Patent classifications
H04L61/3005
SYSTEM AND METHOD FOR CONTROLLING NETWORK PARAMETERS FOR A PLURALITY OF HOME SECURITY/HOME SYSTEM CONTROL PANELS
A computer processor implemented method (10) is provided to control network parameters for a plurality of networked control panels (12) for wireless security/control systems (14). Each of the networked control panels using wireless signals (26,27) to monitor and control a unique set of monitored electronic devices (16). The method includes the steps of: (a) transmitting an electronic signal (38) from a control panel (12) to a central computer processor (20), the electronic signal (38) providing data indicating a physical location of the control panel (12); and (b) in response to the electronic signal (38), the central processor (20) automatically assigning a Personal Area Network ID and channel number (34) to the control panel that do not conflict with any networked control panel near the physical location of the control panel (12).
System and method for controlling network parameters for a plurality of home security/home system control panels
A computer processor implemented method (10) is provided to control network parameters for a plurality of networked control panels (12) for wireless security/control systems (14). Each of the networked control panels using wireless signals (26,27) to monitor and control a unique set of monitored electronic devices (16). The method includes the steps of: (a) transmitting an electronic signal (38) from a control panel (12) to a central computer processor (20), the electronic signal (38) providing data indicating a physical location of the control panel (12); and (b) in response to the electronic signal (38), the central processor (20) automatically assigning a Personal Area Network ID and channel number (34) to the control panel that do not conflict with any networked control panel near the physical location of the control panel (12).
Method and apparatus for managing rehoming of user endpoint devices in a communication network
A system that incorporates teachings of the present disclosure may include, for example, a Domain Name System (DNS) server having a controller to receive new provisioning information for updating a Fully Qualified Domain Name (FQDN), and update the FQDN with the new provisioning information. The new provisioning information can include among other things a start time for rehoming one or more user endpoint devices (UEs) assigned to a current session border Controller (S/BC), a move-from record comprising a descriptor of at least the current S/BC, a move-to record comprising a descriptor of at least a new S/BC to which to rehome the one or more UEs, a transfer window representing a total time for the rehoming the one or more UEs to the new S/BC, and a pacing parameter for rehoming the one or more UEs to the new S/BC during the transfer window. Additional embodiments are disclosed.
Systems and Methods Enabling Secure Transactions from Terminal Window
Systems and methods for enabling a secure transaction from within a primary interface of a computing device includes receiving a user input indicating a domain name of interest in a syntax of the primary interface, transmitting a first command to a server to cause the server to determine an availability of the domain name, receiving an indication of the availability of the domain name from the server, generating, in response to a determination that the domain name is available, a user prompt to query whether the domain name should be purchased in the syntax of the primary interface, receiving a user input indicating that the domain name should be purchased in the syntax of the primary interface, and transmitting a second command to the server to cause the server to purchase the domain name.
Device identification generation in electronic devices to allow external control of device identification for bus communications identification, and related systems and methods
Device identification generation in electronic devices to allow external control, such as selection or reprogramming, of device identification for bus communications identification, is disclosed. In this manner, device identifications of electronic devices coupled to a common communications bus in a system can be selected or reprogrammed to ensure they are unique to avoid bus communications collisions. In certain aspects, to select or reprogram a device identification in an electronic device, an external source can be electrically coupled to the electronic device. The external source closes a circuit with a device identification generation circuit in the electronic device. The closed circuit provides a desired electrical characteristic detectable by the device identification generation circuit. The device identification generation circuit is configured to generate a device identification as a function of the detected electrical characteristics of the closed circuit from the external source.
METHOD FOR NAMING DNS FOR IOT DEVICE
A method for naming a DNS for an IoT device comprises the steps of: receiving a first message including a DNS search list by a device connected to a network on the basis of IPv6 protocol; generating, by the device, a domain name including model information and an identifier of the device; performing, by the device, a redundancy check for the domain name on the basis of a neighbor discovery (ND) protocol; and, when the domain name is not redundant, registering the domain name and IPv6 address for the device into a DNS server on the basis of a node information (NI) protocol by a domain name-collecting apparatus connected to the network.
SYSTEM AND METHOD FOR SELF-DEPLOYING AND SELF-ADAPTING CONTACT CENTER COMPONENTS
A system and method for self-deploying applications for a contact center. An executable unit is built for deploying an application for the contact center, and the application and logic for provisioning the application are aggregated into the executable unit. The executable unit is then provided for deployment. When the executable unit is run, logic within the executable unit is configured to automatically register the application on the computing environment, discover and resolve services used by the application, and start the application on the computing environment.
SYSTEMS AND METHODS FOR MANAGING TOP-LEVEL DOMAIN NAMES USING CONSORTIUM BLOCKCHAIN
The present disclosure relates generally to internet technology and more specifically to managing Top-level domain (TLD) name based on blockchain. An example method of managing Top-level domain name comprises the following steps: A. Using TLD nodes to form alliance network in the blockchain; B. Layering the system architecture in the alliance network to separate operations and data; and C. Reaching consensus among all nodes in the alliance network through consensus mechanism. A more effective and efficient consensus mechanism will increase the safety and reliability of the system and improve the efficiency of the system. Layering the system structure will ensure the efficiency and portability of the system.
SELF-ADAPTIVE SERVICE MANAGEMENT METHOD AND SYSTEM THEREOF
A self-adaptive management method and system thereof are provided. The method includes: sending, by a target AMA server based on pre-stored address information of at least one AMF server, first detection information to the at least one AMF server; receiving, by the at least one AMF server, the first detection information, and returning, by the at least one AMF server, first detection response corresponding to the first detection information to the target AMA server; receiving, by the target AMA server, the first detection response, selecting, by the target AMA server, a target AMF server from the at least one AMF server, and sending, by the target AMA server, a join request to the target AMF server; receiving, by the target AMF server, the join request, and adding, by the target AMF server, the target AMA server to a network node corresponding to the target AMF server.
AUTOMATIC GENERATION OF UNIQUE IDENTIFIERS FOR DISTRIBUTED DIRECTORY MANAGEMENT USERS
A controller is configured to perform various steps including receiving a plurality of user identification values. Another step includes determining a first range of the plurality of user identification values, the first range including a first minimum user identification value and a first maximum user identification value. Another step includes assigning a first user identification value to a first user from the first range of the plurality of user identification values to a first user based on the first minimum and maximum user identification values. Another step includes determining a second user identification value from the first range of the plurality of user identification values by incrementing the first user identification value based on the first minimum and maximum identification values. Yet another step includes assigning the second user identification value to a second user.