Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
CONTROL OF CONNECTION BETWEEN DEVICES
Document Type and Number:
WIPO Patent Application WO/2012/080305
Kind Code:
A2
Abstract:
For controlling connection between at least a user communicating device (UCD) and a network entity (NE) through a telecommunication network (TN), a controlling device (CD) linked to the network entity (NE) interrogates a social network system (SNS) to retrieve profile data of the user of the communicating device (UCD), and applies a policy to control the connection between the network entity (NE) and the user communicating device (UCD), the policy depending on the profile data including at least a social relationship between the user of the communicating device (UCD) and the user owning the network entity (NE).

Inventors:
MARCE OLIVIER (FR)
MAKNAVICIUS LINAS (FR)
Application Number:
PCT/EP2011/072709
Publication Date:
June 21, 2012
Filing Date:
December 14, 2011
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
ALCATEL LUCENT (FR)
MARCE OLIVIER (FR)
MAKNAVICIUS LINAS (FR)
International Classes:
H04L29/08; H04L29/06; H04W4/21
Domestic Patent References:
WO2008147548A12008-12-04
Foreign References:
US20090282473A12009-11-12
EP2202939A12010-06-30
US20040177276A12004-09-09
US6463474B12002-10-08
Other References:
None
Attorney, Agent or Firm:
MOUNEY, Jérôme (32 avenue Kléber, Colombes, FR)
Download PDF:
Claims:
CLAIMS

1 . A method for controlling connection between at least a user communicating device (UCD) and a network entity (NE) through a telecommunication network (TN), comprising the following steps in a controlling device (CD) linked to the network entity (NE):

interrogating (S2, S3) a social network system (SNS) to retrieve profile data (PrD) of the user of the communicating device (UCD), and

applying (S4) a policy to control the connection between the network entity (NE) and the user communicating device (UCD), the policy depending on the profile data (PrD) including at least a social relationship between the user of the communicating device (UCD) and the user owning the network entity (NE). 2. A method according to claim 1 , wherein the controlling device (CD) interrogates the social network system (SNS) after a communication attempt from the user communicating device (UCD) with the network entity (NE).

3. A method according to claim 1 or 2, comprising the following steps: receiving an identifier (IdT) of the user communicating device (UCD) transmitted by the latter attempting a communication with the network entity (NE),

transmitting a request including an identifier (IdD) of the user communicating device (UCD) and an identifier (IdU) of the user owning the network entity (NE) to the social network system (SNS) which identifies profile data (PrD) associated with the identifier (IdD) of the user communicating device (UCD) and to the identifier (IdU) of the user and transmits a response including profile data (PrD) to the controlling device (CD).

4. A method according to any of claims 1 to 3, wherein the profile data (PrD) contains a presence status of the user of the communicating device (UCD) and the policy applied to control the connection between the network entity (NE) and the user communicating device (UCD) depends further on the presence status of the user of the communicating device (UCD).

5. A method according to any of claims 1 to 4, wherein the profile data (PrD) contains at least an identifier of a communication entity linked to the user communicating device (UCD) and the device applies a policy to control communications between the network entity (NE) and said communication entity linked to the user communicating device (UCD).

6. A method according to any of claims 1 to 5, wherein the network entity (NE) is an access control enforcement point.

7. A method according to any of claims 1 to 6, wherein the policy applied to control the connection between the network entity (NE) and the user communicating device (UCD) is a set of instructions to allow or deny an access request from the user communicating device (UCD)to the network entity (NE).

8. Controlling device (CD) for controlling connection between at least a user communicating device (UCD) and a network entity (NE) linked to the controlling device (CD) through a telecommunication network (TN), comprising:

means (INT) for interrogating a social network system (SNS) to retrieve profile data (PrD) of the user of the communicating device (UCD), and

means (POL) for applying a policy to control the connection between the network entity (NE) and the user communicating device (UCD), the policy depending on the profile data (PrD) including at least a social relationship between the user of the communicating device (UCD) and the user owning the network entity (NE).

9. A computer program adapted to be executed in a controlling device (CD) for controlling connection between at least a user communicating device (UCD) to a network entity (NE) linked to the controlling device (CD) through a telecommunication network (TN), said program including instructions which, when said program is executed in said controlling device, execute the following steps :

interrogating (S2, S3) a social network system (SNS) to retrieve profile data (PrD) of the user of the communicating device (UCD), and

applying (S4) a policy to control the connection between the network entity (NE) and the user communicating device (UCD), the policy depending on the profile data (PrD) including at least a social relationship between the user of the communicating device (UCD)and the user owning the network entity (NE).

