US20110173108A1 - Gateway for enabling cloud-based service exposure - Google Patents

Gateway for enabling cloud-based service exposure Download PDF

Info

Publication number
US20110173108A1
US20110173108A1 US13/006,184 US201113006184A US2011173108A1 US 20110173108 A1 US20110173108 A1 US 20110173108A1 US 201113006184 A US201113006184 A US 201113006184A US 2011173108 A1 US2011173108 A1 US 2011173108A1
Authority
US
United States
Prior art keywords
gateway
requests
network
service
service providers
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/006,184
Inventor
Sharath Rajasekar
Phelim O'Doherty
Boris Selitser
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Oracle International Corp
Original Assignee
Oracle International Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oracle International Corp filed Critical Oracle International Corp
Priority to US13/006,184 priority Critical patent/US20110173108A1/en
Assigned to ORACLE INTERNATIONAL CORPORATION reassignment ORACLE INTERNATIONAL CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: RAJASEKAR, SHARATH, O'DOHERTY, PHELIM, SELITSER, BORIS
Publication of US20110173108A1 publication Critical patent/US20110173108A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/18Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/04Billing or invoicing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor

Definitions

  • the current invention relates to mobile communications and gateways for managing access to services in the cloud.
  • the gateway can allow a particular operator to expose its services and to control, manage and monetize the communication traffic that accesses these services.
  • the gateway can be utilized to expose the services of a Web based application to other external service providers and applications and to manage, control and monetize the requests received from the external providers to the exposed service.
  • the gateway can be utilized to expose the excess capacity of a telecom network, such as a code division multiple access (CDMA) network or a global system for mobile communications (GSM) network and to manage the access to the exposed capacity of the network.
  • CDMA code division multiple access
  • GSM global system for mobile communications
  • FIG. 1 is an illustration of one use case of the gateway platform, in accordance with various embodiments of the invention.
  • FIG. 2 is an illustration of another use case of the gateway platform, in accordance with various embodiments of the invention.
  • FIG. 3 is an illustration of a possible deployment of the gateway platform, in accordance with various embodiments of the invention.
  • FIG. 4 is an illustration of a communication service in the gateway, in accordance with various embodiments of the invention.
  • FIG. 5 is an illustration of the communication service utilizing an interceptor stack to apply service level agreements and policy enforcement to incoming requests, in accordance with various embodiments of the invention.
  • a gateway for enabling cloud based service exposure.
  • the gateway can allow a particular service provider (hereinafter owner or operator) to expose its services and to control, manage and monetize the communication traffic that access these services.
  • the gateway can supply a policy enforcement engine, security enforcement, billing integration and traffic throttling/shaping functionality on the request traffic flowing through it.
  • the policy enforcement engine uses service level agreements (SLAs) to regulate external access by clients and other service providers to the particular service being offered by the operator and exposed by the gateway.
  • SLAs service level agreements
  • the security enforcement can provide authentication and authorization for the request traffic and the billing integration enables the operator to monetize and charge for the traffic flowing through the gateway.
  • the traffic shaping and throttling features enable the gateway to manage and control the amount of request traffic being sent to the service being provided by the operator.
  • two primary use cases of the gateway are described in the present disclosure—a use case for exposing the services of a Web based application to other service providers and a use case for exposing the excess capacity of a telecom network, such as a code division multiple access (CDMA) network or a global system for mobile communications (GSM) network.
  • CDMA code division multiple access
  • GSM global system for mobile communications
  • the gateway can be deployed by an owner of a web application that wishes to expose its services to other websites/service providers and to be able to monetize and control access to its services by such external service providers. This can enable the owner of a service to utilize the policy enforcement, traffic shaping/throttling, billing integration and other features of the gateway and to apply these features on the request traffic being sent to the web application.
  • FIG. 1 is an illustration of one use case of the gateway platform, in accordance with various embodiments of the invention.
  • this diagram depicts components as logically separate, such depiction is merely for illustrative purposes. It will be apparent to those skilled in the art that the components portrayed in this figure can be combined or divided into separate software, firmware and/or hardware. Furthermore, it will also be apparent to those skilled in the art that such components, regardless of how they are combined or divided, can execute on the same computing device or can be distributed among different computing devices connected by one or more networks or other suitable communication means.
  • a service provider (operator) 126 of a particular web site or web application can publish its service 102 on the Internet 100 .
  • This service can be available to a multitude of users/clients 120 that can access it by way of a browser on a computing device, as well as to a number of other service providers and owners 106 , 108 that may wish to access it, such as by using Web Services.
  • the owner 126 of the web service 102 can deploy the gateway 104 to manage access to its service by any number of other providers 106 , 108 that wish to make use of the operator's services.
  • the operator of web service A 102 may be an owner of a small business that can make boat reservations on a particular lake.
  • a different provider 106 may be a travel website that wishes to incorporate the ability to make boat reservations for users 122 that are booking their travel plans using the travel web service 106 .
  • another provider 108 may sell waterskiing equipment and may also wish to provide the ability for its users 124 to make a boat reservation over its own website by using Web Services.
  • the gateway 104 is positioned to manage access to the operator's web service 102 by the various external providers and to monetize and control that access.
  • the gateway performs a variety of functions to the incoming requests, including but not limited to service and API exposure 118 , security 116 , billing integration 112 , policy enforcement 110 and traffic shaping/throttling 114 .
  • the service exposure 118 portion can expose an interface to access the service 102 provided by the operator and to invoke its functionality. This can be performed by publishing a generic Web Services Definition Language (WSDL) file that describes how to use web services to access the service provided by the operator.
  • WSDL Web Services Definition Language
  • the gateway can expose the service as several different facades (views) that can be accessible by the external providers, each façade being accessible over a different protocol or API.
  • the policy enforcement engine 110 of the gateway 104 uses service level agreements (SLAs) to regulate service provider and application access to the particular service functionality provided by the owner 126 .
  • SLAs service level agreements
  • the policy engine supports a range of quality-of-service guarantees that can be modulated by time of day/day of week, rates and quotas. If desired, further rules covering access can also be added.
  • the service provider and application accounts can be divided into groups to simplify SLA management and maintenance.
  • the gateway can come with a set of default SLAs and also provide tools (e.g. wizard) to create custom SLAs tailored for the particular service of the operator.
  • the subscriber permissions and preferences can be reflected in separate subscriber SLA created by the operator 126 .
  • one subscriber may indicate that they wish to allow service provider 106 to obtain information regarding the subscriber, while other subscriber 108 to not be able to access their information.
  • the subscriber SLA can contain the preferences of the operator's subscriber and enforce the requests coming from the service providers accordingly.
  • the security framework 116 can enable the gateway 104 to function as a single point of contact for access to the functionality provided by the owner 126 . It can provide common authentication, authorization and access control procedures for all applications that are external to the owner 126 , as well as internal applications.
  • the applications can be authenticated using plaintext or digest passwords, X.509 certificates or SAML 1.0/1.1 tokens.
  • Service requests can use XML encryption based on the W3C standard. To ensure message integrity, the requests can be digitally signed, using W3C XML digital signature standard.
  • the billing integration mechanism 112 can enable the owner 126 to incorporate charging and payment functionality into the gateway according to the request traffic being sent to its service 102 .
  • the gateway can include a data record listener which listens for various data records generated within the gateway and issues Diameter offline charging requests to an external billing server upon detecting that a particular data record has been generated.
  • the gateway can include a credit control interceptor that intercepts requests in the communication traffic flowing through the gateway and initiates Diameter online charging requests to external billing servers upon intercepting said requests. The ability to integrate the gateway with the Diameter online and offline charging requests can enable the owner 126 to charge for its services more dynamically, according to the traffic being handled by the service 102 .
  • the traffic shaping and throttling 114 can protect the service 102 and the various underlying cluster nodes that are providing the service from traffic overload during periods of high traffic volume.
  • a budget service can be invoked to determine a current available budget for the request.
  • the budget can be based on a service level agreement (SLA) for the service provider or application that sent the request.
  • SLA can include preference information from the subscribers of the owner 126 .
  • the requests can be assigned a priority, such as high or low priority. For example, the operator may assign requests coming from its subscribers a high priority and requests coming from the external service providers a lower priority.
  • the low priority requests can be denied, while the high priority requests can be processed as long as there is some available budget left. If the budget for the request has reached the restricted level, the request can be denied and optionally en-queued to a traffic shaping queue to be processed at a later time.
  • the gateway can be used by the operator 126 to expose its services and to manage, control and monetize access to these services from external entities.
  • the gateway can be utilized to expose the excess capacity of a telecommunications (telecom) network, such as a CDMA or GSM network.
  • the telecom network usually includes a set of resources (e.g. SMSC, MMSC, etc) that handle communications between mobile subscriber devices (e.g. cellular phones, etc). These resources of the telecom network are typically provisioned to handle very large amounts of traffic, however, for the majority of the time, they are usually operating at a much lower usage than their maximum capacity.
  • the telecom network may be provisioned to handle communications during the busiest periods, such as New Year's evening, times of natural disasters or other emergency situations and the like.
  • the telecom network may be operating at 20-30% capacity. Furthermore, there may be certain periods of time when the network can be reasonably expected to operate at much lower usage rates, such as during the hours of midnight until 6 am, for example. In light of this, it can be desirable for the network operator to utilize the excess capacity of the network and to monetize that use for various purposes.
  • the gateway can be used to expose the telecom network resources of the network operator to other entities, such other operators, service providers and web applications.
  • the gateway can expose the native protocols of the telecom network resources, such as native MM7 and other signaling protocols, as a set of generic web services APIs that are accessible to these external entities.
  • a set of policies and configurations can be established on the gateway as SLAs to regulate the exposure of the excess capacity in order to ensure that the network is not overloaded.
  • FIG. 2 is an illustration of another use case of the gateway platform, in accordance with various embodiments of the invention.
