摘要:
A method and a system are disclosed for making available telecommunication network resources associated with network subscribers and exposed by a Network Service Gateway (NSG) to clients of the NSG services based on stored subscriber availability preferences. The method and system can be implemented using an availability Policy Server that sits next to or inside of the NSG. The Policy Server interprets the stored availability preferences of subscribers in response to requests for subscriber information. These availability preferences are translated into a low-level policy rule language. The Policy Server implements a policy rule evaluator to evaluate policies written in this language. Policies written in the low-level language are referred to as aPolicies (availability policies). An aPolicy receives as input a stream of events. Based on these events, the aPolicy may decide to take one or more actions. The NSG or clients of the NSG will carry out the execution of the actions.
摘要:
A method and a system are disclosed for obtaining the dynamic network state of mobile subscribers, such as subscriber location, presence or other state information. This information, which may be distributed within various core mobile network elements, is obtained via a differentiated network service gateway (DNSG) that interfaces with the mobile network elements in a manner that accommodates the network's operator enforced controls and limitations. The DNSG implements service level agreements (SLAs) that support differentiated quality-of-service (QoS) in terms of accessing the dynamic network state of the mobile subscribers. The consumers (DNSG clients) of the dynamic network state information may include applications that provide communication and transactional services to mobile subscribers based on their network state, and the mobile subscribers themselves. The consumers register with the DNSG for SLAs to obtain a desired QoS that determines the precision and speed at which the network service functions for their exclusive use. The DNSG uses the SLAs to allocate available resources to the consumers and for scheduling queries to the core network elements so as to obtain the network state of the mobile subscribers according to the requirements of the SLAs.
摘要:
A method and a system for supporting rendezvous based instant group conferencing among mobile users allows a conference originator to initiate and setup instant group conferencing to a set of participants even when the participants may not be immediately available to commit to the conference call at the time of its initiation. All negotiations for obtaining commitments from the participants are performed by the system, thus relieving the originator of the time consuming task of negotiating with the participants. The system automatically decides as to when to actually dial out to the participants to setup the conference call after obtaining commitment from all (or a quorum of) required participants.
摘要:
A system and related method for supporting non-intrusive and effective voice communication among mobile users in which voice calls between mobile users are managed based on callee availability, caller-callee relationships, and non-intrusive information exchange, including interactive exchange at the time of call setup but prior to the call being answered. Callee availability can be based on callee device status, calendar activities, location, past behavior and other factors. The caller-callee relationships specify whether the callee is available, unavailable or on restricted availability relative to the caller. The interactive exchange can be implemented using voice and/or text/graphic displays on caller and callee mobile device. Callees are provided with options for handling the call. Callers are provided with information regarding the callee's current and future availability and willingness to receive a voice call from the caller, thus maximizing the chance of caller reaching the callee on every voice call.
摘要:
A system and related method for supporting non-intrusive and effective voice communication among mobile users in which voice calls between mobile users are managed based on callee availability, caller-callee relationships, and non-intrusive information exchange, including interactive exchange at the time of call setup but prior to the call being answered. Callee availability can be based on callee device status, calendar activities, location, past behavior and other factors. The caller-callee relationships specify whether the callee is available, unavailable or on restricted availability relative to the caller. The interactive exchange can be implemented using voice and/or text/graphic displays on caller and callee mobile device. Callees are provided with options for handling the call. Callers are provided with information regarding the callee's current and future availability and willingness to receive a voice call from the caller, thus maximizing the chance of caller reaching the callee on every voice call.
摘要:
Described herein are methods, systems, apparatuses and products for predictive placement of content through network analysis. An aspect provides for intercepting content upload data provided by one or more users indicating content at a network location; ascertaining one or more users predicted to access said content based on said one or more users providing said content upload data; and placing said content to one or more other network locations based on said one or more users predicted to access said content. Other embodiments are disclosed.
摘要:
Methods and apparatus for providing role-based access control of a resource by a subject in an access control system are provided. The system comprises one or more roles capable of association with one or more subjects, and a plurality of permission sets. One or more of the plurality of permission sets are associated with each of the one or more roles. The system further comprises a plurality of resources. One or more of the plurality of resources are associated with each of the one or more permission sets, and each of the plurality of resources is associated with a set of one or more subjects. A given subject in a set of one or more subjects for a given resource and having a role-permission association with the given resource is provided access control of the given resource.
摘要:
Methods and apparatus for providing role-based access control of a resource by a subject in an access control system are provided. The system comprises one or more roles capable of association with one or more subjects, and a plurality of permission sets. One or more of the plurality of permission sets are associated with each of the one or more roles. The system further comprises a plurality of resources. One or more of the plurality of resources are associated with each of the one or more permission sets, and each of the plurality of resources is associated with a set of one or more subjects. A given subject in a set of one or more subjects for a given resource and having a role-permission association with the given resource is provided access control of the given resource.
摘要:
A method for determining similarity of two policies includes providing a first policy with n rules and a second policy with m rules, wherein each rule is structured into a plurality of identifiable elements, categorizing the rules in each policy based on an action, for each pair of rules finding those predicates whose attribute names match, computing an attribute similarity score for the attribute values, summing the attribute similarity scores for all pairs to obtain an element similarity score, and computing a rule similarity score for the pair of rules from a weighted sum of said element similarity scores.
摘要:
A method for determining similarity of two policies includes providing a first policy with n rules and a second policy with m rules, wherein each rule is structured into a plurality of identifiable elements, categorizing the rules in each policy based on an action, for each pair of rules finding those predicates whose attribute names match, computing an attribute similarity score for the attribute values, summing the attribute similarity scores for all pairs to obtain an element similarity score, and computing a rule similarity score for the pair of rules from a weighted sum of said element similarity scores.