Abstract:
Method and apparatus of supporting selection of operator connection offers for a Machine to Machine equipment (10) comprised in a communication network. A network node (14) receives (42) a operator connection request from the Machine to Machine equipment (10) and obtains (44) operator connection offers for the Machine to Machine equipment (10) wherein each offer originates from a separate operator. The network node (14) selects (46) one or more of the obtained offers and sends (48) the selected offers to a decision entity associated with the Machine to Machine equipment (10), for selecting one of the selected offers.
Abstract:
An IMS node communicating with a user node and an information node is provided. The information node is adapted to conduct access control based on IMS Public User Identity. The IMS node comprises: request mediation means for mediating an access request from the user node to the information node by converting a first protocol conforming to IMS into a second protocol interpretable to the information node; and response mediation means for mediating an access response from the information node to the user node by converting the second protocol into the first protocol. The access request includes the IMS Public User Identity and information identity specifying information which the information node is requested to retrieve.
Abstract:
A method and apparatus for enabling user services in a communication network with a plurality of terminal users. An initiating user terminal (200) executes a group discovery process with the terminals (202) to form a user group. Capabilities are exchanged with the terminals, including at least one of: functional resources, available services, equipment information, applications or data programs, and current traffic or connection characteristics When a group service request (R) is received from a user terminal (D) in the group, functions and actions required for the requested service are assigned to functional resources in the terminals based on the exchanged terminal capabilities. The requested group service can then be consumed by means of these functional resources without involving an operator controlled group management server.
Abstract:
Systems and methods according to the present invention address this need and others by providing methods and systems for translating media encrypted by various Digital Rights Management (DRM) techniques. This allows end user equipment to receive media in an IMS/IPTV environment when the end user equipment uses a DRM that is different from the media server which is providing the desired media in both unicast and multicast applications.
Abstract:
A method is provided which enables ratings data registered by a number of users for a first service and at least one corresponding service to be collected, wherein each user have been federated for a Single-Sign-On (SSO) on the first service as well as on the corresponding service/s. In response to a request for a set of ratings data received from a user requesting for the first service, a group of users is identified and the SSO identity of each SSO federated user of the identified group of users is mapped to one or more service identities of the respective SSO federated user. The mapping enables ratings data associated with the SSO users of the identified group of SSO users to be collected and normalized, such that the requested ratings data can then be provided to the requesting user in a unified format.
Abstract:
Method and apparatus for checking an aggregated web service requested by a terminal user (200). A web service authentication node (208) receives and stores a published description of the aggregated web service, as offered from a primary web service provider (204) and involving one or more sub-services offered from one or more secondary web service providers (206a,b). When the authentication node (208) receives a request made by the user for the aggregated web service, it is checked whether the sub-services and secondary service providers of the aggregated web service are acceptable for the user according to a policy of the user. If all sub-services and secondary service providers are deemed acceptable or safe, the aggregated web service can be authenticated. Otherwise, the request is rejected or the user is warned that the aggregated web service is deemed unsafe. Thereby, access to sensitive user data by secondary service providers can be controlled and made visible.
Abstract:
A method and apparatus for monitoring the behaviour of an individual communication client (200) in relation to the behaviour of a group of communication clients. A client database (202a) collects client data based on activities reflecting the individual client's behaviour, where the collected client data forms a resulting client behaviour profile (GP). A comparing unit (202b) compares the collected client data with a behaviour profile (GP) of the client group reflecting the behaviour of the client group. An alert generator (202c) then issues an alerting signal (A) if an unacceptable behavioural deviation between the individual client and the client group is detected.