Abstract:
A system, device, and method, for managing application interface access permissions for an application (302) in an electronic device, such as a wireless device (104), is disclosed. The method includes associating a security policy with an application (302). The method further includes creating a history log (324) associated with the application (302). The history log (324) includes time information associated with permission information indicating permission for an application to access at least one application interface in the electronic device (104). The method further includes dynamically adjusting the security policy for the application (302) when a security control signal associated with the application (302) is detected.
Abstract:
A method (100) and an apparatus (210) for providing enhanced security using service provider authentication. In addition to authenticating an application signature (245) against a root certificate (235) stored on the network node (210), a first carrier identification (250) associated with the application (240) is compared to a second carrier identification (255). If the first and second carrier identifications match, then the application can be assigned to a trusted protection domain and granted permissions which provide privileged access to the network node. For example, the application can be granted permission to be installed and/or executed on the network node. Otherwise the application can be denied privileged access. Accordingly, a carrier's applications will be only installed onto network nodes that are intended recipients of the applications.
Abstract:
A method (100) and an apparatus (e.g., a network node (210)) for providing enhanced security using service provider authentication. In addition to authenticating an application signature (245) against a root certificate (235) stored on the network node (210), a first carrier identification (250) associated with the application (240) is compared to a second carrier identification (255). If the first and second carrier identifications match, then the application can be assigned to a trusted protection domain and granted permissions which provide privileged access to the network node. For example, the application can be granted permission to be installed and/or executed on the network node. Otherwise the application can be denied privileged access. Accordingly, a carrier's applications will be only installed onto network nodes that are intended recipients of the applications.
Abstract:
In a device (100), a method (200) is provided for improving text-to-speech performance. The method includes the steps of determining (202) if a text expression from an application operating in the device is in a vocabulary, selecting (204) a corresponding speech expression from the vocabulary if the text expression is included therein, synthesizing (206) the text expression into a corresponding speech expression if the text expression is not in the vocabulary, playing (208) said speech expression audibly from the device, monitoring (210) a frequency of use of said text expression, storing (212) said text expression and corresponding speech expression in the vocabulary if the frequency of use of said expression is greater than a predetermined threshold and said expressions were not previously stored, eliminating (214) one or more text expressions and corresponding speech expressions from the vocabulary if the frequency of use of said expressions falls below the predetermined threshold, and repeating the foregoing steps during operation of the application. An apparatus implementing the method is also included.
Abstract:
A method (200) and a system (100) for repairing a flaw in software (120). A failure during execution of the software can be automatically identified, and a state of the software execution at a point of the software failure can be frozen. A failure handling application (130) can be automatically executed, without disrupting the frozen state of the software execution. Incident data that correlates to the frozen state of the software can be generated. For example, at least one state indicator available in the frozen state can be collected into an incident report (140). The incident report can be sent to a flaw database (145). A software patch (150) selected based on the incident data can be automatically received, for instance from the flaw database. The software can be automatically updated with the software patch. Execution of the software can be automatically reinitialized in response to the software update.
Abstract:
A communication system includes a base transmitter (110) for transmitting a signal over the air indicating a reallocation of a non-removable memory within a portable communication device (200), a non-removable memory (212) within the communication device preconfigured with a first amount of space allocated for random access memory and a second amount of space allocated for a heap, and a processor (208) coupled to the non-removable memory. The processor can be programmed to receive the signal over the air to re-allocate at least the first amount of space and the second amount of space in accordance with the signal.