[go: up one dir, main page]

WO2003040898A1 - An arrangement and a method for content policy control with a trusted environment in a multimedia messaging system - Google Patents

An arrangement and a method for content policy control with a trusted environment in a multimedia messaging system Download PDF

Info

Publication number
WO2003040898A1
WO2003040898A1 PCT/NO2002/000413 NO0200413W WO03040898A1 WO 2003040898 A1 WO2003040898 A1 WO 2003040898A1 NO 0200413 W NO0200413 W NO 0200413W WO 03040898 A1 WO03040898 A1 WO 03040898A1
Authority
WO
WIPO (PCT)
Prior art keywords
mms
policy
content
message
policies
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/NO2002/000413
Other languages
French (fr)
Inventor
Øyvind BREIVIK
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beep Science AS
Original Assignee
Beep Science AS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beep Science AS filed Critical Beep Science AS
Publication of WO2003040898A1 publication Critical patent/WO2003040898A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/58Message adaptation for wireless communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/18Service support devices; Network management devices
    • H04W88/184Messaging devices, e.g. message centre

Definitions

  • the present invention is related to an arrangement and a method in messaging environments where value added content is protected and its distribution controlled and enforced according to the content owner's content policies.
  • this invention relates to content policy enforcement within a trusted environment including, but not exclu- sive to, the messaging environment of mobile Multimedia Messaging Service.
  • VAS SMS Short-Messag- ing-Services
  • Some examples of VAS SMS are jokes (text format) , stock quotes (text format) , simple ringing tones (binary format) and black and white logos (binary format) .
  • MMS mobile Multimedia Messaging Service
  • VAS MMS Voice over IP Services
  • Some examples of envisaged value added MMS and content are "mobile greeting card portal” (such as sending pictures/ animations, with or without sound from a portal to a mobile terminal) , "famous cartoon messages” (such as animations, with or without colours/audio) , "visual/audio quiz mes sages” (such as picture/audio messaging games) , "talking head message” (such as rendering a personal text with a predefined animation) .
  • VAS MMS will be offered to the end users by operators and by independent 3rd party service and content providers (e.g. media houses, portals, broadcasting corporations) that utilise the wireless MMS infrastructure of the operators .
  • Multimedia content has an inherently greater value to the content owners than plain text content (cf . SMS) .
  • plain text content cf . SMS
  • Examples of such content policies are: “content is to be charged the end-user on purchase and download, forwarding to other users is not allowed”, “the sender is to be charged an extra fee if content is forwarded to another user” , “content is not to be distributed (download or forwarded) to end-users under the age of 18” , “content can be distributed to mobile terminals with MS-ISDN addressing, content shall not be distributed (downloaded or forwarded) to e-mail addresses” , “content can only be distributed (downloaded or forwarded) to female end-users” , “content is not to be edited by end-user", and so on.
  • the mobile operator has to provide a total solution to support these requirements so that content owners can securely make their content available for value added MMS with defined policies and thereby protect their intellectual property and their revenue streams .
  • Policy detection and enforcement of value added content of today are essentially adapted to Internet models.
  • access control is the platform for Internet Content Selection (PICS) [2] and Digital Signature (DSiG) 5 [3] , which is a standard solution for defining and controlling meta-data for web content.
  • PICS Internet Content Selection
  • DSL Digital Signature
  • This solution defines a language and a set of processing rules for controlling access to content. This allows, e.g., parents to control what content their kids can access .
  • o Policy binding to content is handled by the content provider, including meta-data in web files. Detection of the policy is handled by functionality within the web client by screening web files downloaded for meta-data. PICS and DSiG detects the rating policy statements (e.g., suitable for s persons under the age of 18) and gives presentation-access to the content according to allowed policies set within the web-client (e.g., only to present content that is suitable for users under the age of 18) .
  • Digital watermark [4] that is a process where a pattern is added to the content itself to represent the policy. This pattern shall ideally be invisible for the end-user. Special web-clients or applications filter and recognise this 5 pattern and they give usage rights to the end-user according to the policy detected.
  • the clearinghouse [5] model is a model where the content is packaged into an encoded container.
  • the o container When reading the content with a client that can interpret the container, the o container will authorize usage rights according to the policy handling of a remote clearinghouse.
  • Self-imposed access-control to content i.e. what can be presented or rendered after a download of content.
  • the end-user can determine which policies should be enforced by configuring the presentation tool (i.e., the web client).
  • the main object of the present invention is to provide an arrangement and a method that meets the requirements for content policy enforcement in the MMS architecture.
  • the features defined in the claims enclosed characterize this arrangement .
  • the present invention discloses an arrangement and a method for binding policies to MMS content to be distributed as MMS message transactions and gives content policy enforce- ment on MMS message transactions by controlling the transaction-transfer in the mobile network. Further, the arrangement provides retention of content policy bindings when MMS messages re-enters the mobile network as new mes- sage transactions providing a trusted environment for policy and content rights handling.
  • the present invention presents an arrangement and a method consisting of four main components in an arrangement giving trusted environment characteristics : - Policy Binding Method (PBM) , that is used to bind policies to MMS content
  • PBM Policy Binding Method
  • PDF Policy Detection Filter
  • PA Policy Agency
  • TCM Trusted Client Method
  • the PBM is used to add meta-data to the MMS message and message elements to give policy associations with the content when the MMS is distributed from a service provider to an end-user, via the mobile operator's infrastructure.
  • PBM allows for the PDF to detect policies on the MMS in transfer within the mobile infrastructure.
  • the PDF monitors the MMS in transfer within the mobile infrastructure. It resides within, or is closely coupled with, the MMS-C. PDF filters on the MMS and detects any policy meta-data, according to the PBM encoding, of messages passing through. MMS with policies detected are stalled in the delivery-transaction and held until the PA has processed the policies. The PDF requests the PA to process the policies.
  • the PA enables or disables the message to be passed through to the end-user by informing the PDF of the action to be taken according to the PA result of the parsed policy.
  • the PA receives the content policy references from the PDF and one or more of the following as input to the parsing: end- user data from the PDF, message content element references or content from the PDF, and end-user client profiles from the PDF.
  • the TCM ensures that the meta-data of messages and message elements received on the mobile terminal will be retained if the message or message elements are sent back into the wireless network by the mobile terminal .
  • Figure 1 illustrates the MMS architecture and the compo- nents involved in message transfer between mobile handsets (peer-peer and forwarding) and from a network server to a mobile handset (publishing) .
  • Figure 2 illustrates the components involved according to the present invention and how they interact . The figure also illustrates how these components are placed in the MMS architecture .
  • the MMS message delivery process for value added content is depicted in Figure 1. As illustrated, the message transfer can either be initiated from the network (i.e. published from a service provider) or it can be initiated from a peer terminal (user-agent) .
  • the first delivery will always be initiated from the network (published) .
  • the content may then be distributed (forwarded) in a peer-peer fashion.
  • the invention builds on this nature for the distribution of value added content .
  • the typical scenario consists of three steps, being the policy defini- tion, the publishing process and the forwarding control process.
