IMS node, information node, user node, access control system, method for mediating between user node and information node, method for communicating with an IMS node
A technology of user nodes and information nodes, which is applied in the communication between multiple stations, transmission systems, wireless communication, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0050]
[0051] Embodiments implementing user identity-based access control are described below.
[0052] An example scheme for this user identity-based access control can be illustrated in Figure 2.
[0053] FIG. 2 shows how information associated with a particular RFID is stored in repository server 104 . In this figure, n items of information are associated with RFID value '103', each item providing read / write access privileges to a defined user. In this example, users A, B and C can read / write items #1-#3 of the information, user D can read items #3-#5, users E and F can read / write items #5-#7, And anyone can read items #8-#n.
[0054] In order to achieve such user identifier-based access control to RFID information, such RFID applications require methods of identifying and differentiating users. However, the problem is that no effective method has been proposed.
[0055] In this embodiment, an IP Multimedia Subsystem (IMS) is used to provide an efficient method of i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
