TWI255626B - Mobility device platform system and method, and computer readable medium thereof - Google Patents

Mobility device platform system and method, and computer readable medium thereof Download PDF

Info

Publication number
TWI255626B
TWI255626B TW93129442A TW93129442A TWI255626B TW I255626 B TWI255626 B TW I255626B TW 93129442 A TW93129442 A TW 93129442A TW 93129442 A TW93129442 A TW 93129442A TW I255626 B TWI255626 B TW I255626B
Authority
TW
Taiwan
Prior art keywords
mobile device
computer
web service
computer environment
environment
Prior art date
Application number
TW93129442A
Other languages
Chinese (zh)
Other versions
TW200522631A (en
Inventor
Peter Bookman
Rick Charles White
Original Assignee
Realm Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Realm Systems Inc filed Critical Realm Systems Inc
Publication of TW200522631A publication Critical patent/TW200522631A/en
Application granted granted Critical
Publication of TWI255626B publication Critical patent/TWI255626B/en

Links

Landscapes

  • Information Transfer Between Computers (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A mobility device platform allowing for secure mobile computing is provided. In an illustrative implementation, an exemplary mobility device platform comprises a mobility device operable to communicate with at least one computing environment through a communications interface and wherein the mobility device is operable to process and store secure web services, a communications network operable to communicate data and computing applications using web services, and a mobility device management server operable to generate, process, store, communicate and encrypt web services to the mobility device. Further, the mobility device management server is operable to perform one or more mobility device management functions to provide encryption keys to cooperating mobility devices and to authenticate and verify cooperating mobility devices requesting web services from the mobility device management server. The mobility device management server and mobility device may further operate to perform authentication and verification using user identification and password information.

Description

1255626 九、發明說明: 主張優先權及交互參考 本專利申請案要求下列美國臨時專利申請案之權利: 2003年9月29曰提出第60/507,197號名為 「GO-KEY SYSTEM」;2003年9月29日提出第60/5 06,9 18號名為「G〇-KEY ONLINE MUSIC SUBSCRIPTION AND DISTRIBUTION APPLICATION AND SERVICE」;2003 年 9 月 29 日提出第 60/506,919號名為「GO-KEY E-MAIL APPLICATION AND SERVICE」;2003年9月29曰提出第60/506,925號名為 「GO-KEY MOBILE DESKTOP ENVIRONMENT」;2004年 1月22日提出第60/543,735號名為「MDMS」;2004年1月22 曰提出第 60/538,763號名為「OMNI FILE SYSTEM (OFS)」; 2004年 1 月 22 日提出第 60/538,915號名為「UDDI DIRECTORY」; 以及2004年1月22曰提出第60/538,767號名為 「UDDI REPOSITORY」,彼等專利申請案皆以引用方式併入本文 中。另外,本專利申請案係相關於以下專利申請案且交互 參考,並且彼等專利申請案皆以引用方式併入本文中: 2〇〇4年4月 30 日提出第 10/836,934號名為「MOBILITY DEVICE SERVER」(代理人檔案號碼45597/196321);以及2004年4 月30日提出第1〇/836,933號名為「MOBILITY DEVICE」 (代理人檔案號碼:45597/196314)。 【發明所屬之技術領域】 本文描述之系統及方法係相關於行動電腦作業技術,最為 重要的是,係關於一種允許利用行動裝置、通信網路及行動 96374.doc 1255626 4置伺服器進行安全的遠端行動電腦作業之行動裝置 【先前技術】 、 里。 企業及個人-致地愈來愈需要行動能力作為其電腦 的,徵部分。對於企業’行動能力允許在各地理位置部署 人貝,使企業為客戶提供更好的服務。例如,大型製藥企 業會,要在接近未來客戶(例如,醫生)的「現場」部= 務人貝。在此背景下,「現場」人員會想要透過安全連線 來存取機密的鎖售和市場資訊以及電腦應用程式。運用現 2的方案,這些人員通常會在工作日結束時,繼續透過某 安王的$⑹網路連線(例如,虛擬私人網路)來進行使其資 料與公司網路「同步化」繁雜工作。㈣之下,個人尋求 其電腦環境的行動能力,以便能夠易取得其㈣及電腦應 用私式,最為舌亚^^曰 、疋,在、、、罔際網路通信期間繼續維持 「連線狀態」。 、狩 為了應響行動電腦作業的需要,電腦環境製造商已開發 出行動電腦作業技術(例如’獨立、連線網路及/或内般 ,襄人們可奴時使用其電腦環境。此類行動裝置旨在 允t使用者隨時「攜帶」其播案及應用程式。雖然這些裝 9仃動此力,但是會由於外型、處理能力及可攜性 Γ而傾向於效率有限。由於彼等限制,繼通常會攜 f大型可攜型電腦, 應 ㈣呆一有所有必要的槽案及電腦 汽現此類方案係以電腦作業系統(computing 本身的設計為前提,即’採用「以裝置為中心」電 96374.doc 1255626 運用「以裝置為中心命 包月包作業’電腦使用者雖然可㉟ 由遠端通信應用程式(例如,、、、、工 、 虛擬私人網路)以遠端且安全 方式來存取檔案,但是仍妙 疋1乃然會攜帶大型笨重的電腦作業設 備來擷取其資料及電腦應 -& e ^ 柱式隶為重要的是,運用以 裝置為中心型電腦作業 a ^ ^ ^ 使用者一般會基於企業電腦作業 需求而配備一個裝置(例士 . ^ y ^ 、 ^ U ]如,公司個人電腦或膝上型電 細)’並且-般會在家中具有供個人使用的—或多個電腦 環境。在維護多個電腦環境過程中,電腦使用者負責使許 多不同電腦環境之間的自打低& α = 目叮偏好設定及各項設定同步化之 作此犬員工作疋件萬分艱矩的事,並且通常會因電腦使 用者無法在不同電腦環境之間存取所要的資料及/或電腦 應用程式而受挫。 似例如’電腦使用者會希望隨時從自己的財務規劃管理電 月自應用程式(例如,Quicken、廳⑽禮m_力取得自己 的財務規劃管理資料,以便處理可能出現的支付款項(例 士到期的帳單)。運用現行方案,電腦使用者需要在每 個:腦環境(包括公司電腦,這可能會違反企業電腦作業 政策及耘序)上安裝財務規劃管理電腦應用程式及資料, 以便可能存取所要的資料。相比之下,企業會想要高效率 且立即終止已解雇之員工對機密公司資料的所有存取權。 f以裝置為中心型電腦作業為基礎的現行實施中,會要求 員^知還其電腦環境(例如,膝上型電腦、個人電腦、行 動包活或個人數位助理)。另外,還會藉由終止即將解雇 之員工的企業使用者目錄資訊,而使得使用公司資料時受 96374.doc 1255626 取權原因就需要一 工從企業電腦環境 依據現行的實施, 到限制。但是,收集此類裝置及終止存 段作業時間。此段作業時間會導致該員 稷製檔案以供未來使用。在此情況下, 可能會洩露機密的企業資料。 攸刚文所述可得知,需要克服現行實施缺 【發明内容】 /發明揭示—種保護行動電腦作業安全性之行動裝置平 堂。在-項例證實施中,一種示例性電子裝置包括:—行 動裝置,其可運作以透過一通信介面與至少一電腦環境通 ,亚且其中該行動裝置可運作成處理及儲存安全的Web 服務;-通信網路,其可運作成使用Web服務來傳達資料 及電腦應用程式;以及—行動裝置管理飼服器,其可運作 以產生、處理、健存及加密關於該行動裝置的W趣務。 =外,該行動裝置管理伺服器可運作以執行一或多項行動 衣置g理功迠,用以提供加密金鑰給合作之行動裝置,以 及鑑認並確認向該行動裝置管理伺服器要求Web服務的合作 之行動裝置。該行動裝置管理伺服器及該行動裝置可進一步 運作以使用使用者識別和密碼資訊來執行鑑認和確認。 在運作過程中,該示例性行動裝置被組態以在一合作之 電腦環境上運用。另外,該行動裝置建置與合作之一或多 個行動裝置管理伺服器之間的通信,並且嘗試由該等合作 之一或多個行動裝置管理伺服器使用所選之鑑認和確認資 讯予以鑑認。在鑑認和確認後,該等合作之一或多個行動 衣置管理词服盗使用Web服務來處理來自於該合作之示例 96374.doc 1255626 性行動裝置的資料和電腦應用程式要求。該等合作之—或 夕個仃動衣置官理伺服器使用該示例性所選之鑑認和確二 資訊(例如,金鑰)來將Web服務加密,以允許從該等合= 之一或多個行動裝置管理词服器與該示例性行動裝置=全 傳達所要求之資料和電腦應用程式。 下文中f進一步說明本文描述之系統及方>去的其他於 徵。 、 【實施方式】 概覽: 本文描述之系統及方法針對電腦作業和行動電腦作業指 供「以使用者為中心」做法。現行電腦作業方案(企業或 個人)-般被設計成使用「以裝置為中心」模型。以褒置 為中心式模型旨在依據裝置指派及指定來管理及追縱使用 者。例如,在企業電腦作業背景下,企業電腦環境可包括 數個词服器電腦環境及許多用戶端電腦環境。-般而言, 企業中的每個使用者都有配備用戶端電腦環境(例如,個 人電腦或膝上型雷雕6η. ^ 般會透過企業通信介面將用戶 端電腦環㈣網路連線至伺服器電腦環境H,如果使 2身在㈣企業通信網路之處,則是透過虛擬私人網路 /卿用戶端電腦環境連線至連線至企業通信網路。另 ’在智知企業電腦環境中,會透過-用於建立使用者權 …〜業貝科和電腦應用程式之關聯性的目錄服 構’來提供使用者的使用者朗資訊及密碼資訊。 運用此類企業雷脱户讲 、 衣兄,通《僅允許使用者使用自己的 96374.doc -10- 1255626 偏好設定及各項設定來自訂所配備的電腦環境,以至於如 果使用者跨網路漫遊且登人非所屬的電腦環料,就無法 存取自己的自訂偏好設定及夂§ 疋及各項5又疋。這項問題通常會發 生在企業使用者身上,企蚩你 止業使用者會想要維護介於其企業 電腦環境與其個人電腦璟培(加上 —丄 ” 自衣^ (例如,豕中的電腦)之間的偏 好設定及各項設定(例如1覽器書籤、桌面的外觀及操 作、色彩配置、應用程式佈局及檔案的目錄結構)同步 化,這通常需要執行手動同步化。 另外’運用現有企業電腦環境來管理許多用戶端電腦環 境變成-項繁重的工作。目#,企業的資訊技術部門雇用 數十人(而不疋數百人)來支援許多使用者及使用者的電腦 環境。除了僅僅實際管理以外,還提出企業資料完整性及 安全性運用以裝置為中心式電腦作業模型。在此背景下, 企業電腦使用者通常需要自行決定複製及包含機密的企業 貝料。由於防止使用者未經授權複製企業槽案及資料是一 項繁重的作,所以大部分企業都忽、視此卫作。對於企業 及個人,這項現有實施的限制可能成本極高。 本文4田述之系統及方法旨在藉由提供運用「以使用者為 中〜」扠型所設計的行動裝置平臺(MDp)來改良現有實施 的缺點。在一項例證實施中,該行動裝置平纟包含至少一 行動裝置(MD),行動裝置可運作以透過通信介面(例如, 通用序列埠(USB)、IEEE 1394通信介面(Firewire)、 802.XX通信介面、blutet〇〇th(藍芽)通信介面、個人電腦介 面小型電腦序列介面及無線應用通訊協定(WAP)通信介 96374.doc 1255626 面)來與一或多個合作的電腦環境(例如,個人電腦、個人 數位助理、行動電話、網路連線型電腦及其他電腦環境) 通信。另外,該行動裝置平臺包括一或多個行動裝置管理 伺服器(MDMS),行動裝置管理伺服器係運作以為合作的 行動裝置及其使用者鑑認、確認及提供使用者管理。 在運作過程中,該行動裝置可與用於調用(invoke) —或 多個工作環境的一或多個電腦環境協作,以便處理Web服 務。可以從位於MD本機中的資料和電腦應用程式來執行 該等Web服務,或是該MD可與一或多個MDMS協作來獲得 所要求的Web服務。該MDMS可運作以鑑認要求方MD,藉 此確保要求方MD具有關於所要求之Web服務的權利及權 限。另外,該MDMS還可與第三方Web服務提供者協作, 藉此獲得所要求的Web服務。在此背景下,該MDMS可採 取動作以將來自非MD原生Web服務格式轉譯成一原生MD Web服務。當將Web服務從該MDMS傳達至多個合作的MD 時,該MDMS與MD都會使用使用者和裝置鑑認和確認資 訊,來進行1028位元及/或2056位元加密(例如,PKI加 密)。該MDMS提供給該MD的Web服務可包括(但不限於)電 腦應用程式及所要資料。另外,該MD可運作以儲存參與 方使用者的自訂設定及偏好設定至該MD的本機中,讓使 用者隨時可取得自訂設定及偏好設定。 以此方式使用行動裝置平臺,使用者就可以在任何數目 的協作電腦環境下進行作業,只要使用者確信其可以在合 作的電腦環境中存取其自訂設定及偏好設定,最為重要的 96374.doc -12- 1255626 是,安全存取自己的電腦應用程式及檔案(例如,提供為 Web服務)。1255626 IX. INSTRUCTIONS: Claims Priority and Cross-Reference The patent application claims the following US provisional patent applications: September 29, 2003, No. 60/507,197 entitled "GO-KEY SYSTEM"; 2003 9 On the 29th of the month, the 60th No. 06, 9 18 was named "G〇-KEY ONLINE MUSIC SUBSCRIPTION AND DISTRIBUTION APPLICATION AND SERVICE"; on September 29, 2003, No. 60/506,919 was named "GO-KEY E- MAIL APPLICATION AND SERVICE"; on September 29, 2003, No. 60/506, 925 was named "GO-KEY MOBILE DESKTOP ENVIRONMENT"; on January 22, 2004, No. 60/543,735 was named "MDMS"; 2004 1 On the 22nd of the month, No. 60/538,763 was named "OMNI FILE SYSTEM (OFS)"; on January 22, 2004, No. 60/538,915 was named "UDDI DIRECTORY"; and January 22, 2004, No. 60/ 538,767 is entitled "UDDI REPOSITORY", the disclosure of which is incorporated herein by reference. In addition, the present patent application is related to the following patent applications and is hereby incorporated by reference herein in its entirety herein in its entirety in the the the the the the the the the MOBILITY DEVICE SERVER (Attorney Profile No. 45597/196321); and April 30, 2004, No. 1/836,933 entitled "MOBILITY DEVICE" (Agency File Number: 45597/196314). FIELD OF THE INVENTION The systems and methods described herein relate to mobile computer technology and, most importantly, to a server that allows for the use of mobile devices, communication networks, and mobile devices for security. Mobile device for remote mobile computer operations [prior art], in. Businesses and individuals - the growing need for mobility as part of their computer. For the enterprise's ability to act, it is allowed to deploy people in various geographical locations, so that enterprises can provide better services to customers. For example, large pharmaceutical companies will be close to the “live” department of future customers (for example, doctors). In this context, "on-site" personnel will want to access confidential lock sales and market information and computer applications through secure connections. With the current 2 solution, these people will usually continue to "synchronize" their data with the company's network through an Anjun's $(6) network connection (for example, a virtual private network) at the end of the working day. jobs. (4) Under the individual's ability to seek the mobility of their computer environment, so that they can easily obtain their (4) and computer application private, and continue to maintain the "connected state" during the communication between the Internet and the Internet. "." In order to respond to the needs of mobile computer operations, computer environment manufacturers have developed mobile computer technology (such as 'independent, connected networks and/or internal, when people use slaves to use their computer environment. Such actions The device is designed to allow users to "carry" their broadcasts and applications at any time. Although these devices are used, they tend to be inefficient due to their size, processing power and portability. Due to their limitations. Following the usual large-scale portable computer, it should be (four) to have all the necessary slots and computer vaporization. Such a scheme is based on the computer operating system (the design of the computing itself is based on the use of the device-centric Electric 96374.doc 1255626 Using the "device-centric life-month package operation" computer users can be remotely and securely accessed by remote communication applications (eg, ,,,,, work, virtual private networks) Accessing files, but still wonderful 1 will carry large and bulky computer equipment to retrieve their data and computer should be -& e ^ column is important, the use of the device for the middle Computer work a ^ ^ ^ Users will generally be equipped with a device based on the needs of corporate computer operations (examples. ^ y ^ , ^ U ], for example, corporate PC or laptop) 'and will be at home Have a personal environment - or multiple computer environments. In the process of maintaining multiple computer environments, the computer user is responsible for synchronizing the self-deactivation & α = target preferences and settings between many different computer environments. This is a very difficult task for the dog, and it is often frustrated by the inability of computer users to access the required data and/or computer applications between different computer environments. For example, 'computer users will want to be at any time. Manage your monthly financial plan management data from your own financial planning (for example, Quicken, Hall (10), to handle possible payment payments (approximate bills). Apply the current plan Computer users need to install financial planning management computers on each: brain environment (including corporate computers, which may violate corporate computer operating policies and procedures) Programs and materials to allow access to the information you want. By contrast, companies will want to efficiently and immediately terminate all access to the confidential company's materials from dismissed employees. fBased on device-centric computer operations In the current implementation, the staff will be asked to know their computer environment (for example, a laptop, a personal computer, a mobile bag, or a personal digital assistant). In addition, the company’s corporate directory will be terminated by the employee who will be dismissed. Information, so that the use of company information by 96374.doc 1255626 for the reason of the right to work from the enterprise computer environment based on the current implementation, to the limit. However, the collection of such devices and the termination of the storage time. This period of operation will Caused the staff to file for future use. In this case, confidential corporate information may be disclosed. As described in the article, we need to overcome the current implementation. [Summary of the Invention] / Invention Revealed - A mobile device that protects the security of mobile computer operations. In an exemplary implementation, an exemplary electronic device includes: a mobile device operable to communicate with at least one computer environment via a communication interface, and wherein the mobile device is operable to process and store secure web services; a communication network operable to communicate data and computer applications using a web service; and a mobile device management server operable to generate, process, store and encrypt the fun of the mobile device. In addition, the mobile device management server is operable to perform one or more actions, to provide an encryption key to the cooperative mobile device, and to authenticate and confirm the request to the mobile device management server. A mobile device for the cooperation of services. The mobile device management server and the mobile device are further operative to perform authentication and confirmation using user identification and password information. In operation, the exemplary mobile device is configured to operate in a cooperative computer environment. In addition, the mobile device establishes communication with one or more mobile device management servers and attempts to manage the server using the selected authentication and confirmation information by one or more mobile device management servers. To be identified. After identification and confirmation, one or more of these collaborations will use the Web service to process the data and computer application requirements from the example 96374.doc 1255626 Sexual Mobile Devices. The cooperation - or the eve of the server, uses the exemplary selected authentication and confirmation information (eg, a key) to encrypt the Web service to allow one of the combinations = Or a plurality of mobile device management word servers and the exemplary mobile device = fully communicating the required data and computer applications. The following description f further illustrates the system and the other features of the description described herein. [Embodiment] Overview: The systems and methods described herein refer to a "user-centric" approach to computer operations and mobile computer operations. Current computer work programs (enterprise or individual) are generally designed to use a "device-centric" model. The device-centric model is designed to manage and track users based on device assignments and assignments. For example, in the context of corporate computer operations, the corporate computer environment can include several computer environments and many client-side computer environments. In general, every user in the enterprise has a client-side computer environment (for example, a personal computer or a laptop-type eagle.) The network of the client computer (4) is connected to the corporate communication interface. The server computer environment H, if the two are in the (4) enterprise communication network, is connected to the enterprise communication network through the virtual private network / Qing client computer environment. Another 'in the smart enterprise computer In the environment, the user's user information and password information will be provided through the directory service used to establish the user right...~ the relevance of the industry and the computer application. , Brother, Tong "Only allow users to use their own 96374.doc -10- 1255626 preferences and settings from the computer environment, so that if users roam across the network and board a non-owned computer With the ring material, you can't access your own custom preferences and 夂§ 疋 and 5 疋. This problem usually occurs in business users, and you will want to maintain it. Corporate computer Preferences and settings between the environment and its personal computer (plus - 丄) self-clothing ^ (for example, a computer in 豕) (such as browser bookmarks, desktop appearance and operation, color configuration, application Layout and file directory structure) synchronization, which usually requires manual synchronization. In addition, 'using the existing enterprise computer environment to manage many client-side computer environments becomes a heavy task. ##, the company's information technology department employs dozens of People (and not hundreds of people) support the computer environment of many users and users. In addition to the actual management, it also proposes a device-centric computer operation model for enterprise data integrity and security. Enterprise computer users usually need to copy and contain confidential corporate materials at their own discretion. Since it is a heavy work to prevent unauthorized copying of enterprise slots and data, most companies ignore this. For businesses and individuals, the limitations of this existing implementation may be extremely costly. The system and method of this article is intended to provide The shortcomings of the existing implementation are improved by a mobile device platform (MDp) designed with a "user-to-center" fork. In an exemplary implementation, the mobile device includes at least one mobile device (MD), the mobile device Operable to communicate through communication interfaces (eg Universal Serial Port (USB), IEEE 1394 communication interface (Firewire), 802.XX communication interface, blumet〇〇th (Bluetooth) communication interface, PC interface small computer serial interface and wireless Application Protocol (WAP) communication 96374.doc 1255626) to communicate with one or more cooperating computer environments (eg, personal computers, personal digital assistants, mobile phones, networked computers, and other computer environments). Additionally, the mobile device platform includes one or more mobile device management servers (MDMS) that operate to authenticate, validate, and provide user management for the cooperating mobile device and its users. In operation, the mobile device can cooperate with one or more computer environments for invoking - or multiple work environments to handle web services. The web services can be executed from data and computer applications located in the MD native, or the MD can cooperate with one or more MDMSs to obtain the requested web services. The MDMS operates to authenticate the requesting party MD, thereby ensuring that the claiming party MD has rights and rights regarding the required web services. In addition, the MDMS can also collaborate with third-party web service providers to obtain the required web services. In this context, the MDMS can take actions to translate the non-MD native web service format into a native MD web service. When a Web service is communicated from the MDMS to a plurality of cooperating MDs, both the MDMS and the MD use user and device authentication and confirmation messages for 1028 bit and/or 2056 bit encryption (e.g., PKI encryption). The web services provided by the MDMS to the MD may include, but are not limited to, a computer application and desired information. In addition, the MD can operate to store the custom settings and preferences of the participating users to the MD's local device, allowing the user to obtain custom settings and preferences at any time. By using the mobile device platform in this way, users can work in any number of collaborative computer environments, as long as the user is confident that they can access their custom settings and preferences in a collaborative computer environment, the most important 96374. Doc -12- 1255626 is to securely access your own computer applications and files (for example, as a web service).