  • the policy definition process consists of the following:
  • the content owner makes the value added content available (store in database) -
  • the content owner defines the content policy and binds it to the content (store in database)
  • the publishing process consists of the following:
  • the mobile user requests value added content
  • the content owner publishes the content onto the mo- bile infrastructure with its policies
  • the MMS is in transfer, and:
  • the policies are enforced -
  • the value added content is sent to and retrieved by the mobile users, if allowed according to policy
  • the forwarding control process consists of the following:
  • the mobile user forwards some value added content to another peer user
  • the MMS is in transfer, and: - The message is relayed through the mobile infrastructure
  • the value added content is sent to and retrieved by the user to whom the content was being forwarded to, if allowed according to policy
  • Examples of content and content elements that may comprise value added content/service data are audio files, pictures, animations, videos, and texts, and any combination of these [6,7,8,9,10] .
  • the present invention provides functions that are used by the publishing process, when MMSs are in transfer, when published and when forwarded.
  • the publishing process applies to content being delivered from a network server to a client terminal and its user- agent .
  • the traffic flow is depicted in Figure 1 and labelled with (A) .
  • the present invention introduces policy binding to the con- tent when the content is being published.
  • the policy-binding component of the invention is depicted in Figure 2 and referred to as PBM.
  • the Policy Binding Method is used to bind the policies to the content when the content is published.
  • the PBM defines the formatting rules to be used.
  • the formatting rules may for instance be implemented using XML-header [11] fields such as those found in SMIL [12] or WM [13], so that content policy identifiers can be included as meta-data and thereby associated with the message.
  • the policy identifier may be represented in different ways: a) As a URL [14] reference to a policy database containing policies . b) As a URL reference to wrapper files containing both the reference to the content and to the policy. c) As a policy-flag or tag in combination with a shadow policy directory. In this case, all content URLs have a shadow policy URL, where there is a fixed relation between the two URLs (e.g. /image/cool .gif -> /image/cool_gif .policy) .
  • the message is published (e.g., via the MMS-C MM7 interface) and introduced into the mobile operator's infrastructure. The message is then in transfer within the mobile infrastructure.
  • the present invention introduces message transfer control to enforce policies associated with message transactions. These functions of the invention are depicted in Figure 2 and are referred to as PDF and PA.
  • the Policy Detection Filter carries out control of content and resides within or is closely coupled to the MMS-C.
  • the PDF checks if MMS content in transfer (both for MMSs published and MMSs in the forwarding process) has a defined policy and makes sure that the policy is enforced and activated by requesting the PA to do so.
  • the PDF carries out the detection by screening for policy meta-data, formatted according to the PBM implementation. When the PDF identifies a content element with a policy, it will request the Policy Agency (PA) to process the policy.
  • PA Policy Agency
  • the PDF puts the message transaction on hold, and provides a reference to the policy and one or more of the following as input to the parsing: end-user data from the PDF, mes- sage content element references or content from the PDF, and end-user client profiles from the PDF.
  • the PA may use different techniques to identify the policy of a content element .
  • the technique used in this embodiment is determined by, and corresponds to, the policy represen- tation implementation of the policy identifiers used by the PBM.
  • the PA will then process this policy and return an ok status code to the PDF if the content is allowed in this context.
  • Content that is not allowed in the given context will be removed or replaced with a screening message by the PDF before a message is delivered (e.g., "Content requested not allowed” or "Content forwarded not allowed) .
  • PA Policy Agency
  • the check is performed by retrieving user information (e.g., address, age, prepaid account level), either from an independent database containing such information, or from the database of the mobile operator, and checking the user information with the content policy (e.g., age group allowed, price policy, number series allowed) .
  • the content policy e.g., age group allowed, price policy, number series allowed.
  • the PDF can retrieve information about the client (e.g., via a User Agent Profile, UAProf [13]), put the message transaction on hold, and pass the client information to the PA for policy handling.
  • the PA can then return an ok status code to the PDF if the client is trusted and allowed in this context. For instance, if the particu- lar client does not have the TCM implemented, the PA can deny access to the content, according to defined policy. Content that is not allowed in this context will be removed or replaced with a screening message (e.g., "Content requested not allowed on this terminal") by the PDF before the message is delivered.
  • a screening message e.g., "Content requested not allowed on this terminal
  • the invention introduces a function on the terminal that retains MMSs with policy bindings.
  • the function is depicted in Figure 2 and referred to as TCM.
  • the Trusted Client Method is integrated as a function within the terminal (e.g., as an integrated part of the terminal's MMS client or the terminal's WAP [13] browser). It is used to ensure that terminals can be trusted to retain MMS policy bindings originated in the publishing process by the PBM implementation and contained within MMSs received/retrieved on the terminal .
  • the MMS policies can be detected and enforced again if the MMS is sent back into the mobile messaging infrastructure.
  • the PDF as previously described, is able to retrieve the information about a terminal client, whether or not TCM is implemented, and may o pass this on to the PA for policy enforcement in a trusted environment .
  • the components and the arrangement of invention provide for a trusted environment for policy handling.
  • the TCM may be implemented by the following procedure:
  • MMS that is retrieved by the terminal is screened for s policies according to the encoding of the PBM.
  • Detected policies together with the message element file references are stored in a list within the terminal's non-volatile memory.
  • the associated policies are included in the MMS encoding according to the PBM implementation before the MMS is sent into the 5 mobile messaging infrastructure.
  • the present invention provides a solution for policy enforcement of value added content in a mobile multimedia- messaging environment, extending the business potential for MMS. It handles enforcement of the message transaction-de- o livery, which is paramount to a mobile messaging environment .
  • the invention provides a solution that is secure, ensuring not only that published content is enforced, but also that value added content that re-enters the mobile network in a peer-to-peer fashion can be securely enforced by retaining the policy bindings within the mobile client. This brings a trusted environment for policy handling and enforcement to MMS.
  • the present invention provides a solution that easily can be integrated with existing mobile technology (i.e., terminals and MMS-clients, MMS-C infrastructure), thus enhancing and optimising the existing technologies with the important functionality for content policy handling.
  • existing mobile technology i.e., terminals and MMS-clients, MMS-C infrastructure
  • the invention provides an efficient solution for policy binding, policy detection, and policy enforcement, not requiring policies to be included within content in a pro- prietary and processing demanding way.
  • the invention provides a solution that is compatible with all MMS content formats, comprising both existing and new formats .
  • the invention provides a solution that gives flexible pol- icy enforcement functions by decoupling the policy enforcement functions from policy detection functions.
  • MMS 3GPP TS 23.140 v .2.0 (2001-03), 3rd Generation Partnership Project; Technical Specification Group Terminals; Multimedia Messaging Service (MMS) ; Functional description; Stage 2 (Release 4)
  • DSig PICS Signed Labels (DSig) 1.0 Specification, REC-DSig-label-19980527, World Wide Web Consortium (W3C) , Recommendation 27- May-1998
  • AMR 3GPP TS 26.090 "AMR Speech Codec Speech Transcoding Functions"
  • Synchronized Multimedia Integration Language 1.0 Specification, World Wide Web Consortium (W3C) , Recommendation 15-June-1998

