensions
US6751735B1 (en) 1998-03-23 2004-06-15 Novell, Inc. Apparatus for control of cryptography implementations in third party applications
US6701433B1 (en) * 1998-03-23 2004-03-02 Novell, Inc. Method and apparatus for escrowing properties used for accessing executable modules
US6826598B1 (en) 1998-05-05 2004-11-30 British Telecommunications Public Limited Company Storage and retrieval of location based information in a distributed network of data storage devices
US7603684B1 (en) * 1998-05-19 2009-10-13 United Video Properties, Inc. Program guide system with video-on-demand browsing
DE69917447T2 (en) * 1998-05-26 2005-05-12 British Telecommunications P.L.C. SYSTEM FOR SUPPORTING THE PROVISION OF SERVICES
US7565397B2 (en) 1998-06-15 2009-07-21 Sybase, Inc. Context reactive hints mechanism for natural language user interface
US6144989A (en) * 1998-06-15 2000-11-07 Dejima, Inc. Adaptive agent-oriented software architecture
JP2000020443A (en) * 1998-07-02 2000-01-21 Victor Co Of Japan Ltd Software agent system
US6799165B1 (en) 1998-07-28 2004-09-28 Eimar M. Boesjes Apparatus and methods for inventory, sale, and delivery of digitally transferable goods
US6898762B2 (en) 1998-08-21 2005-05-24 United Video Properties, Inc. Client-server electronic program guide
JP2003528358A (en) * 1998-08-24 2003-09-24 富士通株式会社 Workflow system and method
US6405215B1 (en) 1998-11-06 2002-06-11 International Business Machines Corp. Workflow agent for a multimedia database system
US8266266B2 (en) 1998-12-08 2012-09-11 Nomadix, Inc. Systems and methods for providing dynamic network authorization, authentication and accounting
US8713641B1 (en) 1998-12-08 2014-04-29 Nomadix, Inc. Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device
US7194554B1 (en) 1998-12-08 2007-03-20 Nomadix, Inc. Systems and methods for providing dynamic network authorization authentication and accounting
US7035895B1 (en) * 1998-12-17 2006-04-25 International Business Machines Corporation Manager object for management of multiple resources on dataless clients in a distributed computing environment
NL1010940C2 (en) * 1998-12-31 2000-07-03 Cornelis Hyacinthus Maria Van Computer system for insurance company involves use of central processor which devises product rules and remote policy administration computers, reduces time taken to bring new products onto market
US6456603B1 (en) * 1999-01-21 2002-09-24 Telefonaktiebolaget L M Ericsson (Publ) Method of supporting communications mobility in a telecommunications system
KR100302510B1 (en) * 1999-01-22 2001-09-26 전형선 Method for supplying game service using cellular phone or PCS phone
DE69938223T2 (en) * 1999-01-29 2009-02-19 Sony Deutschland Gmbh Mobile agent system and method for controlling a mobile agent system
US6499017B1 (en) * 1999-01-29 2002-12-24 Harris Corporation Method for provisioning communications devices and system for provisioning same
NL1011358C2 (en) * 1999-02-22 2000-08-24 Koninkl Kpn Nv Access point-dependent pricing of telecommunications connections.
NL1011357C2 (en) * 1999-02-22 2000-08-24 Koninkl Kpn Nv Personal Assistant System.
