摘要:
A system (20) is designed for identifying devices (1, 2,...) which are arranged for detecting a sensory identifier and transmitting request messages comprising representations of the detected sensory identifier. The system comprises at least one correlation server (e.g. 5C) for correlating representations received from the devices (1, 2) so as to match two or more of those devices, preferably when the devices (1, 2) are in each other's proximity. The system further comprises at least one proxy server (e.g. 8X) for routing a request message from a device (1, 2) to at least one correlation server (e.g. 5C), the routing being dependent on said representations or other information contained in the request messages.
摘要:
A method of protecting a mobile device against malware is described. The mobile device comprises a backup operating system, the backup operating system being stored, preferably in a ROM, in the mobile device separately from the active operating system. The method comprises the steps of: providing a signal indicative of the possible presence of malware in the mobile device; and, replacing in response to the signal the active operating system with the backup operating system.
摘要:
A method for controlling locking state transitions in a terminal in accordance with one or more state transition rules, the method including the steps of providing at least one writable memory location comprising first state information associated with a first locking state of said terminal, said at least one writable memory being configured for an irreversible transition from said first locking state to a second locking state; receiving a request for a transition to said second locking state, said request comprising second state information associated with said second locking state; on the basis of said first and second state information and said state transition rules, checking whether said requested transition is allowable or not; and storing said second state information in said writable memory if said requested transition is allowable according to said state transition rules.
摘要:
A method of identifying at least two proximate devices (1, 2) comprises the steps of: - recording, in each device, an audio signal (AS) so as to produce respective audio samples, - detecting, in each device, a sensory identifier serving as a trigger (TR), - comparing the audio samples during a common interval (I) defined relative to the trigger (TR), and - deciding that the event is common to the devices only if the respective audio samples are sufficiently similar. The common interval (I) starts prior to the trigger (TR) and preferably also ends prior to the trigger.
摘要:
A system (40) for identifying proximate devices (1,2) comprises at least one correlation server (5) for correlating data received from the devices so as to match two or more of the devices and at least one application server (6) for carrying out an application involving matched devices. The at least one correlation server (5) and the at least one application server (6) are distinct servers so as to provide a greater flexibility and scalability. The devices (1,2) may be mobile consumer devices.
摘要:
A Method and a system for managing undesired service requests sent from at least one terminal to a network are described, wherein the network comprises a network node for storing trusted service-information. The method comprises the steps of: the network receiving a service request from a terminal, the request comprising service request information; and, sending, preferably via a secure communication channel, a user verification request for requesting the user to verify the service requested by the terminal if at least part of the service request information is not listed in the trusted service-information.