WO2010082363A1 - Gateway apparatus and presence management apparatus - Google Patents

Gateway apparatus and presence management apparatus Download PDF

Info

Publication number
WO2010082363A1
WO2010082363A1 PCT/JP2009/051025 JP2009051025W WO2010082363A1 WO 2010082363 A1 WO2010082363 A1 WO 2010082363A1 JP 2009051025 W JP2009051025 W JP 2009051025W WO 2010082363 A1 WO2010082363 A1 WO 2010082363A1
Authority
WO
WIPO (PCT)
Prior art keywords
presence
apparatus
gateway apparatus
gateway
configured
Prior art date
Application number
PCT/JP2009/051025
Other languages
French (fr)
Inventor
Johan Hjelm
Takeshi Matsumura
Shingo Murakami
Toshikane Oda
Kenta Yasukawa
Original Assignee
Telefonaktiebolaget L M Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget L M Ericsson (Publ) filed Critical Telefonaktiebolaget L M Ericsson (Publ)
Priority to PCT/JP2009/051025 priority Critical patent/WO2010082363A1/en
Priority claimed from US13/139,374 external-priority patent/US9008057B2/en
Publication of WO2010082363A1 publication Critical patent/WO2010082363A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
    • H04L12/2803Home automation networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
    • H04L12/2803Home automation networks
    • H04L12/2807Exchanging configuration information on appliance services in a home automation network
    • H04L12/2809Exchanging configuration information on appliance services in a home automation network indicating that an appliance service is present in a home automation network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
    • H04L12/2803Home automation networks
    • H04L12/283Processing of data at an internetworking point of a home automation network
    • H04L12/2834Switching of information between an external network and a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1003Signalling or session protocols
    • H04L65/1006SIP
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1013Network architectures, gateways, control or user entities
    • H04L65/1016IMS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1013Network architectures, gateways, control or user entities
    • H04L65/102Gateways
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1013Network architectures, gateways, control or user entities
    • H04L65/102Gateways
    • H04L65/1033Signalling gateways
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1013Network architectures, gateways, control or user entities
    • H04L65/102Gateways
    • H04L65/1033Signalling gateways
    • H04L65/1036Signalling gateways at the edge
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/12Network-specific arrangements or communication protocols supporting networked applications adapted for proprietary or special purpose networking environments, e.g. medical networks, sensor networks, networks in a car or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/24Presence management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/28Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/16Mobility data transfer selectively restricting mobility data tracking

Abstract

One aspect of the present invention will provide a first gateway apparatus configured to be connectable to a local network and an external network, to obtain presence information of a device apparatus on the local network and to provide the obtained presence information to a presence management apparatus on the external network, the first gateway apparatus comprising, an obtaining unit configured to obtain the presence information of the device apparatus, a transmitter configured to transmit the presence information to the presence management apparatus via the external network, and a receiver configured to receive, from the presence management apparatus, a suppression instruction of the presence information transmission, wherein the transmitter further configured to suppress the transmission of the presence information to the presence management apparatus after the reception of the suppression instruction.

Description

DESCRIPTION GATEWAY APPARATUS AND PRESENCE MANAGEMENT APPARATUS

TECHNICAL FIELD

[0001] The present invention relates to gateway apparatus and presence management apparatus.

BACKGROUND

[0002] A network architecture called "IP Multimedia Subsystem" (IMS) has been developed by the 3rd Generation Partnership Project (3GPP) as an open standard for handling multimedia services and sessions in the packet domain (for details regarding the IMS, please refer to http://www.3gpp.org/ftp/Specs/html- info/22173. htm) . Various communication terminals and devices (hereinafter referred to as IMS terminals) that conform to the IMS standard are now known. A typical example of an IMS terminal is a mobile phone with IMS functionality. A personal computer (PC) , a personal digital assistant (PDA), or the like can also serve as IMS terminals if they are equipped with IMS functionality. IMS terminals can provide multimedia services by, for example, receiving video streaming from a video-streaming server over an IMS network. [0003] According to International Publication No. WO 2006/045706 which discloses a IMS gateway (IG) enabling non-IMS terminals which do not have an IMS functionality such as a desktop PC and a laptop PC to access services via the IMS network. The IG is located in a private network, to which at least one user terminal is connected. The IG can be implemented on a "Set Top Box" (STB), a "Residential Gateway" (RGw) or other home devices.

[0004] The IG enables IMS services to be delivered to a residential network where various devices such as DLNA and also sensor devices are connected. This type of IG may be called as Home IMS gateway apparatus (HIGA) . The service applications are not limited to the residential network but also to a device network in car controlled by Car IMS gateway apparatus (CIGA) , and also to ad-hoc or a portable network controlled by Portable IMS gateway apparatus (PIGA) . The word "xIGA" represents all these different types of IG. For details regarding the xIGA, please refer to "Bringing IMS services to the DLNA Connected home", Pervasive computing at Home WS in Sydney in May, 2008, "Virtually at home: High-performance access to personal media", Ericsson review, Issue #2/2008 or "Beyond the Connected Car: Using the Portable IMS Gateway as an in-car Interface to Home Services", ICT mobile summit, 2008. [0005] PNAS (Personal Network Application Server) is an intelligent database system where device presence published by xIGA is aggregated and exposed to service providers or other types of watchers . It may also store service offering information from the service providers to expose them to home devices. PNAS has filter enforcement function so that users and the service providers can set filters to protect privacy and eliminate receiving data. In addition, it can generate statistics related to the collected information. For details regarding the PNAS, US patent application 12/118,849 describes them.

SUMMARY

[0006] In case more than one xIGA is connected to the same residential network, both of them publish to the PNAS the same presence information of the devices connected to the network. Problem is that such a duplicated publication consumes unnecessary network and computation resources. Especially it leads to faster battery consumption in case of PIGA.

[0007] According to a first aspect of the invention, there is a provided a first gateway apparatus configured to be connectable to a local network and an external network, to obtain presence information of a device apparatus on the local network and to provide the obtained presence information to a presence management apparatus on the external network, the first gateway apparatus comprising, an obtaining unit configured to obtain the presence information of the device apparatus, a transmitter configured to transmit the presence information to the presence management apparatus via the external network, and a receiver configured to receive, from the presence management apparatus, a suppression instruction of the presence information transmission, wherein the transmitter further configured to suppress the transmission of the presence information to the presence management apparatus after the reception of the suppression instruction.

