WO2003040898A1 - Dispositif et procede pour le controle de la police de contenu au moyen d'un environnement de confiance dans un systeme de messagerie multimedia - Google Patents
Dispositif et procede pour le controle de la police de contenu au moyen d'un environnement de confiance dans un systeme de messagerie multimedia Download PDFInfo
- Publication number
- WO2003040898A1 WO2003040898A1 PCT/NO2002/000413 NO0200413W WO03040898A1 WO 2003040898 A1 WO2003040898 A1 WO 2003040898A1 NO 0200413 W NO0200413 W NO 0200413W WO 03040898 A1 WO03040898 A1 WO 03040898A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mms
- policy
- content
- message
- policies
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/58—Message adaptation for wireless communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/101—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/18—Service support devices; Network management devices
- H04W88/184—Messaging devices, e.g. message centre
Definitions
- the present invention is related to an arrangement and a method in messaging environments where value added content is protected and its distribution controlled and enforced according to the content owner's content policies.
- this invention relates to content policy enforcement within a trusted environment including, but not exclu- sive to, the messaging environment of mobile Multimedia Messaging Service.
- VAS SMS Short-Messag- ing-Services
- Some examples of VAS SMS are jokes (text format) , stock quotes (text format) , simple ringing tones (binary format) and black and white logos (binary format) .
- MMS mobile Multimedia Messaging Service
- VAS MMS Voice over IP Services
- Some examples of envisaged value added MMS and content are "mobile greeting card portal” (such as sending pictures/ animations, with or without sound from a portal to a mobile terminal) , "famous cartoon messages” (such as animations, with or without colours/audio) , "visual/audio quiz mes sages” (such as picture/audio messaging games) , "talking head message” (such as rendering a personal text with a predefined animation) .
- VAS MMS will be offered to the end users by operators and by independent 3rd party service and content providers (e.g. media houses, portals, broadcasting corporations) that utilise the wireless MMS infrastructure of the operators .
- Multimedia content has an inherently greater value to the content owners than plain text content (cf . SMS) .
- plain text content cf . SMS
- Examples of such content policies are: “content is to be charged the end-user on purchase and download, forwarding to other users is not allowed”, “the sender is to be charged an extra fee if content is forwarded to another user” , “content is not to be distributed (download or forwarded) to end-users under the age of 18” , “content can be distributed to mobile terminals with MS-ISDN addressing, content shall not be distributed (downloaded or forwarded) to e-mail addresses” , “content can only be distributed (downloaded or forwarded) to female end-users” , “content is not to be edited by end-user", and so on.
- the mobile operator has to provide a total solution to support these requirements so that content owners can securely make their content available for value added MMS with defined policies and thereby protect their intellectual property and their revenue streams .
- Policy detection and enforcement of value added content of today are essentially adapted to Internet models.
- access control is the platform for Internet Content Selection (PICS) [2] and Digital Signature (DSiG) 5 [3] , which is a standard solution for defining and controlling meta-data for web content.
- PICS Internet Content Selection
- DSL Digital Signature
- This solution defines a language and a set of processing rules for controlling access to content. This allows, e.g., parents to control what content their kids can access .
- o Policy binding to content is handled by the content provider, including meta-data in web files. Detection of the policy is handled by functionality within the web client by screening web files downloaded for meta-data. PICS and DSiG detects the rating policy statements (e.g., suitable for s persons under the age of 18) and gives presentation-access to the content according to allowed policies set within the web-client (e.g., only to present content that is suitable for users under the age of 18) .
- Digital watermark [4] that is a process where a pattern is added to the content itself to represent the policy. This pattern shall ideally be invisible for the end-user. Special web-clients or applications filter and recognise this 5 pattern and they give usage rights to the end-user according to the policy detected.
- the clearinghouse [5] model is a model where the content is packaged into an encoded container.
- the o container When reading the content with a client that can interpret the container, the o container will authorize usage rights according to the policy handling of a remote clearinghouse.
- Self-imposed access-control to content i.e. what can be presented or rendered after a download of content.