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention discloses an arrangement and a method for binding policies to MMS content to be distributed as MMS message transactions, and provides content policy enforcement on MMS message transactions by controlling, filtering and charging transaction-transfer in the mobile network. Further, the arrangement provides retention of content policy bindings when MMS messages re-enters the mobile network as new message transactions providing a trusted environment for policy and content rights handling. The present invention can be integrated in existing MMS architecture, and is compatible with all MMS content formats, being both existing and new formats.

Description

AN ARRANGEMENT AND A METHOD FOR CONTENT POLICY CONTROL WITH A TRUSTED ENVIRONMENT IN A MULTIMEDIA MESSAGING SYSTEM
Field of the invention
The present invention is related to an arrangement and a method in messaging environments where value added content is protected and its distribution controlled and enforced according to the content owner's content policies. In particular, this invention relates to content policy enforcement within a trusted environment including, but not exclu- sive to, the messaging environment of mobile Multimedia Messaging Service.
Background of the invention
The recent exponential growth of value added Short-Messag- ing-Services (SMS) was triggered by the introduction of distribution and billing opportunities, provided by the mobile operators, to 3rd party value added service (VAS) and content providers. Some examples of VAS SMS are jokes (text format) , stock quotes (text format) , simple ringing tones (binary format) and black and white logos (binary format) .
The next generation of messaging services, namely the mobile Multimedia Messaging Service (MMS) [1] standardized by the WAP forum and 3GPP, will support transfer and delivery of value added multimedia content (e.g. sounds, video and images) to mobile terminals. To owners of such content, this represents a new channel where their content can be sold.
The future of VAS MMS services has an even greater growth potential compared to SMS services due to the advanced con- tent capabilities of the MMS technology. Sophisticated multimedia content can be provided with VAS MMS services. Some examples of envisaged value added MMS and content are "mobile greeting card portal" (such as sending pictures/ animations, with or without sound from a portal to a mobile terminal) , "famous cartoon messages" (such as animations, with or without colours/audio) , "visual/audio quiz mes sages" (such as picture/audio messaging games) , "talking head message" (such as rendering a personal text with a predefined animation) . VAS MMS will be offered to the end users by operators and by independent 3rd party service and content providers (e.g. media houses, portals, broadcasting corporations) that utilise the wireless MMS infrastructure of the operators .
Multimedia content has an inherently greater value to the content owners than plain text content (cf . SMS) . When making such value added content available to end-users, it is therefore important to the content owners that the content is protected, and its distribution rules controlled and enforced according to the content owner's content policies, so that their intellectual property and revenue streams are secured. Examples of such content policies are: "content is to be charged the end-user on purchase and download, forwarding to other users is not allowed", "the sender is to be charged an extra fee if content is forwarded to another user" , "content is not to be distributed (download or forwarded) to end-users under the age of 18" , "content can be distributed to mobile terminals with MS-ISDN addressing, content shall not be distributed (downloaded or forwarded) to e-mail addresses" , "content can only be distributed (downloaded or forwarded) to female end-users" , "content is not to be edited by end-user", and so on.
The mobile operator has to provide a total solution to support these requirements so that content owners can securely make their content available for value added MMS with defined policies and thereby protect their intellectual property and their revenue streams . Policy detection and enforcement of value added content of today are essentially adapted to Internet models.
One example of access control is the platform for Internet Content Selection (PICS) [2] and Digital Signature (DSiG) 5 [3] , which is a standard solution for defining and controlling meta-data for web content. This solution defines a language and a set of processing rules for controlling access to content. This allows, e.g., parents to control what content their kids can access .
o Policy binding to content is handled by the content provider, including meta-data in web files. Detection of the policy is handled by functionality within the web client by screening web files downloaded for meta-data. PICS and DSiG detects the rating policy statements (e.g., suitable for s persons under the age of 18) and gives presentation-access to the content according to allowed policies set within the web-client (e.g., only to present content that is suitable for users under the age of 18) .
Two strategies are established for usage control of Inter- o net content . These are :
Digital watermark [4] that is a process where a pattern is added to the content itself to represent the policy. This pattern shall ideally be invisible for the end-user. Special web-clients or applications filter and recognise this 5 pattern and they give usage rights to the end-user according to the policy detected.
The clearinghouse [5] model is a model where the content is packaged into an encoded container. When reading the content with a client that can interpret the container, the o container will authorize usage rights according to the policy handling of a remote clearinghouse. The problems with the above mentioned solutions of prior art are that they do not handle policies with respect to the delivery-transaction of content. They only solve:
a) Self-imposed access-control to content, i.e. what can be presented or rendered after a download of content. The end-user can determine which policies should be enforced by configuring the presentation tool (i.e., the web client).
b) Usage-control to content. How the content can be used after the content has been downloaded/received and when the content is attempted to be used.
They do not solve policies enforcement with respect to who is allowed to send or forward value added content, who is allowed to receive value added content, and which value added content is allowed being sent or received. These are problems that have to be solved in a mobile messaging environment, where value added content will have policies associated with message delivery transactions.
Consequently, there is a need for a solution for policy detection and enforcement of value added content in a mobile multimedia-messaging environment .
Summary of the invention
The main object of the present invention is to provide an arrangement and a method that meets the requirements for content policy enforcement in the MMS architecture. The features defined in the claims enclosed characterize this arrangement .
The present invention discloses an arrangement and a method for binding policies to MMS content to be distributed as MMS message transactions and gives content policy enforce- ment on MMS message transactions by controlling the transaction-transfer in the mobile network. Further, the arrangement provides retention of content policy bindings when MMS messages re-enters the mobile network as new mes- sage transactions providing a trusted environment for policy and content rights handling.
