摘要:
A method for improved application of unreliable transfer mechanisms. An application uses application data delivered in data packets that become accessible from a peer entity via at least two packet data transmission mechanisms. The application is configured with a predefined operational range for a predefined application-specific characteristic. If the predefined application-specific characteristic exceeds the predefined operational range, the packet data transmission mechanism is changed. The mechanism facilitates maintaining an application-specific service level even if unreliable transmission mechanisms are applied.
摘要:
An apparatus for enabling a user to access a dynamic attribute associated with a service point may include a processing element. The processing element may be configured to receive an indication of a dynamic attribute associated with a service point having a particular geographic location, indicate an availability of the dynamic attribute to a user, and enable the user to access the dynamic attribute in response to a user selection. The dynamic attribute may be provided from a mobile content source proximate to the particular geographic location.
摘要:
A computer system, method, and computer program product for controlling access to an application program in a wireless device connected to an ad-hoc communications network. The method comprises sending an inquiry message to the network, receiving a response, choosing a selected application, and examining control parameters associated with the selected application. The control parameters dictate a behavior of the selected application such as allowing or refusing communication with the selected application. When a nearby wireless device includes a matching application, connecting the selected application and the matching application further comprises sending a connection request, receiving connection response, launching the selected application, and sending a service request. When the selected application closes, the method further comprises erasing the selected application. To choose the selected application, the method further comprises retrieving an entry from a distributed application directory or selecting the application based on a priority assigned to the entry.
摘要:
A recovery scheme where a base station monitors state of interoperation with a primary exchange. When the primary exchange becomes unavailable, active services may be lost, but the base station sends an activation request message to a secondary exchange that has access to base station configuration information of the base station. The secondary exchange uses the base station configuration information to activate the base station, and user terminals in the base station cell may begin to registrate to the system. Recovery capability of communications can be achieved with optimized use of network resources.
摘要:
A method for improved application of unreliable transfer mechanisms. An application uses application data delivered in data packets that become accessible from a peer entity via at least two packet data transmission mechanisms. The application is configured with a predefined operational range for a predefined application-specific characteristic. If the predefined application-specific characteristic exceeds the predefined operational range, the packet data transmission mechanism is changed. The mechanism facilitates maintaining an application-specific service level even if unreliable transmission mechanisms are applied.
摘要:
A computer system, method, and computer program product for performing device detection and service discovery in a mobile ad hoc communications network. The method comprises conducting an inquiry of the mobile ad hoc communications network to discover nearby devices. If the inquiry indicates that the nearby devices may include a middleware layer, the method further comprises creating a connection to each of the nearby devices and confirming whether each of the nearby devices include the middleware layer. For each of the nearby devices that include the middleware layer, the method further comprises executing the middleware layer to perform application and service discovery, and to launch applications and services.
摘要:
A method, apparatus or tangible computer medium (which stores computer executable code or program code) performs or facilitates: receiving from a first remote device protected content along with pricing attribute information for the protected content; requesting access to the protected content from a second remote device, the requesting including transmitting of the pricing attribute information to the second remote device which is authorized to act on behalf of a provider of the content; and obtaining access to the protected content from the second remote device according to a pricing or valuation of the protected content based on the pricing attribute information received by the second remote device.
摘要:
The present invention provides methods, apparatuses, and systems for delivering protected streaming content to a receiving device. In an aspect of the present invention, a broadcaster provides streaming content. To ensure viewers are properly authorized, the streaming content is encrypted with a traffic key. The traffic key is provided to the users via a key stream message, which is encrypted with a service key. The user obtains at least one rights object from a rights issuers and the at least one rights object includes the service key so that the streaming content may be used. The at least one rights object also contains information regarding usage rights that may be configured by the rights issuer so that, depending on the user and/or the receiving device, different rights may be available. The key stream message may include a program category variable value that indicates the type of content and in conjunction with the rights object, determines what usage rights exist for the streaming content.
摘要:
A recovery scheme where a base station monitors state of interoperation with a primary exchange. When the primary exchange becomes unavailable, active services may be lost, but the base station sends an activation request message to a secondary exchange that has access to base station configuration information of the base station. The secondary exchange uses the base station configuration information to activate the base station, and user terminals in the base station cell may begin to registrate to the system. Recovery capability of communications can be achieved with optimised use of network resources.
摘要:
An information system that comprises a data source that transmits a data item to a group of database instances using a packet-switched communication protocol in which retransmission of the data item to a data base instance is independent from reception of an acknowledgement to the transmitted data item from the database instance. Adatabase instance receives the data item from the data source, stores it as a present data item and opens access to the present data item. A data consumer queries information on the present data item from the database instance and is provided with means to detect whether the information included in a response to the query is valid or not. If the information is not valid, the data consumer initiates a new query from another destination.