- the end-user can determine which policies should be enforced by configuring the presentation tool (i.e., the web client).
- the main object of the present invention is to provide an arrangement and a method that meets the requirements for content policy enforcement in the MMS architecture.
- the features defined in the claims enclosed characterize this arrangement .
- the present invention discloses an arrangement and a method for binding policies to MMS content to be distributed as MMS message transactions and gives content policy enforce- ment on MMS message transactions by controlling the transaction-transfer in the mobile network. Further, the arrangement provides retention of content policy bindings when MMS messages re-enters the mobile network as new mes- sage transactions providing a trusted environment for policy and content rights handling.
- the present invention presents an arrangement and a method consisting of four main components in an arrangement giving trusted environment characteristics : - Policy Binding Method (PBM) , that is used to bind policies to MMS content
- PBM Policy Binding Method
- PDF Policy Detection Filter
- PA Policy Agency
- TCM Trusted Client Method
- the PBM is used to add meta-data to the MMS message and message elements to give policy associations with the content when the MMS is distributed from a service provider to an end-user, via the mobile operator's infrastructure.
- PBM allows for the PDF to detect policies on the MMS in transfer within the mobile infrastructure.
- the PDF monitors the MMS in transfer within the mobile infrastructure. It resides within, or is closely coupled with, the MMS-C. PDF filters on the MMS and detects any policy meta-data, according to the PBM encoding, of messages passing through. MMS with policies detected are stalled in the delivery-transaction and held until the PA has processed the policies. The PDF requests the PA to process the policies.
- the PA enables or disables the message to be passed through to the end-user by informing the PDF of the action to be taken according to the PA result of the parsed policy.
- the PA receives the content policy references from the PDF and one or more of the following as input to the parsing: end- user data from the PDF, message content element references or content from the PDF, and end-user client profiles from the PDF.
- the TCM ensures that the meta-data of messages and message elements received on the mobile terminal will be retained if the message or message elements are sent back into the wireless network by the mobile terminal .
- Figure 1 illustrates the MMS architecture and the compo- nents involved in message transfer between mobile handsets (peer-peer and forwarding) and from a network server to a mobile handset (publishing) .
- Figure 2 illustrates the components involved according to the present invention and how they interact . The figure also illustrates how these components are placed in the MMS architecture .
- the MMS message delivery process for value added content is depicted in Figure 1. As illustrated, the message transfer can either be initiated from the network (i.e. published from a service provider) or it can be initiated from a peer terminal (user-agent) .
- the first delivery will always be initiated from the network (published) .
- the content may then be distributed (forwarded) in a peer-peer fashion.
- the invention builds on this nature for the distribution of value added content .
- the typical scenario consists of three steps, being the policy defini- tion, the publishing process and the forwarding control process.
- the policy definition process consists of the following:
- the content owner makes the value added content available (store in database) -
- the content owner defines the content policy and binds it to the content (store in database)
- the publishing process consists of the following:
- the mobile user requests value added content
- the content owner publishes the content onto the mo- bile infrastructure with its policies
- the MMS is in transfer, and:
- the policies are enforced -
- the value added content is sent to and retrieved by the mobile users, if allowed according to policy
- the forwarding control process consists of the following:
- the mobile user forwards some value added content to another peer user
- the MMS is in transfer, and: - The message is relayed through the mobile infrastructure
- the value added content is sent to and retrieved by the user to whom the content was being forwarded to, if allowed according to policy
- Examples of content and content elements that may comprise value added content/service data are audio files, pictures, animations, videos, and texts, and any combination of these [6,7,8,9,10] .
- the present invention provides functions that are used by the publishing process, when MMSs are in transfer, when published and when forwarded.
- the publishing process applies to content being delivered from a network server to a client terminal and its user- agent .
- the traffic flow is depicted in Figure 1 and labelled with (A) .
- the present invention introduces policy binding to the con- tent when the content is being published.
- the policy-binding component of the invention is depicted in Figure 2 and referred to as PBM.
- the Policy Binding Method is used to bind the policies to the content when the content is published.
