The disclosure relates to methods for handling a request to initiate a call and entities configured to operate in accordance with those methods.
There are various situations in which calls may be initiated between entities. Some of these situations may involve a mission critical push to talk (MCPTT) service and/or a mission critical video (MCVideo) service, which are defined in 3GPP TS 22.179 and TS 23.281 respectively. The MCPTT service is a push to talk (PTT) communication service, which supports applications for mission critical organisations and mission critical applications for other businesses and organizations (e.g. utilities, railways, etc.). It is a group communication services that is known to have fast setup times, high availability, the ability to handle large groups, strong security, reliability, and priority handling. An MCPTT user can be any user that has a device with the capability to participate in an MCPTT service. The device can, for example, be an MCPTT user equipment (UE). An MCPTT UE is any UE that enables an MCPTT user to participate in an MCPTT service. A dispatcher is an example of an MCPTT user that participates in MCPTT communications for command and control purposes.
A PTT communication service provides an arbitrated method by which two or more users may communicate. The users of a PTT communication service may request permission to transmit to other users (e.g. traditionally by means of a press of a button). An MCPTT service supports an enhanced PTT communication service, which is suitable for mission critical scenarios, based on third generation partnership (3GPP) system services. An MCPTT service is intended to support communication between several users (i.e. a group call), where each user has the ability to gain permission to talk in an arbitrated manner. Similarly, an MCVideo service supports video media communication between several users (i.e. group call), where each user has the ability to gain permission to stream video in an arbitrated manner. Both MCPTT and MCVideo services also support private calls between pairs of users. That is, a call between a pair of users using an MCPTT or MCVideo service can be a private call. MCPTT and MCVideo services are built on the existing 3GPP transport communication mechanisms provided by the 3GPP architectures to establish, maintain, and terminate the actual communication path(s) among users.
Ambient listening is a feature that allows an authorised MCPTT user (typically a dispatcher) to cause an MCPTT UE of another user to initiate an audio call without that MCPTT UE providing any indication that it is transmitting audio. Ambient listening can be initiated by a remote authorised MCPTT user that wants to listen to another MCPTT user. The purpose of ambient listening is to allow an authorised MCPTT user to listen to activities at the location of an MCPTT UE of another user to find out what is happening around that MCPTT UE without making the user of that MCPTT UE or any people around that MCPTT UE aware that the listening is happening. An ambient listening call is different from other types of call (e.g. group calls) as, for an ambient listening call, audio is only transmitted to one party in the call, such as a dispatcher or an authorised MCPTT user that is acting in a similar role to a dispatcher.
As illustrated by arrow 300 of
As illustrated by arrow 310 of
Similar to an ambient listening call, an ambient viewing call is a feature that allows an authorised MCVideo user (typically a dispatcher) to cause an MCVideo UE of another user to initiate a video call without that MCPTT UE providing any indication that it is transmitting video. Ambient viewing can be initiated by a remote authorised MCVideo user that wants to view another MCVideo user. The purpose of ambient listening is to allow an authorised MCVideo user to view activities at the location of an MCVideo UE of another user to find out what is happening around that MCVideo UE without making the user of that MCVideo UE or any people around that MCVideo UE aware that the viewing is happening.
As illustrated by arrow 400 of
As illustrated by arrow 410 of
Thus, in this way, ambient listening calls and ambient viewing calls respectively allow a user to listen to and watch the surroundings of another (remote) user without any indication on the targeted UE. This feature is commonly used for stolen UEs, monitoring officers, officer safety and particular operations, where it is important that the UE does not indicate that a call is happening. However, ambient listening calls and ambient viewing calls can easily be misused or exploited for malicious purposes. For example, an authorised MCPTT user can listen to another MCPTT user's environment in bad faith, or an authorised MCVideo user can maliciously activate a camera of an MCVideo UE of another user to watch the environment of that user.
It is thus an object of the disclosure to obviate or eliminate at least some of the above-described disadvantages associated with existing techniques.
