Abstract:
In some examples, context information is determined. The context information is associated with a user and based on information of a communication device associated with the user. The context information is obfuscated based on a user information, such privacy policy, user profile, user preferences, user activity, and/or any combination of the aforementioned, associated with the user. In other examples, the context information is determined based on a user location and/or user information.
Abstract:
A wireless network with distributed medium access control allows establishing of a virtual channel between a source node and a destination node via at least one intermediate node. The virtual channel may be established for the entire duration of a communication between the source node and the destination node, and, to establish the virtual channel, a request handler can transmit a virtual channel request, requesting an allocation of transmission resources for the virtual channel. Based on the virtual channel request, a virtual channel confirmation can be generated by the destination node and can be returned to the source node, indicating an allocation of the resources for the virtual channel. A communication handler can then transmit data from the source node to the destination node using the available transmission resources.
Abstract:
For a service which is provided in at least one communications network preferably an Internet with service classes—which transmits packets and/or packet streams on a packet-oriented basis as a function of Qualities of Service, use of a service is requested with a controller, and this controller allocates a Quality of Service for the requested use as a function of the service and/or of the requested use of the service. A VoIP service implemented in accordance with International Standard H.323 can thus be used with a required Quality of Service.
Abstract:
Transmission resources of one or more individual transmission links, especially of individual transmission bottlenecks, are managed by a resource manager. In the course of a setting up of a connection, the resource manager determines, by using an item of connection information, the origin and destination of the connection to be set up, and identifies whether this connection is routed over a particular transmission link. Based on the result of the determination, a message is subsequently generated and transmitted to the origin of the connection. A selection of transmission resources to be used for the connection is then carried out based on the transmitted message.
Abstract:
A method establishes a connection between a source network with a source network resource manager and a target network with a target network resource manager. According to the method, a connection control unit of the source network transmits a connection establishment signal to a connection control unit of the target network and—parallel to this—a reservation request to the target network resource manager. The target network resource reserves the requested resources and forwards the reservation request towards the target network resource manager, which also reserves the requested resources and transmits reservation information regarding the success of the resource reservations to the connection control unit of the target network.
Abstract:
Data packets of a packet-switching network for which transmission of a requested quality is to be assured, are routed via an alternate network. In a source node, such data packets are respectively identified by a bit pattern known to an access node, which is connected to the source node, either directly or indirectly, via at least one intermediate node. The bit pattern is recognized upon arrival in the access node, and as a result of identifying the data packets with the known bit pattern, the data packets are re-routed onto the alternate network.
Abstract:
Location information is provided with an authenticator in order to enable future providing of an authentication to a service or application making use of the location information. The authenticator is based on a cryptographic method known by a provider and recipient of and also optionally based on position data provided by the location information. The authenticator is carried as a watermark in the location information so that the location information can be used by prior existing systems and enables the authentication of the location information in compatible authentication enabled systems. On receiving the location information, an authentication enabled recipient obtains the authenticator from the location information and checks using the authenticator whether use of the location information may be allowed.
Abstract:
A method for performing a handover in a mesh network for a plurality of nodes (A, A′, B) of said mesh network from a first access point (AP1) to a second access point (AP2), whereas said plurality of nodes (A, A′, B) forms a tree of nodes, said tree comprising a root node (B) and one or more further nodes (A,A′) connected to said root node either directly or via intermediate nodes, and said handover being performed for said tree of nodes in a coordinated fashion, said method comprising: forwarding to said members of said tree (A, A′, B) information about said second access point (AP2) and timing information to enable a coordinated handover of said nodes of said tree; switching said root node (B) and said further (A,A′) nodes from said first access point to said second access point according to said timing information.
Abstract:
A method, apparatus, and computer program product are provided for providing point of interest navigation services. An apparatus may include a processor configured to receive a request for navigation instructions comprising an origin location and a destination location. The processor may be further configured to determine a route between the origin location and the destination location. The processor may additionally be configured to determine one or more points of interest along the route based at least in part upon prior usage data associated with each point of interest. The prior usage data may be received and aggregated from users of a navigation system. The processor may also be configured to provide navigation instructions comprising the one or more determined points of interest. Corresponding methods and computer program products are also provided.
Abstract:
Location information is provided with an authenticator in order to enable future providing of an authentication to a service or application making use of the location information. The authenticator is based on a cryptographic method known by a provider and recipient of and also optionally based on position data provided by the location information. The authenticator is carried as a watermark in the location information so that the location information can be used by prior existing systems and enables the authentication of the location information in compatible authentication enabled systems. On receiving the location information, an authentication enabled recipient obtains the authenticator from the location information and checks using the authenticator whether use of the location information may be allowed.