Abstract:
A method and policy execution engine (PExE) (305) for regulating an incoming call in a communication system (405) is provided. The method comprises determining (105) a context of the incoming call. The method further comprises invoking (110) one of a personalization policy and at least one group policy of the callee of the incoming call in response to determination of the context of the incoming call. The group policy is unknown to the caller of the incoming call.
Abstract:
A method and policy execution engine (PExE) (305) for regulating an incoming call in a communication system (405) is provided. The method comprises determining (105) a context of the incoming call. The method further comprises invoking (110) one of a personalization policy and at least one group policy of the callee of the incoming call in response to determination of the context of the incoming call. The group policy is unknown to the caller of the incoming call.
Abstract:
A method and system for transmitting a message in a communication network (100) is disclosed. The method at a network device (108) includes receiving (304) a message composed over a special interface, from a client device (102) in the communication network. The special interface allows a user of the client device to compose a message to which an additional content can be added. Further, the method includes inserting (306) additional content to the message. The additional content is selected based on a set of predefined criteria. Furthermore, the method includes transmitting (308) the message and the additional content to each communication device associated with each of one or more identifiers. The message is associated with the one or more identifiers. Each of the one or more identifiers is associated with a communication device of the communication network.
Abstract:
A networked identity provider can provide (101) an opportunity to a user to establish a dependency between, on the one hand, at least one item of information in a first networked identity provider user identity as is maintained by that networked identity provider and, on the other hand, at least one item of information in a second networked identity provider with which the first networked identity provider can be federated. This networked identity provider can then facilitate establishment (102) of that dependency. These teachings will further support the provision of an opportunity (103) to also establish relative user characterization levels with respect to these items of information to thereby influence subsequent sharing of identity information as between the first and the second networked identity providers.
Abstract:
A method for providing action information about an identity of a communication device to a relying party in an identity federation environment is disclosed, in accordance with an embodiment of the present invention. The communication device has an identity-based relationship with an asserting party. The method includes, monitoring an action performed in the identity federation environment by the communication device. The action is monitored at the asserting party. Further, the method includes, generating an identity federation token based on the action performed in the identity federation environment. The identity federation token is associated with the identity of the communication device. The identity token indicates information associated with the action to the relying party. Furthermore, the method includes sending the identity federation token to the relying party. The identity federation token indicates the action information to the relying party.
Abstract:
A method for providing information about an identity of a communication device to a relying party in an identity federation environment is disclosed. The method includes receiving a first token that is associated with a first identity. The first token includes a set of pre-defined constraints. The method further includes receiving a second token that is associated with a second identity. The second token is used to satisfy the set of pre-defined constraints of the first token. Furthermore, the method includes indicating the first identity and the second identity to the relying party. The first identity and the second identity provide information about the identity of the communication device.
Abstract:
A method for providing action information about an identity of a communication device to a relying party in an identity federation environment is disclosed, in accordance with an embodiment of the present invention. The communication device has an identity-based relationship with an asserting party. The method includes, monitoring an action performed in the identity federation environment by the communication device. The action is monitored at the asserting party. Further, the method includes, generating an identity federation token based on the action performed in the identity federation environment. The identity federation token is associated with the identity of the communication device. The identity token indicates information associated with the action to the relying party. Furthermore, the method includes sending the identity federation token to the relying party. The identity federation token indicates the action information to the relying party.
Abstract:
A method and policy execution engine (PExE) (305) for regulating an incoming call in a communication system (405) is provided. The method comprises determining (105) a context of the incoming call. The method further comprises invoking (110) one of a personalization policy and at least one group policy of the callee of the incoming call in response to determination of the context of the incoming call. The group policy is unknown to the caller of the incoming call.
Abstract:
A method for providing information about an identity of a communication device to a relying party in an identity federation environment is disclosed. The method includes receiving a first token that is associated with a first identity. The first token includes a set of pre-defined constraints. The method further includes receiving a second token that is associated with a second identity. The second token is used to satisfy the set of pre-defined constraints of the first token. Furthermore, the method includes indicating the first identity and the second identity to the relying party. The first identity and the second identity provide information about the identity of the communication device.