Abstract:
Various methods are described for expanding the display of a web application across multiple devices. One example method may comprise receiving an indication of content associated with a main frame of a web application. The method may further comprise displaying of the content associated with the main frame. Furthermore, the method may comprise searching for one or more external devices. Each of the one or more external devices may comprise a display for rendering content associated with a respective expanded frame of the web application. The method of this example embodiment may further comprise establishing a connection with the one or more external devices. Furthermore, the method may comprise providing for transmission to each of the one or more external devices of an indication of the content associated with the respective expanded frame. Similar and related example methods, example apparatuses, and example computer program products are also provided.
Abstract:
Modifying remote service discovery based on presence involves identifying service discovery data using ad-hoc, peer-to-peer, service discovery protocols of a local network. The service discovery data is aggregated via an entity of the local network. Presence data associated with a remote device located outside of the local network is identified and the aggregated service discovery data is altered based on the presence data. The altered aggregated service discovery data is made available to the remote device using out-of-band communications. The out-of-band communications are different from the service discovery protocols of the local network.
Abstract:
A mobile terminal includes a processor capable of operating a link manager. The link manager is capable of at least partially operating a wireless connection between the terminal and an access point in an active mode, where the access point is coupled to a network. The link manager is also capable of transitioning the connection from the active mode to a standby mode or hibernate mode. In this regard, transitioning the connection includes entering the mobile terminal in a power-saving mode of a bearer of the connection, such as a Bluetooth power-saving mode, and directing the access point to reduce traffic flowing from the network across the connection to the mobile terminal when the mobile terminal is otherwise capable of receiving the traffic.
Abstract:
A method and system for distinguishing between devices of different types (e.g., mobile and stationary devices) in a wireless local area network (WLAN) in order to provide additional services to one or the other. The method includes obtaining a device type for the terminal, and providing specific services to the terminal if the terminal is a device of a certain type.
Abstract:
A Content Directory Service (CDS) security service specifying, in a user friendly manner, which users of a media server or other UPnP device own which content. The security service also permits the owners of content to control who is permitted to read the content. A CDS account manager is used to define user accounts and associated rights, such as validity periods and default rights. The CDS account manager is used by a security console which owns the media server. A CDS content manager is used to manipulate the rights to objects. The CDS content manager is used by a registered security aware control point (i.e., a control point associated with a user account) and can be used to change read and write access lists on the object.
Abstract:
A mobile device is coupled to an ad-hoc, peer-to-peer local area network via a public network. A secure data connection is created between the mobile device and an access point of the local area network so that the mobile device operates in an address space of the local network. A proxy for the mobile device is operated on the local network. The proxy maintains one or more state variables related to operation of the mobile device on the local network. The proxy simulates a reduced power mode of the mobile device on the local network for purposes of shaping traffic over the secure data connection and provides the state variables to entities of the local network on behalf of the mobile device.
Abstract:
A network entity for providing QoS during remote access to a PnP network includes a QoS manager for receiving in-band device capabilities of a PnP-enabled in-band correspondent and a PnP-enabled out-of-band remote node, the remote node being in communication with the PnP network over a secure tunnel. As presented, the in-band device capabilities of the correspondent node are at least partially based on an in-band network interface of the correspondent node. The in-band device capabilities of the remote node, however, comprise capabilities having been mapped from out-of-band device capabilities, where those out-of-band device capabilities are at least partially based on an out-of-band network interface of the remote node. The QoS manager is further adapted to configure the correspondent and remote nodes for a desired in-band QoS based on the QoS policy and respective device capabilities.
Abstract:
In the exemplary embodiments of the invention there is a method including setting up a first tunnel between a first device and a remote access relay, setting up a second tunnel between the remote access relay and a remote access server, and updating the first device with related parameters and settings on the remote access relay.
Abstract:
A system and method for enabling a UPnP device to provide services on behalf of another UPnP device. According to the present invention, all services requested from the original serving devices are redirected to the shadow device, while the original device has no knowledge of this redirection. With the present invention, a remote UPnP device requesting a service has no knowledge that the service is being provided by a shadow device.
Abstract:
A system for selectively granting access rights within a network. When a requesting device learns that a device is a secure device and is owned by a Security Console, the requesting device calls a listowners action to the secure device, which respond by transmitting a public key hash to the requesting device. The requesting device then multicasts a message including the public key hash. Security Consoles receiving the multicast message then determine whether they recognize the public key hash. If a Security Console recognizes the public key hash, then it responds to the multicast message and subsequently provides the requesting device with access rights to the secure device.