Patent classifications
H04W12/06
Performance monitoring systems and methods
Systems and methods for electronically creating and modifying a fitness plan are disclosed. The method may include receiving electronic user data, collecting electronic fitness data, and displaying a suggestion for a fitness activity based on the electronic user data and the electronic fitness data.
Apparatus and method for providing interworking of network slices in wireless communication system
A method of selecting, by a control entity, a network slice is provided. The method includes receiving a create session request message from a Serving Gateway (S-GW) in response to a Packet Data Network (PDN) connectivity request message transmitted by a terminal, transmitting, to a storage entity, a request message for subscriber information including identification information of the terminal, receiving, from the storage entity, subscription data of the terminal corresponding to the identification information of the terminal, selecting at least one network slice based on the subscription data of the terminal and slice information supportable by the control entity, and transmitting a create session response message including information of the selected at least one network slice, wherein the subscription data of the terminal includes information about a subscribed network slice of the terminal and information regarding whether the subscribed network slice of the terminal is supported in an Evolved Packet Core (EPC).
Apparatus and method for providing interworking of network slices in wireless communication system
A method of selecting, by a control entity, a network slice is provided. The method includes receiving a create session request message from a Serving Gateway (S-GW) in response to a Packet Data Network (PDN) connectivity request message transmitted by a terminal, transmitting, to a storage entity, a request message for subscriber information including identification information of the terminal, receiving, from the storage entity, subscription data of the terminal corresponding to the identification information of the terminal, selecting at least one network slice based on the subscription data of the terminal and slice information supportable by the control entity, and transmitting a create session response message including information of the selected at least one network slice, wherein the subscription data of the terminal includes information about a subscribed network slice of the terminal and information regarding whether the subscribed network slice of the terminal is supported in an Evolved Packet Core (EPC).
Information processing apparatus, information processing system, information processing method, and non-transitory storage medium
An information processing apparatus including a control unit configured to perform obtaining result data indicating a result of locking and unlocking performed by a locking and unlocking device that performs locking and unlocking based on authentication information obtained from a portable terminal carried by a user, and generating, based on the result data, proposal data including a proposal for a service to be provided to the user.
Wireless network association and authentication system
A wireless network association and authentication system includes an access point that is coupled to an authentication server via a first wireless network. The access point receives, from a first user device that associates with the access point, a first request for access to a second wireless network provided by the access point that is coupled to a wide area network through the first wireless network. The first request includes first authentication information. The access point provides the first request that includes the first authentication information to the authentication server via the first wireless network and receives a first authentication response from the authentication server via the first wireless network. In response to the first authentication response indicating that the first user device is authenticated, the access point provides the first user device access to the second wireless network.
Wireless network association and authentication system
A wireless network association and authentication system includes an access point that is coupled to an authentication server via a first wireless network. The access point receives, from a first user device that associates with the access point, a first request for access to a second wireless network provided by the access point that is coupled to a wide area network through the first wireless network. The first request includes first authentication information. The access point provides the first request that includes the first authentication information to the authentication server via the first wireless network and receives a first authentication response from the authentication server via the first wireless network. In response to the first authentication response indicating that the first user device is authenticated, the access point provides the first user device access to the second wireless network.
System and method of dynamic and scalable IoT framework
A method and a system for providing one or more services to one or more user devices [202] in an IoT network in a scalable M2M (Machine to Machine) framework. The method comprises receiving a connection request from the one or more user devices [202] at a load balance of the IoT network, the connection request comprises at least a username comprising a cluster identifier. The load balancer [204] determines a cluster identifier based on the connection request and identifies at least one target cluster from the one or more clusters [206], said target cluster being associated with the identifier cluster identifier. The load balancer [204] routes the connection request to the at least one target cluster to provide the one or more services to the one or more user devices [202].
System and method of dynamic and scalable IoT framework
A method and a system for providing one or more services to one or more user devices [202] in an IoT network in a scalable M2M (Machine to Machine) framework. The method comprises receiving a connection request from the one or more user devices [202] at a load balance of the IoT network, the connection request comprises at least a username comprising a cluster identifier. The load balancer [204] determines a cluster identifier based on the connection request and identifies at least one target cluster from the one or more clusters [206], said target cluster being associated with the identifier cluster identifier. The load balancer [204] routes the connection request to the at least one target cluster to provide the one or more services to the one or more user devices [202].
Screen-analysis based device security
Systems and methods are provided for a content-based security for computing devices. An example method includes identifying content rendered by a mobile application, the content being rendered during a session, generating feature vectors from the content and determining that the feature vectors do not match a classification model. The method also includes providing, in response to the determination that the feature vectors do not match the classification model, a challenge configured to authenticate a user of the mobile device. Another example method includes determining a computing device is located at a trusted location, capturing information from a session, the information coming from content rendered by a mobile application during the session, generating feature vectors for the session, and repeating this until a training criteria is met. The method also includes training a classification model using the feature vectors and authenticating a user of the device using the trained classification model.
Screen-analysis based device security
Systems and methods are provided for a content-based security for computing devices. An example method includes identifying content rendered by a mobile application, the content being rendered during a session, generating feature vectors from the content and determining that the feature vectors do not match a classification model. The method also includes providing, in response to the determination that the feature vectors do not match the classification model, a challenge configured to authenticate a user of the mobile device. Another example method includes determining a computing device is located at a trusted location, capturing information from a session, the information coming from content rendered by a mobile application during the session, generating feature vectors for the session, and repeating this until a training criteria is met. The method also includes training a classification model using the feature vectors and authenticating a user of the device using the trained classification model.