摘要:
The present invention provides methods and apparatuses for obtaining selected metadata from a user device. The user device has a metadata engine that stores and accesses metadata in response to a metadata query. A metadata broker verifies the authenticity of the metadata query from a service provider and returns selected metadata if the service provider has rights to obtain the metadata. The user device has a communications interface that sends a service request that is indicative of the selected service over a communications channel and receives the metadata request that is indicative of the selected metadata. An authorization center receives a metadata request from a service provider, accesses a rule set to determine selected metadata in accordance with predetermined rights, and returns a signed metadata request to the service provider. The signed metadata request has an electronic signature of an authorizing party and is indicative of the selected metadata.
摘要:
The present invention provides methods and apparatuses for obtaining selected metadata from a user device. The user device has a metadata engine that stores and accesses metadata in response to a metadata query. A metadata broker verifies the authenticity of the metadata query from a service provider and returns selected metadata if the service provider has rights to obtain the metadata. The user device has a communications interface that sends a service request that is indicative of the selected service over a communications channel and receives the metadata request that is indicative of the selected metadata. An authorization center receives a metadata request from a service provider, accesses a rule set to determine selected metadata in accordance with predetermined rights, and returns a signed metadata request to the service provider. The signed metadata request has an electronic signature of an authorizing party and is indicative of the selected metadata.
摘要:
Bridging between ad hoc local networks and Internet based peer-to-peer networks involves coupling a bridge device to a local network using an ad-hoc, peer-to-peer protocol used for exchanging data between consumer electronics devices. The bridge device is coupled to a public network using an Internet-based peer-to-peer networking protocol. In one arrangement, metadata related to media accessible from a media server of the local network is determined via the bridge device, and the metadata is transformed via the bridge device to enable peer-to-peer devices of the public network to discover the media via the bridge device using the Internet-based peer-to-peer networking protocol. In another arrangement, metadata related to media accessible from the public network is determined via the peer-to-peer networking protocol, and the metadata is transformed via the bridge device to enable a device of the local network to discover the media via the bridge device using the ad-hoc, peer-to-peer protocol.
摘要:
An instant-messaging system (IM) includes messaging devices equipped with individuating addresses, which include a client functionality and a transceiver or data-transmission-reception means for performing instant messaging between the messaging devices, and each of which messaging devices is equipped with messaging capabilities, which messaging capabilities differ at least partly between the messaging devices, and a server functionality arranged to maintain information on the messaging devices belonging to the instant-messaging system. The server functionality is arranged to maintain information on the messaging capabilities of the messaging devices.
摘要:
Bridging between ad hoc local networks and Internet based peer-to-peer networks involves coupling a bridge device to a local network using an ad-hoc, peer-to-peer protocol used for exchanging data between consumer electronics devices. The bridge device is coupled to a public network using an Internet-based peer-to-peer networking protocol. In one arrangement, metadata related to media accessible from a media server of the local network is determined via the bridge device, and the metadata is transformed via the bridge device to enable peer-to-peer devices of the public network to discover the media via the bridge device using the Internet-based peer-to-peer networking protocol. In another arrangement, metadata related to media accessible from the public network is determined via the peer-to-peer networking protocol, and the metadata is transformed via the bridge device to enable a device of the local network to discover the media via the bridge device using the ad-hoc, peer-to-peer protocol.
摘要:
The present invention provides methods and apparatuses for obtaining selected metadata from a user device. The user device has a metadata engine that stores and accesses metadata in response to a metadata query. A metadata broker verifies the authenticity of the metadata query from a service provider and returns selected metadata if the service provider has rights to obtain the metadata. The user device has a communications interface that sends a service request that is indicative of the selected service over a communications channel and receives the metadata request that is indicative of the selected metadata. An authorization center receives a metadata request from a service provider, accesses a rule set to determine selected metadata in accordance with predetermined rights, and returns a signed metadata request to the service provider. The signed metadata request has an electronic signature of an authorizing party and is indicative of the selected metadata.
摘要:
The present disclosure relates to a system, apparatus, and method for providing services usable by a mobile terminal. In one embodiment, a method involves initiating a device startup sequence of a mobile computing arrangement. A capability descriptor of the mobile computing arrangement is communicated to a service provider entity as part of the startup sequence. A data service targeted for the mobile device based on the capability descriptor communicated to the service provider, and the data service is then initiated with the mobile computing arrangement.
摘要:
A set of performance-related data that represents both normal and abnormal conditions in the network is determined and stored in a mobile station MS. The set or a sub-set of this data is transmitted to a computer for analysis upon a triggering event, and the MS user is informed of the analysis results. The triggering event is receipt by the MS of an encrypted message to transmit the set or sub-set of the data. The MS decrypts the received message using an associated public key stored in the MS and transmits the set or the sub-set of the performance-related data only in response to correctly decrypting the encrypted message. The public key is one of a set of public keys stored in the mobile station, wherein individual members of the set are associated with applications executable by the MS in cooperation with a received encrypted command or encrypted data set.
摘要:
The present invention provides methods and apparatuses for obtaining selected metadata from a user device. The user device has a metadata engine that stores and accesses metadata in response to a metadata query. A metadata broker verifies the authenticity of the metadata query from a service provider and returns selected metadata if the service provider has rights to obtain the metadata. The user device has a communications interface that sends a service request that is indicative of the selected service over a communications channel and receives the metadata request that is indicative of the selected metadata. An authorization center receives a metadata request from a service provider, accesses a rule set to determine selected metadata in accordance with predetermined rights, and returns a signed metadata request to the service provider. The signed metadata request has an electronic signature of an authorizing party and is indicative of the selected metadata.
摘要:
A method and mobile terminal are disclosed for use in a wireless communication system, in order to increase security of the mobile terminal when it is lost, stolen, or misplaced by a user. The method includes receiving a guard message at the mobile terminal, authenticating the guard message, locking at least one communication capability of the mobile terminal, and also securing at least some data that is stored in the mobile terminal. Initiation of the method requires inputting a personal identification code at a location separate from the mobile terminal.