摘要:
A system and method are provided for searching the contents of a network system connected to data storage devices from a remote terminal over a wired or wireless link. This system formulates search requests, and dispatches the requests, A variety of search engines and services are invoked to find the requested contents. A summary is formed in a format brief enough for transmission over a wireless link. The search summary information is indexed the remote terminal to subsequently request all or part of a document referenced in the search summary, allows formation of requests of all or part of a referenced document in its original form or in a form transcoded appropriately for transmission over a wireless link and presented on the remote terminal.
摘要:
Techniques are disclosed for synchronizing service data between a data store and a device using the service data. These synchronization techniques may be used with a synchronization method and device that adaptively adjust synchronization parameters, such as the synchronization interval and quantity of synchronized data, on a per-end-user basis in response to actual end-user behavior. In particular, heavy users of service data are rewarded with improved synchronization parameters, such as a combination of shorter synchronization intervals and increased synchronization data quantities, which provides closer to “direct access” performance. Light users of service, on the other hand, are assigned lower cost synchronization parameters, such as longer synchronization intervals and/or decreased synchronization data quantities.
摘要:
Data is stored on a computing device in an encrypted form using a control application. A data access application requests access to the data. It is determined whether the data access application has available a shared encryption key that is available to the control application. If a shared encryption key is available, the shared encryption key is used to encrypt a request for access to the data. If a shared encryption key is not available, a shared encryption key is negotiated with the control application, and the negotiated shared encryption key is used to encrypt the request for access to the data. The control application receives the encrypted request, decrypts the encrypted request using the shared encryption key, and makes the data stored on the computing device in encrypted form available to the data access application in response to the decrypted request.
摘要:
This invention discloses a system and method for selective erasure, encryption and or copying of data on a remote device if the remote device has been compromised or the level of authorization of a roaming user in charge of the remote device has been modified.
摘要:
This invention discloses a system and method for selective erasure, encryption and or copying of data on a remote device if the remote device has been compromised or the level of authorization of a roaming user in charge of the remote device has been modified.
摘要:
A system and method for provisioning a push notification session via a communications network between an application on a client terminal and a server corresponding to the application. In one aspect, a push provisioning entity transmits a message to the client terminal, whereby to configure the client terminal into a state in which it is able to request a push notification session with the server. An application on the client terminal can then request establishment of a push notification session by transmitting a push notification session request message to the push provisioning entity. The push provisioning entity generates a token for use in validating the push notification session, associates the generated token with the application and transmits the token to the application, which uses it to establish the push notification session.
摘要:
Embodiments provide methods, devices and computer program arranged to facilitate authenticated communication between a user device and a service associated with a network. One embodiment comprises an apparatus which, in response to authenticating a user device on the basis of a first authentication protocol, transmits a request for a credential of a first type to an authentication server associated with the network via a communications link therebetween, the credential of the first type being for use by the apparatus to obtain a credential of a second type on behalf of the user device from the authentication server. Subsequently, the apparatus transmits a request for a credential of a second type to the authentication server via the communications link therebetween, the credential of the second type being for use by the user device in establishing authenticated communication with the service. The credential of the second type is then transmitted to the user device.
摘要:
A system is disclosed in which a wireless device is monitored and maintained over a network. One embodiment of the system comprises a wireless device including: a service to maintain data objects, provide messaging capability, and provide data access capability on behalf of a user of the wireless device; and a rules engine communicatively coupled to the service to execute a set of rules transmitted to the wireless device from a server, the set of rules to instruct the rules engine to gather information related to the wireless device and to take action on the wireless device based on the gathered information.
摘要:
A method of on-device access using a container application to manage a sub application provisioned on a computer device by set of stored instructions executed by a computer processor to implement the steps of: receive a communication for the sub application by a first service programming interface (SPI) of the container application, the communication sent by a on-device process over a first communication pathway of a device infrastructure of the computer device utilizing interprocess communication (IPC) framework of the device infrastructure, the first communication pathway provided external to the first SPI; retransmit the communication by the first SPI to a second SPI of the sub application over a second communication pathway that bypasses the IPC framework, the second communication pathway internal to the first SPI; receiving a response to the communication by the first SPU from the second SPI over the second communication pathway; and directing the response to the on-device process over the first communication pathway.
摘要:
Data is stored on a computing device in encrypted form in respective digital containers. At least one data access application is stored on the computing device. A control application of the computing device connects to a remote control center. A command from the remote control center is received at the connected control application. The command contains an action to be taken in respect of at least one of the at least one data access application and the containers stored on the computing device. The command is passed from the connected control application to the data access application or container, and the data access application or container carries out the command.