Abstract:
A computing device (102) includes computer instructions for receiving (202) streaming data, delegating (204) portions of the streaming data to a plurality of processes (302-305), detecting (206) that one or more of the processes is affected by an interruption that would inhibit further processing of the portions of streaming data delegated thereto, and rerouting (214) to other available processes the portions of streaming data supplied to the one or more affected processes at a desired quality of service level.
Abstract:
A method (100) and an apparatus (210) for providing enhanced security using service provider authentication. In addition to authenticating an application signature (245) against a root certificate (235) stored on the network node (210), a first carrier identification (250) associated with the application (240) is compared to a second carrier identification (255). If the first and second carrier identifications match, then the application can be assigned to a trusted protection domain and granted permissions which provide privileged access to the network node. For example, the application can be granted permission to be installed and/or executed on the network node. Otherwise the application can be denied privileged access. Accordingly, a carrier's applications will be only installed onto network nodes that are intended recipients of the applications.
Abstract:
A battery saving interval utilized for communicating with a portable subscriber unit (122) in a radio communication system is dynamically adjusted. An occurrence of a predetermined triggering event associated with the portable subscriber unit is observed (504), and the battery saving interval utilized for communicating with the portable subscriber unit is adjusted (506) in response to the predetermined triggering event, while battery saving intervals of other portable subscriber units in the system are left unchanged.
Abstract:
A method of wireless communication using a hybrid of a transaction protocol and a connection oriented protocol includes the steps of initiating a wireless request from a portable subscriber to a server using the transaction protocol (106) and continuing communications using the transaction protocol (110) if a response from the server is less than a maximum transfer unit size. If the response from the server is greater than a maximum transfer unit size, then the server segments the response into data packets, wherein the portable subscriber unit and server subsequently communicate using the connection oriented protocol (114) until a subsequent wireless request is made from the portable subscriber.
Abstract:
A method and apparatus allocates a first predetermined plurality of frame time slots (102) to a first protocol, and allocates a second predetermined plurality of frame time slots (102) to a second protocol having a base frame management capability. The base frame management capability is applied such that portable selective call receiving devices (10) utilizing the second protocol normally perform battery saving throughout the first predetermined plurality of frame time slots (102).
Abstract:
A communication system is used for transmitting error-tolerant messages to a selective call receiver (122). The communication system includes a transmitter circuit and a controller (112). The controller (112) applies an error-correction algorithm to an original message and repeats the application step to the by-product therefrom until a message has been generated that is sufficiently error-tolerant (506, 508). The error-tolerant message is transmitted to the selective call receiver (122), which receives the error-tolerant message using a receiver circuit. A processor (310) of the selective call receiver (122) applies an inverse error-correction algorithm to the error-tolerant message, and repeats the application step to the by-product therefrom until the original message has been reconstructed (604, 606).
Abstract:
A method and apparatus controls zone registrations in a radio communication system providing radio coverage to a portable subscriber unit (122) within a plurality of zones (402), wherein the portable subscriber unit (PSU) determines its own call rate (602). A fixed portion (102) of the radio communication system sends the PSU a threshold value based on communication activity associated with the PSU, a call rate estimation interval value, and a multiplier for normalizing the PSU's own call rate with the threshold value. The fixed portion accepts zone registrations from the PSU when the PSU's own call rate is greater than the threshold value and defers zone registration from the PSU when the PSU's own call rate is less than or equal to the threshold value until the PSU's own call rate exceeds the threshold value.
Abstract:
A method and apparatus prioritize communications in a two-way communication system (102, 104) serving portable subscriber units (122) in a coverage area (500). A fixed portion (102) of the two-way communication system (102, 104) requests (904) location information (824, 224, 826) from a subset of the portable subscriber units (122) in response to having a need to communicate therewith, and then receives (906) the location information (824, 224, 826) from the subset of the portable subscriber units (122). The location information (824, 224, 826) includes mobility index values (826) determined by the subset of the portable subscriber units (122) for indicating mobility of each portable subscriber unit (122). The fixed portion (102) then prioritizes (908) the communications based upon the mobility index values (826).
Abstract:
A method (100) and an apparatus (e.g., a network node (210)) for providing enhanced security using service provider authentication. In addition to authenticating an application signature (245) against a root certificate (235) stored on the network node (210), a first carrier identification (250) associated with the application (240) is compared to a second carrier identification (255). If the first and second carrier identifications match, then the application can be assigned to a trusted protection domain and granted permissions which provide privileged access to the network node. For example, the application can be granted permission to be installed and/or executed on the network node. Otherwise the application can be denied privileged access. Accordingly, a carrier's applications will be only installed onto network nodes that are intended recipients of the applications.
Abstract:
Defining subscriptions to location information for a computing device (e.g., a mobile computing device). Application programs, services, and/or peer devices define the subscriptions based on constraints associated with requests for the location information. A location request scheduler coordinates the subscriptions temporally and spatially to reduce the quantity of the requests from the computing device. In some embodiments, the subscriptions are automatically defined based on an observed mobility pattern of the computing device.