- the PBM defines the formatting rules to be used.
- the formatting rules may for instance be implemented using XML-header [11] fields such as those found in SMIL [12] or WM [13], so that content policy identifiers can be included as meta-data and thereby associated with the message.
- the policy identifier may be represented in different ways: a) As a URL [14] reference to a policy database containing policies . b) As a URL reference to wrapper files containing both the reference to the content and to the policy. c) As a policy-flag or tag in combination with a shadow policy directory. In this case, all content URLs have a shadow policy URL, where there is a fixed relation between the two URLs (e.g. /image/cool .gif -> /image/cool_gif .policy) .
- the message is published (e.g., via the MMS-C MM7 interface) and introduced into the mobile operator's infrastructure. The message is then in transfer within the mobile infrastructure.
- the present invention introduces message transfer control to enforce policies associated with message transactions. These functions of the invention are depicted in Figure 2 and are referred to as PDF and PA.
- the Policy Detection Filter carries out control of content and resides within or is closely coupled to the MMS-C.
- the PDF checks if MMS content in transfer (both for MMSs published and MMSs in the forwarding process) has a defined policy and makes sure that the policy is enforced and activated by requesting the PA to do so.
- the PDF carries out the detection by screening for policy meta-data, formatted according to the PBM implementation. When the PDF identifies a content element with a policy, it will request the Policy Agency (PA) to process the policy.
- PA Policy Agency
- the PDF puts the message transaction on hold, and provides a reference to the policy and one or more of the following as input to the parsing: end-user data from the PDF, mes- sage content element references or content from the PDF, and end-user client profiles from the PDF.
- the PA may use different techniques to identify the policy of a content element .
- the technique used in this embodiment is determined by, and corresponds to, the policy represen- tation implementation of the policy identifiers used by the PBM.
- the PA will then process this policy and return an ok status code to the PDF if the content is allowed in this context.
- Content that is not allowed in the given context will be removed or replaced with a screening message by the PDF before a message is delivered (e.g., "Content requested not allowed” or "Content forwarded not allowed) .
- PA Policy Agency
- the check is performed by retrieving user information (e.g., address, age, prepaid account level), either from an independent database containing such information, or from the database of the mobile operator, and checking the user information with the content policy (e.g., age group allowed, price policy, number series allowed) .
- the content policy e.g., age group allowed, price policy, number series allowed.
- the PDF can retrieve information about the client (e.g., via a User Agent Profile, UAProf [13]), put the message transaction on hold, and pass the client information to the PA for policy handling.
- the PA can then return an ok status code to the PDF if the client is trusted and allowed in this context. For instance, if the particu- lar client does not have the TCM implemented, the PA can deny access to the content, according to defined policy. Content that is not allowed in this context will be removed or replaced with a screening message (e.g., "Content requested not allowed on this terminal") by the PDF before the message is delivered.
- a screening message e.g., "Content requested not allowed on this terminal
- the invention introduces a function on the terminal that retains MMSs with policy bindings.
- the function is depicted in Figure 2 and referred to as TCM.
- the Trusted Client Method is integrated as a function within the terminal (e.g., as an integrated part of the terminal's MMS client or the terminal's WAP [13] browser). It is used to ensure that terminals can be trusted to retain MMS policy bindings originated in the publishing process by the PBM implementation and contained within MMSs received/retrieved on the terminal .
- the MMS policies can be detected and enforced again if the MMS is sent back into the mobile messaging infrastructure.
- the PDF as previously described, is able to retrieve the information about a terminal client, whether or not TCM is implemented, and may o pass this on to the PA for policy enforcement in a trusted environment .
- the components and the arrangement of invention provide for a trusted environment for policy handling.
- the TCM may be implemented by the following procedure:
- MMS that is retrieved by the terminal is screened for s policies according to the encoding of the PBM.
- Detected policies together with the message element file references are stored in a list within the terminal's non-volatile memory.
- the associated policies are included in the MMS encoding according to the PBM implementation before the MMS is sent into the 5 mobile messaging infrastructure.