[0008] According to a second aspect of the invention, there is provided a presence management apparatus configured to manage presence information of a device apparatus on a local network, the presence management apparatus comprising a receiver configured to receive presence information from each of a plurality of gateway apparatuses connected to the local network and to obtain presence information from the device apparatus on the local network, a determination unit configured to determine a master gateway apparatus and a slave gateway apparatus among the plurality of the gateway apparatuses, and a transmitter configured to transmit a suppression instruction to the slave gateway apparatus as a response to the transmitted presence information from the slave gateway apparatus. [0009] According to a third aspect of the invention, there is provided a presence management apparatus configured to manage presence information of a device apparatus on a local network, the presence management apparatus comprising a receiver configured to receive a message, from a first gateway apparatus configured to obtain presence information of a device apparatus on the local network, designating a second gateway apparatus on the local network as a master of the first gateway apparatus, and a transmitter configured to transmit a suppression instruction of presence information transmission to the first gateway apparatus as a response to the received message. [0010] According to a fourth aspect of the invention, there is provided a first presence management apparatus configured to manage presence information of a device apparatus on a local network, the first presence management apparatus comprising a receiver configured to receive a message, from a first gateway apparatus configured to obtain presence information of a device apparatus on the local network, designating a second gateway apparatus on the local network as a master of the first gateway apparatus, and a transmitter configured to transmit a setting message which causes a second presence management apparatus associated with the second gateway apparatus to have a transmission setting of the presence information to the first presence management apparatus when the second presence management apparatus receives the presence information from the second gateway apparatus, wherein when the presence information is received from the first gateway apparatus, the transmitter transmits a suppression instruction of the presence information transmission to the first gateway apparatus as a response to the received presence information. [0011] According to a fifth aspect of the invention, there is provided a first presence management apparatus configured to manage presence information of a device apparatus on a local network, the first presence management apparatus comprising a receiver configured to receive a message, from a first gateway apparatus configured to obtain presence information of a device apparatus on the local network, designating a second gateway apparatus as a slave of the first gateway apparatus, and a setting message, from a second presence management apparatus associated with the second gateway apparatus, causes the first presence management apparatus to transmit presence information to the second presence management apparatus when the first presence management apparatus receives the presence information from the first gateway apparatus, and a transmitter configured to transmit the presence information to the second presence management apparatus when the presence information is received from the first gateway apparatus after the reception of the setting message. [0012] Further features of the present invention will become apparent from the following description of exemplary embodiments with reference to the attached drawings .

BRIEF DESCRIPTION OF DRAWINGS

[0013] Fig. IA shows an exemplary system according to one embodiment of the present invention corresponding to a single-operator case; [0014] Fig. IB shows another exemplary system according to another embodiment of the present invention corresponding to a multi-operator case; [0015] Fig. 1C shows other exemplary system according to expanded embodiment of the present invention corresponding to a multi-operator case; [0016] Fig. 2A shows an exemplary IMS gateway apparatus 101/102 according to the embodiment of the present invention;

[0017] Fig. 2B shows an exemplary PNAS according to the embodiment of the present invention; [0018] Figs. 3A through 3C show examples of data structure corresponding to the presence management table 222 according to the embodiment of the present invention;

[0019] Fig. 4A shows an expanded case of another embodiment corresponding to Fig. 10; [0020] Fig. 4B through 4D show Master-Slave relationship management tables according to the embodiment of the present invention/

[0021] Figs. 5 and 6 show an exemplary sequence diagram describing preparation procedures of the embodiment of the present invention by determining the role of the master PUA;

[0022] Fig. 7 shows an exemplary sequence diagram describing device presence publication from the master

PUA and suppression of the device presence publication from the slave PUA according to the embodiment of the present invention;

[0023] Fig. 8 shows an exemplary sequence diagram describing a case where the slave PUA leaves the local network according to the embodiment of the present invention;

[0024] Fig. 9 shows an exemplary sequence diagram describing a case where the master PUA does not exist on the local network and the slave PUA notices it;

[0025] Fig. 10 shows an exemplary sequence diagram describing a case where the master PUA role is moved to other IMS gateway apparatus according to the embodiment of the present invention;

[0026] Fig. 11 shows an exemplary sequence diagram describing another case where the master PUA role is moved to other IMS gateway apparatus according to the embodiment of the present invention; and

[0027] Fig. 12 shows the concept of the present invention using the master PUA and the slave PUAs according to embodiments of the present invention.

DETAILED DESCRIPTION

[0028] Embodiments of the present invention will now be described with reference to the attached drawings. Each embodiment described below will be helpful in understanding a variety of concepts from the generic to the more specific.

[0029] It should be noted that the technical scope of the present invention is defined by claims, and is not limited by each embodiment described below. In addition, not all combinations of the features described in the embodiments are always indispensable for the present invention.

[0030] The present invention according to the embodiments relates to a mechanism to select one IG from a group of IGs as a master PUA (Presence User Agent) and suppress publication from the other IG (s) as a slave PUA (Presence User Agent) on the same local network, and synchronize or copy the device presence among a plurality of PNASs as presence management apparatuses in a transparent way to the device presence watchers. Fig. 12 shows the concept of the present invention using the master PUA and the slave PUAs according to embodiments of the present invention. Dotted arrow lines from each slave PUA to each PNAS indicates the suppressed publication from the slave PUAs according to the concept of the present invention. [0031] The mechanism to copy or synchronize the device presence information on the same local network among two or more PNAS allows providing the latest device presence information to the watchers even while the publication is suppressed. When the Presence User Agent joins to or leaves from the local network, the above suppression mechanism is started or terminated in a way that the device presence information is provided to the watchers seamlessly.

[0032] In the following embodiments, as an example, a case, where an IG for residential use and fixedly located at user' s home which may be called as HIGA, and a portable IG generally for mobile use and the user can bring it with him outside of the home which may be called as PIGA are used, will be described. It should be noted that the embodiments of the present invention will not be limited to the case using the pair of the HIGA and PIGA, and the embodiments may be applied to a case of arbitrary combination of any types of IGs including HIGA, PIGA, CIGA and so on.

[0033] Fig. IA shows an exemplary system according to one embodiment of the present invention corresponding to a single-operator case. For simplification, a pair of HIGA 101 and PIGA 102 is used for describing the invention; however, the invention can cover the different types of xIGA and more than two of them. In this system, HIGA 101, PIGA 102 and home device 103 are communicatively coupled each other via a local network of a Wireless Local Area Network (WLAN) 104. The local network may be local area network (LAN) based on Ethernet, Bluetooth network or other local network. The HIGA 101 is a home IMS gateway apparatus generally for residential use and fixedly located at home 100 of the HIGA user. The PIGA 102 is a portable IMS gateway apparatus generally for mobile use and the user can bring the PIGA 102 with him outside of the home 100. The PIGA 102 may be configured as a mobile terminal, a mobile phone, a personal digital assistant (PDA) or a laptop computer with home IMS gateway function.

[0034] The HIGA 101 and PIGA 102 are communicatively coupled to the IMS network 111 operated by a single IMS operator. The HIGA 101 and PIGA 102 collect device presence on the local network 104 and publish them to the PNAS 121 via the IMS network 111. Different IMPU are assigned to the HIGA 101 and PIGA 102. In the single operator case according to Fig. IA, the HIGA 101 and PIGA 102 report the device presence to the same PNAS 121. The PNAS 121 aggregates the device presence from a plurality of IMS home gateway apparatuses of the HIGA 101 and PIGA 102, maintains the subscriptions from service providers and notifies them of device presence changes.

[0035] The home device 103 has a network interface and has a control mechanism over the network such as DLNA (Digital Living Network Alliance) , UPnP (Universal Plug-and-Play), ZigBee, ECHONET, SIP (Session Initiation Protocol) , HTTP (Hyper Text Transfer Protocol) , Bluetooth and so on. In Fig. IA, although the number of the home device 103 is one, this is described as an example and the number should not be limited to it. The home device 103 may include any one of a television, a DVD/HDD/BD recorder, a laptop computer, a desktop computer, a printer, a media server, a digital camera, a digital video camera (camcorder) , an acceleration sensor, a temperature sensor, a direction sensor, a location sensor and so on.

