Technique for enabling remote data access and manipulation from a pervasive device
First Claim
Patent Images
1. A method of enabling data access and manipulation from a pervasive device, comprising the steps of:
- receiving a data access request from a pervasive device;
obtaining the requested data;
determining what data manipulation operations are available for the obtained data; and
providing references to the determined data manipulation operations to the pervasive device.
5 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and computer program instructions for enabling users of pervasive devices to remotely access and manipulate information in ways that might otherwise be impossible or impractical because of inherent limitations of the device. The disclosed techniques enable a wide variety of data manipulation operations to be performed on behalf of the pervasive device, for a wide variety of content types. In preferred embodiments, no modifications or add-ons are required to the pervasive device.
37 Citations
24 Claims
-
1. A method of enabling data access and manipulation from a pervasive device, comprising the steps of:
-
receiving a data access request from a pervasive device;
obtaining the requested data;
determining what data manipulation operations are available for the obtained data; and
providing references to the determined data manipulation operations to the pervasive device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product having a computer-readable medium having computer program code encoded thereon for enabling data access and manipulation from a pervasive device, the computer program code adapted to perform steps comprising:
-
receiving a data access request from a pervasive device;
obtaining the requested data;
determining what data manipulation operations are available for the obtained data; and
providing references to the determined data manipulation operations to the pervasive device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for enabling data access and manipulation from a pervasive device, comprising:
-
a data manipulation server for maintaining a repository of data manipulation operations; and
a protocol proxy in communication with the pervasive device and the data manipulation server and adapted to;
receive a data access request from the pervasive device;
obtain the requested data;
communicate with the data manipulation server to determine, responsive to the obtained data, what data manipulation operations are available; and
provide references to the determined data manipulation operations to the pervasive device. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification