摘要:
An MMS publishing system comprises a management tool, an authoring tool, a storage facility, a message router, and a rendering server. The management tool authenticates a first user by using a telephone number of the first user as a user ID. The authoring tool allows the first user to associate rich media content with his telephone number. The content is then stored in the storage facility in association with his telephone number. Subsequently, the message router intercepts an MMS message sent from a mobile device over a wireless network when the MMS message includes a predetermined indicator and indicates the telephone number of the first user as a destination. The rendering server then accesses the stored content associated with the telephone number and sends the content to the mobile device, for output to a user of the mobile device.
摘要:
Data access is controlled using metadata in the data being stored. As consistent with various example embodiments, data is stored on behalf of one or more of a multitude of disparate users and/or applications using the data, based upon metadata in the data itself and storage rules for the metadata. In one implementation, a rules-based storage and access system retrieves storage rules based upon metadata in received data, and executes the storage rules to select a file system in which to store the received data, from a plurality of file systems having different data retrieval characteristics such as speed, security and quality.
摘要:
A system, apparatus, and method for controlling the operation of a service in a client device. The invention uses an existing protocol which is used for communications between an application resident in the device and a remote server to convey information about the service to the application. The information may be relevant to a service specific function, such as configuration or provisioning, or an activation or de-activation instruction, for example. The application receives the service related information, processes the information and then provides the information to the service via a notification channel. The service related information may be incorporated into a message sent from the remote server to the client device by using an element of the protocol, for example, by appending a text string to a header.
摘要:
A method and system for delivering closed-audience content to a closed mobile audience is described. In one embodiment, a method for delivering closed-audience content to a closed mobile audience is described. The method for delivering closed-audience content to a closed mobile audience involves obtaining closed-audience content, establishing a closed mobile audience, identifying a mobile user or a mobile device as being part of the closed mobile audience, and delivering the closed-audience content to the mobile user or the mobile device. Other embodiments are also described.
摘要:
A configurable content injection service system and method of injecting a new content into data of a data traffic between a data source and a user device uses configuration information set by one or more content injection service users. The configuration information includes at least one condition related to the data traffic between the data source and the user device to inject the new content if the at least one condition is satisfied.
摘要:
The disclosure concerns a communication network having a wireless network that provides access of back channel data to third parties. A processor node in the wireless network uses and processes location-based mobile-terminal data as geographically-tagged information sources for processing and analysis by third parties. In some configurations, the processor node receives feedback from the third parties, and/or input from other resources and databases, for adaptively re-processing the data previously provided to the third parties.
摘要:
Consistent with one aspect, location-based mobile-terminal data is processed within or involving the wireless portion of such communication networks, and methods and apparatuses process the location-based mobile-terminal data based on information provided from outside the relationship of the network operator and the user. The location-based mobile-terminal data is extracted and processed by a node in the wireless portion of the communication network based on a specified set of rules. Other sources of location-based information originate from within the communication network itself including, but not limited to, location information regarding the nodes themselves.
摘要:
In a technique for enhancing discoverability and increasing usage of a web browser in a mobile device on a wireless network, a server system coupled to the wireless network receives a signal representing initiation of a voice call from the mobile device. In response, the server system performs a lookup to determine whether a website is associated with the telephone number being called. If a website is associated with the telephone number being called and the mobile device has the capability to access and display the website, the server system sends an Alert to the mobile device, causing the mobile device to notify its user about the website. The user may then input a selection to either access the website instead of completing the call or to proceed with the voice call.
摘要:
A system and method for controlling financial transactions is disclosed. A customer, using a wireless device, identifies a point of sale and the amount of a transaction at that point of sale is first communicated to a central service and then transmitted to the wireless device for display at the wireless device. The customer can either accept the transaction amount to complete the transaction or reject the amount to cancel the transaction. The customer may have to enter a password or personal identification number to verify the authorization to use the wireless financial system. The customer is billed for the transaction via credit, debit, ATM or other methods, such as the wireless carrier or an internet provider.
摘要:
A classifier is implemented to determine the number of message transfer agents (MTAs) through which an email message has traveled. If the number of MTAs through which the email message has traveled is below a predetermined threshold and the email message is not otherwise authenticated, the classifier will designate the email message as abusive.