  • this diagram depicts components as logically separate, such depiction is merely for illustrative purposes. It will be apparent to those skilled in the art that the components portrayed in this figure can be combined or divided into separate software, firmware and/or hardware. Furthermore, it will also be apparent to those skilled in the art that such components, regardless of how they are combined or divided, can execute on the same computing device or can be distributed among different computing devices connected by one or more networks or other suitable communication means.
  • the telecom network operator 230 can deploy the gateway 208 to manage access to the internal resources of the telecom network 200 , such as the short messaging service centers (SMSC 204 ), multimedia messaging service centers (MMSC 202 ) and other resources 206 .
  • the gateway can enable the operator to expose the excess capacity of the network resources to other mobile network operators (MNOs), mobile virtual network operators (MVNOs) 222 , service providers and web applications 224 and other entities 226 that wish to access the mobile network.
  • MNOs mobile network operators
  • MVNOs mobile virtual network operators
  • service providers and web applications 224 and other entities 226 that wish to access the mobile network.
  • the gateway 208 can provide the service orchestration and exposure 210 of the internal network capabilities.
  • the protocols required by underlying network capabilities are often complex and the learning curve associated with achieving competence in them can be steep.
  • the gateway can expose access to standard network capabilities, such as SMS, MMS and Call Control as a set of interfaces tailored to the particular entity accessing the network.
  • the gateway can offer a simple object access protocol (SOAP) style façade (interface), a Parlay X 2.1 and 3.0 façade, a representational state transfer (RESTful) style façade and native protocol façade interfaces.
  • SOAP Web Service interface can be published as standard WSDL files and RESTful Web Services can be designed to use in pure HTTP environments.
  • the gateway can also enable the ability to orchestrate multiple services in a single call by invoking the façade interfaces provided thereon.
  • the gateway can be structured as a container optimized for the task of executing a set of communication services.
  • Communication services are specialized components that can allow the operator to provide application developers and other providers a simple way to access the network services, including messaging, call control, terminal location and presence.
  • a communication service can be comprised of a client-facing interface (service façade) and a service enabler that provides the protocol translation and routing the request to the network resource. Communication services will be described in further detail below, with reference to FIG. 4 .
  • the gateway enables network integration 218 by employing a plurality of plugins to communicate with the network resources.
  • a plugin is a connection established between the gateway and a particular network resource.
  • the plugin communicates in the native protocol of the network resource, however, the gateway can expose this native protocol as a generic interface or some other façade to the client accessing its capabilities.
  • the gateway can provide an internal system for routing of service requests directly to appropriate network nodes based on a variety of parameters, including sending application, destination address, or any arbitrary request parameter.
  • the gateway can include the policy enforcement 220 , billing integration 214 and traffic throttling 216 features that can be applied to the communications flowing to and from the telecom network 200 .
  • all of these features of the gateway can be used to expose the excess capacity of the telecom network to the third party service providers 222 , 224 , 226 .
  • the policy enforcement engine can be used in conjunction with the traffic throttling capabilities to set up a service level agreement that allows a particular third party service provider to utilize the network resource for a reduced charge while the network resource is running at less than a pre-specified capacity.
  • the network operator 230 may set up one tier of pricing for utilizing its network when it is running at 20% capacity, another pricing tier while it is running at 50% capacity and may preclude access altogether when the network is running at 90% capacity.
  • Various other use cases of this are also possible.
  • FIG. 3 is an illustration of a possible deployment of the gateway platform, in accordance with various embodiments of the invention.
  • this diagram depicts components as logically separate, such depiction is merely for illustrative purposes. It will be apparent to those skilled in the art that the components portrayed in this figure can be combined or divided into separate software, firmware and/or hardware. Furthermore, it will also be apparent to those skilled in the art that such components, regardless of how they are combined or divided, can execute on the same computing device or can be distributed among different computing devices connected by one or more networks or other suitable communication means.
  • the gateway deployment 300 can be split into two tiers: an access tier 302 and a network tier 304 .
  • the client requests from the external service providers and applications can be received at the access tier, which provides the interfaces (facades) for accessing the operator's (owner's) services.
  • the network tier can connect to the internal resources of the operator, such as to the internal network resources (in the use case of exposing excess network capacity) or the web application, and can handle the translations and communication with these internal resources.
  • each tier is comprised of at least one cluster, with at least two server instances per cluster, and all server instances run in active mode, independently from each other.
  • the servers in all clusters can be managed servers 306 , 308 , 310 , 312 . Together, the clusters make up a single domain, which can be controlled through an administration server 314 .
  • Communication between the access tier and the network tier can be performed using Java remote method invocation (RMI).
  • the requests received to the gateway can be load balanced between the access tier and the network tier, and failover mechanisms can be provided between the two.
  • the data can be made highly available using a cluster-aware storage service which ensures that all state data is made available across all network tier instances.
  • FIG. 4 is an illustration of a communication service in the gateway, in accordance with various embodiments of the invention.
  • this diagram depicts components as logically separate, such depiction is merely for illustrative purposes. It will be apparent to those skilled in the art that the components portrayed in this figure can be combined or divided into separate software, firmware and/or hardware. Furthermore, it will also be apparent to those skilled in the art that such components, regardless of how they are combined or divided, can execute on the same computing device or can be distributed among different computing devices connected by one or more networks or other suitable communication means.
  • the communication service can be a specialized component that allows an operator to provide external service providers and application developers access to its services.
  • the communication service is a component that runs within the gateway and provides the functionality of the gateway, exposing capabilities of the operator's service. In accordance with an embodiment, all traffic in the gateway is processed through these services.
  • the communication service 400 is comprised of a service façade 402 and a service enabler 404 .
  • the service facade includes an application-facing interface 406 which communicates with the application, a security layer which handles authentication 408 and the XML serialization layer 410 for communicating with the service enabler.
  • the service enabler includes a processing layer 412 , where requests are validated, evaluated according to service level agreements 414 and routed.
  • the service enabler further includes a protocol translation layer (plugin) 416 which communicates with the underlying resource (e.g. network element).
  • plugin protocol translation layer
  • each request coming into the gateway can be processed using a communication service 400 .
  • the communication service can utilize a stack or sequence of interceptors for processing each request.
  • the interceptor stack is described in further detail below, with reference to FIG. 5 .
  • FIG. 5 is an illustration of the communication service utilizing an interceptor stack to apply service level agreements and policy enforcement to incoming requests, in accordance with various embodiments of the invention.
  • this diagram depicts components as logically separate, such depiction is merely for illustrative purposes. It will be apparent to those skilled in the art that the components portrayed in this figure can be combined or divided into separate software, firmware and/or hardware. Furthermore, it will also be apparent to those skilled in the art that such components, regardless of how they are combined or divided, can execute on the same computing device or can be distributed among different computing devices connected by one or more networks or other suitable communication means.
  • the gateway 500 can use service level agreements (SLAs) to govern the access to the operator's resources by external applications.
  • SLAs can group service providers into groups and define whether a member of a service provider group is able to (1) have access to a particular communication service (which can be regulated down to supported methods and parameters), (2) participates in any quality of service (QOS) agreements. Participating in the QOS agreement can specify things such as the guaranteed number of requests a service provider may send through a particular communication service in a given period of time. These guarantees can be modulated by time of day, day of week, rate (invocations per time period) and quota (aggregated number of invocations).
  • SLA enforcement can be provided by using an interceptor stack.
  • Interceptors can be components that are invoked by the communication service in sequence for each request.
  • the interceptors can be registered in the gateway by using a configuration file. Once registered, the interceptors can be invoked in a particular sequence for the requests coming into the gateway. Each interceptor can deny the request, allow the request, abstain from processing the request or pass the request to the next interceptor specified by the sequence. As such, the some interceptors can be skipped in the sequence.
  • the interceptors can also modify the various data associated with the request. Interceptors can collaborate in request processing. In addition, new custom interceptors can be created and registered at the gateway to process incoming requests.
  • a communication service 502 receives an incoming request and invokes the interceptor stack 506 to process the request.
  • At least one interceptor in the interceptor chain can evaluate the request parameters and then either deny or allow the request according to the SLA associated with the service provider that sent the request.
  • the interceptor stack can implement data from a variety of data sources 508 , 510 , 512 when evaluating the request. For example, a rule repository 512 can be maintained to manage a set of rules for processing the request.
  • the protocol translation component 504 can translate the request into the particular protocol used by the service of the operator.
  • the embodiments of the invention further encompass computer apparatus, computing systems and machine-readable media configured to carry out the foregoing systems and methods.
  • the present invention may be conveniently implemented using a conventional general purpose or a specialized digital computer or microprocessor programmed according to the teachings of the present disclosure, as will be apparent to those skilled in the computer art.
  • the various embodiments include a computer program product which is a storage medium (media) having instructions stored thereon/in which can be used to program a general purpose or specialized computing processor(s)/device(s) to perform any of the features presented herein.
  • the storage medium can include, but is not limited to, one or more of the following: any type of physical media including floppy disks, optical discs, DVDs, CD-ROMs, microdrives, magneto-optical disks, holographic storage, ROMs, RAMs, PRAMS, EPROMs, EEPROMs, DRAMs, VRAMs, flash memory devices, magnetic or optical cards, nanosystems (including molecular memory ICs); paper or paper-based media; and any type of media or device suitable for storing instructions and/or information.
  • the computer program product can be transmitted in whole or in parts and over one or more public and/or private networks wherein the transmission includes instructions which can be used by one or more processors to perform any of the features presented herein.
  • the transmission may include a plurality of separate transmissions.
  • the computer storage medium containing the instructions is non-transitory (i.e. not in the process of being transmitted) but rather is persisted on a physical device.