[0036] Service provider (SP) 130 can be an IMS AS connected to S-CSCF over ISC interface, or a server on another type of network such as the Internet connected to the PNAS 121. The SP 130 can behave as the presence watcher which receives presence information from the PNAS 121.

[0037] Fig. IB shows another exemplary system according to another embodiment of the present invention corresponding to a multi-operator case. A pair of HIGA 101 and PIGA 102 is also used to describe the invention for simplification; however, the invention can cover the different types of xIGA and more than two of them. In Fig. IB, a basic system configuration is the same as the one shown in Fig. IA, however, the system of Fig. IB corresponds to a case where the HIGA 101 and PIGA 102 are respectively connected to different IMS networks of IMS#1 111 and IMS#2 112 each of which is operated by a different operator. Basically, PNAS#1 121 aggregates the device presence from the HIGA 101 and PNAS#2 122 aggregates the device presence from the PIGA 102. Fig. IB also shows a case where the PNAS#2 122 maintains the subscriptions from service providers and notifies them of device presence changes.

[0038] In the following, detailed description about embodiments of the present invention will be provided in association with the multi-operator case. Though applications specific to the single-operator case will be provided when necessary, the same procedures are basically applicable to that case without major changes to the multi-operator case. [0039] Fig. 2A shows an exemplary IMS gateway apparatus 101/102 according to the embodiment of the present invention. The exemplary IMS gateway 101/102 includes a ISIM/USIM 211, an UPnP Control Point (CP) 212, a SIP Back-to-Back User Agent (B2BUA) 213, a presence user agent 214, a transmitter 215, a receiver 216 and controller 217. [0040] In Fig. 2A, the ISIM/USIM 211 stores essential information for each IMS gateway to work as an IMS client, such as IMS public identity (IMPU) . The UPnP CP 212 performs the device discovery for detecting the home device 103 on the WLAN 104 and controls the discovered device. The SIP B2BUA 213 performs the conversion between IETF SIP and IMS SIP so that a device connected to the IMS gateway apparatus that is not IMS-enabled can access the IMS operator network. The presence user agent 214 publishes device presence information relating to the home device communicatively coupled to the IMS gateway apparatus.

[0041] The transmitter 215 is an interface for information transmission by communicatively coupling to IMS network 111/112 and the WLAN 104 (which is UPnP- based and/or SIP-based) to communicate with the home device 103 or other IMS gateway apparatuses. The receiver 216 is an interface for information reception by communicatively coupling to IMS network 111/112 and the WLAN 104 (which is UPnP-based and/or SIP-based) to communicate with the home device 103 or other IMS gateway apparatuses. The controller controls overall processing of the IMS gateway apparatus and perform processing to be executed according to the embodiments of the present invention including transmission and/or reception of information and home device detection, etc. [0042] Fig. 2B shows an exemplary PNAS according to the embodiment of the present invention. The PNAS includes a control unit 221, a presence management table 222, a transmitter 223, a receiver 224. [0043] The controller -221 executes processing necessary for controlling the PNAS. The presence management table 222 stores device presence received from IMS gateway apparatus via IMS network. Examples of data structures of the presence management table 222 will be described with reference to Figs. 3A through 3C. The transmitter 223 is an interface for information transmission by communicatively coupling to IMS network 111/112. The receiver 224 is an interface for information reception by communicatively coupling to IMS network 111/112.

[0044] In Figs. 2A and 2B, each module may be implemented as an independent hardware module which executing corresponding processing program to achieve desired functions, or a software module including corresponding process codes executed in a processor, such as CPU, MPU, VGA, FPGA, ASIC or DSP. [0045] Figs. 3A through 3C show examples of data structure corresponding to the presence management table 222 according to the embodiment of the present invention. Fig. 3A shows a table as the presence management table 222 stored in PNAS #1 121 of Fig. IB, and Fig. 3B shows a table as the presence management table 222 stored in PNAS #2 122 of Fig. IB. Fig. 3C shows a table as the presence management table 222 stored in PNAS #2 122 which is updated based on the mechanism according to the embodiments of the present invention.

[0046] In Figs. 3A through 3C, each tables stores IMPU 301, Device ID 302, Device type 303 and Device name 304 and so on as table entries. IMPU 301 shows the IMS public identity of the IMS gateway apparatus such as HIGA 101 or PIGA 102. IMPU 301 is used as an identifier for each IMS gateway apparatus. Device ID 302 shows an identifier of the home device 103 detected in the local network (WLAN 104) and may be an UUID (Universal Unique Identifier) . Device type 303 shows a type of corresponding home device 103 such as "Media Renderer" and "Media Server". The Device name shows a name designated by the user to the corresponding home device.

[0047] Figs. 5 and 6 show an exemplary sequence diagram describing preparation procedures of the embodiment of the present invention by determining the role of the master PUA. In order to determine the role, for example, types of the IMS gateway apparatuses including mobile or fixed may be considered. How likely it is going to leave the local network in case of a mobile may also be considered. Further, capability of the hardware such as the CPU, memory and the network interface and types of power supply including battery powered or plugged may be considered. In case of battery powered type, remaining battery may also be considered. Furthermore, network bandwidth and its cost may be considered. Cellular network usually costs more than fixed network for example. Energy cost can also be taken into account, for example Bluetooth consumes much less power than the WLAN. The information can be obtained from the PNAS as it has the device presence and also some historical data and statistics of it. If the negotiation will be done locally among IMS gateway apparatuses, they can download the necessary information from the PNAS. If the negotiation will be carried out by PNAS, then PNAS may retrieve missing information from IMS gateway apparatuses. [0048] Fig. 5 shows a case where the IMS gateway apparatus determines the role, in the following the PIGA 102 which newly joins to the local network of WLAN 104 determines to become the slave apparatus. In Fig. 5, a dotted line indicates the "200 OK" response according to the SIP protocol corresponding to the SIP request immediately before it.

[0049] When the PIGA 102 joins to the local network (WLAN 104), the PIGA 102 discovers HIGA 101 in step S501. The PIGA 102 queries the IMPU of HIGA 101 and receives "higa@imsl.net". In step S501, the HIGA 101 may discover the PIGA 102 and notifies its presence to the PIGA 102.In step S502, the PIGA 102 requests the HIGA 101 to be the master PUA and to report device presence on the WLAN 104 instead of the PIGA 102. The PIGA 102 gives its IMPU piga@ims2.net to the HIGA 101 as a parameter of the request.

[0050] The discovery at the step S501 and the information exchange at the step S502 may be done using UPnP by UPnP CP 212 for example, though a new device profile to represent xIGA or PUA will be necessary in order to exchange the IMPU etc here. Note that the protocol here is not limited to the UPnP. [0051] In step S503, the HIGA 101 sends SIP PUBLISH to report PIGA' s presence including the slave PUA at piga@ims2.net to PNAS #1 121 which manages device presence from the HIGA 101. An example of the header portions of PUBLISH message necessary for explanation of this embodiment is shown as follows. Other portions which should be included in the header correspond to the standards of the corresponding RFC and 3GPP and their explanation will be omitted in this embodiment .

