Abstract:
Networked icon (108) interacts with the electronic device user and uses user input (102), context information (104) and network information (106) to automatically update the icon's representation to the user. Icon (108) is also associated with user profile interaction history information (112), navigation logic (114), multimedia presentations (116), network interfaces (118), etc. in order to provide the user with enhanced interaction with the electronic device the icon (108) is associated with.
Abstract:
An IPC protocol in one embodiment of the invention includes smart hardware ports such as SSI port (1610). The session manager (1608) includes the capability for negotiating with components such as software threads (1602-1606) in order for a port (1610) to be dedicated to a particular task. The port dedication negotiation process allows for the session manager (1608) which is part of IPC stack (1610) to check for any conflicts the port may have with other op-codes currently dedicated to the port. The session manager (1608) can forward a command block along with the data received from each software thread. The command block informs the SSI port (1610) of any co-processing it may need to perform to the data.
Abstract:
A method of wireless communication using a hybrid of a transaction protocol and a connection oriented protocol includes the steps of initiating a wireless request from a portable subscriber to a server using the transaction protocol (106) and continuing communications using the transaction protocol (110) if a response from the server is less than a maximum transfer unit size. If the response from the server is greater than a maximum transfer unit size, then the server segments the response into data packets, wherein the portable subscriber unit and server subsequently communicate using the connection oriented protocol (114) until a subsequent wireless request is made from the portable subscriber.
Abstract:
A method of wireless communication using a hybrid of a transaction protocol and a connection oriented protocol includes the steps of initiating a wireless request from a portable subscriber to a server using the transaction protocol (106) and continuing communications using the transaction protocol (110) if a response from the server is less than a maximum transfer unit size. If the response from the server is greater than a maximum transfer unit size, then the server segments the response into data packets, wherein the portable subscriber unit and server subsequently communicate using the connection oriented protocol (114) until a subsequent wireless request is made from the portable subscriber.
Abstract:
A computing device (102) includes computer instructions for receiving (202) streaming data, delegating (204) portions of the streaming data to a plurality of processes (302-305), detecting (206) that one or more of the processes is affected by an interruption that would inhibit further processing of the portions of streaming data delegated thereto, and rerouting (214) to other available processes the portions of streaming data supplied to the one or more affected processes at a desired quality of service level.
Abstract:
A method (100) and an apparatus (210) for providing enhanced security using service provider authentication. In addition to authenticating an application signature (245) against a root certificate (235) stored on the network node (210), a first carrier identification (250) associated with the application (240) is compared to a second carrier identification (255). If the first and second carrier identifications match, then the application can be assigned to a trusted protection domain and granted permissions which provide privileged access to the network node. For example, the application can be granted permission to be installed and/or executed on the network node. Otherwise the application can be denied privileged access. Accordingly, a carrier's applications will be only installed onto network nodes that are intended recipients of the applications.
Abstract:
A system (20) for controlling user access to a wireless client device (21) can include a receiver (27) and a processor (28). The processor can be programmed to enable access to a permission settings database (23) over-the-air and dynamically modify at least one permission setting for an API (24) that interfaces with an application (25) residing at least partially on the client device. The processor (28) can be programmed to authenticate an authorized administrator remotely, modify a permission setting, add or remove, update, or enable or disable security for a functional group. An enterprise server (21) can be used as the interface for changing the permissions settings remotely. Furthermore, the enterprise server can be connected through an authorization server (22) to provide any required authorization. Of course, the user can also make allowable changes to the permission settings database via a device user interface (26).
Abstract:
Networked icon (108) interacts with the electronic device user and uses user input (102), context information (104) and network information (106) to automatically update the icon's representation to the user. Icon (108) is also associated with user profile interaction history information (112), navigation logic (114), multimedia presentations (116), network interfaces (118), etc. in order to provide the user with enhanced interaction with the electronic device the icon (108) is associated with.
Abstract:
According to the invention cellular telephones or other communications devices (102) may request provisioning of features or services (114) by applications, for instance applications received via over-the-air programming (OAP), via a remote authorization service (120). The requests by applications, such as Java applications, for access to provisioning privileges may be intercepted, for instance, by a native layer (108) executing on the communications device (102). The native layer (108) may communication the provisioning request (114), along with information identifying the requesting application, to a remote authorization server (120). Provisioning requests may be for ring tone, game, long distance or other features or services. The authorization facility may compare the application identifier or other information against a list or table of applications authorized to access device-specific data or perform other authorization. A grant, denial, deferral or other determination may be communicated back to the device, to permit or deny provisioning accordingly.
Abstract:
According to the invention cellular telephones or other communications devices may intercept requests by applications, for instance applications received via over-the-air programming (OAP), to access sensitive device-specific data. That device-specific data may include hardware identifiers such as IMEI or other serial or subscriber identification values, personalized settings such as phone books, contact lists, messaging or other information. The requests by applications for access to that type of data may be intercepted, for instance, by an application programming interface executing on the communications device. The application programming interface may communication the request, along with information identifying the requesting application, to a remote authorization server. That facility may compare the application identifier or other information against a list or table of applications authorized to access device-specific data. A grant, denial, deferral or other determination may be communicated back to the device, to permit or deny access accordingly. The routing of requests for such data to a remote host server may, for example, prevent the accessing or corruption of sensitive data by viruses, rogue applications or other types of wireless intrusions.