Abstract

Systems and methods are described for providing a gateway that enables cloud-based service exposure. The gateway can allow a particular operator to expose its services and to control, manage and monetize the communication traffic that accesses these services. In accordance with one use case, the gateway can be utilized to expose the services of a Web based application to other external service providers and applications and to manage, control and monetize the requests received from the external providers to the exposed service. In accordance with another use case, the gateway can be utilized to expose the excess capacity of a telecom network, such as a code division multiple access (CDMA) network or a global system for mobile communications (GSM) network and to manage the access to the exposed capacity of the network.

Description

    CLAIM OF PRIORITY
  • The present application claims the benefit of U.S. Provisional Patent Application No. 61/294,766, entitled “GATEKEEPER SERVICE EXPOSURE PLATFORM FOR MOBILE COMMUNICATIONS,” by Sharath Rajasekar et al., filed on Jan. 13, 2010, which is incorporated by reference herein in its entirety, including all Appendices filed therewith.
  • COPYRIGHT NOTICE
  • A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.
  • FIELD OF THE INVENTION
  • The current invention relates to mobile communications and gateways for managing access to services in the cloud.
  • BACKGROUND
  • With the rising pervasiveness of wireless communications and mobile devices, more and more objects are becoming integrated with the World Wide Web. Everything from cellular phones to laptops, electronic books, tablets, personal digital assistants (PDAs) and even automobiles are striving to maintain a constant connection to the internet. As a result of all this interconnectivity, many websites and online content providers have been showing an increasing interest in providing services to mobile clients.
  • As the worlds of TCP/IP applications and telephony networks continue to converge, subscribers want services that provide them with functionality and flexibility that cross the traditional boundaries between the world of the Internet and the world of their phones. Operators of the telecom networks and of various online content applications want to be responsive to those desires and to provide services that will satisfy subscriber demands, promote subscriber loyalty, increase revenues and drive traffic to their networks.
  • However, for both mobile network operators (MNOs) that own the telecom network and for online content providers, integrating these services has historically been complex and ungainly. What is needed is an improved way to manage access to the services provided in the internet and telecom network clouds and to expose those services to external entities.
  • BRIEF SUMMARY OF THE INVENTION
  • In accordance with various embodiments of the invention, systems and methods are described for providing a gateway that enables cloud-based service exposure. The gateway can allow a particular operator to expose its services and to control, manage and monetize the communication traffic that accesses these services. In accordance with one use case, the gateway can be utilized to expose the services of a Web based application to other external service providers and applications and to manage, control and monetize the requests received from the external providers to the exposed service. In accordance with another use case, the gateway can be utilized to expose the excess capacity of a telecom network, such as a code division multiple access (CDMA) network or a global system for mobile communications (GSM) network and to manage the access to the exposed capacity of the network.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is an illustration of one use case of the gateway platform, in accordance with various embodiments of the invention.
  • FIG. 2 is an illustration of another use case of the gateway platform, in accordance with various embodiments of the invention.
  • FIG. 3 is an illustration of a possible deployment of the gateway platform, in accordance with various embodiments of the invention.
  • FIG. 4 is an illustration of a communication service in the gateway, in accordance with various embodiments of the invention.
  • FIG. 5 is an illustration of the communication service utilizing an interceptor stack to apply service level agreements and policy enforcement to incoming requests, in accordance with various embodiments of the invention.
  • DETAILED DESCRIPTION
  • The invention is illustrated by way of example and not by way of limitation in the figures of the accompanying drawings in which like references indicate similar elements. References to embodiments in this disclosure are not necessarily to the same embodiment, and such references mean at least one. While specific implementations are discussed, it is understood that this is done for illustrative purposes only. A person skilled in the relevant art will recognize that other components and configurations may be used without departing from the scope and spirit of the invention.
  • In the following description, numerous specific details are set forth to provide a thorough description of the invention. However, it will be apparent to those skilled in the art that the invention may be practiced without these specific details. In other instances, well-known features have not been described in detail so as not to obscure the invention.
  • In accordance with various embodiments of the invention, a gateway is described for enabling cloud based service exposure. The gateway can allow a particular service provider (hereinafter owner or operator) to expose its services and to control, manage and monetize the communication traffic that access these services. In accordance with an embodiment, the gateway can supply a policy enforcement engine, security enforcement, billing integration and traffic throttling/shaping functionality on the request traffic flowing through it. The policy enforcement engine uses service level agreements (SLAs) to regulate external access by clients and other service providers to the particular service being offered by the operator and exposed by the gateway. The security enforcement can provide authentication and authorization for the request traffic and the billing integration enables the operator to monetize and charge for the traffic flowing through the gateway. Finally, the traffic shaping and throttling features enable the gateway to manage and control the amount of request traffic being sent to the service being provided by the operator.
  • In accordance with various embodiments, two primary use cases of the gateway are described in the present disclosure—a use case for exposing the services of a Web based application to other service providers and a use case for exposing the excess capacity of a telecom network, such as a code division multiple access (CDMA) network or a global system for mobile communications (GSM) network.
  • Web Application Use Case
  • In accordance with an embodiment, the gateway can be deployed by an owner of a web application that wishes to expose its services to other websites/service providers and to be able to monetize and control access to its services by such external service providers. This can enable the owner of a service to utilize the policy enforcement, traffic shaping/throttling, billing integration and other features of the gateway and to apply these features on the request traffic being sent to the web application.
  • FIG. 1 is an illustration of one use case of the gateway platform, in accordance with various embodiments of the invention. Although this diagram depicts components as logically separate, such depiction is merely for illustrative purposes. It will be apparent to those skilled in the art that the components portrayed in this figure can be combined or divided into separate software, firmware and/or hardware. Furthermore, it will also be apparent to those skilled in the art that such components, regardless of how they are combined or divided, can execute on the same computing device or can be distributed among different computing devices connected by one or more networks or other suitable communication means.
  • As illustrated, a service provider (operator) 126 of a particular web site or web application can publish its service 102 on the Internet 100. This service can be available to a multitude of users/clients 120 that can access it by way of a browser on a computing device, as well as to a number of other service providers and owners 106, 108 that may wish to access it, such as by using Web Services.
  • In accordance with an embodiment, the owner 126 of the web service 102 can deploy the gateway 104 to manage access to its service by any number of other providers 106, 108 that wish to make use of the operator's services. By way of an example, the operator of web service A 102 may be an owner of a small business that can make boat reservations on a particular lake. A different provider 106 may be a travel website that wishes to incorporate the ability to make boat reservations for users 122 that are booking their travel plans using the travel web service 106. Similarly, another provider 108 may sell waterskiing equipment and may also wish to provide the ability for its users 124 to make a boat reservation over its own website by using Web Services. In accordance with an embodiment, the gateway 104 is positioned to manage access to the operator's web service 102 by the various external providers and to monetize and control that access.
  • In accordance with an embodiment, the gateway performs a variety of functions to the incoming requests, including but not limited to service and API exposure 118, security 116, billing integration 112, policy enforcement 110 and traffic shaping/throttling 114. The service exposure 118 portion can expose an interface to access the service 102 provided by the operator and to invoke its functionality. This can be performed by publishing a generic Web Services Definition Language (WSDL) file that describes how to use web services to access the service provided by the operator. In alternative embodiments, the gateway can expose the service as several different facades (views) that can be accessible by the external providers, each façade being accessible over a different protocol or API.
  • The policy enforcement engine 110 of the gateway 104 uses service level agreements (SLAs) to regulate service provider and application access to the particular service functionality provided by the owner 126. In accordance with an embodiment, the policy engine supports a range of quality-of-service guarantees that can be modulated by time of day/day of week, rates and quotas. If desired, further rules covering access can also be added. The service provider and application accounts can be divided into groups to simplify SLA management and maintenance. The gateway can come with a set of default SLAs and also provide tools (e.g. wizard) to create custom SLAs tailored for the particular service of the operator. In accordance with an embodiment, if the owner 126 has a list of subscribers, the subscriber permissions and preferences can be reflected in separate subscriber SLA created by the operator 126. For example, one subscriber may indicate that they wish to allow service provider 106 to obtain information regarding the subscriber, while other subscriber 108 to not be able to access their information. The subscriber SLA can contain the preferences of the operator's subscriber and enforce the requests coming from the service providers accordingly.
  • The security framework 116 can enable the gateway 104 to function as a single point of contact for access to the functionality provided by the owner 126. It can provide common authentication, authorization and access control procedures for all applications that are external to the owner 126, as well as internal applications. In accordance with an embodiment, the applications can be authenticated using plaintext or digest passwords, X.509 certificates or SAML 1.0/1.1 tokens. Service requests can use XML encryption based on the W3C standard. To ensure message integrity, the requests can be digitally signed, using W3C XML digital signature standard.
  • The billing integration mechanism 112 can enable the owner 126 to incorporate charging and payment functionality into the gateway according to the request traffic being sent to its service 102. In accordance with an embodiment, the gateway can include a data record listener which listens for various data records generated within the gateway and issues Diameter offline charging requests to an external billing server upon detecting that a particular data record has been generated. In addition, the gateway can include a credit control interceptor that intercepts requests in the communication traffic flowing through the gateway and initiates Diameter online charging requests to external billing servers upon intercepting said requests. The ability to integrate the gateway with the Diameter online and offline charging requests can enable the owner 126 to charge for its services more dynamically, according to the traffic being handled by the service 102.
  • The traffic shaping and throttling 114 can protect the service 102 and the various underlying cluster nodes that are providing the service from traffic overload during periods of high traffic volume. When a request is received by the gateway, a budget service can be invoked to determine a current available budget for the request. The budget can be based on a service level agreement (SLA) for the service provider or application that sent the request. Additionally, the SLA can include preference information from the subscribers of the owner 126. In accordance with an embodiment, the requests can be assigned a priority, such as high or low priority. For example, the operator may assign requests coming from its subscribers a high priority and requests coming from the external service providers a lower priority. If the budget is under a particular threshold value, the low priority requests can be denied, while the high priority requests can be processed as long as there is some available budget left. If the budget for the request has reached the restricted level, the request can be denied and optionally en-queued to a traffic shaping queue to be processed at a later time.
  • In this manner, the gateway can be used by the operator 126 to expose its services and to manage, control and monetize access to these services from external entities.
  • Excess Network Capacity Use Case
  • In another embodiment, the gateway can be utilized to expose the excess capacity of a telecommunications (telecom) network, such as a CDMA or GSM network. The telecom network usually includes a set of resources (e.g. SMSC, MMSC, etc) that handle communications between mobile subscriber devices (e.g. cellular phones, etc). These resources of the telecom network are typically provisioned to handle very large amounts of traffic, however, for the majority of the time, they are usually operating at a much lower usage than their maximum capacity. By way of example, the telecom network may be provisioned to handle communications during the busiest periods, such as New Year's evening, times of natural disasters or other emergency situations and the like. As such, at any given time that does not involve such periods of high traffic, the telecom network may be operating at 20-30% capacity. Furthermore, there may be certain periods of time when the network can be reasonably expected to operate at much lower usage rates, such as during the hours of midnight until 6 am, for example. In light of this, it can be desirable for the network operator to utilize the excess capacity of the network and to monetize that use for various purposes.
  • In accordance with an embodiment, the gateway can be used to expose the telecom network resources of the network operator to other entities, such other operators, service providers and web applications. For example, the gateway can expose the native protocols of the telecom network resources, such as native MM7 and other signaling protocols, as a set of generic web services APIs that are accessible to these external entities. In addition, a set of policies and configurations can be established on the gateway as SLAs to regulate the exposure of the excess capacity in order to ensure that the network is not overloaded.
