Abstract:
The invention relates to a method, a map providing device, a computer program and a computer program product for presenting a digital map via a map presenting unit of a user terminal. An object (01) and a first position (Pl) of this object are obtained together with a digital map (Ml) comprising a reference position (RP) and the first position (Pl). A line (Ll) is determined, which at one end is to be connected to the reference position and at another opposite end to the first position. Then a geographical area (Al) of the digital map including the reference position is presented. If the first position (Pl) is outside of the geographical area then a part (LlA) of the line stretching through the geographical area is presented. If not no line is presented. The appearance of the line when presented is dependent on the distance between the reference position and the first position.
Abstract:
Node, computer software and method for preventing an external party (114) to map an identity of a network cell (122) of a telecommunication network (112 or 120) with a corresponding geographical location of the network cell (122). The method includes receiving at a base station (200) of the telecommunication network (112 or 120) system information from a radio network controller (203) of the telecommunication network (112 or 120); extracting, at the base station (200), the identity of the network cell (122) from the received system information; changing, at the base station (200), the identity or one of multiple parts of the identity of the network cell (122); and sending the changed identity or the one of multiple parts of the identity to a user terminal (80).
Abstract:
A method and a system for providing call management based on geographical location of an electronic communication device. Based on the location or rather a position area of the electronic communication device, a local policy is determined and is employed to a call service serving the electronic communication device.
Abstract:
In a method and arrangement for providing a reliable location for a communication terminal (A), a first location (L1) is obtained for the terminal by means of a first access mechanism (304. A second location (L2) is also obtained for the terminal by means of a second access mechanism (306), and the obtained first and second locations are then compared. The location of the terminal is validated if the obtained first and second locations are found to be substantially equal. Thereby, a more reliable location of the terminal can be used to support communication services requiring or needing such position information, such as emergency services. The validated location of the terminal can also be used for validating the location of an end point used by the terminal in an access network with fixed end points, or for validating a used positioning mechanism.
Abstract:
The present invention relates to methods and arrangements for rendering a radio service. The radio service signal broadcasted to radio devices is divided into a plurality of different signals. The different signals may be retrieved via different channels and from different sources. Hence, the radio service signal is at least divided into a DJ signal containing a program guide and e.g. DRM keys, which may be retrieved from a media server e.g. hosted by a provider providing a radio channel and a payload signal, which may be retrieved from memory storage in device or a content server, with the payload (typically music). According to an embodiment of the present invention the radio signal comprises further a host signal. The host signal comprises voice content, commercial advertisements etc. The host signal may be retrieved from a content server e.g. hosted by the provider providing the radio channel. The radio service may be created by combining the DJ signal, the radio host signal and the payload signal, wherein the service is mastered by the DJ signal.
Abstract:
Handset (80), computer software and method for protecting sensitive network information, available in the handset (80), from disclosure to an unauthorized server, by using an abstraction function module (200 or 1400), the handset (80) being connected to a network (112). The method includes receiving at the abstraction function module (200 or 1400) an encoding key (KE) from an abstraction server (210); receiving at the abstraction function module (200 or 1400) a request from a client or application (106) for providing the sensitive network information from a control plane module (100 or 1420) of the handset (80), wherein the client or application (106) resides in a user plane module (104 or 1410), which is different from the control plane module (100 or 1420), the sensitive network information is stored in the control plane module (100 or 1420) of the handset (80), and both the control plane module (100 or 1420) and the user plane module (104 or 1410) reside in the handset (80); retrieving by the abstraction function module (200 or 1400) the requested sensitive network information from the control plane module (100 or 1420); encrypting, by the abstraction function module (200 or 1400), the retrieved sensitive network information based on the received encoding key (KE); and providing the encrypted sensitive network information to the client or application (106) in the user plane module (104 or 1410).
Abstract:
A new IMS NLR (Network Location Registry) -node (23) arranged to store information related to the one or more Access Networks (28a-c) to which an IMS user is attached, and the information can be used by a Location Server (22) in determining the geographic location of the IMS user. The stored information comprises the public identities, IMPUs, associated with the private identity of the IMS user, and the Access Networks associated with each IMPU, and in which the IMPU is explicitly registered.
Abstract:
Methods and devices for encoding and decoding secure data entities are presented, which use at least parts of broadcast control messages (13) used by a cellular communications system (18) to which an intended user (10) is connected for obtaining suitable keys. Since the broadcast control messages (13) are sent continuously, the invention works without additional signaling when the application or content is actually used. The broadcast control messages (13) can also be different from time to time and/ or from cell to cell, which opens up for usage restrictions both in space and in time. The present invention can also be operable on secure data entities provided in any transmission format supported by the user device (10), not only for secure data entities provided through the cellular communications system (18) itself.
Abstract:
In a cellular communications network, text messages, unique for a certain group of base stations (2) at each instant, are broadcast to mobile terminals (6). The mobile terminals (6) include the text message or a text derived based on at least the text message as a part of a position dependent service request data packet. The data packet is sent to a service provider (30). The included text is interpreted, e.g. in the communications system or in the service provider (30), as a position or location associated with the base station (2) group that broadcast the text message. The position dependent service is then provided based on the interpreted position or location.
Abstract:
Methods and systems for obscuring network topologies are described. Cell re-planning techniques can be used to modify cell identities to obscure a relationship between nodes in a communication system and their geographical location. One or more algorithms can be used to operate on, e.g., cell plan lists, cell neighbor lists and/or cell identities.