US6434594B1 (en) * 1999-03-09 2002-08-13 Talk2 Technology, Inc. Virtual processing network enabler
NO992605L (en) * 1999-05-31 2000-12-01 Ericsson Telefon Ab L M Support for telecommunication system mobility
GB2354605B (en) * 1999-06-25 2002-06-19 Jacobs Rimell Automated provisioning system
US6546392B1 (en) * 1999-06-25 2003-04-08 Mediaone Group, Inc. Self service gateway
US6574655B1 (en) * 1999-06-29 2003-06-03 Thomson Licensing Sa Associative management of multimedia assets and associated resources using multi-domain agent-based communication between heterogeneous peers
JP2001022716A (en) * 1999-07-09 2001-01-26 Nec Corp Communication service providing system
US6971105B1 (en) * 1999-07-29 2005-11-29 Rehle Visual Communications Llc Method, apparatus, and computer program product for deferred completion of multi-step user transaction applications
KR100358154B1 (en) * 1999-08-02 2002-10-25 한국전자통신연구원 Dynamic service composition method on open networking multimedia service environment
EP1091599A1 (en) * 1999-10-08 2001-04-11 Alcatel Method for accessing a service platform such as TINA via an internet browser session
WO2001031885A2 (en) 1999-10-22 2001-05-03 Nomadix, Inc. Gateway device having an xml interface and associated method
WO2001037517A2 (en) 1999-11-03 2001-05-25 Wayport, Inc. Distributed network communication system which enables multiple network providers to use a common distributed network infrastructure
US6990670B1 (en) * 1999-11-05 2006-01-24 Ianywhere Solutions, Inc. Interpretation phase for adaptive agent oriented software architecture
US6931111B1 (en) * 1999-11-24 2005-08-16 Netgen Communications, Inc. Methods and systems for providing communications services
EP1107108A1 (en) * 1999-12-09 2001-06-13 Hewlett-Packard Company, A Delaware Corporation System and method for managing the configuration of hierarchically networked data processing devices
JP2001175757A (en) * 1999-12-15 2001-06-29 Mitsubishi Electric Corp System for distributing digital contents through network
US7748005B2 (en) * 2000-01-28 2010-06-29 Hewlett-Packard Development Company, L.P. System and method for allocating a plurality of resources between a plurality of computing domains
US6750885B1 (en) * 2000-01-31 2004-06-15 Journyx, Inc. Time keeping and expense tracking server that interfaces with a user based upon a user's atomic abilities
US6505171B1 (en) * 2000-02-04 2003-01-07 Robert H. Cohen System and method for handling purchasing transactions over a computer network
AU2000257487A1 (en) * 2000-02-22 2001-09-03 John S. Eyles Applying dynamic user interfaces to multimedia communication via a computer network
WO2001069380A2 (en) * 2000-03-14 2001-09-20 Edapta, Inc. A system and method for enabling dynamically adaptable user interfaces for electronic devices
JP3617406B2 (en) * 2000-03-30 2005-02-02 日本電気株式会社 Quality assurance type communication service providing method and service providing method corresponding to multi-domain and service mediating apparatus
WO2001076248A2 (en) * 2000-03-31 2001-10-11 United Video Properties, Inc. Systems and methods for improved audience measuring
US8020176B2 (en) 2000-04-06 2011-09-13 Infineon Technologies Ag Virtual machine interface for hardware reconfigurable and software programmable processors
US7703107B2 (en) * 2000-04-06 2010-04-20 Infineon Technologies Ag Virtual machine interface for hardware reconfigurable and software programmable processors
US7131108B1 (en) * 2000-04-17 2006-10-31 Ncr Corporation Software development system having particular adaptability to financial payment switches
US20010054011A1 (en) * 2000-06-15 2001-12-20 Nec Corporation Contents conversion fee charging system, contents conversion fee charging method and storage medium storing program for controlling same
DE60035493T2 (en) * 2000-07-05 2008-04-10 Alcatel Lucent A service provision method in a communication network and program modules and related means
