会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 64. 发明申请
    • Controlled Access by Applications to Mobile Device Resources
    • 应用程序控制访问移动设备资源
    • US20130227711A1
    • 2013-08-29
    • US13776174
    • 2013-02-25
    • Smith Micro Software, Inc.
    • Ryan MacPhersonJian Chen
    • G06F21/62
    • G06F21/62G06F21/6281
    • There is provided a system and method for controlled access by applications to mobile device resources. The method comprises receiving a request from one of a plurality of applications to access a first resource of a plurality of resources, determining whether the first resource of the plurality of resources is classified as a protected resource, if the determining determines that the first resource of the plurality of resources is classified as the protected resource, identifying an application authorization for the first resource, and configuring access by the one of the plurality of applications to the first resource according to the application authorization. Based on the application authorization, the method may further configure access by the one of the plurality of applications to a second resource of the plurality of resources. Additionally, the first resource of the plurality of resources may be connected to a communication network resource.
    • 提供了一种用于由应用程序控制访问移动设备资源的系统和方法。 该方法包括从多个应用中的一个应用接收到访问多个资源的第一资源的请求,确定所述多个资源中的第一资源是否被分类为受保护资源,如果所述确定确定所述第一资源是 所述多个资源被分类为所述受保护资源,识别所述第一资源的应用授权,以及根据所述应用授权将所述多个应用中的一个应用配置为所述第一资源。 基于应用授权,该方法还可以将多个应用中的一个应用的访问进一步配置为多个资源中的第二资源。 此外,多个资源的第一资源可以连接到通信网络资源。
    • 66. 发明申请
    • Self-Adjusting Mobile Platform Policy Enforcement Agent for Controlling Network Access, Mobility and Efficient Use of Local and Network Resources
    • 用于控制网络访问,移动性和有效利用本地和网络资源的自调整移动平台策略执行代理
    • US20130122910A1
    • 2013-05-16
    • US13626627
    • 2012-09-25
    • Smith Micro Software, Inc.
    • Bik SinghDzung TranStephen MikandawireAngelo Rodriguez
    • H04W36/14
    • H04W36/14H04L43/08H04W36/18H04W36/22H04W36/24H04W36/32H04W76/30H04W84/12
    • Presented is a method for controlling network access for the mobile device. The method includes analyzing a first plurality of network parameters, collected by the mobile device, based on one or more local network policies. The method further includes receiving an update for the one or more local network policies from a policy server based on a second plurality of network parameters received by the policy server from a plurality of mobile devices. The method also includes rerouting data traffic for the mobile device from a first wireless network configuration to a second wireless network configuration based on the analyzing of the second plurality of network parameters and the update from the policy server, Rerouting data traffic for the mobile device may include maintaining a constant IP address utilizing a virtual network adapter within the mobile device to provide split tunneling over two or more network connections of the second wireless network configuration.
    • 提出了一种用于控制移动设备的网络访问的方法。 该方法包括基于一个或多个本地网络策略分析由移动设备收集的第一多个网络参数。 该方法还包括基于策略服务器从多个移动设备接收的第二多个网络参数,从策略服务器接收针对一个或多个本地网络策略的更新。 该方法还包括基于对第二多个网络参数的分析和来自策略服务器的更新来将用于移动设备的数据业务从第一无线网络配置重新路由到第二无线网络配置,用于移动设备的重新路由数据业务 包括利用移动设备内的虚拟网络适配器来维持恒定的IP地址,以在第二无线网络配置的两个或多个网络连接上提供拆分隧道。
    • 67. 发明授权
    • Communication systems and methods
    • 通信系统和方法
    • US08406801B1
    • 2013-03-26
    • US12880603
    • 2010-09-13
    • Konstantin Othmer
    • Konstantin Othmer
    • H04B7/00
    • H04M1/6505
    • Systems and methods for selectively replaying voice data. Voice data received in a communication session is both buffered by the device and played by the device. When input is received from a recipient, the voice data currently being received is no longer played and buffered voice data is replayed to the recipient. While the buffered voice data is replayed, the device continues to buffer any voice data received by the device to ensure that the recipient can listen to all of the voice data in the communication session. By only storing voice data in the buffer, replaying the buffered voice data can catch the real-time voice data. At this point, the device reverts to playing voice data being received while continuing to buffer the voice data.
