摘要:
A distribution system and method. The distribution system comprises a computing apparatus and a plurality of projection systems connected to the computing apparatus. The computing apparatus comprises a scheduler software tool and a plurality of audio/video data files stored on a computer readable medium. Each projection system of the plurality of projection systems comprises a cache storage device connected to an associated projection apparatus. Each cache storage device is adapted to dynamically receive and store an associated audio/video data file from the plurality of audio/video data files for transmission to each associated projection apparatus according to a schedule generated by the scheduler software tool.
摘要:
A method for providing secure access to information held in a shared repository, for example to electronic business cards stored on a server. A data owner registers with the server and provides information to be shared with selected data users. The server returns public-key cryptography keys. To access the information, a data user sends its public key to the data owner. The data owner encrypts the public key using the data owner private key, and sends the result to the server, along with permission to transfer information to the data user. The server decrypts the received result using the data owner public key, and compares the outcome with the data user public key. If they match, the server records permission on an access list. In response to a request for information the server checks the access list to determine whether the data user has permission. If so, the server encrypts the information using the data user public key, and transfers the result to the data user.
摘要:
Servlets within a web server maintain state information concerning requests made by users of the server. The servlets associate each user with an HTTP session object. The session object is configured to include information that identifies the last-N web pages requested by the user. Periodically, or in response to a triggering event, the server analyzes the contents of the session objects, for example by tabulating the frequency with which each web page has been requested in the recent past. From the results of the analysis, web-page caching priorities are determined, and the contents of the server's cache are altered accordingly.
摘要:
A method for providing secure access to information held in a shared repository, for example to electronic business cards stored on a server. A data owner registers with the server and provides information to be shared with selected data users. The server returns public-key cryptography keys. To access the information, a data user sends its public key to the data owner. The data owner encrypts the public key using the data owner private key, and sends the result to the server, along with permission to transfer information to the data user. The server decrypts the received result using the data owner public key, and compares the outcome with the data user public key. If they match, the server records permission on an access list. In response to a request for information the server checks the access list to determine whether the data user has permission. If so, the server encrypts the information using the data user public key, and transfers the result to the data user.
摘要:
A method for providing secure access to information held in a shared repository, for example to electronic business cards stored on a server. A data owner registers with the server and provides information to be shared with selected data users. The server returns public-key cryptography keys. To access the information, a data user sends its public key to the data owner. The data owner encrypts the public key using the data owner private key, and sends the result to the server, along with permission to transfer information to the data user. The server decrypts the received result using the data owner public key, and compares the outcome with the data user public key. If they match, the server records permission on an access list. In response to a request for information the server checks the access list to determine whether the data user has permission. If so, the server encrypts the information using the data user public key, and transfers the result to the data user.
摘要:
A messaging system and method suitable for use with wireless mobile terminals. The system includes a message server for receiving and sending messages and converting messages to a baseline such as an XML representation; a message processor for controlling the system's operation; a database for storing information about messaging capabilities of mobile terminals; and a transcoder for filtering the baseline representation according to the capability of a mobile terminal. A subscriber enters a profile that includes the messaging capability of the mobile terminal, which is stored in the database. When the server receives a message for the subscriber's terminal, it converts the message to the baseline. The transcoder filters the baseline according to the capability of the terminal, and returns the result to the server for format and protocol conversion and sending to the terminal.