Abstract:
A method for managing an electronic device configured to communicate with at least one user terminal and with at least one server. The method is implemented by the server and includes: receiving, from the electronic device, a request to identify at least one user terminal for managing the electronic device; and transmitting, to the at least one identified user terminal, a notification request allowing a managing application on the at least one identified user terminal to be activated.
Abstract:
A method for recovering a network key of an access point to a network, implemented by a terminal. The network key allows the terminal to be associated with the access point upon a first connection of the terminal to the access point. The network key recovery method includes: receiving, by the terminal, a network key provided by the access point on a server following a request, by the terminal to the server, for the network key of the access point, the request including an identifier of the access point and having been relayed by the server to the access point associated with the identifier of the access point in the request. Thus, as the access point does not transmit the network key directly to the terminal, but to a server on which the terminal will recover it, this limits intrusions into the network linked to the vulnerability of the Wi-Fi network.
Abstract:
One embodiment relates to a method of transferring configuration information for a connected object wherein the method is performed by a terminal. The method may comprise detecting a connection of a mass memory on a peripheral connector of the terminal, associating the detected mass memory with at least one item of configuration information for the connected object, obtaining the at least one item of configuration information, and transferring the at least one item of configuration information to the mass memory.
Abstract:
A method for recovering a network key, a method for transmitting a network key, and a method for managing recovery of a network key. The method for recovering a network key from a point of access to a network is implemented by a terminal, with the network key allowing the terminal to be associated with the point of access during the first connection of the terminal to the point of access. The recovery method includes receiving, by a terminal, a network key transmitted via a mediation server by a point of access, the terminal having been identified by the mediation server by using an association, prior to the first connection, of an identifier of the terminal and an identifier of the point of access. Thus, the key cannot be easily recovered by a third party and limits intrusions into the private network managed by the point of access.
Abstract:
A command code management method, implemented by a command code management device. The method includes transmitting a command signal to a second terminal that has been associated with a first terminal from which a command code, on which the command signal is based, is received, the command code having been received by the first terminal prior to the transmission and after the association of the first terminal and second terminal. The command codes are thus able to be used more widely, that is to say in particular by terminals not equipped with a reading device such as connected objects, or terminals not equipped with a reproduction device.
Abstract:
A method for recovering a network key of an access point to a network, implemented by a terminal. The network key allows the terminal to be associated with the access point upon a first connection of the terminal to the access point. The network key recovery method includes: receiving, by the terminal, a network key provided by the access point on a server following a request, by the terminal to the server, for the network key of the access point, the request including an identifier of the access point and having been relayed by the server to the access point associated with the identifier of the access point in the request. Thus, as the access point does not transmit the network key directly to the terminal, but to a server on which the terminal will recover it, this limits intrusions into the network linked to the vulnerability of the Wi-Fi network.
Abstract:
A device and a method for storing and sharing data from objects connected to an Internet network, and a method for restoring data coming from objects connected to an Internet network. A storage and sharing device is implemented in the network and enables a control device connected to the network to browse among the stored data and to command reading of a selected item of data in the data storage and sharing device by a restoring device connected to network. The data storage and sharing device includes interfaces for loading data, each interface receiving data from at least one object connected to the Internet network. Hence, a communication terminal can access, by using a single device, data coming from all of the connected objects thereof even when these objects use different communication protocols and/or when the communication terminal does not use the communication protocol of the connected object.
Abstract:
A method and apparatus are provided for synchronizing between rendering of a multimedia stream by a rendering device and execution of an operation by a software application by at least one execution device. The method includes in the rendering device: receiving the multimedia stream comprising pieces of additional data synchronized with a multimedia item; detecting, in the multimedia stream, an item of destination information indicating that the pieces of additional data are intended for a distinct execution device; extracting the pieces of additional data; transmitting the pieces of additional data to the execution device; triggering the execution, by a software application, of an operation to process the transmitted additional data; and rendering the multimedia item.
Abstract:
A method for transmitting and a method for processing data relating to a contactless transaction between a mobile terminal and an apparatus. The apparatus is capable of transmitting and receiving data via a contactless near-field communication channel. The transmission method includes: receiving first transaction data via the communication channel; transmitting the first transaction data via a communication link established with the mobile terminal; receiving, via the communication link, second transaction data generated by the mobile terminal; and transmitting the second data via the communication channel. The processing method includes receiving the first data and transmitting the second data via the communication link. A portable device and mobile terminal implementing the transmission method and the processing method are also provided.
Abstract:
One embodiment comprises obtaining an identification of at least one multimedia content and at least one destination user; constructing a message by a challenge definition module installed on a terminal on the basis of at least one interaction with a sender user. The construction may comprise (a) producing metadata defining, in association with the multimedia content, both a challenge for presenting to the destination user and also an expected response to the challenge, the metadata combining the information required for executing the challenge on at least one terminal of the destination user; (b) inserting the metadata and an identifier in the message, the identifier identifying the terminal of the destination user of the message; and (c) using a telecommunications network to send the message and data giving access to the multimedia content to a server for relaying the metadata and the multimedia content to the terminal of the destination user.