WO2019043433A1 - Rule-based content sharing - Google Patents
Rule-based content sharing Download PDFInfo
- Publication number
- WO2019043433A1 WO2019043433A1 PCT/IB2017/055222 IB2017055222W WO2019043433A1 WO 2019043433 A1 WO2019043433 A1 WO 2019043433A1 IB 2017055222 W IB2017055222 W IB 2017055222W WO 2019043433 A1 WO2019043433 A1 WO 2019043433A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- content
- access
- rule
- recipient
- batch
- Prior art date
Links
- 238000000034 method Methods 0.000 claims abstract description 66
- 150000001875 compounds Chemical class 0.000 claims abstract description 13
- 238000004891 communication Methods 0.000 claims description 14
- 230000006870 function Effects 0.000 claims description 2
- 238000009877 rendering Methods 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 5
- 238000005259 measurement Methods 0.000 description 4
- 230000007423 decrease Effects 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000003442 weekly effect Effects 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Definitions
- the present disclosure relates to time/location based content exchange and sharing. More particularly, it relates to systems and methods for exchanging time-bounded and location- bounded prioritized content batches.
- Content exchange and sharing systems and services are the cornerstone of the modern information and communications technology. At any given time, every system or user is flooded with a huge amount of contents generated by machines or humans. Content could be text, multimedia, programs, signals, etc.
- Content could be text, multimedia, programs, signals, etc.
- order and interaction are needed and sometimes crucial.
- the subject lessons and assignments are organized in order and sequence from a time perspective. In many cases, these lessons are location bound too. Other dimensions sometimes are needed such as priorities and validity. Manual methods are error prone. Other workarounds are very complex and expensive.
- Embodiments of the present invention relate to methods and systems for exchanging location- bounded and time-bounded prioritized content batches.
- a server-implemented method comprises sending a tagged content from a sender's mobile device to a server via a communications network; redirecting the tagged content from the server to one or more recipients' mobile devices; and applying the access rules to determine the access rights of the recipients' mobile devices.
- the method includes tagging the content by the sender's location and other chosen
- the tags also include (but not limited to) validity period start date/time; validity period end date/time; specified location where to open/access the content; maximum access opportunities; and a sequence order.
- the method updates and presents the tags information.
- the method further includes applying multiple access and validity rules.
- the sender sets some parameters that control these rules while the server and recipient mobile device apply these rules.
- the server determines if all the rules are fulfilled or not, in order to present the content to the recipient. If any rule is violated, the server prevents the recipient from requesting and presenting the content.
- the content is multimedia e.g. images, video clips, audio clips, text, or combinations of them.
- the content is a script/s, a program/s, or both.
- the sender may compose the content or share the content that is created by the system or a third party programs.
- the mobile device may be a
- the sender mobile device selects the recipients of the content. In some other embodiments, the sender may select to publish the content in a public environment and sets the access and validity rules.
- a server is connected to the network.
- the server is also configured to determine the access and validity rules associated with every content and recipient mobile device and perform the computational work in applying these rules.
- the method determines the difference between the recipient's current location and the location information tag. To fulfill the location rule, this difference must be negligible.
- the sender sets start date/time and end date/time of the validity period.
- the sender chooses whether the validity period is single or there are several validity periods.
- the sender sets the period type to be recurring or multiple.
- the method allows the sender to define a count rule by setting the number of max. access opportunities to the content. If this number is equal to the number of recipients, the content is accessible to all recipients. When this number is less than the number of recipients, the count rule is checked at every access attempt to allow only a subset of the recipients to access the content using a priority rule.
- the sender sends a batch of content elements with a sequence order and defines a priority rule to access the content. This sequence order is established by validity periods, sent dates/times or any other information. In some embodiments, the sender sets the sequence order manually. In some other embodiments, the sender may set an equal priority to all content elements. In some embodiments, the sequence order combined with the max. access opportunities determines several access rules. In some other embodiments, any recipient may access any content element until its max. access opportunities is reached. In other embodiments, any recipient may access only one content element and then is denied access to the rest of the batch. In some other embodiments, any recipient may access the first content element until it reaches its max. access opportunities. Then any other content element is available only to recipients who accessed its predecessor in the batch while the rest of recipients are denied access.