  • FIG. 2 is an illustration of another use case of the gateway platform, in accordance with various embodiments of the invention. Although this diagram depicts components as logically separate, such depiction is merely for illustrative purposes. It will be apparent to those skilled in the art that the components portrayed in this figure can be combined or divided into separate software, firmware and/or hardware. Furthermore, it will also be apparent to those skilled in the art that such components, regardless of how they are combined or divided, can execute on the same computing device or can be distributed among different computing devices connected by one or more networks or other suitable communication means.
  • As illustrated, the telecom network operator 230 can deploy the gateway 208 to manage access to the internal resources of the telecom network 200, such as the short messaging service centers (SMSC 204), multimedia messaging service centers (MMSC 202) and other resources 206. The gateway can enable the operator to expose the excess capacity of the network resources to other mobile network operators (MNOs), mobile virtual network operators (MVNOs) 222, service providers and web applications 224 and other entities 226 that wish to access the mobile network.
  • In accordance with an embodiment, the gateway 208 can provide the service orchestration and exposure 210 of the internal network capabilities. The protocols required by underlying network capabilities are often complex and the learning curve associated with achieving competence in them can be steep. The gateway can expose access to standard network capabilities, such as SMS, MMS and Call Control as a set of interfaces tailored to the particular entity accessing the network. For example, depending on the needs of the external provider, the gateway can offer a simple object access protocol (SOAP) style façade (interface), a Parlay X 2.1 and 3.0 façade, a representational state transfer (RESTful) style façade and native protocol façade interfaces. The SOAP Web Service interface can be published as standard WSDL files and RESTful Web Services can be designed to use in pure HTTP environments. In accordance with an embodiment, the gateway can also enable the ability to orchestrate multiple services in a single call by invoking the façade interfaces provided thereon.
  • In accordance with an embodiment, the gateway can be structured as a container optimized for the task of executing a set of communication services. Communication services are specialized components that can allow the operator to provide application developers and other providers a simple way to access the network services, including messaging, call control, terminal location and presence. A communication service can be comprised of a client-facing interface (service façade) and a service enabler that provides the protocol translation and routing the request to the network resource. Communication services will be described in further detail below, with reference to FIG. 4.
  • In accordance with an embodiment, the gateway enables network integration 218 by employing a plurality of plugins to communicate with the network resources. A plugin is a connection established between the gateway and a particular network resource. The plugin communicates in the native protocol of the network resource, however, the gateway can expose this native protocol as a generic interface or some other façade to the client accessing its capabilities. By utilizing a set of such plugins, the gateway can provide an internal system for routing of service requests directly to appropriate network nodes based on a variety of parameters, including sending application, destination address, or any arbitrary request parameter. There can be in-production deployment of multiple instances of network plugins on an as needed basis; as a result routing can be managed in a very fine-grained way.
  • In addition, as previously described in connection with FIG. 1, the gateway can include the policy enforcement 220, billing integration 214 and traffic throttling 216 features that can be applied to the communications flowing to and from the telecom network 200.
  • In accordance with an embodiment, all of these features of the gateway can be used to expose the excess capacity of the telecom network to the third party service providers 222, 224, 226. For example, the policy enforcement engine can be used in conjunction with the traffic throttling capabilities to set up a service level agreement that allows a particular third party service provider to utilize the network resource for a reduced charge while the network resource is running at less than a pre-specified capacity. For example, the network operator 230 may set up one tier of pricing for utilizing its network when it is running at 20% capacity, another pricing tier while it is running at 50% capacity and may preclude access altogether when the network is running at 90% capacity. Various other use cases of this are also possible.
  • FIG. 3 is an illustration of a possible deployment of the gateway platform, in accordance with various embodiments of the invention. Although this diagram depicts components as logically separate, such depiction is merely for illustrative purposes. It will be apparent to those skilled in the art that the components portrayed in this figure can be combined or divided into separate software, firmware and/or hardware. Furthermore, it will also be apparent to those skilled in the art that such components, regardless of how they are combined or divided, can execute on the same computing device or can be distributed among different computing devices connected by one or more networks or other suitable communication means.
  • As illustrated, for high availability and security, the gateway deployment 300 can be split into two tiers: an access tier 302 and a network tier 304. In accordance with an embodiment, the client requests from the external service providers and applications can be received at the access tier, which provides the interfaces (facades) for accessing the operator's (owner's) services. The network tier, on the other hand, can connect to the internal resources of the operator, such as to the internal network resources (in the use case of exposing excess network capacity) or the web application, and can handle the translations and communication with these internal resources.
  • In accordance with an embodiment, each tier is comprised of at least one cluster, with at least two server instances per cluster, and all server instances run in active mode, independently from each other. The servers in all clusters can be managed servers 306, 308, 310, 312. Together, the clusters make up a single domain, which can be controlled through an administration server 314. Communication between the access tier and the network tier can be performed using Java remote method invocation (RMI). The requests received to the gateway can be load balanced between the access tier and the network tier, and failover mechanisms can be provided between the two.
  • In accordance with an embodiment, there is an additional tier 316 containing the database. Within the cluster, the data can be made highly available using a cluster-aware storage service which ensures that all state data is made available across all network tier instances.
  • FIG. 4 is an illustration of a communication service in the gateway, in accordance with various embodiments of the invention. Although this diagram depicts components as logically separate, such depiction is merely for illustrative purposes. It will be apparent to those skilled in the art that the components portrayed in this figure can be combined or divided into separate software, firmware and/or hardware. Furthermore, it will also be apparent to those skilled in the art that such components, regardless of how they are combined or divided, can execute on the same computing device or can be distributed among different computing devices connected by one or more networks or other suitable communication means.
  • As previously mentioned, the communication service can be a specialized component that allows an operator to provide external service providers and application developers access to its services. In accordance with an embodiment, the communication service is a component that runs within the gateway and provides the functionality of the gateway, exposing capabilities of the operator's service. In accordance with an embodiment, all traffic in the gateway is processed through these services.
  • In accordance with an embodiment, the communication service 400 is comprised of a service façade 402 and a service enabler 404. The service facade includes an application-facing interface 406 which communicates with the application, a security layer which handles authentication 408 and the XML serialization layer 410 for communicating with the service enabler. The service enabler includes a processing layer 412, where requests are validated, evaluated according to service level agreements 414 and routed. The service enabler further includes a protocol translation layer (plugin) 416 which communicates with the underlying resource (e.g. network element).
  • In accordance with an embodiment, each request coming into the gateway can be processed using a communication service 400. The communication service can utilize a stack or sequence of interceptors for processing each request. The interceptor stack is described in further detail below, with reference to FIG. 5.
  • FIG. 5 is an illustration of the communication service utilizing an interceptor stack to apply service level agreements and policy enforcement to incoming requests, in accordance with various embodiments of the invention. Although this diagram depicts components as logically separate, such depiction is merely for illustrative purposes. It will be apparent to those skilled in the art that the components portrayed in this figure can be combined or divided into separate software, firmware and/or hardware. Furthermore, it will also be apparent to those skilled in the art that such components, regardless of how they are combined or divided, can execute on the same computing device or can be distributed among different computing devices connected by one or more networks or other suitable communication means.
  • In accordance with an embodiment, the gateway 500 can use service level agreements (SLAs) to govern the access to the operator's resources by external applications. These SLAs can group service providers into groups and define whether a member of a service provider group is able to (1) have access to a particular communication service (which can be regulated down to supported methods and parameters), (2) participates in any quality of service (QOS) agreements. Participating in the QOS agreement can specify things such as the guaranteed number of requests a service provider may send through a particular communication service in a given period of time. These guarantees can be modulated by time of day, day of week, rate (invocations per time period) and quota (aggregated number of invocations). SLA enforcement can be provided by using an interceptor stack. Interceptors can be components that are invoked by the communication service in sequence for each request. In accordance with an embodiment, the interceptors can be registered in the gateway by using a configuration file. Once registered, the interceptors can be invoked in a particular sequence for the requests coming into the gateway. Each interceptor can deny the request, allow the request, abstain from processing the request or pass the request to the next interceptor specified by the sequence. As such, the some interceptors can be skipped in the sequence. The interceptors can also modify the various data associated with the request. Interceptors can collaborate in request processing. In addition, new custom interceptors can be created and registered at the gateway to process incoming requests.
  • In accordance with an embodiment, a communication service 502 receives an incoming request and invokes the interceptor stack 506 to process the request. At least one interceptor in the interceptor chain can evaluate the request parameters and then either deny or allow the request according to the SLA associated with the service provider that sent the request. The interceptor stack can implement data from a variety of data sources 508, 510, 512 when evaluating the request. For example, a rule repository 512 can be maintained to manage a set of rules for processing the request. Once the interceptor stack is finished processing the request, it can be forwarded to the protocol translation component 504 which can translate the request into the particular protocol used by the service of the operator.
  • It should be noted that the structure, deployment and other various components of the gateway illustrated herein can be modified and customized as needed, within the scope of the various embodiments described herein. The particular structure is described for purposes of illustration and understanding and is not intended to limit all of the embodiments of the use cases described herein. Further details and information on the gateway and other functionality described throughout this disclosure can be found in the U.S. Provisional Patent Application No. 61/294,766, which is incorporated herein by reference in its entirety, including all of the Appendices filed therewith.
  • Throughout the various contexts described in this disclosure, the embodiments of the invention further encompass computer apparatus, computing systems and machine-readable media configured to carry out the foregoing systems and methods. In addition to an embodiment consisting of specifically designed integrated circuits or other electronics, the present invention may be conveniently implemented using a conventional general purpose or a specialized digital computer or microprocessor programmed according to the teachings of the present disclosure, as will be apparent to those skilled in the computer art.
  • Appropriate software coding can readily be prepared by skilled programmers based on the teachings of the present disclosure, as will be apparent to those skilled in the software art. The invention may also be implemented by the preparation of application specific integrated circuits or by interconnecting an appropriate network of conventional component circuits, as will be readily apparent to those skilled in the art.
  • The various embodiments include a computer program product which is a storage medium (media) having instructions stored thereon/in which can be used to program a general purpose or specialized computing processor(s)/device(s) to perform any of the features presented herein. The storage medium can include, but is not limited to, one or more of the following: any type of physical media including floppy disks, optical discs, DVDs, CD-ROMs, microdrives, magneto-optical disks, holographic storage, ROMs, RAMs, PRAMS, EPROMs, EEPROMs, DRAMs, VRAMs, flash memory devices, magnetic or optical cards, nanosystems (including molecular memory ICs); paper or paper-based media; and any type of media or device suitable for storing instructions and/or information. The computer program product can be transmitted in whole or in parts and over one or more public and/or private networks wherein the transmission includes instructions which can be used by one or more processors to perform any of the features presented herein. The transmission may include a plurality of separate transmissions. In accordance with certain embodiments, however, the computer storage medium containing the instructions is non-transitory (i.e. not in the process of being transmitted) but rather is persisted on a physical device.
  • The foregoing description of the preferred embodiments of the present invention has been provided for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise forms disclosed. Many modifications and variations can be apparent to the practitioner skilled in the art. Embodiments were chosen and described in order to best explain the principles of the invention and its practical application, thereby enabling others skilled in the relevant art to understand the invention. It is intended that the scope of the invention be defined by the following claims and their equivalents.

