Abstract:
The functionality of portable wireless devices can be changed by providing programs written in a language, e.g. Java, producing a verifiable intermediary code (byte code). The intermediary code is translated to machine code in a node in the network before it is transferred to the wireless device on which it is to be executed. Several machine code variants of each program, translated using translators for different types of terminals, may exist. This enables use of the same source code for different terminal types and a division between software vendor, terminal vendor and network operator of the responsibility for carrying out the different functions involved in changing the functionality of a device, namely developing the source code of the program, compiling the source code into byte code, translating the byte code into machine code and transferring the machine code to the terminals on which it is to be run.
Abstract:
A result e-mail (e1) is produced from a received secure e-mail (e) by decrypting (21) the body portion (18) of the received e-mail (e), and providing unencrypted header information (Hu'(16)) from the body portion (18) of the received e-mail (e) in the header portion (Hu(16)) of the received e-mail (e), thereby producing a header portion (Hu(16)) of the result e-mail (e1). The body portion (18) of the received e-mail (e) can then be encrypted (25), thereby producing a body portion (18) of the result e-mail (e1). The result e-mail (e1) can then be used by an e-mail client (5) for summarizing (17A), searching (17D), threading (17B), sorting (17C), etc. Also, encrypted header information (HE(16A)) can be provided in the header portion (16) of a secure e-mail (e), and the header portion (16) can be transmitted, without its corresponding body portion (18), over an air interface to a destination. The encrypted header information can be decrypted (17E) at the destination, and used to decide whether the body portion (18) should be transmitted. In any event, the decrypted header information (Hu(16)) can be used for the aforementioned e-mail client operations.
Abstract:
The invention enables efficient management of messages in a communication system. A messaging center ( 100 ) generates, in response to reception of a request message from a first user ( 200 ) and intended to a second user ( 300 ), transaction information. This information is stored in a database ( 180 ) together with an identifier of the first user ( 200 ). A temporary address is generated based on the transaction information and an identifier of the center ( 100 ). A second request message including the temporary address is transmitted to the second user ( 300 ). Due to careful choice of the temporary address, the second user ( 300 ) may easily transmit a response message to the center ( 100 ). Upon reception, the center ( 100 ) extracts the temporary address from the response message and extracts the transaction information from the address. Then, the identifier is retrieved from the database ( 180 ) based on the transaction information and a second response message is transmitted to the first user ( 200 ) based on the retrieved identifier.
Abstract:
A method and apparatus for distributing load between a plurality of servers, for handling incoming service requests in a server system. When a service request in received in an access node, a primary server is assigned out of a set of primary servers, using a first scheduling algorithm, for performing a processing task for the received service request. The first scheduling algorithm is capable of selecting any primary server. Further, a secondary server is assigned out of a set of secondary servers, using a second scheduling algorithm, for performing a storing task for the received service request. The second scheduling algorithm is capable of selecting one specific secondary servers for a storing task.
Abstract:
The invention relates to the organization of electronic messages (101) coming in to a user who can access his/her messages via at least two different types of access environments (130-165). A first storage area (100) receives the electronic messages (101), which each has an original data format. The electronic messages (101) are then stored according to a first structure (102). An agent (110) processes the electronic messages (101) into at least one set of processed electronic messages (113a-113c) having data formats, which are at least as adapted to an alternative access environment as the data formats of the corresponding original electronic messages. The processed electronic messages (113a-113c) are then stored according to at least one second structure (121a-121c) that is a mapping of the first structure (102). The user may either access an original electronic message (101) in the first structure (102) or one of the processed electronic messages (113a-113c) in the at least one second structure (121a-121c). The choice of message version is based on the type of access environment (130-165) that the user currently has at his/her disposal.
Abstract:
A method for spatializing audio in conference calls is described in which the participants in the calls are placed in particular locations in order to provide an additional dimension (direction) so that the participants can better recognize who is speaking. Also, the dimension of volume is provided, which can be used in creating background sub-conferences. Consequently, sub-conferences can be conducted in which the participants can move seamlessly between them and also listen to other sub-conferences being conducted in the background.
Abstract:
The functionality of portable wireless devices can be changed by providing programs written in a language, e.g. Java, producing a verifiable intermediary code (byte code). The intermediary code is translated to machine code in a node in the network before it is transferred to the wireless device on which it is to be executed. Several machine code variants of each program, translated using translators for different types of terminals, may exist. This enables use of the same source code for different terminal types and a division between software vendor, terminal vendor and network operator of the responsibility for carrying out the different functions involved in changing the functionality of a device, namely developing the source code of the program, compiling the source code into byte code, translating the byte code into machine code and transferring the machine code to the terminals on which it is to be run.
Abstract:
Wireless mobile communication devices automatically transmit therebetween information regarding the status of the devices. This permits the devices to be used effectively by members of a group or team performing a given task.
Abstract:
A method and apparatus for distributing load between a plurality of servers, for handling incoming service requests in a server system (200). When a service request in received in an access node (202), a primary server is assigned out of a set of primary servers (204), using a first scheduling algorithm, for performing a processing task for the received service reqest. The first scheduling algorithm is capable of selecting any primary server. Further, a secondary server is assigned out of a set of secondary servers (206), using a second scheduling algorithm, for perfomring a storing task for the received service request. The second scheduling algorithm is capable of selecting one specific secondary servers for a storing task.