Patents Assigned to Nokia, Inc.
  • Publication number: 20030220970
    Abstract: An electronic disc jockey service in which the services of a disc jockey are effectively transformed into an Internet-based (or other network-based) service that is accessible from anywhere the Internet is accessible. Disc jockey services may in theory be provided to anybody, anytime, anywhere, as long as they have sufficient access to the Internet or other network. This service also may be used to link together several parties going on at the same time in different geographic locations. Thus, several parties that are separated by great distances may be united into a single virtual party. The electronic disc jockey service may deliver various content to the parties such as music, video clips, interactive games, and the like.
    Type: Application
    Filed: June 27, 2002
    Publication date: November 27, 2003
    Applicant: NOKIA, Inc.
    Inventor: Asko Komsi
  • Patent number: 6654811
    Abstract: A line interface card apparatus includes: a packet queue memory for storing packets; a physical layer having first and second buffers, the physical layer being connected to the packet queue memory by a data bus and being connected to a plurality of links; and a queue manager connected to the packet queue memory and to the physical layer by a control bus.
    Type: Grant
    Filed: April 13, 2000
    Date of Patent: November 25, 2003
    Assignee: Nokia Inc.
    Inventors: Hemant M. Chaskar, Rayadurgam Ravikanth, Inas Said, Pasi Vaananen, Eleftherios Dimitrou, Mikko Turkia
  • Publication number: 20030217277
    Abstract: A method and system for preventing stack buffer overflow attacks in a computer system are disclosed. A computer system can prevent stack buffer overflow attacks by encrypting return addresses prior to pushing them onto the runtime stack. When an encrypted return address is popped off the runtime stack, the computer system decrypts the encrypted return address to determine the actual return address. A random encryption key can be used, which can be generated from the CPU's clock cycle counter. Multitasking environments can add a seed register to the task state so that each task can use a unique seed to encrypt the return addresses.
    Type: Application
    Filed: May 15, 2002
    Publication date: November 20, 2003
    Applicant: Nokia, Inc.
    Inventor: Ram Gopal Lakshmi Narayanan
  • Publication number: 20030204599
    Abstract: Service provisioning in mobile terminals is provided through registering and transferring of application context, which permits substantially seamless transfer of application functionality across administrative service domains. An architecture for providing application context transfer may include access routers, transcoder proxy servers, and gateway routers. A mobile terminal served by a current access router creates an application context for a session and registers it with the current access router. Around the time of handoff, the current access router transfers the application context to a new access router associated with a new administrative domain and a new access network. The new access router evaluates the application context and takes steps to provide application functionality for the mobile terminal and current sessions.
    Type: Application
    Filed: May 3, 2002
    Publication date: October 30, 2003
    Applicant: NOKIA, Inc.
    Inventors: Dirk Trossen, Hemant M. Chaskar
  • Publication number: 20030177242
    Abstract: A method for performing Internet call processing related to the completion of session initiation requests is provided. The session initiation requests include one or more triggers. Based on the detection of one or more triggers, a call processing entity involved with processing the session initiation request transfers call processing to one or more third parties. Each third party performs additional call processing and returns a result to the call processing entity. Based on reception of the result, the call processing entity continues processing the session initiation request. The URI of one or more third parties may be specified in the session initiation request. Also, one or more third parties may be pre-specified. A special trust relationship may exist between a terminal related to the session initiation request and one or more third parties, and the third parties may therefore perform call processing using context specific information or confidential information.
    Type: Application
    Filed: June 26, 2002
    Publication date: September 18, 2003
    Applicant: NOKIA, Inc.
    Inventors: Dirk Trossen, Dana Pavel
  • Publication number: 20030165162
    Abstract: Due to bandwidth constraints on the wireless link in an IP network, it is useful to compress the headers so as to maximize the utilization of the link. There exists Header Compression algorithms that make use of the similarity in consecutive headers in a packet flow to compress these headers. In this document, a novel header compression scheme was introduced that makes use of the similarity in consecutive flows from or to a given mobile terminal to compress these headers. Using information theory, the optimal gain to be expected from the use of such a scheme was analyzed. A model was defined for the distribution of the connections of a single user over the address space. The compression scheme was evaluated with respect to this model and to actual internet data traces. The scheme is complementary and the benefits are additional to the traditional approach to header compression. However, the scheme outperforms current schemes with respect to actual internet traces.
    Type: Application
    Filed: June 28, 2002
    Publication date: September 4, 2003
    Applicant: Nokia Inc.