Claims (20)

1. A system for exposing and managing cloud-based services, said system comprising:
a web application that provides at least one service accessible over the internet to a plurality of users;
a gateway deployed to manage access to said web application by one or more external service providers, wherein the gateway exposes an interface to invoke the service of the application, wherein the gateway receives incoming requests from the external service providers to invoke the interface and applies a set functions to manage said incoming requests, wherein the set of functions include one or more of the following:
a set of authentication, authorization and access control procedures for said incoming requests;
a policy enforcement engine that uses service level agreements to regulate the external service providers accessing the service provided by the application; and
traffic throttling and traffic shaping of the incoming requests from the external service providers.
2. The system of claim 1, wherein the set of functions further include:
protocol translation of said incoming requests between a protocol employed by the application and protocols used by said external service providers.
3. The system of claim 1, wherein the set of functions further include:
a billing integration module that transmits Diameter offline or Diameter online charging requests to an external billing server based on the requests received at the gateway.
4. The system of claim 1, wherein the gateway further includes a communication service that invokes a sequence of interceptors to process each incoming request at the gateway.
5. The system of claim 1, wherein at least one service level agreement enforced by the policy engine specifies a guaranteed number of requests that an external service provider is allowed to send in a specified period of time.
6. The system of claim 5, wherein the guaranteed number of requests can be modulated by time of day, day of week, rate and quota.
7. The system of claim 1, wherein the gateway is deployed in two tiers: an access tier that provides a service interface to said external service providers and a network tier that interfaces with the service of said web application.
8. The system of claim 1, wherein the traffic throttling and shaping of said incoming requests further includes:
determining a budget for each incoming request and if the budget is under a particular threshold value, denying low priority requests.
9. The system of claim 1, wherein said external service providers are other web applications that access the service of said web application over web services application programming interfaces (APIs).
10. A system for exposing and managing cloud-based services, said system comprising:
a telecommunications (telecom) network including a set of resources that process communication traffic between mobile subscriber devices, wherein the telecom network is operating at less than a maximum capacity of the communication traffic that the telecom network is provisioned to handle; and
a gateway positioned to manage access to the telecom network, wherein the gateway exposes, to one or more external service providers, an amount of excess capacity of the telecom network that is available between the used capacity and the maximum capacity, wherein the external service providers are enabled to utilize the excess capacity of the telecom network.
11. The system of claim 10, wherein the resources of the telecom network include a short messaging service center (SMSC) and a multimedia messaging service center (MMSC).
12. The system of claim 10, wherein the gateway exposes to said external service providers a generic interface to access said resources of the telecom network and wherein the gateway further performs translation between the generic interface and at least one native protocol implemented by said network resources.
13. The system of claim 10, wherein managing access by the gateway to the telecom network further includes applying, to requests transmitted between the telecom network and the external service providers, one or more of the following functions:
a set of authentication, authorization and access control procedures for said incoming requests;
a policy enforcement engine that uses service level agreements to regulate the external service providers accessing the service provided by the application; and
traffic throttling and traffic shaping of the incoming requests from the external service providers.
14. The system of claim 10, wherein the gateway further includes:
a billing integration module that transmits Diameter offline or Diameter online charging requests to an external billing server based on the requests received at the gateway.
15. The system of claim 10, wherein the gateway further includes a communication service that invokes a sequence of interceptors to process each incoming request at the gateway.
16. The system of claim 10, wherein at least one service level agreement enforced by the policy engine specifies a guaranteed number of requests that an external service provider is allowed to send in a specified period of time.
17. The system of claim 16, wherein the guaranteed number of requests can be modulated by time of day, day of week, rate and quota.
18. The system of claim 10, wherein the gateway is deployed in two tiers: an access tier that provides a service interface to said external service providers and a network tier that interfaces with the resources of said telecom network.
19. The system of claim 10, wherein the traffic throttling and shaping of said incoming requests further includes:
determining a budget for each incoming request and if the budget is under a particular threshold value, denying low priority requests.
20. A method for exposing and managing cloud-based services, said method comprising:
accessing a telecommunications (telecom) network including a set of resources that process communication traffic between mobile subscriber devices, wherein the telecom network is operating at less than a maximum capacity of the communication traffic that the telecom network is provisioned to handle;
managing access to the telecom network by deploying a gateway to said telecom network; and
exposing, by said gateway to one or more external service providers, an amount of excess capacity of the telecom network that is available between the used capacity and the maximum capacity, wherein the external service providers are enabled to utilize the excess capacity of the telecom network.
US13/006,184 2010-01-13 2011-01-13 Gateway for enabling cloud-based service exposure Abandoned US20110173108A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/006,184 US20110173108A1 (en) 2010-01-13 2011-01-13 Gateway for enabling cloud-based service exposure

