Patent classifications
H04W12/065
SYSTEM AND METHOD FOR USING PORTAL SYSTEMS IN AUGMENTED REALITY VIRTUAL ENVIRONMENTS
An orthogonal or multi-dimensional fabric user interface is described herein. A remote server executes an operating system that provides a multi-dimensional fabric user interface for storing content for a particular user. The user can access select content by manipulating the multi-dimensional fabric user interface through a graphical user interface displayed on a personal mobile computing device. In this way, the user experiences and manipulates various data dimensions around the specific content they are accessing, rather than selecting a particular file structure location. The remote server also enables the user to enter a first location side of a portal and travel to a virtual representation a second actual physical location in the multi-dimensional fabric user interface from a virtual representation of a first actual physical location in the multi-dimensional fabric user interface.
METHODS AND APPARATUS FOR CONTROLLING PERMISSIONS OF A UE FOR ACCESSING A NETWORK
Methods and systems for controlling permissions of a UE for accessing a network. A method disclosed herein includes initiating, by a User Equipment (UE), a registration procedure with a serving network for accessing a selected network, wherein the selected network includes one of at least one CAG cell of an NPN and a VPLMN. The registration procedure indicates a network selection mode using which the UE has selected the network and the network selection mode includes one of an automatic mode and a manual mode. The method further incudes determining, by the serving network, a reject mode for rejecting the registration request of the UE based on the network selection mode indicated in the registration request, when the permissions of the UE to access the selected network have not been verified, wherein the reject mode includes a protected reject mode and an unprotected reject mode.
METHODS AND APPARATUS FOR CONTROLLING PERMISSIONS OF A UE FOR ACCESSING A NETWORK
Methods and systems for controlling permissions of a UE for accessing a network. A method disclosed herein includes initiating, by a User Equipment (UE), a registration procedure with a serving network for accessing a selected network, wherein the selected network includes one of at least one CAG cell of an NPN and a VPLMN. The registration procedure indicates a network selection mode using which the UE has selected the network and the network selection mode includes one of an automatic mode and a manual mode. The method further incudes determining, by the serving network, a reject mode for rejecting the registration request of the UE based on the network selection mode indicated in the registration request, when the permissions of the UE to access the selected network have not been verified, wherein the reject mode includes a protected reject mode and an unprotected reject mode.
WIRELESS COMMUNICATION METHOD, TERMINAL DEVICE AND NETWORK ELEMENT
The embodiments of the present application provide a wireless communication method, a terminal device and a network element. Said method comprises: determining a first target mode corresponding to a first operation, the first operation comprising at least one of authorization, authentication, re-authorization or re-authentication; and sending, on the basis of the first target mode, information for performing the first operation. In the embodiments of the present application, a first target mode corresponding to a first operation is determined, so that a terminal device can send, on the basis of the first target mode, information for performing the first operation.
System and method for access control using network verification
A system for controlling access includes a computing device, configured to: determine a first identifier associated with a first access point being used by the computing device to access a network; determine first access control data associated with the first identifier and a first application executing on the computing device; and control access to data over the network by the first application based on the first access control data.
System and method for access control using network verification
A system for controlling access includes a computing device, configured to: determine a first identifier associated with a first access point being used by the computing device to access a network; determine first access control data associated with the first identifier and a first application executing on the computing device; and control access to data over the network by the first application based on the first access control data.
SYSTEM AND METHOD FOR PATIENT COMMUNICATION
A system and method for securing authenticated patient communication through a device that is able to trigger a patient related event through a simple online communication process. The trigger(s) determined by the device are preferably controlled through a separate application, which may be controlled through a medical user computational device and/or a server. The separate application sets the one or more triggers accessible to the device and also determines one or more conditions for activating the one or more triggers. Upon detection of one or more conditions by the device, one or more triggers are activated. The medical user computational device receives a notification of the activation of the trigger. The medical user computational device may modify the trigger, the activation of the trigger or the one or more downstream actions which occur upon activation of the trigger. Such modification may occur before activation of the trigger or after activation of the trigger. The trigger causes a patient related action to be taken, for example to call the patient back on a separate telephonic device. Preferably the device features a plurality of buttons or other simple, easy to use initiators. Each initiator preferably activates a trigger.
Using Continuous Biometric Information Monitoring For Security
Measurements of biometric information of a user are obtained over time, such as blood glucose measurements. These biometric measurements are typically obtained by a wearable biometric information monitoring device being worn by the user. These biometric measurements are used by various different systems, such as a computing device of the user or a biometric information monitoring platform that receives biometric measurements from multiple different users. The biometric measurements are used for various security aspects, such as one or more of part of multi-factor authentication of the user, generating security keys (e.g., connection keys, encryption keys), identifying biometric measurements associated with different user identifiers but the same use, and protecting biometric measurements so as to be retrievable only by a recipient associated with an additional computing device, and so forth.
SHORT-RANGE DEVICE COMMUNICATIONS FOR SECURED RESOURCE ACCESS
Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.
SHORT-RANGE DEVICE COMMUNICATIONS FOR SECURED RESOURCE ACCESS
Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.