Abstract:
A solution is proposed for controlling a distributed application. A corresponding method (400) comprises the steps of detecting (404-422) an indication of a computational capability of a client computing machine and/or of a server computing machine, building (424-440) at least part of a page in response to a request received by the server computing machine from the client computing machine, the page comprising a set of commands each one for submitting a next request on the client computing machine, a processing logic for serving each next request being split between a client processing component and/or a server processing component, returning (442-456) the page with the client processing component for each command to the client computing machine for causing the client computing machine to load the page and execute each client processing component in response to the corresponding next request, and executing (458-464,424-440) each server processing component in response to the corresponding next request.
Abstract:
A protected wireless network access point usually allows access to entitled mobile stations only (fig. 3A). In the invention, if the mobile station 115b is not entitled 115, a check is made to determine whether the mobile station is affiliated to an affiliation group of the access point, the affiliation group comprising several access points and mobile stations. If the mobile station is affiliated then access is granted in a limited access mode e.g. access is bandwidth limited. Access to the network is denied if the non-entitled mobile station is not affiliated. The workload of the access point may be monitored and the bandwidth limitation for affiliated mobile stations updated accordingly. Verification of the affiliation may involve checking an encrypted identifier of the mobile station at an affiliation server. A mobile telephone infrastructure provides each mobile station with a set of affiliated access points associated with their position.
Abstract:
A protected private access point (AP) 150p maintains a database of neighbouring at least partially public unprotected APs 105u. The database includes geographic position information. Mobile terminal station 110 requests access to the private AP (Fig. 3a). The private AP determines that access is not allowed and issues a connection denial message (Fig. 3b). The denial message includes information about nearby public APs 105u and their location. The mobile station uses the location information to select an appropriate public AP and travels there (Fig. 3c) in order to connect to the public AP (Fig. 3d).
Abstract:
A solution for locating unprotected access points is provided. Particularly, in an embodiment of the invention a wireless network access point (105) providing an access to a network (115) over a wireless connection maintains (602-630) a location structure (530) comprising an indication of a geographical position of each one of a set of unprotected access points (105u) in proximity of the access point, each unprotected access point providing the access to the network at least partially unconditionally. A mobile station (110) submits (636) a request to access the network (115) to the access point when the mobile station is within a transmission range thereof, receives (658-660) the indication of the geographical position of at least part of the unprotected access points (105u) in response to a denial of the access from the access point, and outputs (670-680) directions towards one of the unprotected access points according to the corresponding geographical position.
Abstract:
A method for obtaining a geographical position of a mobile device may be provided. The mobile device may comprise a Bluetooth transceiver and a storage unit for storing an offline map. The method may comprise establishing a Bluetooth connection, requesting geographical coordinates using two bits of the Frequency Hopping Synchronization data packet of the Bluetooth protocol, receiving geographical coordinates by the mobile device, and mapping the received geographical coordinates to the offline map for obtaining the geographical position of the mobile device in the map.
Abstract:
At least part of a page 320 of a distributed application, typically a web application 310, is built in response to a request received by a server computer 102 from a client computer 115. The page comprises a set of commands, each command for submitting a next request on the client, the processing logic for which is split between a client processing component 325 and a server processing component 315. The page is returned to the client with the client processing component for each command, causing the client to load the page. In response to a next request the corresponding client and server components are executed. An indication of the computational capability of a client computing machine 115 and/or of a server computing machine 105 is detected, preferably before the page is built and in response to client access to the application. This may be an indication of computational resources such as processor power or memory and may be monitored and updated. In an embodiment, the step of building at least part of a page comprises creating the client and server processing components according to the respective computational capabilities of client and server.
Abstract:
A solution for locating unprotected access points is provided. Particularly, in an embodiment of the invention a wireless network access point (105) providing an access to a network (115) over a wireless connection maintains (602-630) a location structure (530) comprising an indication of a geographical position of each one of a set of unprotected access points (105u) in proximity of the access point, each unprotected access point providing the access to the network at least partially unconditionally. A mobile station (110) submits (636) a request to access the network (115) to the access point when the mobile station is within a transmission range thereof, receives (658-660) the indication of the geographical position of at least part of the unprotected access points (105u) in response to a denial of the access from the access point, and outputs (670-680) directions towards one of the unprotected access points according to the corresponding geographical position.
