摘要:
A method of enabling a wireless information device to access data from several data services providers in which the method comprises the step of the device using an extensible framework which handles data passing to and from several applications resident on the device, the framework being shared by each of the applications resident on the device and also being shared by each of the data services providers.
摘要:
A messaging architecture is disclosed which enables a single messaging application, handling non-transport specific attributes and operations, to manipulate any commonly known message type (such as fax, e-mail, pager, SMS, voice mail) using dynamically loadable plug-ins which contribute the ability to handle all transport specific attributes and operations. This architecture results in a single in-box being presented to a user for browsing all incoming messages, irrespective of message type.
摘要:
The method allows a user to define groups of entities that will be queried automatically for Presence information by his wireless information device. The user, once he has selected the group to be queried, need do no more than select at one time a ‘Pinging’ function using an on-screen dialog or other menu, which initiates the automatic querying. There is no need to manually query each member of the group for its Presence information.
摘要:
Presence information for a user is stored and made accessible using a conventional client server or peer to peer Presence model. The identity of any entity that requests or accesses this Presence information is however logged and then automatically provided to a wireless information device operated by the user. This enables the device to display the identity of the entity that requested or accessed the Presence information and hence (a) can prompt a user to contact the entity that sought his Presence information and (b) inhibits inappropriate accessing of Presence information.
摘要:
A group communication method for a wireless information device, in which the method comprises the step of using an application independent object which defines or references members of a group in a way that enables communication to take place between two or more members of the group. The group object defines solely the identities of members of a group: as such, it is application (and hence also content) independent. This means that a group created in one application (e.g. a diary/agenda application could use that same group as the recipient list for an invitation to a meeting); a voice application could use that same group to allow a voice call to be conferenced across to all group members. Similarly, data specifically created for one group and in one application can be re-used in a different application and the data viewed appropriately for that different application.
摘要:
A mobile wireless device programmed with software which provides a trusted user interface for the device by allowing the content of a secure screen memory to be modifiable only by authorised applications. Normally, the entire screen memory address is public information, making the entire screen memory fully available to any application; hence, even sensitive dialogs would use screen memory which can in theory be looked at by malicious software, enabling that malicious code to grab PIN data etc. or corrupt a trusted user interface. But with the present invention, unauthorised applications are prevented from accessing the data displayed by the secure frame buffer because they are able to access only the non-secure screen memory. Hence, malicious applications cannot retrieve data from a trusted dialog or compromise that data. Further, as the present invention is a software only solution, it requires no new hardware per se—the only requirement is that components (e.g. a software window server; a video chip etc.) can select content from different parts of screen memory—i.e. secure and non-secure frame buffers.
摘要:
Presence information for a user is stored and made accessible using a conventional client server or peer to peer Presence model. The identity of any entity that requests or accesses this Presence information is however legged and then automatically provided to a wireless information device operated by the user. This enables the device to display the identity of the entity that requested or accessed the Presence information and hence (a) can prompt a user to contact the entity that sought his Presence information and (b) inhibits inappropriate accessing of Presence information.
摘要:
A secure mobile wireless device in which executable code to be installed on the device is assigned a set of capabilities which define the protected resource(s) on the device which it can access. Hence, the present invention takes the idea of capabilities (known in the context of defining the capabilities or access privileges of different users in a multi-user system) and applies it to defining the capabilities or access privileges of different native executable code for secure, single-user mobile wireless devices.
摘要:
A database which is accessible by a wireless information device and is (a) for entities and (b) has attributes which are remotely extensible by an application author using a standard protocol over a network. The database offers, in one implementation, an extensible and dynamic framework (i.e. it is a system that can be updated to include new services and functions) for the fast and efficient design, build and roll-out of client-based applications which involve an element of secure and reliable information distribution or content sharing.