US7111163B1 (en) 2000-07-10 2006-09-19 Alterwan, Inc. Wide area network using internet with quality of service
US7464163B1 (en) * 2000-07-27 2008-12-09 International Business Machines Corporation Service provisioning via attribute-based subscription
US8250570B2 (en) 2000-10-31 2012-08-21 Hewlett-Packard Development Company, L.P. Automated provisioning framework for internet site servers
US20020082818A1 (en) * 2000-10-31 2002-06-27 Glenn Ferguson Data model for automated server configuration
US7644032B2 (en) 2000-12-19 2010-01-05 H.J.J. Inc. Adaptive matching program and system for corporate meeting planners and hospitality providers
US7343338B2 (en) 2000-12-19 2008-03-11 H.J.J., Inc. Matching program and system for corporate meeting planners and hospitality providers
US20020087693A1 (en) * 2000-12-29 2002-07-04 Marshall Donald Brent Method and system for distributing service functionality
US8214501B1 (en) 2001-03-02 2012-07-03 At&T Intellectual Property I, L.P. Methods and systems for electronic data exchange utilizing centralized management technology
FR2822627B1 (en) * 2001-03-22 2003-06-20 Wavecom Sa RADIOCOMMUNICATION MODULE HOSTING AND EXECUTING CUSTOMER SOFTWARE, AND CORRESPONDING METHOD FOR IMPLEMENTING CUSTOMER SOFTWARE
US7152109B2 (en) * 2001-04-20 2006-12-19 Opsware, Inc Automated provisioning of computing networks according to customer accounts using a network database data model
US7743147B2 (en) 2001-04-20 2010-06-22 Hewlett-Packard Development Company, L.P. Automated provisioning of computing networks using a network database data model
CA2446961A1 (en) * 2001-05-08 2002-11-14 Narad Networks, Inc. System and method for network service provisioning
US20030055945A1 (en) * 2001-05-08 2003-03-20 Narad Networks, Inc. Language and interface for unified network service creation, provision and deployment
US20030131075A1 (en) * 2001-05-08 2003-07-10 Narad Networks, Inc. Language and interface for unified network service creation, provision and deployment
US20020178252A1 (en) * 2001-05-08 2002-11-28 Narad Networks, Inc. Extensible service provisioning engine
US20020169967A1 (en) * 2001-05-14 2002-11-14 Sangeeta Varma Method and apparatus for multiple token access to thin client architecture session
WO2003001378A2 (en) * 2001-06-21 2003-01-03 Telefonaktiebolaget Lm Ericsson (Publ) Method for secure file transfer to multiple destinations with integrity check
US20030009769A1 (en) * 2001-06-25 2003-01-09 Debra Hensgen Trusted application level resource advisor
JPWO2003005261A1 (en) * 2001-07-06 2004-10-28 株式会社日立製作所 Contract acting method and device therefor
US20030009445A1 (en) * 2001-07-09 2003-01-09 Santhanagopalan Muthukannan Internet database sevice 'IDS'
US20030069949A1 (en) * 2001-10-04 2003-04-10 Chan Michele W. Managing distributed network infrastructure services
US8291015B2 (en) * 2001-10-29 2012-10-16 Cisco Technology, Inc. System and method for modeling video network reliability
KR100401064B1 (en) * 2001-12-19 2003-10-10 한국전자통신연구원 Mechanism for Checking Conflict on Editing Policy in Network Security Policy Management Tool
CN100481785C (en) * 2001-12-27 2009-04-22 兄弟工业株式会社 Network and terminal equipment
US6981242B2 (en) * 2002-01-11 2005-12-27 Hewlett-Packard Development Company, L.P. System and method for developing custom operator-specific software-applications
EP1335535A1 (en) * 2002-01-31 2003-08-13 BRITISH TELECOMMUNICATIONS public limited company Network service selection
EP1349316A1 (en) * 2002-03-27 2003-10-01 BRITISH TELECOMMUNICATIONS public limited company Policy based system management
US7693971B2 (en) * 2002-03-27 2010-04-06 British Telecommunications Plc Distributed policy based system management with local management agents responsible for obtaining and storing policies thereat
