摘要:
A wireless device includes a self-activation client that allows a user to activate a communication service for that wireless device and for one or more other wireless devices. The communication service may use a long-range type of wireless communication, such as 1×RTT CDMA, EV-DO, GSM, or IEEE 802.16 (WiMAX) communication. During the activation process, the wireless device communicates with a device management server using the long-range type of wireless communication but communicates with the one or more other wireless devices using a short-range type of wireless communication, such as IEEE 802.11 (WiFi), Bluetooth, or infrared communication. After the communication service has been activated, the wireless device may subsequently communicate with the device management server in order to manage the communication service for itself and/or for one or more other wireless devices (e.g., to receive updates or to make changes).
摘要:
A computer-operated method for dynamically laying out content in a document, so as to thereby establish a resulting document. A computer first virtually lays out primary content portions in a virtual document space within computer memory. The computer then lays out secondary content portions in spatial correlation with associated primary content portions, to the extent space permits. And the computer then lays out tertiary content portions in spatial correlation with areas of the document, such as groups of primary content portions, to the extent space permits, while giving layout preference to tertiary content portions that have higher priority than already-placed secondary content portions. The invention can be used to dynamically generate invoices for telecommunication subscribers or in other scenarios.
摘要:
In a communication device, multiple instances of different applications may execute. Advantageously, at least one instance of an application records and stores a browsing history of data items accessed during its execution. This stored browsing history may be made available to later instances of applications. Furthermore, one or more such stored histories may be accessed via a global back or a global forward command, allowing the histories to be browsed according to the order in which they were recorded.
摘要:
A device in a wireless network may negotiate security parameters with an access point for the wireless network. The device and the access point may negotiate the security parameters using low power signals. The device and the access point may subsequently use the security parameters to implement security features, and they may communicate using normal power signals.