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US29476610P 2010-01-13 2010-01-13
US13/006,184 US20110173108A1 (en) 2010-01-13 2011-01-13 Gateway for enabling cloud-based service exposure

Publications (1)

Publication Number Publication Date
US20110173108A1 true US20110173108A1 (en) 2011-07-14

Family

ID=44258456

Family Applications (3)

Application Number Title Priority Date Filing Date
US13/006,184 Abandoned US20110173108A1 (en) 2010-01-13 2011-01-13 Gateway for enabling cloud-based service exposure
US13/006,153 Active 2031-07-31 US8605667B2 (en) 2010-01-13 2011-01-13 Systems and methods for exposing different service facades of an underlying network
US13/006,172 Active US9432825B2 (en) 2010-01-13 2011-01-13 Systems and methods for integrating a service access gateway with billing and revenue management systems

Family Applications After (2)

Application Number Title Priority Date Filing Date
US13/006,153 Active 2031-07-31 US8605667B2 (en) 2010-01-13 2011-01-13 Systems and methods for exposing different service facades of an underlying network
US13/006,172 Active US9432825B2 (en) 2010-01-13 2011-01-13 Systems and methods for integrating a service access gateway with billing and revenue management systems

Country Status (1)

Country Link
US (3) US20110173108A1 (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012023050A2 (en) 2010-08-20 2012-02-23 Overtis Group Limited Secure cloud computing system and method
US20120060212A1 (en) * 2010-09-03 2012-03-08 Ricoh Company, Ltd. Information processing apparatus, information processing system, and computer-readable storage medium
US20120324082A1 (en) * 2011-06-17 2012-12-20 Futurewei Technologies, Inc. Cloud Service Control and Management Architecture Expanded to Interface the Network Stratum
US20130024494A1 (en) * 2011-06-13 2013-01-24 Steven Guarrieri Methods and systems for platform optimized design
US20130080509A1 (en) * 2011-09-27 2013-03-28 Alcatel-Lucent Shanghai Bell Co. Ltd. Cloud computing access gateway and method for providing a user terminal access to a cloud provider
US8429282B1 (en) * 2011-03-22 2013-04-23 Amazon Technologies, Inc. System and method for avoiding system overload by maintaining an ideal request rate
US20140189845A1 (en) * 2012-12-27 2014-07-03 Yigang Cai Authentication of applications that access web services
US20140200947A1 (en) * 2013-01-15 2014-07-17 Xerox Corporation Methods and systems for regulating service layer agreements for multiple cloud service requests
US8935377B2 (en) 2012-10-29 2015-01-13 At&T Intellectual Property I, L.P. Dynamic registration of listener resources for cloud services
WO2015026389A3 (en) * 2012-12-27 2015-07-16 Sequitur Labs, Inc. Utilizations and applications of near field communications in mobile device management and security
US9577916B1 (en) * 2015-12-03 2017-02-21 International Business Machines Corporation Gateway flow plugin containers
US20180217871A1 (en) * 2015-07-31 2018-08-02 Hewlett Packard Enterprise Development LP. Discovering and publishing api information
US10462185B2 (en) 2014-09-05 2019-10-29 Sequitur Labs, Inc. Policy-managed secure code execution and messaging for computing devices and computing device security
WO2019245821A1 (en) 2018-06-18 2019-12-26 Akamai Technologies, Inc. Download management with congestion mitigation for over the air content delivery to vehicles
US10667172B2 (en) 2018-06-18 2020-05-26 Akamai Technologies, Inc. Download management with congestion mitigation for over the air content delivery to vehicles
US10685130B2 (en) 2015-04-21 2020-06-16 Sequitur Labs Inc. System and methods for context-aware and situation-aware secure, policy-based access control for computing devices
US10700865B1 (en) 2016-10-21 2020-06-30 Sequitur Labs Inc. System and method for granting secure access to computing services hidden in trusted computing environments to an unsecure requestor
US11012362B2 (en) 2018-06-18 2021-05-18 Akamai Technologies, Inc. Download management with congestion mitigation for over the air content delivery to vehicles
US11070446B2 (en) 2017-10-24 2021-07-20 At&T Intellectual Property I, L.P. Intelligent network resource orchestration system and method for internet enabled device applications and services
US11425168B2 (en) 2015-05-14 2022-08-23 Sequitur Labs, Inc. System and methods for facilitating secure computing device control and operation
US11847237B1 (en) 2015-04-28 2023-12-19 Sequitur Labs, Inc. Secure data protection and encryption techniques for computing devices and information storage