- the present invention provides a solution for policy enforcement of value added content in a mobile multimedia- messaging environment, extending the business potential for MMS. It handles enforcement of the message transaction-de- o livery, which is paramount to a mobile messaging environment .
- the invention provides a solution that is secure, ensuring not only that published content is enforced, but also that value added content that re-enters the mobile network in a peer-to-peer fashion can be securely enforced by retaining the policy bindings within the mobile client. This brings a trusted environment for policy handling and enforcement to MMS.
- the present invention provides a solution that easily can be integrated with existing mobile technology (i.e., terminals and MMS-clients, MMS-C infrastructure), thus enhancing and optimising the existing technologies with the important functionality for content policy handling.
- existing mobile technology i.e., terminals and MMS-clients, MMS-C infrastructure
- the invention provides an efficient solution for policy binding, policy detection, and policy enforcement, not requiring policies to be included within content in a pro- prietary and processing demanding way.
- the invention provides a solution that is compatible with all MMS content formats, comprising both existing and new formats .
- the invention provides a solution that gives flexible pol- icy enforcement functions by decoupling the policy enforcement functions from policy detection functions.
- MMS 3GPP TS 23.140 v .2.0 (2001-03), 3rd Generation Partnership Project; Technical Specification Group Terminals; Multimedia Messaging Service (MMS) ; Functional description; Stage 2 (Release 4)
- DSig PICS Signed Labels (DSig) 1.0 Specification, REC-DSig-label-19980527, World Wide Web Consortium (W3C) , Recommendation 27- May-1998
- AMR 3GPP TS 26.090 "AMR Speech Codec Speech Transcoding Functions"
- Synchronized Multimedia Integration Language 1.0 Specification, World Wide Web Consortium (W3C) , Recommendation 15-June-1998
Abstract
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NO20015471 | 2001-11-08 | ||
NO20015471A NO316737B1 (no) | 2001-11-08 | 2001-11-08 | Arrangement og fremgangsmate for innholdskontroll av dataobjekter, spesielt dataobjekter i MMS-meldinger |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003040898A1 true WO2003040898A1 (fr) | 2003-05-15 |
Family
ID=19913003
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/NO2002/000413 WO2003040898A1 (fr) | 2001-11-08 | 2002-11-08 | Dispositif et procede pour le controle de la police de contenu au moyen d'un environnement de confiance dans un systeme de messagerie multimedia |
Country Status (2)
Country | Link |
---|---|
NO (1) | NO316737B1 (fr) |
WO (1) | WO2003040898A1 (fr) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003101054A1 (fr) * | 2002-05-24 | 2003-12-04 | Siemens Aktiengesellschaft | Procede et dispositif pour transmettre des donnees |
WO2005004439A1 (fr) * | 2003-07-03 | 2005-01-13 | Nanyang Polytechnic | Procede et systeme pour controler de maniere selective un service mms dans des locaux bien definis |
WO2005043942A1 (fr) * | 2003-10-27 | 2005-05-12 | Siemens Aktiengesellschaft | Procede de transmission d'objets de donnees utiles cryptes |
EP1566931A1 (fr) * | 2004-02-19 | 2005-08-24 | Openmind Networks Limited | Système de gestion de contenu |
EP1598728A2 (fr) * | 2004-05-05 | 2005-11-23 | TeliaSonera AB | Méthode et dispositif pour imposer des droits numériques |
FR2880758A1 (fr) * | 2005-01-12 | 2006-07-14 | Bouygues Telecom Sa | Procede de diffusion de contenu numerique via un reseau de telephone mobile |
