摘要:
A system and method for accessing content on an electronic device in an encrypted mode, a decrypted mode or a default mode. A request is transmitted to an application program interface to permit a requesting program to access at least one file. The request specifically identifies whether the requesting program wishes to access the file in an encrypted mode, a decrypted mode or a default mode. It is determined whether the specific form is supported by the application program interface being used by the system, whether the at least one file is protected; and whether the requesting program is permitted to access the at least one file. If the specific form is supported by the application program interface, if the at least one file is protected, and if the requesting program is permitted to access the at least one file, the at least one file is opened in the specific form for use by the requesting program.
摘要:
A method, device and computer program for locking applications running on a wireless device for specially marked content is presented wherein the application is marked in a special way to condition the device software to recognize that the application is restricted to specific content. A specific piece of content is created and is marked in a special way so that the device software can match the specific piece of content marking to the application marking. After the application and the specific piece of content are deployed onto the mobile device, the device software recognizes the application is restricted to play specific content when the application requests the specific piece of content and compares the requested specific piece of content marking to the application marking. Application access to the specific piece of content is granted in response to the application and specific piece of content markings matching and denied in response to the application and specific piece of content markings not matching.
摘要:
A system and method for accessing content on an electronic device in an encrypted mode, a decrypted mode or a default mode. A request is transmitted to an application program interface to permit a requesting program to access at least one file. The request specifically identifies whether the requesting program wishes to access the file in an encrypted mode, a decrypted mode or a default mode. It is determined whether the specific form is supported by the application program interface being used by the system, whether the at least one file is protected; and whether the requesting program is permitted to access the at least one file. If the specific form is supported by the application program interface, if the at least one file is protected, and if the requesting program is permitted to access the at least one file, the at least one file is opened in the specific form for use by the requesting program.
摘要:
An antenna comprises: a main reflector being a body of revolution of parabolic shape; a sub-reflector being a body of the revolution of elliptic shape having a circle and a vertex oriented to the main reflector and being placed between the circle and the main reflector, one focal point of the sub-reflector being placed on the axis of revolution and the other focal point of the sub-reflector being placed out of the axis, the sub-reflector circle being placed in the plane of the main reflector edge circle; a radiator being placed along the axis of revolution of the main reflector and being placed between the main reflector and the sub-reflector; and wherein the sub-reflector has eccentricity ranging from 0.55 to 0.75.
摘要:
So-called push technology enables reception of new contents automatically, i.e. without user initiation. In order to enable a connecting party to send data when a receiving application is not even running, and thus cannot receive the data, middleware simulating the application to a connecting party, and an active connection to the application by utilizing buffers is provided. More precisely, the middleware is arranged to buffer incoming data on behalf of the application, if the application is not receiving the data, and to allow the application to receive the buffered data when the application is again willing to receive the data.
摘要:
A system and method of applying a permission model to an application operating on a mobile electronic device. When an application is launched on the mobile electronic device, it is determined whether the mobile electronic device possesses execution rights for the application. If the mobile electronic device does not possess valid execution rights for the application, the application is closed. If valid execution rights for the application expire after the application has been launched, a system is provided to inform the user that the rights have expired. The application with expired rights is then closed, unless the user obtains a new and valid rights object for the application.
摘要:
A system and method by which an application is capable of accessing its own DRM information stored in a content-agnostic DRM system. By being able to access its own DRM information, the application is able to improve the overall user experience by, among other things, making DRM-related information available to the user and providing potential options to the user which may not have been previously available.
摘要:
An antenna comprises: a main reflector being a body of revolution of arbitrary curve which axis diverges from axis of the revolution; a sub-reflector being a body of the revolution of arbitrary curve along the axis of revolution, having a circle and a vertex pointing to the main reflector and being placed between the circle and the main reflector; a radiator being located along the axis of revolution and being placed between the main reflector and the sub-reflector; and wherein the main reflector and the sub-reflector are: z m ( r , D ) = ∑ n = 0 4 ∑ m = 0 6 qm n , m D m - n + 1 r n , z s ( r , D ) = ∑ n = 0 4 ∑ m = 0 6 qs n , m D m - n + 1 r n , z, r are coordinates of the main reflector and the sub-reflector measured in millimeters, Index m corresponds to the main reflector, index s to the sub-reflector D is the main reflector diameter measured in millimeters.
摘要:
A MIDlet Suite comprising one or more encrypted installation files is determined at a sending terminal device. A distribution description file comprising Super Distribution identification information for the MIDlet Suite is generated. A non-encrypted distribution archive file comprising the distribution description file and the MIDlet Suite is generated. The distribution archive file is transmitted to a receiving terminal device. The distribution description file is extracted and the extracted distribution description file is parsed in order to obtain the Super Distribution identification information. The MIDlet Suite is extracted from the distribution archive file, and installation information is displayed. Thus the receiving device is able to verify the contents of a received MIDlet Suite before the acquisition of an associated Rights Object, and the user can make a more informed decision whether to acquire the associated Rights Object or not.
摘要:
A system and method by which an application is capable of accessing its own DRM information stored in a content-agnostic DRM system. By being able to access its own DRM information, the application is able to improve the overall user experience by, among other things, making DRM-related information available to the user and providing potential options to the user which may not have been previously available.