Web服務: 透過如網際網路等通信網路提供的服務(泛稱為Web服務 或應用程式服務)正在成長中。同樣地,促進此類服務的 技術也正在成長中。Web服務可被定義為任何資訊源,用 於執行基於供使用者的應用程式使用而便利套裝的商業邏 輯程序。Web服務曰益成長意謂著,可在網路上利用Web 服務來提供功能。Web服務通常包括某種程式設計與資料 之組合,促使使用者及其他網路連線的應用程式可從應用 程式伺服器來取得Web服務。Web服務的範圍涵蓋如儲存 管理和客戶關係管理等服務,且向下延伸至如提供股票即 時行情及查核拍賣項目投標價等更有限的服務。 著重於定義及標準化Web服務用途的行動包括開發Web 服務描述語言(Web Services Description Language ; WSDL) 〇 WSDL是一種可延伸標記語言(Extensible Markup Language ; XML)格式,用於將Web服務描述為用於處理含文件導向式 或程序導向式資訊之訊息的一組結束點。作業及訊息係以 抽象方式予以描述,並且接著繫結(bound)成具體 (concrete)網路協定及定義結束點的訊息格式。相關的具體 結束點被組合成抽象結束點(服務)。 目前,廣泛主張的Web服務使用方式模型如下: (1) 服務係實施及部署在某站點(通常稱為伺服器方)上。Web services: Services (generally known as Web services or application services) that are provided through communication networks such as the Internet are growing. Similarly, technologies to promote such services are also growing. A web service can be defined as any source of information for executing a business logic program based on a convenient package for use by a user-based application. The growth of Web services means that Web services can be used to provide functionality on the Web. Web services typically include a combination of programming and data that enables users and other network-connected applications to obtain Web services from an application server. Web services cover services such as storage management and customer relationship management, and extend down to more limited services such as providing stock instant quotes and checking auction item bid prices. Actions that focus on defining and standardizing the use of Web services include developing Web Services Description Language (WSDL). WSDL is an Extensible Markup Language (XML) format for describing Web services as being used for A set of end points for processing messages with file-oriented or program-oriented information. The assignments and messages are described in an abstract manner and then bound to the concrete network protocol and the message format defining the end point. The relevant specific end points are combined into an abstract end point (service). At present, the widely used model of Web service usage is as follows: (1) The service system is implemented and deployed on a site (commonly referred to as the server side).

(2) 服務係使用WSDL予以描述並且經由如UDDI 96374.doc -13- 1255626 (Universal Description,Discovery,and Integration ;通用描 述、探索與整合)等手段多以發行,UDDI是一種適用於全 球企業的XML型登錄(XML-based registry),藉此按所提供 的Web服務而列入網際網路上。 (3) 用戶端應用程式藉由先解譯一或多個WSDL文件,藉 此在其他站點處(通常稱為用戶端方)使用Web服務。經過 解譯後,用戶端就可以瞭解相關服務的特性。例如,服務 特性可包括服務API規格,例如:(勾輸入資料類型;(…服 務輸入資料格式;(c)服務存取機制或樣式(例如,Rpc相 對於汛息發送服務);以及(句相關編碼格式。 (4) 用戶端應用程式以各種Web服務瞭解的方式來準備資 料。 ' (5)用戶端應用程式按照一特定服務所指定的方式(例 如,在相關的WSDL文件中指定的方式)來調用該服務。 各種Web服務的輸入資料格式及調用方式皆不相同。例 如,假設某應用程式服務提供者提供一項服務 (getChy Weather),該服務要求如慣例城市名稱(例如,§…(2) SERVICE is described using WSDL and distributed through UDDI 96374.doc -13-1255626 (Universal Description, Discovery, and Integration; general description, exploration and integration). UDDI is a global enterprise. XML-based registry, which is included on the Internet in accordance with the provided Web services. (3) The client application uses the Web service at other sites (often referred to as the client side) by first interpreting one or more WSDL files. After interpretation, the client can understand the characteristics of the related services. For example, the service characteristics may include service API specifications such as: (tick input data type; (... service input data format; (c) service access mechanism or style (eg, Rpc vs. suffocate service); and (sentence related Encoding format (4) The client application prepares the data in a way that various web services understand. ' (5) The way the client application is specified by a specific service (for example, the way specified in the relevant WSDL file) To invoke the service. The input data format and calling method of various web services are different. For example, suppose an application service provider provides a service (getChy Weather), which requires a custom city name (for example, §...

Lake City的慣例城市名稱為SLC)的單_輪人減。一預計 調用此類服務的用戶端應用程式必須椏 、 , 八貝疾寫成,促使該應用 程式内的資料或所輸出的資料能夠祐 幻掖分析以提取城市資 訊。在執行時期,會使用適當的API, 幻丄將所準備的符號傳 遞至getCityWeather服務站點。 然而,假設其他應用程式服務提供者 、考提供類似的服務但 是要求兩個輸入參數,例如,城市 石%及郵遞區號。因 96374.doc 14 1255626 ::果用戶端應用程式預計調用彼等二項服務,則必 二考慮到所要求的服務輸人參數來適當地分析及擷取其資 料。因此,如果_呈一處 早一應用程式預計調用彼等兩項服務, 則必須使用服務特定的欠 疋的API貝訊及程序來硬式編碼該應用 程式°另彳’如果—單—應用程式預計調用許多服務,則 必須使用該應用程式預計調用之每項及所有服務相關的 API貧訊及程序來硬式編碼該應用程式。 女上文所述,各種Web服務都可以提供類似的功能,但 是提供方式不同。本文描述之系統及方法旨在藉由提供一 種具有订動裝置管理伺服器的行動裝置平臺來改良此類不 同點’除了其他項目以夕卜,該行動裝置管理伺服器包括一 Web服務轉譯模組,該Web服務轉譯模組運作以接受來自 Web服務提供者的資料,並且將Web服務以Web服務模型原 型提供給合作的行動裝置。 簡單物件存取通訊協定(SOAP)概覽: 簡單物件存取通訊協定(Simple Object Access Protocol ; SOAP)是一種在分權(decentralized)、分散式環境中用來交 換資訊的輕量型XML架構通訊協定。SOAP支援不同樣式 的資訊交換,包括: 遠端程序啤叫(Remote Procedure Call ; RPC)樣式,其允 許要求回應(request-response)處理,其中一結束點接收一 程序導向式訊息(procedure oriented message),並且回覆 一關聯性的回應訊息(correlated response message)。 訊息導向式資訊交換(Message-oriented information 96374.doc •15- 1255626 exchange),其支援需要交換商業或其他類型文件的組織及 應用,其中會傳送一訊息,但是寄件者不會預期或等待一 立即回應。 一般而言,SOAP訊息係由一 SOAP包絡(SOAP envelope, 其封入兩個資料結構SOAP標頭及SOAP主體)與關於命名 空間(用於定義SOAP訊息)的資訊所組成。標頭屬於選用項 目;如果有標頭,則標頭會運送關於SOAP主體中定義之 要求的資訊。例如,標頭可包含交易、安全性、内容或使 用者設定檔(user profile)資訊。主題包含XML格式的一 Web服務要求或對要求的回覆。下列圖式顯示SOAP訊息的 高階結構。 當使用SOAP訊息來載送Web服務要求及回應時,SOAP 訊息可遵循用於定義可用Web服務的Web服務定義語言 (web services definition language ; WSDL。WSDL可定義 用於存取Web服務的SOAP訊息、可用來交換SOAP訊息的 協定以及可存取Web服務的網際網路位置。WSDL描述項 (descriptor)可駐存在UDDI或其他目錄服務中,並且還可 以經由組態或其他途徑(例如,SOAP要求回覆的主體中)來 提供WSDL描述項。 有一項SOAP規格(例如,w3 SOAP規格,如需相關資 訊,請造訪www.w3.org)提供要求及回應的標準編碼方 式。規格中使用XML結構描述(XML Schema)來描述訊息 内容(message payload)的結構及資料類型。可適用於Web 服務之訊息及回應的SOAP使用方式為: 96374.doc -16- 1255626 SOAP用戶端使用遵循S〇AP規格且含有月良務要求的XML 文件。 SOAP用戶端傳送該文件至一 §〇Ap伺服器,並且該伺月艮 器上執行的SOAP servlet會使用(例如,HTTP或HTTPS)來 處理該文件。Lake City's custom city name is SLC). A client application that expects to invoke such a service must write 八 , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , During the execution period, the appropriate symbols are used to transfer the prepared symbols to the getCityWeather service site. However, assume that other application service providers provide similar services but require two input parameters, such as city stone % and postal code. Because the client application is expected to call these two services, it must take into account the required service input parameters to properly analyze and retrieve its information. Therefore, if _ is one early application and it is expected to call these two services, you must use the service-specific API API and program to hard code the application. Another 'if-single-application expectation To invoke many services, you must hard code the application with every API and all service-related API mitigations and programs that the application expects to call. As mentioned above, various web services can provide similar functionality, but in different ways. The systems and methods described herein are directed to improving such differences by providing a mobile device platform with a subscription device management server. In addition to other items, the mobile device management server includes a web service translation module. The web service translation module operates to accept information from the web service provider and to provide the web service as a prototype of the web service model to the cooperative mobile device. Simple Object Access Protocol (SOAP) Overview: Simple Object Access Protocol (SOAP) is a lightweight XML-architecture protocol for exchanging information in a decentralized, decentralized environment. . SOAP supports different styles of information exchange, including: Remote Procedure Call (RPC) style, which allows for request-response processing, where an end point receives a procedure oriented message (procedure oriented message) And reply to a correlated response message. Message-oriented information (Message-oriented information 96374.doc • 15- 1255626 exchange), which supports organizations and applications that need to exchange commercial or other types of documents, which will send a message, but the sender will not expect or wait for a message Respond immediately. In general, SOAP messages consist of a SOAP envelope (which encapsulates two data structure SOAP headers and SOAP bodies) and information about namespaces (used to define SOAP messages). The header is an option; if there is a header, the header carries information about the requirements defined in the SOAP body. For example, the header can contain transaction, security, content, or user profile information. The topic contains a Web service request in XML format or a response to the request. The following diagram shows the high-level structure of SOAP messages. When using SOAP messages to carry web service requests and responses, SOAP messages can follow a web service definition language (WSDL) that defines the available web services, WSDL can define SOAP messages for accessing web services, A protocol that can be used to exchange SOAP messages and an Internet location where Web services can be accessed. WSDL descriptors can reside in UDDI or other directory services, and can also be configured via configuration or other means (eg, SOAP requires a reply) In the main body) to provide WSDL description items. There is a SOAP specification (for example, w3 SOAP specification, please visit www.w3.org for relevant information) to provide standard coding methods for requirements and responses. The XML structure description is used in the specification ( XML Schema) describes the structure and data type of the message payload. The SOAP method for the message and response of the Web service is: 96374.doc -16- 1255626 The SOAP client uses the S〇AP specification and contains The XML file required by the monthly service. The SOAP client transmits the file to a §Ap server, and the SOAP serv executed on the server Let will use (for example, HTTP or HTTPS) to process the file.

