摘要:
Disclosed are apparatus and methods operable to distribute targeted content. Additionally, disclosed are corresponding apparatus and methods operable to selectively choose and cache selected ones from among the distributed targeted content, and to further choose ones from among the cached content to present on a device. In some aspects, selective caching of content may be based upon a match between predetermined content attribute information and predetermined profile information. Further, in some aspects, an indicator is operable to trigger the selective inclusion of one or more of the cached content in a presentation of other content, which may be based on a match between a desired content attribute associated with the indicator and the respective predetermined content attribute information of the cached content.
摘要:
Disclosed are apparatus and methods operable to distribute targeted content. Additionally, disclosed are corresponding apparatus and methods operable to selectively choose and cache selected ones from among the distributed targeted content, and to further choose ones from among the cached content to present on a device. In some aspects, selective caching of content may be based upon a match between predetermined content attribute information and predetermined profile information. Further, in some aspects, an indicator is operable to trigger the selective inclusion of one or more of the cached content in a presentation of other content, which may be based on a match between a desired content attribute associated with the indicator and the respective predetermined content attribute information of the cached content.
摘要:
A system, method and apparatus for providing location services whereby location determination and location disclosure are treated as separate and independent processes. Location determination may be performed (as necessary) via a first set of network entities to obtain location information for a mobile station. The location information may be cached for subsequent disclosure to any number of applications. Location disclosure may be performed (when requested) via a second set of network entities to provide the location information. Location determination may utilize a first security procedure for authentication and authorization and to obtain a first session key used for location determination. Location disclosure may utilize a second security procedure for authentication and authorization and to obtain a second session key used for location disclosure. For a roaming mobile station, location determination may be performed via a serving network and location disclosure may be performed via a home network.
摘要:
Described are techniques and mechanisms for addressing unsolicited commercial, junk, or generally unwanted electronic messages. Very generally stated, a message server is provided that performs a message filtering analysis using resources local to the message server. The message server delivers to a remote device messages that do not fail the filter. In the situation where the message filtering analysis was incorrect, the remote device returns a notification of that fact to the message server with sufficient information that the message server can update its local resources accordingly.
摘要:
A messaging system on a server computes a spamicity value (spam score) for incoming messages. The messaging system may filter the incoming messages using that spamicity value, or using any other basis. Conversely, the messaging system may not filter the messages at all. In either case, the spamicity value is communicated to a remote device prior to communicating the messages to the remote device. In this way, a messaging client at the remote device may determine whether to retrieve the messages using the calculated spamicity values from the server
摘要:
Described are apparatus and methods for the analysis of characteristics of links intended to deceive a message recipient. The analysis can be employed at the receiving client, an intermediate server, or at other points to help protect the user from fraud without blocking legitimate content. For example, this analysis can be used to warn users attempting to follow such links. This analysis can also be used to mark the links in an indicative way on display. This analysis can also be used as input to spam-scoring algorithms.
摘要:
A method for transferring data that includes the formulation of a set of criteria that includes a first subset of the criteria and a second subset of the criteria, the first subset of the criteria corresponding to one or more triggering events, the second subset of the criteria corresponding to a group of conditions of a communication link required for a data transfer between a first entity and a second entity, the group consisting of a timing to request data and a timing for the data transfer, a determination that the criteria in the first subset has been met which triggers an evaluation of the criteria in the second subset, a determination that the set of criteria has been met; and the initiation of the data transfer between the first entity and the second entity in response to meeting the set of criteria.