scispace - formally typeset
T

Tom Phillips

Researcher at Philips

Publications -  11
Citations -  238

Tom Phillips is an academic researcher from Philips. The author has contributed to research in topics: Network element & Service (business). The author has an hindex of 6, co-authored 11 publications receiving 233 citations. Previous affiliations of Tom Phillips include Queen Alexandra Hospital.

Papers
More filters
Patent

Single sign-on for multiple network -based services

TL;DR: In this paper, a network-based service creation platform automates and simplifies many tasks associated with defining new network services offerings to network users, publishing the new service offerings to the users, handling the subscription and registration of subscribers to the new services, billing for the service, and otherwise managing the service.
Patent

Broadband network service delivery method and device

TL;DR: In this paper, a central Service Creation Platform (SCP) is located at the service provider's premises, which gives service providers a common platform from which to create and deploy new services, manage services, and record and aggregate billing records.
Patent

System and method for setting up user self-activating network-based services

TL;DR: In this paper, a configurable input engine is configured to define the service and an offer of the service is published to a user, which includes values of commercial terms and/or values of configuration parameters associated with the offer.
Patent

Initiation module for initiating network-based services

TL;DR: In this paper, the authors propose a system that allows subscribers to self-activate network-based services by automatically configuring network elements by sending activations to policy distribution points (PDPs) that translate the activations into device-specific instructions.
Patent

Policy distribution point for setting up network-based services

TL;DR: A policy distribution point (PDP) allows service drivers to be installed remotely and automatically without rebooting the PDP or otherwise interrupting existing network-based services as mentioned in this paper, where the exposure of sensitive configuration data to non-secure networks is minimized by placing PDPs close to the devices to be configured.