摘要:
A method is provided that includes accessing information associated with at least one service or application in a social network. The method also includes detecting at least one event relating to the information associated with the at least one service or application within the social network and modifying the information associated with the at least one service or application in response to the at least one event.
摘要:
A method is provided that includes accessing information associated with at least one service or application in a social network. The method also includes detecting at least one event relating to the information associated with the at least one service or application within the social network and modifying the information associated with the at least one service or application in response to the at least one event.
摘要:
A method, a terminal, and a server are provided to enable to remotely and securely grant, by an owner of a server, access to the server for a third party. A mechanism is defined to establish a trust relationship between a mobile device and a home gateway while in a home network and later to use that trust relationship when granting access to the home network (via remote access through the home gateway) to other devices.
摘要:
An environment variable for use cases such as UPnP AV use cases. The environment variable of the present invention is used to store the physical location of the user. For example, the environment variable can be used to identify a particular location as being a user's living room, kitchen, etc. The information stored in the environment variable can be used to enhance the user experience of the digital home or other environment by minimizing the number of manual selections that the user has to make in order to initiate a use case such as playing music in a bedroom or watching movies in a living room. The environment variable is used to trigger a change of a profile and select the devices needed to implement different use scenarios.
摘要:
A system and method for enabling the integration of mobile telephone functions and the UPnP-enabled digital home. In an UPnP control point device, such as a UPnP mobile telephone, implementing the present invention, events such as the receipt of an incoming telephone call or message in the UPnP control point device application program interface can trigger the requesting of different UPnP actions in UPnP devices that relate to the event. In the UPnP environment, the UPnP control point device serves as a control point and transmits instructions to other devices. For example, the receipt of a phone call could cause the volume on a stereo or television to be lowered or muted, it could cause both live and taped television programs to pause, or it could perform other functions. A UPnP control point device of the present invention can also transmit instructions based upon requests received from remote locations.
摘要:
A method is provided that includes accessing information associated with at least one service or application in a social network. The method also includes detecting at least one event relating to the information associated with the at least one service or application within the social network and modifying the information associated with the at least one service or application in response to the at least one event.
摘要:
Utilizing information of a local network for determining presence state involves coupling a mobile device to a local, ad-hoc, peer-to-peer network. State information of a data-processing device of the network is determined using the mobile device. A presence state is formed at the mobile device based on the state information of the data-processing device. The presence state indicates conditions under which the mobile device may be contacted. In one configuration, a connection request for user communications may be received at the mobile device. The mobile device may respond to the connection request based on the presence state of the mobile device.
摘要:
According to one embodiment, a method for discovering services within a social network is provided. The method includes receiving a request from a requesting node for one or more services provided by an originating node, each service comprising an access ticket for accessing the service via a social network. The method further includes determining whether the requesting node has access rights to the one or more services, and providing one or more access tickets to the requesting node upon determining that the requesting node has access rights to one or more respective services.
摘要:
Utilizing information of a local network for determining presence state involves coupling a mobile device to a local, ad-hoc, peer-to-peer network. State information of a data-processing device of the network is determined using the mobile device. A presence state is formed at the mobile device based on the state information of the data-processing device. The presence state indicates conditions under which the mobile device may be contacted. In one configuration, a connection request for user communications may be received at the mobile device. The mobile device may respond to the connection request based on the presence state of the mobile device.
摘要:
A method, device and system restrict and prevent virus attack and malicious software to a wireless communication device from a pairing attempt by another wireless communications device. A switch is included in a transmission path coupling a first device to a second device, wherein the second device is attempting to pair with first wireless communications device. A detector coupled to the transmission path, detects an address of the second wireless communications device in a pairing communication protocol between the first and second devices. A counter coupled to the detector counts the pairing attempts of the second device. A compare circuit compares the pairing attempts to a selected number N. The compare circuit signals the switch to open when the number of attempts equals or exceeds the number N, breaking the connection, thereby preventing the first device from receiving virus attacks and malicious software.