- the order of the content elements in the batch is irrelevant and the max. access opportunities determines some access rules. In some embodiments, all recipients can access every content element without specific order until the max. access opportunities of that element is reached. In other embodiments, any recipient can choose to access only one content element from the batch if the max. access opportunities for that content element is not reached.
- the batch has a common counter for max. access opportunities.
- the server decreases by one the common counter for the whole batch. Any content element is accessible until the common counter reaches zero. If a recipient is authorized to access a content element, this recipient will have access authorization to the whole batch.
- a method for utilizing a text or multimedia token as a key to access the content is described.
- the sender adds a token to the tags of the content.
- the recipient enters the token correctly upon fulfilling all other rules.
- the server applies the token matching rule to check the similarities between both tokens.
- the token may be a photo shot from the sent location, an alphanumeric code, or a sound clip.
- FIG. 1 is a schematic block diagram of an example content exchange and sharing system in accordance with some embodiments of the present disclosure.
- FIG. 2 is a flow diagram of a method for sharing a tagged content and applying the access rules in accordance with some embodiments of the present disclosure.
- FIG. 3 is a flow diagram of a method for applying the location rule in accordance with some embodiments of the present disclosure.
- FIG. 4 is a flow diagram of a method for applying the time validity rule in accordance with some embodiments of the present disclosure.
- FIG. 5 is a flow diagram of a method for applying a token matching rule in accordance with some embodiments of the present disclosure.
- the present disclosure relates to time/location based content exchange and sharing, and more particularly, to systems and methods for exchanging location-bounded and time- bounded prioritized content sequences and batches.
- This server-implemented method comprises sending, from a first mobile device (i.e. the sender) to a central server (i.e. the server) via a communication network, a tagged content with parameters of access rules.
- This method comprises also redirecting the tagged content by the server to a second mobile device (i.e. the recipient) to receive tags and the tagged content.
- This method comprises also applying rules to determine access rights of the recipients.
- Fig.l illustrates some embodiments where, the content exchange and sharing system is connected to a communications network 110 which may include wired or wireless communications networks, or combinations of both to provide wireless connectivity to mobile devices and any computing devices within the network.
- the system includes one or more mobile devices.
- a mobile device may be a communication device such as a cellular phone. According to known techniques, the mobile device can also measure the location information. The mobile device may send and receive communication signals over the network after the required network registration or activation procedures have been completed.
- the mobile devices may be managed by a central
- the management system includes a central server component 100, which administers and monitors the mobile devices, and a client component, which can be run on the mobile device to receive and execute management commands from the server component.
- the management system enables the server to, among other functionalities, configure and update device settings, enforce policies and rules, and remotely deploy applications to different devices.
- the mobile device includes a location measurement component.
- the location measurement component measures the device location using one or more of positioning technologies e.g. GPS 150.
- the location measurement component may use one or more hybrid algorithms for determining the location of the mobile device.
- the location measurement component may be integrated with a graphical map interface module to display the relative position of the recipient mobile device 130 with respect to the location tag of the content sent by the sender mobile device 120
- the content exchange and sharing system further includes a central server 100 connected to the network 110.
- the server is configured to determine the access rules and validity rules associated with every content and recipient.
- the server performs the computational work in applying these rules.
- the server may be implemented as a collection of a plurality of server computers.
- the server may store mobile devices information and their associated locations.
- the server may contain a database of sender and recipients mobile devices information. This information may indicate one or more of: a device identifier (e.g., serial number, phone number), a user associated with the device, history of content shared or exchanged (including appropriate timestamps) and a current location of the device.
- a device identifier e.g., serial number, phone number
- a user associated with the device e.g., phone number
- history of content shared or exchanged including appropriate timestamps
- the server may not have device information for the mobile devices.
- the server interacts with other systems, servers 170 and/or devices such as the mobile devices.