Web服務接收該SOAP訊息,並且將當做一訊息引動過程 (service invocation)的該訊息分派(dispatch)至用於提供所 要求之服務的應用程式。 再次使用該SOAP協定,將一來自該服務的回應傳回至 该SOAP伺服器,並且將該訊息傳回至該原始s〇Ap用戶 端0 顯而易見,雖然本文描述s〇Ap作為適用於本文描述之 系統及方法的通信協定,但是此說明内容僅僅是例證,本 文掐述之系統及方法可採用各種通信協定及訊息發送標 準。 例證性電腦環境 圖1、、曰不根據本文描述之系統及方法的示例性電腦系統 〇〇 a腦系、统1 〇〇處夠執行各種作業系統⑽及可在作業 系統刚上運作的電腦應用程式,(例如,WeM劉覽器及 m王电斶糸統 仃動杲面環境) • ——文又:任Μ月Ε» 體形式的電腦可讀型指合 、 主?日7 何處及如何儲存及存取此翻 體的方式。此類軟體可左 _ 一 」在中央處理早元(CPU) 11 0内 行’藉此促使資料處理车 糸、、先100運作。在許多已知的1 伺服器中,會運用盤&I + 連用%為嘁處理器的微電子晶片0:1}11來^ 96374.doc 1255626 工作站及個人電腦中央處理單元丨i 〇。副處理器i 1 5是— 不同於主CPU 110的選用之處理器,用於執行額外功能= * 輔助CPU 110。可透過互連H2將CPU 11〇連接至副處理器 - U5。一種通用類型副處理器是浮點運算副處理器,也稱 為數值或數學副處理器,其被設計成以比—般用途CPU 110更快速地執行數值計算。 顯而易見,雖然圖中所示之例證性電腦環境包含單一 CPU 110,但是此說明内容僅僅是例證,電腦環境⑽可包 含數個CPU 110。另外,電腦環境100還可以透過通信網路馨 160或其他資料通信構件(圖中未繪示)來利用遠端cpu(圖 中未顯示)的資源。 在運作過程中,CPU 110擷取、解碼及執行指令,並且· 經由電腦的主要資料傳輸路徑(系統匯流排i 0 5)來傳出及傳 -入貧源的資訊。此一系統匯流排連接電腦環境100中的各 組件,並且定義資料交換媒體。系統匯流排105通常包括 用於傳送資料的資料線、用於傳送位址的位址線以及用於 傳送中k/f和用於操作該系統匯流排的控制線。此一系統匯 抓排的貫例是PCI (周邊組件互連)匯流排。某些現今的進 階匯流排提供一種稱為匯流排仲裁的功能,用於管理擴充 卡、控制器及CPU 110對匯流排之存取。附接至彼等匯流 排且仲裁接管匯流排的裝置稱為匯流排主控(bus master)。 支棱匯流排主控還允許藉由附加含有處理器及支援晶片的 匯流排主控卡來建立彼等匯流排的多處理器組態。 - 耦合至系統匯流排105的記憶體裝置包括隨機存取記憶 96374.doc -18· 1255626 體(RAM) 1 25及唯讀記憶體(ROM) 1 3 0。此類記憶體包含 允终儲存及操取資訊的電路。ROM 130通常包含無法被修 改的儲存之資料。CPU 110或其他硬體裝置可讀取或變更 RAM 1 25中所儲存的資料。可由記憶體控制器12〇來控制 RAM 125及/或ROM 130之存取。記憶體控制器12〇可提供 位址轉譯功能,用於轉譯虛擬位址成為指令所執行的實體 位址。記憶體控制器120還可提供記憶體保護功能,用於 隔離系統内的處理序及隔離系統處理序(system ^⑽以^與 使用者處理序(user process)。因此,在執行模式中執行程 式通常僅能存取自已處理序虛擬位址空間所映射的記憶 體,而無法存取其他處理序虛擬位址空間内的記憶體,除 非已設定處理序之間的記憶體共用。 此外,電腦系統100可包括周邊裝置控制器135,周邊裝 置控制器135負責將指令從CPU 11〇傳達至周邊裝置,例 如,印表機14〇、鍵盤145、滑鼠15〇及資料儲存機155。 顯示器165(受控於顯示器控制器163)的用途是顯示電腦 系統100所產生的可見輸出。此類可見輸出可包括文字、 圖形、動晝及視訊。可使用CRT型視訊顯示器、lcd型平 面顯示器、氣體電漿型平面顯示器、觸控式面板或其他顯 不器形式來實作顯示器165。顯示器控制器163包括用以產 生要傳运至顯示器i 6 5之視訊訊號所需的電子組件。 另外,電腦系、统1〇〇還可包含網路卡17〇,'網路卡17〇的 用途是將電腦系㈣〇連接至外料信網路_。通信網路 160可提供電腦使用者以電子方式傳達及傳送軟體和資訊 96374.doc -19- 1255626 的途徑。另外,通信網路16〇 式處理涉及數台電腦,並且會在二=式處理,分散 =協作。應明白’如圖所示的網路連接是示範性的網 =接,並且可使㈣他的裝置來建立電腦之間的通訊連 應明白’示例性電腦系統丨。。僅僅是適合本文描述之率 、=方法運作的例證性電腦環境,而不是限制本文描述之 2 =方法在具有不同組件及組態之電腦環境中的實施, 在一有各種組件及組態的各種雷 述之本發明觀念。 衣兄_可貫施本文描 例證性電腦網路環境: —如上文所述之電腦系統1()()可部㈣電腦㈣up 二前文關於電腦環境的說明内容適用於部署於網 路仏中的伺服器電腦及用戶端電腦。圖場示-種可採 :本文描述之系統及方法的示例性網路連線電腦環境 、、具有經由通信網路與用戶端電腦通訊的飼服器。 2 2所不’健5 2G5可經由通訊網路16G (可能是固線或 ^ LAN、侧、内部網路、外部網路、對等式網路、網 y周路或其他通信網路)而互連於數㈣戶端電腦環境, :如’平板式個人電腦210、行動電話215、電話220、個 人電腦_及個人數位助理225。另外,本文描述之系統及 :法可經由通信網路16〇與汽車電腦環境(圖中未緣示)、消 币性電子裝置電腦環境(圖t未緣示)及建築物自動化” "腦環境(时切示)協合。例如,在通訊網路⑽是網際 96374.doc -20- 1255626 網路的網路環境中,伺服器205可能是專用電腦環境伺服 器,其可運作以處理Web服務,並且經由任何數目的已知 通訊協定(例如,超文字傳輸通訊協定(Hypertext Transfer Protocol ; HTTP)、檔案傳輸通訊協定(file transfer protocol ; FTP)、簡單物件存取通訊協定(Simple Object Access Protocol ; SOAP)或無線應用通信協定(wireless application protocol ; WAP)),將Web服務傳入及傳出用戶端電腦環境 100、210、215、220和225。每個用戶端電腦環境100、 210、215、220和225還可配備瀏覽器作業系統180(其可運 作以支援如Web瀏覽器(圖中未繪示)等一或多個電腦應用 程式),或配備行動桌面環境(用以獲得存取伺服器電腦環 境205)。 在運作過程中,使用者(圖中未繪示)可互動於用戶端電 腦環境上執行的電腦應用程式,藉此獲得所要的資料及/ 或電腦應用程式。資料及/或電腦應用程式可儲存在伺服 器電腦環境205上,並且透過示例性通信網路1 60傳達至透 過用戶端電腦環境100、210、215、220和225合作的使用 者。參與方使用者會使用Web服務交易來要求存取伺服器 電腦環境205上完整或部分裝載的特定資料及應用程式。 可在用戶端電腦環境100、210、215、220和225與伺服器 電腦環境之間傳達這些Web服務交易,以進行處理及儲 存。伺服器電腦環境205可裝載電腦應用程式、處理序 (process)及程式項(applet),用以產生、鑑認及傳達Web服 務,並且可與其他伺服器電腦環境(圖中未繪示)、第三方 96374.doc -21 - 1255626 服矛,k供者(圖中杨示)、網路附接式儲存裝置㈣醫^ attached storage ; NAS)和儲存區域網路(咖哪咖 netW〇rk;SAN)協作,以便實現彼等Web服務交易。 因此’在具有用來存取網 A立勤於網路的用戶端電腦 環境及用來互動於用戶诚兩日似肪 用戶知私恥%境的伺服器電腦環境的電 腦網路環境中,可利用本文描述之系統及方法。作是,可 運用各種網路架構來實施用於提供行動裝置平臺的系統及 方法,因此,不應限定於所+恭 疋於所不之貫例。現在將引用本例證 性實施來詳細說明本文描述之系統及方法。 行動裝置平臺組件之協作: 圖3繪示介於示例性行動裝置平臺之組件間的示例性互 動身又而。,如圖3所示,示例性行動裝置平臺300 (簡 言之)可包括示例性行動裝置31〇,其使用依據一所選用之 通信協定(圖中未綠示)運你&、s ρ人 )連作的通仏;|面3〇5來與用戶端電腦 %•境10 0協作0另外,示仓丨降并說另士 不例性仃動裝置平臺300可進一步包 括通#網路160 (如圖丨所示)及伺服器電腦環境2〇5。 在運作過程中,該行動p署 订動衣置可透過通信介面來與用戶端 電腦環境100協作,以俑拙AA 士人y ^ 乂便執仃源自於行動裝置310的一或多 個電腦應用程式1 80,,並日玎#扣 夏且了顯不在该用戶端電腦環境100 上以供使用者互動。電腦應用程式180,可包括(但不限於) 用於提供白知作業系統外觀和操作的瀏覽器應用程式、文 書處理應用程式、試算表、警祖痛旛 、斤衣貝枓庫應用程式、Web服務應 用程式及使用者管理’偏好設定應用程式。另夕卜,行動裝 置310可使用用戶端電腦環境1⑻,經由通信網路160來與 96374.doc -22- 1255626 伺服器電腦環境205協作,以便獲得Web服務形式的資料 及/或電腦應用程式。 圖4繪示介於示例性行動裝置平臺400之組件間的互動。 如圖4所示,示例性行動裝置平臺400包括行動裝置(MD) 405、電腦環境410、通信網路435、行動裝置管理伺服器 (MDMS) 420及第三方Web服務提供者440。另外,如MD分 解圖進一步所示,MD 405進一步包括處理單元(PU)、作業 系統(OS)、儲存記憶體(RAM/ROM)及一 MD通信介面。而 且,MDMS 420進一步包括轉譯引擎425、Web服務430及 加密引擎445。 在運作過程中,MD 405使用一或多個MD組件PU、 OS、RAM/ROM和MD通信介面,透過MD/電腦環境通信介 面410來與電腦環境415通信。當與電腦環境415通信時, MD 405可啟動一或多個電腦應用程式(圖中未繪示),其可 包括(但不限於)作為組態部分的行動桌面環境、使用者自 訂及鑑認管理員及Web服務應用程式。已設定組態後,MD 405可進一步與電腦環境415協作,以便處理一或多個Web 服務(例如,Web服務資料及/或電腦應用程式)。在此背景 下,MD 405可使用通信網路435來向合作的MDMS 420要 求Web服務資料及/或電腦應用程式’以便處理彼等Web服 務。在此案例中,MDMS 420可運作以鑑認MD 405,藉此 確保參與方使用者(圖中未繪示)及行動裝置405具有所要求 之資料及/或電腦應用程式的正確權限。此類鑑認程序還 可採用作為使用者鑑認部分之一或多個安全性周邊裝置’ 96374.doc -23- 1255626 包括(但不限於)生物測定安全性周邊裝置(圖中未繪示)、 視網膜掃描安全性周邊裝置(圖中未繪示)及安全性語音辨 識周邊裝置(圖中未繪示)。 如果已經過適當鑑認,MDMS 420可進一步運作以在 MDMS 420本機尋找所要求之資料及/或電腦應用程式’並 且透過通信網路435將彼等所要求之資料及/或電腦應用程 式(例如,Web服務)提供給該經鑑認之MD 405,或者, MDMS 420可運作以與第三方服務提供者440協作’以便獲 得要傳達給該經鑑認之MD 405的Web服務。當與苐二方 Web服務提供者440協作時,MDMS 420可運作以使用轉譯 引擎425,將源自於第三方Web服務提供者440的Web服務 430轉譯成MD原生(native)格式。 另外,MDMS 420可運作以在滿足來自於經鑑認之MD 405的Web服務要求時,使用加密引擎445來加密所要求的 Web服務。另外,MDMS 420可進一步運作以使用一所選 的加密協定(例如,PKI加密)來與檔案系統(圖中未繪示)協 作,以便獲得要傳達給MD 405的Web服務。合作的播案糸 統可包括(但不限於)檔案配置表(file allocation table ; FAT)檔案系統及新技術檔案系統(new technology files system ; NTFS) 〇 圖5繪示介於示例性行動裝置平臺之另一項例證實施。 如圖所示,示例性行動裝置平臺500包括MD 505,MD 505 透過M D /電腦環境通信介面5 10與複數個電腦環境(電腦環 境,,八,’515、電腦環境,,8,,525,直到電腦環境”^ 520)協 96374.doc -24- 1255626 作。此外,行動裝置平臺500進一步包括通信網路530、第 三方Web服務提供者585、java虛擬機器(JVM)模擬器及提 供器、複數個MDMS(MDMS ’’A” 535處理Web服務540、 MDMS ”ΒΠ 處理 Web 服務 550,直到 MDMS ’’N” 555 處理 Web 服務560)。另外,如虛線所示,在另一項例證實施中,行 動裝置平臺500可進一步包括:處理Web服務580的MDMS nCn通信網路570及防火牆565。 在一項例證運作中,配合一或多個電腦環境5 1 5、525直 到5 20—起協作的行動裝置505可在電腦環境515、525直到 520上處理瀏覽及控制Web服務。在此背景下,MD 505可 經由通信網路530來向合作的MDMS 535、MDMS 545直到 MDMS 555要求Web服務540、550或560。在此情況下, MDMS 535、MDMS 545 直到 MDMS 555 中任一MDMS 運作 以鑑認要求方MD 505,藉此確保該MD 505具有關於所要 求之Web服務的權利、使用權及權限。成功鑑認和確認之 後,MDMS 535、MDMS 545直到MDMS 555可運作以處理 MD 505要求及提供所要求之Web服務。MDMS 535、 MDMS 545直到MDMS 555可進一步運作以將所要求之Web 服務(若有需要,例如,Web服務源自於第三方Web服務提 供者585)轉譯成MD 505原生(native) Web服務格式。此 外,MDMS 53 5、MDMS 545直到MDMS 555可運作以使用 鑑認和確認資訊來加密所要求之Web服務,以確保以安全 方式透過通信網路530來傳達所要求之Web服務。 另外,行動裝置平臺500可運作以藉由採用java虛擬機 96374.doc -25 - 1255626 器來獲得前版資料及/或電腦應用程式。在此背景下,md 可與動態JVM模擬器及提供器(雖然圖令未繪示,作是 可構成MDMS 535、545直到555中之_或多個助⑽的一 部分)協作’來向前版系統590要求資料及/或電腦應用程 式。動態JVM模擬器及提供器595可運作以與前版系統59〇 協作’以獲得要求方MD 505所要求的前版資料及/或電腦 應用程式。在此背景下,動態JVM模擬器及提供器可產生 要在前版系統上運作的一或多個>va虛擬機器,以將所要 求的貝料及/或電腦應用程式以Web服務形式提供給md \〇5。再者,類似於]^1)1^3運作方式,動態模擬器及 提供器可先鑑認MD 505,之後才獲得所要求的資訊。 行動裝置平臺500允許行動裝置5〇5使用多個工作環境。 換言之,單一行動裝置5〇5可運作以支援多個參與方使用 者的數個「個性」。例如,一參與方使用者㈤中未繪示)可 選擇使用同一台行動裝置以供共同使用及多人使用之用。 在此a景下,行動裝置可運作以在行動裝置内提供複數個 工作壞境」,促使利用所屬組別的使用者/裝置鑑認和確 涊貝吼來官理每個工作環境。據此,當一參與方使用者 (圖中未#示)想要從其公司網路(例如,假設MDMS,,A,, 535疋一公司伺服器)擷取資訊時,則可以藉由使用該參與 方使用者的公司使用者鑑認及識別資訊,來登入MD 505 並且啟動第一工作環境(圖中未繪示)。公司MDMS (例如, 基於此例證說明之目的,公司,,A,,535)進 行依據使用者的公司使用者鑑認和確認資訊來鑑認該使用 96374.doc -26· 1255626 者,並且如果已經過鑑認作業,則可經由通信網路530 (例 如基於此例證祝明之目的,通信網路別為公司LAN)來 處理MD 505的Web服務要求。由於公司MDMS "a,,已The web service receives the SOAP message and dispatches the message as a service invocation to the application for providing the requested service. Again using the SOAP protocol, a response from the service is passed back to the SOAP server, and the message is sent back to the original sA client 0, although this article describes s〇Ap as applicable to the description herein. Communication protocols for systems and methods, but the description is merely illustrative, and the systems and methods described herein may employ various communication protocols and messaging standards. Illustrative computer environment diagram 1. An exemplary computer system that does not according to the systems and methods described herein is capable of executing various operating systems (10) and computer applications that can be operated on the operating system. Program, (for example, WeM Liu Yu and m Wang Electric System to shake the face environment) • —— Wen: Ren Yiyue Ε » Computer-readable type of the body, the main? Day 7 Where and how to store and access this flip. Such software can be left _ _ in the central processing early (CPU) 11 0 line to promote the data processing vehicle, first 100 operations. In many known 1 servers, the disk &I + is used to connect the microelectronic chip 0:1}11 to the 96374.doc 1255626 workstation and PC central processing unit 丨i 〇. The secondary processor i 1 5 is - an optional processor different from the primary CPU 110 for performing additional functions = * secondary CPU 110. The CPU 11〇 can be connected to the sub processor - U5 via the interconnect H2. One general type of secondary processor is a floating point arithmetic secondary processor, also referred to as a numerical or mathematical secondary processor, which is designed to perform numerical calculations faster than the general purpose CPU 110. It will be apparent that although the illustrative computer environment shown in the figures includes a single CPU 110, this description is merely illustrative and the computer environment (10) may include a number of CPUs 110. In addition, the computer environment 100 can also utilize resources of the remote CPU (not shown) through the communication network xin 160 or other data communication components (not shown). During operation, the CPU 110 retrieves, decodes, and executes the instructions, and transmits and transmits information to the poor source via the computer's primary data transmission path (system bus i 0 5). This system bus connects the components in the computer environment 100 and defines the data exchange medium. The system bus 105 typically includes a data line for transmitting data, an address line for transmitting an address, and a control line for transmitting the k/f and for operating the system bus. A common example of this system is the PCI (Peripheral Component Interconnect) bus. Some of today's advanced bus bars provide a function called bus arbitration for managing expansion card, controller and CPU 110 access to the bus. Devices that are attached to their busbars and arbitrate to take over the busbar are called bus masters. The ribbed bus master also allows the multiprocessor configuration of their busbars to be established by attaching busbar master cards containing processors and supporting chips. - The memory device coupled to the system bus 105 includes random access memory 96374.doc -18· 1255626 body (RAM) 1 25 and read only memory (ROM) 1 3 0. Such memory contains circuitry that allows storage and operation of information. ROM 130 typically contains stored material that cannot be modified. The CPU 110 or other hardware device can read or change the data stored in the RAM 150. Access to RAM 125 and/or ROM 130 can be controlled by memory controller 12A. The memory controller 12 can provide a address translation function for translating the virtual address into the physical address of the instruction. The memory controller 120 can also provide a memory protection function for isolating the processing sequence in the system and the isolation system processing sequence (system ^ (10) to ^ and the user process (user process). Therefore, executing the program in the execution mode Generally, only the memory mapped by the processed virtual address space can be accessed, and the memory in the other processing virtual address space cannot be accessed unless the memory sharing between the processing sequences is set. 100 may include a peripheral device controller 135 that is responsible for communicating instructions from the CPU 11 to peripheral devices, such as printer 14 键盘, keyboard 145, mouse 15 〇, and data storage 155. Display 165 ( The purpose of the controlled display controller 163) is to display the visible output produced by the computer system 100. Such visible output can include text, graphics, animation, and video. CRT type video display, lcd type flat panel display, gas power can be used. A display device 165 is implemented in the form of a paddle flat panel display, a touch panel or other display device. The display controller 163 includes a display controller 163 for generating a transport to display The electronic components required for the video signal of the device i 6 5. In addition, the computer system and the system 1 can also include a network card 17〇, and the purpose of the network card 17 is to connect the computer system (four) to the external mail. Network _. Communication network 160 provides a means for computer users to electronically communicate and transmit software and information 96374.doc -19-1255626. In addition, communication network 16-inch processing involves several computers and will be in two = type processing, decentralized = collaboration. It should be understood that the network connection shown in the figure is an exemplary network = connection, and that (4) his device to establish communication between computers should understand 'exemplary computer system丨It is merely an illustrative computer environment suitable for the rate described in this article, = method operation, and not limited to the implementation of the 2 = method described in the computer environment with different components and configurations, in various components and configurations The various inventive concepts of the invention. Brothers _ can be used to describe the illustrative computer network environment: - computer system 1 () () can be described above (four) computer (four) up two previous text on the computer environment Suitable for deployment on the web The server computer and the client computer in the road. The field shows an exemplary network connection computer environment of the system and method described in this paper, and the feeding service with the communication between the user and the computer via the communication network. 