The present invention presents an arrangement and a method consisting of four main components in an arrangement giving trusted environment characteristics : - Policy Binding Method (PBM) , that is used to bind policies to MMS content
- Policy Detection Filter (PDF) , that detects MMS content policies in transaction-transfer
Policy Agency (PA) , that parse policies - Trusted Client Method (TCM) , that retains policy bindings on the client
The PBM is used to add meta-data to the MMS message and message elements to give policy associations with the content when the MMS is distributed from a service provider to an end-user, via the mobile operator's infrastructure. PBM allows for the PDF to detect policies on the MMS in transfer within the mobile infrastructure.
The PDF monitors the MMS in transfer within the mobile infrastructure. It resides within, or is closely coupled with, the MMS-C. PDF filters on the MMS and detects any policy meta-data, according to the PBM encoding, of messages passing through. MMS with policies detected are stalled in the delivery-transaction and held until the PA has processed the policies. The PDF requests the PA to process the policies.
The PA enables or disables the message to be passed through to the end-user by informing the PDF of the action to be taken according to the PA result of the parsed policy. The PA receives the content policy references from the PDF and one or more of the following as input to the parsing: end- user data from the PDF, message content element references or content from the PDF, and end-user client profiles from the PDF.
The TCM ensures that the meta-data of messages and message elements received on the mobile terminal will be retained if the message or message elements are sent back into the wireless network by the mobile terminal .
Brief description of the drawings
In order to make the invention more readily understandable, the discussion that follows will refer to the accompanying drawings .
Figure 1 illustrates the MMS architecture and the compo- nents involved in message transfer between mobile handsets (peer-peer and forwarding) and from a network server to a mobile handset (publishing) .
Figure 2 illustrates the components involved according to the present invention and how they interact . The figure also illustrates how these components are placed in the MMS architecture .
Detailed description of preferred embodiments
In the following, a preferred embodiment of the present invention will be described in an MMS environment, referring to the above-mentioned figures. However, this does not represent any limitations to the invention. The present invention may be utilized in other similar applications, environments and contexts with other variations and substitutions without departing from the scope of the invention as defined by the attached independent claims . The MMS message delivery process for value added content is depicted in Figure 1. As illustrated, the message transfer can either be initiated from the network (i.e. published from a service provider) or it can be initiated from a peer terminal (user-agent) .
For value added content that is to be subject to policy control, the first delivery will always be initiated from the network (published) . The content may then be distributed (forwarded) in a peer-peer fashion. The invention builds on this nature for the distribution of value added content .
In order to describe the process of policy enforcement, a typical usage scenario will now be described. The typical scenario consists of three steps, being the policy defini- tion, the publishing process and the forwarding control process.
The policy definition process consists of the following:
The content owner makes the value added content available (store in database) - The content owner defines the content policy and binds it to the content (store in database)
The publishing process consists of the following:
The mobile user requests value added content
- The content owner publishes the content onto the mo- bile infrastructure with its policies
The MMS is in transfer, and:
For each of the requested content-elements the content policy is detected
The policies are enforced - The value added content is sent to and retrieved by the mobile users, if allowed according to policy The forwarding control process consists of the following:
The mobile user forwards some value added content to another peer user
The MMS is in transfer, and: - The message is relayed through the mobile infrastructure
The policies are detected and enforced
- The value added content is sent to and retrieved by the user to whom the content was being forwarded to, if allowed according to policy
Examples of content and content elements that may comprise value added content/service data are audio files, pictures, animations, videos, and texts, and any combination of these [6,7,8,9,10] .
The present invention provides functions that are used by the publishing process, when MMSs are in transfer, when published and when forwarded.
The Publishing Process
The publishing process applies to content being delivered from a network server to a client terminal and its user- agent . The traffic flow is depicted in Figure 1 and labelled with (A) .
Policy Binding
The present invention introduces policy binding to the con- tent when the content is being published. The policy-binding component of the invention is depicted in Figure 2 and referred to as PBM.
The Policy Binding Method (PBM) is used to bind the policies to the content when the content is published. The PBM defines the formatting rules to be used. The formatting rules may for instance be implemented using XML-header [11] fields such as those found in SMIL [12] or WM [13], so that content policy identifiers can be included as meta-data and thereby associated with the message.
The policy identifier may be represented in different ways: a) As a URL [14] reference to a policy database containing policies . b) As a URL reference to wrapper files containing both the reference to the content and to the policy. c) As a policy-flag or tag in combination with a shadow policy directory. In this case, all content URLs have a shadow policy URL, where there is a fixed relation between the two URLs (e.g. /image/cool .gif -> /image/cool_gif .policy) .
After the policy binding, the message is published (e.g., via the MMS-C MM7 interface) and introduced into the mobile operator's infrastructure. The message is then in transfer within the mobile infrastructure.
Transfer Control
All MMS messages pass through the MMS-C according to the standardised MMS architecture. This also applies for MMSs that are published and that are forwarded.
The present invention introduces message transfer control to enforce policies associated with message transactions. These functions of the invention are depicted in Figure 2 and are referred to as PDF and PA.
The Policy Detection Filter (PDF) carries out control of content and resides within or is closely coupled to the MMS-C. The PDF checks if MMS content in transfer (both for MMSs published and MMSs in the forwarding process) has a defined policy and makes sure that the policy is enforced and activated by requesting the PA to do so. The PDF carries out the detection by screening for policy meta-data, formatted according to the PBM implementation. When the PDF identifies a content element with a policy, it will request the Policy Agency (PA) to process the policy. In doing so, the PDF puts the message transaction on hold, and provides a reference to the policy and one or more of the following as input to the parsing: end-user data from the PDF, mes- sage content element references or content from the PDF, and end-user client profiles from the PDF.
The PA may use different techniques to identify the policy of a content element . The technique used in this embodiment is determined by, and corresponds to, the policy represen- tation implementation of the policy identifiers used by the PBM.
The PA will then process this policy and return an ok status code to the PDF if the content is allowed in this context. Content that is not allowed in the given context will be removed or replaced with a screening message by the PDF before a message is delivered (e.g., "Content requested not allowed" or "Content forwarded not allowed) .
When the Policy Agency (PA) is invoked to enforce a policy, it will perform the following steps (or any combinations thereof) to enforce the policy:
a) Check if the receiver is allowed to receive the content element from the sender.
The check is performed by retrieving user information (e.g., address, age, prepaid account level), either from an independent database containing such information, or from the database of the mobile operator, and checking the user information with the content policy (e.g., age group allowed, price policy, number series allowed) . b) Check if the receiver-client is allowed to retrieve the content element. The check is performed by retrieving client information when the receiver-client initiates contact with the MMS-C, and checking the client information with the content policy.
c) Check if the sender is allowed to send the content element . The check is performed by retrieving user information (as in a) ) , and checking this with the content policy.
d) Generate charging information to charge the sender or receiver for use of the content element .
When a client terminal initiates contact with the MMS-C to retrieve an MMS, the PDF can retrieve information about the client (e.g., via a User Agent Profile, UAProf [13]), put the message transaction on hold, and pass the client information to the PA for policy handling. The PA can then return an ok status code to the PDF if the client is trusted and allowed in this context. For instance, if the particu- lar client does not have the TCM implemented, the PA can deny access to the content, according to defined policy. Content that is not allowed in this context will be removed or replaced with a screening message (e.g., "Content requested not allowed on this terminal") by the PDF before the message is delivered.
Trusted Client Method
The invention introduces a function on the terminal that retains MMSs with policy bindings. The function is depicted in Figure 2 and referred to as TCM.
The Trusted Client Method (TCM) is integrated as a function within the terminal (e.g., as an integrated part of the terminal's MMS client or the terminal's WAP [13] browser). It is used to ensure that terminals can be trusted to retain MMS policy bindings originated in the publishing process by the PBM implementation and contained within MMSs received/retrieved on the terminal .
5 By retaining the MMS policy bindings, the MMS policies can be detected and enforced again if the MMS is sent back into the mobile messaging infrastructure. The PDF, as previously described, is able to retrieve the information about a terminal client, whether or not TCM is implemented, and may o pass this on to the PA for policy enforcement in a trusted environment . The components and the arrangement of invention provide for a trusted environment for policy handling.
The TCM may be implemented by the following procedure:
1. MMS that is retrieved by the terminal is screened for s policies according to the encoding of the PBM.
2. Detected policies together with the message element file references are stored in a list within the terminal's non-volatile memory.
3. When the terminal is to send a new MMS, the content 0 element file references of the MMS are compared with the file references in the list.
4. If any match in the list is found, the associated policies are included in the MMS encoding according to the PBM implementation before the MMS is sent into the 5 mobile messaging infrastructure.
The present invention provides a solution for policy enforcement of value added content in a mobile multimedia- messaging environment, extending the business potential for MMS. It handles enforcement of the message transaction-de- o livery, which is paramount to a mobile messaging environment .
The invention provides a solution that is secure, ensuring not only that published content is enforced, but also that value added content that re-enters the mobile network in a peer-to-peer fashion can be securely enforced by retaining the policy bindings within the mobile client. This brings a trusted environment for policy handling and enforcement to MMS.
Further, the present invention provides a solution that easily can be integrated with existing mobile technology (i.e., terminals and MMS-clients, MMS-C infrastructure), thus enhancing and optimising the existing technologies with the important functionality for content policy handling.
The invention provides an efficient solution for policy binding, policy detection, and policy enforcement, not requiring policies to be included within content in a pro- prietary and processing demanding way.
Also, the invention provides a solution that is compatible with all MMS content formats, comprising both existing and new formats .
The invention provides a solution that gives flexible pol- icy enforcement functions by decoupling the policy enforcement functions from policy detection functions.
Abbreviations and references
[1] MMS 3GPP TS 23.140 v .2.0 (2001-03), 3rd Generation Partnership Project; Technical Specification Group Terminals; Multimedia Messaging Service (MMS) ; Functional description; Stage 2 (Release 4)
[2] PICS Rating Services and Rating Systems (and Their Machine Readable Descriptions) , REC-PICS-services- 961031, version 1.1, World Wide Web Consortium (W3C) , Recommendation 31-October-1996
[3] DSig PICS Signed Labels (DSig) 1.0 Specification, REC-DSig-label-19980527, World Wide Web Consortium (W3C) , Recommendation 27-May-1998
[4] Digital Watermark "Digital Watermarks Copyright
Protection for Online Artists", PC Magazine, Febru- ary 18, 1997
[5] Clearinghouse "Digital Rights for all media types", Internetcontent.net, 2/20/2001
[6] GIF, Graphics Interchange Format (Version 89a) , CompuServe Inc., Columbus, Ohio, 1990
[7] JPEG, ITU-T Rec. T.8l/lSθ/lEC 10918-1: 1992,
„Information Technology - Digital Compression and Coding of Continuous-Tone Still Images - Requirements and Guidelines"
[8] MP3 MPEGl-Audio ISO/lEC 11172-3, MPEG2-Audio ISO/IEC 11172-3
[9] MPEG4, ISO/IEC 14496-1(1999): Information
Technology - Generic Coding of Audio-Visual Objects AND 3GPP TR 26.911: "Codec (s) for Circuite Switched Multimedia Telephony Service; Terminal Implementor' s Guide"
[10] AMR 3GPP TS 26.090: "AMR Speech Codec Speech Transcoding Functions"
[11] XML Extensible Markup Language (XML) 1.0 (Second Edition) , World Wide Web Consortium (W3C) , Recommendation 6 October 2000
[12] Synchronized Multimedia Integration Language (SMIL) 1.0 Specification, World Wide Web Consortium (W3C) , Recommendation 15-June-1998
[13] Wireless Application Protocol, Wireless Markup
Language Specification Version 1.1, WAP WML Version 16-Jun-1999, Wireless Application Protocol Forum
[14] URL/URI, Uniform Resource Identifiers (URI) : Generic Syntax, Internet Engineering Task Force
(IETF), Request For Comment (RFC) 2396, August 1998

