摘要:
Aspects describe using a network element to facilitate scalability within a communication network and to provide policy as a network service in a mobile core network. The network element can be scalable and can be a primary policy access gateway for a first geographic region and can be a secondary policy access gateway for at least a second geographic region. The first geographic region and the second geographic region can have portions that overlap. Further, the network element can hide topology of the home network from roaming partners.
摘要:
Devices, systems, and methods for managing personal information by providing a centralized source or database for a user's information, and enabling the user to regulate privacy levels for each information item or category of information. Templates are provided as a table of hierarchies, or an onion layers model. Private information may be stored in an inner layer while public information may be stored in an outer layer, with the ability to define and customize multiple layers and categories within the template. A requesting entity requests information via a disseminating server that acts as a gateway for authenticating, authorizing, and providing access to the requesting entity. The user may therefore control and regulate their online presence simply by monitoring who requests their information and adjusting privacy levels accordingly.
摘要:
The subject disclosure provides devices, methods, and computer readable programs for establishing a secure wireless connection among a plurality of displays thus forming a screen for purposes of depicting a larger version of a content. The formation of the screen may be initiated by a master display detecting a presence of a plurality of slave displays in the master display's vicinity and requesting permission to connect to the detected slave displays. Furthermore, provided are methods and computer-executable programs that may facilitate easier collaboration and exchange of the content among users, a real-time adjustment of the content displayed on the screen, as well as an easier depiction of 3-dimensional content on a screen created by arranging the plurality of displays in a 3-dimensional configuration.
摘要:
Aspects describe using a Policy Access Gateway to facilitate scalability within a communication network and to provide a solution to deploy an enhanced policy gateway. The Policy Access Gateway can enhance standard defined Diameter Routing Agent (DRA) functions with session binding mechanisms. Further, the Policy Access Gateway is scalable and can be deployed in a very large network that supports hundreds of millions of users. Further, the Policy Access Gateway can provide additional policy information to enable policy information consolidation and caching capabilities.
摘要:
A cache server disposed in a motor vehicle receives and caches content from a content distribution network when a load of a cellular link to the content distribution network is low. The cache server determines that the motor vehicle is turned off, broadcasts a wireless signal as part of a wireless network when the motor vehicle is turned off, and provides a device access to the content cached in the cache server via the wireless network.
摘要:
A cache server disposed in a motor vehicle receives and caches content from a content distribution network when a load of a cellular link to the content distribution network is low. The cache server determines that the motor vehicle is turned off, broadcasts a wireless signal as part of a wireless network when the motor vehicle is turned off, and provides a device access to the content cached in the cache server via the wireless network.
摘要:
Aspects describe using a network element to facilitate scalability within a communication network and to provide policy as a network service in a mobile core network. The network element can be scalable and can be a primary policy access gateway for a first geographic region and can be a secondary policy access gateway for at least a second geographic region. The first geographic region and the second geographic region can have portions that overlap. Further, the network element can hide topology of the home network from roaming partners.
摘要:
A service platform for providing mobility and for actively managing intelligent mobile services is described. At least some embodiments of the invention comprise a platform that actively manages different services (e.g., as classified by priority and delivered and billed accordingly). In particular, embodiments of the present invention contemplate delivering services such as high priority traffic like voice and messages with different priorities using technologies such as DiffServ, SIP and VoIP to the customer. In this manner, embodiments of the invention provide a service and application platform for real-time, intelligent communication services. In addition, at least some embodiments of the invention contemplate a billing system that enables differential billing for the provision of platform services.
摘要:
A method and non-transitory computer readable medium for provisioning services for machine to machine communication devices in a communications network. For example, the method receives a request from a third party service provider to provision a service to a user of the third party service provider, determines whether a communication network service provider of the communications network and the third party service provider have a pre-existing agreement to provision the service, and provisions the service of the third party service provider to the user via the communications network in accordance with the pre-existing agreement, wherein the user is a subscriber of the communication network service provider.
摘要:
A method, non-transitory computer readable medium and apparatus for processing a request from a server of a machine-to-machine service provider are provided. For example, the method receives the request from the server of the machine-to-machine service provider to communicate with a machine-to-machine device, determines whether to authorize the request based upon a policy in a privacy database, and enables communications between the server of the machine-to-machine service provider and the machine-to-machine device if the request is authorized based upon the policy.