Abstract:
A decoder for decoding a target image from a signal. The signal includes S facsimile encoded sub-image messages transmitted in a predetermined order. The decoder also stores a runlength code book. The decoder includes a facsimile decoder (910), a sub-image memory (920), a target image generator (940), and a target image memory (930). The facsimile decoder (910) is for generating S sub-images from the S facsimile encoded sub-image messages, using the runlength code book. Each of the S sub-images includes sub-image lines including pixels. The sub-image memory (920) is for storing the S sub-images. The target image generator (940) is for re-assembling the target image from the S sub-images. The target image memory (930) is for storing the target image.
Abstract:
A method (100) and an apparatus (210) for providing enhanced security using service provider authentication. In addition to authenticating an application signature (245) against a root certificate (235) stored on the network node (210), a first carrier identification (250) associated with the application (240) is compared to a second carrier identification (255). If the first and second carrier identifications match, then the application can be assigned to a trusted protection domain and granted permissions which provide privileged access to the network node. For example, the application can be granted permission to be installed and/or executed on the network node. Otherwise the application can be denied privileged access. Accordingly, a carrier's applications will be only installed onto network nodes that are intended recipients of the applications.
Abstract:
Methods (400,500) and devices (200) are provided for automatically setting the communications mode of a wireless device (200) based upon stored data defining the geographic coverage regions (102, 104, 106, 108) of a number or communications systems. In one method, there is received from a coverage server (226) data describing a plurality of geographic regions and any communications modes available in each of the geographic regions. A present geographic location of the wireless communications device is determined, and the geographic region that contains the present geographic location is determined as a current region. The communications mode of the wireless communications device is set based upon the data describing the current region that is stored in the wireless communications device. Thus, the data can be centrally managed and updated at the coverage server. In preferred embodiments, the data includes many communications modes, including cellular and Wireless LAN modes.
Abstract:
A decoder for decoding a target image from a signal. The signal includes S facsimile encoded sub-image messages transmitted in a predetermined order. The decoder also stores a runlength code book. The decoder includes a facsimile decoder (910), a sub-image memory (920), a target image generator (940), and a target image memory (930). The facsimile decoder (910) is for generating S sub-images from the S facsimile encoded sub-image messages, using the runlength code book. Each of the S sub-images includes sub-image lines including pixels. The sub-image memory (920) is for storing the S sub-images. The target image generator (940) is for re-assembling the target image from the S sub-images. The target image memory (930) is for storing the target image.
Abstract:
According to the invention cellular telephones or other communications devices (102) may intercept requests (114) by applications (104), for instance applications received via over-the-air programming (OAP), to access sensitive device-specific data (110). That device-specific data (110) may include hardware identifiers such as IMEI or other serial or subscriber identification values, personalized settings such as phone books, contact lists, messaging or other information. The requests (114) by applications (104) for access to that type of data may be intercepted, for instance, by an application programming interface (106) executing on the communications device (102). The application programming interface (106) may communication the request (114), along with information identifying the requesting application, to a remote authorization server (118). The facility may compare the application identifier or other information against a list or table of applications authorized (120) to access device-specific data (110). A grant, denial, deferral or other determination may be communicated back to the device, to permit or deny access accordingly. The routing of requests (114) for such data to a remote host server (118) may, for example, prevent the accessing or corruption of sensitive data by viruses, rogue applications or other types of wireless intrusions.
Abstract:
A shared library architecture (iJDL) for sharing libraries among applications (FIG. 2). The iJDLs can be added, removed updated or directly retrieved from the network, and are fully configurable to maximize the usage of limited flash memory space. The iJDL model conforms to the standrd sandbox security model defined by the MIDP 1.0 specification. A Java Application Manager (JAM) also may be provided to alert the user of any update to shared libraries available on the network. For security, iJDL can be authenticated such that only authorized vendors are allowed to use it.
Abstract:
A method and apparatus controls zone registrations in a radio communication system providing radio coverage to a portable subscriber unit (122, 1200) within a plurality of zones (402). A fixed portion (102) of the radio communication system cooperates with the portable subscriber unit (122, 1200) to adjust at least one registration variable in a memory of the portable subscriber unit (122, 1200) for moderating the zone registrations. The portable subscriber unit (122, 1200) then moderates the zone registrations to a limited number in accordance with the at least one registration variable.
Abstract:
A method of conducting transactions in a wireless electronic commerce system, where the system comprises a wireless network operator certification authority (15) having a root public key certificate and at least one attribute authority (404, 405, 406) having a digital certificate that is dependent from the root public key certificate. The attribute authority is accessible by a wireless client device (11) via a wireless network. The digital certificate is delivered from the attribute authority to the wireless device, the attribute authority is verified to the wireless client device using the digital certificate and the root public key certificate preloaded in the wireless client device under authority of the wireless network operator. An attribute (software, service, right/permission or other content item) is delivered to the wireless client device over the wireless network and ultimately enabled at the wireless client device.
Abstract:
A method and apparatus prioritize communications in a two-way communication system (102, 104) serving portable subscriber units (122) in a coverage area (500). A fixed portion (102) of the two-way communication system (102, 104) requests (904) location information (824, 224, 826) from a subset of the portable subscriber units (122) in response to having a need to communicate therewith, and then receives (906) the location information (824, 224, 826) from the subset of the portable subscriber units (122). The location information (824, 224, 826) includes mobility index values (826) determined by the subset of the portable subscriber units (122) for indicating mobility of each portable subscriber unit (122). The fixed portion (102) then prioritizes (908) the communications based upon the mobility index values (826).