- content type 14 the content includes a content header and a content body.
- the content header comprises, but not limited to, unique identifier; tags; content type; sender identifier; and recipient identifier.
- the content body is a text.
- the content body is a multimedia e.g. images, video clips, audio clips, text, or combinations of them.
- the content body is a script/s or a program/s. content get
- the sender 120 creates the content body using the mobile device.
- the sender may compose a text using a keypad, capture an image or a video clip using a camera, records an audio clip using a microphone, or creates a content using a third party programs.
- the sender creates a script or a program that runs instructions on the recipient mobile device 130.
- the sender may share content body which is created by the system or a third party.
- the sender mobile device 120 exchanges or shares content which is tagged with location and time validity information and set by the sender at the time of sharing or sending the content.
- the method includes setting multiple access and validity rules.
- the sender sets the parameters that controls these rules.
- the server 100 and recipient 130 apply these rules.
- Fig.2 describes one embodiment of a method for applying some access rules.
- the mobile device includes a transceiver for sending/receiving the content with its tags, a processor, and a memory, in communication with the processor, the memory being configured to store instructions that are executable by the processor to carry out various functions.
- the instructions cause the sender's processor to get the content body, the tags, and the recipients' addresses.
- the instructions further cause the sender's processor to determine the current location of the mobile device using a location component of the mobile device, and store it as a location tag in the content header.
- the instructions also cause the sender's processor to determine the parameters for validity period/s and other access rules to be sent or shared via the transceiver to the server.
- the instructions cause the server to forward the content header with its tags to the recipients.
- the instructions then cause the recipient's processor to detect the content header being received via the transceiver.
- the content accessibility is based on a current location of the recipient and other validity rules.
- the instructions further cause the recipient's processor to determine its current location using a location component of the mobile device, and compare it with the location tag of the content to determine whether to access it or not. If the server determines that all rules are fulfilled, the instructions cause the recipient's processor to request the content body from the server and present the content body to the recipient's display. If any one of the rules is violated, the instructions cause the server to prevent the recipient from requesting and presenting the content body.
- the sender chooses to set the parameters of the rules. In some other embodiments, some or all parameters of the rules are set by the server. location get
- the sender determines the location information based on the sender location from which the content is sent. This information is included in the tags of the content and provides parameters to the location accessibility rule.
- the sender sets the location information from which the recipients can access the content.
- the present disclosure describes a method for sharing content which are tagged by the sender's location, a chosen validity period and other parameters.
- the tags also include (but not limited to) a brief description; sequence order; sender details; creation date/time; validity period start date/time; validity period end date/time; specified location information (e.g. by GPS coordinates) where to open/access the content; number of total recipients; and preset max. access opportunities N.
- the method updates the tags in the content header with the number of access opportunities and validity status.
- the method further includes presenting all content header information sent or received by the user of the mobile device. recipients
- the sender selects some users as recipients of the content. In some other embodiments, the sender may share the content with all users. share/net 23.
- the present disclosure proposes methods to control sharing content between groups of users.
- the sender publishes content in a common workspace or public bulletin environment and sets the parameters that controls the access and validity rules. location rule, location compare
- the method determines the recipient current location information and compares it with the location information stored within the content header in order to grant access to the content. To fulfill the location rule, the difference between the stored and current location information must be negligible.
- Fig.3 describes an example
- the sender sets the validity period start date/time and end date/time and then sends the content.
- the sender sets the period type to Once, Recurring, or Multiple.
- the recurring period type includes hourly, daily, weekly, monthly, and yearly. Multiple period type allows the sender to set several validity periods.
- the server 100 applies the time validity rule and updates the tags in the content header with validity time information.
- the server sets an absolute timer for the time validity displayed at the recipient mobile device and checks periodically the validity status of the content. When the current validity period expires, the server then invalidates the time validity rule and renders the content inaccessible.
- Fig.4 illustrates an example embodiment of the time validity rule when the period type is set to Once.