2 2 not 'Health 5 2G5 can be connected via communication network 16G (may be fixed line or ^ LAN, side, internal network, external network, peer-to-peer network, network y road or other communication network) It is interconnected with a number of (four) client computer environments, such as 'tablet PC 210, mobile phone 215, phone 220, personal computer _ and personal digital assistant 225. In addition, the system described herein can be communicated via a communication network. 16〇 Conforms with the automotive computer environment (not shown in the figure), the computer environment of the money-saving electronic device (not shown) and the building automation " brain environment (time-cutting). For example, in a network environment where the communication network (10) is the Internet 96374.doc -20-1255626 network, the server 205 may be a dedicated computer environment server that is operable to process web services and via any number of known communications. Agreement (for example, Hypertext Transfer Protocol (HTTP), file transfer protocol (FTP), Simple Object Access Protocol (SOAP) or wireless application communication protocol (wireless) Application protocol ; WAP)), the web service is passed in and out of the client computer environment 100, 210, 215, 220 and 225. Each of the client computer environments 100, 210, 215, 220, and 225 can also be equipped with a browser operating system 180 (which can operate to support one or more computer applications such as a web browser (not shown)). Or equipped with a mobile desktop environment (to obtain an access server environment 205). During operation, the user (not shown) can interact with the computer application executed on the client's computer environment to obtain the desired data and/or computer application. The data and/or computer application can be stored on the server computer environment 205 and communicated through the exemplary communication network 1 60 to users cooperating through the client computer environments 100, 210, 215, 220, and 225. Participant users will use Web service transactions to request access to specific data and applications that are fully or partially loaded on the server computer environment 205. These web service transactions can be communicated between the client computer environments 100, 210, 215, 220, and 225 and the server computer environment for processing and storage. The server computer environment 205 can load computer applications, processes, and applets to generate, authenticate, and communicate Web services, and can be used with other server computer environments (not shown), Third party 96374.doc -21 - 1255626 Serving spear, k donor (in the picture), network attached storage device (4) medical attached storage; NAS) and storage area network (Cana NET netW〇rk; SAN) Collaboration to enable their Web services transactions. Therefore, in a computer network environment with a client computer environment for accessing the network A, and a server computer environment for interacting with the user. Utilize the systems and methods described herein. As a result, various network architectures can be used to implement the systems and methods for providing mobile device platforms, and therefore should not be limited to what is not the case. The system and method described herein will now be described in detail by reference to this illustrative embodiment. Collaboration of Mobile Device Platform Components: Figure 3 illustrates an exemplary interaction between components of an exemplary mobile device platform. As shown in FIG. 3, the exemplary mobile device platform 300 (in short) may include an exemplary mobile device 31 that uses a communication protocol (not shown in the figure) to transport you & s ρ People) continuous overnight; | face 3〇5 to cooperate with the client computer%•境10 0 cooperation 0 In addition, the display of the warehouse drop and said that the alternative device platform 300 can further include the network #160 (As shown in Figure )) and the server computer environment 2〇5. In operation, the action can be used to collaborate with the client computer environment 100 through the communication interface to enable the AA staff to perform one or more computers originating from the mobile device 310. The application 1 80, and the day 玎 # buckle summer is not visible on the client computer environment 100 for user interaction. The computer application 180 may include, but is not limited to, a browser application, a word processing application, a spreadsheet, a police ancestor, a tycoon application, and a web application for providing a look and operation of the mobile system. Service application and user management 'preferences application. In addition, the mobile device 310 can use the client computer environment 1 (8) to communicate with the 96374.doc -22-1255626 server computer environment 205 via the communication network 160 to obtain data and/or computer applications in the form of web services. 4 illustrates the interaction between components of an exemplary mobile device platform 400. As shown in FIG. 4, the exemplary mobile device platform 400 includes a mobile device (MD) 405, a computer environment 410, a communication network 435, a mobile device management server (MDMS) 420, and a third party web service provider 440. Further, as further shown in the MD decomposition diagram, the MD 405 further includes a processing unit (PU), an operating system (OS), a storage memory (RAM/ROM), and an MD communication interface. Moreover, MDMS 420 further includes a translation engine 425, a web service 430, and an encryption engine 445. In operation, the MD 405 communicates with the computer environment 415 via the MD/computer environment communication interface 410 using one or more of the MD components PU, OS, RAM/ROM and MD communication interfaces. When communicating with the computer environment 415, the MD 405 can launch one or more computer applications (not shown), which can include, but are not limited to, a mobile desktop environment, user customization, and authentication as part of the configuration. Identify administrators and web service applications. Once the configuration has been set, the MD 405 can further cooperate with the computer environment 415 to process one or more web services (eg, web service profiles and/or computer applications). In this context, the MD 405 can use the communication network 435 to request web service data and/or computer applications from the cooperating MDMS 420 to handle their web services. In this case, the MDMS 420 can operate to identify the MD 405, thereby ensuring that the participant user (not shown) and the mobile device 405 have the correct permissions for the required data and/or computer application. Such an authentication procedure may also be employed as one or more of the security peripherals of the user's authentication section '96374.doc -23-1255626 including but not limited to biometric security peripherals (not shown) The retinal scanning safety peripheral device (not shown) and the security speech recognition peripheral device (not shown). If properly identified, MDMS 420 may further operate to locate the required data and/or computer application on the MDMS 420 and to communicate the required data and/or computer applications via the communication network 435 ( For example, a web service is provided to the authenticated MD 405, or the MDMS 420 is operable to cooperate with the third party service provider 440 to obtain a web service to be communicated to the authenticated MD 405. When collaborating with the two-party web service provider 440, the MDMS 420 can operate to translate the web service 430 originating from the third party web service provider 440 into an MD native format using the translation engine 425. Additionally, MDMS 420 can operate to encrypt the required web service using encryption engine 445 when the web service requirements from authenticated MD 405 are met. In addition, MDMS 420 can be further operative to cooperate with a file system (not shown) using a selected encryption protocol (e.g., PKI encryption) to obtain a Web service to be communicated to MD 405. The cooperative broadcast system may include (but is not limited to) a file allocation table (FAT) file system and a new technology files system (NTFS). FIG. 5 illustrates an example mobile device platform. Another example implementation. As shown, the exemplary mobile device platform 500 includes an MD 505 through an MD/computer environment communication interface 5 10 and a plurality of computer environments (computer environment, eight, '515, computer environment, 8, 525, Until the computer environment "^ 520", 96374.doc -24-1255626. In addition, the mobile device platform 500 further includes a communication network 530, a third-party web service provider 585, a java virtual machine (JVM) simulator and a provider, A plurality of MDMSs (MDMS ''A" 535 handles web services 540, MDMS" ΒΠ process web service 550 until MDMS ''N' 555 processes web service 560). Additionally, as shown by the dashed lines, in another exemplary implementation, the mobile device platform 500 can further include an MDMS nCn communication network 570 and a firewall 565 that processes the web service 580. In an exemplary operation, a mobile device 505 that cooperates with one or more computer environments 515, 525 to 520 can process browsing and controlling web services in computer environments 515, 525 through 520. In this context, MD 505 can request web services 540, 550 or 560 from cooperating MDMS 535, MDMS 545 through MDMS 555 via communication network 530. In this case, MDMS 535, MDMS 545 until any MDMS in MDMS 555 operates to authenticate the requesting party MD 505, thereby ensuring that the MD 505 has rights, usage rights, and rights with respect to the requested Web service. After successful authentication and validation, MDMS 535, MDMS 545, until MDMS 555 is operational to process MD 505 requirements and provide the required web services. MDMS 535, MDMS 545 until MDMS 555 can further operate to translate the required web services (e.g., web services originating from third party web service providers 585 if needed) into MD 505 native web service formats. In addition, MDMS 53 5, MDMS 545, until MDMS 555 is operational to encrypt and authenticate the required web services using authentication and confirmation information to ensure that the required web services are communicated through communication network 530 in a secure manner. In addition, the mobile device platform 500 can operate to obtain pre-data and/or computer applications by using the java virtual machine 96374.doc -25 - 1255626. In this context, md can be used with the dynamic JVM simulator and provider (although not shown in the figure, it can constitute MDMS 535, 545 until 555 or a part of multiple help (10)) to the front version system 590 requires data and / or computer applications. The dynamic JVM simulator and provider 595 can operate to cooperate with the front-end system 59 to obtain the front-end data and/or computer application required by the requesting party MD 505. In this context, the dynamic JVM simulator and provider can generate one or more >va virtual machines to be run on the pre-system to provide the requested bedding and/or computer applications as web services. Md \〇5. Furthermore, similar to the operation of ^^1)1^3, the dynamic simulator and the provider can first recognize the MD 505 before obtaining the required information. The mobile device platform 500 allows the mobile device 5〇5 to use multiple work environments. In other words, the single mobile device 5〇5 can operate to support multiple "personalities" of multiple participant users. For example, a participant user (not shown in (5)) may choose to use the same mobile device for common use and multi-person use. In this context, the mobile device can operate to provide multiple work environments within the mobile device, prompting the use of the users/devices of the respective group to identify and confirm the work environment for each work environment. According to this, when a participant user (not shown in the figure) wants to retrieve information from his company network (for example, assuming MDMS, A, 535, a company server), it can be used by using The user user identification and identification information of the participant user logs in to the MD 505 and starts the first working environment (not shown). The company MDMS (for example, for the purposes of this illustration, company, A, 535) performs the identification of the user's user identification and confirmation information to identify the use of 96374.doc -26· 1255626, and if After the authentication operation, the Web service requirements of the MD 505 can be handled via the communication network 530 (e.g., for the purposes of this illustration, the communication network is not the corporate LAN). Because the company MDMS "a, has