[0052] PUBLISH sip: higa@imsl . net SIP/2.0

Via: SIP/2.0/UDP 192.121.123.123;branch=z9hG4bK652hsge

To: <sip:higa@imsl.net>

From: <sip:higa@imsl . net>; tag=1234wxyz

Call-ID: 81818181@imsl.net CSeq: 1 PUBLISH

Max-Forwards: 70

Expires: 3600

Event: device_presence

Content-Type : application/pidf+xml

Content-Length: ...

[0053] P-Slave-PUA-Identity : sip : piga@ims2. net

[Published device presence document]

[0054] In the above example, the P-Slave-PUA- Identity header indicates the PIGA 102 as the slave PUA. This header is introduced according to the embodiment of the present invention. The device presence document may be in any format, though the PIDF document defined in RFC3863 could be utilized as it is a standard format to convey the presence information in the IMS.

[0055] In step S504, the PIGA 102 sends SIP PUBLISH to report HIGA' s presence including the master PUA at higa@imsl.net to PNAS#2 122 which manages device presence from the PIGA 102. An example of the header portions of PUBLISH message necessary for explanation of this embodiment is shown as follows. Other portions which should be included in the header correspond to the standards of the corresponding RFC and 3GPP and their explanation will be omitted in this embodiment. [0056] PUBLISH sip:piga@ims2.net SIP/2.0

Via: SIP/2.0/UDP 61.196.123.123;branch=z9hG4bK652hsge

To: <sip:piga@ims2. net>

From: <sip:piga@ims2. net>; tag=1234wxyz

Call-ID: 91919191@ims2.net

CSeq: 1 PUBLISH

Max-Forwards: 70

Expires: 3600

Event: device_presence

Content-Type : application/pidf+xml

Content-Length: ...

[0057] P-Master-PUA-Identity: sip: higaΘimsl . net

[Published device presence document]

[0058] In the above example, the P-Master-PUA- Identity header indicates that the PIGA 102 wants to activate copy of the device presence information from the HIGA 101 as the master PUA. This header is introduced according to the embodiment of the present invention.

[0059] In step S505, the PNAS#2 122 sends SIP SUBSCRIBE to subscribe for device presence at higa@imsl.net to PNAS#1 121. In this step, IMS#2 112 routes the SUBSCRIBE message to the IMS#1 111 according to the domain name of the IMPU higa@imsl.net, and then the S-CSCF in the IMS#1 111 routes the SUBSCRIBE message to the PNAS#1 according to the Initial Filter Criteria (iFC) of IMPU higa@imsl.net. An example of the header portions of SUBSCRIBE message necessary for explanation of this embodiment is shown as follows. Other portions which should be included in the header correspond to the standards of the corresponding RFC and 3GPP and their explanation will be omitted in this embodiment .

[0060] In step S506, when the PNAS#1 receives the SIP SUBSCRIBE, it checks the P-Asserted-Identity header of the request to know that PNAS#2 subscribes on behalf of PIGA 102 having the IMPU of piga@ims2.net. The subscription requested at S505 is authorized if the IMPU is verified as the slave PUA reported at step S503. If it's not authorized, PNAS#1 121 returns a SIP error response at the dotted line under S505 SUBSCRIBE. [0061] In S506, this authorization may be done based on a preconfigured access control list specifying a set of IMPU that are allowed to become a slave PUA. The access control list may be managed by using XCAP protocol and stored in the HSS, PNAS or another database.

[0062] In step S507, PNAS#2 activates presence copy function so that device presence reported for higa@imsl.net is going to be copied to piga@ims2.net if it receives the successful SIP response at the dotted line under S505 SUBSCRIBE. [0063] In step S508, the PNAS#1 121 sends SIP NOTIFY back to the PNAS#2 122. This is an initial NOTIFY message so it may contain nothing, or it may contain device presence associated to higa@imsl.net. [0064] According the above procedure, PNAS#1 121 and PNAS#2 122 can create a table for managing Master- Slave relationship between the HIGA 101 and the PIGA 102. Detailed example of the Master-Slave relationship management table will be provided with reference to Fig. 4B through 4D below.

[0065] Though the above description corresponds to the multi-operator case, in the single operator case, PUBLISH messages from the HIGA 101 and the PIGA 102 arrive at the same PNAS 121 and the SUBSCRIBE/NOTIFY dialog will not be used. The presence copy function can be activated after The PNAS 121 has received the PUBLISH message from the slave PUA (i.e. the PIGA 102), and the 200 OK response for the PUBLISH (S504) can contain the instruction to suppress the following PUBLISH messages.

[0066] Fig. 6 shows a case where the PNAS determines the role of each IMS gateway apparatus on the local network of WLAN 104. Fig. 6 shows a single operator case as the example, however, the procedure can be extended to the multi-operator case as well, though it requires service agreement between PNAS of those operators. In Fig. 6, a dotted line indicates the "200 OK" response according to the SIP protocol corresponding to the SIP request immediately before it. [0067] In step S601, the HIGA 101 sends SIP PUBLISH to publish device presence on the local network of WLAN 104 to the PNAS 121. An example of the header portions of PUBLISH message necessary for explanation of this embodiment is shown as follows. Other portions which should be included in the header correspond to the standards of the corresponding RFC and 3GPP and their explanation will be omitted in this embodiment.

[0068] PUBLISH sip:higa@imsl . net SIP/2.0

Via: SIP/2.0/UDP 192.121.123.123;branch=z9hG4bK652hsge To: <sip: higa@imsl . net> From: <sip: higagimsl . net>; tag=1234wxyz CaIl-ID: 81818181@imsl.net CSeq: 1 PUBLISH Max-Forwards: 70 Expires: 3600 Event: device_presence Content-Type : application/pidf+xml Content-Length: ... [0069] [Published device presence document]

[0070] In step S602, the PIGA 102 sends SIP PUBLISH to publish device presence on the local network of WLAN 104 to the PNAS 121. An example of the header portions of PUBLISH message necessary for explanation of this embodiment is shown as follows. Other portions which should be included in the header correspond to the standards of the corresponding RFC and 3GPP and their explanation will be omitted in this embodiment.

[007I]PUBLISH sip:piga@ims2. net SIP/2.0 Via: SIP/2.0/UDP 61.196.123.123;branch=z9hG4bK652hsge To: <sip:piga@ims2. net> From: <sip:piga@ims2.net>; tag=1234wxyz Call-ID: 91919191@ims2. netCSeq: 1 PUBLISH Max-Forwards: 70 Expires: 3600 Event: device_presence Content-Type : application/pidf+xml Content-Length: ... [0072] [Published device presence document]

[0073] In step S603, the PNAS 121 associates higa@imsl.net and piga@imsl.net and determines the master PUA. One way of creating the association is to check if the HIGA 101 and the PIGA 102 belong to the same IMS subscription.

[0074] In step S603, the master PUA selection may be based on the user's preference pre-configured in the HSS or based on the capability information of the HIGA 101 and the PIGA 102. In step S604, the PNAS 121 activates the presence copy function in order to copy the device presence information from the HIGA 101 to the PIGA 102.

