摘要:
Providing a software distribution service via ad hoc peer-to-peer networks involves configuring a first device to offer a peer-to-peer software distribution service that facilitates access to a plurality of programs. The peer-to-peer software distribution service is advertised via the first device using a service discovery protocol of an ad hoc peer-to-peer network. At least one query for a description of the peer-to-peer software distribution service from a target device of the ad hoc peer-to-peer network is received at the first device in response to advertising the peer-to-peer software distribution service. Downloading of a program to the target device is facilitated via the peer-to-peer software distribution service. The program is selected from the plurality of programs and capable of operating on a processor of the target device.
摘要:
Providing a software distribution service via ad hoc peer-to-peer networks involves configuring a first device to offer a peer-to-peer software distribution service that facilitates access to a plurality of programs. The peer-to-peer software distribution service is advertised via the first device using a service discovery protocol of an ad hoc peer-to-peer network. At least one query for a description of the peer-to-peer software distribution service from a target device of the ad hoc peer-to-peer network is received at the first device in response to advertising the peer-to-peer software distribution service. Downloading of a program to the target device is facilitated via the peer-to-peer software distribution service. The program is selected from the plurality of programs and capable of operating on a processor of the target device.
摘要:
Providing a software update service involves discovering, via an ad-hoc peer-to-peer network, a peer-to-peer software update service using a service discovery protocol of the ad-hoc peer-to-peer network. The peer-to-peer software update service is offered by a peer device and facilitates updates of programs via the ad-hoc, peer-to-peer network. In response to discovering the peer-to-peer software update service, an update is selected that is applicable to a program of a first device of the ad-hoc peer-to-peer network. The update is sent to the first device and the program of the first device is modified using the update.
摘要:
A portable apparatus comprising input means arranged to receive user input comprising of one or more taps on the portable apparatus. The apparatus is able to detect the taps on the portable apparatus and to determine at least one location of the taps on the portable apparatus. The apparatus is further able to define an imaginary key on the apparatus on the determined location.
摘要:
Additions of extensions to SyncML protocol to incorporate PKI-based and XML-based security mechanisms. The present invention involves the partial incorporation of the PKI based mechanisms present in the Rights Object Acquisition Protocol (ROAP) suite of OMA DRMv2 model into the SyncML protocol, resulting in security enhancements for SyncML.
摘要:
The invention relates to a method for arranging use of configurations in a device with multiple configuration data sets manageable by one or more external managing entities. The device comprises access control information originated and/or controlled by an external managing entity for defining a right to access a configuration data set. The access control information is checked in response to an indication from an application requiring access to a configuration data set. If the application is, on the basis of the access control information, entitled to access the configuration data set, access to the configuration data set is arranged for the application.
摘要:
The invention relates to a method for arranging use of configurations in a device with multiple configuration data sets manageable by one or more external managing entities. The device comprises access control information originated and/or controlled by an external managing entity for defining a right to access a configuration data set. The access control information is checked in response to an indication from an application requiring access to a configuration data set. If the application is, on the basis of the access control information, entitled to access the configuration data set, access to the configuration data set is arranged for the application.