使用該參與方使用者的公司使用者㈣和心資訊來鑑認 方使用者,因而得以確保在此情況下提供給MD 5〇5的資料及/或電腦應用程式會以安全方式傳達給經適當 鑑S忍的參與方使用者。 “同樣也如果麥與方使用者(圖中未繪示)想要從其公司 電腦環境來存取遊戲Web服務提供者(例如,mdms ”c" 58〇),則該參與方使用者可藉由在MD 505上啟動第二工作 環境(圖中未緣示)來進行切換至其「個人」。使用者可藉由 登出其公司作環境’並錢用其遊戲使用者W及密瑪(例 如,使用者鑑認和確認資訊)來登入遊戲工作環境,以此 方式,調用遊戲卫作環境。在此f景下,參與方使用者可 透過菊鏈方式來存取MDMS "c" 575,其方式為透過通信 網路530來存*MDMS,,A” 535,接著透過公司防火踏⑹ 且經由外部通信網路(例如 網際網路)來存取遊戲Web服 參與方使用者可使用一具 由充分利用各種使用者鑑 務MDMS ”C” 580。以此方式, 有多個工作環境的單一 MD,藉 認和確認資訊,以安全方式杳每 文万八不貝、現其公司及個人電腦作業 需求。 從前文可得知,行動裝置平臺500的運作方式能夠促使 單一行動裝置與複數個異質電腦環境互動。合作之電腦環 境的實例包括(但不限於)獨立電腦環境 '網路連續型電腦 96374.doc -27 - 1255626 w兄及内肷式電腦環境。在内嵌式電腦環境背景下,可採 用本文&述之系統及方法以允許與内嵌式汽車電腦環境互 動…便自αΤ α車駕駛及舒適設定(例如,行動裳置可被 組態成已健存參與方使用者的駕驶及舒適設定,促使冬炎 與方❹者在行進過程令,行動裝置依據-所選通信:面 及協定來與該内嵌式汽車電腦環境協作,以便依據所健存 的°又疋來5又疋汽車的駕欲及舒適設定)。同樣地,在内嵌 式電子裝置電腦環境背景下,行動裝置可運作以促進從各 種不同地點揭取多媒體。在此例證說明中,行動裝置中已 儲存多媒體的數位權利及授權’並且透過—所選通信介面 及協定(例如,無線網際網路協定(Wire's Protocol))來與具有内喪式電腦環境的—或多個消費性電子 裝置協定’以獲得所儲存之多媒體。換言之,具備刚功 能型接收器中已儲存多首Mp3歌曲,並且能夠透過外部通 信網路(例如’網際網路)來擷取Mp3歌曲。僅限於依據數 位抵利官理及/或使用者授權才能存取這些歌曲。據此, 示例性行動裝置平臺5〇〇可運作以提供參與方使用者藉由 透過一 Web服務型應用程式來傳達權利及授權至合作之呈 備MP3功能型接收器,卩此方式來存取這些歌曲。 ” 顯而易見,雖然圖中所示之行動裝置平臺5〇〇具有特定 組態且可在各種組件上運作’但是此說明内容僅僅是例證 ,明’可透過各種替代組態及組件來實現包含示例性行動 裝置平臺500的本文描述之系統及方法。 圖6緣示當组態圖4所示之示例性行動裝置平臺4 0 〇的組 96374.doc -28- 1255626 件運作時,示例性行動裝置平臺400所執行的程序。如圖6 所示,程序從步驟600開始,並且進行到步驟61〇,將行動 裝置組態成配合至少一合作之電腦環境運作。在此步驟 中,(雖然圖中未繪示)示例性行動裝置平臺可起始透過一 使用一所選通信介面協定的所選通信介面來與至少一電腦 環境通信。已建置通信後,示例性行動裝置平臺可指示行 動裝置啟動一或多個電腦應用程式,以在連線的電腦環境 上運作。電腦應用私式中可包括行動桌面電腦環境。程序 從步驟61〇進行到步驟620,透過一使用一示例性通信網路 協定(圖中未繪示)的示例性通信網路(圖中未繪示)來建置 介於MD與合作之MDMS之間的通信。建置介於MD與合作 之MDMS之間的通信之後,建立並與MDMS使用者 /1置鑑通和確認值,以供隨後在步驟63〇使用。在步驟 640,MDMS使用彼等鑑認和確認值接著,就能夠建立檔 案糸統槽案與群組設定之間的關聯性。儲存槽案與群組關 聯性以及鑑認和確認值,以供隨後在步驟6 5 〇使用。接 著,在步驟660實行檢查以判定MDMS上的MD是否需要槽 案或群組關聯性。如果在步驟660的檢查結果指示出md槽 案及/或群組關聯性有變更,則程序返回步驟640並繼續程 序。 然而,如果在步驟660判定不需要進行MD檔案及/或群 組關聯性設定,則程序進行到步驟670,使用所產生及儲 存的MD及使用者鑑認和確認值,來執行介於md與MDMS 之間的資料及/或電腦應用程式通信。接著程序在步驟680 96374.doc -29- Ϊ255626 終止。 、,T 7繪示依據示例性實施,當圖4所示之示例性行動裝置 平$ 400處理來自圖4所示之示例性行動裝置的%吡服 務要求時所執行的程序。如圖7所示,程序從步驟7⑻開 始,並且進行到步驟705,在步驟7〇5實行檢查以確保該示 例性行動裝置405正在與至少一合作之電腦環境(圖*所示 之415)通信。如果在步驟7〇5的檢查結果指示出該示例性 行動裝置未舆至少一合作之電腦環境通信,則程序返回步 驟700並繼續程序。 乂 然而,如果在步驟705判定該示例性行動裝置4〇5正在與 至少一合作之電腦環境通信,則進行到步驟7丨〇以實行檢 查,以判定是否已依據使用者(例如,參與方使用者是否 有提供適當使用者識別識別及密碼資訊)來鑑認該行動裝 置。如果依據使用者未成功鑑認該行動裝置,則程序進行 到步驟715以產生錯誤(並且可能將錯誤顯示給參與方使用 者)。接著在步驟717實行檢查,以判定是否再次嘗試行動 I置使用者鑑認(即’讓參與方使用者能夠重新輸入其使 用者識別識別及密碼)。如果在步驟7 17再次執行鑑認,則 程序返回步驟710並繼續程序。然而,如果在步驟717判定 未再次嘗試使用者鑑認,則程序於步驟720終止。 然而,如果在步驟710判定已依據使用者來鑑認該行動 裝置’則程序進行到步驟7 2 5以在該至少一合作之電腦環 境上起始行動裝置行動桌面環境。接著程序進行到步驟 73 0實行檢查,以判定MD是否有向已鑑認該MD的至少— 96374.doc -30- 1255626 合作之MDMS要求資料及/或電腦應用程式。如果在步驟 730的檢查結果指示出該經鑑認之MD沒有提出要求,則程 序返回步驟730。 然而,如果在步驟730判定MD有要求資料及/或電腦應 用程式,則接著程序進行到步驟735,本地搜尋MD是否有 所要求之資料及/或電腦應用程式。接著,在步驟740實行 檢查以判定本地搜尋MD是否滿足該要求。如果在步驟740 的檢查結果指示出本地搜尋MD已滿足該要求,則程序返 回步驟730並繼續程序。 然而,如果在步驟740的檢查結果指示出未滿足該要 求,則程序進行到步驟745,以使用步驟710提供的使用者 鑑認資訊來搜尋合作之MDMS。接著,能夠鑑認該搜尋方 MD的合作之MDMS進行使用該使用者鑑認資訊來鑑認該 MD。接著,在步驟755實行檢查以判定本地搜尋MD是否 已依據MD來使用該使用者鑑認資訊鑑認該MD。如果在步 驟755的檢查結果指示出該MDMS已鑑認該MD,則程序進 行到步驟760,由MDMS提供所要求之資料及/或電腦應用 程式給該要求方且現在已鑑認的MD。接著,程序返回步 驟730並繼續程序。 然而,如果在步驟755判定該合作之MDMS未鑑認該要 求方MD,則程序進行到步驟765,將鑑認錯誤提供給該要 求方MD。接著,程序進行到步驟770,在步驟770實行檢 查以判定該合作之MDMS是否再次嘗試鑑認該MD。如果 在步驟770的檢查結果指示出再次嘗試鑑認,則程序返回 96374.doc -31 - 1255626 步驟7 5 5並繼續程序。 。然而,如果在步驟770判定购⑽未再次嘗試鑑認,則 私序繼續進行到步驟775並且終止。 圖8緣示依據另一項示例性實施,當圖4所示之示例性行 動裝置平臺400處理來自圖4所示之示例性行動農置奶的 Web服務要求時所執行的程序。如圖8所*,程序從步驟 8〇〇開始,並且進行到步驟8〇5,在步驟8〇5實行檢查以確 保該示例性行動裝置405正在與至少—合作之電腦環境(圖 4所示之415)通信。如果在步驟8〇5的檢查結果指示出該示 例性行動裝置未與至少一合作之電腦環境通信,則程序返 回步驟800並繼續程序。 然而,如果在步驟805判定該示例性行動裝置4〇5正在與 至少一合作之電腦環境通信,則進行到步驟81〇以實行檢 查’以判疋疋否已依據使用者(例如,參與方使用者是否 有提供適當使用者識別識別及密碼資訊)來鑑認該行動裝 置。如果依據使用者未成功鑑認該行動裝置,則程序進行 到步驟8 15以產生錯誤(並且可能將錯誤顯示給參與方使用 者)。接著在步驟817實行檢查,以判定是否再次嘗試行動 裝置使用者鑑認(即’讓參與方使用者能夠重新輸入其使 用者識別識別及密碼)。如果在步驟8 17再次執行鏗認,則 程序返回步驟8 10並繼續程序。然而,如果在步驟817判定 未再次嘗試使用者鑑認,則程序於步驟820終止。 然而,如果在步驟8 10判定已依據使用者來鑑認該行動 裝置,則程序進行到步驟825以在該至少一合作之電腦環 96374.doc -32- 1255626 境上起始行動裝置行動桌面環境。接著,使用使用者鑑認 資訊以及MD特有的鑑認和確認資訊(例如,公開金鑰/私密 金鑰)來起始與至少一合作之MDMS之間的通信。接著,在 步驟835實行檢查以判定至少一合作之MDMS是否已適當 鑑認該MD。如果在步驟835判定至少一合作之MDMS未鑑 認該MD,則程序進行到步驟840以產生錯誤(並且可能透 過行動桌面環境將錯誤顯示給參與方使用者)。接著程序 在步驟845終止。 然而,如果在步驟835判定至少一合作之MDMS已鑑認 該MD,則程序進行到步驟850實行檢查,以判定MD是否 有向已鑑認該MD的至少一合作之MDMS要求資料及/或電 腦應用程式。如果在步驟850的檢查結果指示出該經鑑認 之MD沒有提出要求,則程序返回步驟850。然而,如果在 步驟850判定MD有向已鑑認該MD的至少一合作之MDMS 要求資料及/或電腦應用程式,則接著程序進行到步驟 8 5 5 ’本地搜寻M D疋否有所要求之貢料及/或電腦應用程 式。接著,在步驟860實行檢查以判定本地搜尋MD是否滿 足該要求。如果在步驟860的檢查結果指示出本地搜尋MD 已滿足該要求,則程序返回步驟850並繼續程序。 然而,如果在步驟860的檢查結果指示出未滿足該要 求,則程序進行到步驟865,查詢合作之MDMS是否有所 要求之資料及/或電腦應用程式。接著,在步驟870,將所 要求之資料及/或電腦應用程式提供給要求方經鑑認之 MD。接著,程序返回步驟850並繼續程序。 96374.doc -33- 1255626 圖9繪示當圖4所示之示例性行動 軔衣置平堂400與第三方Using the user of the participating user (4) and the heart information to identify the user, thus ensuring that the data and/or computer application provided to the MD 5〇5 in this case will be communicated to the appropriate Learn from the user of S. "Also if the MG and the user (not shown) want to access the game Web service provider (for example, mdms "c" 58〇) from their corporate computer environment, the participant user can borrow Switching to its "personal" is initiated by launching a second working environment (not shown) on the MD 505. The user can log in to the game work environment by logging out of his company environment and using his game users and Mima (for example, user authentication and confirmation information) to invoke the game environment. In this scenario, the participating users can access MDMS "c" 575 through daisy chaining by storing *MDMS, A"535 through the communication network 530, and then through the company's fire protection (6) and Accessing the game via an external communication network (eg, the Internet) The user of the participating web service can use a multi-user authentication MDMS "C" 580. In this way, there is a single working environment. MD, borrowing and confirming information, in a safe manner, every requirement of the company and personal computer operations. As can be seen from the foregoing, the mobile device platform 500 can operate in a single mobile device and multiple heterogeneous devices. Computer environment interaction. Examples of cooperative computer environments include (but are not limited to) stand-alone computer environment 'network continuous computer 96374.doc -27 - 1255626 w brother and internal computer environment. In the context of embedded computer environment, The systems and methods described herein can be used to allow interaction with the embedded automotive computer environment... from the driving and comfort settings of the vehicle (for example, the action skirt can be configured to be saved) The driving and comfort settings of the participants' users prompt the winter inflammation and the squadrons to travel, and the mobile device cooperates with the embedded car computer environment according to the selected communication: face and agreement, so as to be based on the saved ° 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 The digital rights and authorizations of multimedia have been stored in the mobile device and through the selected communication interface and protocol (for example, the Wireless Internet Protocol (Wires Protocol)) and the consumer computer environment with internal environment - or multiple consumer electronics The device agreement 'to obtain the stored multimedia. In other words, it has a number of Mp3 songs stored in the function-only receiver, and can capture Mp3 songs through an external communication network (such as 'internet'). The songs can be accessed by the authorization and/or user authorization. Accordingly, the exemplary mobile device platform 5 can operate to provide participants. By accessing the MP3 functional receivers through a web service application to communicate rights and authorizations to the cooperation, the songs are accessed in this way." Obviously, although the mobile device platform shown in the figure is 5〇〇 There are specific configurations and can operate on various components 'but this description is merely illustrative, and the systems and methods described herein can be implemented with various alternative configurations and components to implement the exemplary mobile device platform 500. Figure 6 illustrates the procedure performed by the exemplary mobile device platform 400 when the group 96374.doc -28-1255626 of the exemplary mobile device platform 40 shown in Figure 4 is configured to operate. As shown in Figure 6, the program begins at step 600 and proceeds to step 61, where the mobile device is configured to operate in conjunction with at least one cooperative computer environment. In this step, the exemplary mobile device platform (although not shown) may initiate communication with at least one computer environment via a selected communication interface using a selected communication interface protocol. After the communication has been established, the exemplary mobile device platform can instruct the mobile device to launch one or more computer applications to operate in a connected computer environment. The desktop application environment can be included in the computer application private. The process proceeds from step 61 to step 620, and the MD and the cooperative MDMS are constructed through an exemplary communication network (not shown) using an exemplary communication network protocol (not shown). Communication between. After the communication between the MD and the cooperating MDMS is established, the MDMS user/1 is established and confirmed for subsequent use in step 63. At step 640, the MDMS uses their authentication and confirmation values to then establish an association between the file system and the group settings. The storage slot is associated with the group and the identification and confirmation values for subsequent use in step 65. Next, a check is performed at step 660 to determine if the MD on the MDMS requires a slot or group association. If the check result at step 660 indicates that the md slot and/or group association has changed, the program returns to step 640 and continues the program. However, if it is determined in step 660 that MD file and/or group association settings are not required, then the process proceeds to step 670, using the generated and stored MD and user authentication and confirmation values to perform md and Communication between MDMS and/or computer applications. The program then terminates at step 680 96374.doc -29- Ϊ 255626. , T7 illustrates the procedure performed when the exemplary mobile device shown in FIG. 4 processes the 400% service request from the exemplary mobile device shown in FIG. 4 in accordance with an exemplary implementation. As shown in Figure 7, the program begins at step 7(8) and proceeds to step 705 where a check is performed to ensure that the exemplary mobile device 405 is communicating with at least one of the cooperating computer environments (415 shown in Figure *). . If the result of the check in step 7〇5 indicates that the exemplary mobile device is not communicating with at least one of the cooperative computer environments, the program returns to step 700 and continues the program. However, if it is determined in step 705 that the exemplary mobile device 4 is communicating with at least one of the cooperating computer environments, then proceed to step 7 to perform a check to determine if the user has been used (eg, by the participant) Whether the user has provided appropriate user identification and password information to identify the mobile device. If the mobile device is not successfully authenticated based on the user, the program proceeds to step 715 to generate an error (and may display the error to the participant user). Next, a check is performed at step 717 to determine whether to attempt the action again to set the user authentication (i.e. 'allow the participant user to re-enter their user identification and password). If the authentication is performed again at step 717, the program returns to step 710 and continues the program. However, if it is determined in step 717 that the user authentication has not been attempted again, then the routine terminates at step 720. However, if it is determined in step 710 that the mobile device has been authenticated by the user, then the program proceeds to step 725 to initiate the mobile device action desktop environment on the at least one cooperating computer environment. The program then proceeds to step 73 0 to perform a check to determine if the MD has an MDMS request data and/or computer application that has cooperated with at least - 96374.doc -30-1255626 of the MD. If the result of the check in step 730 indicates that the authenticated MD has not requested, the process returns to step 730. However, if it is determined in step 730 that the MD has a request for data and/or a computer application, then the program proceeds to step 735 where the local search for the MD has the requested data and/or computer application. Next, a check is performed at step 740 to determine if the local search MD meets the requirement. If the result of the check at step 740 indicates that the local search MD has satisfied the request, then the program returns to step 730 and continues the program. However, if the result of the check at step 740 indicates that the request is not met, then the program proceeds to step 745 to search for the cooperating MDMS using the user authentication information provided in step 710. Next, the MDMS that can recognize the cooperation of the searcher MD uses the user authentication information to authenticate the MD. Next, a check is performed at step 755 to determine if the local search MD has authenticated the MD using the user authentication information in accordance with the MD. If the result of the check at step 755 indicates that the MDMS has authenticated the MD, then the program proceeds to step 760 where the MDMS is provided with the requested data and/or computer application to the requesting party and the now authenticated MD. The program then returns to step 730 and continues the program. However, if it is determined in step 755 that the cooperating MDMS does not recognize the requesting party MD, the program proceeds to step 765 to provide an authentication error to the requesting party MD. Next, the program proceeds to step 770 where a check is performed to determine if the cooperating MDMS is attempting to authenticate the MD again. If the result of the check in step 770 indicates that the authentication is attempted again, the program returns to 96374.doc -31 - 1255626, step 7 5 5 and continues the procedure. . However, if it is determined in step 770 that the purchase (10) has not attempted to authenticate again, then the private sequence proceeds to step 775 and terminates. Figure 8 illustrates a procedure performed when the exemplary walker platform 400 of Figure 4 processes a web service request from the exemplary mobile farm milk shown in Figure 4 in accordance with another exemplary implementation. As shown in Figure 8, the program begins at step 8 and proceeds to step 8〇5, where a check is performed to ensure that the exemplary mobile device 405 is in cooperation with at least a computer environment (shown in Figure 4). 415) Communication. If the result of the check in step 8〇5 indicates that the exemplary mobile device is not in communication with at least one of the cooperating computer environments, the program returns to step 800 and continues the program. However, if it is determined in step 805 that the exemplary mobile device 4〇5 is communicating with at least one of the cooperating computer environments, then proceed to step 81 to perform a check to determine if the user has been used (eg, by the participant) Whether the user has provided appropriate user identification and password information to identify the mobile device. If the mobile device is not successfully authenticated based on the user, the program proceeds to step 8 15 to generate an error (and may display the error to the participant user). Next, a check is performed at step 817 to determine whether to attempt the mobile device user authentication again (i.e., to enable the participant user to re-enter their user identification and password). If the acknowledgment is performed again at step 817, the program returns to step 8 10 and continues the program. However, if it is determined in step 817 that the user authentication is not attempted again, then the routine terminates at step 820. However, if it is determined in step 810 that the mobile device has been authenticated by the user, the process proceeds to step 825 to initiate a mobile device mobile desktop environment on the at least one cooperative computer ring 96374.doc -32-1255626. . Next, user authentication information and MD-specific authentication and confirmation information (e.g., public key/private key) are used to initiate communication with at least one of the cooperating MDMSs. Next, a check is performed at step 835 to determine if at least one of the cooperating MDMSs has properly authenticated the MD. If it is determined in step 835 that at least one of the cooperating MDMSs does not recognize the MD, then the program proceeds to step 840 to generate an error (and possibly display the error to the participant user via the mobile desktop environment). The program then terminates at step 845. However, if it is determined in step 835 that at least one of the cooperating MDMSs has authenticated the MD, then the process proceeds to step 850 to perform a check to determine if the MD has requested data and/or a computer to at least one of the cooperating MDMSs that have authenticated the MD. application. If the result of the check at step 850 indicates that the authenticated MD has not requested, the process returns to step 850. However, if it is determined in step 850 that the MD has requested at least one of the cooperative MDMS request data and/or computer application that has authenticated the MD, then the process proceeds to step 8 5 5 'Local search for MD'. Materials and / or computer applications. Next, a check is performed at step 860 to determine if the local search MD satisfies the request. If the result of the check at step 860 indicates that the local search MD has satisfied the request, then the program returns to step 850 and continues the program. However, if the result of the check at step 860 indicates that the request is not met, then the program proceeds to step 865 to check if the cooperating MDMS has the required information and/or computer application. Next, at step 870, the requested data and/or computer application is provided to the MD that the requesting party has authenticated. The program then returns to step 850 and continues the program. 96374.doc -33- 1255626 Figure 9 illustrates the exemplary action shown in Figure 4

