摘要:
A method and apparatus for controlling a computer device with a limited user-interface via a remote computer device having a more powerful user interface. Both computer devices are interconnected via a wireless communication channel and both computer devices support a common communications protocol. User-interface information is sent from the computer device with a limited user-interface to the remote computer device to provide a user-interface at the remote computer device for receiving user input at the remote computer device. The user input controls the computer device with a limited user-interface to execute commands therein corresponding to the user input.
摘要:
Methods, system and apparatus are provided for advertising service offerings in a communication system. An example embodiment comprises at least one device. A first device broadcasts a message of a first type, chooses a value for a time limit and listens for a message sent by a second device. If no message has been received before time limit, elapse, it again broadcasts a message of a first type. Otherwise, the message received from said second device is analyzed and if said message includes valid information about said first device chooses a value for the time limit. However, if said message received does not include valid service description about said first device, a message of a second type is broadcast. This reduces useless broadcast of a complete service list. Broadcast may be initiated more often and, service discovery for new devices coming into proximity takes less time.
摘要:
A system is provided for transmitting generally static media. The system (10) comprising an electronic device (12) and a digital audio transmitter (14). The electronic device (12) has a CPU (16), a storage medium (18), a display (20), a user interface (22), and a digital audio broadcast receiver (26). The digital audio transmitter (14) has a specialized broadcast server (30). The digital audio broadcast receiver (26) receives and decodes the digital audio signal transmitted by the digital audio transmitter (14).
摘要:
Methods, system and apparatus are provided for advertising service offerings in a communication system. An example embodiment comprises at least one device. A first device broadcasts a message of a first type, chooses a value for a time limit and listens for a message sent by a second device. If no message has been received before time limit, elapse, it again broadcasts a message of a first type. Otherwise, the message received from said second device is analyzed and if said message includes valid information about said first device chooses a value for the time limit. However, if said message received does not include valid service description about said first device, a message of a second type is broadcast. This reduces useless broadcast of a complete service list. Broadcast may be initiated more often and, service discovery for new devices coming into proximity takes less time.
摘要:
Scheme and apparatus (10) for distinguishing services offered by a service-providing device in adjacency of the apparatus (10) from services offered by a service-providing device not being in the apparatus' adjacency. All devices—including the apparatus—are part of a wireless local network. The apparatus (10) maintains a record with information about services and associated identifiers as well as a list of identifiers about the service-providing devices. The associated identifiers and the list of identifiers are compared to determine an associated service as being in adjacency of the apparatus if it is rendered by a service-providing device being listed in the list of identifiers. An associated service is determined as not being in adjacency of the apparatus if it is rendered by a service-providing device not being listed in the list of identifiers. The apparatus (10) comprises a network interface (25) for wireless communication with the service-providing devices, and a service discovery module (11) which maintains the record with information services and associated identifiers.
摘要:
Methods and apparatus for forming and presenting confidential presentations within a computing environment associated with a virtual application are presented. For example, a method for forming a confidential presentation includes obtaining a correspondence indicator from an asset server, obtaining a first texture from the asset server, and overlaying the first texture onto a first object. The correspondence indicator indicates the first texture corresponds to the first object. The first object is within the computing environment associated with the virtual application. The first texture and the asset server are inaccessible by the computing environment associated with the virtual application. The confidential presentation comprises the first texture.
摘要:
Methods and apparatus for forming and presenting confidential presentations within a computing environment associated with a virtual application are presented. For example, a method for forming a confidential presentation includes obtaining a correspondence indicator from an asset server, obtaining a first texture from the asset server, and overlaying the first texture onto a first object. The correspondence indicator indicates the first texture corresponds to the first object. The first object is within the computing environment associated with the virtual application. The first texture and the asset server are inaccessible by the computing environment associated with the virtual application. The confidential presentation comprises the first texture.
摘要:
A method for sending a message from a mobile device via a first application running on the mobile device is proposed. The method comprises a challenge step for supplying the first application with a challenge, a response step for receiving a response to the challenge, an equality check step for determining whether the received response corresponds to an expected response, a signature step for providing a signature for the message, using a cryptographic key and the result of the equality check step, and a send step for sending the signed message via the first application from the mobile device to a backend system.
摘要:
A method for receiving input from a user of a virtual world, the method including: interacting with an object displayed in the virtual world; displaying another object in the virtual world in response to the interacting, the another object adapted to interact with the user; displaying at least one of a user specific label and a service specific label in place of a generic label associated with the another object; selecting the another object; and receiving the generic label and the at least one of the user specific label and the service specific label as the input in response to the selecting.
摘要:
A method for virtual world (VW) access control management includes intercepting a policy object from a VW network in response to a request from a VW client system to access a VW space, the policy object intercepted by a proxy server located outside of the network. The method also includes selecting an identity based upon the policy object, which provides credentials required in the policy object as a condition of granting access to the network, generating proof from the selected identity, and transmitting the proof to a verifier avatar located inside the network, the verifier avatar logically mapped to, and controlled by, a verification system located outside of the network. The method further includes receiving, at the verification system, the proof from the verifier avatar. In response to successful validation of the proof, the verification avatar places an avatar of the client system on a list of avatars having access to the space.