Method for Managing Opaque Presence Indications Within a Presence Access Layer
First Claim
1. A method for a presentity to provide private presence information for a watcher, comprising:
- the presentity providing the private presence information in an encrypted form;
a presence access layer obtaining the private presence information; and
the presence access layer performing one of;
decrypting the private presence information and sending the decrypted private presence information to the watcher, andleaving the private presence information in the encrypted form and sending the encrypted private presence information to the watcher, wherein the watcher decrypts the private presence information.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for a presentity to provide private presence information for a watcher. The method includes the presentity providing the private presence information in an encrypted form. The method also includes a presence access layer obtaining the private presence information. The method also includes the presence access layer performing one of decrypting the private presence information and sending the decrypted private presence information to the watcher, and leaving the private presence information in the encrypted form and sending the encrypted private presence information to the watcher, wherein the watcher decrypts the private presence information.
89 Citations
27 Claims
-
1. A method for a presentity to provide private presence information for a watcher, comprising:
-
the presentity providing the private presence information in an encrypted form; a presence access layer obtaining the private presence information; and the presence access layer performing one of; decrypting the private presence information and sending the decrypted private presence information to the watcher, and leaving the private presence information in the encrypted form and sending the encrypted private presence information to the watcher, wherein the watcher decrypts the private presence information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system, comprising:
a presence access layer configured to obtain private presence information in an encrypted form from a presentity, and further configured to follow at least one of a rule and a policy specifying that the presence access layer is to perform one of decrypting the private presence information and sending the decrypted private presence information to a watcher, and leaving the private presence information in the encrypted form and sending the encrypted private presence information to the watcher, wherein the watcher decrypts the private presence information. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
Specification