Abstract:
The present disclosure relates to a sensor network, Machine Type Communication (MTC), Machine-to-Machine (M2M) communication, and technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the above technologies, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. A method for controlling contents and an electronic device thereof are provided. An operation method of an electronic device includes the operations of setting an access authority for one or more contents, if there is a request for an access of at least one application to the contents, resetting the access authority for the contents, and controlling the access by the application to the contents in accordance with the reset access authority of the application for the contents.
Abstract:
A method, a terminal, and a server for providing a communication service are provided. The terminal includes a communication unit which transmits a server a first message requesting for mapping a virtual address and a first Internet Protocol (IP) address and receives an IP packet including a first IP address from the server through a first communication network and a control unit which converts the first IP address to the virtual address mapped to the first IP address in the IP packet.The present disclosure relates to a pre-5th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4th-Generation (4G) communication system such as Long Term Evolution (LTE).
Abstract:
An application synchronization method for use in a terminal is provided. The application synchronization method includes acquiring an alarm registration request of a first repetitive synchronization operation, acquiring a next execution time of a second repetitive synchronization operation associated with a same application as an application of the first repetitive synchronization operation, adjusting, if a difference between an alarm time of the alarm registration request of the first repetitive synchronization operation and the next execution time of the second repetitive synchronization operation is less than or equal to a threshold value, the alarm time of the alarm registration request of the first repetitive synchronization operation according to the next execution time of the second repetitive synchronization operation, and registering the adjusted alarm time.
Abstract:
Disclosed is an electronic device including a storage storing contents, a display, and a processor configured to set one or more access authorities of one or more applications for accessing the contents stored in the storage while the one or more applications is installed, based on detecting at least one application of the one or more applications to access the contents, display, on the display, a message requesting changing at least one access authority of the at least one application of the one or more applications for accessing the contents, and based on an input associated with the message, change the at least one access authority of the at least one application of the one or more applications for accessing the contents.
Abstract:
An electronic device and method are disclosed herein. The electronic device includes a touch screen display, a wireless communication circuit, a processor and a memory. The processor implements the method, including receiving a first user input indicating a transaction card associated with an issuer identification, storing information for the transaction card, transmitting to a request to initiate a search for a plug-in software program associated with the issuer identification, receiving a response identifying at least one searched plug-in software program, receiving a second user input requesting installation of the at least one plug-in software program, transmitting an access request requesting download of the at least one plug-in software program, downloading and installing the at least one plug-in software program, transmitting a request for authentication of the installed at least one plug-in software program, and based on a result of the authentication completing the installation.
Abstract:
A method and apparatus is provided for selecting power preference information based on network usage information used for a background process of a terminal. The power preference information selection method of the present disclosure includes measuring background network usage of a terminal, acquiring network usage information of the terminal when the background network usage exceeds a predetermined threshold, selecting the power preference information based on the network usage information, and transmitting the power preference information to the base station.
Abstract:
Disclosed is a terminal effectively allocating communication resources to individual processes run by the user. The terminal may update a list of running processes based on information for one or more processes, determining the amount of resources for each process in the list according to priority information of the process related information, and allocating resources to at least one process in the list according to the determined resource amounts. Accordingly, the terminal can adjust throughputs of individual processes to support quality of communication of a process having high priority. This disclosure relates to communication methods and systems that achieve convergence of 5G communication systems supporting even higher data rates after 4G systems and IoT technologies. Based on IoT technologies, this disclosure may be applied to intelligent services, including smart homes, smart buildings, smart cities, smart/connected cars, health-care applications, digital education applications, retail business applications, and security and safety services.
Abstract:
According to a method of an embodiment of the present disclosure, a method for correcting a beamforming pattern of a base station by an analysis server of a base station management network may comprise the steps of: when network management information is received from a first base station, identifying whether or not the network management information indicates the occurrence of a failure in an antenna element of the first base station; when the network management information indicates the occurrence of the failure in the antenna element of the first base station, analyzing an effect of a beamforming pattern of the first base station and analyzing a change in a cell coverage; on the basis of the result of the analysis, determining a first beamforming pattern for compensating for the failure in the antenna element; and transmitting, to the first base station, information about the first beamforming pattern by including the information in management control information.
Abstract:
An electronic apparatus and an operating method thereof according to various embodiments may: transmit reference information, detected from a first external device, to a second external device; receive first password information, generated on the basis of the reference information, from the second external device; and provide the first password information to the first external device so that the first external device controls a locking device on the basis of the first password information.
Abstract:
The present disclosure relates to a sensor network, Machine Type Communication (MTC), Machine-to-Machine (M2M) communication, and technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the above technologies, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. A method for controlling contents and an electronic device thereof are provided. An operation method of an electronic device includes the operations of setting an access authority for one or more contents, if there is a request for an access of at least one application to the contents, resetting the access authority for the contents, and controlling the access by the application to the contents in accordance with the reset access authority of the application for the contents.