EP1728173A2 (fr) * | 2004-03-23 | 2006-12-06 | NDS Limited | Adaptation optimale de contenu multimedia a reproduire sur un dispositif d'abonne mobile |
US7190808B2 (en) | 2004-03-12 | 2007-03-13 | Interdigital Technology Corporation | Method for watermarking recordings based on atmospheric conditions |
US7272240B2 (en) | 2004-12-03 | 2007-09-18 | Interdigital Technology Corporation | Method and apparatus for generating, sensing, and adjusting watermarks |
JP2007287148A (ja) * | 2006-04-12 | 2007-11-01 | Internatl Business Mach Corp <Ibm> | 配送保証されるコンテンツベースのパブリッシュ/サブスクライブ・システムの動的アクセス制御 |
WO2008061477A1 (fr) * | 2006-11-20 | 2008-05-29 | Huawei Technologies Co., Ltd. | Système et procédé de commande de facturation d'une structure de commande de facturation de politique de fusion de réseau |
EP2081338A3 (fr) * | 2004-11-02 | 2009-07-29 | Nokia Corporation | Information pour dispositif récepteur des propriétés de contenu de message |
US7773571B1 (en) | 2006-02-03 | 2010-08-10 | Nortel Networks Limited | Transfer of policy and charging rules during MIP handover |
US7890657B2 (en) | 2008-06-12 | 2011-02-15 | Genband Us Llc | System and method for correct routing and enforcement policy in a network having address or port translation |
US7904723B2 (en) | 2005-01-12 | 2011-03-08 | Interdigital Technology Corporation | Method and apparatus for enhancing security of wireless communications |
US7987369B2 (en) | 2005-03-03 | 2011-07-26 | Interdigital Technology Corporation | Using watermarking to reduce communication overhead |
US20110321119A1 (en) * | 2010-06-28 | 2011-12-29 | Seigo Kotani | Consigning Authentication Method |
WO2012001475A1 (fr) * | 2010-06-28 | 2012-01-05 | Fujitsu Limited | Fourniture de procédé d'authentification |
US8353000B2 (en) | 2006-11-20 | 2013-01-08 | Huawei Technologies Co., Ltd. | System and charging control method of network convergence policy and charging control architecture |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000028398A1 (fr) * | 1998-11-10 | 2000-05-18 | Koninklijke Philips Electronics N.V. | Contenu fourni sous forme d'objets logiciels pour la protection du droit d'auteur |
WO2000078004A2 (fr) * | 1999-06-10 | 2000-12-21 | Alcatel Internetworking, Inc. | Architecture de reseau basee sur une politique |
US6286052B1 (en) * | 1998-12-04 | 2001-09-04 | Cisco Technology, Inc. | Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows |
WO2001076181A2 (fr) * | 2000-03-31 | 2001-10-11 | Tumbleweed Communications Corp. | Application d'une politique dans un systeme securise d'expedition de donnees |
EP1217591A1 (fr) * | 2000-12-21 | 2002-06-26 | Nokia Corporation | Améliorations apportées à la diffusion de contenu |
-
2001
- 2001-11-08 NO NO20015471A patent/NO316737B1/no unknown
-
2002
- 2002-11-08 WO PCT/NO2002/000413 patent/WO2003040898A1/fr not_active Application Discontinuation
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000028398A1 (fr) * | 1998-11-10 | 2000-05-18 | Koninklijke Philips Electronics N.V. | Contenu fourni sous forme d'objets logiciels pour la protection du droit d'auteur |
US6286052B1 (en) * | 1998-12-04 | 2001-09-04 | Cisco Technology, Inc. | Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows |
WO2000078004A2 (fr) * | 1999-06-10 | 2000-12-21 | Alcatel Internetworking, Inc. | Architecture de reseau basee sur une politique |
WO2001076181A2 (fr) * | 2000-03-31 | 2001-10-11 | Tumbleweed Communications Corp. | Application d'une politique dans un systeme securise d'expedition de donnees |
EP1217591A1 (fr) * | 2000-12-21 | 2002-06-26 | Nokia Corporation | Améliorations apportées à la diffusion de contenu |
Cited By (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003101054A1 (fr) * | 2002-05-24 | 2003-12-04 | Siemens Aktiengesellschaft | Procede et dispositif pour transmettre des donnees |
WO2005004439A1 (fr) * | 2003-07-03 | 2005-01-13 | Nanyang Polytechnic | Procede et systeme pour controler de maniere selective un service mms dans des locaux bien definis |
WO2005043942A1 (fr) * | 2003-10-27 | 2005-05-12 | Siemens Aktiengesellschaft | Procede de transmission d'objets de donnees utiles cryptes |
US7877598B2 (en) | 2003-10-27 | 2011-01-25 | Siemens Aktiengesellschaft | Method for transmitting encrypted user data objects |
EP1566931A1 (fr) * | 2004-02-19 | 2005-08-24 | Openmind Networks Limited | Système de gestion de contenu |
WO2005081476A1 (fr) * | 2004-02-19 | 2005-09-01 | Openmind Networks Limited | Systeme de gestion de contenu |
US7190808B2 (en) | 2004-03-12 | 2007-03-13 | Interdigital Technology Corporation | Method for watermarking recordings based on atmospheric conditions |
EP1728173A2 (fr) * | 2004-03-23 | 2006-12-06 | NDS Limited | Adaptation optimale de contenu multimedia a reproduire sur un dispositif d'abonne mobile |
US8782281B2 (en) | 2004-03-23 | 2014-07-15 | Cisco Technology Inc. | Optimally adapting multimedia content for mobile subscriber device playback |
EP1728173A4 (fr) * | 2004-03-23 | 2010-06-09 | Nds Ltd | Adaptation optimale de contenu multimedia a reproduire sur un dispositif d'abonne mobile |
EP1598728A2 (fr) * | 2004-05-05 | 2005-11-23 | TeliaSonera AB | Méthode et dispositif pour imposer des droits numériques |
EP1598728A3 (fr) * | 2004-05-05 | 2012-08-01 | TeliaSonera AB | Méthode et dispositif pour imposer des droits numériques |
US9369306B2 (en) | 2004-11-02 | 2016-06-14 | Microsoft Technology Licensing, Llc. | Informing recipient device of message content properties |
EP2081338A3 (fr) * | 2004-11-02 | 2009-07-29 | Nokia Corporation | Information pour dispositif récepteur des propriétés de contenu de message |
US8321954B2 (en) | 2004-11-02 | 2012-11-27 | Core Wireless Licensing S.A.R.L. | Informing recipient device of message content properties |
US7272240B2 (en) | 2004-12-03 | 2007-09-18 | Interdigital Technology Corporation | Method and apparatus for generating, sensing, and adjusting watermarks |
FR2880758A1 (fr) * | 2005-01-12 | 2006-07-14 | Bouygues Telecom Sa | Procede de diffusion de contenu numerique via un reseau de telephone mobile |
US7904723B2 (en) | 2005-01-12 | 2011-03-08 | Interdigital Technology Corporation | Method and apparatus for enhancing security of wireless communications |
EP1699024A1 (fr) * | 2005-01-12 | 2006-09-06 | Bouygues Telecom | Procédé de diffusion de contenu numérique via un réseau de téléphonie mobile |
US8458481B2 (en) | 2005-03-03 | 2013-06-04 | Interdigital Technology Corporation | Using watermarking to reduce communication overhead |
US7987369B2 (en) | 2005-03-03 | 2011-07-26 | Interdigital Technology Corporation | Using watermarking to reduce communication overhead |
US7773571B1 (en) | 2006-02-03 | 2010-08-10 | Nortel Networks Limited | Transfer of policy and charging rules during MIP handover |
US8392961B2 (en) | 2006-04-12 | 2013-03-05 | International Business Machines Corporation | Dynamic access control in a content-based publish/subscribe system with delivery guarantees |
JP2007287148A (ja) * | 2006-04-12 | 2007-11-01 | Internatl Business Mach Corp <Ibm> | 配送保証されるコンテンツベースのパブリッシュ/サブスクライブ・システムの動的アクセス制御 |
US8353000B2 (en) | 2006-11-20 | 2013-01-08 | Huawei Technologies Co., Ltd. | System and charging control method of network convergence policy and charging control architecture |
WO2008061477A1 (fr) * | 2006-11-20 | 2008-05-29 | Huawei Technologies Co., Ltd. | Système et procédé de commande de facturation d'une structure de commande de facturation de politique de fusion de réseau |
US7890657B2 (en) | 2008-06-12 | 2011-02-15 | Genband Us Llc | System and method for correct routing and enforcement policy in a network having address or port translation |
WO2012001476A3 (fr) * | 2010-06-28 | 2012-03-01 | Fujitsu Limited | Fourniture de procédé d'authentification |
WO2012001475A1 (fr) * | 2010-06-28 | 2012-01-05 | Fujitsu Limited | Fourniture de procédé d'authentification |
US20110321119A1 (en) * | 2010-06-28 | 2011-12-29 | Seigo Kotani | Consigning Authentication Method |
CN103069767A (zh) * | 2010-06-28 | 2013-04-24 | 富士通株式会社 | 交付认证方法 |
JP2013529822A (ja) * | 2010-06-28 | 2013-07-22 | 富士通株式会社 | 委託型認証方法 |
JP2013533552A (ja) * | 2010-06-28 | 2013-08-22 | 富士通株式会社 | 委託型認証方法 |
US8726335B2 (en) | 2010-06-28 | 2014-05-13 | Fujitsu Limited | Consigning authentication method |
US9467448B2 (en) | 2010-06-28 | 2016-10-11 | Fujitsu Limited | Consigning authentication method |
Also Published As
Publication number | Publication date |
---|---|
NO316737B1 (no) | 2004-04-19 |
NO20015471D0 (no) | 2001-11-08 |
NO20015471L (no) | 2003-05-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2003040898A1 (fr) | Dispositif et procede pour le controle de la police de contenu au moyen d'un environnement de confiance dans un systeme de messagerie multimedia | |
US10952040B2 (en) | Mobile machine | |
US7805522B2 (en) | Method for the transmission of user data objects | |
US7779077B2 (en) | File transmission method in instant messaging service and mobile communications terminal for supporting the same | |
WO2002103968A1 (fr) | Dispositif et procede de controle de regles de contenu dans un systeme de messagerie multimedia mobile | |
US20060176902A1 (en) | Method of processing a multimedia message, a storage medium, and an associated processing system | |
EP2022231A2 (fr) | Procédé et architecture de fourniture de contenu multimédia de cartes d'affaires pré-personnalisées via des réseaux mobiles terrestres publics basés sur sous-système multimédia ip permettant l'amélioration de la ligne appelante existante | |
EP1571792B1 (fr) | Système de service de messagerie multimédia et procédé pour celui-ci | |
JP2010257465A (ja) | ファイルタイプおよび/またはファイルフォーマットの変換を伴うmmsメッセージの伝送方法、加入者端末装置 | |
US20060224684A1 (en) | Multimedia messaging method and system | |
US20060041511A1 (en) | Device and method for digital rights management in a mobile terminal | |
TW200843425A (en) | System and method for transformation of syndicated content for mobile delivery | |
Le Bodic | Multimedia messaging service | |
AU2004324519B2 (en) | Informing recipient device of message content properties | |
KR20060082404A (ko) | 이동전화망을 통한 디지털 컨텐츠 송신방법 | |
US20060007893A1 (en) | System for adapting printed literary, educational, and business works to fixed-line and mobile telephony networks | |
CN100574521C (zh) | Mms信息溯源方法 | |
EP1655649A2 (fr) | Dispositif et procédé de gestion de droits numériques dans un terminal mobile | |
KR100645920B1 (ko) | 이동통신 단말기를 위한 동영상메일 서비스 시스템 및 그방법 | |
KR101261229B1 (ko) | 이동통신 단말기를 이용한 개인화된 컨텐츠 제공 서비스시스템 및 방법 | |
WO2003047207A1 (fr) | Procede et dispositif de definition et de commande de la diffusion de messages | |
Jun et al. | Interactive multimedia messaging service platform | |
JP4098763B2 (ja) | サーバ装置 | |
Alliance | Standard Transcoding Interface Specification | |
Nassiri | Value Added Application Service Interworking and Functionality in Multimedia Messaging Service Center |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SC SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |