摘要:
The present invention provides a system and method of modifying policy settings in a network having a plurality of subscriber devices. An embodiment includes a plurality of base stations, each capable of wirelessly transmitting across a geographic region and a server. A cell-phone, capable of roaming between regions, is operable to establish a wireless link with the base stations and through the base stations, with the server. The network contains a communication policy determining from which other communication devices a subscriber device can receive voice calls. The communication policy is updated, by the server, based on requests from the subscriber devices. Once a request is received from a subscriber device, the determination whether to update the communication policy can be based on a record of rejections respective to the caller requested to be blocked. Alternatively, the communication policy can be updated according to a trust policy maintained on the server respective to the subscriber device making the request; the trust policy represents the procedure to follow when a request is received from that subscriber device.
摘要:
Method and apparatus for correction of spelling errors in text composition is provided. Correctly spelled words may be determined for an incorrectly spelled word in accordance with a common error approach. Corrections to the incorrectly word are applied using common typographical and spelling errors. Resulting words which are correctly spelled may be offered as replacements or automatically used to replace the incorrectly word. Corrections may be applied in response to a frequency of the error in text composition to generate correct words that are more likely to be the word intended to be composed. The specific order of application may be configurable to meet a user's preference or a learned behavior for a user.
摘要:
In one embodiment, a scheme is provided for securing a personalized indicium assigned to a mobile communications device (116). Upon detecting at a network node (502) that an address associated with the mobile communications device (116) has changed, a challenge-and-response procedure (516, 518) is negotiated between the mobile communications device (116) and the network node (502) for authenticating the personalized indicium using a shared authentication key.
摘要:
A method of communicating between a mobile communications device (112) and a plurality of services (304, 306) that are used by the mobile communications device. The method includes establishing, through a firewall (106) and a wireless network (110), a first communications session between the mobile communications device (112) and a mobile server (104) located in an enterprise network (100) with which the mobile communications device (112) is associated; and establishing, concurrent with the first communications session at least one further communications session between the mobile server (104) and a service (304, 306), the at least one further communications session being established by the mobile server (104) as a session proxy for the mobile communications device (112).
摘要:
In one embodiment, a scheme is provided for managing secure registration of a mobile communications device (116). Upon being provided with an upgraded registration process that requires encryption, the mobile communications device (116) has the option of continuing to register with a network node (216) using a downgraded registration process within a specified time window which involves unencrypted registration requests and responses. Thereafter, the mobile communications device (116) is operable to select between the upgraded and downgraded registration processes.
摘要:
In one embodiment, a scheme is provided for porting a personalized indicium, i.e., a Personal Information Number or PIN, from a first mobile communications device to a second mobile communications device. Upon receiving identity information from the first mobile communications device via a secure peer-to-peer communication session (414, 416), the second mobile communications device is operable to negotiate (450, 452, 454) with a network node (216) using at least a portion of the received identity information for reassigning the PIN to an identifier associated therewith. Upon successfully porting the PIN to the second mobile communications device, a service provisioning database (219) is accordingly updated (456).