Abstract:
PROBLEM TO BE SOLVED: To provide a system which determines authorization for access to one or more services grouped together as a package of services.SOLUTION: The system offers business proprietors, contractors for telecommunication services, service resellers, and service providers the ability to authorize users, particularly users of mobile communication terminals, referred to as the "Owner", to access package services. A large package of features and applications can be available to a mobile device, but access to those features and applications are controlled by the Owner thus providing the Owner with control over expenses related to accessing those features and applications. It also provides the Owner with the ability to secure and prevent unauthorized access to features and applications which could allow unauthorized user access to sensitive data and equipment.
Abstract:
PROBLEM TO BE SOLVED: To provide a system device and a method which determine authorization for access to one or more services grouped together as a package of services without direct intervention of a wireless network provider or wired network access provider.SOLUTION: This invention offers business proprietors, contractors for telecommunication services, service resellers, OEMs and service providers the ability to authorize users, particularly users of mobile communication terminals, hereafter referred to as the "Owner," to access package services. In this way, a large package of features and applications can be available to a mobile device, but those features and applications can be controlled by the Owner, thus providing the Owner with the control over expenses related to accessing those features and applications.
Abstract:
PROBLEM TO BE SOLVED: To provide multisigning-protocol for robust multiple party digital signatures. SOLUTION: Embodiments describe a system and/or method for multiple party digital signatures. According to a first aspect, the method includes: establishing a first validity range for a first key; establishing a first validity range for at least a second key; and determining if the validity range of the first key overlaps the first validity range of at least the second key. A certificate is signed with the first validity range of the first key and the first validity range of at least the second key if the validity ranges overlap. According to another embodiment, signage of the certificate is refused if the first validity range of the first key does not overlap with the first validity range of at least the second key. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a content collection system for providing a content object to a web browser. SOLUTION: The content collection system includes a user's management device (CPE), a gateway distant from the CPE, and a satellite line for connecting those together. The CPE includes the first cache, and the gateway includes the second cache. A parameterization filter masks a difference between the first URI of the content object and the second URI of a cached content object stored in at least one of the first and second caches, in at least one of the CPE and the gateway. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
A multimedia data stream is partitioned into two or more parts based on importance, e.g., a first part might represent more significant bits in groups of bits representing pixel colors in a video frame, while a second part might represent the less significant bits in the groups. The more important part of the stream is amplified more than the less important part of the stream.
Abstract:
A communication transaction or use case is broken down into constituent parts, one of which can be provided, at the direction of a master service node, from the master service node or primary service path and the other of which can be provided from a support service node or secondary service path that the client station might happen to be able to communicate with. For instance, the base layer of a multimedia stream might be provided from the master node, but if its bandwidth becomes full, an enhancement layer of the stream can be provided by the support node, as directed by the master node.
Abstract:
A communication transaction or use case is broken down into constituent parts having different class of service (COS) requirements. The parts are matched to different links or channels having respective COS characteristics and communicated over the links or channels, and then aggregated at the receiver.
Abstract:
A communication transaction or use case is broken down into constituent parts having different class of service (COS) requirements. The parts are matched to different links or channels having respective COS characteristics and communicated over the links or channels, and then aggregated at the receiver.
Abstract:
A system device and method are provided which determine authorization for access to one or more services grouped together as a package of services without direct intervention of a wireless network provider or wired network access provider. This offers business proprietors, contractors for telecommunication services, service resellers, OEMs and service providers the ability to authorize users, particularly users of mobile communication terminals, hereafter referred to as the Owner, access to package services. In this way a large package of features and applications can be available to a mobile device, but access to those features and applications can be controlled by the Owner thus providing the Owner with control over expenses related to accessing those features and applications. It also provides the Owner the ability to secure and prevent unauthorized access to features and applications which could allow an unauthorized user access to sensitive data and equipment.
Abstract:
Método y sistema para acelerar el protocolo usado para la transferencia de documentos www(http) sobre un enlace de red (divisional de solicitud 620-05).