Web服務提供者協作,來處理來 曰圆4所不之示例性行 裝置405的Web服務要求時所執行的 仃旳私序。如圖9所示,卷 序從步驟900開始,並且進行到步 j /知905,在步驟905實行 檢查以確保該示例性行動裝置4 0 5正在與至少一合作之+ 腦環境(圖4所示之41 5)通信。如果右牛_。 ^ 如果在步驟9 〇 5的檢查結果指 不出該示例性行動裝置未與至少一人 个,、王乂 σ作之電腦環境通信, 則程序返回步驟9〇〇並繼續程序。 然而,如i在步驟905判定該示例性行動裝置4〇5正在盘 至少一合作之電腦環境通信,則進行到步驟91〇以實行檢 查,以判定是否已依據使用者(例如,參與方使用者是否 有提供適當使用者識別識別及密碼資訊)來鑑認該行動裝 置。如果依據使用者未成功鐘認該行動裝置,則程序進行 到步驟9 1 5以產生錯誤(並且可能將錯誤顯示給參與方使用 者)。接著在步驟917實行檢查,以判定是否再次嘗試行動 衣置使用者鏗認(g卩,讓參與方使用者能夠重新輸入其使 用者識別識別及密碼)。如果在步驟917再次執行鑑認,則 私序返回步驟910並繼續程序。然而,如果在步驟91 7判定 未再次嘗試使用者鑑認,則程序於步驟920終止。 然而’如果在步驟910判定已依據使用者來鑑認該行動 叙置’則程序進行到步驟925以在該至少一合作之電腦環 境上起始行動裝置行動桌面環境。接著,使用使用者鑑認 資訊以及MD特有的鑑認和確認資訊(例如,公開金鑰/私密 金鑰)來起始與至少一合作之MDMS之間的通信。接著,在 96374.doc -34- 1255626 步驟935實行檢查以判定至少一合作之MDMS是否已適當 鑑認該MD。如果在步驟935判定至少一合作之MDMS未鑑 認該MD,則程序進行到步驟940以產生錯誤(並且可能透 過行動桌面環境將錯誤顯示給參與方使用者)。接著程序 在步驟945終止。 然而,如果在步驟935判定至少一合作之MDMS已鑑認 該MD,則程序進行到步驟950實行檢查,以判定MD是否 有向已鑑認該MD的至少一合作之MDMS要求資料及/或電 腦應用程式。如果在步驟950的檢查結果指示出該經鑑認 之MD沒有提出要求,則程序返回步驟950。然而,如果在 步驟950判定MD有向已鑑認該MD的至少一合作之MDMS 要求資料及/或電腦應用程式,則接著程序進行到步驟 955,本地搜尋MD是否有所要求之資料及/或電腦應用程 式。接著,在步驟960實行檢查以判定本地搜尋MD是否滿 足該要求。如果在步驟960的檢查結果指示出本地搜尋MD 已滿足該要求,則程序返回步驟950並繼續程序。 然而,如果在步驟960的檢查結果指示出未滿足該要 求,則程序進行到步驟965,查詢合作之MDMS是否有所 要求之資料及/或電腦應用程式。接著,程序進行到步驟 970,合作之MDMS與第三方Web服務提供者協作,以獲得 所要求之資料及/或電腦應用程式。接著,在步驟975,將 所要求之資料及/或電腦應用程式提供給要求方經鑑認之 MD。接著,程序返回步驟950並繼續程序。 總言之,本文描述之系統及方法提供一種行動裝置平 96374.doc -35- 1255626 臺。然而,應明白,本發明容許各種修改及替代建構。本 發:不限定於如本文所述的特定建構。反之,本發明預定 〜屬於本叙明精神與範疇内的所有修改案、替代 同等案。 請注意,在各種電腦環境(包括非無線及無線電腦環 境)、局部電腦環境及真實環境中皆可實施本發明。本文 T所說明的各種技術可運用硬體、軟體或軟硬體組合來實 杏> u土方式為’可在維護可程式化電腦的電腦環境中來 a 其中電腦包括處理器、處理器可讀取的儲 存媒體(包括揮發性及非揮發性記憶體及/或儲存元件)、至 少一個輸入裝置及至少一個輸出裝置。配合各種指令集協 2之電腦硬體邏輯被套用至資料’以執行如上文所述之功 能並且產生輪出資訊。輸出f訊被供至—❹㈣出裝 置。較佳方式為,可佶用久括众 广、 w 了使用各種程式料語言(包括高階程 或物件導向式程式設計語言)來實施示例性電腦硬體所 使用的私式’以與電腦系統通信。作為例證,若希望,可 使用組合語言或電腦語言來實施本文描述之裝置及方法。 在㈣情^ ’語言可能是編譯或解料言。較佳方式 為’每個電腦程式係儲存在一般或特殊用途之可程式化電 腦可讀取的儲存媒體或裝置(例如,刪或磁碟),用於者 電腦讀取儲存媒體或裝置時來組態及操作電腦,以便執^ 文所述之私序。I置也可建構為電腦可讀取 =使用電腦程式設定其組態,其中儲存媒體被組態成促 使電腦以特定或預先定義的方式運作。 96374.doc -36- 1255626 雖然前文中已詳細說明本發明之示例性實施,但是熟糸 此顯技術者很谷易明白示例性具體實施例有許多可本行的 額外修改案,而不會實質上脫離本發明的新穎講授内容與 優點。據此,這些及所有此類修改案預定涵蓋在本發明的The web service provider collaborates to handle the private order performed by the web service requirements of the exemplary device 405. As shown in Figure 9, the sequence begins at step 900 and proceeds to step j/know 905, where a check is performed to ensure that the exemplary mobile device 4500 is working with at least one of the + brain environments (Fig. 4 Shown 41 5) Communication. If right cow _. ^ If the result of the check in step 9 指 5 does not indicate that the exemplary mobile device is not communicating with the computer environment of at least one person, Wang Hao σ, the program returns to step 9 and continues the procedure. However, if i determines in step 905 that the exemplary mobile device 4 is communicating with at least one of the cooperative computer environments, then proceeds to step 91 to perform a check to determine if the user has been authenticated (eg, the participant user) Whether to provide appropriate user identification and password information to identify the mobile device. If the mobile device is not successfully queried by the user, the program proceeds to step 915 to generate an error (and may display the error to the participant user). Next, a check is performed at step 917 to determine whether to attempt the action again to identify the user (i.e., to enable the participant user to re-enter their user identification and password). If the authentication is performed again in step 917, the private sequence returns to step 910 and continues the program. However, if it is determined in step 91 7 that the user authentication is not attempted again, the program terminates at step 920. However, if it is determined in step 910 that the action description has been authenticated by the user, then the process proceeds to step 925 to initiate the mobile device action desktop environment on the at least one cooperative computer environment. Next, user authentication information and MD-specific authentication and confirmation information (e.g., public key/private key) are used to initiate communication with at least one of the cooperating MDMSs. Next, a check is performed at 96374.doc -34-1255626, step 935 to determine if at least one of the cooperating MDMSs has properly authenticated the MD. If it is determined in step 935 that at least one of the cooperating MDMSs does not recognize the MD, then the program proceeds to step 940 to generate an error (and possibly display the error to the participant user via the mobile desktop environment). The program then terminates at step 945. However, if it is determined in step 935 that at least one of the cooperating MDMSs has authenticated the MD, the process proceeds to step 950 to perform a check to determine if the MD has requested data and/or a computer to at least one of the cooperating MDMSs that have authenticated the MD. application. If the result of the check at step 950 indicates that the authenticated MD has not requested, the process returns to step 950. However, if it is determined in step 950 that the MD has requested at least one of the cooperative MDMS request data and/or computer application for the MD, then the process proceeds to step 955 to locally search for the MD for the required information and/or Computer application. Next, a check is performed at step 960 to determine if the local search MD satisfies the request. If the result of the check at step 960 indicates that the local search MD has satisfied the request, then the program returns to step 950 and continues the program. However, if the result of the check at step 960 indicates that the request is not met, then the program proceeds to step 965 to check if the cooperating MDMS has the required information and/or computer application. The program then proceeds to step 970 where the cooperating MDMS collaborates with a third party web service provider to obtain the requested data and/or computer application. Next, at step 975, the requested data and/or computer application is provided to the MD that the requesting party has authenticated. The program then returns to step 950 and continues the program. In summary, the system and method described herein provides a mobile device flat 96374.doc -35-1255626. However, it should be understood that the invention is susceptible to various modifications and alternative constructions. The present invention is not limited to the specific construction as described herein. On the contrary, the present invention is intended to be all modifications and alternatives within the spirit and scope of the present description. Please note that the present invention can be implemented in a variety of computer environments, including non-wireless and wireless computer environments, local computer environments, and real environments. The various technologies described in this article T can be combined with hardware, software or a combination of hardware and software to make apricots. The u-mode can be used in a computer environment where a programmable computer can be maintained. The computer includes a processor and a processor. A read storage medium (including volatile and non-volatile memory and/or storage elements), at least one input device, and at least one output device. The computer hardware logic in conjunction with the various instruction sets 2 is applied to the data' to perform the functions as described above and to generate round-trip information. The output f message is supplied to the ❹ (4) output device. The preferred method is to use a variety of programming languages (including high-order or object-oriented programming languages) to implement the private use of the exemplary computer hardware to communicate with the computer system. . By way of example, the apparatus and methods described herein can be implemented in a combination language or computer language, if desired. In (4) love ^ 'language may be compiled or deposed. Preferably, each computer program is stored in a general or special purpose programmable computer readable storage medium or device (for example, a deleted or a magnetic disk) for the user to read the storage medium or device. Configure and operate the computer to perform the private sequence described in the text. I can also be constructed as computer readable = the configuration is set using a computer program, where the storage medium is configured to cause the computer to operate in a specific or predefined manner. 96374.doc -36- 1255626 Although the exemplary embodiments of the present invention have been described in detail above, it is obvious to those skilled in the art that the exemplary embodiments have many additional modifications that may be made by the present invention without substantial substance. The novel teachings and advantages of the present invention are set forth above. Accordingly, these and all such modifications are intended to be encompassed by the present invention.

乾疇内。下列示行性申請專利範圍更適當地定義本發明。 【圖式簡單說明】 X 現在將參考附圖來詳細說明行動裝置平臺及使用方法 圖中: / 圖u會示根據本文描述之系、統及方法之實施的 腦環境方塊圖; 圖2纟會示根據本文描述之车續及方法 一 怕述又糸、、死及万去的不例性電腦網路 環境方塊圖; 圖3繪示根據本文描述之糸一 … 《之糸統及方法的不例’!生電腦作業 組件間互動之方塊圖; 〃 圖4繪示根據本文描述之系統及方法 例證實施方塊圖; 動凌置千玄之 圖5繪不根據本文描述之系統及方法的行動裝置平臺之 另一項例證實施方塊圖; 圖6繪示組態設定根據本 ™ ^ . 于、、、死及方法的行動裝 置平玄之例證實施所執行的程序流程圖; 圖二緣示根據本文描述之系統及方法的行動農置平臺之 例證貫施所執行的程序流程圖; 至 圖叫示根據本文描述之系統及方法的行動I置平臺之 項例證貫施所執行的程序流程圖;以& 至 96374.doc -37- 1255626 圖9繪示根據本文描述之系統及方法的行動裝置平臺之 另一項例證實施所執行的程序流程圖。 【主要元件符號說明】 100 電腦系統(資料處理系統,電腦作業環境) 105 系統匯流排 110 中央處理單元(CPU) 112 互連 115 微處理器 120 記憶體控制器 125 隨機存取記憶體(RAM) 130 唯讀記憶體(ROM) 135 周邊裝置控制器 140 印表機 145 鍵盤 150 滑氣 155 資料儲存機 160 通信網路 163 顯示器控制器 165 顯示器 170 網路卡 180 作業系統 180? 電腦應用程式 200 網路連線電腦環境 210 平板式個人電腦 96374.doc -38- 1255626 215 行動電話 220 電話 225 個人數位助理 300, 400 行動裝置平臺 305 通信介面 310, 405 行動裝置(MD) 410 MD/電腦環境通信介面 415 電腦環境 420 行動裝置管理伺服器(MDMS) 425 轉譯引擎 430 Web服務 435 通信網路 440 第三方Web服務提供者 445 加密引擎 500 行動裝置平臺 505 行動裝置(MD) ,,A,,515,,,B” 525···,,,N” 520 電腦環境 510 行動裝置(MD)/電腦環境通信介面 530, 570 通信網路 585 ,’A,’ 535,,’B,,545, 第三方Web服務提供者 ,,C,? 575,,’Nn 555 行動裝置管理伺服器(MDMS) 540, 550, 560, 580 Web服務 96374.doc -39- 1255626 565 防火牆 590 前版系統 595 動態JVM模擬器及提供器 96374.doc -40-Within the domain. The invention is more appropriately defined by the scope of the following patent application. [Simple diagram of the drawing] X The mobile device platform and the method of using the method will now be described in detail with reference to the accompanying drawings: / Figure u will show the brain environment block diagram according to the implementation of the system, method and method described herein; According to the description of the vehicle and the method described in this article, the block diagram of the computer network environment of the computer network that is afraid of saying, dying, and dying; Figure 3 shows the simplification of the system according to the description of the article... Example block diagram of interaction between computer operating components; FIG. 4 illustrates an exemplary embodiment of a system and method according to the description herein; FIG. 5 depicts a mobile device not according to the system and method described herein. Another exemplary implementation block diagram of the platform; FIG. 6 is a flow chart showing the configuration of the implementation of the mobile device according to the implementation of the TM, ., and the mobile device; Description of the system and method of action The illustration of the farm platform is performed by a flow chart of the execution of the program; the figure is illustrated by the action of the system and method described herein. Figure 9 is a flowchart of a routine executed by another exemplary implementation of a mobile device platform in accordance with the systems and methods described herein. [Main component symbol description] 100 Computer system (data processing system, computer working environment) 105 System bus 110 Central processing unit (CPU) 112 Interconnect 115 Microprocessor 120 Memory controller 125 Random access memory (RAM) 130 Read Only Memory (ROM) 135 Peripheral Device Controller 140 Printer 145 Keyboard 150 Slip Air 155 Data Storage Machine 160 Communication Network 163 Display Controller 165 Display 170 Network Card 180 Operating System 180? Computer Application 200 Network Road Connection Computer Environment 210 Tablet PC 96374.doc -38-1255626 215 Mobile Phone 220 Telephone 225 Personal Digital Assistant 300, 400 Mobile Device Platform 305 Communication Interface 310, 405 Mobile Device (MD) 410 MD/Computer Environment Communication Interface 415 Computer Environment 420 Mobile Device Management Server (MDMS) 425 Translation Engine 430 Web Service 435 Communication Network 440 Third Party Web Service Provider 805 Encryption Engine 500 Mobile Device Platform 505 Mobile Device (MD), A, 515, ,B" 525···,,,N" 520 Computer Environment 510 Mobile Device (MD) / Computer Context communication interface 530, a communication network 570 585, 'A,' 535 ,, 'B ,, 545, third-party Web service provider ,, C ,? 575,, 'Nn 555 Mobile Device Management Server (MDMS) 540, 550, 560, 580 Web Services 96374.doc -39- 1255626 565 Firewall 590 Front System 595 Dynamic JVM Simulator and Provider 96374.doc -40-

