Patent classifications
H04L69/18
Ranging between mobile devices
A mobile device can include ranging circuitry to determine distance to another mobile device. A first wireless protocol can establish an initial communication session to perform authentication and/or exchange ranging settings. A second protocol can perform ranging, and other wireless protocols can transmit content. In one example, the distance information can be used to display a relative position of another device on a user interface of a sending device. The user interface can allow a user to quickly and accurately select the recipient device for sending the data item. As other example, the distance information obtained from ranging can be used to trigger a notification (e.g., a reminder) to be output from a first mobile device or used to display a visual indicator on a receiving device. Proximity of a device (e.g., as determined by a distance) can be used to suggest recipient for a new communication.
Optical communications apparatus, optical line termination, and optical communication processing method
This application provides example optical communications apparatuses. One example optical communications apparatus includes a control apparatus and an optical module matching apparatus. The control apparatus can output a first control signal to the control end. An input end of the optical module matching apparatus can connect to a first optical module and receive a first electrical signal output by the first optical module. An output end of the optical module matching apparatus can output a first serial signal. The control apparatus can output a second control signal to the control end. The input end of the optical module matching apparatus can receive a second electrical signal output by the second optical module. The output end of the optical module matching apparatus can output a second serial signal. The first electrical signal and the second electrical signal can have different level types.
User experience oriented path selection
Methods and systems for path selection involving remote access protocols and/or user behavior are described herein. A request, from a first computing device, for content hosted on a second computing device may be received. Based on network state metrics, remote access protocol metrics, and/or user experience metrics, a path of a plurality of paths between the first computing device and the second computing device may be selected. The path need not be the most direct path between the first computing device and the second computing device, and may comprise remote access to a computing device on an intermediary server. Based on user behavior analysis performed with respect to user input data, a path may be re-selected, and/or the network state metrics, remote access protocol metrics, and/or user experience metrics may be weighted.
Method and system for remote vehicle diagnostics
A method and system for remote vehicle diagnostics are provided. The method is applicable to a remote vehicle diagnostic system including a vehicle diagnostic terminal and a vehicle connector. A remote communication connection between the vehicle diagnostic terminal and the vehicle connector is established via a preset programming interface. The vehicle diagnostic terminal receives diagnostic instruction data of a diagnostic application. The vehicle diagnostic terminal transmits the diagnostic instruction data to the vehicle connector via the preset programming interface by way of the remote communication. The vehicle connector converts the diagnostic instruction data into first data in a first data format, and performs a diagnostic operation corresponding to the first data, where the first data format is readable by a vehicle.
Method for Transmitting Subscription Data, and Also Data Provision Component, Data Consumption Component, Network and Installation
Various embodiments include a method for transmitting subscription data in a brokerless publication/subscription service from a data provision component to a data consumption component. The method includes: reaching agreement between the data consumption component and the data provision component upon a protocol; and transmitting the subscription data from the data provision component to the data consumption component in the protocol agreed upon.
PRIORITY SELECTION FOR MULTIPLE PROTOCOL STACKS
A method includes assigning a priority to each of a plurality of protocol activities to produce stack priority information for each of a plurality of protocol stacks. The method further includes dynamically adjusting the priority of each of the plurality of protocol activities in the stack priority information based on a network maintenance activity and based on a rejection or an acceptance of the corresponding protocol activity by a dynamic multi-protocol manager (DMM). The method further includes providing the stack priority information to the DMM.
Method For Applying Local Volume File System Policies(encryption, compression and etc) on Cloud(HTTP(S) Server) Files
The user can apply the local volume file system policies like encryption/decryption, file, backup, antivirus, file compression/decompression, file monitoring and etc to the cloud (HTTPS server) files:
The cloud (HTTPS server) files are not vulnerable to man in the middle attack when they are on the way to the cloud (HTTPS server) from the local computer and vice versa, since the files are secured by local volume file system policies (encryption/decryption) in the local computer before they are stored in the cloud (HTTPS server).
The user need not to rely on the cloud (HTTPS server) for the security of the cloud (HTTPS server) files, since the: files are secured by local volume file system policies (encryption/decryption) in the local computer before they are stored in the cloud (HTTPS Server).
Method For Applying Local Volume File System Policies(encryption, compression and etc) on Cloud(HTTP(S) Server) Files
The user can apply the local volume file system policies like encryption/decryption, file, backup, antivirus, file compression/decompression, file monitoring and etc to the cloud (HTTPS server) files:
The cloud (HTTPS server) files are not vulnerable to man in the middle attack when they are on the way to the cloud (HTTPS server) from the local computer and vice versa, since the files are secured by local volume file system policies (encryption/decryption) in the local computer before they are stored in the cloud (HTTPS server).
The user need not to rely on the cloud (HTTPS server) for the security of the cloud (HTTPS server) files, since the: files are secured by local volume file system policies (encryption/decryption) in the local computer before they are stored in the cloud (HTTPS Server).
Plant system and method
A plant system includes: an access node connected to a network; a plurality of controllers configured to perform distributed control on a plurality of field devices provided in a plant; and a wireless communication unit provided in each group of a plurality of groups into which the plurality of controllers are grouped and connected to each controller in the corresponding group via a wired connection, and configured to connect each controller to the access node via a wireless connection.
Facilitation of interconnectivity for mobile devices for 5G or other next generation network
Wireless mobile device functionality can be added to radio devices via a hardware device that comprises wireless network access. Alternatively, radio device functionality can be shared with a wireless mobile device or the hardware device. The functionalities of either device can be shared via a physical or wireless connection. For example, a microphone device comprising a display screen and long-term evolution (LTE) functionality can be connected to a radio device to facilitate LTE functionality for the radio device. Thus, a user of the radio device can utilize the display screen of the microphone device to send text data, which could not previously be sent by the radio device, over the wireless network via the microphone device.