Claims

P a t e n t c l a i m s
1. An arrangement for execution and control of policies for Multimedia Message Service (MMS) messages or elements
5 of such (from now on referred to as MMS messages) being transferred in a communication network to and/or from terminals connected thereto, c h a r a c t e r i z e d i n
a first means adapted to associate a policy with one o or more of said MMS messages,
a second means adapted to detect whether MMS messages in transfer in said communication network are associated with policies, and to transmit a request for executing a policy to the third means when s detecting that that policy is associated with an MMS message,
a third means adapted to execute a policy on an MMS message to which the policy is detected as being associated,
0 a fourth means adapted to ensure that an MMS message associated with a policy is retained associated with that policy when the MMS message is received, stored and/or forwarded in/from one of the terminals,
whereby said means are connected to and/or integrated 5 in an MMS architecture connected to said communication network.
2. Arrangement according to claim 1, c h a r a c t e r i z e d i n that said first means associates the policy to one or more of said MMS messages o by inserting a reference to the policy in a heading of a file/files representing said one or more MMS messages.
3. Arrangement according to claim 2 , c h a r a c t e r i z e d i n that the header is an XML header and the reference is a URL.
4. Arrangement according to claim 2 or 3 , c h a r a c t e r i z e d i n that the second means detects whether MMS messages in transfer in said communication network are associated with policies by monitoring all MMS messages arriving at the MMS-C of the MMS architecture .
5. Arrangement according to claim 4 , c h a r a c t e r i z e d i n that the second means is adapted to place the MMS message on hold and that said request contains said reference to the policy, user and terminal data of the MMS message's intended receiver and a content or a content reference of the MMS message.
6. Arrangement according to any of the preceding claims, c h a r a c t e r i z e d i n that the fourth means is implemented in one or more of the terminals.
7. Arrangement according to one of the claims 2-6, c h a r a c t e r i z e d i n that the third means executes the policy by:
a) checking if the MMS message's intended receiver is allowed to receive the MMS message,
b) checking if a terminal of the intended receiver comprises said fourth means,
c) checking if the MMS message's sender is allowed to send the MMS message,
d) generating charging information to charge the sender or intended receiver for the MMS message, and according to step a) -c) ;
e) instructing said second means whether it should forward the MMS message to the intended receiver or not .
5 8. Arrangement according to one of the preceding claims, c h a r a c t e r i z e d i n that the fourth means ensures that the MMS message associated with the policy is retained associated with that policy by:
f) monitoring receiving MMS messages for ιo associated policies in a terminal in which said fourth means is implemented,
g) storing detected policies together with references to associated MMS messages in a reference list in said terminal,
i5 h) upon sending the MMS messages from the terminal, checking the reference list if the MMS messages have references to policies, and
i) associating policies to MMS messages according to the reference list.
20 9. A method in an MMS architecture for execution and control of policies for MMS messages or elements of such (from now on referred to as MMS messages) being transferred in a communication network to and/or from terminals connected thereto,
25 c h a r a c t e r i z e d i n
a) associating a policy to one or more of said MMS messages,
b) detecting whether MMS messages in transfer in said communication network are associated
3o with policies and transmitting a request for executing a policy when detecting that that policy is associated with an MMS message,
c) executing a policy on an MMS message to which the policy is detected as being associated, and
d) ensuring that an MMS message associated with a policy is retained associated with that policy when the MMS message is received, stored and/or forwarded in/from one of the terminals .
PCT/NO2002/000413 2001-11-08 2002-11-08 An arrangement and a method for content policy control with a trusted environment in a multimedia messaging system Ceased WO2003040898A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
NO20015471A NO316737B1 (en) 2001-11-08 2001-11-08 Arrangement and procedure for content control of data objects, especially data objects in MMS messages
NO20015471 2001-11-08

Publications (1)

Publication Number Publication Date
WO2003040898A1 true WO2003040898A1 (en) 2003-05-15

