METHOD AND APPARATUS FOR ANONYMOUS ACCESS AND CONTROL OF A SERVICE NODE
2 Assignments
0 Petitions
Accused Products
Abstract
A method, apparatus and computer program product are provided for anonymous access and control of a service node. In the context of a method, the method includes causing the transmission of a privacy proxy URI in response to the privacy proxy URI request, and establishing a privacy connection with user equipment in response to receiving a request to connect including the URI. The URI is a portion of the privacy enabled URI based at least in part on the privacy proxy URI. The method further includes causing the transmission of a request message to a service node in response to receiving a request message from the user equipment through the privacy connection.
-
Citations
68 Claims
-
1-48. -48. (canceled)
-
49. A method comprising:
-
causing the transmission of a privacy proxy uniform resource identifier; establishing a privacy connection with user equipment in response to receiving a request to connect including a uniform resource identifier, wherein the uniform resource identifier is a portion of the privacy enabled uniform resource identifier based at least in part on the privacy proxy uniform resource identifier; and causing the transmission of a request message to a service node in response to receiving a request message from the user equipment through the privacy connection. - View Dependent Claims (50, 51, 52, 53, 54)
-
-
55. A method comprising:
-
receiving a privacy proxy uniform resource identifier from an anonymity proxy; generating a privacy enabled uniform resource identifier based at least in part on the privacy proxy uniform resource identifier; causing the transmission of the privacy enabled uniform resource identifier; and receiving a request message from the anonymity proxy, wherein the anonymity proxy transmits the request message in response to receiving a request message from user equipment based on the privacy enabled uniform resource identifier through a privacy connection. - View Dependent Claims (56, 57, 58)
-
-
59. An apparatus comprising at least one processor and at least one memory including computer program code, the at least one memory and computer program code configured to, with the processor, cause the apparatus to at least:
-
cause the transmission of a privacy proxy uniform resource identifier; establish a privacy connection with user equipment in response to receiving a request to connect including a uniform resource identifier, wherein the uniform resource identifier is a portion of the privacy enabled uniform resource identifier based at least in part on the privacy proxy uniform resource identifier; and cause the transmission of a request message to a service node in response to receiving a request message from the user equipment through the privacy connection. - View Dependent Claims (60, 61, 62, 63, 64)
-
-
65. An apparatus comprising at least one processor and at least one memory including computer program code, the at least one memory and computer program code configured to, with the processor, cause the apparatus to at least:
-
receive a privacy proxy uniform resource identifier from an anonymity proxy; generate a privacy enabled uniform resource identifier based at least in part on the privacy proxy uniform resource identifier; cause the transmission of the privacy enabled uniform resource identifier; and receive a request message from the anonymity proxy, wherein the anonymity proxy transmits the request message in response to receiving a request message from user equipment based on the privacy enabled uniform resource identifier through a privacy connection. - View Dependent Claims (66, 67, 68)
-
Specification