摘要:
A network server system includes a download manager that manages the publication, purchase and delivery of digital content from multiple content suppliers to wireless services subscribers in multiple domains. Each domain is defined as a different grouping of subscribers, such as a wireless carrier or subsidiary thereof, a business enterprise, or other defined group of subscribers. The download manager maintains data defining the multiple domains and associations between the domains and wireless services subscribers. Digital content suppliers can publish and manage their products on the server system via a computer network and make their products available to the subscribers for purchase or licensing. The subscribers in each of the domains can access the server remotely to purchase rights to download and use the digital content on associated wireless communication devices.
摘要:
A wireless telecommunications carrier operates a commerce platform in a trusted domain, which may store sensitive information associated with a consumer. During a credit card based transaction, a merchant's POS terminal sends transaction information to an acquirer. The acquirer recognizes the transaction type and responds by routing the transaction information to the commerce platform. The commerce platform validates the transaction by verifying the identity of the user. When the transaction is validated, the commerce platform notifies the acquirer, which initiates a clearing process. When the transaction clears, the acquirer notifies the commerce platform and signals the merchant's POS terminal to output a paper receipt. The commerce platform stores a digital receipt of the transaction and signals the wireless device to output a confirmation message to the consumer. The consumer's credit card number and other sensitive information may be restricted to the trusted domain, which excludes the merchant.
摘要:
In a mobile device operating on a wireless network, one of multiple selectable proxies and its corresponding protocol stack are selected, to proxy a request and response, based on the application making the request. Connection information for each available proxy is stored in a configuration store. The application requests a Net Proxy object for the particular proxy and protocol stack to be used. The Net Proxy object contains a subset of the stored connection information specific to the particular proxy. An HttpAction object is then created for the request, and the Net Proxy object is linked to the HttpAction object. The HttpAction object is provided to a request manager, which dispatches the request to an appropriate protocol stack, based on the content of the net Proxy object linked to the HttpAction object, which causing the request to be sent to the selected proxy.
摘要翻译:在无线网络上运行的移动设备中,选择多个可选代理之一及其对应的协议栈,以便根据发出请求的应用代理请求和响应。 每个可用代理的连接信息存储在配置存储中。 该应用程序请求一个Net Proxy对象来使用特定的代理和协议栈。 Net Proxy对象包含特定代理所存储的连接信息的子集。 然后为请求创建HttpAction对象,并将Net Proxy对象链接到HttpAction对象。 HttpAction对象被提供给请求管理器,该请求管理器基于链接到HttpAction对象的净代理对象的内容将请求发送到适当的协议栈,这导致请求被发送到所选择的代理。
摘要:
An alphanumeric information entry process that includes provision and use of a personal context model that correlates various examples of user context against a unique personal language model for the user. The personal language model itself along with considerable correlation examples can be developed by statistical analysis of user documents and files including particularly email files (including address books). Such processing can be done locally or remotely. The personal context model is used to predict subsequent alphanumeric entries for a given user. In one embodiment predictions are presented one word at a time. Predictions can be automatically changed in one embodiment when the user fails to make any input for a predetermined period of time.
摘要:
An improved approach for resolving overloaded keys (i.e., ambiguous keys) in constrained data entry computing systems is disclosed. A combination of an ambiguous key entry and a corresponding voice input are used to particularly identify an entered key. Examples, of constrained data entry computing systems include palm-sized computers, mobile phones (including cellular), Portable Digital Assistants (PDAs), Internet appliances, etc.
摘要:
A microbrowser in a mobile telephone or other hand-held mobile device generates a Graphical User Interface (GUI) having features that make the device more user-friendly. In one mode, the GUI includes a softkey indicator indicating a corresponding softkey action and an input field for receiving a user-input character string, such as a telephone number. In response to typing in the input field, a softkey action previously associated with the input field, such as a dial action, is automatically selected, and the softkey indicator is automatically changed to indicate the selected action. In another mode, the GUI displays an input field and a menu listing performable actions. In response to a user input representing a single action by the user and designating one of the performable actions, the designated action is selected and the input field is activated, enabling the user to input characters associated with the designated action.
摘要:
A mobile telephone comprises a telephony unit to process wireless telephony signals and a browser to enable the user to navigate hypermedia information via a wireless network. The telephony unit receives a signal indicating an incoming telephone call with Caller-ID information. The telephony unit provides the Caller-ID information to the browser, which uses the Caller-ID information to identify an action or data previously associated with the Caller-ID information. In one embodiment, the browser looks up ring tone data associated with the Caller-ID information and provides the ring tone data to the telephony unit, which causes a ring tone to be generated based on the ring tone data. Distinctive ring tones may be associated with particular callers or groups of callers. The browser may request ring tone data from a remote server over the wireless network.
摘要:
A centralized synchronization system synchronizes data stored in multiple devices distributed over a relatively unreliable network, to provide automatic recovery from synchronization failures. The synchronization system maintains a truth database indicating the true state of the data and action tables indicating actions to be performed on each of the devices during a next update of the data. Data is retrieved from the devices over the network, and actual states of the data are determined from the action tables and the retrieved data. The truth database and action tables are updated accordingly. An effective action table is then generated to account for any of the devices which were offline during the most-recent synchronization. The truth database and effective action tables are saved to a central database in an atomic transaction. The effective action tables are then used to update the data on the devices over the network.
摘要:
In one embodiment, a method for authenticating a user of a mobile device is provided. The method comprises receiving a request from a client device to access a resource on a network; identifying a network address of the client device; retrieving a mapping of the network address to user identification information and device identification information; determining if the mapping is valid; preventing the request from reaching the resource if the mapping is not valid.
摘要:
Techniques for controlling a network connection in accordance with connection information associated with a destination location on a network are disclosed. Controlling of the network connection in accordance with connection information associated with the destination location can be achieved in a variety of ways. One way is in the selection of a network transport (e.g., bearer selection). Another way is in the configuration of parameters associated with the connection (i.e., connection parameters). In either case, the connection information includes information with which the selection of the network transport and/or connection parameters can be made. The controlling of the network connection impacts quality of service provided to a requestor that is requesting use of the connection.