User privacy management apparatus and method in mobile communications system

Inactive Publication Date: 2006-04-13
LG ELECTRONICS INC
View PDF12 Cites 107 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0012] According to another object of the present invention, there is provided a user privacy management apparatus and method in which when a third party requests positioning of a specific user, a user can check whether to transmit the positioning of the corresponding user.

Problems solved by technology

In particular, various privacy authorization (management) services according

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User privacy management apparatus and method in mobile communications system
  • User privacy management apparatus and method in mobile communications system
  • User privacy management apparatus and method in mobile communications system

Examples

Experimental program
Comparison scheme
Effect test

third embodiment

[0079]FIG. 5 illustrates a user privacy management method in a mobile communications system according to the present invention, in which the SET user is queried about whether the positioning resultant value should be transmitted by using a new dedicated message. Preferably, the dedicated message is a session notification (SUPL NOTIFICATION) message.

[0080] Referring to FIG. 5, in the third embodiment of the present invention, for an additional notification, a SUPL NOTIFICATION message and a SUPL NOTIFICATION RESPONSE message are used instead of the SUPL INIT and SUPL START messages. For all other portions in FIG. 5, which are similar to those shown in FIG. 4, detailed explanations therefor have been omitted to prevent the differences between FIGS. 4 and 5 from being obscured.

[0081] The SLP can know whether to grant permission for positioning of user C (case 4) having requested for positioning on the basis of the confirmation result transmitted from the PCE or privacy information having

fifth embodiment

[0091]FIG. 7 illustrates a user privacy management method according to the present invention.

[0092] The fifth embodiment of the present invention shows a SUPL message transmission process for a case of performing a privacy management by dividing the SLP (Home SLP) into a SUPL Location Center (SLC) and a SUPL Positioning Center (SPC) according to their functional aspects. The SLP, as a network component, may include a SPC which is an entity for calculating an actual location and a SLC for managing other functions of the SLP excluding the function for calculating location information, for instance, roaming, resource managing, and the like.

[0093] That is, the fifth embodiment corresponds to an example in which the SLP is divided into the SPC for calculating a location by exchanging messages with the actual SET, and the SLC for performing other functions of the SLP excepting the function for calculating the location information, so that the SPC performs the positioning process directly wi

sixth embodiment

[0101]FIG. 8 illustrates a user privacy management method of a mobile communications system according to the present invention.

[0102] The sixth embodiment illustrates a procedure in which, when the location of the SET is completely calculated through the SUPL positioning process, the SUPL session is terminated, and the user notification is transmitted to the SET at another positioning session according to a user privacy setting.

[0103] Referring to FIG. 8, first, steps (S80 to S85) therein are the same as those steps (S60 to S65) shown in FIG. 6 except their numerals, and detailed explanations therefor have been omitted. That is, operations in the fourth embodiment and the sixth embodiment of the present invention may be different from each other after calculating the location.

[0104] When the SUPL positioning process is performed to calculate the location of the SET (S85), the SLP transmits a SUPL END message to the SET to inform that the positioning process would be initiated any mor

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided is a user privacy management apparatus and method on a Secure User Plane Location (SUPL) network including a SUPL Location Platform (SLP) and a SUPL Enabled Terminal (SET) and performing privacy authorization according to location of the SET, wherein when the location of the SET is calculated, the SLP (or SUPL Positioning Center (SPC) within the SLP) checks a privacy setup according to the calculated location, thereafter queries to a SET user whether to execute the privacy setup using a SUPL INIT message or a SUPL NOTIFICATION message, and then executes the privacy setup according to queries and responses transmitted through a SUPL START message or a SUPL NOTIFICATION RESPONSE message, whereby a user privacy can be managed more stably by notifying a user of the privacy setup according to the location of the user for reconfirmation.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner LG ELECTRONICS INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products