WO2003040898A1 - Dispositif et procede pour le controle de la police de contenu au moyen d'un environnement de confiance dans un systeme de messagerie multimedia - Google Patents

Dispositif et procede pour le controle de la police de contenu au moyen d'un environnement de confiance dans un systeme de messagerie multimedia Download PDF

Info

Publication number
WO2003040898A1
WO2003040898A1 PCT/NO2002/000413 NO0200413W WO03040898A1 WO 2003040898 A1 WO2003040898 A1 WO 2003040898A1 NO 0200413 W NO0200413 W NO 0200413W WO 03040898 A1 WO03040898 A1 WO 03040898A1
Authority
WO
WIPO (PCT)
Prior art keywords
mms
policy
content
message
policies
Prior art date
Application number
PCT/NO2002/000413
Other languages
English (en)
Inventor
Øyvind BREIVIK
Original Assignee
Beep Science As
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beep Science As filed Critical Beep Science As
Publication of WO2003040898A1 publication Critical patent/WO2003040898A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/58Message adaptation for wireless communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/18Service support devices; Network management devices
    • H04W88/184Messaging devices, e.g. message centre

Definitions

  • the present invention is related to an arrangement and a method in messaging environments where value added content is protected and its distribution controlled and enforced according to the content owner's content policies.
  • this invention relates to content policy enforcement within a trusted environment including, but not exclu- sive to, the messaging environment of mobile Multimedia Messaging Service.
  • VAS SMS Short-Messag- ing-Services
  • Some examples of VAS SMS are jokes (text format) , stock quotes (text format) , simple ringing tones (binary format) and black and white logos (binary format) .
  • MMS mobile Multimedia Messaging Service
  • VAS MMS Voice over IP Services
  • Some examples of envisaged value added MMS and content are "mobile greeting card portal” (such as sending pictures/ animations, with or without sound from a portal to a mobile terminal) , "famous cartoon messages” (such as animations, with or without colours/audio) , "visual/audio quiz mes sages” (such as picture/audio messaging games) , "talking head message” (such as rendering a personal text with a predefined animation) .
  • VAS MMS will be offered to the end users by operators and by independent 3rd party service and content providers (e.g. media houses, portals, broadcasting corporations) that utilise the wireless MMS infrastructure of the operators .
  • Multimedia content has an inherently greater value to the content owners than plain text content (cf . SMS) .
  • plain text content cf . SMS
  • Examples of such content policies are: “content is to be charged the end-user on purchase and download, forwarding to other users is not allowed”, “the sender is to be charged an extra fee if content is forwarded to another user” , “content is not to be distributed (download or forwarded) to end-users under the age of 18” , “content can be distributed to mobile terminals with MS-ISDN addressing, content shall not be distributed (downloaded or forwarded) to e-mail addresses” , “content can only be distributed (downloaded or forwarded) to female end-users” , “content is not to be edited by end-user", and so on.
  • the mobile operator has to provide a total solution to support these requirements so that content owners can securely make their content available for value added MMS with defined policies and thereby protect their intellectual property and their revenue streams .
  • Policy detection and enforcement of value added content of today are essentially adapted to Internet models.
  • access control is the platform for Internet Content Selection (PICS) [2] and Digital Signature (DSiG) 5 [3] , which is a standard solution for defining and controlling meta-data for web content.
  • PICS Internet Content Selection
  • DSL Digital Signature
  • This solution defines a language and a set of processing rules for controlling access to content. This allows, e.g., parents to control what content their kids can access .
  • o Policy binding to content is handled by the content provider, including meta-data in web files. Detection of the policy is handled by functionality within the web client by screening web files downloaded for meta-data. PICS and DSiG detects the rating policy statements (e.g., suitable for s persons under the age of 18) and gives presentation-access to the content according to allowed policies set within the web-client (e.g., only to present content that is suitable for users under the age of 18) .
  • Digital watermark [4] that is a process where a pattern is added to the content itself to represent the policy. This pattern shall ideally be invisible for the end-user. Special web-clients or applications filter and recognise this 5 pattern and they give usage rights to the end-user according to the policy detected.
  • the clearinghouse [5] model is a model where the content is packaged into an encoded container.
  • the o container When reading the content with a client that can interpret the container, the o container will authorize usage rights according to the policy handling of a remote clearinghouse.
  • Self-imposed access-control to content i.e. what can be presented or rendered after a download of content.
  • the end-user can determine which policies should be enforced by configuring the presentation tool (i.e., the web client).
  • the main object of the present invention is to provide an arrangement and a method that meets the requirements for content policy enforcement in the MMS architecture.
  • the features defined in the claims enclosed characterize this arrangement .
  • the present invention discloses an arrangement and a method for binding policies to MMS content to be distributed as MMS message transactions and gives content policy enforce- ment on MMS message transactions by controlling the transaction-transfer in the mobile network. Further, the arrangement provides retention of content policy bindings when MMS messages re-enters the mobile network as new mes- sage transactions providing a trusted environment for policy and content rights handling.