Claims (1)

Φ +由申請案 ^換本(95年2月) 十申明專利範圍: 】· 一種行動裝置平臺系統,包括·· -具有獨立電腦作業能力之 接-電腦環境;以及 μ #可運作以介 一行動裝置伺服器, 給該行動裝置。 4心丁動裝置協作以提供資料 2. 如申請專利範圍第!項之系統 訊,其運作 /匕括一網路通 達資料。 直一亥仃動裝置伺服器之間傳 3 ·如申凊專利範圍第1項之备從、 定,以供該行動裝置盒、7Γ無進步包括—加密協 時使用。 、Λδ“τ動農置伺服器之間傳達資料 4·如申請專利範圍第 η捉負之糸統,其中該加密協定適用於 «玄^丁動裝置與該彳干氣# 動凌置伺服器所使用的資料儲存架 構0 5·如申請專利範圍第4馆# $ p 弟4員之糸統,其中該資料儲存架 括下列任何項目:栲宏献罢主, # ^ ^ 枱案配置表(FAT)檔案系統及新技術檔 案糸統(NTFS)檔案系統。 6. 如申請專利範圍第3項李 ^ 貝4糸、、先進一步包括一鑑認和確 -杈組’其允許該行動裝置與該行動裝置伺 認和確認’以允許傳達資料。 &quot;^ 如申請專利範圍箆6 ^ 員之糸、、先’其中該鑑認和確認模組 處理包括下列任彳可口 -欠 订員目之_貝料:使用者識別資訊、使用 者么碼貝汛公開金鑰資訊及私密金鑰資訊。 96374-950217.doc 1^55626 * . I如申請專利範圍第1項之系統,進一步包括一通信介 面,其運作以連接該行動裝置與電腦環境。 9.如申請專利範圍第8項之系統,其中該通信介面被内喪 在該行動裝置中。 10·如申請專利範圍第8項之系統,其中該通信介面包括下 列任何項目.通用序列埠(USB)、IEEE 1394通信介面 (Firewire)、802.XX通信介面、biutet〇〇th( 藍芽)通信介 面、個人電腦介面、小型電腦序列介面及無線應用通訊 協定(WAP)通信介面。 Π·如申請專利範圍第10項之系統,其中該電腦環境包括下 歹J任何項目·一獨立電腦環境、一網路連續型電腦環境 及一内嵌式電腦環境。 12.如申凊專利範圍第丨丨項之系統,其中該電腦環境是一汽 車内嵌式電腦環境。 1 3 ·如申凊專利範圍第1丨項之系統,其中該電腦環境是一消 費性電子裝置内嵌式電腦環境。 14.如申請專利範圍第丨丨項之系統,其中該電腦環境是一建 桌物自動控制内嵌式電腦環境。 15·如申請專利範圍第丨項之系統,其中該資料包括配合一 或多個電腦應用程式與控制資訊一起使用的任何資料。 1 6·如申請專利範圍第1項之系、統,其中該通信網路包括下 列任何項目:_固線區域網路(LAN)、_無線區域網路 (LAN)、一固線廣域網路(WAN)、一無線廣域網路 (AN) 固線對等式通信網路、一無線對等式通作矣 96374-950217.doc ii漏 /吩、一 /刀、吋夕句纪 接(TDMA)通信網路、一 仃動通化全球定位統(GSM)通作 網路、無線網際網路及網際網路。 1 7 ·如申請專利範圍笫 … 回弟1項之糸、統’其中在該行動裝置中維 護複數個工作環培兮榮 1 兄该寻工作%境運作以允許該行動 置與不同的行動裝置伺服器協作。 、 18·如申請專利範圍第17項之系統 ,、r巧仃動裝置運作以 使用一加始、協定來與不同的 、个U日7仃動叙置伺服器協作。 1 9 ·如申請專利範圍第 μ / 中該行動裝置針對該 等稷數個工作環境中的每個工 密之通信通道。 _仏來_獨立的已加 20·如申請專利範圍第19項之系統, 望$去T 5亥仃動裝置針對該 荨稷數個工作環境中的每個工 和確認。 hi支板唯一的鐘認 21·如申請專利範圍第丨項之系 ^ ^ T 5亥仃動裝置盥該雷 月包裱境協作以顯示一使用者介面, /、 接收* όe 。亥使用者介面運作以 接收末自參與方使用者對該電腦環境的“、 制、操縱及管理資料及應用程式。 7以便抆 22·如申請專利範圍第21項之系統, 哭盥吝徊甘从/ J切表置官理伺服 〜、夕個其他行動裝置管理伺服器協 務給該行動裝置。 棱仏Web服 23·如申請專利範圍第22項之系統,1 服哭盘夕/ # 一 Τ该订動裝置管理伺 服卩口人夕個弟三方Web服務提供 服務給該㈣μ。 協作μ提供啊 96374-950217.doc 1255626 Μ.如申請專利範圍第丨項之系統, 列任何項目:—處理 /、中该仃動裝置包括下 R〇M儲存 仃動裝置通信介面單元、 25 : 儲存裝置及-作業系統。 •一2 境中允許安全傳達資料之方法,包括. 美供-具有獨立電腦作業能力之行 置可運作以介接一電腦環境;以及仃動褒 作仃動裝置伺服器’該行動褒置伺服器與該行動 衣置協作以提供資料給該行動裝置。 26.^請專利範圍第25項之方法,進—步包括建置一介於 该仃動裝置與該電腦環境之間的通信鏈,士。 ' A如申請專利範圍第26項之方法,進一步包括建置—介於 該打動裝置與該行動裝置㈣伺服器之間的通信鍵結。 28. 如申請專利範圍㈣項之方法,進—步包括在該行動裳 置管理飼服器處鑑認該行動裝置,以判^該行動裝置的 權利及權限。 29. 如申請專利範圍第28項之方法,進一步包括接收一來自 該行動裝置向該行動裝置管理伺服器提出的Web服務要 求0 3〇·如申請專利範圍第29項之方法,進一步包括使用伺服器 物件存取通訊協定(SOAP),接收一來自該行動裝置向該 行動裝置管理伺服器提出的Web服務要求。 3 1 ·如申請專利範圍第29項之方法,進一步包括使用行動裝 置鑑認資訊,在該行動裝置管理伺服器擷取該要求之 We b服務。 96374-950217.doc 1255626 32. 33. 34. 35. 36. 37. 38. 39. 如申請專利範圍第31項之方法,進—步包括將該梅取之 Web服務轉譯成一行動裝置原生Web服務袼式。 如申請專利範圍第31項之方法’進一步包括使用行動裝 置鑑&quot;忍資訊來加密該擷取之Web服務。 如申請專利範圍第33項之方法,進—步包括將該掏取之 已加袷Web服務從該行動裝置管理伺服器傳達至該行動 裝置。 ^ 如申請專利範圍第34項之方法,進-步包括在該行動裝 置處理該傳達之已加密Web服務,以便在該合作之電腦 環境上顯示及控制。 -種電腦可讀取媒體,其具有電腦可讀取指令以指示一 電腦執行如申請專利範圍第35項之方法。 種=電恥%境來安全傳達Web服務之系統,包括: 第一構件,用於介接一合作之電腦環境,該第一構 件具有獨立電腦作業能力;以及 第一構件,用於安全地提供Web服務至該第一構 件0 如申請專利範圍第37項之以,進一步包括—第三構 件用於以運作方式將該第—構件與該第二構件鍵接在 —起。 如申請專利範圍第3 8 本勹 只心糸統,進一步包括一第四構 件,用於鑑認並確切、兮给 ^ 5亥弟一構件從該第二構件存取We b 服務的權利及權限, 其中該第四構件肖扭T ^ 匕括下列任何項目··一生物測定安全 96374-950217.doc 40 f枝制 視網膜掃描安全性機制及一安全性語音辨識 機制。 如申明專利範圍第39項之系統,進一步包括一第五構 件用於與5亥第四構件協作以基於鑑認目的來加密Web 服務。 41。 42. 如申請專利範圍第綱之系統,其中web服務包括下列 任何項目.使用者管理Web服務、電腦應用程式及資 料。 一種遠端獲得安全Web服務之方法,包括: 、、且匕、行動裝置以配合一合作之電腦環境運作,促使 該行動裝置可運作以執行能夠在該合作的電腦環境上處 理Web服務的一或多個電腦應用程式; 建置與至少-合作之行動裝置管理伺服器的通信; &gt;在該行動裝置管理伺服器處鑑認該行動裝置,以判定 孩仃動裝置存取在該行動裝置管理伺服器上之佩服務 的權利、存取權及權限; 在該行動裝置管理伺服器處接收來自該行動裝置的 Web服務要求; 43. 使用该行動裝置鑑認資訊來處理w讣服務要求; 擷取We b服務以滿足該行動裝置提㈣^ b服務要求; 依據一所選加密協定來加密Web服務;以及 傳達所要求之行動服務給該行動裝 電腦環境上執行。 如申請專利範圍第42項之方法 置,以在該合作之 進一步包括使用使用者 96374-950217.doc 1255626 為別和使用者密碼資訊,在該合作之電腦環境上鐘認該 行動裝置。 44. ^請專利範圍第42項之方法,進一步包括當組態該行 力衣置以配合該合作之電腦環境運作時,實行自動執行 在該行動裝置上找到的至少一應用程式或常式。 45。 如申請專利範圍第42項之方法,進一步包括與第三方 b服矛力提供者協作,以擷取所要求的Web服務。 47. 汝申明專利範圍第42項之方法,進一步包括與一 Java虛 疑機器協作’以獲得前版應用程式及資料。 電^執行如申請專利範圍第42項之方法 電腦可讀取媒體,其具有電腦可讀取指令以指示一 96374-950217.docΦ + change from the application case (February 1995) Ten Declared Patent Scope: 】· A mobile device platform system, including... a computer environment with independent computer work capability; and μ # operable to mediate The mobile device server is given to the mobile device. 4 heart-shaped devices cooperate to provide information 2. If you apply for patent scope! The system of the project, its operation / including a network of access to information. Direct transmission between the server and the server is as follows: • For the purpose of the mobile device box, 7 for the purpose of the mobile device box, and for the cryptographic cooperation. Λ “ τ τ τ τ 动 动 农 农 传达 传达 传达 τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ The data storage structure used is 0. 5. If you apply for the patent scope, Hall 4 # p, the 4th member of the system, where the data storage includes any of the following items: 栲宏献止主, # ^ ^ FAT) file system and new technology file system (NTFS) file system. 6. If the scope of patent application is 3, Li ^ Bei 4, and further includes an identification and confirmation group, which allows the mobile device to The mobile device greets and confirms 'to allow for the transmission of information. &quot;^ If the scope of application for patents is 箆6 ^ 糸,, first, where the identification and confirmation module processing includes the following 彳 - - _Bei material: user identification information, user code, public key information and private key information. 96374-950217.doc 1^55626 * . I, as in the system of claim 1, further includes a communication Interface that operates to connect the mobile device 9. The system of claim 8, wherein the communication interface is slain in the mobile device. 10. The system of claim 8 wherein the communication interface comprises any of the following items. Universal Serial Port (USB), IEEE 1394 Communication Interface (Firewire), 802.XX Communication Interface, biutet〇〇th (Bluetooth) Communication Interface, PC Interface, Small Computer Serial Interface and Wireless Application Protocol (WAP) Communication Interface Π·For example, the system of claim 10, wherein the computer environment includes any project of the 歹J, a stand-alone computer environment, a network continuous computer environment, and an embedded computer environment. The system of the third aspect, wherein the computer environment is a car embedded computer environment. 1 3 · The system of claim 1, wherein the computer environment is a consumer electronic device embedded computer Environment 14. The system of claim </ RTI> wherein the computer environment is an embedded computer environment that automatically controls the built-in table. The system of the item, wherein the data includes any data used in conjunction with one or more computer applications and control information. 1 6. The system of claim 1 wherein the communication network includes any of the following items : _ fixed area network (LAN), _ wireless local area network (LAN), a fixed wide area network (WAN), a wireless wide area network (AN) fixed line peer-to-peer communication network, a wireless peer-to-peer通作矣96374-950217.doc ii leak/ pheno, one/knife, 吋 句 纪 ( (TDMA) communication network, a mobile global positioning system (GSM) network, wireless internet and internet network. 1 7 · If you apply for a patent scope 回... 回 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 Server collaboration. 18. If the system of claim 17 is applied for, the operation of the device is to use a start-up, agreement to cooperate with different U-days. 1 9 · As in the patent application scope μ / , the mobile device is for each of the several communication working channels. _ 仏 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ The only bell of the hi board is 21. If the scope of the patent application is the second item ^ ^ T 5 仃 仃 盥 盥 月 月 月 月 月 月 月 月 月 月 月 月 月 月 月 月 月 月 月 协作 协作 协作 协作 协作 协作 协作 协作 协作 协作 协作 协作 协作 协作 协作The user interface operates to receive the "management, manipulation, and management of data and applications from the user's computer environment to the end of the user's environment. 7 So that the system of claim 21, crying From the / J cut table to set the official servo ~, the other mobile device management server agreement to the mobile device. 仏 仏 Web service 23 · such as the patent application scope 22 system, 1 service crying eve / # ΤThe ordering device management servo 卩人人弟三方Web service provides services to the (four)μ. Collaboration μ provides ah 96374-950217.doc 1255626 Μ. If you apply for the patent scope of the system, list any items: - processing /, The swaying device includes a lower R〇M storage turbulence device communication interface unit, 25: storage device and operating system. • A method for allowing secure communication of data in the environment, including: US supply - with independent computer operation The capability set is operable to interface with a computer environment; and the mobile device server is activated to cooperate with the mobile device to provide information to the mobile device. 6. The method of claim 25 of the patent scope, the method comprising: constructing a communication link between the squirting device and the computer environment, 'A, as in the method of claim 26, further comprising Build-between the communication key between the actuation device and the mobile device (4) server. 28. As claimed in the method of claim 4, the method further comprises identifying the service at the action management device. The mobile device determines the rights and authority of the mobile device. 29. The method of claim 28, further comprising receiving a web service request from the mobile device to the mobile device management server. The method of claim 29, further comprising using a server object access protocol (SOAP) to receive a web service request from the mobile device to the mobile device management server. 3 1 · as claimed The method of clause 29, further comprising using the mobile device to authenticate the information, wherein the mobile device management server retrieves the requested Web service. 96374-950217.doc 1255626 32. 33. 34. 35. 36. 37. 38. 39. If the method of claim 31 is applied, the further step involves translating the web service of the company into a mobile device native web service. The method 'further includes encrypting the retrieved web service using the mobile device&quot; tolerant information. As in the method of claim 33, the method further comprises extracting the extracted web service from the mobile device The management server communicates to the mobile device. ^ As in the method of claim 34, the method further includes processing the communicated encrypted web service at the mobile device for display and control in the cooperative computer environment. A computer readable medium having computer readable instructions for instructing a computer to perform the method of claim 35. A system that securely communicates a Web service, comprising: a first component for interfacing a collaborative computer environment, the first component having independent computer operating capabilities; and a first component for providing security The web service to the first component 0, as claimed in claim 37, further includes a third member for operatively bonding the first member to the second member. For example, if the patent application scope is only for the third party, it further includes a fourth component for identifying and authenticating the right and authority of the component to access the Web service from the second component. , wherein the fourth member is twisted T ^ to include any of the following items: a biometric safety 96374-950217.doc 40 f retinal scanning security mechanism and a security speech recognition mechanism. A system as claimed in claim 39, further comprising a fifth component for cooperating with the fifth component to encrypt the web service for authentication purposes. 41. 42. A system for applying for the scope of the patent scope, wherein the web service comprises any of the following items: the user manages the web service, the computer application and the information. A method for obtaining a secure web service at a remote end, comprising: , and/or a mobile device operating in cooperation with a cooperative computer environment to cause the mobile device to operate to perform an operation capable of processing a web service on the cooperative computer environment a plurality of computer applications; establishing communication with at least a cooperative mobile device management server; &gt; identifying the mobile device at the mobile device management server to determine that the child device access is managed in the mobile device The right, access rights and authority of the service on the server; receiving the web service request from the mobile device at the mobile device management server; 43. using the mobile device to identify the information to process the service request; Taking the Web service to meet the mobile device's request for service; encrypting the Web service according to a selected encryption protocol; and communicating the required mobile service to the mobile computer environment for execution. For example, the method of claim 42 is applied to further identify the mobile device in the cooperative computer environment by using the user 96374-950217.doc 1255626 as the user and user password information. 44. The method of claim 42 of the patent scope further includes automatically executing at least one application or routine found on the mobile device when configuring the mobile device to operate in conjunction with the cooperative computer environment. 45. The method of claim 42, further comprising collaborating with a third party to obtain the requested web service. 47. The method of claim 42 of the patent scope further includes collaborating with a Java suspect machine to obtain the pre-application and data. The method of executing the patent range 42 is a computer readable medium having a computer readable command to indicate a 96374-950217.doc
TW93129442A 2003-09-29 2004-09-29 Mobility device platform system and method, and computer readable medium thereof TWI255626B (en)

Applications Claiming Priority (8)

Application Number Priority Date Filing Date Title
US50691803P 2003-09-29 2003-09-29
US50719703P 2003-09-29 2003-09-29
US50691903P 2003-09-29 2003-09-29
US50692503P 2003-09-29 2003-09-29
US53891504P 2004-01-22 2004-01-22
US53876704P 2004-01-22 2004-01-22
US53876304P 2004-01-22 2004-01-22
US54373504P 2004-01-22 2004-01-22

Publications (2)

Publication Number Publication Date
TW200522631A TW200522631A (en) 2005-07-01
TWI255626B true TWI255626B (en) 2006-05-21

Family

ID=37873400

Family Applications (3)

Application Number Title Priority Date Filing Date
TW93129444A TWI259730B (en) 2003-09-29 2004-09-29 Mobility device server
TW93129442A TWI255626B (en) 2003-09-29 2004-09-29 Mobility device platform system and method, and computer readable medium thereof
TW93129443A TWI259377B (en) 2003-09-29 2004-09-29 Method for processing web services, mobility device and system relating to the same

Family Applications Before (1)

Application Number Title Priority Date Filing Date
TW93129444A TWI259730B (en) 2003-09-29 2004-09-29 Mobility device server

Family Applications After (1)

Application Number Title Priority Date Filing Date
TW93129443A TWI259377B (en) 2003-09-29 2004-09-29 Method for processing web services, mobility device and system relating to the same

Country Status (1)

Country Link
TW (3) TWI259730B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI610549B (en) * 2012-05-01 2018-01-01 英特爾公司 Application service location and management system
US10129087B2 (en) 2012-05-01 2018-11-13 Intel Corporation Application service location and management system

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI417788B (en) * 2005-09-01 2013-12-01 Koninkl Philips Electronics Nv A data processing system and a method of operating a rendering platform
US8136162B2 (en) 2006-08-31 2012-03-13 Broadcom Corporation Intelligent network interface controller
US8429185B2 (en) 2007-02-12 2013-04-23 Microsoft Corporation Using structured data for online research
US7917507B2 (en) * 2007-02-12 2011-03-29 Microsoft Corporation Web data usage platform
TWI352909B (en) 2007-09-05 2011-11-21 Htc Corp Method and system for supporting network sharing a
CN102739606B (en) * 2011-04-02 2016-01-13 深圳富泰宏精密工业有限公司 Videophone application system and method
TWI665560B (en) * 2016-07-18 2019-07-11 科智企業股份有限公司 Mobile Manufacturing Management and Optimization Platform
TWI788741B (en) * 2020-12-10 2023-01-01 中華電信股份有限公司 System and method for remote video assistance
TWI825896B (en) * 2022-08-03 2023-12-11 優式機器人股份有限公司 Environmental finishing control method
TWI811050B (en) * 2022-08-03 2023-08-01 優式機器人股份有限公司 Control method for the cooperation of multiple mobile robots

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI610549B (en) * 2012-05-01 2018-01-01 英特爾公司 Application service location and management system
US10129087B2 (en) 2012-05-01 2018-11-13 Intel Corporation Application service location and management system

Also Published As

Publication number Publication date
TW200522744A (en) 2005-07-01
TWI259730B (en) 2006-08-01
TWI259377B (en) 2006-08-01
TW200523752A (en) 2005-07-16
TW200522631A (en) 2005-07-01

Similar Documents

Publication Publication Date Title
EP1519539A2 (en) Mobility device
US20080301443A1 (en) Mobility device platform
US7747856B2 (en) Session ticket authentication scheme
US20090044259A1 (en) Mobility device platform paradigm
US9183537B2 (en) Content authoring and deployment technology
CN105095786B (en) The platform that safety moving synergistic application is established with data configuration is presented using dynamic
US20060253894A1 (en) Mobility device platform
US9185086B1 (en) Apparatus, system and method for secure data exchange
CN105556894A (en) Network connection automation
TWI255626B (en) Mobility device platform system and method, and computer readable medium thereof
JP2009520272A (en) Security token with viewable claims
US20210194692A1 (en) Authenticating a messaging program session
EP1519540A2 (en) Mobility device server
US20160224957A1 (en) Distributed digital rights-managed file transfer and access control
CN1890656A (en) Mobility device
US20100095372A1 (en) Trusted relying party proxy for information card tokens
WO2006074258A2 (en) Mobility device platform
US20070050371A1 (en) Interacting with an online database through a variety of communications media
JP2003044607A (en) System for integrated management of personal information
US20150172356A1 (en) Integration of form and file services
Hoang et al. Secure roaming with identity metasystems
JP2002269041A (en) Information distributing server device
TW554275B (en) Management device and method for managing a remote database
US7702900B1 (en) Web services security test framework and method
JP2002366516A (en) Individual authentication method, authentication device of portable browser terminal

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees