摘要:
A system and methods for controlling identity privacy in a communication session include processing, at a communication server, a request from a first participant of the communication session to add a second participant to the communication session. Based on the request, the communication server establishes a set of privacy rules related to the second participant that control sharing of identity information between the second participant and a third participant of the communication session.
摘要:
A method and device for enabling selective privacy in a push to talk (PTT) wireless group communication session provides improved control over sharing of user identity information. The method includes processing at a PTT server a request for selective privacy. The PTT server then processes one or more selective privacy parameters, whereby at least a first session participant is enabled to receive an identification of a second session participant and a third session participant is not enabled to receive an identification of the second session participant. The PTT server then facilitates the PTT wireless group communication session between at least the first session participant, second session participant, and third session participant according to the one or more selective privacy parameters.
摘要:
A client entity generates a subscription to a presentity that includes a sequence of events which define a trigger that controls when a presence server sends a notification to the client entity; and the subscription further indicates a time period parameter for the sequence of events. Upon receiving the subscription, the presence server receives and monitors presence information based on the indicated time period parameter to detect an occurrence of the sequence of events, and sends the notification to the client entity when the presence information satisfies the trigger.
摘要:
In a communications system, a presence server maintains and distributes presence information in accordance with recording rules and previous value selection rules. The presence server: associates a recording rule with each presence information element in a subset of a plurality of presence information elements for a presentity; maintains a set of previous values according to the recording rule associated with the presence information element, for each presence information element in the subset; receives an initial subscribe request from a watcher for one or more presence information elements in the subset; and in response to the initial subscribe request, notifies the watcher of a number of the previous values maintained for each presence information elements in the subscribe request, wherein the number of the previous values that is sent is determined by a previous value selection rule associated with each presence information element.
摘要:
In a group communications system, a group watcher module subscribes to presentities of interest for a particular group by communicating, to at least one presence server module, a set of subscriptions to a plurality of presentities, wherein each subscription contains a set of event notification criteria for a presentity. When the group watcher module detects a change in presence information for the set of subscriptions, it determines current members of the group and distributes the change in presence information to the current members.
摘要:
A system and methods for controlling identity privacy in a communication session include processing, at a communication server, a request from a first participant of the communication session to add a second participant to the communication session. Based on the request, the communication server establishes a set of privacy rules related to the second participant that control sharing of identity information between the second participant and a third participant of the communication session.
摘要:
A system and methods for increasing the granularity of privacy control in a group communication session are presented. A privacy rule is established for a participant in the session. The privacy rule specifies for different identity sharing triggers whether the participant identity is to be shared with other participants in the session. The privacy of the participant is able to be different dependent on the particular identity sharing trigger. The privacy rule is set by participant initiating the session, a separate server, or the participant. In the last case, the participant is able to specify privacy for a media or data stream when requesting the floor to transmit the stream. The identity of the participant is automatically modified dependent on session context information.
摘要:
A method for transmitting data from a participant device in a session in an Internet Protocol (IP) system (100) is provided. The method comprises sending (405) one or more a first Real-time Transport Protocol (RTP) packet of the session to a first address. The method further comprises sending (410) one or more a first Real-time Transport Control Protocol (RTCP) packet of the session to a second address. The participant device sends the one or more a first RTP packet and the one or more a first RTCP packet.
摘要:
An infrastructure device in a 3GPP compliant system performs a method to allocate MBMS bearers. The 3GPP compliant system includes a RAN partitioned into a plurality MBMS services areas, wherein each MBMS service area has a plurality of pre-established MBMS bearers for transporting media streams. The infrastructure device: receives a request to transmit a media stream to a communication group; selects a set of the MBMS service areas for transporting the media stream; determines an available MBMS bearer in each selected MBMS service area to assign to transport the media stream; and identifies the assigned MBMS bearers to members of the communication group. In addition, a UE performs a method for MBMS service area location update in the 3GPP compliant system. Accordingly, the UE: determines a 3GPP MBMS service area in which the UE is currently located; and identifies the 3GPP MBMS service area to an infrastructure device.
摘要:
Methods for increasing encryption synchronization availability include collecting encryption synchronization data from a first superframe received at a gateway. The encryption synchronization data is for decrypting media in a second superframe also received at the gateway. The encryption synchronization data from the first superframe is used to form a composite encryption synchronization codeword for decrypting media in a third superframe formed by the gateway, wherein the third superframe includes the composite encryption synchronization codeword and at least a portion of the media from the second superframe. The third superframe is sent to a receiving device so that media in the third superframe can be decrypted by the receiving device using the composite encryption synchronization codeword that is included in the same superframe as the media that is being decrypted.