US7801976B2 (en) * 2002-05-28 2010-09-21 At&T Intellectual Property I, L.P. Service-oriented architecture systems and methods
US6868427B2 (en) * 2002-05-31 2005-03-15 Sap Aktiengesellschaft Managing customizable settings in computer systems
US7181694B2 (en) * 2002-05-31 2007-02-20 Sap Aktiengesellschaft Software customization objects for programming extensions associated with a computer system
US7249174B2 (en) 2002-06-12 2007-07-24 Bladelogic, Inc. Method and system for executing and undoing distributed server change operations
US7152100B2 (en) * 2002-07-09 2006-12-19 Adtran, Inc. System and method for provisioning network access devices
US7415503B2 (en) * 2002-07-12 2008-08-19 Honeywell International Inc. Control interface agent system and method
KR100605837B1 (en) * 2002-07-19 2006-07-31 삼성전자주식회사 Multiple service method and apparatus in data only mobile telecommunication system
US7549153B2 (en) 2002-07-22 2009-06-16 Amberpoint, Inc. Apparatus and method for content and context processing of web service traffic
FR2843260B1 (en) * 2002-07-31 2005-04-08 Cit Alcatel RULES NETWORK MANAGEMENT SYSTEM COMPRISING AN INFERENCE ENGINE
US20040059704A1 (en) * 2002-09-20 2004-03-25 International Business Machines Corporation Self-managing computing system
US7216343B2 (en) 2002-09-20 2007-05-08 International Business Machines Corporation Method and apparatus for automatic updating and testing of software
US20040060054A1 (en) 2002-09-20 2004-03-25 International Business Machines Corporation Composition service for autonomic computing
CN1228982C (en) * 2002-12-05 2005-11-23 国际商业机器公司 Channel combination method of VOD system
US6990186B2 (en) * 2002-12-09 2006-01-24 Bellsouth Intellectual Property Corporation Systems and methods for facilitating provisioning of circuits and work control in a telecommunications environment
US8561096B1 (en) 2003-01-08 2013-10-15 The Directv Group, Inc. Distributed storage and processing of viewing usage data
US7076562B2 (en) * 2003-03-17 2006-07-11 July Systems, Inc. Application intermediation gateway
GB0312009D0 (en) * 2003-05-24 2003-07-02 Univ Strathclyde Management and control of telecommunication services delivery
US7349327B2 (en) * 2003-08-28 2008-03-25 Adtran, Inc. System and method for remotely updating a network device
US7477632B1 (en) * 2004-01-16 2009-01-13 Qualcomm, Inc. Subscriber management and service profiles
US8024225B1 (en) * 2004-01-27 2011-09-20 Amazon Technologies, Inc. Controlling access to services via usage models
US8046464B2 (en) * 2004-03-10 2011-10-25 The Boeing Company Quality of service resource management apparatus and method for middleware services
GB2412754B (en) * 2004-03-30 2007-07-11 Hewlett Packard Development Co Provision of resource allocation information
US20050240671A1 (en) * 2004-04-23 2005-10-27 Loraine Beyer IP-based front-end web server
WO2005107277A1 (en) * 2004-04-30 2005-11-10 Nable Communications Inc. Voice communication method and system
US7735063B2 (en) 2004-07-07 2010-06-08 Sap Aktiengesellschaft Providing customizable configuration data in computer systems
US7774369B2 (en) 2004-07-07 2010-08-10 Sap Aktiengesellschaft Configuring computer systems with business configuration information
KR101063713B1 (en) * 2004-08-17 2011-09-07 한국산업기술평가관리원 Customer Service Policy Automatic Setting System and Method
US9552599B1 (en) 2004-09-10 2017-01-24 Deem, Inc. Platform for multi-service procurement
US7719971B1 (en) 2004-09-15 2010-05-18 Qurio Holdings, Inc. Peer proxy binding
US8260917B1 (en) * 2004-11-24 2012-09-04 At&T Mobility Ii, Llc Service manager for adaptive load shedding
US7738484B2 (en) * 2004-12-13 2010-06-15 Intel Corporation Method, system, and apparatus for system level initialization
US7734741B2 (en) 2004-12-13 2010-06-08 Intel Corporation Method, system, and apparatus for dynamic reconfiguration of resources
