Patent classifications
H04W12/08
NETWORK ACCESS METHOD, APPARATUS, AND SYSTEM
The present disclosure discloses a network access method performed at a computer server in connection with a social networking platform, comprising: receiving a network access request from a first social networking account at a first terminal to a second social networking account at a second terminal, the network access request for accessing a wireless network bound to the second social networking account, the first and second social networking account both being associated with the social networking platform; forwarding the network access request to the second social networking account, the network access request including the first social networking account and an identifier of the wireless network; receiving a feedback instruction sent by the second social networking account; and sending authorization information of the wireless network to the first social networking account when the feedback instruction is an access authorization instruction, the authorization information including verification information used for accessing the wireless network.
NETWORK ACCESS METHOD, APPARATUS, AND SYSTEM
The present disclosure discloses a network access method performed at a computer server in connection with a social networking platform, comprising: receiving a network access request from a first social networking account at a first terminal to a second social networking account at a second terminal, the network access request for accessing a wireless network bound to the second social networking account, the first and second social networking account both being associated with the social networking platform; forwarding the network access request to the second social networking account, the network access request including the first social networking account and an identifier of the wireless network; receiving a feedback instruction sent by the second social networking account; and sending authorization information of the wireless network to the first social networking account when the feedback instruction is an access authorization instruction, the authorization information including verification information used for accessing the wireless network.
HYPER-NUMBER PORTABILITY
Systems and methods are provided to support hypernumber portability for a hypernumber number corresponding to an electronic device. The electronic device may include an installed application to facilitate hypernumber portability. To this end, when the electronic devices connects to a wireless network, the electronic device may request a vehicle identification. If the wireless network is a vehicle-based network, the electronic device may receive the vehicle identification from an on-board node. When the received vehicle identification indicates that the electronic device has changed locations, the electronic device may communicate with a hypernumber database and/or a hypernumber server to update a dynamic phonebook. As a result, as the electronic device traverses a transport network, the dynamic phonebook may maintain updated location and call routing information for the electronic device.
HYPER-NUMBER PORTABILITY
Systems and methods are provided to support hypernumber portability for a hypernumber number corresponding to an electronic device. The electronic device may include an installed application to facilitate hypernumber portability. To this end, when the electronic devices connects to a wireless network, the electronic device may request a vehicle identification. If the wireless network is a vehicle-based network, the electronic device may receive the vehicle identification from an on-board node. When the received vehicle identification indicates that the electronic device has changed locations, the electronic device may communicate with a hypernumber database and/or a hypernumber server to update a dynamic phonebook. As a result, as the electronic device traverses a transport network, the dynamic phonebook may maintain updated location and call routing information for the electronic device.
DETECTION OF A DELINQUENT MOBILE DEVICE
A method and system of detecting a delinquent mobile user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card of the user device is determined by the user device. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS as to whether the IMSI is authorized for the user device. Upon determining that the IMSI is not authorized for the user device, a notification is displayed on a display of the user device.
DETECTION OF A DELINQUENT MOBILE DEVICE
A method and system of detecting a delinquent mobile user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card of the user device is determined by the user device. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS as to whether the IMSI is authorized for the user device. Upon determining that the IMSI is not authorized for the user device, a notification is displayed on a display of the user device.
Multi-access edge computing (MEC) based multi-operator support for C-V2X systems
A computing device includes communications circuitry to communicate with a first access network and processing circuitry. The processing circuitry is to perform operations to transmit an authorization request for a vehicle-to-everything (V2X) communication to a V2X application function within a service coordinating entity, the request transmitted from the device via the first access network V2X configuration parameters are received from the service coordinating entity, via the first access network. The V2X configuration parameters are received in response to the authorization request and based on V2X subscription information received by the V2X application function via a V2X application programming interface (API) within the service coordinating entity. A V2X communication link for the V2X communication is established with a second device based on the V2X configuration parameters, the second device associated with a second access network.
Method of wearable device displaying icons, and wearable device for performing the same
A method of a wearable device displaying icons is provided. The method includes displaying a plurality of circular icons comprising a first circular icon located in a center area of a touch display in a first size and a second circular icon located outside of the center area of the touch display in a second size smaller than the first size, and based on a direction of a touch input received on the touch display, moving the plurality of circular icons such that the first circular icon is moved to a first position located outside of the center area of the touch display and the second circular icon is moved from a second position located outside the center area of the touch display to the center area of the touch display and enlarged in size from the second size to the first size.
Method of wearable device displaying icons, and wearable device for performing the same
A method of a wearable device displaying icons is provided. The method includes displaying a plurality of circular icons comprising a first circular icon located in a center area of a touch display in a first size and a second circular icon located outside of the center area of the touch display in a second size smaller than the first size, and based on a direction of a touch input received on the touch display, moving the plurality of circular icons such that the first circular icon is moved to a first position located outside of the center area of the touch display and the second circular icon is moved from a second position located outside the center area of the touch display to the center area of the touch display and enlarged in size from the second size to the first size.
HEALTH DEVICE, GATEWAY DEVICE AND METHOD FOR SECURING PROTOCOL USING THE SAME
Disclosed herein are a health device, a gateway device, and a method for securing a protocol using the health device and the gateway device. The method includes performing, by the health device and the gateway device, authentication and key exchange based on security session information; sending, by any one of the health device and the gateway device, an application message protected based on the security session information; and receiving, by a remaining one of the health device and the gateway device, the protected application message.