Technique for enabling remote data access and manipulation from a pervasive device
DCFirst Claim
Patent Images
1. A method of enabling data access and manipulation from a pervasive device, comprising steps of:
- receiving a data access request from a pervasive device;
obtaining the requested data;
determining what data manipulation operations are available for the obtained data, as well as a location of each available data manipulation operation; and
returning the determined data manipulation operations and locations to the pervasive device, in addition to the obtained data.
12 Assignments
Litigations
3 Petitions
Accused Products
Abstract
Methods, systems, and computer program instructions for enabling users of pervasive devices to remotely access and manipulate information in ways that might otherwise be impossible or impractical because of inherent limitations of the device. The disclosed techniques enable a wide variety of data manipulation operations to be performed on behalf of the pervasive device, for a wide variety of content types. In preferred embodiments, no modifications or add-ons are required to the pervasive device.
-
Citations
57 Claims
-
1. A method of enabling data access and manipulation from a pervasive device, comprising steps of:
-
receiving a data access request from a pervasive device;
obtaining the requested data;
determining what data manipulation operations are available for the obtained data, as well as a location of each available data manipulation operation; and
returning the determined data manipulation operations and locations to the pervasive device, in addition to the obtained data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49)
-
-
50. A system for enabling data access and manipulation from a pervasive device, comprising:
-
means for receiving a data access request from a pervasive device;
means for obtaining the requested data;
means for determining what data manipulation operations are available for the obtained data, as well as a location of each available data manipulation operation; and
means for returning the determined data manipulation operations and locations to the pervasive device, in addition to the obtained data. - View Dependent Claims (51)
-
-
52. Computer program instructions for enabling data access and manipulation from a pervasive device, the computer program instructions embodied on one or more computer readable media and comprising:
-
computer program instructions for receiving a data access request from a pervasive device;
computer program instructions for obtaining the requested data;
computer program instructions for determining what data manipulation operations are available for the obtained data, as well as a location of each available data manipulation operation; and
computer program instructions for returning the determined data manipulation operations and locations to the pervasive device, in addition to the obtained data. - View Dependent Claims (53)
-
-
54. A method of enabling a pervasive device to access and manipulate remotely-stored data, comprising steps of:
-
receiving a data access request from the pervasive device;
obtaining the requested data;
determining what data manipulation operations are available for the obtained data, as well as a location of each available data manipulation operation; and
returning the determined data manipulation operations and locations to the pervasive device, in addition to the obtained data.
-
-
55. A method of accessing and manipulating remotely-stored data from a pervasive device, comprising steps of:
-
requesting an access of the remotely-stored data from the pervasive device; and
receiving the requested data at the pervasive device, along with information about one or more data manipulation operations that have been determined to be available for the obtained data. - View Dependent Claims (56, 57)
-
Specification