  • the present invention presents an arrangement and a method consisting of four main components in an arrangement giving trusted environment characteristics : - Policy Binding Method (PBM) , that is used to bind policies to MMS content
  • PBM Policy Binding Method
  • PDF Policy Detection Filter
  • PA Policy Agency
  • TCM Trusted Client Method
  • the PBM is used to add meta-data to the MMS message and message elements to give policy associations with the content when the MMS is distributed from a service provider to an end-user, via the mobile operator's infrastructure.
  • PBM allows for the PDF to detect policies on the MMS in transfer within the mobile infrastructure.
  • the PDF monitors the MMS in transfer within the mobile infrastructure. It resides within, or is closely coupled with, the MMS-C. PDF filters on the MMS and detects any policy meta-data, according to the PBM encoding, of messages passing through. MMS with policies detected are stalled in the delivery-transaction and held until the PA has processed the policies. The PDF requests the PA to process the policies.
  • the PA enables or disables the message to be passed through to the end-user by informing the PDF of the action to be taken according to the PA result of the parsed policy.
  • the PA receives the content policy references from the PDF and one or more of the following as input to the parsing: end- user data from the PDF, message content element references or content from the PDF, and end-user client profiles from the PDF.
  • the TCM ensures that the meta-data of messages and message elements received on the mobile terminal will be retained if the message or message elements are sent back into the wireless network by the mobile terminal .
  • Figure 1 illustrates the MMS architecture and the compo- nents involved in message transfer between mobile handsets (peer-peer and forwarding) and from a network server to a mobile handset (publishing) .
  • Figure 2 illustrates the components involved according to the present invention and how they interact . The figure also illustrates how these components are placed in the MMS architecture .
  • the MMS message delivery process for value added content is depicted in Figure 1. As illustrated, the message transfer can either be initiated from the network (i.e. published from a service provider) or it can be initiated from a peer terminal (user-agent) .
  • the first delivery will always be initiated from the network (published) .
  • the content may then be distributed (forwarded) in a peer-peer fashion.
  • the invention builds on this nature for the distribution of value added content .
  • the typical scenario consists of three steps, being the policy defini- tion, the publishing process and the forwarding control process.
  • the policy definition process consists of the following:
  • the content owner makes the value added content available (store in database) -
  • the content owner defines the content policy and binds it to the content (store in database)
  • the publishing process consists of the following:
  • the mobile user requests value added content
  • the content owner publishes the content onto the mo- bile infrastructure with its policies
  • the MMS is in transfer, and:
  • the policies are enforced -
  • the value added content is sent to and retrieved by the mobile users, if allowed according to policy
  • the forwarding control process consists of the following:
  • the mobile user forwards some value added content to another peer user
  • the MMS is in transfer, and: - The message is relayed through the mobile infrastructure
  • the value added content is sent to and retrieved by the user to whom the content was being forwarded to, if allowed according to policy
  • Examples of content and content elements that may comprise value added content/service data are audio files, pictures, animations, videos, and texts, and any combination of these [6,7,8,9,10] .
  • the present invention provides functions that are used by the publishing process, when MMSs are in transfer, when published and when forwarded.
  • the publishing process applies to content being delivered from a network server to a client terminal and its user- agent .
  • the traffic flow is depicted in Figure 1 and labelled with (A) .
  • the present invention introduces policy binding to the con- tent when the content is being published.
  • the policy-binding component of the invention is depicted in Figure 2 and referred to as PBM.
  • the Policy Binding Method is used to bind the policies to the content when the content is published.
  • the PBM defines the formatting rules to be used.
  • the formatting rules may for instance be implemented using XML-header [11] fields such as those found in SMIL [12] or WM [13], so that content policy identifiers can be included as meta-data and thereby associated with the message.
  • the policy identifier may be represented in different ways: a) As a URL [14] reference to a policy database containing policies . b) As a URL reference to wrapper files containing both the reference to the content and to the policy. c) As a policy-flag or tag in combination with a shadow policy directory. In this case, all content URLs have a shadow policy URL, where there is a fixed relation between the two URLs (e.g. /image/cool .gif -> /image/cool_gif .policy) .
  • the message is published (e.g., via the MMS-C MM7 interface) and introduced into the mobile operator's infrastructure. The message is then in transfer within the mobile infrastructure.
  • the present invention introduces message transfer control to enforce policies associated with message transactions. These functions of the invention are depicted in Figure 2 and are referred to as PDF and PA.
  • the Policy Detection Filter carries out control of content and resides within or is closely coupled to the MMS-C.
  • the PDF checks if MMS content in transfer (both for MMSs published and MMSs in the forwarding process) has a defined policy and makes sure that the policy is enforced and activated by requesting the PA to do so.
  • the PDF carries out the detection by screening for policy meta-data, formatted according to the PBM implementation. When the PDF identifies a content element with a policy, it will request the Policy Agency (PA) to process the policy.
  • PA Policy Agency
  • the PDF puts the message transaction on hold, and provides a reference to the policy and one or more of the following as input to the parsing: end-user data from the PDF, mes- sage content element references or content from the PDF, and end-user client profiles from the PDF.
  • the PA may use different techniques to identify the policy of a content element .
  • the technique used in this embodiment is determined by, and corresponds to, the policy represen- tation implementation of the policy identifiers used by the PBM.
  • the PA will then process this policy and return an ok status code to the PDF if the content is allowed in this context.
  • Content that is not allowed in the given context will be removed or replaced with a screening message by the PDF before a message is delivered (e.g., "Content requested not allowed” or "Content forwarded not allowed) .
  • PA Policy Agency
  • the check is performed by retrieving user information (e.g., address, age, prepaid account level), either from an independent database containing such information, or from the database of the mobile operator, and checking the user information with the content policy (e.g., age group allowed, price policy, number series allowed) .
  • the content policy e.g., age group allowed, price policy, number series allowed.
  • the PDF can retrieve information about the client (e.g., via a User Agent Profile, UAProf [13]), put the message transaction on hold, and pass the client information to the PA for policy handling.
  • the PA can then return an ok status code to the PDF if the client is trusted and allowed in this context. For instance, if the particu- lar client does not have the TCM implemented, the PA can deny access to the content, according to defined policy. Content that is not allowed in this context will be removed or replaced with a screening message (e.g., "Content requested not allowed on this terminal") by the PDF before the message is delivered.
  • a screening message e.g., "Content requested not allowed on this terminal
  • the invention introduces a function on the terminal that retains MMSs with policy bindings.
  • the function is depicted in Figure 2 and referred to as TCM.
  • the Trusted Client Method is integrated as a function within the terminal (e.g., as an integrated part of the terminal's MMS client or the terminal's WAP [13] browser). It is used to ensure that terminals can be trusted to retain MMS policy bindings originated in the publishing process by the PBM implementation and contained within MMSs received/retrieved on the terminal .
  • the MMS policies can be detected and enforced again if the MMS is sent back into the mobile messaging infrastructure.
  • the PDF as previously described, is able to retrieve the information about a terminal client, whether or not TCM is implemented, and may o pass this on to the PA for policy enforcement in a trusted environment .
  • the components and the arrangement of invention provide for a trusted environment for policy handling.
  • the TCM may be implemented by the following procedure:
  • MMS that is retrieved by the terminal is screened for s policies according to the encoding of the PBM.
  • Detected policies together with the message element file references are stored in a list within the terminal's non-volatile memory.
  • the associated policies are included in the MMS encoding according to the PBM implementation before the MMS is sent into the 5 mobile messaging infrastructure.
  • the present invention provides a solution for policy enforcement of value added content in a mobile multimedia- messaging environment, extending the business potential for MMS. It handles enforcement of the message transaction-de- o livery, which is paramount to a mobile messaging environment .
  • the invention provides a solution that is secure, ensuring not only that published content is enforced, but also that value added content that re-enters the mobile network in a peer-to-peer fashion can be securely enforced by retaining the policy bindings within the mobile client. This brings a trusted environment for policy handling and enforcement to MMS.
  • the present invention provides a solution that easily can be integrated with existing mobile technology (i.e., terminals and MMS-clients, MMS-C infrastructure), thus enhancing and optimising the existing technologies with the important functionality for content policy handling.
  • existing mobile technology i.e., terminals and MMS-clients, MMS-C infrastructure
  • the invention provides an efficient solution for policy binding, policy detection, and policy enforcement, not requiring policies to be included within content in a pro- prietary and processing demanding way.
  • the invention provides a solution that is compatible with all MMS content formats, comprising both existing and new formats .
  • the invention provides a solution that gives flexible pol- icy enforcement functions by decoupling the policy enforcement functions from policy detection functions.
  • MMS 3GPP TS 23.140 v .2.0 (2001-03), 3rd Generation Partnership Project; Technical Specification Group Terminals; Multimedia Messaging Service (MMS) ; Functional description; Stage 2 (Release 4)
  • DSig PICS Signed Labels (DSig) 1.0 Specification, REC-DSig-label-19980527, World Wide Web Consortium (W3C) , Recommendation 27- May-1998
  • AMR 3GPP TS 26.090 "AMR Speech Codec Speech Transcoding Functions"
  • Synchronized Multimedia Integration Language 1.0 Specification, World Wide Web Consortium (W3C) , Recommendation 15-June-1998

Abstract

La présente invention concerne un dispositif et un procédé permettant de lier des polices à un contenu de service de messagerie multimédia (MMS) à distribuer en tant que transactions de messages MMS, ainsi qu'un renforcement de la police de contenu en matière de transactions de messages MMS par le biais du contrôle, du filtrage et du chargement du transfert des transactions dans le réseau mobile. En outre, le dispositif permet le maintien des liaisons de polices de contenu, lorsque des messages MMS entrent à nouveau dans le réseau mobile en tant que nouvelles transactions de messages engendrant un environnement de confiance pour la gestion des droits de contenu et des polices. Le procédé de cette invention peut également être intégré dans une architecture MMS existante et il est compatible avec tous les formats de contenus MMS nouveaux et déjà existants.
PCT/NO2002/000413 2001-11-08 2002-11-08 Dispositif et procede pour le controle de la police de contenu au moyen d'un environnement de confiance dans un systeme de messagerie multimedia WO2003040898A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
NO20015471 2001-11-08
NO20015471A NO316737B1 (no) 2001-11-08 2001-11-08 Arrangement og fremgangsmate for innholdskontroll av dataobjekter, spesielt dataobjekter i MMS-meldinger

Publications (1)

Publication Number Publication Date
WO2003040898A1 true WO2003040898A1 (fr) 2003-05-15

Family

ID=19913003

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/NO2002/000413 WO2003040898A1 (fr) 2001-11-08 2002-11-08 Dispositif et procede pour le controle de la police de contenu au moyen d'un environnement de confiance dans un systeme de messagerie multimedia

Country Status (2)

Country Link
NO (1) NO316737B1 (fr)
WO (1) WO2003040898A1 (fr)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003101054A1 (fr) * 2002-05-24 2003-12-04 Siemens Aktiengesellschaft Procede et dispositif pour transmettre des donnees
WO2005004439A1 (fr) * 2003-07-03 2005-01-13 Nanyang Polytechnic Procede et systeme pour controler de maniere selective un service mms dans des locaux bien definis
WO2005043942A1 (fr) * 2003-10-27 2005-05-12 Siemens Aktiengesellschaft Procede de transmission d'objets de donnees utiles cryptes
EP1566931A1 (fr) * 2004-02-19 2005-08-24 Openmind Networks Limited Système de gestion de contenu
EP1598728A2 (fr) * 2004-05-05 2005-11-23 TeliaSonera AB Méthode et dispositif pour imposer des droits numériques
FR2880758A1 (fr) * 2005-01-12 2006-07-14 Bouygues Telecom Sa Procede de diffusion de contenu numerique via un reseau de telephone mobile
EP1728173A2 (fr) * 2004-03-23 2006-12-06 NDS Limited Adaptation optimale de contenu multimedia a reproduire sur un dispositif d'abonne mobile
US7190808B2 (en) 2004-03-12 2007-03-13 Interdigital Technology Corporation Method for watermarking recordings based on atmospheric conditions
US7272240B2 (en) 2004-12-03 2007-09-18 Interdigital Technology Corporation Method and apparatus for generating, sensing, and adjusting watermarks
JP2007287148A (ja) * 2006-04-12 2007-11-01 Internatl Business Mach Corp <Ibm> 配送保証されるコンテンツベースのパブリッシュ/サブスクライブ・システムの動的アクセス制御
WO2008061477A1 (fr) * 2006-11-20 2008-05-29 Huawei Technologies Co., Ltd. Système et procédé de commande de facturation d'une structure de commande de facturation de politique de fusion de réseau
EP2081338A3 (fr) * 2004-11-02 2009-07-29 Nokia Corporation Information pour dispositif récepteur des propriétés de contenu de message
US7773571B1 (en) 2006-02-03 2010-08-10 Nortel Networks Limited Transfer of policy and charging rules during MIP handover
US7890657B2 (en) 2008-06-12 2011-02-15 Genband Us Llc System and method for correct routing and enforcement policy in a network having address or port translation
US7904723B2 (en) 2005-01-12 2011-03-08 Interdigital Technology Corporation Method and apparatus for enhancing security of wireless communications
US7987369B2 (en) 2005-03-03 2011-07-26 Interdigital Technology Corporation Using watermarking to reduce communication overhead
US20110321119A1 (en) * 2010-06-28 2011-12-29 Seigo Kotani Consigning Authentication Method
WO2012001475A1 (fr) * 2010-06-28 2012-01-05 Fujitsu Limited Fourniture de procédé d'authentification
US8353000B2 (en) 2006-11-20 2013-01-08 Huawei Technologies Co., Ltd. System and charging control method of network convergence policy and charging control architecture

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000028398A1 (fr) * 1998-11-10 2000-05-18 Koninklijke Philips Electronics N.V. Contenu fourni sous forme d'objets logiciels pour la protection du droit d'auteur
WO2000078004A2 (fr) * 1999-06-10 2000-12-21 Alcatel Internetworking, Inc. Architecture de reseau basee sur une politique
US6286052B1 (en) * 1998-12-04 2001-09-04 Cisco Technology, Inc. Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows
WO2001076181A2 (fr) * 2000-03-31 2001-10-11 Tumbleweed Communications Corp. Application d'une politique dans un systeme securise d'expedition de donnees
EP1217591A1 (fr) * 2000-12-21 2002-06-26 Nokia Corporation Améliorations apportées à la diffusion de contenu

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000028398A1 (fr) * 1998-11-10 2000-05-18 Koninklijke Philips Electronics N.V. Contenu fourni sous forme d'objets logiciels pour la protection du droit d'auteur
US6286052B1 (en) * 1998-12-04 2001-09-04 Cisco Technology, Inc. Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows
WO2000078004A2 (fr) * 1999-06-10 2000-12-21 Alcatel Internetworking, Inc. Architecture de reseau basee sur une politique
WO2001076181A2 (fr) * 2000-03-31 2001-10-11 Tumbleweed Communications Corp. Application d'une politique dans un systeme securise d'expedition de donnees
EP1217591A1 (fr) * 2000-12-21 2002-06-26 Nokia Corporation Améliorations apportées à la diffusion de contenu

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003101054A1 (fr) * 2002-05-24 2003-12-04 Siemens Aktiengesellschaft Procede et dispositif pour transmettre des donnees
WO2005004439A1 (fr) * 2003-07-03 2005-01-13 Nanyang Polytechnic Procede et systeme pour controler de maniere selective un service mms dans des locaux bien definis
WO2005043942A1 (fr) * 2003-10-27 2005-05-12 Siemens Aktiengesellschaft Procede de transmission d'objets de donnees utiles cryptes
US7877598B2 (en) 2003-10-27 2011-01-25 Siemens Aktiengesellschaft Method for transmitting encrypted user data objects
EP1566931A1 (fr) * 2004-02-19 2005-08-24 Openmind Networks Limited Système de gestion de contenu
WO2005081476A1 (fr) * 2004-02-19 2005-09-01 Openmind Networks Limited Systeme de gestion de contenu
US7190808B2 (en) 2004-03-12 2007-03-13 Interdigital Technology Corporation Method for watermarking recordings based on atmospheric conditions
EP1728173A2 (fr) * 2004-03-23 2006-12-06 NDS Limited Adaptation optimale de contenu multimedia a reproduire sur un dispositif d'abonne mobile
US8782281B2 (en) 2004-03-23 2014-07-15 Cisco Technology Inc. Optimally adapting multimedia content for mobile subscriber device playback
EP1728173A4 (fr) * 2004-03-23 2010-06-09 Nds Ltd Adaptation optimale de contenu multimedia a reproduire sur un dispositif d'abonne mobile
EP1598728A2 (fr) * 2004-05-05 2005-11-23 TeliaSonera AB Méthode et dispositif pour imposer des droits numériques
EP1598728A3 (fr) * 2004-05-05 2012-08-01 TeliaSonera AB Méthode et dispositif pour imposer des droits numériques
US9369306B2 (en) 2004-11-02 2016-06-14 Microsoft Technology Licensing, Llc. Informing recipient device of message content properties
EP2081338A3 (fr) * 2004-11-02 2009-07-29 Nokia Corporation Information pour dispositif récepteur des propriétés de contenu de message
US8321954B2 (en) 2004-11-02 2012-11-27 Core Wireless Licensing S.A.R.L. Informing recipient device of message content properties
US7272240B2 (en) 2004-12-03 2007-09-18 Interdigital Technology Corporation Method and apparatus for generating, sensing, and adjusting watermarks
FR2880758A1 (fr) * 2005-01-12 2006-07-14 Bouygues Telecom Sa Procede de diffusion de contenu numerique via un reseau de telephone mobile
US7904723B2 (en) 2005-01-12 2011-03-08 Interdigital Technology Corporation Method and apparatus for enhancing security of wireless communications
EP1699024A1 (fr) * 2005-01-12 2006-09-06 Bouygues Telecom Procédé de diffusion de contenu numérique via un réseau de téléphonie mobile
US8458481B2 (en) 2005-03-03 2013-06-04 Interdigital Technology Corporation Using watermarking to reduce communication overhead
US7987369B2 (en) 2005-03-03 2011-07-26 Interdigital Technology Corporation Using watermarking to reduce communication overhead
US7773571B1 (en) 2006-02-03 2010-08-10 Nortel Networks Limited Transfer of policy and charging rules during MIP handover
US8392961B2 (en) 2006-04-12 2013-03-05 International Business Machines Corporation Dynamic access control in a content-based publish/subscribe system with delivery guarantees
JP2007287148A (ja) * 2006-04-12 2007-11-01 Internatl Business Mach Corp <Ibm> 配送保証されるコンテンツベースのパブリッシュ/サブスクライブ・システムの動的アクセス制御
US8353000B2 (en) 2006-11-20 2013-01-08 Huawei Technologies Co., Ltd. System and charging control method of network convergence policy and charging control architecture
WO2008061477A1 (fr) * 2006-11-20 2008-05-29 Huawei Technologies Co., Ltd. Système et procédé de commande de facturation d'une structure de commande de facturation de politique de fusion de réseau
US7890657B2 (en) 2008-06-12 2011-02-15 Genband Us Llc System and method for correct routing and enforcement policy in a network having address or port translation
WO2012001476A3 (fr) * 2010-06-28 2012-03-01 Fujitsu Limited Fourniture de procédé d'authentification
WO2012001475A1 (fr) * 2010-06-28 2012-01-05 Fujitsu Limited Fourniture de procédé d'authentification
US20110321119A1 (en) * 2010-06-28 2011-12-29 Seigo Kotani Consigning Authentication Method
CN103069767A (zh) * 2010-06-28 2013-04-24 富士通株式会社 交付认证方法
JP2013529822A (ja) * 2010-06-28 2013-07-22 富士通株式会社 委託型認証方法
JP2013533552A (ja) * 2010-06-28 2013-08-22 富士通株式会社 委託型認証方法
US8726335B2 (en) 2010-06-28 2014-05-13 Fujitsu Limited Consigning authentication method
US9467448B2 (en) 2010-06-28 2016-10-11 Fujitsu Limited Consigning authentication method

Also Published As

Publication number Publication date
NO316737B1 (no) 2004-04-19
NO20015471D0 (no) 2001-11-08
NO20015471L (no) 2003-05-09

Similar Documents

Publication Publication Date Title
WO2003040898A1 (fr) Dispositif et procede pour le controle de la police de contenu au moyen d&#39;un environnement de confiance dans un systeme de messagerie multimedia
US10952040B2 (en) Mobile machine
US7805522B2 (en) Method for the transmission of user data objects
US7779077B2 (en) File transmission method in instant messaging service and mobile communications terminal for supporting the same
WO2002103968A1 (fr) Dispositif et procede de controle de regles de contenu dans un systeme de messagerie multimedia mobile
US20060176902A1 (en) Method of processing a multimedia message, a storage medium, and an associated processing system
EP2022231A2 (fr) Procédé et architecture de fourniture de contenu multimédia de cartes d&#39;affaires pré-personnalisées via des réseaux mobiles terrestres publics basés sur sous-système multimédia ip permettant l&#39;amélioration de la ligne appelante existante
EP1571792B1 (fr) Système de service de messagerie multimédia et procédé pour celui-ci
JP2010257465A (ja) ファイルタイプおよび/またはファイルフォーマットの変換を伴うmmsメッセージの伝送方法、加入者端末装置
US20060224684A1 (en) Multimedia messaging method and system
US20060041511A1 (en) Device and method for digital rights management in a mobile terminal
TW200843425A (en) System and method for transformation of syndicated content for mobile delivery
Le Bodic Multimedia messaging service
AU2004324519B2 (en) Informing recipient device of message content properties
KR20060082404A (ko) 이동전화망을 통한 디지털 컨텐츠 송신방법
US20060007893A1 (en) System for adapting printed literary, educational, and business works to fixed-line and mobile telephony networks
CN100574521C (zh) Mms信息溯源方法
EP1655649A2 (fr) Dispositif et procédé de gestion de droits numériques dans un terminal mobile
KR100645920B1 (ko) 이동통신 단말기를 위한 동영상메일 서비스 시스템 및 그방법
KR101261229B1 (ko) 이동통신 단말기를 이용한 개인화된 컨텐츠 제공 서비스시스템 및 방법
WO2003047207A1 (fr) Procede et dispositif de definition et de commande de la diffusion de messages
Jun et al. Interactive multimedia messaging service platform
JP4098763B2 (ja) サーバ装置
Alliance Standard Transcoding Interface Specification
Nassiri Value Added Application Service Interworking and Functionality in Multimedia Messaging Service Center

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SC SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP