H04W12/069

System for data routing in networks

Systems, methods, and devices for routing data in a network are described. A user device may send a request for video data that has been captured by a premises device. A computing device at the premises may receive the request and determine a capability of the user device. Based on the capability of the user device, the computing device may select a protocol from a plurality of protocols with which the video data is to be transmitted to the user device. Based on determining that the video data cannot be transmitted via the computing device, the video data may be transmitted from the premises device to the user device via the determined protocol.

System for data routing in networks

Systems, methods, and devices for routing data in a network are described. A user device may send a request for video data that has been captured by a premises device. A computing device at the premises may receive the request and determine a capability of the user device. Based on the capability of the user device, the computing device may select a protocol from a plurality of protocols with which the video data is to be transmitted to the user device. Based on determining that the video data cannot be transmitted via the computing device, the video data may be transmitted from the premises device to the user device via the determined protocol.

Agile node isolation through using packet level non-repudiation for mobile networks
11706624 · 2023-07-18 ·

Apparatus, systems and methods for agile network isolation through use of packet level non-repudiation (PLNR) are provided. Using a fast cryptography to verify that incoming packets are undeniably being received from the identified source, real-time attack notifications can be independently verified and shared among the network devices to remove compromised nodes from the network. The ability to collaborate among nodes without trust may be achieved via PLNR, to share attack notifications in real-time may be achieved via Telling Attack Layer (TATL), and to establish the identity of an attack in a permanent and binding way may be achieved via DISCOvery (DISCO).

Agile node isolation through using packet level non-repudiation for mobile networks
11706624 · 2023-07-18 ·

Apparatus, systems and methods for agile network isolation through use of packet level non-repudiation (PLNR) are provided. Using a fast cryptography to verify that incoming packets are undeniably being received from the identified source, real-time attack notifications can be independently verified and shared among the network devices to remove compromised nodes from the network. The ability to collaborate among nodes without trust may be achieved via PLNR, to share attack notifications in real-time may be achieved via Telling Attack Layer (TATL), and to establish the identity of an attack in a permanent and binding way may be achieved via DISCOvery (DISCO).

Modify voice calls with a moving driver to reduce distractions
20180007554 · 2018-01-04 ·

A system for reducing traffic accidents caused by distraction from a mobile telecom device. The system detects when the device is near a driver's seat of a moving vehicle. While the system is carrying a voice call between a remote voice device and the mobile device, the system modifies voice signal transmission between the devices by periodically playing a beep or other signal to remind the parties that one of them is driving and suspends voice signal transmission from the remote device to the mobile device when the system detects that circumstances affecting level of attention required for driving merit the driver paying greater attention.

OBTAINING OF ACCESS RIGHTS TO A NETWORK, IMPLEMENTED BY A COMMUNICATING OBJECT
20180007542 · 2018-01-04 ·

A method performed by a communicating object to obtain rights to access a communications network. The object initially has rights limited to exchanging data with a rights management platform of the network. The method includes: sending a signaling message to the platform; and receiving a communications profile specific to the network. The profile is associated in the network with rights specific to the object, referred to as “delegated” rights. The delegated rights are defined on the basis of network access rights associated with a user of the object and referred to as “initial” rights. The delegated rights are suitable for enabling the communicating object to access the communications network.

SYSTEMS AND METHODS FOR SHORT RANGE WIRELESS DATA TRANSFER
20180004500 · 2018-01-04 · ·

Systems and methods for application level authentication are provided for use with the low energy Bluetooth device and accessory. This includes receiving accessory credentials from a server, establishing a Bluetooth low energy connection with the accessory, authenticating with the accessory, and lastly transferring data to the accessory. The transferring of the data may be either a bulk transfer, or a data stream. The authenticating may be an application layer authentication between a device and the accessory using a shared secret key and using a hash function. Additional embodiments include methods for over-the-air firmware updates, and device control of a low energy Bluetooth accessory.

VIRTUAL SMART CARDS WITH AUDIT CAPABILITY
20180007039 · 2018-01-04 ·

Virtual smart card system includes a virtual smart card server (VSS) which controls access to content respectively associated with a plurality of virtual smart cards. A remote client computer system includes a system level agent which establishes the client computer machine to the VSS as a trusted computer system. A user level agent at the client computer system responds to a request for a virtual smart card operation by causing the client computer system to obtain user authentication information, negotiate with the system level agent to obtain a cookie, and initiate a request to the VSS for the virtual smart card operation. The VSS will perform the virtual smart card operation provided that a security policy is satisfied and will communicate the results to the user level agent.

MOBILE COMMUNICATIONS TRANSMISSION SYSTEM FOR PROVIDING A MULTIPLICITY OF MOBILE COMMUNICATIONS CELLS IN A BUILDING OR CAMPUS

A mobile communications transmission system provides a plurality of mobile communications cells in a building or campus. It comprises a first baseband unit and a first gateway device, which is connectable to a data network. At least one transceiver unit is connected to the first baseband unit. The at least one transceiver unit is configured to provide at least one first mobile communications cell. By way of this first mobile communications cell, a subscriber device in the building can exchange information with the data network. A first control device is connected to the first baseband unit and the first gateway device. The first baseband unit and the first gateway device are installed in the building or campus in which the at least one transceiver unit provides the at least one first mobile communications cell, whereas the first control device is accommodated remote therefrom at an operating company.

CORE NETWORK CONNECTIONLESS SMALL DATA TRANSFER
20180007557 · 2018-01-04 ·

Connectionless data transfer is disclosed. Authentication of a device and network node may be performed when data is sent from the device to an application server of an application service provider via a selected network. The transfer of data may take place in an absence of an existing device context between the network node interacting with the device and the core network through which the data travels. State management overhead and signaling overhead may be reduced by use of the exemplary aspects disclosed herein. For example, the device does not need to perform an authentication and key agreement (AKA) procedure to transfer the data and an existing (or pre-existing) device context need not be maintained at the core network.