Abstract:
A method may include sending personal network connection information from a mobile device to a guest device; sending authentication credentials from the mobile device to the guest device; receiving the authentication credentials in the personal network from the guest device; authenticating the guest device based on the authentication credentials; and granting access to the guest device to content stored in the personal network for a guest session.
Abstract:
A portable communication device, for example a mobile telephone, imports non-address information from a contact for use in communicating with the contact and/or planning or scheduling a calendar of one or more events, activities or the like. The non-address information may be imported to a local calendar in the portable communication device, and after use the information may be deleted to avoid polluting the local calendar. A method of importing information to a local calendar for use and deleting the information after it is not needed.
Abstract:
The present invention is directed to a method for demonstrating an electronic device, said device is adapted for wireless cellular network connection, comprising a real demo step for executing applications of said electronic device, said applications do not requiring to identify and/or connect to said wireless cellular network connection. The present invention is further directed to a corresponding device adapted for wireless cellular network connection.
Abstract:
A mobile communications device includes a fingerprint scanner for generating a scanned fingerprint output data responsive to a scanned fingerprint. The scanned fingerprint output is compared to a reference fingerprint pattern such that a code memo application containing a plurality of data entries each having an associated identifier may be temporarily accessed during a selected period of time if the scanned fingerprint output data matches the reference fingerprint pattern. During the selected period, one of the plurality of data entries may be selected and inserted into a dialog.
Abstract:
Digital living network alliance (DLNA) enabled portable electronic devices are provided that include a DLNA device circuit and a DLNA management console circuit. The DLNA device circuit is configured to attach the portable electronic device to an existing DLNA network having at least one existing DLNA management console so as to allow the portable electronic device to be a source for data on the existing DLNA network. The DLNA management console circuit is configured to enable the portable electronic device to operate as a portable management console for the existing and/or a new DLNA network. Related management consoles and methods of operating DLNA enabled portable electronic devices are also provided.
Abstract:
Methods, portable electronic devices and servers are provided for downloading applications to a portable electronic device from a server based presence of a certain number of portable electronic devices having a common element in a defined region at a same time. The at least one application or event is stored at the server. The at least one application or event is associated with portable electronic devices having a common element. Current position information is received from the portable electronic devices having the common element. At least one of the at least one stored applications or events is downloaded from the server to the portable electronic devices if the certain number of the portable electronic devices having the common element are within the defined region at the same time
Abstract:
A system receives a request (150) to access a secure resource and a verification telephone number from a first device (130), establishes a secure session with a second device (110) associated with the verification telephone number, requests an authentication mechanism (170) from the second device to verify the secure resource request, verifies the received authentication mechanism if the requested authentication mechanism is received (180) from the second device, and determines whether to grant or deny (190) the first device access to the secure resource based on the verification of the received authentication mechanism.
Abstract:
A method for partitioning physical transmission resources of a physical network is provided. At first, a set of logical networks is established on top of the physical network. The logical networks comprise nodes and logical links extending between the nodes so as to form the logical networks. The logical links are used by routes. Next, the capacities of the logical links of the logical networks are determined such that the route blocking probability on each individual route in each one of the logical networks is less than or equal to a maximum allowed blocking probability, given for each individual route. This is realized by distributing, for each individual route, the route blocking evenly among the logical links used by the individual route. Finally, the physical transmission resources are allocated among the logical links of the logical networks according to the determination. In addition, a device for partitioning physical transmission resources of a physical network is also disclosed.
Abstract:
A resource model for modelling the resources of a telecommunication network that uses a number of different switching technologies. The resource model comprises three layers, a network layer (13), a node layer (14) and a component layer (15), each layer comprising resource objects (10, 11, 12). The resource objects of the network layer are encapsulated to applications (PSTN, B-ISDN) which use the network. The resource objects of the node layer are encapsulated to the resource objects of the network layer and the resource objects at the component layer are encapsulated to the resource objects of the node layer. The resource model comprises connection handling function (18, 19, 20A-C) for setting up connections in the telecommunication network. The functions are divided into function components. Function components (18) at the network layer operate on resource objects at the network layer only, function components (19) at the node layer operate on resource objects at the node layer only and function components (20A-C) at the component layer operate on resource objects at the component layer.
Abstract:
A device may receive personal data that is collected at a client device, obtain a network address of a media device from the client device, send the network address to an advertisement device, and send the personal data to the advertisement device. The advertisement device may retrieve advertisements based on the personal data and send the retrieved advertisements to the media device.