Abstract:
The functionality of portable wireless devices can be changed by providing programs written in a language, e.g. Java, producing a verifiable intermediary code (byte code). The intermediary code is translated to machine code in a node in the network before it is transferred to the wireless device on which it is to be executed. Several machine code variants of each program, translated using translators for different types of terminals, may exist. This enables use of the same source code for different terminal types and a division between software vendor, terminal vendor and network operator of the responsibility for carrying out the different functions involved in changing the functionality of a device, namely developing the source code of the program, compiling the source code into byte code, translating the byte code into machine code and transferring the machine code to the terminals on which it is to be run.
Abstract:
A result e-mail (e1) is produced from a received secure e-mail (e) by decrypting (21) the body portion (18) of the received e-mail (e), and providing unencrypted header information (Hu'(16)) from the body portion (18) of the received e-mail (e) in the header portion (Hu(16)) of the received e-mail (e), thereby producing a header portion (Hu(16)) of the result e-mail (e1). The body portion (18) of the received e-mail (e) can then be encrypted (25), thereby producing a body portion (18) of the result e-mail (e1). The result e-mail (e1) can then be used by an e-mail client (5) for summarizing (17A), searching (17D), threading (17B), sorting (17C), etc. Also, encrypted header information (HE(16A)) can be provided in the header portion (16) of a secure e-mail (e), and the header portion (16) can be transmitted, without its corresponding body portion (18), over an air interface to a destination. The encrypted header information can be decrypted (17E) at the destination, and used to decide whether the body portion (18) should be transmitted. In any event, the decrypted header information (Hu(16)) can be used for the aforementioned e-mail client operations.
Abstract:
The invention relates to the establishment of a wireless connection between two communication devices. Registration/authorisation data (530) must be exchanged between the devices before the devices can be connected to each other. This information exchange is initiated by bringing the devices in such physical proximity to each other (520) that a signal transmitted from at least one of the devices is received by the other device at a power level which exceeds a threshold level. The threshold level is chosen to a value being significantly higher than a minimally required power level for signal detection (500) in order to make sure that the devices are located very close to each other and thus enable an unambiguous association between them.
Abstract:
The distance between the user of an electronic device (for example, a mobile telephone) at point A and a target destination at point H, is determined using a network of electronic devices (C to G), each provided with short range radio communication means. The method comprises transferring data packets from one device to the next from point A to a transceiver 210 located at point H, then determining the number of 'hops' of the signal, each hop defining a distance value, and summing the distance values to obtain an estimated value of the total distance between the points. The method may be repeated using different routes, with either a mean value or the smallest value being used as the distance determination. The network of devices may comprise static beacons or mobile devices. The method may be used to provide a low-cost system which can be used indoors, and may be particularly useful as a tool for blind or visually impaired people moving around unfamiliar locations.
Abstract:
The functionality of portable wireless devices can be changed by providing programs written in a language, e.g. Java, producing a verifiable intermediary code (byte code). The intermediary code is translated to machine code in a node in the network before it is transferred to the wireless device on which it is to be executed. Several machine code variants of each program, translated using translators for different types of terminals, may exist. This enables use of the same source code for different terminal types and a division between software vendor, terminal vendor and network operator of the responsibility for carrying out the different functions involved in changing the functionality of a device, namely developing the source code of the program, compiling the source code into byte code, translating the byte code into machine code and transferring the machine code to the terminals on which it is to be run.
Abstract:
The invention relates to the organization of electronic messages (101) coming in to a user who can access his/her messages via at least two different types of access environments (130-165). A first storage area (100) receives the electronic messages (101), which each has an original data format. The electronic messages (101) are then stored according to a first structure (102). An agent (110) processes the electronic messages (101) into at least one set of processed electronic messages (113a-113c) having data formats, which are at least as adapted to an alternative access environment as the data formats of the corresponding original electronic messages. The processed electronic messages (113a-113c) are then stored according to at least one second structure (121a-121c) that is a mapping of the first structure (102). The user may either access an original electronic message (101) in the first structure (102) or one of the processed electronic messages (113a-113c) in the at least one second structure (121a-121c). The choice of message version is based on the type of access environment (130-165) that the user currently has at his/her disposal.
Abstract:
The functionality of portable wireless devices can be changed by providing programs written in a language, e.g. Java, producing a verifiable intermediary code (byte code). The intermediary code is translated to machine code in a node in the network before it is transferred to the wireless device on which it is to be executed. Several machine code variants of each program, translated using translators for different types of terminals, may exist. This enables use of the same source code for different terminal types and a division between software vendor, terminal vendor and network operator of the responsibility for carrying out the different functions involved in changing the functionality of a device, namely developing the source code of the program, compiling the source code into byte code, translating the byte code into machine code and transferring the machine code to the terminals on which it is to be run.
Abstract:
The functionality of portable wireless devices can be changed by providing programs written in a language, e.g. Java, producing a verifiable intermediary code (byte code). The intermediary code is translated to machine code in a node in the network before it is transferred to the wireless device on which it is to be executed. Several machine code variants of each program, translated using translators for different types of terminals, may exist. This enables use of the same source code for different terminal types and a division between software vendor, terminal vendor and network operator of the responsibility for carrying out the different functions involved in changing the functionality of a device, namely developing the source code of the program, compiling the source code into byte code, translating the byte code into machine code and transferring the machine code to the terminals on which it is to be run.
Abstract:
The distance between the user of an electronic device (for example, a mobile telephone) at point A and a target destination at point H, is determined using a network of electronic devices (C to G), each provided with short range radio communication means. The method comprises transferring data packets from one device to the next from point A to a transceiver 210 located at point H, then determining the number of 'hops' of the signal, each hop defining a distance value, and summing the distance values to obtain an estimated value of the total distance between the points. The method may be repeated using different routes, with either a mean value or the smallest value being used as the distance determination. The network of devices may comprise static beacons or mobile devices. The method may be used to provide a low-cost system which can be used indoors, and may be particularly useful as a tool for blind or visually impaired people moving around unfamiliar locations.