摘要:
A method by which one node can search for and retrieve information from another node. A message identifying the sought-for information item and an address is created at a first node. The address identifies a repository for the sought-for information. A second node receives the contents of this message and responds with the information item if the item is available. Otherwise, the second node propagates the message to other nodes. The message is propagated from node to node until it reaches a node having the sought-for information item. If this node can connect to the specified address, it sends the information item to the repository. Otherwise, the node adds the information item to the message, which is propagated to other nodes until the message reaches a node that can connect with the address. The information item can then be retrieved from the repository.
摘要:
A system for providing information about physical entities to users includes an information server accessible to a plurality of user-held receivers. An exemplary server has access to characteristic accessibility data for candidate physical entities. The server receives a user's request for information about physical entities of interest (which may be mobile), including the user's search domain relative to the user's location (the user may also be mobile). The search domain does not necessarily require the user to provide a network address of, or perform a keyword search for the networked data pages of, the physical entities of interest. The server determines which (if any) of said candidate physical entities satisfy the request, and reports to the user at the receiver over an electronic network.
摘要:
A method and system for providing secure communications between a first and second peer device is disclosed. The invention includes allowing the first and second peer devices to verify the authenticity of each other only while each peer device is within an established zone of privacy wherein the established zone of privacy is an area close (for example, almost touching) to the peer device. Because the authenticity of the other device is verified only while each peer device is within the established zone of privacy, users can visually confirm that there are no potential interlopers within the zone. As a result, the two peer devices can discover each other in a more secure fashion The method and system include creating a zone of privacy with the first peer device, allowing the first and second peer devices to verify the authenticity of each other only while the second peer device is within the zone of privacy, and allowing encrypted data to transfer between the first and second peer device once the authenticity of each peer device has been verified.