摘要:
An IP server sends e-mail to a mobile device MS. This e-mail includes an application specifier that specifies startup of a Java application stored in mobile device MS. On the other hand, the ADF for the Java application stored in mobile device MS includes trusted source data containing a plurality of e-mail addresses that indicate trusted origins. Mobile device MS compares the e-mail transmission origin address with the trusted source data. Mobile device MS, only in the case where the transmission origin address of the received e-mail is included in the trusted source data, starts up a Java application based on an application specifier included in said e-mail.
摘要:
An IP server sends e-mail to a mobile device MS. This e-mail includes an application specifier that specifies startup of a Java application stored in mobile device MS and a data specifier that includes data used in operations executed by mobile device MS in accordance with a Java application. On the other hand, the ADF for the Java application stored in mobile device MS includes trusted source data containing a plurality of e-mail addresses that indicate trusted origins. Mobile device MS compares the e-mail transmission origin address with the trusted source data. Mobile device MS, only in the case where the transmission origin address of the received e-mail is included in the trusted source data, starts up a Java application based on an application specifier included in said e-mail, and uses data included in said data specifier in operations executed by that Java application.
摘要:
An event obtaining unit 121 obtains an event generated in an event generation unit 110 and outputs the event to the event providing unit 122. When an operation mode is mode A, the event providing unit 122 refers to an event table T1 and provides the event to an application corresponding to the event. If the event is provided to a communication AP 131, the communication AP 131 is launched prior to providing the event. On the other hand, when the operation mode is mode B, the event providing unit 122 provides the event to a Java runtime environment 140. In addition, the event providing unit 122 changes the operation mode when a switching button CB is pressed.
摘要:
An IP server sends e-mail to a mobile device MS. This e-mail includes an application specifier that specifies startup of a Java application stored in mobile device MS. On the other hand, the ADF for the Java application stored in mobile device MS includes trusted source data containing a plurality of e-mail addresses that indicate trusted origins. Mobile device MS compares the e-mail transmission origin address with the trusted source data. Mobile device MS, only in the case where the transmission origin address of the received e-mail is included in the trusted source data, starts up a Java application based on an application specifier included in said e-mail.
摘要:
An IP server sends e-mail to a mobile device MS. This e-mail includes an application specifier that specifies startup of a Java application stored in mobile device MS. On the other hand, the ADF for the Java application stored in mobile device MS includes trusted source data containing a plurality of e-mail addresses that indicate trusted origins. Mobile device MS compares the e-mail transmission origin address with the trusted source data. Mobile device MS, only in the case where the transmission origin address of the received e-mail is included in the trusted source data, starts up a Java application based on an application specifier included in said e-mail.
摘要:
An event obtaining unit 121 obtains an event generated in an event generation unit 110 and outputs the event to the event providing unit 122. When an operation mode is mode A, the event providing unit 122 refers to an event table T1 and provides the event to an application corresponding to the event. If the event is provided to a communication AP 131, the communication AP 131 is launched prior to providing the event. On the other hand, when the operation mode is mode B, the event providing unit 122 provides the event to a Java runtime environment 140. In addition, the event providing unit 122 changes the operation mode when a switching button CB is pressed.
摘要:
An IP server sends e-mail to a mobile device MS. This e-mail includes an application specifier that specifies startup of a Java application stored in mobile device MS and a data specifier that includes data used in operations executed by mobile device MS in accordance with a Java application. On the other hand, the ADF for the Java application stored in mobile device MS includes trusted source data containing a plurality of e-mail addresses that indicate trusted origins. Mobile device MS compares the e-mail transmission origin address with the trusted source data. Mobile device MS, only in the case where the transmission origin address of the received e-mail is included in the trusted source data, starts up a Java application based on an application specifier included in said e-mail, and uses data included in said data specifier in operations executed by that Java application.
摘要:
With regard to data, stored in mobile phone 40, whose a security level is high and contents whose copyrights are protected, mobile phone 40 encapsulates data and contents, and includes the encapsulated data or the encapsulated contents. Further, mobile phone 40 processes the encapsulated data as a perfect encapsulated object utilizing only a method which is not authorized access to the encapsulated data by an executed program (E.g. Downloaded Java Applications). Java AP downloaded to mobile phone 40 instructs a perfect encapsulated object to process the encapsulated data in the perfect encapsulated object by using a method belonging to the perfect encapsulated object. Therefore, this invention makes it possible to ensure securities for programs to be provided through the network without losing diversifications of programs.
摘要:
With regard to data, stored in mobile phone 40, whose a security level is high and contents whose copyrights are protected, mobile phone 40 encapsulates data and contents, and includes the encapsulated data or the encapsulated contents. Further, mobile phone 40 processes the encapsulated data as a perfect encapsulated object utilizing only a method which is not authorized access to the encapsulated data by an executed program (E.g. Downloaded Java Applications). Java AP downloaded to mobile phone 40 instructs a perfect encapsulated object to process the encapsulated data in the perfect encapsulated object by using a method belonging to the perfect encapsulated object. Therefore, this invention makes it possible to ensure securities for programs to be provided through the network without losing diversifications of programs.
摘要:
With regard to data, stored in mobile phone 40, whose a security level is high and contents whose copyrights are protected, mobile phone 40 encapsulates data and contents, and comprises the encapsulated data or the encapsulated contents. Further, mobile phone 40 processes the encapsulated data as a perfect encapsulated object utilizing only a method which is not authorized access to the encapsulated data by an executed program (E.g. Downloaded Java Applications). Java AP downloaded to mobile phone 40 instructs a perfect encapsulated object to process the encapsulated data in the perfect encapsulated object by using a method belonging to the perfect encapsulated object. Therefore, this invention makes it possible to ensure securities for programs to be provided through the network without losing diversifications of programs.