摘要:
A computing system, method and product comprising a server, a mobile device comprising a client interconnected with the server via a data network, the client identified by a credential which is unavailable to the client and an intermediate node interconnected to the client and the server via the data network wherein the credential is available to the intermediate node. Upon reception of a service request from the client at a first server address the server redirects the client to transmit the service request to a second server address via the intermediate node together with a token, wherein the intermediate node appends a credential identifying the client to the redirected service request and the token and relays the redirected service request, the token and the credential to the second server address.
摘要:
A computing system, method and product comprising a server, a mobile device comprising a client interconnected with the server via a data network, the client identified by a credential which is unavailable to the client and an intermediate node interconnected to the client and the server via the data network wherein the credential is available to the intermediate node. Upon reception of a service request from the client at a first server address the server redirects the client to transmit the service request to a second server address via the intermediate node together with a token, wherein the intermediate node appends a credential identifying the client to the redirected service request and the token and relays the redirected service request, the token and the credential to the second server address.
摘要:
There is disclosed a system and method for choosing between different Communication Initiation Request (CIR) channels in a mobile communications system when there are multiple CIR channels amongst which to choose. Additionally, there is disclosed a system and method for exploiting a Transmission Control Protocol (TCP) connection usage pattern that is characterized by periods of inactivity.
摘要:
There is disclosed a system and method for choosing between different Communication Initiation Request (CIR) channels in a mobile communications system when there are multiple CIR channels amongst which to choose. Additionally, there is disclosed a system and method for exploiting a Transmission Control Protocol (TCP) connection usage pattern that is characterized by periods of inactivity.
摘要:
A method for concealing and revealing sensitive data on an electronic communications device is disclosed. The electronic communications device comprises a plurality of keys, a display upon which a series of characters are adapted to be displayed, the series of characters forming a character string and composed by input operation of a subset of the plurality of Keys, and a processor for implementing at least one module that includes at least one security component. The module i) receives the series of characters during an entry period, the series of characters forming a character string, the entry period comprised of at least one activity period during which the character string is displayed and one inactivity period during which the character string is obscured, ii) detects an inactivity event during the at least one activity period, the activity period ending when the inactivity event has been detected and iii) detects an activity event during the at least one inactivity period, the inactivity period ending when the activity event has been detected. The module may also iv) detect a completion of composition event, the entry period ending when the composition completion event has been detected and v) conceal permanently the character string after the entry period ends.
摘要:
In an instant messaging system, message latency is reduced by initiating traffic channel set-up at a receiving device concurrently while a sending device is generating the instant message. When a user begins generating an instant message, the sending device transmits a service request to a payload and connection server to indicate that an instant message is pending. Upon receipt of the service request, the payload and connection server notifies the receiving device so that the receiving device can initiate traffic channel set-up concurrently while the instant message is being recorded. When the traffic channel is established, the receiving device polls the server. If the instant message is not yet received by the payload and connection server when the polling request is received, the payload and connection server waits a predetermined period of time to receive the pending instant message and forwards the instant message when it is received.
摘要:
An approach is provided for integrating applications on demand to display and manipulate a semantic resource. An integrating application causes, at least in part, reception of a request for a semantic resource, and determines whether the semantic resource is known to a first application. The integrating application discovers one or more properties of the semantic resource based, at least in part, on the determination. The integrating application identifies a second application associated with the semantic resource based, at least in part, on the one or more properties. The integrating application causes, at least in part, presentation of the semantic resource through the second application.
摘要:
An approach is provided for integrating applications on demand to display and manipulate a semantic resource. An integrating application causes, at least in part, reception of a request for a semantic resource, and determines whether the semantic resource is known to a first application. The integrating application discovers one or more properties of the semantic resource based, at least in part, on the determination. The integrating application identifies a second application associated with the semantic resource based, at least in part, on the one or more properties. The integrating application causes, at least in part, presentation of the semantic resource through the second application.
摘要:
In an instant messaging system, message latency is reduced by initiating traffic channel set-up at a receiving device concurrently while a sending device is generating the instant message. When a user begins generating an instant message, the sending device transmits a service request to a payload and connection server to indicate that an instant message is pending. Upon receipt of the service request, the payload and connection server notifies the receiving device so that the receiving device can initiate traffic channel set-up concurrently while the instant message is being recorded. When the traffic channel is established, the receiving device polls the server. If the instant message is not yet received by the payload and connection server when the polling request is received, the payload and connection server waits a predetermined period of time to receive the pending instant message and forwards the instant message when it is received.
摘要:
A method for concealing and revealing sensitive data on an electronic communications device is disclosed. The electronic communications device comprises a plurality of keys, a display upon which a series of characters are adapted to be displayed, the series of characters forming a character string and composed by input operation of a subset of the plurality of Keys, and a processor for implementing at least one module that includes at least one security component. The module i) receives the series of characters during an entry period, the series of characters forming a character string, the entry period comprised of at least one activity period during which the character string is displayed and one inactivity period during which the character string is obscured, ii) detects an inactivity event during the at least one activity period, the activity period ending when the inactivity event has been detected and iii) detects an activity event during the at least one inactivity period, the inactivity period ending when the activity event has been detected. The module may also iv) detect a completion of composition event, the entry period ending when the composition completion event has been detected and v) conceal permanently the character string after the entry period ends.