Therefore, according to an aspect of the disclosure, there is provided a method for handling a request to initiate a call. The method is performed by a server entity. The method comprises, in response to receiving a first request for a first client entity to initiate a call to a second client entity without the second client entity rendering a notification of the call, initiating transmission of a first message towards one or more third client entities to inform the one or more third client entities of the first request. The method comprises authorising the first client entity to initiate the call only if a second message, acknowledging the first request, is received from at least one of the one or more third client entities.
There is thus provided an advantageous method for handling a request to initiate a call. In particular, the method extends the existing protocols of ambient (e.g. listening and/or viewing) calls to make the initiation of such calls more transparent to one or more other (e.g. authorised) entities. The initiation of a call used for such a purpose is more transparent since it is no longer possible for the call to be initiated by a single user and one or more other entities need to provide acknowledgment for any request to initiate such a call. More precisely, a new role is defined for certain client entities (namely, the one or more third client entities), such that they can witness the initiation of the calls. In effect, there is a control or an audit introduced at the technical and protocol level, which does not depend on human initiative and/or manual control.
The increase in transparency in the initiation of calls creates a deterrent against, and thus makes the calls more resistant to, any misuse or malicious exploitation. Any privacy and/or misuse concerns associated with ambient (e.g. listening and/or viewing) calls can be reduced in this way. The method provides a security-enhanced ambient (e.g. listening and/or viewing) call. Moreover, this is possible without harming the effectiveness of the call. The first client entity still simply needs to request initiation of a call and there is still no notification at the second client entity that the call is happening and thus the configuration allows the original settings to be maintained.
In some embodiments, the method may comprise authorising the first client entity to initiate the call only if the first request is approved by at least one of the one or more third client entities.
In some embodiments, authorising the first client entity to initiate the call only if the first request is approved by at least one of the one or more third client entities may comprise authorising the first client entity to initiate the call only if the first request is approved by at least a threshold number of the one or more third client entities, or authorising the first client entity to initiate the call only if the first request is approved by each of the one or more third client entities. In this way, a consensus-based decision is possible, rather than a single entity decision, which can make the call even more resistant to any misuse or malicious exploitation.
In some embodiments, the threshold number may be fixed or adaptive.
In some embodiments, the threshold number may be set based on contextual information for the first request and/or an identity of the second client entity.
In some embodiments, the second message received from at least one of the one or more third client entities may comprise information indicative of whether the first request is approved or denied and/or a third message received from at least one of the one or more third client entities may comprise information indicative of whether the first request is approved or denied.
In some embodiments, a number of third client entities towards which transmission of the first message is initiated may be set based on an identity of the second client entity.
In some embodiments, the method may comprise, if the first request is authorised, initiating transmission of the first request towards the second client entity and/or initiating transmission of a fourth message towards the first client entity, wherein the fourth message may be indicative that the first request is authorised. In some embodiments, the method may comprise, if the first request is not authorised, initiating transmission of a fifth message towards the first client entity, wherein the fifth message may be indicative that the first request is not authorised.
In some embodiments, the first message may comprise any one or more of an identifier that identifies the first client entity, an identifier that identifies the second client entity, information indicative of whether approval of the first request is required, and information indicative that the call is to be initiated by the first client entity.
In some embodiments, the at least one second message may comprise any one or more of an identifier that identifies the first client entity, an identifier that identifies the second client entity, and one or more identifiers that each identify one of the one or more third client entities.
In some embodiments, the one or more third client entities may comprise at least one third client entity that is predefined for the second client entity, at least one third client entity that is specified in the first request, and/or at least one third client entity that is randomly selected.
In some embodiments, the method may comprise randomly selecting at least one of the one or more third client entities.
In some embodiments, the method may comprise setting a maximum duration for the call, after which the call disconnects. In this way, even if the first client entity initiated a legitimate ambient call, the first client entity can be prevented from maliciously continuing to connect to the call when there is no longer a need to do so.
In some embodiments, the first message may comprise the maximum duration for the call.
In some embodiments, the call may be an audio and/or video call.
