摘要:
A method comprising the use of a bootstrapping protocol to define a security relationship between a first server and a second server, the first and second servers co-operating to provide a service to a user terminal. A bootstrapping protocol is used to generate a shared key for securing communication between the first server and the second server. The shared key is based on a context of the bootstrapping protocol, and the context is associated with a Subscriber Identity Module (SIM) associated with the user terminal and provides a base for the shared key. A method of the invention may, for example, be employed within a computing/service network such as a “cloud”, and in particular for communications between two servers in the cloud that are co-operating to provide a service to a user.
摘要:
A method comprising the use of a bootstrapping protocol to define a security relationship between a first server and a second server, the first and second servers co-operating to provide a service to a user terminal. A bootstrapping protocol is used to generate a shared key for securing communication between the first server and the second server. The shared key is based on a context of the bootstrapping protocol, and the context is associated with a Subscriber Identity Module (SIM) associated with the user terminal and provides a base for the shared key. A method of the invention may, for example, be employed within a computing/service network such as a “cloud”, and in particular for communications between two servers in the cloud that are co-operating to provide a service to a user.
摘要:
This disclosure relates to a portable communication device and a network-side authorization server, and to methods therein. By splitting the functionality of an OAuth authorization server and moving the authorization endpoint into, for instance a mobile phone, an authorization server within the mobile phone is provided. This mobile phone authorization server does not need to communicate with the network-side for getting an authorization code or an access token.
摘要:
Rather than forcing users to give personally identifying contact data to information providers, this disclosure teaches an apparatus and method enabling the use of “private tokens,” which allow information providers to send electronic communications to targeted users without having access to personally identifying contact information. These features are provided by an anonymous communication service that manages the private tokens and provides communication proxy services intermediating the electronic communications between the information providers and the users targeted by those communications.
摘要:
Rather than forcing users to give personally identifying contact data to information providers, this disclosure teaches an apparatus and method enabling the use of “private tokens,” which allow information providers to send electronic communications to targeted users without having access to personally identifying contact information. These features are provided by an anonymous communication service that manages the private tokens and provides communication proxy services intermediating the electronic communications between the information providers and the users targeted by those communications.
摘要:
This disclosure relates to a portable communication device and a network-side authorization server, and to methods therein. By splitting the functionality of an OAuth authorization server and moving the authorization endpoint into, for instance a mobile phone, an authorization server within the mobile phone is provided. This mobile phone authorization server does not need to communicate with the network-side for getting an authorization code or an access token.
摘要:
A method and arrangement for handling incoming requests for multimedia services in an application server having a plurality of processors. A service request is received from a user, requiring the handling of user-specific data. The identity of the user or other consistent user-related parameter is extracted from the received service request. Then, a scheduling algorithm is applied using the extracted identity or other user-related parameter as input, for selecting a processor associated with the user and that stores user-specific data for the user locally. Thereafter, the service request is transferred to the selected processor in order to be processed by handling the user-specific data.
摘要:
A publishing method is disclosed, which process enables a publisher to publish in a simple and easy manner a set of content that includes both public content and private content. In some embodiments, this advantageous solution is achieved by implementing a multi-step publishing process. In one step, the publisher publishes a feed that contains: (1) the public content and (2) information advertising the existence of the private content and the scope of the private content. In another step, the publisher stores the private content on a server accessible to the authorized entities.
摘要:
A system and method for enabling communication with one or more mobile communication devices. In one aspect, one or more mobile communication devices use an authenticated web identification to obtain a Uniform Resource Locator (URL) which is associated with the mobile communication device(s). The URL may be used to enable communication between the mobile communication device(s) and an application service via the Internet.
摘要:
A method and system for facilitating a secure monetary transaction by using a mobile communication device. In one aspect, the present invention provides a convenient and secure mechanism for conducting a monetary transaction by using OpenID, Open Authorization, and information residing on the SIM token of the mobile device to facilitate the transaction.