Families Citing this family (55)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102027721B (en) 2008-04-02 2015-05-13 特维里奥公司 System and method for processing telephony sessions
US8837465B2 (en) 2008-04-02 2014-09-16 Twilio, Inc. System and method for processing telephony sessions
US8964726B2 (en) 2008-10-01 2015-02-24 Twilio, Inc. Telephony web event system and method
EP2404412B1 (en) 2009-03-02 2019-05-01 Twilio Inc. Method and system for a multitenancy telephone network
US9210275B2 (en) 2009-10-07 2015-12-08 Twilio, Inc. System and method for running a multi-module telephony application
US8533665B2 (en) * 2009-11-16 2013-09-10 Cisco Technology, Inc. Generating object annotations
EP2559216B1 (en) * 2010-04-13 2015-02-18 Telefonaktiebolaget L M Ericsson (PUBL) Subscription handling for the ip multimedia subsystem
US9338064B2 (en) 2010-06-23 2016-05-10 Twilio, Inc. System and method for managing a computing cluster
US9459925B2 (en) 2010-06-23 2016-10-04 Twilio, Inc. System and method for managing a computing cluster
US9459926B2 (en) 2010-06-23 2016-10-04 Twilio, Inc. System and method for managing a computing cluster
US9590849B2 (en) 2010-06-23 2017-03-07 Twilio, Inc. System and method for managing a computing cluster
US20120208495A1 (en) 2010-06-23 2012-08-16 Twilio, Inc. System and method for monitoring account usage on a platform
US8838707B2 (en) 2010-06-25 2014-09-16 Twilio, Inc. System and method for enabling real-time eventing
US8934925B2 (en) * 2010-10-15 2015-01-13 Microsoft Corporation Mobile messaging message notifications processing
US8649268B2 (en) 2011-02-04 2014-02-11 Twilio, Inc. Method for processing telephony sessions of a network
US9398622B2 (en) 2011-05-23 2016-07-19 Twilio, Inc. System and method for connecting a communication to a client
US9648006B2 (en) 2011-05-23 2017-05-09 Twilio, Inc. System and method for communicating with a client application
US20140044123A1 (en) 2011-05-23 2014-02-13 Twilio, Inc. System and method for real time communicating with a client application
US10182147B2 (en) 2011-09-21 2019-01-15 Twilio Inc. System and method for determining and communicating presence information
EP2759123B1 (en) 2011-09-21 2018-08-15 Twilio, Inc. System and method for authorizing and connecting application developers and users
US9495227B2 (en) 2012-02-10 2016-11-15 Twilio, Inc. System and method for managing concurrent events
US9602586B2 (en) 2012-05-09 2017-03-21 Twilio, Inc. System and method for managing media in a distributed communication network
US9240941B2 (en) 2012-05-09 2016-01-19 Twilio, Inc. System and method for managing media in a distributed communication network
US20130304928A1 (en) 2012-05-09 2013-11-14 Twilio, Inc. System and method for managing latency in a distributed telephony network
US9247062B2 (en) 2012-06-19 2016-01-26 Twilio, Inc. System and method for queuing a communication session
US8737962B2 (en) 2012-07-24 2014-05-27 Twilio, Inc. Method and system for preventing illicit use of a telephony platform
US8938053B2 (en) 2012-10-15 2015-01-20 Twilio, Inc. System and method for triggering on platform usage
US8948356B2 (en) 2012-10-15 2015-02-03 Twilio, Inc. System and method for routing communications
US9253254B2 (en) 2013-01-14 2016-02-02 Twilio, Inc. System and method for offering a multi-partner delegated platform
US9282124B2 (en) 2013-03-14 2016-03-08 Twilio, Inc. System and method for integrating session initiation protocol communication in a telecommunications platform
US9001666B2 (en) 2013-03-15 2015-04-07 Twilio, Inc. System and method for improving routing in a distributed communication platform
US9338280B2 (en) 2013-06-19 2016-05-10 Twilio, Inc. System and method for managing telephony endpoint inventory
US9225840B2 (en) 2013-06-19 2015-12-29 Twilio, Inc. System and method for providing a communication endpoint information service
US9160696B2 (en) 2013-06-19 2015-10-13 Twilio, Inc. System for transforming media resource into destination device compatible messaging format
US9483328B2 (en) 2013-07-19 2016-11-01 Twilio, Inc. System and method for delivering application content
US9338018B2 (en) 2013-09-17 2016-05-10 Twilio, Inc. System and method for pricing communication of a telecommunication platform
US9274858B2 (en) 2013-09-17 2016-03-01 Twilio, Inc. System and method for tagging and tracking events of an application platform
US9137127B2 (en) 2013-09-17 2015-09-15 Twilio, Inc. System and method for providing communication platform metadata
US9553799B2 (en) 2013-11-12 2017-01-24 Twilio, Inc. System and method for client communication in a distributed telephony network
US9325624B2 (en) 2013-11-12 2016-04-26 Twilio, Inc. System and method for enabling dynamic multi-modal communication
US9344573B2 (en) 2014-03-14 2016-05-17 Twilio, Inc. System and method for a work distribution service
US9226217B2 (en) 2014-04-17 2015-12-29 Twilio, Inc. System and method for enabling multi-modal communication
US9774687B2 (en) 2014-07-07 2017-09-26 Twilio, Inc. System and method for managing media and signaling in a communication platform
US9516101B2 (en) 2014-07-07 2016-12-06 Twilio, Inc. System and method for collecting feedback in a multi-tenant communication platform
US9251371B2 (en) 2014-07-07 2016-02-02 Twilio, Inc. Method and system for applying data retention policies in a computing platform
US9246694B1 (en) 2014-07-07 2016-01-26 Twilio, Inc. System and method for managing conferencing in a distributed communication network
US9363301B2 (en) 2014-10-21 2016-06-07 Twilio, Inc. System and method for providing a micro-services communication platform
US9819550B2 (en) * 2015-01-09 2017-11-14 Alcatel Lucent Diameter routing agent application plug-in framework
US9477975B2 (en) 2015-02-03 2016-10-25 Twilio, Inc. System and method for a media intelligence platform
US10419891B2 (en) 2015-05-14 2019-09-17 Twilio, Inc. System and method for communicating through multiple endpoints
US9948703B2 (en) 2015-05-14 2018-04-17 Twilio, Inc. System and method for signaling through data storage
US10659349B2 (en) 2016-02-04 2020-05-19 Twilio Inc. Systems and methods for providing secure network exchanged for a multitenant virtual private cloud
US10686902B2 (en) 2016-05-23 2020-06-16 Twilio Inc. System and method for a multi-channel notification service
US10063713B2 (en) 2016-05-23 2018-08-28 Twilio Inc. System and method for programmatic device connectivity
CN107666482A (en) * 2017-09-18 2018-02-06 上海电气分布式能源科技有限公司 A kind of means of communication and system based on SOA framework

Citations (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5799002A (en) * 1996-07-02 1998-08-25 Microsoft Corporation Adaptive bandwidth throttling for network services
US6055571A (en) * 1997-11-20 2000-04-25 Nec Usa, Inc. Computer network with microeconomic flow control
US6125397A (en) * 1997-06-03 2000-09-26 Fuji Xerox Co., Ltd. Data transfer apparatus and method using congestion recovery-type and congestion avoidance-type data transfers
US6222856B1 (en) * 1996-07-02 2001-04-24 Murali R. Krishnan Adaptive bandwidth throttling for individual virtual services supported on a network server
US20020025795A1 (en) * 2000-08-24 2002-02-28 Msafe Inc., Method, system and device for monitoring activity of a wireless communication device
US20030028790A1 (en) * 2001-07-16 2003-02-06 Francotyp-Postalia Ag & C O. Kg Security module for an account management system
US20030097461A1 (en) * 2001-11-08 2003-05-22 Paul Barham System and method for controlling network demand via congestion pricing
US20040009762A1 (en) * 2002-05-28 2004-01-15 Stefan Bugiu Dynamic pricing and yield management in mobile communications
US6760417B1 (en) * 1998-10-19 2004-07-06 Nokia Networks Oy Charging method in telecommunications network
US20040193726A1 (en) * 2001-11-23 2004-09-30 Jean-Marie Gatto Methods and systems for large scale controlled and secure data downloading
US6961341B1 (en) * 1996-07-02 2005-11-01 Microsoft Corporation Adaptive bandwidth throttling for network services
US20050245230A1 (en) * 2004-04-30 2005-11-03 Benco David S Selecting one of a plurality of service providers to handle a communication session
US7136913B2 (en) * 2000-05-31 2006-11-14 Lab 7 Networks, Inc. Object oriented communication among platform independent systems across a firewall over the internet using HTTP-SOAP
US20070106801A1 (en) * 2005-11-04 2007-05-10 Bea Systems, Inc. System and method for controlling access to legacy short message peer-to-peer protocols based upon a policy
US20070143470A1 (en) * 2005-12-20 2007-06-21 Nortel Networks Limited Facilitating integrated web and telecommunication services with collaborating web and telecommunication clients
US20080103923A1 (en) * 2006-10-31 2008-05-01 Digital River, Inc. Centralized Payment Gateway System and Method
US7483438B2 (en) * 2005-04-14 2009-01-27 Alcatel Lucent Systems and methods for managing network services between private networks
US20090268715A1 (en) * 2008-04-24 2009-10-29 Oracle International Corporation System and Method for Providing Service Correlation in a Service Access Gateway Environment
US20110082920A1 (en) * 2009-10-07 2011-04-07 International Business Machines Corporation Change Management in Multi-Domain Environments
US8019886B2 (en) * 2009-08-19 2011-09-13 Opanga Networks Inc. Systems and methods for enhanced data delivery based on real time analysis of network communications quality and traffic
US8296409B2 (en) * 2008-05-19 2012-10-23 International Business Machines Corporation Method for enabling on-demand communication services
US8321565B2 (en) * 2009-11-02 2012-11-27 Verizon Patent And Licensing Inc. Network usage throttling systems and methods
US8553573B2 (en) * 2007-04-13 2013-10-08 Hewlett-Packard Development Company, L.P. Apparatus and method for adaptive throttling of traffic across multiple network nodes

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040210522A1 (en) * 2003-04-04 2004-10-21 Bissantz Annette S. Charging gateway component selection of billing system component to handle charging data record based on one or more characteristics of the charging data record
CN101009691B (en) * 2006-01-24 2011-12-14 朗迅科技公司 Convergence service control system and method for IMS network and old network

Patent Citations (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6961341B1 (en) * 1996-07-02 2005-11-01 Microsoft Corporation Adaptive bandwidth throttling for network services
US6222856B1 (en) * 1996-07-02 2001-04-24 Murali R. Krishnan Adaptive bandwidth throttling for individual virtual services supported on a network server
US5799002A (en) * 1996-07-02 1998-08-25 Microsoft Corporation Adaptive bandwidth throttling for network services
US6125397A (en) * 1997-06-03 2000-09-26 Fuji Xerox Co., Ltd. Data transfer apparatus and method using congestion recovery-type and congestion avoidance-type data transfers
US6055571A (en) * 1997-11-20 2000-04-25 Nec Usa, Inc. Computer network with microeconomic flow control
US6760417B1 (en) * 1998-10-19 2004-07-06 Nokia Networks Oy Charging method in telecommunications network
US7136913B2 (en) * 2000-05-31 2006-11-14 Lab 7 Networks, Inc. Object oriented communication among platform independent systems across a firewall over the internet using HTTP-SOAP
US20020025795A1 (en) * 2000-08-24 2002-02-28 Msafe Inc., Method, system and device for monitoring activity of a wireless communication device
US20030028790A1 (en) * 2001-07-16 2003-02-06 Francotyp-Postalia Ag & C O. Kg Security module for an account management system
US20030097461A1 (en) * 2001-11-08 2003-05-22 Paul Barham System and method for controlling network demand via congestion pricing
US7284047B2 (en) * 2001-11-08 2007-10-16 Microsoft Corporation System and method for controlling network demand via congestion pricing
US20040193726A1 (en) * 2001-11-23 2004-09-30 Jean-Marie Gatto Methods and systems for large scale controlled and secure data downloading
US20040009762A1 (en) * 2002-05-28 2004-01-15 Stefan Bugiu Dynamic pricing and yield management in mobile communications
US20050245230A1 (en) * 2004-04-30 2005-11-03 Benco David S Selecting one of a plurality of service providers to handle a communication session
US7483438B2 (en) * 2005-04-14 2009-01-27 Alcatel Lucent Systems and methods for managing network services between private networks
US20070106801A1 (en) * 2005-11-04 2007-05-10 Bea Systems, Inc. System and method for controlling access to legacy short message peer-to-peer protocols based upon a policy
US20070143470A1 (en) * 2005-12-20 2007-06-21 Nortel Networks Limited Facilitating integrated web and telecommunication services with collaborating web and telecommunication clients
US20080103923A1 (en) * 2006-10-31 2008-05-01 Digital River, Inc. Centralized Payment Gateway System and Method
US8553573B2 (en) * 2007-04-13 2013-10-08 Hewlett-Packard Development Company, L.P. Apparatus and method for adaptive throttling of traffic across multiple network nodes
US20090268715A1 (en) * 2008-04-24 2009-10-29 Oracle International Corporation System and Method for Providing Service Correlation in a Service Access Gateway Environment
US8296409B2 (en) * 2008-05-19 2012-10-23 International Business Machines Corporation Method for enabling on-demand communication services
US8019886B2 (en) * 2009-08-19 2011-09-13 Opanga Networks Inc. Systems and methods for enhanced data delivery based on real time analysis of network communications quality and traffic
US20110082920A1 (en) * 2009-10-07 2011-04-07 International Business Machines Corporation Change Management in Multi-Domain Environments
US8321565B2 (en) * 2009-11-02 2012-11-27 Verizon Patent And Licensing Inc. Network usage throttling systems and methods

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012023050A2 (en) 2010-08-20 2012-02-23 Overtis Group Limited Secure cloud computing system and method
US20120060212A1 (en) * 2010-09-03 2012-03-08 Ricoh Company, Ltd. Information processing apparatus, information processing system, and computer-readable storage medium
US9286126B2 (en) * 2010-09-03 2016-03-15 Ricoh Company, Ltd. Information processing apparatus, information processing system, and computer-readable storage medium
US8429282B1 (en) * 2011-03-22 2013-04-23 Amazon Technologies, Inc. System and method for avoiding system overload by maintaining an ideal request rate
US20130024494A1 (en) * 2011-06-13 2013-01-24 Steven Guarrieri Methods and systems for platform optimized design
US8645546B2 (en) 2011-06-17 2014-02-04 Futurewei Technologies, Inc. Cloud service control and management architecture expanded to interface the network stratum
US10542076B2 (en) 2011-06-17 2020-01-21 Futurewei Technologies, Inc. Cloud service control and management architecture expanded to interface the network stratum
US9948696B2 (en) 2011-06-17 2018-04-17 Futurewei Technologies, Inc. Cloud service control and management architecture expanded to interface the network stratum
US8793380B2 (en) * 2011-06-17 2014-07-29 Futurewei Technologies, Inc. Cloud service control and management architecture expanded to interface the network stratum
US20120324082A1 (en) * 2011-06-17 2012-12-20 Futurewei Technologies, Inc. Cloud Service Control and Management Architecture Expanded to Interface the Network Stratum
CN103023762A (en) * 2011-09-27 2013-04-03 阿尔卡特朗讯公司 Cloud computing access gateway and method for providing access to cloud provider for user terminal
US20130080509A1 (en) * 2011-09-27 2013-03-28 Alcatel-Lucent Shanghai Bell Co. Ltd. Cloud computing access gateway and method for providing a user terminal access to a cloud provider
US9002932B2 (en) * 2011-09-27 2015-04-07 Alcatel Lucent Cloud computing access gateway and method for providing a user terminal access to a cloud provider
US8935377B2 (en) 2012-10-29 2015-01-13 At&T Intellectual Property I, L.P. Dynamic registration of listener resources for cloud services
WO2015026389A3 (en) * 2012-12-27 2015-07-16 Sequitur Labs, Inc. Utilizations and applications of near field communications in mobile device management and security
US8990917B2 (en) * 2012-12-27 2015-03-24 Alcatel Lucent Authentication of applications that access web services
US20140189845A1 (en) * 2012-12-27 2014-07-03 Yigang Cai Authentication of applications that access web services
US20140200947A1 (en) * 2013-01-15 2014-07-17 Xerox Corporation Methods and systems for regulating service layer agreements for multiple cloud service requests
US10210468B2 (en) 2013-01-15 2019-02-19 Xerox Corporation Methods and systems for regulating service layer agreements for multiple cloud service requests
US10462185B2 (en) 2014-09-05 2019-10-29 Sequitur Labs, Inc. Policy-managed secure code execution and messaging for computing devices and computing device security
US10685130B2 (en) 2015-04-21 2020-06-16 Sequitur Labs Inc. System and methods for context-aware and situation-aware secure, policy-based access control for computing devices
US11847237B1 (en) 2015-04-28 2023-12-19 Sequitur Labs, Inc. Secure data protection and encryption techniques for computing devices and information storage
US11425168B2 (en) 2015-05-14 2022-08-23 Sequitur Labs, Inc. System and methods for facilitating secure computing device control and operation
US20180217871A1 (en) * 2015-07-31 2018-08-02 Hewlett Packard Enterprise Development LP. Discovering and publishing api information
US11714685B2 (en) * 2015-07-31 2023-08-01 The Conundrum Ip Llc Discovering and publishing API information
US9577916B1 (en) * 2015-12-03 2017-02-21 International Business Machines Corporation Gateway flow plugin containers
US10700865B1 (en) 2016-10-21 2020-06-30 Sequitur Labs Inc. System and method for granting secure access to computing services hidden in trusted computing environments to an unsecure requestor
US11070446B2 (en) 2017-10-24 2021-07-20 At&T Intellectual Property I, L.P. Intelligent network resource orchestration system and method for internet enabled device applications and services
US11012362B2 (en) 2018-06-18 2021-05-18 Akamai Technologies, Inc. Download management with congestion mitigation for over the air content delivery to vehicles
US10667172B2 (en) 2018-06-18 2020-05-26 Akamai Technologies, Inc. Download management with congestion mitigation for over the air content delivery to vehicles
WO2019245821A1 (en) 2018-06-18 2019-12-26 Akamai Technologies, Inc. Download management with congestion mitigation for over the air content delivery to vehicles

Also Published As

Publication number Publication date
US20110170505A1 (en) 2011-07-14
US9432825B2 (en) 2016-08-30
US8605667B2 (en) 2013-12-10
US20110173107A1 (en) 2011-07-14

Similar Documents

Publication Publication Date Title
US20110173108A1 (en) Gateway for enabling cloud-based service exposure
US11005765B2 (en) System and method for managing and distributing packet flow descriptions in a telecommunications network
US7895353B2 (en) System and method for providing throttling, prioritization and traffic shaping during request processing via a budget service
US9143540B2 (en) System and method for providing service correlation in a service access gateway environment
Yavatkar et al. A framework for policy-based admission control
US10069773B2 (en) System and method for enabling dynamic multi-modal communication
US7953877B2 (en) System and method for controlling data flow based upon a temporal policy
EP2289283B1 (en) Method and system for providing mobility management in network
US7873716B2 (en) Method and apparatus for supporting service enablers via service request composition
Yavatkar et al. Rfc2753: A framework for policy-based admission control
Abolfazli et al. MOMCC: market-oriented architecture for mobile cloud computing based on service oriented architecture
EP1599017A1 (en) Securing web services
US20040215711A1 (en) Mobile services platform architecture
US20090137227A1 (en) Federated Virtual Network of Communications Services
Yamato et al. Development of service control server for web-telecom coordination service
US20150326497A1 (en) Group based policy management
US20140032650A1 (en) System and method for providing network management in user devices
Maes Service delivery platforms as IT Realization of OMA service environment: service oriented architectures for telecommunications
Claffy et al. Adding enhanced services to the internet: Lessons from history
Chainho et al. Decentralized communications: trustworthy interoperability in peer-to-peer networks
US11720507B2 (en) Event-level granular control in an event bus using event-level policies
US8787386B2 (en) Systems and methods for creating composed communication services
US11470048B1 (en) Virtual private network environments for serverless code executions
Sliwa et al. Adaptive web services supported by Qos IP network
Lee et al. Web Services deployment model based on WSG (Web Services gateway) in NGN

Legal Events

Date Code Title Description
AS Assignment

Owner name: ORACLE INTERNATIONAL CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:RAJASEKAR, SHARATH;O'DOHERTY, PHELIM;SELITSER, BORIS;SIGNING DATES FROM 20110126 TO 20110228;REEL/FRAME:025953/0557

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION