Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD AND ARRANGEMENT FOR PROVIDING A SERVICE
Document Type and Number:
WIPO Patent Application WO/2012/070992
Kind Code:
A1
Abstract:
A method in a Service agent, a Service Agent and a computer-readable medium comprising a computer program are provided for providing a service to a user. The method comprises detecting connection of a Personal Profile Device, operated by the user, to the Service Agent. The method further comprises receiving a service information message from a Service Provider, comprising a service identifier, and obtaining a service profile from the Personal Profile Device using the service identifier. The method further comprises logging in to at least one Information Source identified from the service profile using personal credentials comprised in the service profile in order to allow the Service Provider to access the information needed for providing the service and requesting the Service Provider to set up a connection to the at least one Information Source and to obtain the information needed for providing the service. Thereby,delivery of the service from the Service Provider to a Service Endpoint,which is operatively connected to the Service Agent, based on the information is enabled

Inventors:
HUANG VINCENT (SE)
MORITZ SIMON (SE)
SOEDERBERG JOAKIM (SE)
Application Number:
PCT/SE2010/051300
Publication Date:
May 31, 2012
Filing Date:
November 25, 2010
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
ERICSSON TELEFON AB L M (SE)
HUANG VINCENT (SE)
MORITZ SIMON (SE)
SOEDERBERG JOAKIM (SE)
International Classes:
G06F17/30; H04L67/51; H04W4/50
Domestic Patent References:
WO2002023309A22002-03-21
WO2007064070A22007-06-07
Foreign References:
EP2244441A12010-10-27
US20080004949A12008-01-03
US6621895B12003-09-16
Other References:
HULSEBOSCH B., FRAMEWORK FOR SECURE PERSONALISED CONTENT DELIVERY, 23 January 2002 (2002-01-23)
See also references of EP 2643773A4
Attorney, Agent or Firm:
BERGENSTRÅHLE & LINDVALL AB (S- Stockholm, SE)
Download PDF:
Claims:
CIAJMS

1. A method in a Service Agentfor providing a service for a user, the method comprising:

- detecting connection of a Personal Profile Device, operated by said user, to said Service Agent,

receiving a service information message from a Service Provider, comprising a service identifier,

obtaining a service profile from said P rsonal Profile Device, using said service identifier,

logging in to at least one Information Source identified from said service profile using personal credentials comprised in said service profile in order to allow said Service Provider to access the information needed for providing said service, and

- requesting said Service Provider to setup a connection to said atleastone Info rmation Source and to obtain the information needed for providing said service,

thereby enabling the delivery of said service from said Service Provider to a Service Eidpointoperatively connected to said Service Agent, based on said information.

2. A method according to claiml, further comprising retrieving personal settings from said Personal Profile Device to enable presentation of said service via said Service Eidpoint in accordance with said personal settings.

3. A method according to claim 1 or 2, wherein said service identifier is a Service Type or a Service ID.

4. A method according to any of claims 1 to 3, further comprising detecting disconnection of said Personal Profile Device from said Service Agent, wherein the method further comprising requesting said Service Roviderto terminate all connections setup between said Service Agent, said Service Rovider and said at least one Information Source in association with the delivery of the requested service and to delete all personal information associated with said delivered service in said Service Provider; logging out from said atleastone Information Source, and deleting all personal information associated with said delivered service in said Service Agent

5. A method according to any of claims 1 to 3, further comprising receiving a service termination message from said Service Rovider, wherein the method further comprises requesting said Service Roviderto terminate all connections setup between said Service Agent, said Service Rovider and said atleastone Information Source in association with the delivery of the requested service and to delete all personal information associated with said delivered service in said Service Rovider; logging out from said atleastone Information Source, and deleting all personal information associated with said delivered service in said Service Agent

6. A method according to any of claims 1 to 3, further comprising receiving a service termination message from said Service Rovider, wherein the method further comprises starting a timer, and; when said timer has lapsed, the method comprises requesting said Service Rovider to terminate all connections setup between said Service Agent, said Service Rovider and said atleastone Information Source in association with the delivery of the requested service and to delete all personal information associated with said delivered service in said Service Rovider; logging out from said atleastone Information Source, and deleting all personal information associated with said delivered service in said Service Agent

7. A method according to any of claims 1-6, further comprising establishing a secure communication channel between said Rrsonal Rofile Device and said Service Agent after detection of connection of said Personal Profile Device to said Service Agent

8. A method according to any of claims 1-7, further comprising issuing a temporary token in response to receiving said service information message and providing said token to said Service Provider when requesting said Service Provider to setup a connection to said atleastone Information Source, thereby enabling said Service Provider, by means of the token, to obtain the information needed for providing said service.

9. A Service Agent adapted to provide a service for a user, comprising:

- a detecting unit adapted to detect connection of a Personal Pro file Device, operated by said user, to said Service Agent,

a communication unit adapted to receive a service information message from a Service Provider, comprising a service identifier, and

- a processing unit adapted to, via said communication unit

• obtain a service profile from said Personal Profile Device, using said service identifier,

• log in to atleastone Information Source identified from said service profile using personal credentials comprised in said service profile in order to allow said Service Provider to access the information needed for providing said service, and

• request said Service Provider to setup a connection to said atleastone

Info rmation Source to obtain the information needed for providing said service,

thereby enabling the delivery of said service from said Service Provider to a Service Eidpointoperatively connected to said Service Agent, based on said information.

10. A Service Agent according to claim 9, wherein said processing unitis further adapted to retrieve personal settings from said Personal Profile Device to enable presentation of said service via said Service Ehdpoint in accordance with said personal settings.

11. A Service Agent according to claim 9 or 10, wherein said service identifier is a Service Type or Service ID.

12. A Service Agent according to any of claim 9-11, wherein said detecting unit is further adapted to detect disconnection of said Personal Profile Device from said Service Agent, wherein said processing unit is further adapted to: request said Service Provider to terminate all connections setup between said Service Agent, Service Ftovider and said at least one Information Source in association with the delivery of the requested service; to delete all personal information associated with said delivered service in said Service Provider; to log out from said atleastone Information Source, and to delete all personal information associated with said delivered service in said Service Agent

13. A Service Agent according to any of claim 9-11, wherein said communication unit is further adapted to receive a service termination message from said Service Provider, wherein said processing unit is adapted to request said Service Provider to: terminate all connections setup between said Service Agent Service Ftovider and said atleastone Information Source in association with the delivery of the requested service; to delete all personal information associated with said delivered service in said Service P ovider; to log out from said atleastone Information Source, and to delete all personal information associated with said delivered service in said Service Agent

14. A Service Agent according to any of claim 9-11, wherein said communication unit is further adapted to receive a service termination message from said Service Provider, wherein said processing unit is adapted to start a timer, the processing unit further being adapted to detect the lapsing of said timer, wherein the processing unit is further adapted to request said Service Provider to: terminate all connections setup between said Service Agent, Service Provider and said at least one Information Source in association with the delivery of the requested service; to delete all personal information associated with said delivered service in said Service Provider; to log out from said atleast one Info rmation Source, and to delete all personal information associated with said delivered service in said Service Agent

15. A Service Agent according to any of claims 9-14, wherein said communication unit is further adapted to establish a secure communication channel between said Personal Rofile Device and said Service Agent after detection of connection of said Personal HO file Device to said Service Agent

16. A Service Agent according to any of claims 9-15, wherein said processing unit is further adapted to issue a temporary token in response to the reception of said service information message and to provide said token to said Service Provider when requesting said Service Riovider to setup a connection to said atleast one Information Source, thereby enabling said Service Provider, by means of the token, to obtain the information needed for providing said service.

17. A Service Agent according to any of claims 9-16, wherein said Service Agent is incorporated into said Service Delivery Ehdpoint

18. A Service Ehdpoint comprising a Service Agent according to any of claims 9-16.

19. A service Ehdpoint according to claim 18, being any of a: Setlbp Box, Television set, Mobile telephone, computer, Personal Digital Assistant, game console.

20. A computer-readable medium comprising a computer program having program instructions stored thereon that are executable by a computer or processor of the Service Agent according to any of claims 9-17, to perform the method steps according to any of claims 1-8.

Description:
METHOD AND AERANGEME TIORHOVDDI G A SEEMCE Technical field

[0001] The invention relates generally to a method and an arrangement for providing a service to a user. The presentinvention relates in particular to a method and an arrangement for providing a service to a user, wherein information needed to deliver the service is distributed.

Background

[0002] The use of Intemetis constantly increasing and new Internet services are constantly being introduced. Many services require a user to log in to a service provider in order to gain access to the service that is offered. Many services require personal information or user information in order to provide the service. This way, user information is distributed across the Internet at different locations.

[0003] When a user is presented with a service from a service provider, the service is usually presented to the user in a way that is dependent on the service provider. lately, many service providers enable the user to customize the service or at least the presentation of the service. Some services also make use of the user's consumption history in order to customize the service for the user.

[0004] Merely as an example, assume a user frequently shops at an Internet online store, this store being an aforementioned service provider. The user's shopping history may be used in order to suggest other items of possible interest to the user. The suggested items are then somehow "related" to the previously purchased items by the user. If a user has bought, e.g. many romantic novels, then a newly available romantic novel at the online store may be suggested to the user as it may be of interest to the user.

[0005] Some services make use of a user profile, in such a way that a user's preferences for a particular service are considered when providing or offering the service to the user. As an example, a user may be given the possibility to enter personal information that can be used by the service provider to customize the service for the user.

[0006] As a consequence, user information may be stored at many different locations across the Internet, although being confined to each service provider or the like, ftrso rial information, or user information, can be sensitive and it may be desirable to confine the personal information to each service provider. At least s it is desirable to a user to be in control over his/ her personal information and over which parties that have access thereto. It may also be desirable to the different service providers to be in control of the personal information One example of service providers who are very careful with their users' information is banking enterprises.

[0007] It is a problem to enable a service provider to gain access to user information which is not stored within the service provider. It is farther a problem to access all or some user information and to integrate user information from several different sources with different sign-on methods or login methods.

Summary

[0008] It is an objectof the invention to address atleast some of the problems outlined above. In particular, it is an objectof the invention to provide a method and an arrangement for providing a service to a user, with as little interaction as possible from the user in order to provide the service.

[0009] These objects and others may be obtained by providing a method in a Service agent and a Service agent

[00010] According to an aspect a method in a Service Agent for providing a service to a user is provided. The method comprises detecting connection of a Personal Profile Device, operated by the user, to the Service Agent The method further comprises receiving a service information message from a Service Provider, comprising a service identifier, and obtaining a service profile from the Ffersonal Profile Device using the service identifier. The method fijrther comprises logging in to at least one hformation Source identified from the service profile using personal credentials comprised in the service profile in order to allow the Service Provider to access the information needed for providing the service and requesting the Service Provider to setup a connection to the at least one Information Source and to obtain the information needed for providing the service. Thereby, delivery of the service from the Service Provider to a Service Ehdpoint, which is operatively connected to the Service Agent, based on the information is enabled.

[00011] This has several advantages. A user can be in full control of his/ her personal information and still enable service providers to obtain user information from one single or several different formation sources. The user may specify a service profile valid for a particular service, which profile defines which information sources can be accessed to obtam user informatioa The service profile may also comprise login or sign-in information so that the access to the information sources can be performed automatically without intervention or interaction by the user. Another advantage is that a service can be personalized or customized for the user as he/ she may enable the service provider to access a large amount of information from many different information sources. The more information that can be obtained by the service provider, the more personalized or customized the service can be made.

[00012] further, cloud computing systems are emerging and with them come the risks using them An individual user would like to access his/ her personal content but would in the time need a more secured way of accessing this personal content This can be achieved by this method. [00013] According to an embodiment, the method further comprises retrieving personal settings from the Personal Profile Device to enable presentation of the service via the Service Ehdpoint in accordance with the personal settings.

[00014] This has the advantage that a user may personalize the presentation of a service so that it is presented to the user in the same manner regardless of the Service Ehdpoint that is being used to deliver the service.

[00015] According to an embodiment, the method further comprises detecting disconnection of the Personal Fro file Device from the Service Agent, wherein the method further comprises requesting the Service Provider to terminate all

connections setup between the Service Agent, the Service Provider and the at least one Information Source in association with the delivery of the requested service and to delete all personal information associated with the delivered service in the Service Provider. The method comprises logging out from the atleastone Information Source, and deleting all personal information associated with the delivered service in the Service Agent

[00016] According to an embodiment the method further comprises receiving a service termination message from the Service Provider, wherein the method further comprises requesting the Service Provider to terminate all connections setup between said Service Agent, the Service Provider and the atleastone Information Source in association with the delivery of the requested service and to delete all personal information associated with the delivered service in the Service Provider. The method comprises logging outfromthe atleast one Info rmation Source, and deleting all personal information associated with the delivered service in the Service Agent

[00017] According to an embodiment the method further comprises receiving a service termination message from the Service Provider, wherein the method further comprises starting a timer, and; when the timer has lapsed, the method comprises requesting the Service Provider to terminate all connections set up between the Service Agent, the Service P ovider and the at least one Information Source in association with the delivery of the requested service and to delete all personal information associated with the delivered service in the Service Provider. The method further comprises logging out from the at least one Information Source, and deleting all personal information associated with the delivered service in the Service Agent

[00018] According to yet an embodiment, the method further comprises

estabKshing a secure communication channel between the Personal Profile Device and the Service Agent after detection of the Personal HO file Device to the Service Agent

[00019] According to yet an embodiment, the method further comprising issuing a temporary token in response to receiving the service information message and providing the token to the Service P ovider when requesting the Service Provider to setup a connection to the atleast one M rmation Source, thereby enabling, by means of the token, the Service Provider to obtain the information needed for providing the service.

[00020] According to an aspect, a Service Agent is provided which is adapted to provide a service for a user. The Service Agent comprises a detecting unitadapted to detect connection of a Personal HO file Device, operated by the user, to the Service Agent The Service Agent further comprises a communication unit, adapted to receive a service information message from a Service Hovider, comprising a service identifier. Rirther, the Service Agent comprises a processing unitadapted to, via the communication unit obtain a service profile from the Personal Hofile Device, using the service identifier and to log in to atleast one Information Source identified from the service profile using personal credentials comprised in the service profile in order to allow said Service Provider to access the information needed for providing Ihe service; and to request the Service Provider to setup a connection to the atleast one Information Source to obtain the information needed for providing the service. Thereby, delivery of the service from the Service Provider to a Service E dpoint, which is operatively connected to the Service Agent, based on the information is enabled.

[00021] According to an embodiment, the processing unit is further adapted to retrieve personal settings from the Personal Profile Device to enable presentation of the service via the Service Endpoint in accordance with the personal settings.

[00022] According to an embodiment, the detecting unit is further adapted to detect disconnection of the P rsonal Profile Device from the Service Agent, wherein the processing unit is further adapted to : request the Service Provider to terminate all connections setup between the Service Agent, the Service Provider and the atleast one Information Source in association with the delivery of the requested service; to delete all personal information associated with the delivered service in the Service Provider; to log out from the atleastone Information Source, and to delete all personal information associated with the delivered service in the Service Agent

[00023] According to yet an embodiment, the communication unit is further adapted to receive a service termination message from the Service Provider, wherein the processing unit is adapted to request the Service Froviderto: terminate all connections setup between the Service Agent, the Service Provider and the at least one Information Source in association with the delivery of the requested service; to delete all personal information associated with the delivered service in the Service Provider; to log outfromthe atleast one Information Source, and to delete all personal information associated with the delivered service in the Service Agent

[00024] According to yet an embodiment, the communication unit is further adapted to receive a service termination message from the Service Provider, wherein the processing unitis adapted to starta timer, the processing unit further being adapted to detect the lapsing of the timer, wherein the processing unitis further adapted to request the Service Provider to: terminate all connections setup between the Service Agent, the Service Provider and the at least one Information Source in association with the delivery of the requested service; to delete all personal information associated with the delivered service in the Service Provider; to log out from the atleastone Information Source, and to delete all personal information associated with the delivered service in the Service Agent

[00025] According to an embodiment, the communication unit is adapted to establish a secure communication channel between the Personal Profile Device and the Service Agent after detection of the Personal Profile Device to the Service Agent

[00026] According to an embodiment me processing unitis further adapted to issue a temporary token in response to the reception of the service information message and to provide the token to said Service Provider when requesting the Service Providerto setup a connection to the atleastone Information Source, thereby enabling the Service Provider, by means of the token, to obtain the information needed for providing the service.

[00027] According to an embodiment, the Service Agent is incorporated into the Service Delivery E dpoint

[00028] According to yetan aspect, a Service Ehdpoint is provided, wherein the Service Ehdpoint comprises a Service Agent

[00029] According to yetan aspect, a computer-readable medium is provided the computer-readable medium comprising a computer program having program instructions stored thereon that are executable by a computer or processor of the Service Agent, to perform the method. Efcief description of drawings

[00030] Hie invention will now be described in more detail by means of exemplary embodiments and with reference to the accompanying drawings, in which:

[00031] Hgure 1 is a flowchart of an embodiment of a method for providing a service for a user.

[00032] Hgure 2 is a flowchartof an exempKfying embodimentof a method for providing a service for a user, iHustrating termination of the service.

[00033] Hgure 3 is a flowchartof an exemplifying embodimentof a method for providing a service for a user, illustrating termination of the service.

[00034] Hgure 4 is a flowchartof an exemplifying embodimentof a method for providing a service for a user, illustrating termination of the service.

[00035] Hgure 5 is a block diagram of an embodimentof a service agent adapted to provide a service for a user.

[00036] Hgure 6 is a signaling diagram illustrating an embodimentof an exemplary method for providing a service for a user.

[00037] Hgure 7 is a signaling diagram iHustrating an embodimentof an exemplary method for providing a service for a user.

Detailed description

[00038] In the following, a detailed description of some exemplary embodiments will be described.

[00039] Riefly described, a method and a Service Agent are provided for providing a service for a user [00040] There are many ways to obtain information about a user. The user may himself/ herself enter perso nal info rmation as to, e.g., his/ her preferences, interests, metadata and so on monitoring and analyzing the behavior and consumption of a user, knowledge and information of the user may also be obtained. It is necessary to treat this information carefully and therefore it is of interest to a user to be in control of this information

[00041] It is therefore desirable to be able to automatically create a user specific service environment A user is in possession of a Personal Fro file Device, FPD. The FED comprises a memory and means for being connected to another device as will be explained below. The memory of the FPD will comprise personal information such as user information, e.g. user identifiers. When the FPD is connected to another device, this device will be able to access the personal information stored in the memory of the FPD.

[00042] The memory of the FPD may also comprise user account credentials. These may be used to challenge the user of the device such that, when activating the FPD, the user needs to enter a response in order to secure his/ her identity.

[00043] The memory of the FPD may also comprise personal settings. The personal settings will enable the look and feel of a terminal, which is being used together with the FPD, to appear just as the user is familiar to . As an example, when the FPD is used together with a terminal having a display, the display will show a

background in accordance with the personal settings, i.e. a personal background, even though the device is a shared device.

[00044] Further, the memory of the FPD may comprise one or more service profiles. A service profile is typically associated with a specific service. The service may be identified by a service type, a service ID or a service code. A service profile comprises identities of information sources which the service can access and credentials used to access the information source. A service may have more than one service profile, such that a user may choose which service profile he/ she wishes to use. A service profile ma be associated with more than one service.

[00045] The JrfU may be comprised in a mobile telephone, a USB stick, a laptop or any other portable means or device. The PHD is connectable to a service agent, which in turn is coupled or connected to a service access device, also called a service endpoint Alternatively, the service agent is incorporated with the service endpoint In such a case, the PPD is coupled to the service agent by being connected to the service endpoint The connection of the JrfU to the service agent may be done by wire or wirelessly, by insertion, plug in or any other suitable way. The service endpoint in turn may be e.g. a Set Top Box, a television set, a mobile telephone, computer, a personal digital assistant or a game console.

[00046] Figure 1 is a flowchart of an embodiment of a method in a Service Agent for providing a service for a user.

[00047] figure 1 illustrates an exemplifying method for providing service to a user. The method is initiated as a user of a PPD connects the PPD to a Service Agent, for example by means of Bluetooth, insertion or plug in. The method comprises the Service Agent detecting 100 connection of a PPD to the Service Agent The PPD is operated by a user, as stated above. The method further comprises the Service Agent receiving 110 a service information message from a Service Provider, comprising a service identifier. Further, the method comprises obtaining 120 a service profile from the Personal Profile Device, using the service identifier. Then, logging in 130 to atleastone Information Source identified from the service profile using personal credentials comprised in the service profile in order to allow said Service Provider to access the information needed for providing the service. The service profile may indicate a plurality of Information Sources. In such a case, the Service Agent may perform the login procedure 130 to each and every Information Source. Thereafter, the Service Agent requests 140 the Service Provider to setup a connection to the atleastone Wo rmation Source and to obtain the information needed for providing the service, In the case of a plurality of Information Sources, the Service Agent may request 140 the Service Provider to setup a connection to each and every Information Source, h this way, the method in the Service Agent enables the delivery of the service from the Service Provider to a Service Ehdpoint, based on the info rmation acquired from the atleastone Information Source.

[00048] This has several advantages. A user can be in full control of his/ her personal information and still enable service providers to obtain user information from one single or several different information sources. The user may specify a service profile valid for a particular service, which pro file defines which information sources can be accessed to obtam userinformatioa The service profile may also comprise login or sign-in information so that the access to the information sources can be performed automatically without intervention or interaction by the user. Another advantage is that a service can be personalized or customized for the user as he/ she may enable the service provider to access a large amount of information from many different info rmation sources. The more information that can be obtained by the service provider, the more personalized or customized the service can be made.

[00049] According to an embodiment, the method further comprises retrieving personal settings from the FDD to enable presentation of the service to the user in accordance with the personal settings.

[00050] This may be done, e.g. just after the Service Agentdetects 100 connection of the HD to the Service Agent In one example, the Service Agent may request personal settings from the EFD and the PPD will return the personal settings to the Service Agent The Service Agent will then forward the personal settings to the Service Ehdpoint The Service Ehdpoint is then able to use the personal settings to present the service to the user in accordance with the personal settings. [00051] According to yet an example, the PPD may comprise one or more user profile, wherein a user profile comprises personal settings as described above. In such a case, the Service Agent can retrieve a user profile comprising the personal settings. ease the 11U comprises several user profiles, the user may be presented with the different user profile and be given the opportunity to select which user profile he/ she whishes to use. As the user selects a user profile to be used, the personal settings in the selected user profile are forwarded to the Service Ehdpoint

[00052] The personal settings could also be used, in another example, to present the services that are supported by the Service Ehdpoint in the same manner regardless of the Service Ehdpointbeing used. The presentation of the supported services will look the same no matter which Service Ehdpoint is used. The Service Ehdpoint could be a shared one, at e.g. a hotel room or at a library, or a personal one at the home of the user.

[00053] According to an embodiment, the service identifier is a Service T pe or a Service Code.

[00054] Figures 24 are flowcharts of different exernplifying embodiments of termination of the service, the service having been setup or established as described above with reference to figure 1. In the shown embodiments, all connections are terminated and all personal information associated with the delivered service in the Service Provider is deleted. Also, the Service Agent logs out from the at least one Information Source and deletes all perso nal information associated with the delivered service in the Service Agent These steps are taken to ensure security and that the user is in control of his/ her own personal information

[00055] Elgure 2 illustrates the method comprising the Service Agent detecting 200 disconnection of the EFD from the Service Agent The method further comprises the Service Agent requesting 210 the Service Provider to terminate all connections set up between said Service Agent, the Service Provider and the at least one trforrnation Source in association with the delivery of the requested service and to delete all personal information associated with the delivered service in the Service Provider; and logging out220 fromthe atleastone Information Source , deleting 230 all personal information associated with the delivered service in the Service Agent Step 220 of course is repeated for each Information Source that the Service Agent has logged into. ease the Service Agent has ordered the Service Provider to setup connections to a plurality of Information Sources, the Service Agent may send one request 210 to the Service Provider to terminate the connection and to delete all personal information per Information Source as an alternative to sending one request 210 to the Service Provider requesting termination of all connections and deletion of all personal information associated with the delivered service in the Service P ovider.

[00056] In this example, a disconnection of the FPD is interpreted such that the user no longer wishes to make use of the service, ft should be possible to ensure that no connection is left established and that no personal information is stored in neither the Service Agent nor the Service E dpointin order to protect the user's personal information Especially if the user is using a shared Service Ehdpoint, it should be possible to ensure that another user may not in any way be given any personal information of the previous user. Therefore, all the connections that have been setup in association with the delivery of the service are terminated and all personal information associated with the delivered service is deleted in the Service Agent and in the Service P ovider. This can be performed, e.g., by the Service Agent requesting the Service Provider to terminate all connections it has established and to delete all personal information it has acquired in association with the delivery of the service. The Service Agent itself terminates all connections it has setup and deletes all personal information it has acquired.

[00057] Figure 3 is a flowchart of an exernplifying embodiment of a method for providing a service for a user, illustrating another embodiment for termination of the service previously setup according to the method described above with reference to figure 1.

[00058] As illustrated in figure 3, in this embodiment, the method comprises the Service Agent receiving 300 a service termination message from the Service Provider, wherein the method further comprises requesting 310 the Service Provider to terminate all connections setup between the Service Agent, the Service Provider and the at least one Information Source in association with the delivery of the requested service and to delete all perso nal information associated with the delivered service in the Service Provider; and logging out320 from the atleastone mformation Source, deleting 330 all personal information associated with the delivered service in the Service Agent Again, step 320 of course is repeated for each mformation Source that the Service Agent has logged into, m case the Service Agent has ordered the Service Provider to setup connections to a plurality of mformation Sources, the Service Agent may send one request310 to the Service Provider to terminate the connection and to delete all perso nal information per mformation Source as an alternative to sending one request 310 to the Service Provider requesting termination of all connections and deletion of all personal information associated with the delivered service in the Service Provider

[00059] In this example, the reception of a service termination message from the Service Provider is interpreted such that the user no longer wishes to make use of the service. It should be possible to ensure thatno connection is left established and that no personal information is stored in order to protect the user's personal information Especially if the user is using a shared Service Ehdpoint, it should be possible to ensure that another user may not in any way be given any personal information of the previous user. This is performed in the same manner as described above in relation to figure 2. Here the service will be delivered until the user wishes to stop making use of the service. As the user wants to stop making use of the service, he/ she indicates this to the Service Provider. As the Service Provider receives the request for service termination, the Service Rovider informs the Service Agent that the user no longer wishes to make use of the service. The Service Agent is men responsible for terminating all connections and deleting all personal information as has been described above.

[00060] Hgure 4 is a flowchartof yetan embodimentof how to terminate the service.

[00061] Hgure 4 illustrates the method comprising receiving 400 a service termination message from the Service Rovider, wherein the method further comprises starting 410 a timer. When the timer is started, the Service Agent waits for the timer to expire or for the user to resume the service, m ease the timer has not expired and the user resumes the service, the Service Agent terminates the timer 450. This is illustrated in figure 4 as the Service Agent checking 411 if the timer has expired and if it has not expired, the Service Agent checking 412 if the user has resumed the service. In case the timer expires before a user indicates that he/ she wishes to resume the service, the method comprises requesting 420 the Service ROviderto terminate all connections setup between the Service Agent, the Service Riovider and the at least one mformation Source in association with the delivery of the requested service and to delete all personal information associated with the delivered service in the Service ROvider; and logging out430 from the atleastone mformation Source, deleting 440 all personal information associated with the delivered service in the Service Agent

[00062] In this example, the reception of a service termination message from the Service Rx>videris interpreted such that the user may possibly want to continue using the same service or another service in a short while. Therefore, a timer is started to delay the termination of the connections and the deletion of information in the Service Riovider and in the Service Agent If the user chooses to continue the service before the expiration of the timer, then the Service Rovider may start deftvering the service since all the necessary connections and user information is already ready and available. When the timer expires, it should be possible to ensure thatno connection is left established and thatno perso ml information is stored in order to protect the user's perso nal information. Especially if the user is using a shared Service Ehdpoin it should be possible to ensure that another user may not in any way be given any personal information of the previous user. This is performed in the same manner as described above in relation to figure 2.

[00063] Further, in relation to figure 4, it is possible that the user wishes to make use of another service that could be delivered at the same Service Ehdpoint m ease this service is being delivered by a different Service Provider than the previously delivered service, then all connections setup between the Service Agent, the Service Provider and the at least one Information Source in association with the delivery of the requested service should be terminated and all personal information associated with the delivered service in the Service Riovider should be deleted. However, the connections setup between the Service Agent and the at least one Information Source need notbe temiinated and the information acquired by the Service Agent need notbe deleted. This is because the new Service Provider may make use of the same user information or parts of the same user information and may want to acquire user information from the same mformation So urce(s).

[00064] According to yet an embodiment, the method further comprising issuing a temporary token in response to receiving the service information message and providing the token to the Service Provider when requesting the Service Provider to setup a connection to the atleastone mformation Source, thereby enabling, by means of the token, the Service P ovider to obtain the information needed for providing the service.

[00065] This may performed in order to enhance security. The Service Agent issues a temporary token which is valid for the duration of the service or for requesting information from the at least one Irrformation Source once. The token is given to the Service Provider which then may use the token in order to query the at least one Information Source for informatio As the Service Provider has used to token to obtain information needed for providing the service, the token becomes invalid. The token can be arranged to be valid for a certain duration in time or to be used for a predetermined number of times.

[00066] Figure 5 is a block diagram of an embodiment of a Service Agent adapted to provide a service for a user, e.g. according to any of the procedure described above in relation to figures 14.

[00067] In the embodiment shown, wherein the Service Agent510 is incorporated into the Service Ehdpoint520, the FDD 500 is being connected to the Service Fhdpoint Alternatively, the Service Agent 510 can be implemented as a separate device thatis connected to the Service Ehdpoint520, wherein the FDD 500 would be connected to the Service Agent 510 which in turn is connected to the Service Fhdpoint520.

[00068] The Service Agent510 thatis illustrated in figure 5 has the same advantages as the method described above. Therefore, the Service Agent will be described only in brief here.

[00069] Just to mention a few examples, the Service Endpoint520 could be a television set at a user's home or in a hotel room, it could be a shared computer at a library, it could be a set-top-box, a game console and so on

[00070] The Service Agent510 is adapted to provide a service for a user and figure 5 illustrates it comprising a detecting unit 511, which is adapted to detect thata FDD 500 is being connected to the Service Agent510. The FDD is operated by the user. [00071] Figure 5 also illustrates the Service Agent510 comprising a

communication unit512, which is adapted to receive a service information message from a Service Provider 530, comprising a service identifier. As was explained above, a user is being given the choice of at least one service that can be delivered to the Service Ehdpoint, where after the user selects a service giving cause to the information re quest from the Service Provider 530.

[00072] The Service Agent510 further comprises a processing unit513, which is adapted to obtain a service profile from the FDD 500, using the service identifier. The processing unit513 is further adapted to log in to atleastone Information Source 540 identified from the service profile using personal credentials comprised in the service profile in order to allow the Service Provider 530 to access the information needed for providing the service. The processing unit 513 is further adapted to request the Service Provider 530 to setup a connection to the at least one Information Source 540 to obtain the information needed for providing the service.

[00073] In this way, the Service Agent510 enables the delivery of the service from the Service Provider 530 to the Service Fhdpoint520 based on the information that was acquired from the atleastone information source.

[00074] According to an embodiment, the processing unit513 is further adapted to retrieve personal settings from the FDD 500 to enable presentation of the service to the user in accordance with the personal settings.

[00075] In an example, the service identifier is a Service Type or Service Code.

[00076] According to an embodiment, the detecting unit511 is further adapted to detect disconnection of the FDD 500 from the Service Agent510, wherein the processing 513 unit is further adapted to request the Service Provider to terminate all connections setup between the Service Agent510, the Service Provider 530 and the atleastone Information Source 540 in association with Ihe delivery of tiie requested service and to delete all personal information associated with the delivered service in the Service Provider 530. The processing unit513 is further adapted to log outfromthe atleastone information Source 540, and to delete all personal information associated with the delivered service in the Service Agent510. Figure 5 illustrates the Service Agent 510 comprising a memory 514 in which personal information associated with the delivered service may be stored for the duration of the delivery of the service.

[00077] According to yet an embodiment the communication unit 512 is further adapted to receive a service termination message from the Service Provider 530. As was described above, this is the result of the user wishing to stop making use of the service. Then, the processing unit513 is adapted to, via the communication unit, request the Service Provider to terminate all connections setup between the Service Agent510, the Service Provider 530 and the atleastone Information Source 540 in association with the delivery of the requested service and to delete all personal information associated with the delivered service in the Service Provider 530. The processing unit513 is further adapted to log outfrom the atleastone Information Source 540, and to delete all personal information associated with the delivered service in the Service Agent 510.

[00078] According to an embodiment, the commumcauon unit512 is further adapted to receive a service termination message from the Service Provider 530. The processing unit 513 is adapted to start a timer and to detect the lapsing of the timer, wherein the processing unit is further adapted to, via the communication unit request the Service Provider to terminate all connections setup between said Service Agent, Service Provider and the atleastone Information Source in association with the delivery of the requested service and to delete all personal information associated with the delivered service in the Service Provider upon detecting the lapsing of the timer. The processing unit is further adapted to log outfromthe at least one Information Source and to delete all personal information associated with ihe delivered service in the Service Agent

[00079] According to an embodiment, the processing unit513 is further adapted to issue a temporary token in response to the reception of the service information message and to provide the token to the Service Provider when requesting the Service Provider to setup a connection to the atleastone Information Source, thereby enabling the Service Provider, by means of the token, to obtain the information needed for providing the service.

[00080] Figure 5 also illustrates how the Service Agent 510 interacts with other nodes in order to enable delivery of a service from a service Provider 530 to a Service Ehdpoint520. fi ure 5 illustrates an einbodirnentin wHch the Service Agent510 is incorporated into the Service Ihdpoint520.

[00081] The pre sent invention and its exemplary embodiments can be realized in many ways. Pbr example, an embodiment of the present invention includes a computer-readable medium having program instructions stored thereon that are executable by a computer or processor of the Service Agent to perform the method steps of the exemplary embodiments of the pre sent invention as previously described and as set forth in the claims.

[00082] The service profiles may be created in different ways. In one example, wherein the PUD is comprised in a mobile phone, a service profile may be downloaded from an operator, h another example, wherein the FPI ) is a USBetick, a service profile may be entered manually from e.g. a computer to which the USB- stick can be inserted, or a profile can be downloaded from a service provider using the computer and then stored on the USF stick

[00083] As described above, the content on the PHL) can be protected by password and it can also be encrypted using common methods. Two examples of encryption methods are Data Encryption Standard (DES) and Advances Encryption Standard (AES). The content can also be protected and accessed by applications on a Universal Integrated Circuit Card (ISCC) used by P Multimedia Services Identity Module (ISM) for mobile phones.

[00084] In the above described embodiments, the user manually connects the FDD to the Service Agent, either wirelessly of my physical means such as insertion, plug- in and the like. In an embodiment, the FDD may scan the radio environment and thereby discover the presence of a service environment In such discovery protocol like e.g. Simple Service Discovery R tocol (SSDF 1 ) or Universal Hug and Hay (UFhF) could be used. The FDD can be adapted to advertise its presence by multicasting a presence message on a specific address and port The service environment in this example is then adapted to listen on this specific port

[00085] Further, in this example, the FDD is adapted to support at least one Near Held Communication (NFC) technology. Some examples of an NFC technology are Infrared and Bluetooth. The data that is communicated between the FDD and the Service Agent can be exchanged using a secure channel in order to protect user information. The secure channel can be provided by a network protocol such as Secure SheU (SSH).

[00086] It is essential that the different entities described above can communicate with each other. When entities communicate, they do so by means of protocols which enable the different entities to "understand" each other. A protocol can be seen as a language that is spoken by the entities involved. The FfD is arranged to have access to a homogeneous language shared by the whole system, which describes the different service types. Such a language can e.g. be described with ontologies. An ontology is a formal representation of knowledge and commonly used in order for different devices to know that they mean the same thing. An example ontology is Dublin Core. [00087] As has been described above, the EPD may hold several different service profiles associated with different services, which services are provided by service providers. A service profile comprises notonly identities of information sources which can be accessed to retrieve information and credentials needed to gain access to the information sources, but also description of the language or protocol forti e information sources.

[00088] Pigure 6 is a signaling diagram illustrating an embodiment of an exemplary method for providing a service for a user.

[00089] In figure 6, the Service Agent510 and the Service E dpoint520 are illustrated as separate entities. However, the Service Agent can be implemented as a part of, or incorporated into, the Service Ehdpoint Such an example is illustrated in figure 5 as the Service agent510 being within the Service Eidpoint520. It is illustrated in figure 6 as a dotted line around the Service Agent and the Service Eidpoint

[00090] Hgure 6 illustrates the Service Agent510 detecting 6:1 connection of a PPD 500. The HH) is operated by a user, who e.g. connects the FPU to a Service Agent510 coupled to a Service Ehdpoint520. The EPD has atleastone service profile. One example of how this could be done is that the user inserts a USB stick into a television set or the user having his EPD comprised in a mobile phone which detects that a set-top-box is connectable via Bluetooth and establishes a wireless connection to the set-top-box.

[00091] The service endpointmay then typically provide information to the user regarding the different services that are supported by or can be delivered to the service endpoint This will enable the user to select a service. As the user selects a service, a Service Request 6:2a, 6:2b is sent to and received by the Service Erovider 530. In alternative 6:2a, the user may enter or give the service request directly to the Service Erovider 530, e.g. by sending an SMS to the Service Erovider or the like. In alternative 6:2b, the user enters or selects a service by means of the Service Ehdpoint520, which forwards the service request to the Service Provider 530. The Service Provider 530 needs personal information regarding the user, i.e. user information, in order to deliver the requested service to the user and requests this information from the Service Agent 510. This is illustrated in figure 6 by the Service Agent510 receiving 6:3 a service information message from a Service Provider 530, comprising a service identifier indicating what information is needed for providing the service.

[00092] The Service Agent510 obtains 6:5 a service profile fromthe FDD 500, using the service identifier. This is done by the Service Agent 510 sending 6:4 a request for the service profile to the PTD 500, which returns 6:5 the service profile to the Service Agent 510.

[00093] When the JrHJ 500 receives the request for the service profile, the EFD looks at the service identifier and determines which of the atleastone service profile that is to be used in relation to the service. If mo re than one service profile can be used in association with the requested service, the determination of which service profile to use can be done e.g. manually by the use o automatically by the service agent

[00094] As has been described above, the service profile comprises identities of Information Sources which the Service Provider can access, and credentials used to access the Information Source(s).

[00095] The Service Agent510 then logs in 6:6 to atleastone Info rmation Source 540 identified from the service profile, using personal credentials comprised in the service profile in order to allow the Service Provider 530 to access the information needed for providing the service. It shall be observed that figure 6 is somewhat simplified. In the case of a plurality of Information Sources, step 6:6 is repeated once for every formation Source, In figure 6, the Information Source or tiformation Sources are illustrated by the box 540.

[00096] The Service Agent510 then requests 6:7 the Service Provider 530 to set up 6:8 a connection to the atleastone Information Source 540 and to obtain 6:9 the information needed for providing the service. Again, if there is more than one tiformation Source, these steps are also repeated for every Information Source.

[00097] This way, the Service Provider 530 may gain access to the necessary information needed to provide the service to the user, thereby enabling the delivery 6:10 of the service from the Service Provider 530 to a Service Ehdpoint520, based on the information retrieved from the atleastone Information Sources 540. As has been described above, the Service Ehdpoint520 and the Service Agent510 may be separate entities which are coupled together. Alternatively, the Service Agent 510 ma be incorporated into the Service E dpoint520.

[00098] Hgure 7 is a signaling diagram illustrating an embodiment of an exemplary method for providing a service for a user.

[00099] In figure 7, the Service Agent510 and the Service Hidpoint520 are illustrated as separate entities. However, the Service Agent can be implemented as a part of, or incorporated into, the Service Ehdpoint Such an example is illustrated in figure 5 as the Service agent510 being within the Service Ehdpoint520. It is illustrated in figure 7 as a dotted line around the Service Agent and the Service Ehdpoint

[000100] Hgure 7 can be seen as an exemplary continuation of the exemplary method illustrated in figure 6. After the user has finished making use of the service, he/ she decides to stop using the service. In the example, the user actively gives a "termination order'' to the Service Provider as will be described below. As for figure 6, figure 7 is somewhat simplified. The one or the plurality of toformation Sources are illustrated in figure 7 asjustone entity 540 "Information Sources". As for figure 7, some steps may have to be repeated in the case of more than one Information Source.

[000101] As the user wants to stop making use of the service, he/ she indicates 7:1a, 7:1b this to the Service Provider 530, optionally via the Service Ehdpoint 530. As was described above in relation to figure 6, the user may enter or give the service termination request 7: la directly to the Service Rovider 530, e.g. by sending an SMS to the Service Rovider or the like. In alternative 7:1b, the user enters the service termination request by means of the Service Ehdpoint 520, e.g. pushing a button, which forwards the service request to the Service Rovider 530.

[000102] Again with reference to figure 7, as the Service Rovider 530 receives the request for service termination, the Service Rovider 530 informs 7:2 the Service Agent 510 that the user no longer wishes to make use of the service. The Service Agent 510 is then responsible for terminating all connections and deleting all personal information as has been described above. The Service Agent 510 sends 7:3 a requestto the Service Rovider 530 to terminate all connections setup between the Service Agent 510, the Service Rovider 530 and the at least one information Source 540 in association with the delivery of the requested service and to delete all personal information associated with the delivered service in the Service Rovider 530. The Service Rovider 530 terminates 7:4 the connections to the information Sources 540 and deletes 7:5 all user information it has acquired in order to deliver the service to the user. The Service Agent 510 logs out 7:6 from the information Sources 540 and deletes 7:7 all user information it has acquired associated with the delivered service.

[000103] In case of a plurality of Information Sources 540, step 7:3 will be repeated for every Information Source, fbr every reception of the request 7:3 by the Service Rovider, the Service provider will perform steps 7:4 and 7:5. Also step 7:6 will be performed for every Information Source. Alternatively, step 7:3 could be sent once and comprise a request to terminate all connections and to delete all person information in the Service Provider, then the Service fro vider will repeat steps 7:4 and 7:5 for every Information Source.

[000104] Below, some examples will be described of different services that may be accessed using the Service Agent as has been described above.

[000105] One example is a movie recommendation system In this example, a user is staying at a hotel. He connects his PPD to the TV in the hotel room The TV in this example comprises a Service Agent and the TV is adapted to being connectable to a PPD. The PPD comprises a service profile for TV channels that the user subscribes to. As the user connects his PPD with the TV in the hotel room, the user will have access to all TV channels thathe subscribes to. In other words, the TV in the hotel room will deliver the same TV channels as the user subscribes to at home. The service profile with further comprise identities of information sources which can be accessed in order to obtain user information that nightbe helpful in order to identify a program on one of the channels, which program might be of interest to the user. The information sources can e.g. be Phcebook and Twitter. The service provider for the TV channels accesses the information sources to obtain user information that might be helpful to give personalized recommendations to the user.

[000106] Another example is Networked Hard drive access. In this example, a user connects his PPD to a public computer, e.g. in an internet cafe. The PHD in this example comprises a service profile for the networked hard drive access service. By connecting his PPD to the public computer, the user will gain access to all personal files at a networked storage. Also, the environment, such as the background or screen layout, is displayed in accordance with personal settings stored on the PHD. The personal settings may also give the user access to bookmarks and so on [000107] Yet another example is Networked Fhoto frame. A user connects his FPU to a networked photo frame. In this example, the PPD comprises a service profile for the networked photo frame service. As the user connects the FED to the networked photo frame, personal pictures are available and can be streamed to the photo frame.

[000108] li the above examples, as has been previously described, the PPD may be protected such that the user needs to enter a password or some other login or sign-in pro c e dure .

[000109] Now, an example will be briefly described. A user called Carol would like to watch a movie but cannotmake up her mind about what movie she would like to watch She subscribes to a service called "Ftecommender Service" which is supported by a Service Provider. This Ftecommender Service makes use of a person's social relationship, e.g. friends on Pkcebook Fbr the Ftecommender Service to operate, the Service Provider needs to access Carol's account on Fkcebook in order to query the Application Programming Interface, AH Hence, the Service P ovider needs Carol's credentials. In this Ekample, Carol has a PPD which is incorporated into her mobile telephone. Further, the Service Agent is in this example incorporated into a Set-lbp-Box, STB, and the PPD is connected to the STB wirelessly.

[000110] The Service Agent in the STB requests and receives a service profile from the PHD in the mobile telephone. The service profile indicates that the

Information Source to be contacted for this service is Fkcebook and it also comprises her credentials for Fkcebook. The Service Agent then logs into Fkcebook In this example, Fkcebook provides the Service Agent with a temporary token which is valid for the duration of the service. The Service Agent requests the Service Provider to setup a connection to Fkcebook. The Service Provider sets up a connection to Fkcebook and can obtain personal information, e.g. who her friends are, their favorite groups and so on Using this information, the Service Provider performs processing of the obtained information in order to recommend movies that Carol mightbe interested in The recommendations are presented to Carol who then may choose one of the recommended movies.

[000111] After the movie, Carol is hungry and wants a cup of chocolate and a sandwich She goes to the refrigerator and finds out that she is out of milk The refrigerator also comprises a Service Agent The Service agent in the refrigerator is also connected to the PPD in Carol's mobile telephone. The refrigerator also comprises in this example a display and Carol then want to make use of a service for buying groceries, hereinafter referred to as a shopping service. She accesses the shopping service by means of the display. This shopping service is provided by another Service Provider. This Service Provider needs access to Carol's bank The Service Agent in the refrigerator retrieves a service profile for the shopping service. The profile for the shopping service comprises credentials for Carol's bank The Service Agent logs into both the bank, which in this example is an Information Source. The Service Agent then requests the Service Pro vider for the shopping service to setup a connection to the bank Bv doing this, the Service Provider can access information, e.g. an account statement thereby ensuring that Carol has money to shop for. Carol can men order milk from the shopping service.

[000112] Another example will now be briefly described. A user called James has his PPD incorporated into a mobile telephone. He subscribes to a service for networked hard drive access. James goes to the library and there he finds a public Personal Computer, PC. The public PC has a Service Agent incorporated into it This makes is possible for James to connect his PPD to the Service agent in the public PC, by means of wireless connection James needs to access a listof books he is interested in which he has stored in the networked hard drive. He connects his PPD to the Service agent in the public PC and, in the same manner as has been described above, gains access to his list of books stored in the networked hard drive.

[000113] It should be noted that figure 5 merely illustrates various functional units in the Service Agent in a logical sense. However, the skilled person is free to implement these functions in practice using any suitable software and hardware means. Thus, the invention is generally not limited to the shown structures of the Service Agent and the functional units.

[000114] With reference to figure 5, the functional units 511-513 described above can be implemented in the Service Agent as program modules of a computer program comprising code means which when run by a processor in the Service Agent causes the Service Agent to perform the above-described functions and actions. The processor may be a single CIV (Central processing unit), or could comprise two or more processing units in the Service Agent fbr example, the processor may include general purpose microprocessors, instruction set processors and/ or related chips sets and/ or special purpose microprocessors such as ASICs (Application Specific Integrated Circuit). The processor may also comprise board memory for caching purposes.

[000115] The computer program may be carried by a computer program product CEP in the Service Agent connected to the processor. The conrouter program product comprises a computer readable medium on which the computer program is stored. Fbr example, the computer program product may be a flash memory, a RAM (Random-access memory), a ROM (Read-Only Memory) or an EEPROM (Electrically Erasable Programmable ROM), and the program modules could in alternative embodiments be distributed on different conrouter program products in the form of memories within the Service Agent

[000116] While the invention has been described with reference to specific exemplary embodiments, the description is generally only intended to illustrate the inventive conceptand should notbe taken as limiting the scope of the inventio pre sent invention is defined by the appended claims.