Patent classifications
H04L61/30
Voice and text group chat display management techniques for wireless mobile terminals
A single content region in a chat history display is used to display entries representative of a plurality of messages corresponding to all chat histories for all of chat threads currently engaged in by a given mobile terminal. Additionally, a buddy list display supports management of chat buddies, a detail view display allows otherwise truncated messages to be displayed, and a text message editor display supports the composition of text messages. Each chat user may designate public display identifiers for purposes of identification to other chat users. Additionally, each user may designate private display identifiers for each of his/her buddies, which private display identifiers may be used to replace the public display identifiers for that user's buddies when displayed on the user's mobile terminal. In this manner, the use of speech and text based group chatting and similar services in wireless communication environments is more readily enabled.
Voice and text group chat display management techniques for wireless mobile terminals
A single content region in a chat history display is used to display entries representative of a plurality of messages corresponding to all chat histories for all of chat threads currently engaged in by a given mobile terminal. Additionally, a buddy list display supports management of chat buddies, a detail view display allows otherwise truncated messages to be displayed, and a text message editor display supports the composition of text messages. Each chat user may designate public display identifiers for purposes of identification to other chat users. Additionally, each user may designate private display identifiers for each of his/her buddies, which private display identifiers may be used to replace the public display identifiers for that user's buddies when displayed on the user's mobile terminal. In this manner, the use of speech and text based group chatting and similar services in wireless communication environments is more readily enabled.
System and Method for Blocking Persistent Malware
Systems and methods for allowing and blocking data packets sent to and from browser software applications and non-browser software applications operated on a computing device are described. The systems can use whitelisting based on the maker of a non-browser software application being a trusted source of data packets sent to the non-browser application or based on consensus by one or more consensus trusted computing devices that connections made by an URL open in a browser software application are correct and trusted. The system uses a firewall to block data packets to and from web addresses that are not owned by the maker of the application, are not trusted by the consensus trusted computing devices, or are blocked by selection by a user of the computing device. The system can also include a health monitor engine to ensure a kernel drive of the system is operational and not disabled by malware.
Method and system for efficiently locating in a database a user profile in an IMS network
Method and system for processing a request associated with a user from a requesting node to an answering node in a telecommunications network. A repository is associated with the answering node, the repository including a data structure including a plurality of user profiles associated with a plurality of users. In the answering node a user profile of the plurality of user profiles is associated with the user. The method comprising the steps of assigning a unique user index to each user profile in the data structure, wherein the user index is representative of the location of the user profile within the data structure, communicating at least one user index to the requesting node, incorporating the user index in the request by the requesting node, transmitting the request from the requesting node to the answering node, and retrieving the user profile associated with the user associated with the request by the answering node on the basis of the user index.
Scalable address resolution in a communications environment
A generic address resolution system facilitates communications among multiple network applications with heterogeneous addressing mechanisms, thereby allowing the network applications to interoperate with each other and/or with modules for providing enhanced functionalities. The address resolution system includes a resource mapping module that modularizes the components needed for address resolution and abstracts content from the underlying address types and content used by the network applications. The address resolution system includes a context engine that analyzes the addressing data to be resolved, selects one or more appropriate destination network applications based on contextual rules, and creates the application mapping template for the end-end routing of the communications among the network applications.
Method of processing data in internet protocol television receiver and internet protocol television receiver
A method of processing data in an IPTV receiver and such an IPTV receiver are disclosed. The method includes receiving location information necessary to acquire a content corresponding to a content reference identifier (CRID) by using the CRID, requesting an Internet protocol multimedia subsystem Gateway (IG) to transmit a session description protocol (SDP) file of the content, wherein the content is identified by the CRID and an instance metadata identifier (IMI), receiving the requested SDP file from the IG, and controlling a session setup for processing the content by using the received location information and the received SDP file.
Methods and apparatus for providing map locations in user applications using URL strings
Techniques for use in a wireless communication device for displaying a map are described. The device receives via a user interface a selection of a hypertext link object in an electronic file or message. The object is associated with a URL string which includes a server address and location data corresponding to a location. When a mapping application is installed in the device, the device executes the mapping application for rendering a map of the location in response to receiving the selection of the object. When the mapping application is not installed in the device, the device executes a web browser of the device for receiving and displaying a map image of the location in response to receiving the selection of the object.
System and method employing an agile network protocol for secure communications using secure domain names
A system for connecting a first network device and a second network device includes one or more servers. The servers are configured to: (a) receive, from the first network device, a request to look up a network address of the second network device based on an identifier associated with the second network device; (b) determine, in response to the request, whether the second network device is available for a secure communications service; and (c) initiate a virtual private network communication link between the first network device and the second network device based on a determination that the second network device is available for the secure communications service, wherein the secure communications service uses the virtual private network communication link.
System and method for automatic configuration of domain names by third parties
Systems and methods for creating custom domain name links are provided. At least one server communicatively coupled to a network receives a request to create a custom domain name link to a third party service. The request identifies a custom domain name. The at least one server retrieves, from a third party service link database, an entry for the third party service specifying how to create the custom domain name link for the third party service and the at least one server creates the custom domain name link in accordance with the entry retrieved from the third party service link database.
SYSTEM AND METHOD FOR MODIFYING ELECTRONIC DOCUMENTS TRANSMITTED THROUGH AN INTERMEDIARY
Communications between participants over a communications link are proxied by an intermediary, such as an Integrated Order Mechanism (TOM). Participants interact with each other through the IOM. The IOM may be transparent to the participants such that they are not aware that the IOM is involved in processing communications. For example, in the context of a transaction by a customer making a purchase from a merchant over the Internet, the IOM facilitates the processing of transactions by processing requests from both the customer and the merchant. Neither the customer nor the merchant may be aware that the transactions are being handled by the IOM. Navigation objects may be provided for the communications over a network. For example, a navigation bar may be included on a merchant web page to provide the customer with a link back to a shopping application provided by the IOM.