Patent classifications
H04L12/08
Methods and Systems for Connecting Physical Objects to Digital Communications
An interactive sports apparel that includes a scannable code forming part of the apparel, and a server configured to simultaneously deliver static media content and streaming media content to content placeholders residing on a scanner that scans the code on the apparel. The static and streaming media each have content based on proximity of the scanner to the apparel, and a user profile associated with the scanner.
Context-based cloud security assurance system
A cloud infrastructure is enhanced to provide a context-based security assurance service to enable secure application deployment. The service inspects network and cloud topologies to identify potential security capabilities and needs. Preferably, these options are then surfaced to the user with easy-to-understand, pre-configured templates representing security assurance levels. When a template (e.g., representing a pre-configured assurance level) is selected by the user, the system then applies specific capabilities and controls to translate the user-selected generalized specification (e.g., high security) into granular requirements for a specific set of security resources. Preferably, the identification of these security resources is based on system configuration, administration, and information associated with the pre-configured template.
INTERACTIVE SPORTS APPAREL
An interactive sports apparel that includes a scannable code forming part of the apparel, and a server configured to simultaneously deliver static media content and streaming media content to content placeholders residing on a scanner that scans the code on the apparel. The static and streaming media each have content based on proximity of the scanner to the apparel, and a user profile associated with the scanner.
Determining connection feasibility and selection between different connection types
Application-level connection pre-testing of an available connection type of a number of different available connection types is performed by an application executed by a processor programmed to use the different available connection types and a number of different available service interfaces. Application-accessible performance characteristics of the available connection type are measured by the application. A determination is made as to whether the measured application-accessible performance characteristics of the available connection type satisfy a threshold application-level connection performance criterion specified in accordance with a service-level data transmission formatting option utilized by one of the different available service interfaces. The available connection type is selected in response to determining that the application-accessible performance characteristics of the available connection type satisfy the threshold application-level connection performance criterion specified in accordance with the service-level data transmission formatting option utilized by the one of the different available service interfaces.
ACCESS MANAGEMENT
According to an example aspect of the present invention, there is provided an apparatus comprising a memory configured to store an encryption key and a list of access tokens and at least one processing core configured to select a first access token from the list of access tokens based, at least partly, on at least one of a current time and a sequence number, decide, based at least partly on the first access token, whether to grant a user device access to the apparatus, and cause the apparatus to receive a second list of access tokens from at least one of the user device and a second user device.
SECURE INFORMATION TRANSMITTING SYSTEM AND METHOD FOR PERSONAL IDENTITY AUTHENTICATION
A secure information transmitting system and method for personal identity authentication, which, on the basis of a user public key, encrypt and transmit an authentication number transmitted from a server that provides a service to a user to a mobile communication terminal of the user, thereby preventing an unauthorized user who obtained the authentication number from being recognized even if an authentication number is externally exposed through hacking.
SECURE INFORMATION TRANSMITTING SYSTEM AND METHOD FOR PERSONAL IDENTITY AUTHENTICATION
A secure information transmitting system and method for personal identity authentication, which, on the basis of a user public key, encrypt and transmit an authentication number transmitted from a server that provides a service to a user to a mobile communication terminal of the user, thereby preventing an unauthorized user who obtained the authentication number from being recognized even if an authentication number is externally exposed through hacking.
Methods and apparatus for managing data use
Disclosed are systems and methods for managing data use by a user device. In an embodiment, the resolution of media generation, media presentation, or both are altered to optimize the device's usage of data under a data allotment. In a further embodiment, the device may serve as a data conduit to a second device for reasons of improved resolution, improved battery life, or to optimize data allotment.
Method and apparatus for acquiring synchronization for device to device terminal in wireless communication system
Disclosed is a method for acquiring a synchronization by a device to device (D2D) terminal in a wireless communication system, according to an embodiment of the present invention, the method comprising the steps of: measuring D2D synchronization signal reception power and/or D2D synchronization signal reception quality from a D2D synchronization signal; selecting a D2D synchronization signal to be used for synchronization acquisition on the basis of the measurement result; and acquiring a synchronization from the selected D2D synchronization signal, wherein the D2D synchronization signal reception quality is a value obtained by dividing the D2D synchronization signal reception power by the differential between total reception power and the D2D synchronization signal reception power.
Proximity-Based Security
In one embodiment, a first computing device may establish a spatial gap, wherein the spatial gap is defined by a maximum distance from the first computing device for computing devices requesting validation of credentials. The first computing device may then exchange with a second computing device, data transmissions to execute a handshake protocol, wherein the first computing device transmits communication signals at a specified signal strength, and wherein the specified signal strength is configured based on the maximum distance. The first computing device may then determine that the second computing device remained within the spatial gap throughout the handshake protocol, and then grant access to the second computing device.