Patent classifications
H04L51/00
Calculating structural differences from binary differences in publish subscribe system
A method for more efficient structural parsing of binary representations of text based objects within a data distribution system. Clients subscribe to a topic maintained by the data distribution system server that publishers can publish to. Clients receive an original binary representation of a text based object describing the state of the topic to which the client is subscribed. In response to the state of the topic changing at the data distribution system server, clients receive a binary delta representing the change of the state of the topic. Based on the received binary representation and the binary delta, clients calculate an updated binary representation of the text based object. Using the original binary representation, the updated binary representation, and the binary delta, the client generates a structural delta representing the structural differences between data structures of the original text based object and data structures of the updated text based object.
System and method for displaying message or user lists
A system and method displays lists of users or messages in segments, with some segments showing messages or users believed to be more relevant to the user than others on the list.
Viral engine for network deployment
A private network system operates over a public network to provide an asymmetric service to members with information from other members and non-members. The system includes central servers and databases connected via the public network to client systems of public network users. The users may be members who communicate with a private protocol or non-members who communicate with the public protocol. A process for the private service includes communication of information between users via the private service servers. The private service server implements the private service, which includes a viral engine for network deployment. Features of the viral engine include genetic algorithms, data mining, personalization, frictionless service setup, user maximization, and member-controlled privacy. A sample setup process and contact update wizard that include several viral engine features are described.
TRANSLATING BUILDING AUTOMATION EVENTS INTO MOBILE NOTIFICATIONS
Devices, methods, and systems for translating building automation events into mobile notifications are described herein. One device includes a memory, and a processor configured to execute executable instructions stored in the memory to receive a notification of an event from a building automation system, translate the event into a mobile notification of the event, and transmit the mobile notification of the event to a mobile device.
Dual Fallback Hardened VoIP System with Signal Quality Measurement
A hardened VoIP system is presented that includes secure push-to-talk voice functionality. Through the addition of encryption, authentication, user filtering, and integration with new and existing LMR systems, a secure voice platform ensures malicious software, unauthorized access and brute force security attacks will not compromise the voice communications of the system. The VoIP system is engineered to ensure graceful system degradation in the event of maintenance activities, natural disasters and failure modes. The hardened VoIP system offers the functions a LMR trunking system while utilizing broadband connections. Private calls, group calls, Emergency Alarms with covert monitoring capability, scanning and priority scanning may be incorporated into the system. The system includes a VoIP controller that serves as a trunking controller, manages available VoIP based conference bridges, and assigns them as needed to the parties involved in each voice call. The system includes multiple fallback methods that may be prioritized based on pre-failure analytics.
Detection of access to text-based transmissions
A service provider receives a request to obtain a text-based transmission. In response to the request, the service provider generates an identifier corresponding to the request and, based at least in part on the identifier and text to be included in the transmission, determines a set of textual transformations to associate with the identifier. The service provider modifies the text in accordance with the set of textual transformations and provides the modified text to the requestor as the text-based transmission.
Authentication And Confidence Marking E-Mail Messages
Methods and systems for authenticating and confidence marking e-mail messages are described. One embodiment describes a method of authenticating an e-mail message. This method involves extracting a plurality of e-mail headers associated with the e-mail message, and identifying a sending edge mail transfer agent (MTA). The method then calls for determining if the sending edge MTA is authorized to send the e-mail message.
Secure and confidential sharing of digital content
A method of sharing confidential digital content among a plurality of participants, each utilizing one or more digital communication devices connected to a network, the method including providing one or more units of content each unit comprising at least one element to one or more digital communication device belonging to at least one of the plurality of participants; on any of the digital communication devices comprising the one or more units: receiving a selection of at least one element from a participant; designating the selection as confidential, and hiding the designated selection from view on the digital communication devices; on any of the digital communication devices comprising the designated selection: authenticating a passcode from a viewing participant of the plurality of participants; receiving a request to view the designated selection from the viewing participant; and displaying the designated selection to the viewing participant.
Method and device for sending communication message
The present disclosure relates to the field of computer technologies, and discloses a method and a device for sending a communication message. The method includes: receiving, by a wearable device, a communication message sent by a transfer device, where the communication message is sent to the transfer device by a target device, and is forwarded to the wearable device by the transfer device when the transfer device meets a predetermined condition; receiving, by the wearable device, a reply message input for the communication message; and sending, by the wearable device, the reply message to the transfer device, where the reply message is forwarded to the target device by the transfer device. The present disclosure resolves a problem that a user cannot send or reply to a communication message in time when it is inconvenient to operate an electronic device, and achieves an effect of improving communication efficiency.
Location-based discovery of network members
A technique for allowing members of the same social network using mobile devices to discover others in the vicinity by personal attributes and in specific picture(s) and name for the purpose of connecting, and the ability to use functions provided by a social network such as SMS, e-mail, chat/instant messaging, multimedia, or video by using unique hardware identification of each member mobile device and personal login information that are stored in a network server computing device; and associating the unique apparatus of the members' hardware with the members' personal profile such that when a search is initiated between members, the results contain the members' profile's picture(s), name, location and additional information as stored in the profiles. The proximity of the users is determined by static or dynamic location of the actual device location identified through mobile radio frequency location technology and internet IP information and saved in the user profile.