I. Field
The following description relates generally to wireless communications, and more particularly to personal data communication utilizing wireless networks.
II. Background
Wireless communication systems are widely deployed to provide various types of communication content such as, for example, voice, data, and so on. Typical wireless communication systems may be multiple-access systems capable of supporting communication with multiple users by sharing available system resources (e.g. bandwidth, transmit power, . . . ). Examples of such multiple-access systems may include code division multiple access (CDMA) systems, time division multiple access (TDMA) systems, frequency division multiple access (FDMA) systems, orthogonal frequency division multiple access (OFDMA) systems, and the like. Additionally, the systems can conform to specifications such as third generation partnership project (3GPP), 3GPP2, 3GPP long-term evolution (LTE), etc.
Moreover, many people own additional electronic devices that store content, whether for productivity or entertainment purposes. For example, people have desktop computers, laptop computers, personal digital assistants (PDA), digital video recorders (DVR), digital music players (e.g., MP3 players), digital cameras, locally or remotely located dedicated file servers, and/or the like. These devices, along with mobile devices, separately store information and media related to one or more people who own the devices. Furthermore, some devices allow access to other devices or for the other devices to locally store content. Thus, for example, one can store pictures from a digital camera onto a computer for viewing. Similarly, DVRs can allow viewing of media stored thereon through a networked computer, etc. In this regard, one can share personal data throughout a private network for accessing by different devices. However, attempts to expose personal data outside of a home network typically utilize remotely located storage as security is more easily implemented in this regard. Also, attempts to expose data from personal devices are typically proprietary to one device, usually a personal computer, and/or are not easily shared with other users. This is typically due to security concerns with infiltrating a personal network.
The following presents a simplified summary of one or more embodiments in order to provide a basic understanding of such embodiments. This summary is not an extensive overview of all contemplated embodiments, and is intended to neither identify key or critical elements of all embodiments nor delineate the scope of any or all embodiments. Its sole purpose is to present some concepts of one or more embodiments in a simplified form as a prelude to the more detailed description that is presented later.
In accordance with one or more embodiments and corresponding disclosure thereof, various aspects are described in connection with facilitating association of personal electronic devices in a mobile infosphere. Using a mobile device, access to the devices in the mobile infosphere can be attained based at least in part on security features inherent in mobile devices. Thus, the mobile device can be utilized to view media stored on the devices in the mobile infosphere. In one example, media can be transcoded before being sent to the mobile device to create a preview, lesser quality, or smaller sized media file for more efficient transmission. Moreover, data from mobile infospheres can be shared among users to and from various mobile infosphere devices. In this regard, a registry server can be utilized to associate various mobile infosphere devices with a user; in one example, a mobile phone number related to the user can be utilized to identify the user's mobile infosphere. Further, the mobile device can be utilized to authorize access to one or more devices in a user's mobile infosphere.
According to related aspects, a method that facilitates securely accessing devices of a mobile infosphere is provided. The method comprises receiving a short message service (SMS) message including an encrypted payload in response to a registration request to a registry server. The method also includes decrypting the payload using a first public key from the registry server and a private key related to a second public key transmitted in the registration request and encrypting the payload with the private key and the first public key. Moreover, the method includes transmitting the encrypted payload to complete registry server registration creating a mobile infosphere.
Another aspect relates to a wireless communications apparatus. The wireless communications apparatus can include at least one processor configured to obtain a SMS message in response to requesting mobile infosphere initialization in a registry server and decrypt the SMS message using a public key of the registry server and a private key transmitted in requesting mobile infosphere initialization. The processor is further configured to encrypt the decrypted SMS message using the public key and private key pair for verification and transmit the encrypted SMS message to the registry server to initialize the mobile infosphere. The wireless communications apparatus additionally includes a memory coupled to the at least one processor.
Yet another aspect relates to a wireless communications apparatus that initializes a mobile infosphere with a registry server. The wireless communications apparatus can comprise means for decrypting a SMS message received in response to a request for mobile infosphere initialization and means for encrypting the SMS message with a private key having a related public key specified in the request for mobile infosphere initialization. The wireless communications apparatus can additionally include means for transmitting the encrypted SMS to verify the request for mobile infosphere initialization.
Still another aspect relates to a computer program product, which can have a computer-readable medium including code for causing at least one computer to receive a SMS message including an encrypted payload in response to a registration request to a registry server. The computer-readable medium can also comprise code for causing the at least one computer to decrypt the payload using a first public key from the registry server and a private key related to a second public key transmitted in the registration request. Moreover, the computer-readable medium can comprise code for causing the at least one computer to encrypt the payload with the private key and the first public key and code for causing the at least one computer to transmit the encrypted payload to complete registry server registration creating a mobile infosphere.
According to a further aspect, a method for associating a plurality of devices in a mobile infosphere is provided. The method includes receiving a request to initialize a mobile infosphere from a mobile device comprising a public key for encrypting communication to the mobile device. The method also comprises transmitting a SMS message comprising a payload encrypted with a public key of a mobile device and a private key to the mobile device and decrypting a response message with the public key of the mobile device and the private key. Further, the method includes initializing the mobile infosphere for the mobile device based at least in part on comparing the response message with the SMS message.
Another aspect relates to a wireless communications apparatus. The wireless communications apparatus can include at least one processor configured to encrypt a SMS message using a public key of a mobile device and a private key. The processor is further configured to transmit the SMS message to the mobile device to verify a request received for initializing a mobile infosphere related to the mobile device and initialize the mobile infosphere upon receiving a verification SMS from the mobile device. The wireless communications apparatus additionally includes a memory coupled to the at least one processor.
Yet another aspect relates to a wireless communications apparatus that facilitates initializing a mobile infosphere for subsequent device association. The wireless communications apparatus can comprise means for transmitting a SMS message to a mobile device to verify a request received to associate the mobile device with a mobile infosphere. The wireless communications apparatus can additionally include means for decrypting an initialization SMS received from the mobile device using a public key received from the mobile device and a private key.
Still another aspect relates to a computer program product, which can have a computer-readable medium including code for causing at least one computer to receive a request to initialize a mobile infosphere from a mobile device comprising a public key for encrypting communication to the mobile device. The computer-readable medium can also comprise code for causing the at least one computer to transmit a SMS message comprising a payload encrypted with a public key of a mobile device and a private key to the mobile device. Moreover, the computer-readable medium can comprise code for causing the at least one computer to decrypt a response message with the public key of the mobile device and the private key and code for causing at least one computer to initialize the mobile infosphere for the mobile device based at least in part on comparing the response message with the SMS message.