[0075] After the HIGA 101 and the PIGA 102 take role of either master or slave PUA, the device presence publication from the slave PUA is suppressed and the device presence reported from the master PUA are provided for the watchers on the slave PUA in the transparent manner by copying the data between PNASs. [0076] Fig. 7 shows an exemplary sequence diagram describing device presence publication from the master PUA and suppression of the device presence publication from the slave PUA according to the embodiment of the present invention. As the precondition of the sequence diagram shown in Fig. 7, the service provider has already been subscribed for device presence at IMPU piga@ims2.net by sending SIP SUBSCRIBE towards PNAS#2 122. Note that the service provider in the sequence diagram is a passive receiver of the device presence information to show that it can still be notified of the device presence even after the PUA functionality in the PIGA is turned off. In Fig. 1 , a dotted line indicates the "200 OK" response according to the SIP protocol corresponding to the SIP request immediately before it.

[0077] In step S701, the home device 103 advertises its presence on the local network of WLAN 104. The HIGA 101 and the PIGA 102 receive it. For example, a media renderer having uuid: 12345 and a media server having uuid: 23456 advertises their presence. In step S702, the HIGA 101 sends SIP PUBLISH to publish the received device presence to PNAS#1 121. The PNAS#1 121 updates its presence management table 222 based on device presence attached to the SIP PUBLISH. An example of the table updated is shown in Fig. 3A. The table 300 includes device presence regarding the media renderer and the media server.

[0078] In step S703, the PNAS#1 121 sends SIP NOTIFY including the device presence received from the HIGA 101 towards PNAS#2 122 as it has subscribed for the device presence at higa@imsl.net. In step S704, the PNAS#2 122 copies the device presence in the received NOTIFY message to piga@ims2.net, which triggers to send SIP NOTIFY to the service provider subscribed for piga@ims2.net in step S705. By this copy process, the presence management table 310 shown in Fig. 3B is updated as the one shown in Fig. 3C. In Fig. 3C, presence information regarding the media renderer and the media server is added.

[0079] In step S706, the PIGA sends SIP PUBLISH to publish the received device presence to PNAS#2 122. As the device presence has already been reported at step S703, this step does not trigger the notification to the service provider. In step SlOl, the PNAS#2 122 inserts an instruction to suppress PUA function of the PIGA in 200 OK response. PIGA inactivates its PUA function upon reception of it. An example of the header portions of 200 OK message necessary for explanation of this embodiment is shown as follows. Other portions which should be included in the header correspond to the standards of the corresponding RFC and 3GPP and their explanation will be omitted in this embodiment.

[0080] SIP/2.0 200 OK

Via: SIP/2.0/UDP 61.196.123.123;branch=z9hG4bK652hsge

To: <sip:piga@ims2.net>;tag=la2b3c4d

From: <sip:piga@ims2. net>; tag=1234wxyz

Call-ID: 81818181@pnas.ims2.net

CSeq: 2 PUBLISH

SIP-ETag: dx200xyz

Expires: 1800

P-Master-PUA-Identity: sip: higaΘimsl . net

[0081] In the above example, P-Master-PUA-Identity header can be used in the 200 OK response to indicate that the PNAS#1 121 copies the device presence from the HIGA 101 as the master PUA. This header is introduced according to the embodiment of the present invention. The "Expires" header indicates that the published information will expire after 1800ms unless it is refreshed by another SIP PUBLISH received from the PIGA 102. The PIGA 102 must send SIP PUBLISH with empty body in order to refresh the lifecycle of the publication designated by this Expires header in the 200 OK of the last PUBLISH message. When the published information is expired, , the presence copy from the PNAS#2 122 to PNAS#1 121 should be terminated as well. [0082] The above steps S706 and S707 may take place before step S703. In that case, the PUBLISH message triggers the notification to the service provider at step S705 and the SIP NOTIFY from PNAS#1 121 does not trigger the notification to the service provider. Instruction to suppress the PUA function of PIGA 102 can be located in the body of 200 OK or in a SIP header.

[0083] In step S708, the PIGA 102 can inactivate its device discovery and event listening function or a part of it to save its computation and network resources more. The PIGA 102 can create an additional dialog with PNAS#2 122 using SIP SUBSCRIBE message to be notified of status changes in the HIGA 101, especially for restarting publication of device presence in case the HIGA 101 has suddenly been turned off. Detailed procedures will be described below with reference to Figs. 8 and 9.

[0084] In steps S709 to S714 are basically the same as steps S701 to S705. However, since the PUA function of the PIGA 102 was inactivated at step S708, the PIGA 102 no longer sends SIP PUBLISH. By this, it is possible to save the network resource and the computation resource of the PIGA 102. [0085] In the single operator case, the device presence copy is done internally in the PNAS 121 and the NOTIFY message at step S703 and S711 will be omitted.

[0086] While the PIGA 102 stay on the local network of WLAN 104, the procedures according to Fig. 7 will be continued. However, after the PIGA 102 leaves the local network of WLAN 104, it must activate the PUA functionality and request for stopping synchronization from the master PUA as depicted in Fig. 8. Although the termination of the synchronization is triggered when the PIGA 102 leaves the local network of WLAN 104 in this context, the PIGA 102 may initiate this procedure without leaving the local network of WLAN 104 for whatever reason. In Fig. 8, a dotted line indicates the "200 OK" response according to the SIP protocol corresponding to the SIP request immediately before it. [0087] In Fig. 8, when the PIGA 102 detects that it has disconnected from the local network of WLAN 104, in step S801 it activates its PUA function which has been inactivated. In step S802, the PIGA 102 sends SIP PUBLISH to indicate that to PNAS#2 122. In step S803, the PNAS#2 122 inactivates the presence copy function. In step S804, the PNAS#2 122 sends SIP SUBSCRIBE towards the PNAS#1 121 to unsubscribe for device presence of higa@imsl.net. In step S805, the PNAS#1 121 sends SIP NOTIFY to indicate that the subscription has been terminated to PNAS#2 122.

[0088] When the PIGA 102 is connected to another network, for example, it has moved from the residential WLAN 104 to a car network, it receives device presence from device 800 or some events on the newly connected network in step S806. In step S807, the PIGA 102 sends SIP PUBLISH to publish the device presence to the PNAS#2 122.

[0089] The above procedure corresponding to Fig. 8 may be applied to a case where the HIGA 101 is turned off and the PIGA 102 notices it locally. However in case the PIGA 102 cannot detect it locally, it must be notified from the PNAS over the additional dialog setup as shown in Fig. 9 In Fig. 9, a dotted line indicates the "200 OK" response according to the SIP protocol corresponding to the SIP request immediately before it. [0090] In step S901, the HIGA 101 is turned off and the PIGA 102 does not detect it. In step S902, the PNAS#1 121 detects that the HIGA 101 has been turned off. Though the PNAS#1 121 may not be able to detect the turn off directly, the HIGA 101 can be regarded as turned off when there is no PUBLISH message sent from the HIGA 101 for the lifetime of the publication specified by Expires header. The PNAS#1 121 may receive a registration event from S-CSCF over ISC to know un- registration of the HIGA 101.