Family

ID=19913003

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/NO2002/000413 Ceased WO2003040898A1 (en) 2001-11-08 2002-11-08 An arrangement and a method for content policy control with a trusted environment in a multimedia messaging system

Country Status (2)

Country Link
NO (1) NO316737B1 (en)
WO (1) WO2003040898A1 (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003101054A1 (en) * 2002-05-24 2003-12-04 Siemens Aktiengesellschaft Method and device for transmitting data
WO2005004439A1 (en) * 2003-07-03 2005-01-13 Nanyang Polytechnic A method and system for selective control of mms service in well defined premises
WO2005043942A1 (en) * 2003-10-27 2005-05-12 Siemens Aktiengesellschaft Method for transmitting encrypted useful data objects
EP1566931A1 (en) * 2004-02-19 2005-08-24 Openmind Networks Limited Content management system
FR2880758A1 (en) * 2005-01-12 2006-07-14 Bouygues Telecom Sa METHOD FOR DIFFUSION OF DIGITAL CONTENT VIA A MOBILE TELEPHONE NETWORK
US7190808B2 (en) 2004-03-12 2007-03-13 Interdigital Technology Corporation Method for watermarking recordings based on atmospheric conditions
US7272240B2 (en) 2004-12-03 2007-09-18 Interdigital Technology Corporation Method and apparatus for generating, sensing, and adjusting watermarks
JP2007287148A (en) * 2006-04-12 2007-11-01 Internatl Business Mach Corp <Ibm> Dynamic access control for content-based publish / subscribe systems with guaranteed delivery
US7321761B2 (en) 2004-12-03 2008-01-22 Interdigital Technology Corporation Method and apparatus for preventing unauthorized data from being transferred
WO2008061477A1 (en) * 2006-11-20 2008-05-29 Huawei Technologies Co., Ltd. A system and charging control method of network fuse policy charging control structure
US7532723B2 (en) 2003-11-24 2009-05-12 Interdigital Technology Corporation Tokens/keys for wireless communications
EP2081338A3 (en) * 2004-11-02 2009-07-29 Nokia Corporation Indication of usage restricted content to a recipient terminal
US7574220B2 (en) 2004-12-06 2009-08-11 Interdigital Technology Corporation Method and apparatus for alerting a target that it is subject to sensing and restricting access to sensed content associated with the target
EP1728173A4 (en) * 2004-03-23 2010-06-09 Nds Ltd Optimally adapting multimedia content for mobile subscriber device playback
US7773571B1 (en) 2006-02-03 2010-08-10 Nortel Networks Limited Transfer of policy and charging rules during MIP handover
US7890657B2 (en) 2008-06-12 2011-02-15 Genband Us Llc System and method for correct routing and enforcement policy in a network having address or port translation
US7904723B2 (en) 2005-01-12 2011-03-08 Interdigital Technology Corporation Method and apparatus for enhancing security of wireless communications
US7987369B2 (en) 2005-03-03 2011-07-26 Interdigital Technology Corporation Using watermarking to reduce communication overhead
US20110321119A1 (en) * 2010-06-28 2011-12-29 Seigo Kotani Consigning Authentication Method
WO2012001475A1 (en) * 2010-06-28 2012-01-05 Fujitsu Limited Consigning authentication method
EP1598728A3 (en) * 2004-05-05 2012-08-01 TeliaSonera AB Method and device for digital rights enforcement
US8353000B2 (en) 2006-11-20 2013-01-08 Huawei Technologies Co., Ltd. System and charging control method of network convergence policy and charging control architecture

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000028398A1 (en) * 1998-11-10 2000-05-18 Koninklijke Philips Electronics N.V. Content supplied as software objects for copyright protection
WO2000078004A2 (en) * 1999-06-10 2000-12-21 Alcatel Internetworking, Inc. Policy based network architecture
US6286052B1 (en) * 1998-12-04 2001-09-04 Cisco Technology, Inc. Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows
WO2001076181A2 (en) * 2000-03-31 2001-10-11 Tumbleweed Communications Corp. Policy enforcement in a secure data file delivery system
EP1217591A1 (en) * 2000-12-21 2002-06-26 Nokia Corporation Improvements in and relating to the distribution of content

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000028398A1 (en) * 1998-11-10 2000-05-18 Koninklijke Philips Electronics N.V. Content supplied as software objects for copyright protection
US6286052B1 (en) * 1998-12-04 2001-09-04 Cisco Technology, Inc. Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows
WO2000078004A2 (en) * 1999-06-10 2000-12-21 Alcatel Internetworking, Inc. Policy based network architecture
WO2001076181A2 (en) * 2000-03-31 2001-10-11 Tumbleweed Communications Corp. Policy enforcement in a secure data file delivery system
EP1217591A1 (en) * 2000-12-21 2002-06-26 Nokia Corporation Improvements in and relating to the distribution of content

Cited By (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003101054A1 (en) * 2002-05-24 2003-12-04 Siemens Aktiengesellschaft Method and device for transmitting data
WO2005004439A1 (en) * 2003-07-03 2005-01-13 Nanyang Polytechnic A method and system for selective control of mms service in well defined premises
WO2005043942A1 (en) * 2003-10-27 2005-05-12 Siemens Aktiengesellschaft Method for transmitting encrypted useful data objects
US7877598B2 (en) 2003-10-27 2011-01-25 Siemens Aktiengesellschaft Method for transmitting encrypted user data objects
US7532723B2 (en) 2003-11-24 2009-05-12 Interdigital Technology Corporation Tokens/keys for wireless communications
EP1566931A1 (en) * 2004-02-19 2005-08-24 Openmind Networks Limited Content management system
WO2005081476A1 (en) * 2004-02-19 2005-09-01 Openmind Networks Limited A content management system
US7190808B2 (en) 2004-03-12 2007-03-13 Interdigital Technology Corporation Method for watermarking recordings based on atmospheric conditions
US8782281B2 (en) 2004-03-23 2014-07-15 Cisco Technology Inc. Optimally adapting multimedia content for mobile subscriber device playback
EP1728173A4 (en) * 2004-03-23 2010-06-09 Nds Ltd Optimally adapting multimedia content for mobile subscriber device playback
EP1598728A3 (en) * 2004-05-05 2012-08-01 TeliaSonera AB Method and device for digital rights enforcement
US8321954B2 (en) 2004-11-02 2012-11-27 Core Wireless Licensing S.A.R.L. Informing recipient device of message content properties
US9369306B2 (en) 2004-11-02 2016-06-14 Microsoft Technology Licensing, Llc. Informing recipient device of message content properties
EP2081338A3 (en) * 2004-11-02 2009-07-29 Nokia Corporation Indication of usage restricted content to a recipient terminal
US7321761B2 (en) 2004-12-03 2008-01-22 Interdigital Technology Corporation Method and apparatus for preventing unauthorized data from being transferred
US7272240B2 (en) 2004-12-03 2007-09-18 Interdigital Technology Corporation Method and apparatus for generating, sensing, and adjusting watermarks
US7574220B2 (en) 2004-12-06 2009-08-11 Interdigital Technology Corporation Method and apparatus for alerting a target that it is subject to sensing and restricting access to sensed content associated with the target
US7904723B2 (en) 2005-01-12 2011-03-08 Interdigital Technology Corporation Method and apparatus for enhancing security of wireless communications
EP1699024A1 (en) * 2005-01-12 2006-09-06 Bouygues Telecom Method for transmission of digital content via a mobile telephone network
FR2880758A1 (en) * 2005-01-12 2006-07-14 Bouygues Telecom Sa METHOD FOR DIFFUSION OF DIGITAL CONTENT VIA A MOBILE TELEPHONE NETWORK
US8458481B2 (en) 2005-03-03 2013-06-04 Interdigital Technology Corporation Using watermarking to reduce communication overhead
US7987369B2 (en) 2005-03-03 2011-07-26 Interdigital Technology Corporation Using watermarking to reduce communication overhead
US7773571B1 (en) 2006-02-03 2010-08-10 Nortel Networks Limited Transfer of policy and charging rules during MIP handover
US8392961B2 (en) 2006-04-12 2013-03-05 International Business Machines Corporation Dynamic access control in a content-based publish/subscribe system with delivery guarantees
JP2007287148A (en) * 2006-04-12 2007-11-01 Internatl Business Mach Corp <Ibm> Dynamic access control for content-based publish / subscribe systems with guaranteed delivery
US8353000B2 (en) 2006-11-20 2013-01-08 Huawei Technologies Co., Ltd. System and charging control method of network convergence policy and charging control architecture
WO2008061477A1 (en) * 2006-11-20 2008-05-29 Huawei Technologies Co., Ltd. A system and charging control method of network fuse policy charging control structure
US7890657B2 (en) 2008-06-12 2011-02-15 Genband Us Llc System and method for correct routing and enforcement policy in a network having address or port translation
US20110321119A1 (en) * 2010-06-28 2011-12-29 Seigo Kotani Consigning Authentication Method
CN103069767A (en) * 2010-06-28 2013-04-24 富士通株式会社 Consigning authentication method
JP2013529822A (en) * 2010-06-28 2013-07-22 富士通株式会社 Consignment type authentication method
JP2013533552A (en) * 2010-06-28 2013-08-22 富士通株式会社 Consignment type authentication method
US8726335B2 (en) 2010-06-28 2014-05-13 Fujitsu Limited Consigning authentication method
WO2012001476A3 (en) * 2010-06-28 2012-03-01 Fujitsu Limited Consigning authentication method
CN103069767B (en) * 2010-06-28 2015-07-22 富士通株式会社 Consigning authentication method
WO2012001475A1 (en) * 2010-06-28 2012-01-05 Fujitsu Limited Consigning authentication method
US9467448B2 (en) 2010-06-28 2016-10-11 Fujitsu Limited Consigning authentication method

Also Published As

Publication number Publication date
NO20015471D0 (en) 2001-11-08
NO20015471L (en) 2003-05-09
NO316737B1 (en) 2004-04-19

Similar Documents

Publication Publication Date Title
WO2003040898A1 (en) An arrangement and a method for content policy control with a trusted environment in a multimedia messaging system
US20230262429A1 (en) Mobile Machine
US7805522B2 (en) Method for the transmission of user data objects
WO2002103968A1 (en) An arrangement and a method for content policy control in a mobile multimedia messaging system
US7779077B2 (en) File transmission method in instant messaging service and mobile communications terminal for supporting the same
EP2022231A2 (en) Method and architecture to deliver pre customized business card multimedia contents through ims based plmns for improving the existing calling line
US20060224684A1 (en) Multimedia messaging method and system
US20060176902A1 (en) Method of processing a multimedia message, a storage medium, and an associated processing system
CN101179767A (en) Multimedia information limitation operation method, transmitting terminal, receiving terminal and system
TW200843425A (en) System and method for transformation of syndicated content for mobile delivery
EP1571792B1 (en) Multimedia messaging service system and method thereof
Le Bodic Multimedia messaging service: An engineering approach to MMS
CN104579915A (en) Multimedia message publishing method and device
US20060007893A1 (en) System for adapting printed literary, educational, and business works to fixed-line and mobile telephony networks
US20060041511A1 (en) Device and method for digital rights management in a mobile terminal
CN101098338A (en) A Realization Method of Multimedia Message Content Protection
CN100574521C (en) The MMS information source tracing method
KR20060082404A (en) Digital content transmission method through mobile telephone network
KR100645920B1 (en) Video mail service system and method for mobile communication terminal
EP1655649A2 (en) Device and method for digital rights management in a mobile terminal
KR101261229B1 (en) Service System And Method For Providing Personalized Contents Using The Mobile Communication Terminal
Jun et al. Interactive multimedia messaging service platform
Alliance Standard Transcoding Interface Specification
JP4098763B2 (en) Server device
Nassiri Value Added Application Service Interworking and Functionality in Multimedia Messaging Service Center

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SC SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP