摘要:
Methods and associated wireless communication terminals are disclosed that control the display of avatars on communication terminals. A person's portrait characteristics are identified in a video stream from a video source. A portrait command is selected among a plurality of portrait commands that are known to the recipient communication terminal in response to the identified person's portrait characteristics in the video stream. The selected portrait command is transmitted to a recipient communication terminal. The recipient communication terminal can then modify a displayed avatar in response to received portrait command.
摘要:
Methods and associated wireless communication terminals are disclosed that control the display of avatars on communication terminals. A person's portrait characteristics are identified in a video stream from a video source. A portrait command is selected among a plurality of portrait commands that are known to the recipient communication terminal in response to the identified person's portrait characteristics in the video stream. The selected portrait command is transmitted to a recipient communication terminal. The recipient communication terminal can then modify a displayed avatar in response to received portrait command.
摘要:
A method of operating a mobile terminal to establish a data communication connection with an electronic device includes receiving a message from the electronic device via a wireless wide-area network. The message includes Internet Protocol (IP) connection information for establishing the data communication connection with the electronic device. For example, the message may be an SMS message, and the IP connection information may include an IP address and/or port number associated with the electronic device. The data communication connection is established with the electronic device responsive to receiving the message and based on the IP connection information included in the message. Related methods, devices, and computer program products are also discussed.
摘要:
A method for establishing an authenticated network connection in a packet-switched network with an electronic equipment, the method including transmitting a request from an electronic equipment through a packet-switched network connection to an authentication server. The authentication server generates a first unique identifier and transmits the first unique identifier to the electronic equipment through the packet-switched network connection. The electronic then transmits a message from the electronic equipment to a short message service (SMS) server through a circuit-switched network connection, wherein the message includes the first unique identifier and a second unique identifier (e.g., a telephone number of the electronic device). The message is routed to the authentication server and authenticated. After authentication, the electronic equipment may utilize a packet-switched connection for a variety of communication services (e.g., chat sessions, voice over Internet Protocol) with other authenticated electronic equipment.
摘要:
The present invention relates to a method in a first communications device for sharing an application with a second communication device. The method comprises the steps of: Sending a first short message service (SMS) to the second device. The first SMS comprises a link to a place from where the application can be downloaded into the second device. The first SMS comprises an identity for the second device to use for initiating an IP connection between the first device and the second device and the second device. The method comprises the further step of being connected by the second device for setting up an IP connection between the first device and the second device. The method comprises the further step of communicating with the second device in an IP connection sharing the application.
摘要:
The present invention relates to a method in a first communications device for sharing an application with a second communication device. The method comprises the steps of: Sending a first short message service (SMS) to the second device. The first SMS comprises a link to a place from where the application can be downloaded into the second device. The first SMS comprises an identity for the second device to use for initiating an IP connection between the first device and the second device and the second device. The method comprises the further step of being connected by the second device for setting up an IP connection between the first device and the second device. The method comprises the further step of communicating with the second device in an IP connection sharing the application.
摘要:
The present invention relates to a method in a first communications device for sharing an application with a second communication device. The method comprises the steps of: Sending a first short message service (SMS) to the second device. The first SMS comprises a link to a place from where the application can be downloaded into the second device. The first SMS comprises an identity for the second device to use for initiating an IP connection between the first device and the second device and the second device. The method comprises the further step of being connected by the second device for setting up an IP connection between the first device and the second device. The method comprises the further step of communicating with the second device in an IP connection sharing the application.
摘要:
The present invention provides a system and method for establishing security credentials for using an Internet or other network application requiring user authentication. In an exemplary embodiment, a user electronic device may connect to an application server to initiate use of the application. The application server may respond by transmitting to the user electronic device session identification information (a Session ID). The user electronic device may then transmit an SMS message containing the Session ID back to the application server, which permits the application server to link to the user electronic device. The application server may generate for the user encrypted security credentials and transmit an encryption key for them to the user electronic device in a response SMS message. In a separate message, the security credentials are transmitted to the user. In this manner, only the legitimate user electronic device has both the encryption key and the encrypted security credentials. The user electronic device may then decrypt the security credentials using the encryption key, and use the security credentials to access the network application.
摘要:
A method of operating a mobile terminal to establish a data communication connection with an electronic device includes receiving a message from the electronic device via a wireless wide-area network. The message includes Internet Protocol (IP) connection information for establishing the data communication connection with the electronic device. For example, the message may be an SMS message, and the IP connection information may include an IP address and/or port number associated with the electronic device. The data communication connection is established with the electronic device responsive to receiving the message and based on the IP connection information included in the message. Related methods, devices, and computer program products are also discussed.
摘要:
A method for establishing an authenticated network connection in a packet-switched network with an electronic equipment, the method including transmitting a request from an electronic equipment through a packet-switched network connection to an authentication server. The authentication server generates a first unique identifier and transmits the first unique identifier to the electronic equipment through the packet-switched network connection. The electronic then transmits a message from the electronic equipment to a short message service (SMS) server through a circuit-switched network connection, wherein the message includes the first unique identifier and a second unique identifier (e.g., a telephone number of the electronic device). The message is routed to the authentication server and authenticated. After authentication, the electronic equipment may utilize a packet-switched connection for a variety of communication services (e.g., chat sessions, voice over Internet Protocol) with other authenticated electronic equipment.