Patent classifications
H04L12/16
Method, system, and non-transitory computer-readable record medium for generating chatroom according to condition
Disclosed is a method, system, and non-transitory computer-readable record medium for creating a chatroom according to a condition. The chatroom creation method may include providing an instant messaging service; registering a chatroom creation condition related to a specific account of the instant messaging service; retrieving at least one account of accounts of the instant messaging service that meets the chatroom creation condition; and automatically creating a chatroom of the specific account joined by the retrieved accounts.
Data isolation and two-factor access control
Systems, methods and computer program products for controlling access to data owned by an application subscriber using two-factor access control and user partitioning are disclosed. In one embodiment, applications are executed on a multi-tenant application platform in which user partitions designate associated users and authentication services for those users. Tenants may subscribe to the applications and may allow access to the subscriptions through designated entry points. Users that are authenticated according to the corresponding user partition and access the application through the designated entry point are allowed to access the application through the tenant's subscription.
Data isolation and two-factor access control
Systems, methods and computer program products for controlling access to data owned by an application subscriber using two-factor access control and user partitioning are disclosed. In one embodiment, applications are executed on a multi-tenant application platform in which user partitions designate associated users and authentication services for those users. Tenants may subscribe to the applications and may allow access to the subscriptions through designated entry points. Users that are authenticated according to the corresponding user partition and access the application through the designated entry point are allowed to access the application through the tenant's subscription.
MODULATOR, DEMODULATOR AND WIRELESS COMMUNICATION SYSTEM
The invention discloses a modulator, a demodulator and a wireless communication system. The wireless communication system comprises a modulator and a demodulator. The modulator is suitable for generating a target linear frequency modulation signal, wherein the target linear frequency modulation signal is a signal of which the frequency is varied linearly over time, wherein the phase of the target linear frequency modulation signal is determined by an initial frequency and a frequency stepping of the target linear frequency modulation signal, and the frequency stepping is determined by the bandwidth of the target linear frequency modulation signal and the spreading factor of the target linear frequency modulation signal. The demodulator is suitable for demodulating the target linear frequency modulation signal. According to the scheme, power consumption can be reduced while long-distance signal transmission is realized.
MODULATOR, DEMODULATOR AND WIRELESS COMMUNICATION SYSTEM
The invention discloses a modulator, a demodulator and a wireless communication system. The wireless communication system comprises a modulator and a demodulator. The modulator is suitable for generating a target linear frequency modulation signal, wherein the target linear frequency modulation signal is a signal of which the frequency is varied linearly over time, wherein the phase of the target linear frequency modulation signal is determined by an initial frequency and a frequency stepping of the target linear frequency modulation signal, and the frequency stepping is determined by the bandwidth of the target linear frequency modulation signal and the spreading factor of the target linear frequency modulation signal. The demodulator is suitable for demodulating the target linear frequency modulation signal. According to the scheme, power consumption can be reduced while long-distance signal transmission is realized.
APPARATUSES AND METHODS FOR CALL ADDITION CONTROL
A method for call addition control in a User Agent (UA) or a call service system is provided. The UA or the call service system receives or initiates a call addition request comprising information of a called party during a call. The UA or the call service system determines whether the called party is already present in the call. The UA or the call service system blocks the call addition request in response to the called party being already present in the call.
Virtual customer premises equipment, policy management server and service providing method
Virtual customer premises equipment includes: policy acquisition part configured to acquire, from predetermined policy management server that manages communication policies of users of the virtual customer premises equipment, communication policy that includes condition for providing service to be provided to a terminal that performs access via first customer premises equipment; and service providing part configured to provide a communication service to the terminal by referring to the communication policy. The policy acquisition part identifies a terminal that has moved to the first customer premises equipment from second customer premises equipment different from the first customer premises equipment, and acquires from the predetermined policy management server a communication policy including the condition for providing a service to be provided to the identified terminal; and the service providing part provides a communication service so as to satisfy the condition for providing a service defined in the communication policy of the identified terminal.
Virtual customer premises equipment, policy management server and service providing method
Virtual customer premises equipment includes: policy acquisition part configured to acquire, from predetermined policy management server that manages communication policies of users of the virtual customer premises equipment, communication policy that includes condition for providing service to be provided to a terminal that performs access via first customer premises equipment; and service providing part configured to provide a communication service to the terminal by referring to the communication policy. The policy acquisition part identifies a terminal that has moved to the first customer premises equipment from second customer premises equipment different from the first customer premises equipment, and acquires from the predetermined policy management server a communication policy including the condition for providing a service to be provided to the identified terminal; and the service providing part provides a communication service so as to satisfy the condition for providing a service defined in the communication policy of the identified terminal.
DATA ISOLATION AND TWO-FACTOR ACCESS CONTROL
Systems, methods and computer program products for controlling access to data owned by an application subscriber using two-factor access control and user partitioning are disclosed. In one embodiment, applications are executed on a multi-tenant application platform in which user partitions designate associated users and authentication services for those users. Tenants may subscribe to the applications and may allow access to the subscriptions through designated entry points. Users that are authenticated according to the corresponding user partition and access the application through the designated entry point are allowed to access the application through the tenant's subscription.
DATA ISOLATION AND TWO-FACTOR ACCESS CONTROL
Systems, methods and computer program products for controlling access to data owned by an application subscriber using two-factor access control and user partitioning are disclosed. In one embodiment, applications are executed on a multi-tenant application platform in which user partitions designate associated users and authentication services for those users. Tenants may subscribe to the applications and may allow access to the subscriptions through designated entry points. Users that are authenticated according to the corresponding user partition and access the application through the designated entry point are allowed to access the application through the tenant's subscription.