According to another aspect, a method that facilitates communication among a plurality of mobile infosphere devices is provided. The method includes transmitting a request for access parameters for at least one of a plurality of mobile infosphere devices from a registry server that associates a plurality of devices with a mobile infosphere based at least in part on a mobile phone number for the mobile infosphere. The method further includes utilizing the access parameters to establish secure communications with the at least one mobile infosphere device.
Another aspect relates to a wireless communications apparatus. The wireless communications apparatus can include at least one processor configured to transmit a request for access parameters related to a mobile infosphere device, the request identifies the device using a mobile phone number associated with the mobile infosphere. The processor is further configured to establish a secure communication session with the mobile infosphere device using the access parameters. The wireless communications apparatus additionally includes a memory coupled to the at least one processor.
Yet another aspect relates to a wireless communications apparatus that facilitates secure mobile infosphere device communication. The wireless communications apparatus can comprise means for transmitting a request for access parameters related to a mobile infosphere device identifying a phone number related to the mobile infosphere in the request and means for receiving the access parameters stored in a registry server in response to the request. The wireless communications apparatus can additionally include means for establishing a secure connection with the mobile infosphere device based at least in part on the access parameters.
Still another aspect relates to a computer program product, which can have a computer-readable medium including code for causing at least one computer to transmit a request for access parameters for at least one of a plurality of mobile infosphere devices from a registry server that associates a plurality of devices with a mobile infosphere based at least in part on a mobile phone number for the mobile infosphere. The computer-readable medium can also comprise code for causing the at least one computer to utilize the access parameters to establish secure communications with the at least one mobile infosphere device.
According to yet another aspect, a method for facilitating secure mobile infosphere device communication is provided. The method comprises specifying access parameters, including an address and a public key corresponding to a locally stored private key, in a request to associate with a mobile infosphere created by a registry server. Moreover, the method comprises establishing a secure connection with a device based at least in part on access parameters and encrypting communications over the secure connection with the private key.
Another aspect relates to a wireless communications apparatus. The wireless communications apparatus can include at least one processor configured to transmit access parameters for communicating with the wireless communications apparatus in a request to associate with a mobile infosphere created in a registry server and establish a secure communication session with a device using the access parameters. The processor is further configured to secure data for communication in the session utilizing security keys related to the access parameters. The wireless communications apparatus additionally includes a memory coupled to the at least one processor.
Yet another aspect relates to a wireless communications apparatus that facilitates secure communication between mobile infosphere devices. The wireless communications apparatus can comprise means for associating with a mobile infosphere specifying access parameters for communication and means for establishing a secure connection with a device based at least in part on the access parameters. The wireless communications apparatus can additionally include means for encrypting data over the secure connection utilizing a private key related to a public key specified in the access parameters.
Still another aspect relates to a computer program product, which can have a computer-readable medium including code for causing at least one computer to specify access parameters, including an address and a public key corresponding to a locally stored private key, in a request to associate with a mobile infosphere created by a registry server. The computer-readable medium can also comprise code for causing the at least one computer to establish a secure connection with a device based at least in part on access parameters. The computer-readable medium can further comprise code for causing the at least one computer to encrypt communications over the secure connection with the private key.
According to another aspect, a method for facilitating secure mobile infosphere device communication is provided. The method includes associating a plurality of devices with a mobile infosphere identified by a mobile phone number. The method further includes providing access parameters for the plurality devices to one or more disparate devices.
Another aspect relates to a wireless communications apparatus. The wireless communications apparatus can include at least one processor configured to maintain a mobile infosphere index comprising a number of devices each associated with one of a plurality of mobile device phone numbers. The wireless communications apparatus additionally includes a memory coupled to the at least one processor.
Yet another aspect relates to a wireless communications apparatus that facilitates communication between devices of participating in mobile infospheres. The wireless communications apparatus can comprise means for creating a mobile infosphere identified by a mobile phone number upon registering a primary mobile device. The wireless communications apparatus can additionally include means for associating one or more disparate devices with the mobile infosphere to facilitate subsequent communication with the one or more disparate devices.
Still another aspect relates to a computer program product, which can have a computer-readable medium including code for causing at least one computer to associate a plurality of devices with a mobile infosphere identified by a mobile phone number. The computer-readable medium can also comprise code for causing the at least one computer to provide access parameters for the plurality devices to one or more disparate devices.
To the accomplishment of the foregoing and related ends, the one or more embodiments comprise the features hereinafter fully described and particularly pointed out in the claims. The following description and the annexed drawings set forth in detail certain illustrative aspects of the one or more embodiments. These aspects are indicative, however, of but a few of the various ways in which the principles of various embodiments may be employed and the described embodiments are intended to include all such aspects and their equivalents.
Various embodiments are now described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of one or more embodiments. It may be evident, however, that such embodiment(s) can be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to facilitate describing one or more embodiments.
As used in this application, the terms “component,” “module,” “system,” and the like are intended to refer to a computer-related entity, either hardware, firmware, a combination of hardware and software, software, or software in execution. For example, a component can be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a computing device and the computing device can be a component. One or more components can reside within a process and/or thread of execution and a component can be localized on one computer and/or distributed between two or more computers. In addition, these components can execute from various computer readable media having various data structures stored thereon. The components can communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems by way of the signal).
Furthermore, various embodiments are described herein in connection with a mobile device. A mobile device can also be called a system, subscriber unit, subscriber station, mobile station, mobile, remote station, remote terminal, access terminal, user terminal, terminal, wireless communication device, user agent, user device, or user equipment (UE). A mobile device can be a cellular telephone, a cordless telephone, a Session Initiation Protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a handheld device having wireless connection capability, computing device, or other processing device connected to a wireless modem. Moreover, various embodiments are described herein in connection with a base station. A base station can be utilized for communicating with mobile device(s) and can also be referred to as an access point, Node B, evolved Node B (eNode B or eNB), base transceiver station (BTS) or some other terminology.
Moreover, various aspects or features described herein can be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques. The term “article of manufacture” as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier, or media. For example, computer-readable media can include but are not limited to magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips, etc.), optical disks (e.g., compact disk (CD), digital versatile disk (DVD), etc.), smart cards, and flash memory devices (e.g., EPROM, card, stick, key drive, etc.). Additionally, various storage media described herein can represent one or more devices and/or other machine-readable media for storing information. The term “machine-readable medium” can include, without being limited to, wireless channels and various other media capable of storing, containing, and/or carrying instruction(s) and/or data.
The techniques described herein may be used for various wireless communication systems such as code division multiple access (CDMA), time division multiple access (TDMA), frequency division multiple access (FDMA), orthogonal frequency division multiple access (OFDMA), single carrier frequency domain multiplexing (SC-FDMA) and other systems. The terms “system” and “network” are often used interchangeably. A CDMA system may implement a radio technology such as Universal Terrestrial Radio Access (UTRA), CDMA2000, etc. UTRA includes Wideband-CDMA (W-CDMA) and other variants of CDMA. CDMA2000 covers IS-2000, IS-95 and IS-856 standards. A TDMA system may implement a radio technology such as Global System for Mobile Communications (GSM). An OFDMA system may implement a radio technology such as Evolved UTRA (E-UTRA), Ultra Mobile Broadband (UMB), IEEE 802.11 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20, Flash-OFDM, etc. UTRA and E-UTRA are part of Universal Mobile Telecommunication System (UMTS). 3GPP Long Term Evolution (LTE) is an upcoming release of UMTS that uses E-UTRA, which employs OFDMA on the downlink and SC-FDMA on the uplink. UTRA, E-UTRA, UMTS, LTE and GSM are described in documents from an organization named “3rd Generation Partnership Project” (3GPP). CDMA2000 and UMB are described in documents from an organization named “3rd Generation Partnership Project 2” (3GPP2).
Referring now to
According to an example, the mobile device 102 can access one or more devices within a related user's mobile infosphere 104 to obtain media and/or other data from the devices. In one example, the mobile device 102 can connect directly to one or more devices, or indirectly through one or more disparate devices of the mobile infosphere 104 and/or an access component for the mobile infosphere. For instance, the mobile device 102 can connect to the desktop computer 106 to retrieve media thereon or on one or more devices accessible by the desktop computer 106. In another example, the devices of the mobile infosphere can participate in a network, such as a local area network (LAN), wide area network (WAN), and/or the like, and the mobile device 102 can gain access to the network to communicate with the one or more devices in the mobile infosphere 104. In this regard, a trust relationship can be established between the mobile device 102 and/or one or more devices in the mobile infosphere 104 and/or devices providing access to the devices in the mobile infosphere 104.
In one example, the mobile device 102 can communicate with one or more devices in the infosphere 104 to receive media or other data, and the data can be transcoded for the mobile device 102 before it is transmitted. For example, the mobile phone 102 can request content from the DVR 112, such as a list of available television shows. The DVR 112, or another device within or related to the mobile infosphere, can transcode the available television shows into a smaller media file so the mobile device 102 can more efficiently receive the content or a portion thereof For example, the DVR 112 or associated device can generate a preview of one or more television shows for transmission to the mobile device 102. Additionally or alternatively, for example, the DVR 112 or associated device can transcode the television show to a lesser video and/or audio quality to allow more efficient transmission of the television shown to the mobile device 102. In another example, a digital camera 114 picture can be converted from a high resolution accustomed to digital cameras (e.g., 8+ megapixel) to a lower resolution for transmission to the mobile device 102. It is to be appreciated that the communication can utilize substantially any protocol, such as transmission control protocol/internet protocol (TCP/IP), user datagram protocol (UDP), and/or similar customized protocols.
Furthermore, one or more devices of the mobile infosphere 104 can operate behind a firewall such that incoming communications ports can be blocked. Thus, as described herein, one or more centralized access servers can be provided to establish open communication with one or more devices of the mobile infosphere 104. The access server can utilize a public address to allow connection from the mobile device 102. Thus, in one example, the desktop computer 106 can connect to the access server opening a communication channel therewith (e.g., by utilizing a service and/or other software), and one or more disparate mobile infosphere 104 devices can communicate with and be accessed via the desktop computer 106. It is to be appreciated that the access server can support a number of mobile infospheres as well. In another example, the other devices of the mobile infosphere 104, such as DVR 112, digital camera 114, MP3 player 116, etc., where equipped with independent networking technologies, can also execute a service to connect directly with an access server to provide access to content. The mobile device 102 can communicate with the access server to receive the content. Moreover, the communication described above can be two-way, such that the mobile device 102 can transmit content to other devices in the mobile infosphere 104, such as media content and/or data or commands; for example, the mobile device 102 can be utilized to send control commands to one or more devices in the mobile infosphere 104, such as to record shows on the DVR 112, execute a process on the computer 106, and/or the like.
According to another example, a mobile infosphere 104 can provide access to devices outside of the infosphere as well. For example, the one or more share points from the mobile infosphere 104 to the mobile device 102 can be made available to one or more disparate mobile devices or other devices, whether or not those devices are in the infosphere or any infosphere at all. To facilitate this functionality, a registry server can be provided that identifies mobile infospheres 104 based at least in part on a mobile phone 102 number, as this number is typically unique and can relate to a mobile infosphere 104. The devices exposed as part of the mobile infosphere 104 can be registered under the mobile phone 102 number such that disparate devices can access mobile infosphere 104 devices at least in part by utilizing the mobile phone 102 number with an identifier related to the specific device. It is to be appreciated that the root mobile phone 102 number can provide a listing of accessible share points in the mobile infosphere 104 as well. In one example, the registry server can setup devices related to a mobile device 102 in the mobile infosphere 104 through a registration process using mobile device 102. For example, security keys can be utilized to ensure authorized access during and following device setup.
Turning to
The registry server 206 allows a primary device to be registered; this can be the mobile device 202 whose number can be utilized to identify the device 202 and/or one or more devices of the mobile infosphere 204. In one example, the security key generator 208 can create a public/private key pair for registration. The mobile device 202 can register with the registry server 206 providing the public key and/or other information, such as mobile phone number, which the registry server 206 can place in the device registry 216. The registration verifier 214 can additionally ensure valid registration; for example, the registration verifier 214 can transmit a message to the mobile device 202, such as a short message service (SMS) message, to challenge the provided number. The message can be encrypted with a private key related to the registry server 206 along with the public key generated by the security key generator 208 and provided by the mobile device 202 upon registration.
Upon receiving the message, the registration message decrypter 210 can decrypt the message using the private key, generated with the public key by the security key generator 208 upon registration, as well as the public key of the registry server 206. Subsequently, the registration message transmitter 212 can transmit the message back to the registry server 206. If the registration verifier 214 determines the received message to be substantially similar to the message it encrypted and transmitted originally, then registration can be successful, and the mobile device 202 can be added to the device registry 216 under its provided phone number. Once the mobile device 202 is registered, other devices from the mobile infosphere 204 can be added deriving from the mobile device 202 phone number. It is to be appreciated that this process can be performed automatically; for example, by a binary runtime environment for wireless (BREW) application or other service upon installation thereof and/or the like. In addition, the mobile device 202 can transmit a personal identification number (PIN), on request or otherwise, to the registry server 206 for subsequent device authentication, as described herein. The device registry 216 can store the associated PIN as a hash, in one example (e.g., using secure hash algorithm (SHA), etc.), for later confirmation.
Once the mobile device 202 is registered with the registry server 206 as a primary node (e.g., related to the phone number), other devices in the mobile infosphere 204 can be registered as extensions of the primary node. For example, the security key generator 220 can create a public/private security key pair and request registration from the registry server 206. During the request, the mobile infosphere device 204 can specify a mobile phone number with which to be associated, an extension, an internet protocol (IP) address or other access information, the public security key, and/or the like. Upon receiving the parameters, the registration verifier 214 can ensure the association of the mobile infosphere device 204 with the mobile device 202. For example, the registration verifier 214 can transmit an SMS to the mobile device 202 to confirm association with the mobile infosphere device 204; the SMS can include data such as the public key, which the user of the mobile device 202 can verify against that of the mobile infosphere device 204. The association can be accepted by transmitting an SMS back to the registration verifier 214 indicating success; this can be performed manually and/or as part of an application executing on the mobile device 202, for example. Once successful, the device registry 216 can store the parameters for accessing the mobile infosphere device 204. In another example, the mobile infosphere device 204 can additionally provide the PIN, entered earlier by the mobile device 202, upon registering with the registry server 206. In this example, the registration verifier 214 can verify the PIN with that entered earlier by the mobile device 202 to associate the mobile infosphere device 204 with the mobile device 202. It is to be appreciated that where registration information is modified, such as an IP address change in a dynamic IP configuration or a public/private key renewal for refreshed security, the mobile infosphere device 204 can notify the registry server 206 via secure message encrypted with the private key of the device 204, for instance.
After adding the mobile infosphere device 204 to the mobile infosphere defined by the device registry 216, the access information provider 218 can facilitate access to the mobile infosphere device 204, for example by transmitting access parameters for the mobile infosphere device 204 to requesting devices. It is to be appreciated that the access information provider 218 can also provide access parameters to the mobile device 202 from a mobile infosphere device 204 or other device as well. For example, the access information provider 218 can receive requests to access the mobile infosphere device 204 from the mobile device 202, from a BREW or other application executing thereon, in one example. The access information provider 218 can transmit relevant access information to the mobile device 202 for accessing the mobile infosphere device 204, including an IP address to access the device, the public key for encrypting data, etc. Subsequently, the mobile device 202 can establish connection, such as a TCP/IP connection, with the mobile infosphere device 204 (e.g., to receive media content on the device, etc.) utilizing the relevant access parameters. For example, the mobile device 202 can encrypt communications with its private key and the public key of the mobile infosphere device 204 and transmit the communications using the IP address provided to access the mobile infosphere device 204. The mobile infosphere device 204 can receive communications and decrypt using its private key and the public key of the mobile device 202, which it can have previously received from the registry server 206 and/or mobile device 202. Upon decrypting, the mobile infosphere device 204 can verify the validity of the communication where the keys successfully decrypt. Subsequently, the mobile infosphere device 204 can communicate back to the mobile device 202 utilizing similar techniques. It is to be appreciated that the mobile infosphere device 204 can be protected by a firewall, router, or other device that utilizes network address translation (NAT) for communication between the device 204 and other networks. In this regard, there can be no public IP address for accessing the mobile infosphere device 204. Thus, the mobile infosphere device 204 can provide a proxy server IP address or other ways to access the mobile infosphere device 204 for storage in the device registry 216, which can be subsequently provided to devices desiring access to the mobile infosphere device 204.
According to another example, the mobile infosphere device 204 can request communications with the mobile device 202 by obtaining information from the access information provider 218. In particular, as the mobile device 202 can be accessed through a cellular network, in one example, and may not have an IP address, the access information provider 218 can provide instructions and/or parameters related to transmitting an SMS to the mobile device 202. This can be accomplished by providing the information to an application executing on the mobile infosphere device 204, in one example, so as to appear seamless to a user of the device. Thus, the mobile infosphere device 204 can transmit the SMS to the mobile device 202 comprising an IP address to access the mobile infosphere device 204, as described previously, to request communication establishment. The mobile device 202 can subsequently contact the mobile infosphere device 204 via the IP address to establish communications, over TCP/IP, UDP, and/or the like, for example. In addition, the mobile device 202 and mobile infosphere device 204 can obtain relevant security keys from the registry server 206 when needed for communication between the devices. Moreover, other devices within the infosphere can communicate with one another by obtaining relevant information from the registry server 206, as registered in the device registry 216, for communicating, such as address, security keys, and/or the like as described.
Once connected, the mobile device 202 and mobile infosphere device 204 can perform substantially any sharing task. For example, the devices 202 and 204 can share files, such as media files, productivity files, etc. In another example, the mobile infosphere device 204 can provide file access to other devices that are connected to or otherwise associated with the mobile infosphere device 204. In addition, the mobile device 202 can perform other functions on the mobile infosphere device 204. In one example, the mobile device 202 can control the mobile infosphere device 204, such as total control (e.g. remote desktop), or operate as a game controller and/or the like. In another example, the mobile device 202 can play audio through speakers associated with the mobile infosphere device 204. Thus, securely connecting the mobile device 202 and mobile infosphere device 204 can facilitate sharing of many devices to be utilized in many ways. It is to be appreciated that the examples shown are not intended to limit the subject matter described herein, rather these are mere examples of substantially limitless configurations defined by connecting the mobile device 202 and mobile infosphere device 204.
It is to be appreciated that the registry server 206 can execute at one or more places accessible by the mobile device 202 and/or the mobile infosphere devices 204. Thus, a wireless network access provider can host the registry server 206, in one example. In another example, the registry server 206 can execute on a femtocell, which is essentially a retail base station that can be installed in a residence. The femtocell connects to a wireless network access provider via a broadband backhaul link (e.g. through cable internet, digital subscriber line (DSL) T1/T3, and/or the like) and provides radio wireless network access much like a base station. Thus, in one example, the femtocell can communicate with the wireless network access provider over the same network as one or more mobile infosphere devices 204, and in this regard has direct access to the devices as well. Thus, the mobile device 202 can connect to the registry server 206 on the femtocell through the wireless network access provider for accessing the mobile infosphere devices 204 as described. In yet another example, the registry server 206 can execute on the mobile device 202 such that mobile infosphere devices 204 can contact the mobile device (e.g., via SMS) to register with the mobile device 202. Then the mobile device 202 can locally store information necessary to communicate with the mobile infosphere device(s) 204. It is also to be appreciated that some mobile infosphere devices 204 can depend on other device for network access. Thus, devices 204 can connect to a personal computer, for example, through various mediums, such as a MP3 player or digital camera coupled via universal serial bus (USB), and/or the like. The computer can provide requisite network access to the devices 204 for participation in the mobile infosphere as described, for example.
Now turning to
According to an example, as the femtocell 304 is communicatively coupled with the wireless network 308, it can receive access to a centralized registry server and maintain a replicated local registry server 310. Thus, the femtocell 304 can provide registry server 310 access to the mobile devices 302 and/or mobile infosphere devices 312 for accessing devices registered with the registry server 310 (whether registered directly or via a more centralized registry server from which the registry server 310 receives connection parameters. In addition, devices, such as the mobile devices 302 or mobile infosphere devices 312, can register with the registry server 310. In this regard, the devices can be accessed only via the local registry server 310 or the registry server 310 can forward the access parameters to a more centralized registry server for more public access of the devices.
Moreover, in one example, the femtocell 304 can act as an access server via the wireless network. As described herein, an access server can be provided to allow access to devices that are not publicly addressable. The access server can be utilized to establish connection with the devices to allow public access to the devices; in this regard, the femtocell 304, having direct access to the wireless network 308 through the broadband backhaul link, can allow other devices (not shown) to communicate with the mobile infosphere devices 312 that are in the same network as the femtocell 304. Thus, though the mobile infosphere devices 312 can be in a private network, where the router 306 can provide public outgoing access for the devices, since the femtocell 304 is communicatively coupled with the wireless network 308, it can act as a router providing access to the mobile infosphere devices 312 via the wireless network 308 for example.
Now referring to
In this regard, the infosphere column relates to the number of the mobile device (e.g., mobile phone number) to which devices are associated. The extension identifies the device within the mobile infosphere, the class is the type of device, the public key is that generated in the private/public key pair described earlier that can be used to encrypt communications to the device, and the IP address can be utilized to communicate with the device. As described, where a device does not have a publicly accessible IP address, it can register with an access server 408 that can have a public IP address and act like a proxy to allow access to the device. Thus, access server 408 can support multiple infosphere devices (not shown), and in one example, another column in the index of the registry server 406 can specify whether the IP address relates to such a proxy or access server 408. In this regard, mobile infosphere devices can connect to the access server 408, via an executing application and/or the like utilizing a TCP/IP protocol, etc., and the access server 408 can provide access to the mobile infosphere device by communicating with devices desiring such access. In this case, the IP address in the index can be that of the access server 408, for example.
According to an example, mobile device 402 can request access to one or more devices of a mobile infosphere 404, 410, or 412, or devices utilizing access server 408 to provide access thereto, by requesting access from the registry server 406 using the infosphere number and extension. Thus, in one example, a uniform naming convention (UNC) type of access request can be specified, e.g. \\8582222222\PC. Upon specifying the request, the registry server 406 can accordingly retrieve additional information regarding the device for which access is requested. It is to be appreciated that the access request can be seamlessly intercepted by an application executing on the requesting device, in one example, and routed to the registry server 406. The registry server 406, in this example, can return the public key and IP address related to the infosphere device to the mobile device 402 and/or an application executing thereon. Subsequently, the mobile device 402 can attempt connection with the PC related to infosphere 8582222222. In the application example, the application can seamlessly request such access from the PC and provide the application with a list of available media and/or other files on the PC. The mobile device 402 can access the media and/or files it is authorized to access. It is to be appreciated that the registry server 406 can be spread among additional redundant registry servers 406, in one example, to facilitate availability of the information comprised in the server 406.
Authorization for accessing devices outside of a given infosphere can be effectuated by the registry server 406, in one example. Additionally or alternatively, the devices within the mobile infosphere 404, 410, 412 can control authorization for disparate requesting devices and/or a device of the infospheres 404, 410, 412 can be responsible for authorization regarding the devices in its infosphere. Additionally, media and/or other data communicated between devices of an infosphere 404, 410, 412 and/or mobile device 402 can be transcoded upon transfer. Thus, for example, where a requesting device has communication bandwidth capabilities below a threshold, content can be constrained to a lower quality, e.g. resolution or sound quality for example, to facilitate more efficient transfer of the media or other data. In another example, the media or other data can be cropped to include only a preview, resulting in smaller size and thus more efficient transfer. Moreover, in one example, the transcoding can be performed based on limited memory requirements, available codecs, and/or the like with respect to a receiving device.
Turning now to
According to an example, the mobile device 502 and devices 508, 510, and 512 can register with the registry server 504 to associate with a mobile infosphere; devices 508, 510, and 512 associate with mobile infosphere 506, and the mobile device 502 can create its own mobile infosphere to which other devices can be associated as described. Subsequently, as shown supra, the mobile device 502 and/or devices 508, 510, and 512 can obtain access parameters for other devices for communication therewith. As shown, the mobile device 502 can communicate directly with device 508. It is to be appreciated that there can be an authentication and/or authorization step required before communication as described. In another example, the device 508 can initiate communications with the mobile device 502.
In another example, devices can be privately addressed, such as those behind a firewall or router that provides external public network or Internet access. In this example, the access server 514 can be utilized to provide access to the device. Thus, device 510 can be such a device that is not publicly addressable. Device 510, upon registering with the registry server 504, can provide access parameters that utilize the access server 514 to facilitate communication with the device 510. In this regard, the device 510 can also establish communication with the access server 514, which can be subsequently utilized to by the access server 514 to transmit communications from disparate devices. Thus, the mobile device 502 can request access to the device 510 retrieving access parameters from the registry server 504. Utilizing the parameters, the mobile device 502 can communicate with the access server 514, which can act as a proxy allowing access to the device 510 as shown. Therefore, mobile infosphere device access can be provided for publicly addressed as well as privately addressed devices in this regard.
Now referring to
According to an example, the mobile infosphere file systems 606 and 612 can execute respectively on the mobile device 602 and mobile infosphere device 604. The file systems 606 and 612 can allow seamless access to each other and/or other devices. In one example, the file systems 606 and 612 can access a registry server and establish secured communication using security keys as described above. Thus, in one example, a user of the mobile device 602 can indicate that it wants to access the mobile infosphere device 604, for example by trying to access the device by \\<mobile_number>\<extension> as described previously. The mobile infosphere file system 606 can obtain this request and contact a registry server to access information, such as an address and/or public key, to access the mobile infosphere device 604. Additionally or alternatively, at least a portion of such information can be stored in the file system cache 608 from an earlier access, and can come from there. In another example, the file system cache 608 can store contents of mobile infosphere device 604 shared directories such that navigation may not require access to the mobile infosphere device 604.
In this example, communications can be established between the mobile device 602 and mobile infosphere device 604 by contacting the device through the provided IP address and encrypting the message using encrypter/decrypter 610 to apply the public key of the mobile infosphere device 604 and the private key of the mobile device 602, for example. In one example, a user of the mobile device 602 can browse to the mobile infosphere device 604, and the mobile infosphere file system 606 can contact the mobile infosphere file system 612 on the mobile infosphere device to navigate the file system. Communications can continue between the file systems 606 and 612 to provide directory or folder listings, for example. It is to be appreciated that this communication can be in response to automated requests as well, for example the mobile device 602 can automatically update its file system cache 608 with new content in a folder of the mobile infosphere 604 device without interaction by the user.
The mobile infosphere file system 606 can be utilized to request media content or other files from the mobile infosphere file system 612. The mobile infosphere file system 612 can determine bandwidth/memory capabilities of the mobile device 602, or other requester, as well as codecs installed on the mobile device 602, etc. This information can be requested directly from the mobile device 602 and/or from the system registry, or substantially any device with the requisite information. Based on the acquired parameters, the file system transcoder 614 can transcode the media or other data requested to be utilized by the mobile device 602 or other devices. For example, where a high resolution photo (e.g., 8 megapixel) is selected for display on the mobile device, the file system transcoder 614 can reduce the resolution of the photo (e.g., 640 pixels by 480 pixels), causing the media to require less data communication. Thus, transferring the photo between the mobile infosphere file systems 612 and 606 is more efficient, and the photo does not take up as much space on the mobile device 602. Similarly, the file system transcoder 614 can reduce the transmission size of streaming content, such as audio or video, by lowering the quality (e.g., the data rate, frame refresh, etc.), providing a portion of the content at first for a preview, and/or the like. Moreover, for content where the mobile device 602 does not have correct codecs or other viewers/readers to access the content, the file system transcoder 614 can transcode the file into one or more formats that can be accessed by the mobile device 602 before transmitting. It is to be appreciated that while transmitting information, the encrypter/decrypter 618 can be utilized to encrypt the information for decryption by encrypter/decrypter 610. In another example, the mobile infosphere file systems 606 and 612 can utilize other agreed security methods. It is to be appreciated that the mobile infosphere device 604 can request access to and browse the mobile device 602 in a similar regard for media and/or other files, including voice messages, etc.
In another example, the mobile infosphere file system 606 and/or 612 can provide seamless access to shared files/folders from a plurality of devices in a mobile infosphere. In this example, the mobile infosphere file system 606 and/or 612 can aggregate the shared folders and documents from the devices of a given mobile infosphere in one location, such as at the root mobile numbers. Thus, if a device accesses \\8582222222, one or more mobile infosphere file systems 612 of a device within the 8582222222 mobile infosphere, can aggregate available shares from substantially all registered devices in the root view so no extension (e.g., .PC, .PC2, .DVR, etc.) is needed. Moreover, in another example, the file system cache 608 and/or 616 of one or more devices in a mobile infosphere can hold data from other devices shared locations, for example where the device whose cache is being utilized is more often available than the sharing device. In another example, the caches of various devices can be utilized for redundant storage. In another example, an application (not shown) executing on a device, such as mobile device 602, can utilize the mobile infosphere file system 606 to seamlessly provide access to devices of other infospheres as well. Thus, in one example, the application can allow a user to select from a list of movies, where the movies are aggregated from one or substantially all sources the mobile device 602 has access to within and/or outside of its mobile infosphere using the methods and functionalities described herein. To the user, however, the movies appear available and source is not important. Additionally, to this end, files to be shared can be classified into groups (e.g., music, movies, productivity, etc.). This can be accomplished by utilizing a common schema file that identifies files in groups, using a file wrapper with the classification information in a header, and/or the like.
Now turning to
Example interface 702 also illustrates a file system for a device that shows an available network listing a plurality of navigable mobile infospheres (shown at 706). In this example, rather than a traditional folder structure, the shared files and/or folders of disparate devices of the mobile infosphere can be logically grouped. As described previously, a schema file and/or headers, for example, can be utilized to accommodate such grouping. A file system can determine the grouping for disparate shared folders and/or files and display the groups as if from one device. Thus, device boundaries within the infosphere appear seamless to the user of the file system. It is to be appreciated that the seamless usage can be applied across multiple infospheres in one example. Thus, interface 702 shows a general music folder, as well as photos, playlists, and videos, directly under the 18581234567 mobile infosphere folder with subfolders related to song details (e.g., album, artist, genre, etc.). In this regard, the logical groupings can display files from a plurality of accessible devices regardless of device boundaries, and in fact, files can appear under multiple logical groupings. Thus, a song can appear under Music\Genre\Rock as well as Music\Year\Released\2004, for example. It is to be appreciated that other groupings can be applied as well using substantially any logical relation.
Referring now to
Turning to
In one example, the user can select the video 908 option from the initial interface 900, which can result in display of the interface 902. Interface 902 shows a list of available videos and/or categories, folders, or groups from aggregated sources. Thus, some videos can be resident on the device displaying the interface 902 while others are from other devices in a related mobile infosphere or other mobile infospheres. The interface 902, in one example, displays options labeled kids 912, vacation 914, Sopranos 916, and Star Wars 918. Thus, the kids 912 option can, in one example, be a specified logical grouping of videos from a plurality of devices, an inferred grouping of videos (e.g., by evaluating a tag and/or file or folder name), a shared folder from a single device labeled kids, a collection of shared folders from a plurality of devices labeled kids, and/or the like. The vacation 914 can be a similar collection of videos and/or a single video on the device utilizing the interface 902 or other accessible device, such as a video camera with communicative capabilities and/or attached to a computer, within or outside of the mobile infosphere. The Sopranos 916 grouping can be, for example, episodes of the Sopranos recorded on one or more DVRs, computers, etc. internal or external to a mobile infosphere of the device utilizing the interface 902. Similarly, Star Wars 918 can be a video resident on one or more accessible devices.
According to an example, as described, the content can be transcoded before delivering to a device having decreased memory and/or bandwidth capabilities (or incompatible codecs, for example). Thus, the video actually received can be of lower quality (frames per second, resolution, and/or the like). In another example, a preview of the video can be generated and/or transmitted upon selection to ensure the user wants more of the video before transmitting the remainder. The preview can be an initial portion of the video and/or formed from various portions, for example. In this regard, transmission of the media can be more efficient. In addition, for example, the interface 900, when aggregating source groups, can automatically request portions of the content. For instance, where messages 904 are shared from other devices, the interface 900 or underlying file system can request subject lines and/or an initial amount of characters, and subsequently request the remainder if the user desires to view a larger portion of the message, for example.
Referring to
Turning to
Now referring to
Turning now to
Referring to
Turning now to
It will be appreciated that, in accordance with one or more aspects described herein, inferences can be made regarding grouping files or folders, obtaining access parameters, establishing secure connections, and/or the like as described. As used herein, the term to “infer” or “inference” refers generally to the process of reasoning about or inferring states of the system, environment, and/or user from a set of observations as captured via events and/or data. Inference can be employed to identify a specific context or action, or can generate a probability distribution over states, for example. The inference can be probabilistic-that is, the computation of a probability distribution over states of interest based on a consideration of data and events. Inference can also refer to techniques employed for composing higher-level events from a set of events and/or data. Such inference results in the construction of new events or actions from a set of observed events and/or stored event data, whether or not the events are correlated in close temporal proximity, and whether the events and data come from one or several event and data sources.
Mobile device 1500 can additionally comprise memory 1508 that is operatively coupled to processor 1506 and that can store data to be transmitted, received data, information related to available channels, data associated with analyzed signal and/or interference strength, information related to an assigned channel, power, rate, or the like, and any other suitable information for estimating a channel and communicating via the channel. Memory 1508 can additionally store protocols and/or algorithms associated with estimating and/or utilizing a channel (e.g., performance based, capacity based, etc.).
It will be appreciated that the data store (e.g., memory 1508 ) described herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. By way of illustration, and not limitation, nonvolatile memory can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable PROM (EEPROM), or flash memory. Volatile memory can include random access memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM). The memory 1508 of the subject systems and methods is intended to comprise, without being limited to, these and any other suitable types of memory.
Processor 1506 and/or receiver 1502 can further be operatively coupled to a mobile infosphere file system 1510 that can establish communications with one or more mobile infosphere devices (e.g., via a registry server and/or the like as described) to receive data related thereto. For example, as described, the mobile infosphere file system 1510 can determine a plurality of accessible mobile infosphere devices having shared files and/or folders. In this way, the mobile infosphere file system 1510 can allow access to the files and folders available on the mobile infosphere devices. Moreover, a mobile infosphere application 1512 can be executing via the processor 1506 and can leverage the mobile infosphere file system 1510 to access one or more of the available files or folders as shown above. The files can relate to media content, productivity data, etc. In one example, the mobile infosphere application 1512 can be substantially any application that can utilize the file system aspects described herein to facilitate access to media or other files on the mobile infosphere file system 1510. This can be a BREW application and/or the like in one example. Mobile device 1500 still further comprises a modulator 1514 and transmitter 1516 that respectively modulate and transmit signal to, for instance, a base station, another mobile device, etc. Although depicted as being separate from the processor 1506, it is to be appreciated that the mobile infosphere file system 1510, BREW application 1512, demodulator 1504, and/or modulator 1514 can be part of the processor 1506 or multiple processors (not shown).
At base station 1610, traffic data for a number of data streams is provided from a data source 1612 to a transmit (TX) data processor 1614. According to an example, each data stream can be transmitted over a respective antenna. TX data processor 1614 formats, codes, and interleaves the traffic data stream based on a particular coding scheme selected for that data stream to provide coded data.
The coded data for each data stream can be multiplexed with pilot data using orthogonal frequency division multiplexing (OFDM) techniques. Additionally or alternatively, the pilot symbols can be frequency division multiplexed (FDM), time division multiplexed (TDM), or code division multiplexed (CDM). The pilot data is typically a known data pattern that is processed in a known manner and can be used at mobile device 1650 to estimate channel response. The multiplexed pilot and coded data for each data stream can be modulated (e.g. symbol mapped) based on a particular modulation scheme (e.g., binary phase-shift keying (BPSK), quadrature phase-shift keying (QPSK), M-phase-shift keying (M-PSK), M-quadrature amplitude modulation (M-QAM), etc.) selected for that data stream to provide modulation symbols. The data rate, coding, and modulation for each data stream can be determined by instructions performed or provided by processor 1630.
The modulation symbols for the data streams can be provided to a TX MIMO processor 1620, which can further process the modulation symbols (e.g., for OFDM). TX MIMO processor 1620 then provides NT modulation symbol streams to NT transceivers (TCVR) 1622a through 1622t. In various embodiments, TX MIMO processor 1620 applies beamforming weights to the symbols of the data streams and to the antenna from which the symbol is being transmitted.
Each transceiver 1622 receives and processes a respective symbol stream to provide one or more analog signals, and further conditions (e.g. amplifies, filters, and upconverts) the analog signals to provide a modulated signal suitable for transmission over the MIMO channel. Further, NT modulated signals from transceivers 1622a through 1622t are transmitted from NT antennas 1624a through 1624t, respectively.
At mobile device 1650, the transmitted modulated signals are received by NR antennas 1652a through 1652r and the received signal from each antenna 1652 is provided to a respective transceiver (TCVR) 1654a through 1654r. Each transceiver 1654 conditions (e.g., filters, amplifies, and downconverts) a respective signal, digitizes the conditioned signal to provide samples, and further processes the samples to provide a corresponding “received” symbol stream.
An RX data processor 1660 can receive and process the NR received symbol streams from NR transceivers 1654 based on a particular receiver processing technique to provide NT “detected” symbol streams. RX data processor 1660 can demodulate, deinterleave, and decode each detected symbol stream to recover the traffic data for the data stream. The processing by RX data processor 1660 is complementary to that performed by TX MIMO processor 1620 and TX data processor 1614 at base station 1610.
A processor 1670 can periodically determine which precoding matrix to utilize as discussed above. Further, processor 1670 can formulate a reverse link message comprising a matrix index portion and a rank value portion.
The reverse link message can comprise various types of information regarding the communication link and/or the received data stream. The reverse link message can be processed by a TX data processor 1638, which also receives traffic data for a number of data streams from a data source 1636, modulated by a modulator 1680, conditioned by transceivers 1654 a through 1654 r, and transmitted back to base station 1610.
At base station 1610, the modulated signals from mobile device 1650 are received by antennas 1624, conditioned by transceivers 1622, demodulated by a demodulator 1640, and processed by a RX data processor 1642 to extract the reverse link message transmitted by mobile device 1650. Further, processor 1630 can process the extracted message to determine which precoding matrix to use for determining the beamforming weights.
Processors 1630 and 1670 can direct (e.g., control, coordinate, manage, etc.) operation at base station 1610 and mobile device 1650, respectively. Respective processors 1630 and 1670 can be associated with memory 1632 and 1672 that store program codes and data. Processors 1630 and 1670 can also perform computations to derive frequency and impulse response estimates for the uplink and downlink, respectively.
According to an example, the mobile device 1650 can request mobile infosphere device access through the base station 1610 as described herein. In particular, the base station 1610 can facilitate communication between the mobile device 1650 and a registry server (not shown). The mobile device 1650 can receive access parameters for one or more mobile infosphere devices, and establish communications with the device. For example, the base station 1610 can provide communicative access to the mobile infosphere device whether by direct connection, connection via one or more gateways in a mobile network (not shown) and/or the like as described herein. In addition, the base station 1610 can similarly contact the mobile device 1650 on behalf of other mobile infosphere devices to obtain information therefrom.
It is to be understood that the embodiments described herein can be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof For a hardware implementation, the processing units can be implemented within one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable gate arrays (FPGAs), processors, controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described herein, or a combination thereof.
When the embodiments are implemented in software, firmware, middleware or microcode, program code or code segments, they can be stored in a machine-readable medium, such as a storage component. A code segment can represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software package, a class, or any combination of instructions, data structures, or program statements. A code segment can be coupled to another code segment or a hardware circuit by passing and/or receiving information, data, arguments, parameters, or memory contents. Information, arguments, parameters, data, etc. can be passed, forwarded, or transmitted using any suitable means including memory sharing, message passing, token passing, network transmission, etc.
For a software implementation, the techniques described herein can be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. The software codes can be stored in memory units and executed by processors. The memory unit can be implemented within the processor or external to the processor, in which case it can be communicatively coupled to the processor via various means as is known in the art.
With reference to
The system memory 1716 includes volatile and nonvolatile memory. The basic input/output system (BIOS), containing the basic routines to transfer information between elements within the computer 1712, such as during start-up, is stored in nonvolatile memory. By way of illustration, and not limitation, nonvolatile memory can include read only memory (ROM). Volatile memory includes random access memory (RAM), which can act as external cache memory to facilitate processing.
Computer 1712 also includes removable/non-removable, volatile/non-volatile computer storage media.
The computer 1712 also includes one or more interface components 1726 that are communicatively coupled to the bus 1718 and facilitate interaction with the computer 1712. By way of example, the interface component 1726 can be a port (e.g., serial, parallel, PCMCIA, USB, FireWire . . . ) or an interface card (e.g., sound, video, network . . . ) or the like. The interface component 1726 can receive input and provide output (wired or wirelessly). For instance, input can be received from devices including but not limited to, a pointing device such as a mouse, trackball, stylus, touch pad, keyboard, microphone, joystick, game pad, satellite dish, scanner, camera, other computer and the like. Output can also be supplied by the computer 1712 to output device(s) via interface component 1726. Output devices can include displays (e.g., CRT, LCD, plasma . . . ), speakers, printers and other computers, among other things.
The system 1800 includes a communication framework 1850 that can be employed to facilitate communications between the client(s) 1810 and the server(s) 1830. Here, the client(s) 1810 can correspond to program application components and the server(s) 1830 can provide the functionality of the interface and optionally the storage system, as previously described. The client(s) 1810 are operatively connected to one or more client data store(s) 1860 that can be employed to store information local to the client(s) 1810. Similarly, the server(s) 1830 are operatively connected to one or more server data store(s) 1840 that can be employed to store information local to the servers 1830.
By way of example, one or more clients 1810 can desire access one or more mobile infospheres or devices within the infosphere. Accordingly, as described, the one or more clients 1810 can communicate with a registry server, which can be server 1830 in this example, over the communication framework 1850. The registry server 1830 can provide access parameters to the clients 1810 for accessing the mobile infosphere or respective devices. Using the parameters, the clients 1810 can attain the access to facilitate media and/or other data transfer as described herein.
With reference to
A registry server or other device can transmit an SMS to the system 1900 to verify registration encrypting the message with the public key; thus, the electrical component 1906 can decrypt with the private key to ensure validity of the communication. Thus, logical grouping 1902 can comprise an electrical component for encrypting the SMS message with a private key having a related public key specified in the request for mobile infosphere initialization 1906. Further, logical grouping 1902 can include an electrical component for transmitting the encrypted SMS to verify the request for mobile infosphere initialization 1908. For example, the SMS received can be re-encrypted with the system 1900 private key and/or a similar key pair related to the registry server or other device. In this regard, when the message is received from the system 1900, it can be verified to ensure identity of the system 1900. Additionally, system 1900 can include a memory 1910 that retains instructions for executing functions associated with electrical components 1904, 1906, and 1908. While shown as being external to memory 1910, it is to be understood that one or more of electrical components 1904, 1906, and 1908 can exist within memory 1910.
Turning to
With reference to
With reference to
With reference to
What has been described above includes examples of one or more embodiments. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the aforementioned embodiments, but one of ordinary skill in the art may recognize that many further combinations and permutations of various embodiments are possible. Accordingly, the described embodiments are intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims. Furthermore, to the extent that the term “includes” is used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term “comprising” as “comprising” is interpreted when employed as a transitional word in a claim.
This application claims the benefit of U.S. Provisional Patent application Ser. No. 61/031,939 entitled “FILE SYSTEM-BASED ACCESS FOR MOBILE PHONE AND COMPUTER INTELLIGENT MULTI-MEDIA FILE SHARING IN A WIRLESS COMMUNICATIONS SYSTEM” which was filed Feb. 27, 2008. The entirety of the aforementioned application is herein incorporated by reference.
Number | Date | Country | |
---|---|---|---|
61031939 | Feb 2008 | US |