[0091] In step S903, the PNAS#1 121 sends NOTIFY message to the PNAS#2 122 with the session terminated. In step S904, the PNAS#2 122 sends NOTIFY message to the PIGA 102 over the additional dialog setup in order to indicate that the master PUA (i.e. HIGA 101) no longer exists on the local network of WLAN 104. Then the PIGA 102 activates PUA function and start publishing device presence to the PNAS#2 122. [0092] In the following, a case where the master PUA role is moved to other IMS gateway apparatus will be described with reference to Fig. 10. The battery life of IMS gateway apparatus (xIGA) could be one motivation to pass the master PUA role to another. The movement can take place when the xIGA hosting the master PUA is running out of the battery, or more aggressively the master PUA role can be circulated regularly to save the battery equally among the group of xIGA. Another motivation is that a new xIGA is added to the local network and it is more suitable for taking the master PUA role than the current one in terms of capacity.

[0093] One way to move the master PUA role is that the current master PUA becomes the slave PUA for the new master PUA, while it still serves as the master PUA for the other slaves as described in Fig. 10. Fig. 10 describes a case corresponding to Fig. 1C where there exists the PIGA#1 102a and the PIGA #2 102b each of which is connected to IMS#1 111 having PNAS#1 121 and IMS#2 112 having PNAS#2 122. IMS networks of the IMS#1 111 and the IMS#2 112 are operated by different operators. The PIGA#1 102a is the master PUA of the PIGA#2 102b. This means that device presence from the PIGA#2 102b is suppressed and the device presence from the PIGA#1 102a is copied from the PNAS#1 121 to the PNAS#2 122. PIGA#3 joins to the local network of WLAN 104 and it is connected to other IMS#3 113 having PNAS#3 123 operated by a operator different from ones of the IMS#1 111 and the IMS#2 112. In Fig. 10, a dotted line indicates the "200 OK" response according to the SIP protocol corresponding to the SIP request immediately before it.

[0094] In step SlOOl, when the PIGA#3 102c joins to the local network of WLAN 104, the PIGA#1 102a and the PIGA#3 102c negotiate locally and agree to move the master PUA from the PIGA#1 102a to the PIGA#3 102c. [0095] In step S1002, the PIGA#3 102c sends SIP PUBLISH to indicate that PIGA#1 becomes a slave PUA to the PNAS#3 123. In step S1003, the PIGA#1 102a sends SIP PUBLISH to indicate that the PIGA#3 102c becomes the master PUA to the PNAS#1 121. In step S1004, the PNAS#1 121 sends SIP SUBSCRIBE to subscribe for the device presence of the PIGA#3 123. In step S1005, the PNAS#3 123 sends SIP NOTIFY to the PNAS#1 121 as the initial notify message.

[0096] When the device presence has changed in the local network of WLAN 104 in step S 1006 to 1008, the PIGA#3 102c detects it and sends PUBLISH to report the device presence in step S1009. The PIGA#1 102a and the PIGA#2 102c may detect the device presence change but they don't send PUBLISH.

[0097] In step SlOlO, the PNAS#3 123 sends SIP NOTIFY to the PNAS#1 121 including the reported device presence change. In step SlOIl, the PNAS#1 121 sends SIP NOTIFY to the PNAS#2 122 as the PIGA#1 102a is still the master PUA for the PIGA#2 102b. [0098] In another embodiment, another way to move the master PUA role is to release the master slave relationship once and setup the new master PUA as described in Fig. 11. In this case, the PNAS#1 121 may instructs the PNAS#2 122 to subscribe to the PNAS#3 123 using SIP REFER method according to RFC 3515 "SIP Refer Method". Fig. 11 shows the procedure for PNAS of a slave PUA subscribing to the new master PUA' s PNAS, which follows step S1005 of Fig. 10. In Fig. 11, a dotted line indicates the "200 OK" response according to the SIP protocol corresponding to the SIP request immediately before it.

[0099] In step SIlOl, the PNAS#1 121 sends SIP REFER to the PNAS#2 122 in the existing SIP SUBSCRIBE/NOTIFY dialog. Refer-To header points to the IMPU of PIGA#3. An example of the header portions of REFER message necessary for explanation of this embodiment is shown as follows. Other portions which should be included in the header correspond to the standards of the corresponding RFC and 3GPP and their explanation will be omitted in this embodiment.

[010O]REFER sip:pnas . ims2. net SIP/2.0

Via: SIP/2.0/UDP pnas . imsl .net;branch=z9hG4bK2293940223 From: <sip:piga@imsl.net>;tag=12341234 To : <sip : piga@ims2. net>; tag=abcdl234 Call-ID: 898234234@pnas.imsl.net CSeq: 1 REFER Max-Forwards: 70 Refer-To: <sip:piga@ims3.net ; method=SUBSCRIBE?Event=device_presence> Contact: sip : pnas . imsl . net Content-Length: 0

[0101] In step S1102, the PNAS#2 122 sends SUBSCRIBE request to the PNAS#3 123 to subscribe for the device presence of the PIGA#3 123. In step S1103, the PNAS#3 123 returns the initial NOTIFY message. In step S1104, the PNAS#2 122 sends NOTIFY message to the PNAS#1 121 to indicate that the session between the PNAS#2 122 and the PNAS#3 123 has successfully been established. In step S1105, the PNAS#1 121 sends NOTIFY message to the PNAS#2 122 to terminate the existing SIP SUBSCRIBE/NOTIFY dialog used to copy the device presence information.

[0102] Fig. 4A shows an expanded case of another embodiment corresponding to Fig. 10. In Fig. 4A, each node 401 indicates IMS gateway apparatus (xIGA) and arrows 402 connect two nodes represents a Master-Slave relationship between them. For example, xIGA of "Fredrik" is a slave of the xIGA of "Martin". The case shown in Fig. 4A, only xIGAs of "Martin", "Smith" and "Carl" publish the device presence to corresponding PNASs and other six xIGAs do not have to publish device presence. In order to achieve this system configuration, each PNAS corresponding to IMS network of any one of IMS#1 through IMS#3 has a Master-Slave relationship management table shown in Figs. 4B, 4C or 4D. Each table manages entries of Master IMPU (411, 421 or 431) and Slave IMPU (412, 422 or 432) . By this, it is possible to manage relationship between a plurality of xIGAs.

[0103] According to the several aspects of embodiments of the present invention, it is possible to obtain following advantages. It should be noted that some embodiments may not achieve some of the following advantages, such embodiments are not excluded from the scope of the present invention. [0104] It is possible to reduce consumptions of network resources and computation resources in xIGAs reporting the device presence. As the device presence information is updated much more frequently than the presence information of a person, these savings are very effective. It is also possible to reduce the energy consumption and prolongs the battery in case the xIGA is in a mobile phone or a portable device as the PIGA 102 in the embodiments. It is obvious benefit to the end users, but also to the operators. For example, several operators can form an alliance and appeal to the society that they are environmental friendly companies .

[0105] Furthermore, the solution of the present invention is transparent to device presence watchers such as a service provider. The watchers can receive the device presence information timely regardless this invention takes place.

Claims

1. A first gateway apparatus (102) configured to be connectable to a local network (104) and an external network (111, 112), to obtain presence information of a device apparatus (103) on the local network (104) and to provide the obtained presence information to a presence management apparatus (121, 122) on the external network (111, 112), said first gateway apparatus comprising: an obtaining unit (212) configured to obtain the presence information of the device apparatus (103) / a transmitter (215) configured to transmit the presence information to the presence management apparatus (121, 122) via the external network (111, 112); and a receiver (216) configured to receive, from the presence management apparatus (121, 122), a suppression instruction of the presence information transmission, wherein said transmitter (215) further configured to suppress the transmission of the presence information to the presence management apparatus (121, 122) after the reception of the suppression instruction.
2. A first gateway apparatus (102) according to claim 1, wherein, when a second gateway apparatus (101) is connected to the local network (104), and the external network (111) and the presence management apparatus (121) are shared by both of the first gateway apparatus (102) and the second gateway apparatus (101), said transmitter (215) further configured to transmit a message to the presence management apparatus (121) in order to designate the second gateway apparatus (101) as a master of the first gateway apparatus (102) , and said receiver (216) further configured to receive the suppression instruction from the presence management apparatus (121) as a response to the transmitted message.
3. A first gateway apparatus (102) according to claim 1, wherein, when a second gateway apparatus (101) is connected to the local network (104), and the external network (111) and the presence management apparatus (121) are shared by both of the first gateway apparatus (102) and the second gateway apparatus (101), said receiver (216) further configured to receive the suppression instruction from the presence management apparatus (121) as a response to the transmitted presence information.
4. A first gateway apparatus (102) according to claim 1, wherein, when a second gateway apparatus (101) is connected to the local network (104), and the gateway apparatus (102) uses the external network (112) and the second gateway apparatus (101) uses other external network (111) than the external network (112), said receiver (216) further configured to receive the suppression instruction from the presence management apparatus (122) as a response to the transmitted presence information to the presence management apparatus (122) .
5. A first gateway apparatus (102) according to claim 4, further comprising: a searching unit' (212) configured to search the second gateway apparatus (101) on the local network (104); and a request transmission unit (215) configured to transmit a request to the second gateway apparatus (101) to become a master of the first gateway apparatus (102), wherein said transmitter (215) further configured to transmit a message designating the second gateway apparatus (101) as the master of the first gateway apparatus (102) to the presence management apparatus (122) on the external network (112) .
6. A first gateway apparatus (102) according to any one of claims 2 through 5, wherein when the presence management apparatus (121, 122) notifies said first gateway apparatus (102) that the second gateway apparatus (101) does not exist on the local network (104), the suppression of the presence information transmission is released.
7. A first gateway apparatus (102) according to any one of claims 1 through 5, wherein when the first gateway apparatus (102) is disconnected from the local network (104), the suppression of the presence information transmission is released.
8. A presence management apparatus (121) configured to manage presence information of a device apparatus
(103) on a local network (104) , said presence management apparatus (121) comprising: a receiver (224) configured to receive presence information from each of a plurality of gateway apparatuses (101, 102) connected to the local network
(104) and to obtain presence information from the device apparatus (103) on the local network (104); a determination unit (221) configured to determine a master gateway apparatus (101) and a slave gateway apparatus (102) among the plurality of the gateway apparatuses; and a transmitter (223) configured to transmit a suppression instruction to the slave gateway apparatus (102) as a response to the transmitted presence information from the slave gateway apparatus (102) .
9. A presence management apparatus (121) according to claim 8, Wherein said determination unit (221) further configured to determine the master gateway apparatus (101) and the slave gateway apparatus (102) based on a message designating the master gateway apparatus received from each gateway apparatus (102) or on a predetermined rule.
10. A presence management apparatus (121) according to claim 8 or 9, further comprising: a presence table (222) configured to manage presence information in association with each gateway apparatus (101, 102) ; and an updating unit (221) configured to update said presence table (222), wherein said updating unit updates the presence information associated with the slave gateway apparatus
(102) on said presence table (222) according to the received presence information from the master gateway apparatus (101) .
11. A presence management apparatus (121) configured to manage presence information of a device apparatus
(103) on a local network (104), said presence management apparatus (121) comprising: a receiver (224) configured to receive a message, from a first gateway apparatus configured to obtain presence information of a device apparatus (103) on the local network (104), designating a second gateway apparatus on the local network (104) as a master of the first gateway apparatus; and a transmitter (223) configured to transmit a suppression instruction of presence information transmission to the first gateway apparatus (102) as a response to the received message.
12. A presence management apparatus (121) according to claim 11, further comprising: a presence table (222) configured to manage presence information in association with a gateway apparatus (101, 102); and an updating unit (221) configured to update said presence table (222), wherein said updating unit updates the presence information associated with the first gateway apparatus (102) on said presence table (222) according to the received presence information from the second gateway apparatus (101) .
13. A first presence management apparatus (122) configured to manage presence information of a device apparatus (103) on a local network (104), said first presence management apparatus (122) comprising: a receiver (224) configured to receive a message, from a first gateway apparatus (102) configured to obtain presence information of a device apparatus (103) on the local network (104), designating a second gateway apparatus (101) on the local network (104) as a master of the first gateway apparatus (102) ; and a transmitter (223) configured to transmit a setting message which causes a second presence management apparatus (121) associated with the second gateway apparatus (101) to have a transmission setting of the presence information to the first * presence management apparatus (122) when the second presence management apparatus (121) receives the presence information from the second gateway apparatus (101), wherein when the presence information is received from the first gateway apparatus (102), said transmitter transmits a suppression instruction of the presence information transmission to the first gateway apparatus (102) as a response to the received presence information.
14. A first presence management apparatus (122) according to claim 13, further comprising: a presence table (222) configured to manage presence information in association with the first gateway apparatus (102); and an updating unit (221) configured to update said presence table (222), wherein said updating unit updates the presence information on said presence table (222) according to presence information received from the second presence management apparatus (121) .
15. A first presence management apparatus (122) according to claim 13 or 14, wherein said receiver further configured to receive a notification of a disconnection of the first gateway apparatus (102) from the local network (104), and said transmitter further configured to transmit a release message causes the second presence management apparatus (121) to release a transmission setting of the presence information to the first presence management apparatus (122) .
16. A first presence management apparatus (122) according to any one of claims 13 through 15, wherein said receiver (224) further configured to receive a notification notifying that the second gateway apparatus (101) does not exist on the local network (104) from the second presence management apparatus (121) , and said transmitter (223) further configured to transmit the notification to the first gateway apparatus (102) .
17. A first presence management apparatus (122) according to any one of claims 13 through 16, wherein when a third gateway apparatus (102c) is connected to the local network (104) and the third gateway apparatus (102c) become the master of the second gateway apparatus (102a) , said transmitter (223) further configured to transmit a setting message which causes a third presence management apparatus (123) associated with the third gateway apparatus (102c) to have a transmission setting of the presence information to the first presence management apparatus (122) when the third presence management apparatus (123) receives the presence information from the third gateway apparatus (102c), and a release message which causes the second presence management apparatus (121) to release a transmission setting of the presence information to the first presence management apparatus (122) .
18. A first presence management apparatus (121) configured to manage presence information of a device apparatus (103) on a local network (104) , said first presence management apparatus (121) comprising: a receiver configured to receive a message, from a first gateway apparatus configured to obtain presence information of a device apparatus (103) on the local network (104), designating a second gateway apparatus (102) as a slave of the first gateway apparatus (101) , and a setting message, from a second presence management apparatus (122) associated with the second gateway apparatus (102), causes the first presence management apparatus (121) to transmit presence information to the second presence management apparatus (122) when the first presence management apparatus
(121) receives the presence information from the first gateway apparatus (101); and a transmitter configured to transmit the presence information to the second presence management apparatus
(122) when the presence information is received from the first gateway apparatus (101) after the reception of the setting message.
19. A first presence management apparatus (121) according to claim 18, further comprising: a verification unit (221) configured to verify the received setting message includes identification information indicating that the transmission of the setting message is for the second gateway apparatus (102), wherein only when said verification unit (221) verifies the message includes the identification information, said transmitter (223) transmits the presence information to the second presence management apparatus (122) .
20. A first presence management apparatus (121) according to claim 18 or 19, further comprising: a detector (224, 221) configured to detect that the first gateway apparatus (101) does not exist on the local network (104), wherein when the detector detects that the first gateway apparatus (101) does not exist on the local network (104), said transmitter (223) transmits a notification notifying the detection result to the second presence management apparatus (122) .
21. A first presence management apparatus (121) according to any one of claims 18 to 20, wherein when a third gateway apparatus (102c) is connected to the local network (104) and the third gateway apparatus (102c) become the master of the second gateway apparatus (102a), said transmitter (223) further configured to transmit a setting message causes a third presence management apparatus (123) associated with the third gateway apparatus (102c) to have a transmission setting of the presence information to the first presence management apparatus (121) when the third presence management apparatus (123) receives the presence information from the third gateway apparatus (102c) , and to transmit the presence information to the second presence management apparatus (122) when the presence information is received from the third presence management apparatus (123) .
PCT/JP2009/051025 2009-01-16 2009-01-16 Gateway apparatus and presence management apparatus WO2010082363A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/JP2009/051025 WO2010082363A1 (en) 2009-01-16 2009-01-16 Gateway apparatus and presence management apparatus

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US13/139,374 US9008057B2 (en) 2004-10-27 2009-01-16 Gateway apparatus and presence management apparatus
JP2011523256A JP5180378B2 (en) 2009-01-16 2009-01-16 Gateway device and the presence management device
PCT/JP2009/051025 WO2010082363A1 (en) 2009-01-16 2009-01-16 Gateway apparatus and presence management apparatus
EP09838330A EP2380318A4 (en) 2009-01-16 2009-01-16 Gateway apparatus and presence management apparatus

Publications (1)

Publication Number Publication Date
WO2010082363A1 true WO2010082363A1 (en) 2010-07-22

Family

ID=42339629

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2009/051025 WO2010082363A1 (en) 2009-01-16 2009-01-16 Gateway apparatus and presence management apparatus

Country Status (3)

Country Link
EP (1) EP2380318A4 (en)
JP (1) JP5180378B2 (en)
WO (1) WO2010082363A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2858306A4 (en) * 2012-12-31 2015-09-23 Huawei Device Co Ltd Data transmission method, device and gateway

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008518536A (en) * 2004-10-27 2008-05-29 テレフオンアクチーボラゲット エル エム エリクソン(パブル) Method and apparatus for accessing Ip Multimedia Subsystem

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4564182B2 (en) * 2001-01-18 2010-10-20 株式会社日立国際電気 Wireless communication device
US8260967B2 (en) * 2002-04-02 2012-09-04 Verizon Business Global Llc Billing system for communications services involving telephony and instant communications
US7933608B2 (en) * 2004-03-11 2011-04-26 Tekelec Methods, systems, and computer program products for providing presence gateway functionality in a telecommunications network
US8204052B2 (en) * 2005-05-02 2012-06-19 Tekelec, Inc. Methods, systems, and computer program products for dynamically coordinating collection and distribution of presence information
US8015249B2 (en) * 2006-10-10 2011-09-06 Microsoft Corporation Mitigating data usage in messaging applications

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008518536A (en) * 2004-10-27 2008-05-29 テレフオンアクチーボラゲット エル エム エリクソン(パブル) Method and apparatus for accessing Ip Multimedia Subsystem

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
'NANATSUNOGIMONWOTOKU Q6 KOTEITOKEITAIHADONOYOUNIYUUGIOUSASRUNO?' NIKKEI COMPUTER no. 666, 27 November 2006, pages 52 - 53, XP008146949 *
See also references of EP2380318A1 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2858306A4 (en) * 2012-12-31 2015-09-23 Huawei Device Co Ltd Data transmission method, device and gateway

Also Published As

Publication number Publication date
JP2012515454A (en) 2012-07-05
EP2380318A1 (en) 2011-10-26
JP5180378B2 (en) 2013-04-10
EP2380318A4 (en) 2012-08-22

Similar Documents

Publication Publication Date Title
JP4856179B2 (en) Allocation method and apparatus for the application server in Ims
JP4500852B2 (en) A method of notifying the function change of the terminal to the network
JP4068094B2 (en) Method for realizing dynamic network configuration and resource sharing device among
US9042360B2 (en) Modifying remote service discovery based on presence
JP4624701B2 (en) Management apparatus and method of the device information via a network
EP1865687B1 (en) Proxy-bridge for connecting different types of devices
JP5189104B2 (en) Method and apparatus for enabling multimedia communication with the private network
US8149849B2 (en) Zigbee/IP gateway
CN102687580B (en) Method and apparatus for establishing peer to peer communications
JP4605819B2 (en) Method and system for remotely managing a machine, via ip link
US20040128344A1 (en) Content and service registration, query and subscription, and notification in networks
US20020103850A1 (en) System and method for out-sourcing the functionality of session initiation protocol (SIP) user agents to proxies
US8194681B2 (en) Bridging between AD HOC local networks and internet-based peer-to-peer networks
EP2291979B1 (en) Remote access between upnp devices
JP4829350B2 (en) Method and arrangement for remotely controlling a multimedia communication over both ends of the local network
US8266203B2 (en) Method for obtaining device information of user terminals and communication service function entity
US8041349B2 (en) Home subscriber server configuration method and system
US20090092109A1 (en) Method and Apparatus for Enabling Discovery Within a Home Network
US20110082939A1 (en) Methods and apparatus to proxy discovery and negotiations between network entities to establish peer-to-peer communications
US20080098121A1 (en) P2p sip enabled multimedia network communication system
CN101331737B (en) Communication network device for universal plug and play and internet multimedia subsystems networks and communication method
EP2153627B1 (en) System and method for using presence information
US8693391B2 (en) Peer to peer services in a wireless communication network
US20040139180A1 (en) Automobile media synchronization
JP4041118B2 (en) Gateway device, network system, communication program, and communication method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09838330

Country of ref document: EP

Kind code of ref document: A1

REEP

Ref document number: 2009838330

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2009838330

Country of ref document: EP

ENP Entry into the national phase in:

Ref document number: 2011523256

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 13139374

Country of ref document: US

NENP Non-entry into the national phase in:

Ref country code: DE