H04W12/02

System for data routing in networks

Systems, methods, and devices for routing data in a network are described. A user device may send a request for video data that has been captured by a premises device. A computing device at the premises may receive the request and determine a capability of the user device. Based on the capability of the user device, the computing device may select a protocol from a plurality of protocols with which the video data is to be transmitted to the user device. Based on determining that the video data cannot be transmitted via the computing device, the video data may be transmitted from the premises device to the user device via the determined protocol.

System for data routing in networks

Systems, methods, and devices for routing data in a network are described. A user device may send a request for video data that has been captured by a premises device. A computing device at the premises may receive the request and determine a capability of the user device. Based on the capability of the user device, the computing device may select a protocol from a plurality of protocols with which the video data is to be transmitted to the user device. Based on determining that the video data cannot be transmitted via the computing device, the video data may be transmitted from the premises device to the user device via the determined protocol.

Systems and methods for a de-identified medical and healthcare data marketplace

The invention relates generally to systems and methods for a medical data marketplace where de-identified medical data can be offered for sale or licensing, and prospective customers can search for the medical data using various criteria. The marketplace facilitates clinical research activities, clinical trials, medical research, medical technology development, and the like, while preserving HIPPA privacy protections, and allows medical data owners to monetize the data in an efficient manner.

Profile handling of a communications device

There is presented mechanisms for profile handling of a communications device (300). A method is performed by a local profile assistant (200a) of a proxy device (200). The method comprises obtaining an indication of handling a profile of the communications device (300). The method comprises establishing a first secure communications link with a local profile assistant of the communications device. The method comprises establishing a second secure communications link with a subscription management entity (430) of the communications device. The method comprises receiving information pertaining to handling of the profile by the local profile assistant of the communications device, the information being received from the subscription management entity over the second secure communications link. The method comprises providing the information to the local profile assistant of the communications device over the first secure communications link.

Profile handling of a communications device

There is presented mechanisms for profile handling of a communications device (300). A method is performed by a local profile assistant (200a) of a proxy device (200). The method comprises obtaining an indication of handling a profile of the communications device (300). The method comprises establishing a first secure communications link with a local profile assistant of the communications device. The method comprises establishing a second secure communications link with a subscription management entity (430) of the communications device. The method comprises receiving information pertaining to handling of the profile by the local profile assistant of the communications device, the information being received from the subscription management entity over the second secure communications link. The method comprises providing the information to the local profile assistant of the communications device over the first secure communications link.

Pre-positioning target content in a storage network

A method for execution in a storage network, the method begins by determining a user device group content preference, wherein the user group content includes target content for a user device group and the determining includes predicting future target content for the user group. The method continues by selecting a plurality of network edge units for staging encoded data slices, identifying target content for partial download to the plurality of network edge units and dispersed error encoding the target content to generate a set of encoded data slices. The method then continues by identifying encoded data slices from the set of encoded data slices corresponding to the target content for partial download and determining a partial downloading schedule for sending the encoded data slices for partial download to each network edge unit of the plurality of network edge units. The method continues by facilitating partial downloading of the target content by sending the encoded data slices for partial download to each network edge unit of the plurality of network edge units.

Pre-positioning target content in a storage network

A method for execution in a storage network, the method begins by determining a user device group content preference, wherein the user group content includes target content for a user device group and the determining includes predicting future target content for the user group. The method continues by selecting a plurality of network edge units for staging encoded data slices, identifying target content for partial download to the plurality of network edge units and dispersed error encoding the target content to generate a set of encoded data slices. The method then continues by identifying encoded data slices from the set of encoded data slices corresponding to the target content for partial download and determining a partial downloading schedule for sending the encoded data slices for partial download to each network edge unit of the plurality of network edge units. The method continues by facilitating partial downloading of the target content by sending the encoded data slices for partial download to each network edge unit of the plurality of network edge units.

CONTROLLING ACCESS TO PROTECTED FUNCTIONALITY OF A HOST DEVICE USING A WIRELESS DEVICE
20180007558 · 2018-01-04 · ·

A wearable device can establish a verified session with a host device (e.g., by establishing that the wearable device is present in the vicinity of the host device and is currently being worn). The existence of such a verified session can be used to control user access to sensitive information that may be stored in or otherwise accessible to a host device. For example, the host device and/or application programs executing thereon can be configured to restrict a user's ability to invoke program functionality that accesses sensitive information based on whether a verified session with a wearable device is currently in progress.

CONTROLLING ACCESS TO PROTECTED FUNCTIONALITY OF A HOST DEVICE USING A WIRELESS DEVICE
20180007558 · 2018-01-04 · ·

A wearable device can establish a verified session with a host device (e.g., by establishing that the wearable device is present in the vicinity of the host device and is currently being worn). The existence of such a verified session can be used to control user access to sensitive information that may be stored in or otherwise accessible to a host device. For example, the host device and/or application programs executing thereon can be configured to restrict a user's ability to invoke program functionality that accesses sensitive information based on whether a verified session with a wearable device is currently in progress.

METHOD AND APPARATUS FOR PROVIDING BROADCAST CHANNEL ENCRYPTION TO ENHANCE CELLULAR NETWORK SECURITY
20180007548 · 2018-01-04 ·

A method, computer-readable storage device and apparatus for encrypting a broadcast message of a base station are disclosed. For example, the method selects an encryption key for the broadcast message and encrypts the broadcast message using the encryption key to create an encrypted broadcast message. The method then transmits an identifier of the encryption key and transmits the encrypted broadcast message over a broadcast channel. A method for decrypting a broadcast message that is encrypted is also disclosed.