Abstract:
Verfahren (600) zum Betreiben eines kabellosen Netzwerkzugangspunktes (105), der einen Zugang zu einem Netzwerk (115) über eine kabellose Verbindung bereitstellt, wobei das Verfahren die Schritte aufweist: Unterhalten (602 bis 630) einer Lokalisierungsstruktur (530), die eine Angabe einer geografischen Position eines jeden von einem Satz von ungeschützten Zugangspunkten (105u) in der Nähe des Zugangspunktes aufweist, wobei jeder ungeschützte Zugangspunkt den Zugang zum Netzwerk zumindest teilweise bedingungsfrei bereitstellt, Empfangen (638) einer Anfrage, auf das Netzwerk von einer Mobilstation (110) innerhalb eines Übertragungsbereichs des Zugangspunktes zuzugreifen, Ablehnen (646 bis 652) des Zugangs zum Netzwerk gegenüber der Mobilstation, und Ausgeben (654 bis 656) der Angabe der geografischen Position zumindest eines Teils des ungeschützten Zugangspunktes an die Mobilstation als Reaktion auf die Ablehnung des Zugangs, wobei der Schritt des Unterhaltens (602 bis 630) einer Lokalisierungsstruktur (530) aufweist: Empfangen (614) einer weiteren Lokalisierungsstruktur von einem weiteren Zugangspunkt innerhalb des Übertragungsbereichs des Zugangspunktes, wobei die weitere Lokalisierungsstruktur eine Angabe einer geografischen Position eines jeden von einem Satz von weiteren ungeschützten Zugangspunkten (105u) in der Nähe des weiteren Zugangspunktes aufweist, Erkennen (602 bis 604) eines jeden von einem Satz noch weiterer ungeschützter Zugangspunkte innerhalb des Übertragungsbereichs des Zugangspunktes, Ermitteln (618) einer Angabe einer geografischen Position jedes noch weiteren ungeschützten Zugangspunktes, und Aktualisieren (622 bis 628) der Lokalisierungsstruktur gemäß jedem noch weiteren ungeschützten Zugangspunkt, wobei die Schritte des Aktualisierens (622 bis 628) der Lokalisierungsstruktur gemäß jedem weiteren ungeschützten Zugangspunkt und des Aktualisierens (622 bis 628) ...
Abstract:
A matrix barcode (e.g. QR code) comprising colored and white squares in rows and columns is analysed, e.g. for the detection of phishing performed by overlaying a barcode with a malicious barcode (see figs. 2-4). The barcode is scanned row by row and column by column resulting in received squares, and a corresponding white color level for each received white square is stored. The white color levels of the received white squares are compared in pairs. A counter may be increased if the white color levels of the pair differentiate by more than a threshold and a notifier (e.g. phishing notifier) is activated after all the comparisons are performed if the counter is greater than a threshold. A web access corresponding to the barcode may be blocked upon activation of the notifier. Shading compensation may also be performed on the barcode, e.g. by applying a dynamic multiplier which is proportional to an intensity of shade on the matrix barcode.
Abstract:
A solution for locating unprotected access points is provided. Particularly, in an embodiment of the invention a wireless network access point (105) providing an access to a network (115) over a wireless connection maintains (602-630) a location structure (530) comprising an indication of a geographical position of each one of a set of unprotected access points (105u) in proximity of the access point, each unprotected access point providing the access to the network at least partially unconditionally. A mobile station (110) submits (636) a request to access the network (115) to the access point when the mobile station is within a transmission range thereof, receives (658-660) the indication of the geographical position of at least part of the unprotected access points (105u) in response to a denial of the access from the access point, and outputs (670-680) directions towards one of the unprotected access points according to the corresponding geographical position.