Description:
CONTROL OF CONNECTION BETWEEN DEVICES

FIELD OF THE INVENTION

The present invention relates to a system for controlling the connection between devices in a telecommunication network, and more specifically for controlling the initiation, routing and security of connection between devices.

BACKGROUND

There is a need to ease safe and efficient connections of devices of several people. A detailed example of that is, for two given people Alice and Bob, to allow Alice to let Bob to have access to one or several or her networked device. This must be done in a safe way, such that no one else can connect, and that both Alice and Bob trust the connection. The device can be, for example, a firewall, a laptop, a femtocell, etc.

The efficiency of the connection also relies on the control of the routing in the network (for example in Internet or any IP network). In addition, the connection must be made in an automatic way. In the current existing solution, two users willing to communicate need to agree on the application to use which in turn implies the network configuration to set up on both side. For example, two users willing to communicate via a voice on the web application need that both users opens their ports on the networked device, usually a computer, they want to use to each other such that the voice on the web application instance on their computer can communicate, having an application listening on these ports as well as to have the firewall rules allowing the use of these ports. In the general case, having the ports open on the end device is not enough, as a firewall can be instantiated in other devices like the DSL or Wi-Fi box. In addition, if Alice wants to allow Bob to connect not only to her laptop to have a voice on the web application session, but also to her femtocell to let him to benefit of the femtocell when he's visiting her, she has to configure her femto separately.

A known solution relies on an initiative coming from either Alice or Bob, to connect to the other party. They need to share some information like domain name, IP address, public key, etc. as well as the communication application or protocol they want to use. They usually can use some repository that allows them to find information about the other party. For example Alice, connects to the repository, types in the name of Bob and she gets the information to connect to Bob's device, or the system automatically initiates the connection.

This approach does not allow making devices interconnecting together.

SUMMARY

To remedy the problems referred to hereinabove, a method according to the invention for controlling connection between at least a user communicating device and a network entity through a telecommunication network, comprising the following steps in a controlling device linked to the network entity:

interrogating a social network system to retrieve profile data of the user of the communicating device, and

applying a policy to control the connection between the network entity and the user communicating device, the policy depending on the profile data including at least a social relationship between the user of the communicating device and the user owning the network entity.

The invention advantageously controls the initiation, routing and security of connection between devices thanks to social networking systems and trusted relationships between people inside them.

At a first glance, the social networking system is considered as a data base repository that stores mainly identities and relationship descriptions. Such information is used by social networking applications to present the information about the social network of users, and to allow them to interact each other.

In an embodiment, the controlling device interrogates the social network system after a communication attempt from the user communicating device with the network entity.

In an embodiment, the method further comprises the following steps: receiving an identifier of the user communicating device transmitted by the latter attempting a communication with the network entity,

transmitting a request including an identifier of the user communicating device and an identifier of the user owning the network entity to the social network system which identifies profile data associated with the identifier of the user communicating device and to the identifier of the user and transmits a response including profile data to the controlling device.

In an embodiment, the profile data contains a presence status of the user of the communicating device and the policy applied to control the connection between the network entity and the user communicating device depends further on the presence status of the user of the communicating device.

In an embodiment, the profile data contains at least an identifier of a communication entity linked to the user communicating device and the device applies a policy to control communications between the network entity and said communication entity linked to the user communicating device.

In an embodiment, the network entity is an access control enforcement point, for example included in a wireless access point.

In an embodiment, the policy applied to control the connection between the network entity and the user communicating device is a set of instructions to allow or deny an access request from the user communicating device to the network entity. A further object of the invention is a controlling device for controlling connection between at least a user communicating device and a network entity linked to the controlling device through a telecommunication network, the device comprising:

means for interrogating a social network system to retrieve profile data of the user of the communicating device, and

means for applying a policy to control the connection between the network entity and the user communicating device, the policy depending on the profile data including at least a social relationship between the user of the communicating device and the user owning the network entity. The invention relates further to a computer program adapted to be executed in a controlling device for controlling connection between at least a user communicating device and a network entity linked to the device through a telecommunication network, said program including instructions which, when the program is executed in said controlling device, execute the steps of the method of the invention.

BRIEF DESCRIPTION OF THE FIGURES

Some embodiments of the present invention are now described, by way of example only, and with reference to the accompanying drawings, in which:

- FIG. 1 is a schematic block-diagram of a controlling device linked to a social network system according to an embodiment of the invention,

- FIG. 2 is a flowchart showing steps performed to execute a method for controlling the connection between devices in a telecommunication network according to an embodiment of the invention.

The same reference number represents the same element or the same type of element on all drawings.

DESCRIPTION OF EMBODIMENTS

The figures and the following description illustrate specific exemplary embodiments of the invention. It will thus be appreciated that those skilled in the art will be able to devise various arrangements that, although not explicitly described or shown herein, embody the principles of the invention and are included within the scope of the invention. Furthermore, any examples described herein are intended to aid in understanding the principles of the invention, and are to be construed as being without limitation to such specifically recited examples and conditions. As a result, the invention is not limited to the specific embodiments or examples described below, but by the claims and their equivalents.

Referring to FIG. 1 , a communication system comprises a controlling device CD which is able to communicate with a social network system SNS through a telecommunication network TN and is linked to a network entity NE able to communicate with at least a user communicating device UCD.

The telecommunication network TN may be a wired or wireless network, or a combination of wired and wireless networks.

The telecommunication network TN can be a packet network, for example, an IP ("Internet Protocol") high-speed network such as the Internet or an intranet, or even a company-specific private network.

The user communicating device UCD can be a mobile device or a fixed device.

As mobile device, the user communicating device UCD can be a radio communication mobile terminal. For example, the communicating device UCD is a mobile phone, or is a communicating Personal Digital Assistant PDA, or an intelligent telephone like SmartPhone.

In another example, the user communicating device UCD is connected to a base station of a public wireless network of limited scope, such as WLAN (Wireless Local Area Network) or conforming to a standard 802.11x, or medium range according to the protocol WiMAX (World Wide Interoperability Microwave Access)

In another example, the user communicating device UCD is a cellular mobile radio communication terminal, connected by a channel to a radio access network through a base station of any type, including but not restricted to, femto base station. As fixed device, the user communicating device UCD can be a personal computer connected directly via a modem to link of type xDSL (Digital Subscriber Line) or ISDN (Integrated Services Digital Network Services) connected to the packet network PT.

In another example, the user communicating device UCD can be a television, a set-top box, or a game console connected to the telecommunication network, or can be a transport means like a car or bicycle connected to the telecommunication network.

The user communicating device UCD can be any device that is owned and handled by a user and that is able to communicate with the telecommunication network.

The social network system SNS can be a system comprising one or more servers delivering a social network service. The system SNS stores in a database DB a profile of each user registered to social network service and social relationships between users. The database contains optionally the presence status of the users, which can be regularly updated. The system SNS comprises further a communication module COM for communicating with the controlling device CD.

The controlling device CD is a network entity able to communicate with the social network system SNS and with a network entity NE. In some embodiments, the controlling device CD can be included within the network entity NE.

The controlling device CD comprises an interface INT and a policy module POL. The interface INT permits communication with the telecommunication network, especially with the social network system SNS and at least a user terminal UT. The policy module POL contains policy to apply to the communicating device of a user according to profile information relating to the user. It is also considered that the network entity NE is owned by a user and the policy module POL stores an identifier IdU of this user. The network entity NE handles the packet traffic coming from and to the user communicating device. For example, the network entity NE is a modem, a femto or WLAN access point.

The controlling device CD can be considered as an access control enforcement point. For example, the controlling device CD is a firewall included in a computer or included in a modem both considered as network entity NE. In other examples, the controlling device CD is a module included in a femto or WLAN access point as network entity NE implementing functions of access authorization and filtering for communications with the access point.

A user may possess several user communicating devices UCD and a user communicating device may comprise several communication entities.

For example, a user may possess a mobile terminal and a computer equipped with an audio device like a microphone and with a video device like a camera.

The social network system SNS memorizes in the profile of each user the different user communicating device UCD the user has registered and the different communication entities each user communicating device may be equipped with.

For that, the database DB memorizes an identifier IdU of each user in correspondence with identifier IdD of every communicating device the user possess. Optionally, a communicating device identifier IdD is memorized in correspondence with one or many identifiers of communication entities linked to the communicating device, like a camera. Also in correspondence with each user, identified by identifier IdU, is memorized the social relationship with each other user registered and identified by another identifier IdU.

With reference to FIG. 2, a method for controlling a connection between devices according to one embodiment of the invention comprises steps S1 to S4 executed automatically within the communication system. At step S1 , the controlling device CD linked to the network entity NE detects a communication attempt from a user communicating device UCD with the network entity NE.

The user communicating device UCD transmits an identifier IdD of the communicating device UCD to the interface INT of the controlling device CD.

At step S2, the controlling device CD interrogates the social network system SNS in order to retrieve profile information of the user of the communicating device UCD.

Thus, the interface INT of the controlling device CD sends to the system SNS a request including the communicating device identifier IdD and an identifier IdU of the user owning the network entity NE.

At step S3, the system SNS identifies a profile containing profile data PrD associated with the identifier IdD and corresponding to the identifier IdU of the user owning the network entity NE.

The system SNS transmits a response including profile data PrD to the controlling device CD via the communication module COM, optionally with the identifier IdD to identify the response to the previous request.

At step S4, the policy module POL of the controlling device CD analyses the profile data PrD and identifies in a policy table a policy corresponding to the profile data PrD. The controlling device CD applies the identified policy to the network entity NE to control the connection between the network entity NE and the user communicating device UCD, the policy being for example a set of instructions to allow or deny an access request from the user communicating device UCD to the network entity NE.

The profile data PrD contain the social relationship between the user of the communicating device UCD and the user owning the network entity NE. The policy applied to the user communicating device depends at least on this social relationship. There can be different types of social relationships that may be put together into groups associated with specifics policies. For example, a same policy may be associated to social relationship of type "friend" and "family".

The profile data PrD may further contain a presence status of the user of the communicating device UCD. For example, the presence status represents the current activity of the user, like the following status: "online", "away", or "busy".

The profile data PrD may further contain identifiers of communication entities linked to the communicating device UCD, like a camera.

The policy to apply to the communicating device UCD depends on the social relationship between the user of the communicating device UCD and the user owning the network entity NE, and may further depend on the presence status of the user of the communicating device UCD.

Optionally, the policy to apply to the communicating device UCD may be more precise and may apply to each communication entity linked to the communicating device UCD.

The different policies are pre-established and may be updated by the user owning the network entity.

It is further presented different examples for illustrating purposes. In an example, Bob owns two controlling devices controlling respectively his computer firewall and his modem firewall to allow connection from and to Alice's devices. On her side, Alice owns one controlling device controlling her computer firewall. Bob's controlling devices are able to retrieve profile information from the system SNS. Bob has also several communication entities linked to his computer, including a standalone networked camera. Depending of Bob's status and the communication entities, for example if Bob's status is away then the camera is not expected to be in use, the controlling device will command the firewall to apply a corresponding policy to the camera, for example dismiss the flows coming from camera.

In another example, Bob owns a controlling device included in a wireless access point, like a femtocell or WLAN access point, associated to his house. The controlling device is able to retrieve profile information from the system SNS, and define a group including the set of devices that are allowed to connect to the access point. For example, the devices associated to users belonging to "Family" group can have access to the access point. Optionally, this can be made more dynamic for example by opening the access to the access point to friends who have "At Bob's home" in their status.

The invention described here relates to a method and a controlling device for controlling a connection between devices. In an embodiment, the steps of the method of the invention are determined by the instructions of a computer program incorporated in a data processing device such as the controlling device CD according to the invention. The program includes program instructions which, when said program is executed in a processor of the data processing device the operation whereof is then controlled by the execution of the program, execute the steps of the method according to the invention.

As a consequence, the invention applies also to a computer program, in particular a computer program on or in an information medium readable by a data processing device, adapted to implement the invention. That program may use any programming language and be in the form of source code, object code or an intermediate code between source code and object code, such as a partially compiled form, or in any other desirable form for implementing the method according to the invention.

The information medium may be any entity or device capable of storing the program. For example, the medium may include storage means or a recording medium on which the computer program according to the invention is recorded, such as a ROM, for example a CD ROM or a microelectronic circuit ROM, or a USB key, or magnetic recording means, for example a diskette (floppy disk) or a hard disk.