摘要:
A method of controlling data transfer, a method of controlling content transfer, a method of obtaining content processing information, and a system for transferring content are provided. The method of controlling data transfer in a data interoperable environment includes: receiving a request for transmitting data from a client; gathering information on entities which are to participate in transmitting data; forming a chain including at least two entities by using the gathered information on the entities; transmitting a plurality of data through the chain; and receiving an event message for representing a transmission status of the data transmitted from at least one of the entities included in the chain. Accordingly, it is possible to control a transmission of the data so that the plurality of data can be transmitted through a single session and to receive the transmission status of the data as an event message.
摘要:
A method of controlling data transfer, a method of controlling content transfer, a method of obtaining content processing information, and a system for transferring content are provided. The method of controlling data transfer in a data interoperable environment includes: receiving a request for transmitting data from a client; gathering information on entities which are to participate in transmitting data; forming a chain including at least two entities by using the gathered information on the entities; transmitting a plurality of data through the chain; and receiving an event message for representing a transmission status of the data transmitted from at least one of the entities included in the chain. Accordingly, it is possible to control a transmission of the data so that the plurality of data can be transmitted through a single session and to receive the transmission status of the data as an event message.
摘要:
A method of transferring data and a method of transferring contents are provided. In the method of transferring data in a data interoperable environment, a secure authenticated channel is established with a receiving entity corresponding to receiver information included in a received control message, when the control message is received from a control entity, a plurality of data designated by the control entity are transmitted to the receiving entity through the established secure authenticated channel, and an event message for representing a transmission status of the transmitted data is transmitted to the control entity. Accordingly, it is possible to transmit the plurality of data through a single transmission session and provide a transmission status of each data through an event.
摘要:
A method of transferring data is provided. In the method of transferring data, a secure authenticated channel is established with a receiving entity corresponding to receiver information included in a received control message, when receiving the control message from a control entity, a format of received plurality of data is transformed according to content format transformation information included in the control message, when receiving the plurality of data from a predetermined transmission entity in a chain constructed by a control of the control entity, the transformed plurality of data is transmitted to the receiving entity through the established secure authenticated channel, and an event message for representing a transmission status of the data is transmitted to the control entity. Accordingly, it is possible to transmit the plurality of data through a single transmission session and provide a transmission status of each data through an event.
摘要:
A method of registering a legacy device, a method of transferring data, and a method of authenticating a legacy device are provided. The method of registering a legacy device by using a virtual client, which allows the legacy device to access a domain, includes: receiving unique information on the legacy device from the legacy device which requests the domain to register the legacy device; searching a registrable legacy device list including the unique information on the legacy device which can be registered in the domain for the unique information on the legacy device; and requesting a domain manager, which manages the domain, to register the legacy device, when the unique information on the legacy device is included in the registrable legacy device list, and not allowing the legacy device to be registered in the domain when the unique information on the legacy device is not included in the registrable legacy device list.
摘要:
A method of managing a domain, a method of extending a domain, and a method of selecting a reference point controller are provided. The method of operating the domain includes: receiving a request for authenticating a reference point controller from a reference point controller candidate; invalidating a membership of the stored reference point controller; generating a unique reference point controller membership for verifying that the reference point controller candidate is a new reference point controller; and transmitting the generated reference point controller membership to the reference point controller candidate. Accordingly, even when an error occurs in the reference point controller, the function of the reference point controller can be rapidly replaced by using the reference point controller candidate.