摘要:
A method (100) and an apparatus (e.g., a network node (210)) for providing enhanced security using service provider authentication. In addition to authenticating an application signature (245) against a root certificate (235) stored on the network node (210), a first carrier identification (250) associated with the application (240) is compared to a second carrier identification (255). If the first and second carrier identifications match, then the application can be assigned to a trusted protection domain and granted permissions which provide privileged access to the network node. For example, the application can be granted permission to be installed and/or executed on the network node. Otherwise the application can be denied privileged access. Accordingly, a carrier's applications will be only installed onto network nodes that are intended recipients of the applications.
摘要:
A method (100) and an apparatus (210) for providing enhanced security using service provider authentication. In addition to authenticating an application signature (245) against a root certificate (235) stored on the network node (210), a first carrier identification (250) associated with the application (240) is compared to a second carrier identification (255). If the first and second carrier identifications match, then the application can be assigned to a trusted protection domain and granted permissions which provide privileged access to the network node. For example, the application can be granted permission to be installed and/or executed on the network node. Otherwise the application can be denied privileged access. Accordingly, a carrier's applications will be only installed onto network nodes that are intended recipients of the applications.
摘要:
A system, device, and method, for managing application interface access permissions for an application (302) in an electronic device, such as a wireless device (104), is disclosed. The method includes associating a security policy with an application (302). The method further includes creating a history log (324) associated with the application (302). The history log (324) includes time information associated with permission information indicating permission for an application to access at least one application interface in the electronic device (104). The method further includes dynamically adjusting the security policy for the application (302) when a security control signal associated with the application (302) is detected.
摘要:
In a device (100), a method (200) is provided for improving text-to-speech performance. The method includes the steps of determining (202) if a text expression from an application operating in the device is in a vocabulary, selecting (204) a corresponding speech expression from the vocabulary if the text expression is included therein, synthesizing (206) the text expression into a corresponding speech expression if the text expression is not in the vocabulary, playing (208) said speech expression audibly from the device, monitoring (210) a frequency of use of said text expression, storing (212) said text expression and corresponding speech expression in the vocabulary if the frequency of use of said expression is greater than a predetermined threshold and said expressions were not previously stored, eliminating (214) one or more text expressions and corresponding speech expressions from the vocabulary if the frequency of use of said expressions falls below the predetermined threshold, and repeating the foregoing steps during operation of the application. An apparatus implementing the method is also included.
摘要:
A mobile communication device (200) has a software architecture (302) that includes a closed operating environment (306). The closed operating environment is inaccessible to the user of the mobile communication device, and it includes software for implementing a reporting function designed to collect certain information from within the mobile communication device, and to transmit it to an entity outside the mobile communication device, such as a server (310).
摘要:
A signed application descriptor file (206) is used instead of X.509 certificates to authenticate a portable application code, such as a JAVA archive (JAR) file. The signed ADF includes an application descriptor file (302), file hash (304) of the JAR file (301), a developer descriptor file (308), signed time stamp (310), and a developer's certificate (312). A network client device (202) includes limited computing resources (212) and a virtual machine environment for executing the portable code (208). Furthermore the client device contains a set of cryptographic, digital keys for authenticating parts of the signed ADF, which are further used to authenticate the JAR file.
摘要:
Dynamically evaluating candidate connections as alternatives to an active connection between a first computing device and a second computing device. The first computing device transitions to one of the candidate connections to replace the active connection based on the evaluation. The evaluation and transition occurs based on time intervals, events, or conditions. Maintaining the candidate connections enables mobile devices, for example, to be resilient to and tolerant of topology changes affecting the active connection.
摘要:
Embodiments enhance the functionality of a vehicle, a user device, or both by the selection and sharing of data. Upon detection of each other, the vehicle device and the user device obtain and share data. The data may be associated with the user, the user computing device, and/or the vehicle and may be stored in cloud-based services. Functionality of the vehicle and/or user device is customized to the user based on the shared data. For example, the user device may provide assisted global positioning system (GPS) data to the vehicle to reduce a time-to-fix (TTF) when determining a location of the vehicle. In other examples, settings of the vehicle are personalized to the user, and location-relevant content is downloaded to the user device.
摘要:
Embodiments order observed beacons based on relative signal strength to create a correspondence between beacon sets and positions. A computing device such as a mobile device provides a positioned observation including a plurality of observed beacons and a position of the mobile device during observation. The observed beacons are ordered based on quality indicators such as signal strength relative to each other. A set of the beacons are selected based on the ordering (e.g., the beacons with the strongest signal strength are selected in order). The position of the observing mobile device is associated with the beacon set to enable location inference for other devices providing observations including the same beacon set.
摘要:
Location inference using selected beacons. Data is received representing a set of beacons observed by a computing device. The beacons are located within a first geographic area. A subset (e.g., a clique) of the beacons is selected based on a coverage area of each of the beacons, where each of the beacons in the selected subset has a coverage area that overlaps with the coverage area of each of the other beacons in the selected subset. Using known or estimated positions of the beacons, a second geographic area is defined based on the selected subset of beacons and the beacon reference data and the coverage areas associated therewith. The second geographic area, smaller than the first geographic area, represents an approximate location of the computing device. In some embodiments, the computing device is calculated to be within the second geographic area with 95% probability.