摘要:
Method for performing transactions on multimedia streams being produced over a chain of contributing producers in a ICT network environment, wherein for every transaction from one party to another party a target multimedia stream is generated with a number of contributing streams, wherein for every intended transaction of a target multimedia stream digital transaction data for said transaction is generated and associated with the target multimedia stream, wherein the digital transaction data of every transaction is managed centrally in the ICT network environment so that the chain of contributing producers can be traced.
摘要:
The present invention provides improved security in a virtual machine. By extending the capabilities of modern secure processors, privacy of computation is provided from both the owner of the equipment and other users executing on the processor, which is an advantageous feature for rentable, secure computers. In addition to the hardware extensions required to secure a virtualizable computer, an infrastructure for the deployment of such processors is also provided. Furthermore, a signaling flow to establish the various relationships between the owner, user and manufacturer of the equipment is disclosed.
摘要:
The present invention is related to a server device (10) for generating a user interface for a software application on a plug-in device (30) The server device is arranged for exchanging via the plug-in device first information related to selecting content in a communication device (50) in connection with the plug-in device The server device is further arranged for monitoring the software application and for exchanging with the software application second information related to controlling the software application, whereby the server device is further arranged for providing translation between the first information related to selecting content in the communication device and the second information related to controlling the software application The server device is arranged to send back status information over the plugin-device to the communication device in a properly encoded form.
摘要:
The present invention provides improved security in a virtual machine. By extending the capabilities of modern secure processors, privacy of computation is provided from both the owner of the equipment and other users executing on the processor, which is an advantageous feature for rentable, secure computers. In addition to the hardware extensions required to secure a virtualizable computer, an infrastructure for the deployment of such processors is also provided. Furthermore, a signaling flow to establish the various relationships between the owner, user and manufacturer of the equipment is disclosed.
摘要:
An apparatus (CEG) for interconnecting a user agent to a cluster of servers, the apparatus comprising a first protocol agent configured to exchange first messages with said user agent according to a SIP protocol, wherein said apparatus has the role of a User Agent Server; a second protocol agent configured to exchange second messages with a selected server from among said cluster of servers according to the SIP protocol, wherein said apparatus has the role of a User Agent Client; interconnection means for relaying messages from among said first messages and said second messages between said first protocol agent and said second protocol agent; wherein said second protocol agent is further configured to terminate elasticity control messages received from said cluster of servers.
摘要:
An apparatus (CEG) for interconnecting a user agent to a cluster of servers, the apparatus comprising a first protocol agent configured to exchange first messages with said user agent according to a SIP protocol, wherein said apparatus has the role of a User Agent Server; a second protocol agent configured to exchange second messages with a selected server from among said cluster of servers according to the SIP protocol, wherein said apparatus has the role of a User Agent Client; interconnection means for relaying messages from among said first messages and said second messages between said first protocol agent and said second protocol agent; wherein said second protocol agent is further configured to terminate elasticity control messages received from said cluster of servers.