US7831699B2 (en) * 2005-01-07 2010-11-09 Samsung Electronics Co., Ltd. Method and system for managing control of groups of networked heterogenous devices in a network
US20060229889A1 (en) * 2005-03-30 2006-10-12 Ianywhere Solutions, Inc. Context proposed items mechanism for natural language user interface
WO2006104733A2 (en) * 2005-03-30 2006-10-05 Ianywhere Solutions, Inc. Context reactive hints mechanism for natural language user interface
US8613024B2 (en) 2005-12-13 2013-12-17 United Video Properties, Inc. Cross-platform predictive popularity ratings for use in interactive television applications
US20070140144A1 (en) * 2005-12-21 2007-06-21 Open Telecommunications Ltd. Service designs for communications networks
AU2005339252A1 (en) * 2005-12-21 2007-06-28 S2Net Limited Service designs for communications networks
US9117223B1 (en) 2005-12-28 2015-08-25 Deem, Inc. Method and system for resource planning for service provider
KR101285886B1 (en) * 2006-01-25 2013-07-11 엘지전자 주식회사 Method for reporting to server and terminal thereof
DK1872595T3 (en) * 2006-02-03 2012-03-05 Sigram Schindler Beteiligungs Gmbh Procedure for changing the working procedure of a technical telecommunications group platform (TCP) belonging to a telecommunications network (TC network)
US20070280206A1 (en) * 2006-05-31 2007-12-06 Samsung Electronics Co., Ltd. Method for consuming heterogeneous services on heterogeneous devices using script plugins
US20070291787A1 (en) * 2006-06-15 2007-12-20 Mounire El Houmaidi Methods, devices, and computer program products for ordering communication services
US7505983B2 (en) * 2006-06-26 2009-03-17 Sap Ag Extending data flows
JP5002647B2 (en) * 2006-07-09 2012-08-15 マイクロソフト アマルガメイテッド カンパニー ザ サード System and method for managing a network
US20080046435A1 (en) * 2006-08-18 2008-02-21 Microsoft Corporation Service discovery and automatic configuration
US7801971B1 (en) 2006-09-26 2010-09-21 Qurio Holdings, Inc. Systems and methods for discovering, creating, using, and managing social network circuits
US8326283B1 (en) * 2006-10-12 2012-12-04 At&T Mobility Ii Llc Systems and methods for dynamically modifying subscriber service profile stored in home location register while roaming in wireless telecommunication networks
US9195996B1 (en) 2006-12-27 2015-11-24 Qurio Holdings, Inc. System and method for classification of communication sessions in a social network
US7801888B2 (en) 2007-03-09 2010-09-21 Microsoft Corporation Media content search results ranked by popularity
US8838755B2 (en) * 2007-03-23 2014-09-16 Microsoft Corporation Unified service management
US8448159B2 (en) * 2007-11-02 2013-05-21 Tti Inventions C Llc Method and system for policy enabled programming
US8600341B2 (en) 2008-03-14 2013-12-03 William J. Johnson System and method for location based exchanges of data facilitating distributed locational applications
US8634796B2 (en) 2008-03-14 2014-01-21 William J. Johnson System and method for location based exchanges of data facilitating distributed location applications
US8639267B2 (en) 2008-03-14 2014-01-28 William J. Johnson System and method for location based exchanges of data facilitating distributed locational applications
US8566839B2 (en) 2008-03-14 2013-10-22 William J. Johnson System and method for automated content presentation objects
US8923806B2 (en) 2008-03-14 2014-12-30 William J. Johnson System and method for presenting application data by data processing system(s) in a vicinity
US8761751B2 (en) 2008-03-14 2014-06-24 William J. Johnson System and method for targeting data processing system(s) with data
US9612890B2 (en) 2008-04-04 2017-04-04 International Business Machines Corporation Method and apparatus for workflow based high availability analysis
US20100088197A1 (en) * 2008-10-02 2010-04-08 Dehaan Michael Paul Systems and methods for generating remote system inventory capable of differential update reports
US8775574B2 (en) * 2008-11-26 2014-07-08 Red Hat, Inc. Remote network management having multi-node awareness
US8719392B2 (en) * 2009-02-27 2014-05-06 Red Hat, Inc. Searching a managed network for setting and configuration data
US8856665B2 (en) * 2009-04-23 2014-10-07 Avaya Inc. Setting user-preference information on the conference bridge
US10552849B2 (en) 2009-04-30 2020-02-04 Deem, Inc. System and method for offering, tracking and promoting loyalty rewards
US8566459B2 (en) * 2009-05-29 2013-10-22 Red Hat, Inc. Systems and methods for integrated console management interface
US9280399B2 (en) * 2009-05-29 2016-03-08 Red Hat, Inc. Detecting, monitoring, and configuring services in a netwowk
US8463885B2 (en) * 2009-08-31 2013-06-11 Red Hat, Inc. Systems and methods for generating management agent installations
US8607093B2 (en) * 2009-08-31 2013-12-10 Red Hat, Inc. Systems and methods for detecting machine faults in network using acoustic monitoring
US8166341B2 (en) * 2009-08-31 2012-04-24 Red Hat, Inc. Systems and methods for testing results of configuration management activity
US8914787B2 (en) * 2009-08-31 2014-12-16 Red Hat, Inc. Registering software management component types in a managed network
US9967169B2 (en) * 2009-09-30 2018-05-08 Red Hat, Inc. Detecting network conditions based on correlation between trend lines
US8571040B2 (en) * 2010-03-01 2013-10-29 Deutsche Telekom Ag Apparatus, method, manufacture, and system for providing network services from building blocks
TWI429288B (en) * 2010-05-31 2014-03-01 Ibm Web conferencing server and method of holding a web conference
US9262474B2 (en) * 2010-09-30 2016-02-16 Microsoft Technology Licensing, Llc Dynamic domain query and query translation
US9449288B2 (en) 2011-05-20 2016-09-20 Deem, Inc. Travel services search
US8996687B2 (en) 2011-05-31 2015-03-31 At&T Intellectual Property I, L.P. Context-based computing framework
CA2879180A1 (en) 2012-03-07 2013-09-12 Snap Trends, Inc. Methods and systems of aggregating information of social networks based on geographical locations via a network
DE102012110761B4 (en) * 2012-11-09 2017-09-21 Vodafone Holding Gmbh Telepresence system and method for coordinating and / or handling actions at a remote location by means of a teleoperator
JP6243528B2 (en) * 2013-06-26 2017-12-06 アマゾン テクノロジーズ インコーポレイテッド Distribution of creator systems among lease agent systems
US9477991B2 (en) 2013-08-27 2016-10-25 Snap Trends, Inc. Methods and systems of aggregating information of geographic context regions of social networks based on geographical locations via a network
US9894489B2 (en) 2013-09-30 2018-02-13 William J. Johnson System and method for situational proximity observation alerting privileged recipients
US10200258B2 (en) * 2014-08-14 2019-02-05 Juniper Networks, Inc. Transaction integrity for network services configuration
US10091549B1 (en) 2017-03-30 2018-10-02 Rovi Guides, Inc. Methods and systems for recommending media assets based on the geographic location at which the media assets are frequently consumed
US11568350B2 (en) 2020-09-30 2023-01-31 Toshiba Global Commerce Solutions Holdings Corporation Retail user interface for dynamic behavior configuration
CN113905132B (en) * 2021-09-10 2024-02-23 咪咕音乐有限公司 Video color ring playing method, device and computer readable storage medium

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4611094A (en) 1983-12-01 1986-09-09 At&T Bell Laboratories Method for customer definable telephone capability
US5021949A (en) * 1988-02-29 1991-06-04 International Business Machines Corporation Method and apparatus for linking an SNA host to a remote SNA host over a packet switched communications network
DE69031191T2 (en) * 1989-05-15 1998-02-12 Ibm System for controlling access privileges
US5410691A (en) * 1990-05-07 1995-04-25 Next Computer, Inc. Method and apparatus for providing a network configuration database
DE69230905T2 (en) * 1991-06-28 2000-08-17 Ericsson Telefon Ab L M USER MODULES IN TELECOMMUNICATION SYSTEMS
US5396543A (en) * 1991-11-27 1995-03-07 At&T Corp. Signaling arrangements in a cellular mobile telecommunications switching system
US5528677A (en) 1992-05-01 1996-06-18 Sprint Communications Company L.P. System for providing communications services in a telecommunications network
CA2094410C (en) * 1992-06-18 1998-05-05 Joshua Seth Auerbach Distributed management communications network
CA2124379C (en) 1993-06-25 1998-10-27 Thomas F. La Porta Distributed processing architecture for control of broadband and narrowband communications networks
US5835757A (en) * 1994-03-30 1998-11-10 Siemens Telecom Networks Distributed database management system for servicing application requests in a telecommunications switching system
KR100346342B1 (en) 1994-04-01 2002-11-22 텔레폰아크티에볼라게트 엘엠 에릭슨 Mobility in Telecommunication Networks
US5694546A (en) * 1994-05-31 1997-12-02 Reisman; Richard R. System for automatic unattended electronic information transport between a server and a client by a vendor provided transport software with a manifest list

Also Published As

Publication number Publication date
FI973240A (en) 1997-10-03
NO973623D0 (en) 1997-08-06
US6330586B1 (en) 2001-12-11
FI973240A0 (en) 1997-08-06
KR19980702149A (en) 1998-07-15
JPH10513325A (en) 1998-12-15
CA2212377A1 (en) 1996-08-15
EP0808545B1 (en) 2006-01-18
WO1996025012A1 (en) 1996-08-15
DE69635748T2 (en) 2006-09-14
AU4629196A (en) 1996-08-27
MX9706091A (en) 1997-10-31
GB9508283D0 (en) 1995-06-14
USRE39717E1 (en) 2007-07-03
NO973623L (en) 1997-10-06
DE69635748D1 (en) 2006-04-06
EP0808545A1 (en) 1997-11-26
SG106556A1 (en) 2004-10-29

Similar Documents

Publication Publication Date Title
CA2212377C (en) Information services provision and management
US6611501B1 (en) Process management system
EP1020088B1 (en) Service management access point
EP1020089B1 (en) System and method for controlling access to a telephony database
Barr et al. The TINA initiative (intelligent networks)
US6892228B1 (en) System and method for on-line service creation
US20020087383A1 (en) Integrated interface for web based customer care and trouble management
US20030133552A1 (en) Method and apparatus for integrating disparate telecommunication operational support systems (OSS) and streamlining business processes using a software platform
EP1198756A1 (en) Data management system
Deliverable TINA business model and reference points
AU764851B2 (en) Information services provision and management
WO1999020058A1 (en) System and method for supporting flexible telephony service management
MXPA97006091A (en) Information services provision and management[sg45624 ]
Pinard et al. Issues In Using an Agent Framework For Converged Voice and Data Application.
WO1998052321A1 (en) Improved telecommunications systems and methods
Bagley et al. The Information Services Supermarket-a trial TINA-C Design
Oshisanwo et al. The RACE open services architecture project
Sekkaki et al. Development of a prototype based on TINA accounting management architecture
Chandrashekhar et al. Applications exchange: A unified approach to enable services and applications for end users and service providers
Watanabe et al. Development of a prototype based on TINA Accounting and Security Management Architecture
Alvarez et al. Accounting Management based on TINA Service and CORBA Architecture
Sekkaki et al. Accounting management based service environment in a TINA architecture
Lorenz et al. Development of accounting management based service environment in Tina, Java and Corba architectures
Egelhaaf et al. Technology Assessment of Middleware for Telecommunications
Ray et al. Integration of Technologies for E-Business Management

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed