摘要:
The invention relates to a method of creating an ad-hoc connection between two electronic devices. In order to enable a particularly user-friendly creation of such a connection, it is proposed that a first device detects a hugging state between the first device and a second device, in which the first device and the second device are in close vicinity and a piece of information is received at the first device directly from the second device. In case a hugging state is detected, a handle is obtained proceeding from the received piece of information. The handle comprises an address of some device other than the first device. Finally, a communication channel is established between the first device and the other device using the address included in the handle. The invention relates equally to a corresponding device, to an expandable framework for such a device, and to a corresponding software program product.
摘要:
The invention relates to a method of creating an ad-hoc connection between two electronic devices. In order to enable a particularly user-friendly creation of such a connection, it is proposed that a first device detects a hugging state between the first device and a second device, in which the first device and the second device are in close vicinity and a piece of information is received at the first device directly from the second device. In case a hugging state is detected, a handle is obtained proceeding from the received piece of information. The handle comprises an address of some device other than the first device. Finally, a communication channel is established between the first device and the other device using the address included in the handle. The invention relates equally to a corresponding device, to an expandable framework for such a device, and to a corresponding software program product.
摘要:
The invention relates to a method for controlling access to a private network. To a firewall node are updated logical names for mobile nodes allowed to communicate with nodes in the private network. A packet is received to the firewall node from an external network, the packet being addressed to a first node within the private network. The source address is obtained from the packet. Addresses associated with the logical names are obtained from a database node. It is checked whether the source address belongs to the addresses obtained. The packet is admitted to the private network, if the source address belongs to the addresses obtained.
摘要:
A method for addressing a client device, wherein a unique identification code, such as a serial number or an International Mobile Equipment Identity code of a mobile device, is attached to the device name. The unique identification code can be used as a part of the name or attached to the name by using additional information field in a name record that is stored on the name server. The rest of the name may be service dependent for allowing an easy automatic generation of the names for providing services, such as automatic updates, to client devices.
摘要:
A method for addressing a client device, wherein a unique identification code, such as a serial number or an International Mobile Equipment Identity code of a mobile device, is attached to the device name. The unique identification code can be used as a part of the name or attached to the name by using additional information field in a name record that is stored on the name server. The rest of the name may be service dependent for allowing an easy automatic generation of the names for providing services, such as automatic updates, to client devices.
摘要:
A communication network for providing seamless peer-to-peer connectivity between nodes of different communication network environments, the communication network comprising at least one tunneling server comprising an access unit for providing access to the communication network and an addressing unit for assigning a dynamic address of a first addressing scheme routable in the communication network to a node connecting itself to the tunneling server, the node having a fixed address of a second addressing scheme, and storing at runtime an association between the fixed address of the second addressing scheme and the dynamic address of the first addressing scheme.
摘要:
A system and method is disclosed for allowing content providers to protect against widespread copying of their content, while enabling them to give their customers more freedom in the way they use the content. In accordance with one embodiment, content providers identify their content as protected by watermarking the content. Consumers use compliant devices to access protected content. All of a user's compliant devices, or all of a family's devices, can be organized into an authorized domain. This authorized domain is used by content providers to create a logical boundary in which they can allow users increased freedom to use their content.
摘要:
A system and method is disclosed for allowing content providers to protect against widespread copying of their content, while enabling them to give their customers more freedom in the way they use the content. In accordance with one embodiment, content providers identify their content as protected by watermarking the content. Consumers use compliant devices to access protected content. All of a user's compliant devices, or all of a family's devices, can be organized into an authorized domain. This authorized domain is used by content providers to create a logical boundary in which they can allow users increased freedom to use their content.
摘要:
Local discovery of mobile network services involves coupling a communications device to a local network segment of a mobile data network. An announcement is sent from the communication device and/or a network entity (such as a network proxy) describing a service available via the respective devices. The announcement is receivable by any device on the local network segment. A request is received at the device for a detailed description of the service information in response to the announcement. A description of the service is sent from the communications device to the originator of the request in response to the request, and the service is established between the originator and the communication device and/or network entity in response to the sending of the description of the service
摘要:
A system and method is disclosed for allowing content providers to protect against widespread copying of their content, while enabling them to give their customers more freedom in the way they use the content. In accordance with one embodiment, content providers identify their content as protected by watermarking the content. Consumers use compliant devices to access protected content. All of a user's compliant devices, or all of a family's devices, can be organized into an authorized domain. This authorized domain is used by content providers to create a logical boundary in which they can allow users increased freedom to use their content.