    • 有选择地重播语音数据的系统和方法。 在通信会话中接收的语音数据都由设备缓冲并由设备播放。 当从接收者接收到输入时,不再播放当前正在接收的语音数据,并将缓冲的语音数据重播到接收者。 当缓冲的语音数据被重放时,设备继续缓冲由设备接收的任何语音数据,以确保接收者可以收听通信会话中的所有语音数据。 通过仅将音频数据存储在缓冲器中,重放缓冲的语音数据可以捕获实时语音数据。 此时,设备恢复播放正在接收的语音数据,同时继续缓冲语音数据。
    • 68. 发明申请
    • SELECTIVE ACTIVATION OF ALERTS FOR RECEIPT AND AVAILABILITY OF DATA IN A COMMUNICATION DEVICE
    • 选择性激活通信设备中数据接收和可用性的警报
    • US20120276878A1
    • 2012-11-01
    • US13543374
    • 2012-07-06
    • Konstantin OthmerMichael P. Ruf
    • Konstantin OthmerMichael P. Ruf
    • H04W4/12
    • G06F9/542H04M1/72563H04M3/436H04W68/005
    • A recipient activates or deactivates user alerts associated with the receipt and/or availability of communications using rules in an alert profile stored on a device, a server, or a location accessible to the server. In one embodiment, the device can implement the rules when a communication is received and/or available. If an alert is activated, the device renders the alert. If the alert is deactivated, the device does not render the alert unless and until the alert is activated. In another embodiment, the server can implement the rules. If the alert is activated when the communication is transmitted to the device, the server also transmits alert-rendering instructions, whereupon the device can render the alert as specified in the instructions. If the alert is deactivated when the communication is transmitted to the device, the server does not transmit the instructions unless and until the alert is activated.
    • 收件人使用存储在设备,服务器或服务器可访问的位置的警报简档中的规则来激活或停用与接收和/或通信可用性相关联的用户警报。 在一个实施例中,当接收到通信和/或可用时,设备可以实现规则。 如果激活警报,设备会呈现警报。 如果警报被禁用,设备不会呈现警报,除非和直到警报被激活。 在另一个实施例中,服务器可以实现规则。 如果在将通信传输到设备时激活警报,则服务器还发送警报渲染指令,从而设备可以按照说明中的指示进行警报。 如果在通信发送到设备时警告被禁用,服务器不会发送指令,除非和直到警报被激活。
    • 70. 发明申请
    • Managing Tethered Data Traffic Over a Hotspot Network
    • 管理热点网络上的绑定数据流量
    • US20120240197A1
    • 2012-09-20
    • US13422881
    • 2012-03-16
    • Dzung TranKevin WarmerdamThanh LimRyan MacPhersonBikramjit Singh
    • Dzung TranKevin WarmerdamThanh LimRyan MacPhersonBikramjit Singh
    • H04W12/08
    • H04W12/08H04L63/1416H04W4/00H04W4/50H04W84/12H04W88/04
    • Presented is a system and method for controlling access to a mobile hotspot on a mobile device utilizing a hotspot management application. The method includes detecting unauthorized data traffic over a tethered link between the mobile device and a tethered device by analyzing a signature of the unauthorized data traffic. Analyzing the signature of the unauthorized data traffic may be carried out utilizing a rules engine, where the rules engine is based on one or more carrier controlled tethering policies and one or more user controlled tethering policies. Detecting unauthorized data traffic may further include detecting an unauthorized tethering application on the mobile device utilizing a database of known unauthorized tethering applications. The method further includes controlling the unauthorized data traffic. The method additionally includes redirecting a user of the mobile device to a captive portal for authorized tethering plan support.
    • 提出了一种利用热点管理应用来控制对移动设备上的移动热点的访问的系统和方法。 该方法包括通过分析未授权数据业务的签名来检测移动设备和系留设备之间的系留链路上的未授权数据业务。 可以使用规则引擎来执行未经授权的数据业务的签名的分析,其中规则引擎基于一个或多个载波控制的网段绑定策略和一个或多个用户控制的绑定策略。 检测未经授权的数据业务可以进一步包括利用已知未授权的网络共享应用的数据库在移动设备上检测未授权的绑定应用。 该方法还包括控制未经授权的数据业务。 该方法还包括将移动设备的用户重定向到专用门户以进行授权的网络共享计划支持。