- the sender sends the content and sets the period type to
- the server sends the content header with the tags of the first period and checks every rule and condition. If the first period expires, the server makes the content inaccessible until the next period. When the next period arrives, the server then reinitiates all rules and conditions until this period expires and so on.
- the sender sends the content and sets the period type to Recurring.
- the sender sets also the recurring period type to hourly, daily, weekly, monthly, or yearly.
- the sender can set the time interval length between the validity periods.
- the sender sends the content and sets the period type to Multiple.
- the sender sets also the number of periods.
- the sender sets also the validity period start date/time and end date/time for every period. limited opportunities, count rule
- a count rule is established when the sender sets the value of maximum (allowed) access opportunities. If this value is equal to the number of recipients, then the count rule is fulfilled for all recipients and the content body is accessible to all recipients given that other rules are fulfilled. The number of recipients is computed when the sender selects the recipients or a group of recipients.
- the count rule is defined when the sender sets the value of max. access opportunities to less than number of recipients.
- the server checks the count rule at every access attempt to allow only a subset of the recipients to access the content who fulfilled all rules and conditions before the rest of the recipients by using a priority rule such as first-come-first-served FCFS. In this case, the first recipients who fulfilled all other access and validity rules can access the content body. The rest of the recipients are denied the access to the content body.
- the count rule is implemented by decreasing the max. access opportunities counter of the content after every successful access attempt and the server then presents the new max. opportunities counter to the sender and the recipients.
- the server applies the count rule and grants access to the recipient if the max. access opportunities does not equal zero.
- the server receives notification when a recipient accesses the content body. Upon receiving this notification, the server decreases the value of max. access opportunities by one and notifies the sender and all recipients. When the value of max. access opportunities reaches zero, the server invalidates this rule and renders the content inaccessible.
- the sender selects 5 recipients and sets the max. access opportunities to 2.
- the sender sends a batch of more than one content (i.e. a batch of content elements).
- the sender chooses to define a sequence rule in order to access the content. Recipient will not access any content element unless it is the first of the sequence or the recipient has accessed its predecessor in the batch.
- the content batch sequence is established by validity periods start and end dates/times. In other embodiments, the relative order is set by the sender.
- the sender sets a validity period for the whole batch. In some other embodiments, the sender sets a validity period for each content element. priority rules
- the method further includes determining the sequence order of a content in a batch of content elements based on selected priority rules.
- the sender sends a batch of content elements and sets the sequence parameter for the priority rule. If the sequence parameter is set to False, the server sets an equal priority to all content elements. If the sequence parameter is set to True, the server applies a priority rule and a recipient will not access any content element unless it is the first of the sequence or the recipient has accessed its predecessor in the sequence.
- the priority rule establishes the sequence order by validity periods start dates/times of each content element. Then, if two or more content elements have the same validity start date/time, the priority is established by validity period end dates/times. If two or more content elements have the same validity end date/time, the default priority is established by the sent and creation date/time, respectively.
- the sequence parameter is set to True and the priority rule is based on sent date/time.
- a recipient can only access the content element which is the earliest element by sent date/time or the recipient has accessed its predecessor in the sequence. batch sequence get 1 only
- the order of the content elements in a batch combined with the number of max. access opportunities determines another access rule (i.e. a compound rule).
- another access rule i.e. a compound rule.
- the server resets the max. access opportunities for the next content element which is available only to the rest of the recipients. The server repeats the previous steps to all content elements sequentially.
- the sender sends a content batch with number of content elements m, to a number of recipients n where max. access opportunities is set for each content element to N (where N ⁇ n) or is set individually to each element to Ni, N 2 , ... N m . Then the first set of recipients (N or Ni> to access the first element are not allowed to access the rest of elements. And the rest of recipients are now allowed to access the second element until another set of recipients (N or N 2 ) access the second element. At this point, the second content element is blocked the second set of recipients are denied access to the rest of elements in the batch of content.
- the server repeats the previous steps to all content elements in the batch sequentially.
- the compound rule is used to apply tiered discount campaigns or offers. batch sequence get all
- the server when the content batch sequence is established and the max. number of access opportunities is reached for the first content element of the batch, this content element is blocked and replaced by the second content element in the batch.
- the server resets the max. number of access opportunities for the second content element.
- the second content element is then available to all recipients and the server applies the access rules.
- the server repeats the previous steps to all content elements in the batch sequentially. batch sequence get lbyl
- the server when the content batch sequence is established and the max. number of access opportunities is reached for the first content element, this content element is blocked and replaced by the second content element in the batch.
- the server resets the max. number of access opportunities for the second content element.
- the second content element is then available to the set of recipients who accessed the first content element.
- the server applies the access rules.
- the rest of recipients is denied access to the rest of content elements in the batch.
- the server repeats the previous steps to all content elements in the batch sequentially. batch random get 1 only
- the order of the content elements in the batch is not set and the number of max. access opportunities determines a compound rule. All content elements have the same priority. Any recipient selects to access only one content element from the batch. The server prevents the recipient which accessed any content element from accessing another content element. When the max. number of access opportunities is reached for any content element, this content element is blocked and this element is not accessible to the rest of recipients. batch random get all
- the order of the content elements in the batch is not set and the number of max. access opportunities determines a compound access rule. All content elements have the same priority. Any recipient selects to access any number of content elements from the batch. The recipient can access a content element if the max. access opportunities of that content element is not reached. When that content element reaches its max. access opportunities, the server blocks the specified content element and makes the content element inaccessible to the rest of recipients. All recipients can access any other content element without specific order or sequence if the max. number of access opportunities of the content element is not reached. batch random get lbyl
- the order of the content elements in the batch is not set and the number of max. access opportunities determines a compound rule. All content elements in the batch share the same priority. The batch shares a common counter for max. access opportunities. If any recipient fulfills all rules and accesses a specific content element, the server will decrease (decrement by one) the common counter of max. access opportunities for all content elements in the batch. Then the server adds the recipient to a white list of recipients with a compound rule authorization to the whole batch. When the server grants access of a content element to the recipient, the server validates this rule for this recipient to all other content elements in the batch. The server monitors and updates the white list and the value of max. access opportunities to control this right to all recipients. If the common counter of max. access opportunities reaches zero, the recipients in the white list are the only recipients who are allowed to access the batch (upon validating other rules). The rest of recipients are blocked and denied access to the whole batch. token rule
- a method for utilizing a text or multimedia token as a key to access the content body is described.
- the sender adds a token to the tags in the content header.
- the recipient must enter the token after fulfilling all other access and validity rules.
- the server applies a token matching rule and checks the similarity and likeness of the recipient's entered token to the attached token to validate this rule.
- Fig.5 describes an example embodiment of the token matching rule.
- the token is a photo shot taken by the sender from the content location.
- the recipient can access this photo token and then tries to takes a similar photo shot by the mobile device camera at the same location.
- the server applies the token matching rule and checks the similarity and likeness of the recipient's shot to the attached token to validate this rule.
- the token is alphanumeric code which is set by the sender .
- the recipient enters the code by the mobile device keypad and the server checks the similarity of the recipient's entered code to the sender's attached code to validate this rule.
- the token is a sound clip recorded by the sender using the mobile device microphone.
- the recipient records a clip using the mobile device microphone and the server matches the recipient's recoded clip to the sender's attached clip to validate this rule.
- the system uses the token matching rules to apply pass code in gaming environments or to request answers in educational scenarios. In some other embodiments, the system uses the token matching rules to encrypt and decrypt the content or to secure content exchange methods.
- the server sets default or permanent values for some or all parameters that control the rules.
- the access and validity rules are used to define tasks and assignments for students and trainees in an educational environment such as schools or universities.
- the access and validity rules are used to define tasks and assignments for field personnel in business environment.
- the access and validity rules are used to create tasks and events for players in gaming and entertainments environment. 58. In some example embodiments, the access and validity rules are used to implement guided tours in tourism environment.
- the access and validity rules are used to implement share and exchange content in a social network environment.
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/IB2017/055222 WO2019043433A1 (en) | 2017-08-30 | 2017-08-30 | Rule-based content sharing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/IB2017/055222 WO2019043433A1 (en) | 2017-08-30 | 2017-08-30 | Rule-based content sharing |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019043433A1 true WO2019043433A1 (en) | 2019-03-07 |
Family
ID=59982422
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2017/055222 WO2019043433A1 (en) | 2017-08-30 | 2017-08-30 | Rule-based content sharing |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2019043433A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112351133A (en) * | 2019-08-07 | 2021-02-09 | 华为技术有限公司 | Media data sharing method and terminal |
CN115292624A (en) * | 2022-10-08 | 2022-11-04 | 成都同步新创科技股份有限公司 | Universal message processing method and device based on HTTP (hyper text transport protocol) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7925592B1 (en) * | 2006-09-27 | 2011-04-12 | Qurio Holdings, Inc. | System and method of using a proxy server to manage lazy content distribution in a social network |
US20130290426A1 (en) * | 2013-06-06 | 2013-10-31 | Sky Socket, Llc | Social Media and Data Sharing Controls |
US20160142913A1 (en) * | 2014-11-18 | 2016-05-19 | Motorola Mobility Llc | Methods and apparatus for content sharing between multiple mobile electronic devices |
-
2017
- 2017-08-30 WO PCT/IB2017/055222 patent/WO2019043433A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7925592B1 (en) * | 2006-09-27 | 2011-04-12 | Qurio Holdings, Inc. | System and method of using a proxy server to manage lazy content distribution in a social network |
US20130290426A1 (en) * | 2013-06-06 | 2013-10-31 | Sky Socket, Llc | Social Media and Data Sharing Controls |
US20160142913A1 (en) * | 2014-11-18 | 2016-05-19 | Motorola Mobility Llc | Methods and apparatus for content sharing between multiple mobile electronic devices |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112351133A (en) * | 2019-08-07 | 2021-02-09 | 华为技术有限公司 | Media data sharing method and terminal |
CN115292624A (en) * | 2022-10-08 | 2022-11-04 | 成都同步新创科技股份有限公司 | Universal message processing method and device based on HTTP (hyper text transport protocol) |
CN115292624B (en) * | 2022-10-08 | 2023-08-04 | 成都同步新创科技股份有限公司 | General message processing method and device based on HTTP protocol |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7246052B2 (en) | Customer relationship management system and method of handling customer service requests | |
US20210084144A1 (en) | Communication Channel Enhancement | |
US10356091B2 (en) | Communication enhancement methods | |
US10152718B1 (en) | Agent initiated actions | |
JP5925373B1 (en) | Communication support system | |
US11775939B2 (en) | Calendar comparison system and method | |
US11265419B1 (en) | Agent controlled menu | |
US11658887B2 (en) | Illicit route viewing system and method of operation | |
CN110457629A (en) | Permission processing, authority control method and device | |
US20170244805A1 (en) | Systems and methods for coordinating events | |
WO2019043433A1 (en) | Rule-based content sharing | |
EP3937097A1 (en) | System and method for verifiably proving proximity | |
US10447630B2 (en) | Method and system for anonymous and secure social linking during an event | |
KR20120132046A (en) | Method for registering of lectures by using relay server, and system thereof | |
US20220417234A1 (en) | Host-initiated authentication system and method | |
Ganesh et al. | Protection of shared data among multiple users for online social networks | |
EP3491883B1 (en) | Communication channel enhancement | |
US20220337541A1 (en) | Differentiated message presentation in a communication platform | |
US20220270054A1 (en) | Inferring meeting expense via a meeting expense and verification controller | |
US20160321439A1 (en) | Connection Prediction As Identity Verification | |
Tolley | Implementation and Evaluation of an Algorithm for User Identity and Permissions for Situational Awareness Analysis | |
JP2021157215A (en) | Authorization device, authorization method and authorization program | |
US20160071222A1 (en) | System and methods for managing relationships in a business network | |
KR20140115286A (en) | A system comprising mobile membership notebook app |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17777379 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17777379 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17777379 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 01/10/2021) |