    Inventor: Cedric Westphal
  • Publication number: 20030122856
    Abstract: A keyboard event server (KES) allows an end user to remotely control a computer. The KES accepts a uniform resource locator having a query string that specifies one or more keyboard events to be simulated. The query string may include mnemonics corresponding to one or more keyboard-key presses that can be simulated one after another and/or simultaneously. An end user can use a wireless-access browser running on a wireless-client device to remotely control a target computer through a wireless-access gateway.
    Type: Application
    Filed: December 28, 2001
    Publication date: July 3, 2003
    Applicant: NOKIA, Inc.
    Inventor: Thomas Hubbard
  • Publication number: 20030120741
    Abstract: Methods and systems are provided for delivering content from a website to a computer device. The website and computer device negotiate terms for use of a cache memory coupled to the computer device. The computer device requests content, such as web page objects, from the website. In addition to transmitting the requested content, the website transmits non-requested content to the computer device. The non-requested content is stored in the cache memory for later retrieval by the computer device.
    Type: Application
    Filed: December 21, 2001
    Publication date: June 26, 2003
    Applicant: Nokia, Inc.
    Inventors: Tao Wu, Sudhir Dixit
  • Patent number: 6584148
    Abstract: A system for testing a communication path for digital subscriber line (DSL) signals includes a loop management device coupled in the communication path between a DSL access multiplexer (DSLAM) and a DSL modem located at a customer premises. The system also includes a remote test interface coupled in the communication path between the loop management device and the DSL modem. The loop management device and the remote test interface communicate using voice-band signals transmitted over the communication path and collaboratively test the communication path.
    Type: Grant
    Filed: June 2, 2000
    Date of Patent: June 24, 2003
    Assignee: Nokia Inc.
    Inventors: Brent R. Zitting, Robert D. Deaton, Mark O. Rigby, Ron M. Roberson, Kevin R. Banks, Jeffrey J. Sands
  • Publication number: 20030097451
    Abstract: A method and apparatus are provided for controlling access to stored personal data of a user. A user indicates which portions of personal data of the user stored in a personal data repository are releasable to a second party. The user and the second party reach an agreement regarding use, by the second party, of any portions of the personal data in the personal data repository. The portions of the stored personal data in the personal data repository are released to the second party according to the agreement. The agreement includes what items within the personal data repository can be used by the second party. Only those items which, according to the agreement, can be used by the second party are released to the second party. In another embodiment of the invention, a method and apparatus are provided for selectively sending information. A trusted party device receives a request to send information.
    Type: Application
    Filed: November 16, 2001
    Publication date: May 22, 2003
    Applicant: NOKIA, INC.
    Inventors: Margareta Gunilla Bjorksten, Mitri Abou-Rizk
  • Publication number: 20030088792
    Abstract: A method and system for providing protection from exploits to devices connected to a network. The system and method include a component for determining whether an encapsulation has been applied to an attachment associated with a message and unencapsulating such encapsulated attachment, and a component that performs at least one decompression of the attachment when the attachment is compressed. If it is determined that the message, including the attachment, is to be scanned, a component is included that determines whether a header, body, and/or attachment of the message includes exploits. A device that receives messages that are directed to the network employs the components above to provide exploit protection for at least one of the messages.
    Type: Application
    Filed: December 11, 2002
    Publication date: May 8, 2003
    Applicant: Nokia, Inc.
    Inventors: James Card, Gregory J. Smith
  • Publication number: 20030072318
    Abstract: The present invention provides a system and method for packet forwarding. The packet forwarding improves the performance of common network security applications. The system includes an operating system kernel, a plurality of packet forwarding paths, and a packet classifier. The method includes means for receiving network packets, means for receiving state information from a plurality of external agents, means for selecting a forwarding path from a plurality of forwarding paths based on the state information, and means for transmitting packets.
    Type: Application
    Filed: September 13, 2002
    Publication date: April 17, 2003
    Applicant: Nokia Inc.
    Inventors: Vincent Lam, Adrian Caceres, Joseph R. Eykholt, Lawrence Huston
  • Patent number: 6473621
    Abstract: A translator for wirelessly provided messages. A user interface is provided that permits a replacement of text to be made if a defined term is detected, followed by further replacements of text if any defined terms are found within the first replacement text. Replacement of text may also be staged, such that a first part of a replacement may be made, suspending the replacement until a condition is met. A user may fulfill the condition by entering in a string including a delimiter, whereupon a second part of the replacement is completed.
    Type: Grant
    Filed: May 28, 1999
    Date of Patent: October 29, 2002
    Assignee: Nokia Inc.
    Inventor: Anders Fahnøe Heie