According to another aspect of the disclosure, there is provided a server entity comprising processing circuitry configured to operate in accordance with the method described earlier in respect of the server entity. The server entity thus provides the advantages described earlier in respect of the method performed by the server entity. In some embodiments, the server entity may comprise at least one memory for storing instructions which, when executed by the processing circuitry, cause the server entity to operate in accordance with the method described earlier in respect of the server entity.
According to another aspect of the disclosure, there is provided another method for handling a request to initiate a call. The method is performed by a third client entity. The method is performed in response to receiving a first message that informs the third client entity of a first request. The first request is a request for a first client entity to initiate a call to a second client entity without the second client entity rendering a notification of the call. The method comprises initiating transmission of a second message towards a server entity that initiated transmission of the first message towards the third client entity. The second message acknowledges the first request.
The method thus provides the advantages described earlier in respect of the method performed by the server entity.
In some embodiments, the method may comprise approving or denying the first request.
In some embodiments, the second message may comprise information indicative of whether the first request is approved or denied or the method may comprise initiating transmission of a third message towards the server entity, wherein the third message comprises information indicative of whether the first request is approved or denied.
In some embodiments, the method may comprise controlling a user interface to output a notification requesting a user input indicative of whether the first request is to be approved or denied and, in response to receiving the user input indicative of whether the first request is to be approved or denied, approving or denying the first request according to the user input.
In some embodiments, the first message may comprise any one or more of an identifier that identifies the first client entity, an identifier that identifies the second client entity, information indicative of whether approval of the first request is required, and information indicative that the call is to be initiated by the first client entity.
In some embodiments, the second message may comprise any one or more of an identifier that identifies the first client entity, an identifier that identifies the second client entity, and an identifier that identifies the third client entities.
In some embodiments, the third client entity may be a third client entity that is predefined for the second client entity, a third client entity that is specified in the first request, and/or a third client entity that is randomly selected.
In some embodiments, the call may be an audio and/or video call.
According to another aspect of the disclosure, there is provided a third client entity comprising processing circuitry configured to operate in accordance with the method described earlier in respect of the third client entity. The third client entity thus provides the advantages described earlier in respect of the method performed by the third client entity. In some embodiments, the third client entity may comprise at least one memory for storing instructions which, when executed by the processing circuitry, cause the third client entity to operate in accordance with the method described earlier in respect of the third client entity.
According to another aspect of the disclosure, there is provided a method performed by a system. The method comprises the method performed by the server entity as described earlier and the method performed by the third client entity as described earlier. The method thus provides the advantages described earlier in respect of the method performed by the server entity and the third client entity.
According to another aspect of the disclosure, there is provided a system comprising the server entity as described earlier and at least one third client entity as described. The system thus provides the advantages described earlier in respect of the server entity and the third client entity.
According to another aspect of the disclosure, there is provided a computer program comprising instructions which, when executed by processing circuitry, cause the processing circuitry to perform the method described earlier in respect of the server entity and the method described earlier in respect of the third client entity. The computer program thus provides the advantages described earlier in respect of the method performed by the server entity and the third client entity.
According to another aspect of the disclosure, there is provided a computer program product, embodied on a non-transitory machine-readable medium, comprising instructions which are executable by processing circuitry to cause the processing circuitry to perform the method described earlier in respect of the server entity and the method described earlier in respect of the third client entity. The computer program product thus provides the advantages described earlier in respect of the method performed by the server entity and the third client entity.
Thus, advantageous techniques for handling a request to initiate a call are provided.
For a better understanding of the techniques, and to show how they may be put into effect, reference will now be made, by way of example, to the accompanying drawings, in which:
As mentioned earlier, advantageous techniques for handling a request to initiate a call are described herein. The call referred to herein can be an audio and/or video call. The techniques are implemented by a server entity and/or a third client entity.
As illustrated in
Briefly, the processing circuitry 12 of the server entity 10 is configured to, in response to receiving a first request for a first client entity to initiate a call to a second client entity without the second client entity rendering a notification of the call, initiate transmission of a first message towards one or more third client entities to inform the one or more third client entities of the first request. The processing circuitry 12 of the server entity 10 is configured to authorise the first client entity to initiate the call only if a second message, acknowledging the first request, is received from at least one of the one or more third client entities.
As illustrated in
The processing circuitry 12 of the server entity 10 can be connected to the memory 14 of the server entity 10. In some embodiments, the memory 14 of the server entity 10 may be for storing program code or instructions which, when executed by the processing circuitry 12 of the server entity 10, cause the server entity 10 to operate in the manner described herein in respect of the server entity 10. For example, in some embodiments, the memory 14 of the server entity 10 may be configured to store program code or instructions that can be executed by the processing circuitry 12 of the server entity 10 to cause the server entity 10 to operate in accordance with the method described herein in respect of the server entity 10. Alternatively or in addition, the memory 14 of the server entity 10 can be configured to store any information, data, messages, requests, responses, indications, notifications, signals, or similar, that are described herein. The processing circuitry 12 of the server entity 10 may be configured to control the memory 14 of the server entity 10 to store information, data, messages, requests, responses, indications, notifications, signals, or similar, that are described herein.
In some embodiments, as illustrated in
Although the server entity 10 is illustrated in
The method illustrated in
As illustrated at block 102 of
The one or more third client entities may also be referred to herein as one or more witness client entities. The one or more third client entities referred to herein do not receive media (e.g. audio and/or video) from the second client entity in the call, but simply witness the initiation of the call. In this way, the transparency in the initiation of these sensitive features can be increased by making the initiation process visible to one or more (e.g. pre-defined) witness clients, thereby creating a deterrent against any misuse or abuse of ambient (e.g. listening and/or viewing) calls. In some embodiments, the one or more witness clients may expect to be informed by the server entity 10 about an ambient call request.
In some embodiments, the one or more third client entities may comprise at least one third client entity that is predetermined. For example, in some embodiments, the one or more third client entities may comprise at least one third client entity that is predefined for the second client entity. For example, in an embodiment where the second client entity belongs to a high-ranking public safety officer, the one or more third client entities can be identified more carefully to prevent any misuse. Alternatively or in addition, in some embodiments, the one or more third client entities may comprise at least one third client entity that is specified in the first request. For example, the first request may comprise an identity of at least one third client entity. In some of these embodiments, the first client entity may itself identify at least one third client entity. This may be particularly advantageous in emergency or secret operations.
Alternatively or in addition, in some embodiments, the one or more third client entities may comprise at least one third client entity that is randomly selected. Although not illustrated in
In some embodiments, a number of third client entities towards which transmission of the first message is initiated may be set based on an identity of the second client entity. That is, for example, the number of third client entities towards which transmission of the first message is initiated may be determined depending on which client entity is to be listened to or viewed.
Herein, the first client entity 30, the second client entity 40, and the one or more third client entities 20 are different client entities. The one or more third client entities 20 can, for example, be one or more client entities other than those actively involved in the ambient (e.g. listening and/or viewing) call procedure, i.e. other than the first client entity 30 and the second client entity 40.
In some embodiments, the first message referred to herein may comprise any one or more of an identifier that identifies the first client entity, an identifier that identifies the second client entity, information indicative of whether approval of the first request is required, and information indicative that the call is to be initiated by the first client entity. The information indicative that the call is to be initiated by the first client entity can also be referred to as information indicative that the call is to be remotely initiated. That is, the call is to be initiated remotely at the first client entity (e.g. by a user, such as a dispatcher) to the second client entity, where the second client entity is a different entity to the first client entity. The first client entity can also be referred to herein as the calling entity, or the listening and/or viewing entity. The second entity can also be referred to herein as the called entity, or the listened to or views entity.
An example of a first message, where the first request is a request to initiate a mission critical push to talk (MCPTT) call, is provided in the table below:
Returning back to
Thus, in this way, the server entity 10 (or, more specifically, the processing circuitry 12 of the server entity 10) can authorise the first client entity to initiate the call based on the receipt of at least one second message acknowledging the first request. That is, the server entity 10 (or, more specifically, the processing circuitry 12 of the server entity 10) can authorise the first client entity to initiate the call based on the receipt of at least one acknowledgment message. More specifically, the server entity 10 (or, more specifically, the processing circuitry 12 of the server entity 10) can authorise the first client entity to initiate the call provided at least one acknowledgement message is received.
In some embodiments, the first client entity may be authorised to initiate the call only if the first request is approved by at least one of the one or more third client entities. In some embodiments, the second message received from at least one of the one or more third client entities may comprise information indicative of whether the first request is approved or denied. Alternatively or in addition, in some embodiments, a third message received from at least one of the one or more third client entities may comprise information indicative of whether the first request is approved or denied. Thus, in some embodiments, the first client entity may be authorised to initiate the call only if an approval message is received from at least one of the one or more third client entities.
In some embodiments, authorising the first client entity to initiate the call only if the first request is approved by at least one of the one or more third client entities may comprise authorising the first client entity to initiate the call only if the first request is approved by each (or all) of the one or more third client entities. Thus, in some embodiments, the server entity 10 (or, more specifically, the processing circuitry 12 of the server entity 10) may only authorise the first client entity to initiate the call if an approval message is received from every third client entity.
In other embodiments, authorising the first client entity to initiate the call only if the first request is approved by at least one of the one or more third client entities may comprise authorising the first client entity to initiate the call only if the first request is approved by at least a threshold number (e.g. a subset) of the one or more third client entities. Thus, in some embodiments, a certain number of approval messages may be required in order for the first client entity to be authorised to initiate the call. In some embodiments, the threshold number may be fixed. For example, the threshold number may be fixed irrespective of the first request that is received. In other embodiments, the threshold number may be adaptive (or dynamic). For example, the threshold number may be adapted depending on the first request that is received. The threshold number can be set based on a variety of factors.
In some embodiments, the threshold number may be set based on contextual information for the first request and/or an identity of the second client entity. That is, for example, the threshold number may be determined depending on which client entity is to be listened to and/or viewed. In some embodiments, the contextual information for the first request may comprise a level of risk associated with authorising the first request, e.g. an emergency level of an incident associated with the first request, a criticality of an operation associated with the first request, etc. This enables risk-based decision making on the required number of approval messages needed to authorise the first request. In some embodiments, these kinds of factors can (e.g. automatically) be evaluated by another entity and fed into the server entity 10 as auxiliary data, which can act as a context-aware mechanism. Although some example factors have been provided for the setting of threshold number, it will be understood that the threshold number may be set based on any other factor and/or any combination of factors.
Thus, in this way, the server entity 10 (or, more specifically, the processing circuitry 12 of the server entity 10) can authorise the first client entity to initiate the call based on the receipt of at least one (second or third) message comprising information indicative that the first request is approved. That is, the server entity 10 (or, more specifically, the processing circuitry 12 of the server entity 10) can authorise the first client entity to initiate the call based on the receipt of at least one approval message. More specifically, the server entity 10 (or, more specifically, the processing circuitry 12 of the server entity 10) can authorise the first client entity to initiate the call provided at least one approval message is received.
In some embodiments, if no second message (acknowledging the first request) is received or less than the required number of approval messages is received on expiry of a predefined time period, transmission of the first message may be initiated towards one or more other third client entities to inform the one or more other third client entities of the first request. In these embodiments, the method may comprise authorising the first client entity to initiate the call only if a second message (acknowledging the first request) is received from at least one of the one or more other third client entities and optionally only if the required number of approval messages are received from the one or more other third client entities. Here, the required number of approval messages may be an approval message from any one third client entity, an approval message from each third client entity, or an approval message from the threshold number of third client entities. In some embodiments, these steps may be repeated, e.g. until at least one second message (acknowledging the first request) is received and optionally until at least one approval message is received. In some embodiments, a timer may be set for the predefined time period. For example, the timer may be set in response to initiating transmission of the first message. The server entity 10 (or, more specifically, the processing circuitry 12 of the server entity 10) may be configured to set the timer. Thus, if not enough third entity clients return a response, the server entity 10 can inform other third entity clients (e.g. those that are expected to return a response) according to some embodiments. This can be particularly beneficial where one or more third client entities failed to receive the first message, one or more third client entities are unreachable, one or more third client entities are unavailable, and/or one or more third client entities are having communication issues, since these situations will then not prevent the initiation of the ambient call. In this way, it is possible to acquire at least one second message (acknowledging the first request) and optionally also enough approval messages as soon as possible to prevent any delay in initiating the ambient call, which can be particularly important in case of an emergency.
In some embodiments, the at least one second message may comprise any one or more of an identifier that identifies the first client entity, an identifier that identifies the second client entity, information indicative of whether the first request is approved or denied, and one or more identifiers that each identify one of the one or more third client entities.
An example of a second message, where the first request is a request to initiate a mission critical push to talk (MCPTT) call, is provided in the table below:
Although not illustrated in
On the other hand, if the first request is not authorised, transmission of a fifth message may be initiated towards the first client entity according to some embodiments. More specifically, the processing circuitry 12 of the server entity 10 can be configured to initiate transmission of (e.g. itself transmit, such as via a communications interface 16 of the server entity 10, or cause another entity to transmit) the fifth message towards the first client entity. The fifth message can be indicative that the first request is not authorised.
In response to receiving the first request, the second client entity can automatically accept the call without rendering a notification of the call. That is, the second client entity can automatically accept the call without causing any indication about the call. Thus, a user of the second client entity is unaware of the call. The second client entity can transmit media (e.g. audio and/or video) from the call to the first client entity. In this way, the first client entity can listen to and/or view the call without the user of the second client entity knowing. This is also referred to in the art as ambient listening and/or viewing.
Although not illustrated in
As illustrated in
Briefly, the processing circuitry 22 of the third client entity 20 is configured to, in response to receiving a first message that informs the third client entity of a first request, initiate transmission of a second message towards the server entity 10 that initiated transmission of the first message towards the third client entity. As mentioned earlier, the first request is a request for a first client entity to initiate a call to a second client entity without the second client entity rendering a notification of the call. The second message acknowledges the first request.
As illustrated in
The processing circuitry 22 of the third client entity 20 can be connected to the memory 24 of the third client entity 20. In some embodiments, the memory 24 of the third client entity 20 may be for storing program code or instructions which, when executed by the processing circuitry 22 of the third client entity 20, cause the third client entity 20 to operate in the manner described herein in respect of the third client entity 20. For example, in some embodiments, the memory 24 of the third client entity 20 may be configured to store program code or instructions that can be executed by the processing circuitry 22 of the third client entity 20 to cause the third client entity 20 to operate in accordance with the method described herein in respect of the third client entity 20. Alternatively or in addition, the memory 24 of the third client entity 20 can be configured to store any information, data, messages, requests, responses, indications, notifications, signals, or similar, that are described herein. The processing circuitry 22 of the third client entity 20 may be configured to control the memory 24 of the third client entity 20 to store information, data, messages, requests, responses, indications, notifications, signals, or similar, that are described herein.
In some embodiments, as illustrated in
Although the third client entity 20 is illustrated in
Although not illustrated, the first client entity and/or the second client entity referred to herein may comprise the same or similar components to the third client entity 20. In some embodiments, along with performing their own function as described herein, the first client entity and/or the second client entity referred to herein may also operate in the manner described herein in respect of the third client entity 20.
As illustrated at block 202 of
Although not illustrated in
In some embodiments, the second message may comprise information indicative of whether the first request is approved or denied. In other embodiments, the method may comprise initiating transmission of a third message towards the server entity 10, wherein the third message comprises information indicative of whether the first request is approved or denied. Thus, the second (or third) message can be an approval message or a denial message.
As the third client entity 20 has the option to deny the first request, the third client entity 20 is able to take some warning action, e.g. when any misuse of an ambient call is suspected, which may prevent irrecoverable damages. This, in itself, can reduce the risks of misuse. Moreover, simply having one or more third client entities 20 operating in the manner described herein can act as a deterrent against any misuse, since it makes the initiation of ambient calls more transparent.
In some embodiments, the method described herein may be repeated whenever (e.g. each or every time) a request to initiate a call is received, e.g. by the server entity 10. That is, each time a request to initiate a call is received, the one or more third client entities may be informed of the request and the method descried herein may then be repeated in respect of that request. In the case of a failure to identify one or more third client entities, the method may operate according to the original setting.
There is also provided a method performed by a system. The method comprises the method described earlier in respect of the server entity and the method described earlier in respect of the third client entity. There is also provided a system comprising the server entity 10 as described earlier and at least one third client entity 20 as described earlier.
In the system illustrated in
As illustrated by arrow 500 of
As illustrated by arrows 502 and 504 of
As illustrated by arrows 506 and 508 of
As illustrated by block 510 of
As illustrated by arrow 512 of
As illustrated by arrow 518 of
In response to receiving the floor granted message, as illustrated by arrows 522 and 524 of
In the system illustrated in
As illustrated by arrow 600 of
As illustrated by arrows 602 and 604 of
As illustrated by arrows 606 and 608 of
As illustrated by block 610 of
As illustrated by arrow 612 of
As illustrated by arrow 618 of
There is also provided a computer program comprising instructions which, when executed by processing circuitry (such as the processing circuitry 12 of the server entity 10 described earlier and/or the processing circuitry 22 of the third client entity 20 described earlier), cause the processing circuitry to perform at least part of the method described herein. There is provided a computer program product, embodied on a non-transitory machine-readable medium, comprising instructions which are executable by processing circuitry (such as the processing circuitry 12 of the server entity 10 described earlier and/or the processing circuitry 22 of the third client entity 20 described earlier) to cause the processing circuitry to perform at least part of the method described herein. There is provided a computer program product comprising a carrier containing instructions for causing processing circuitry (such as the processing circuitry 12 of the server entity 10 described earlier and/or the processing circuitry 22 of the third client entity 20 described earlier) to perform at least part of the method described herein. In some embodiments, the carrier can be any one of an electronic signal, an optical signal, an electromagnetic signal, an electrical signal, a radio signal, a microwave signal, or a computer-readable storage medium.
In some embodiments, the server entity functionality, the third entity functionality, and/or any other entity functionality described herein can be performed by hardware. Thus, in some embodiments, the server entity 10, the third client entity 20, and/or any other entity described herein can be a hardware entity. However, it will also be understood that optionally at least part or all of the server entity functionality, the third entity functionality, and/or any other entity functionality described herein can be virtualized. For example, the functions performed by the server entity 10, the third client entity 20, and/or any other entity described herein can be implemented in software running on generic hardware that is configured to orchestrate the entity functionality. Thus, in some embodiments, the server entity 10, the third client entity 20, and/or any other entity described herein can be a virtual entity. In some embodiments, at least part or all of the server entity functionality, the third entity functionality, and/or any other entity functionality described herein may be performed in a network enabled cloud. The server entity functionality, the third entity functionality, and/or any other entity functionality described herein may all be at the same location or at least some of the entity functionality may be distributed.
It will be understood that at least some or all of the method steps described herein can be automated in some embodiments. That is, in some embodiments, at least some or all of the method steps described herein can be performed automatically.
Thus, in the manner described herein, there is advantageously provided techniques for handling a request to initiate a call. The techniques can deter against any misuse of ambient calls by increasing the transparency of the initiation of such as call.
It should be noted that the above-mentioned embodiments illustrate rather than limit the idea, and that those skilled in the art will be able to design many alternative embodiments without departing from the scope of the appended claims. The word “comprising” does not exclude the presence of elements or steps other than those listed in a claim, “a” or “an” does not exclude a plurality, and a single processor or other unit may fulfil the functions of several units recited in the claims. Any reference signs in the claims shall not be construed so as to limit their scope.
Number | Date | Country | Kind |
---|---|---|---|
2020/12172 | Jul 2020 | TR | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2021/052168 | 1/29/2021 | WO |