Abstract:
PROBLEM TO BE SOLVED: To provide contact validation and trusted contact updating in mobile wireless communications devices. SOLUTION: A method to be implemented in a wireless communication device includes: receiving contact information with a signature (456) from a source not on a trusted contact list; validating the signature (462) by comparing the signature to a reference signature stored, on the basis of the method, in a wireless communication device; and updating the trusted contact list regarding the contact information received if the signature is valid (468). In some applications, the contact information and signature is associated with a wireless communication device provisioning session request message. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
A method in a wireless communication device including receiving contact information with a signature from a source ( 310 ) not on a trusted contact list, validating ( 362 ) the signature by comparing the signature to an reference signature stored on the method in a wireless communication device, and updating ( 368 ) the trusted contact list regarding the contact information received if the signature is valid. In some applications, the contact information and signature is associated with a wireless communication device provisioning session request message.
Abstract:
A method in a wireless communication device including receiving contact information with a signature from a source ( 310 ) not on a trusted contact list, validating ( 362 ) the signature by comparing the signature to an reference signature stored on the method in a wireless communication device, and updating ( 368 ) the trusted contact list regarding the contact information received if the signature is valid. In some applications, the contact information and signature is associated with a wireless communication device provisioning session request message.
Abstract:
A method (fig. 4) in a wireless communication device including receiving contact information with a signature (456) from a source not on a trusted contact list, validating the signature (462) by comparing the signature to a reference signature stored on the method in a wireless communication device, updating the trusted contact list regarding the contact information received if the signature is valid (468). In some applications, the contact information and signature is associated with a wireless communication device provisioning session request message.
Abstract:
A method (fig. 4) in a wireless communication device including receiving contact information with a signature (456) from a source not on a trusted contact list, validating the signature (462) by comparing the signature to a reference signature stored on the method in a wireless communication device, updating the trusted contact list regarding the contact information received if the signature is valid (468). In some applications, the contact informati on and signature is associated with a wireless communication device provisionin g session request message.
Abstract:
A voice browser dialog enabler for multimodal dialog uses a multimodal markup document (22) with fields having markup-based forms associated with each field and defining fragments (45). A voice browser driver (43) resides on a communication device (10) and provides the fragments (45) and identifiers (48) that identify the fragments (45). A voice browser implementation (46) resides on a remote voice server (38) and receives the fragments (45) from the driver (43) and downloads a plurality of speech grammars. Input speech is matched against those speech grammars associated with the corresponding identifiers (48) received in a recognition request from the voice browser driver (43).
Abstract:
A method in a wireless communication device including receiving contact information with a signature from a source ( 310 ) not on a trusted contact list, validating ( 362 ) the signature by comparing the signature to an reference signature stored on the method in a wireless communication device, and updating ( 368 ) the trusted contact list regarding the contact information received if the signature is valid. In some applications, the contact information and signature is associated with a wireless communication device provisioning session request message.
Abstract:
A method in a wireless communication device including receiving contact information with a signature from a source ( 310 ) not on a trusted contact list, validating ( 362 ) the signature by comparing the signature to an reference signature stored on the method in a wireless communication device, and updating ( 368 ) the trusted contact list regarding the contact information received if the signature is valid. In some applications, the contact information and signature is associated with a wireless communication device provisioning session request message.
Abstract:
Architectures and methods architectures for providing real-time cost information to communications applications, for example for transactions conducted by mobile wireless communications devices before the transaction is conducted. In one embodiment a communication transaction is selected at user equipment (UE) (302), a transaction cost request is communicated (304) from the application is to a communication server (306). In response, the server communicates (308) a firm or estimated cost to the UE. The cost may be based on subscription profile information obtained (312) from a source (314) and/or from information obtained (316) from a content provider (317). In some embodiments, the UE accepts or declines to conduct the transaction based on the cost.