H04W84/10

PRINTING DEVICE, CONTROL METHOD OF A PRINTING DEVICE, AND STORAGE MEDIUM HAVING A WIRELESS COMMUNICATOR THAT IS PAIRED WITH AN EXTERNAL DEVICE
20220027112 · 2022-01-27 ·

A printing device has a print unit for printing on roll paper; a wireless communication unit for communicating wirelessly with a paired control device; and a controller for receiving print data by wireless communication from the control device, and controlling the print unit based on the received print data. When changing from a pairing-disabled mode to a pairing-enabled mode, the controller controls the print unit to print pairing-related information on roll paper, does not process pairing in the pairing-disabled mode, and processes pairing when a pairing request is received in the pairing-enabled mode.

System and Method for Improving Content Fetching by Selecting Tunnel Devices
20230327901 · 2023-10-12 ·

A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The tunnel device is selected based on an attribute, such as IP Geolocation. A tunnel bank server stores a list of available tunnels that may be used, associated with values of various attribute types. The tunnel devices initiate communication with the tunnel bank server, and stays connected to it, for allowing a communication session initiated by the tunnel bank server. Upon receiving a request from a client to a content and for specific attribute types and values, a tunnel is selected by the tunnel bank server, and is used as a tunnel for retrieving the required content from the web server, using standard protocol such as SOCKS, WebSocket or HTTP Proxy. The client only communicates with a super proxy server that manages the content fetching scheme.

System and Method for Improving Content Fetching by Selecting Tunnel Devices
20230327901 · 2023-10-12 ·

A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The tunnel device is selected based on an attribute, such as IP Geolocation. A tunnel bank server stores a list of available tunnels that may be used, associated with values of various attribute types. The tunnel devices initiate communication with the tunnel bank server, and stays connected to it, for allowing a communication session initiated by the tunnel bank server. Upon receiving a request from a client to a content and for specific attribute types and values, a tunnel is selected by the tunnel bank server, and is used as a tunnel for retrieving the required content from the web server, using standard protocol such as SOCKS, WebSocket or HTTP Proxy. The client only communicates with a super proxy server that manages the content fetching scheme.

INFORMATION PROCESSING DEVICE, MOBILE TERMINAL, AND INFORMATION PROCESSING METHOD
20230325807 · 2023-10-12 · ·

There is provided an information processing device, a mobile terminal, and an information processing method capable of executing information processing more reliably. Bluetooth Low Energy (BLE) is used to transmit a beacon that is a signal for detecting a mobile terminal within a communication range of the BLE. Ultra Wide Band (UWB) is used to perform ranging processing of measuring at least a distance from the mobile terminal detected using the beacon to a UWB gate unit provided with a fare calculation zone in which fare payment processing is performed with the mobile terminal. Then, when it is detected that the mobile terminal enters the fare calculation zone on the basis of a result of the ranging processing using UWB, data communication for payment using UWB is performed between the UWB gate unit and the mobile terminal. The present technology can be applied to, for example, a touchless fare payment system using BLE and UWB.

Prioritizing wireless access technologies in an enterprise fabric

An enterprise network may receive a WiFi packet associated with a 5G service (or other type of service) at an access point (AP) in the enterprise network. The enterprise network determines whether the WiFi packet satisfies a first-packet policy associated with the 5G service, where the first-packet policy controls access to a tunnel for traversing the enterprise network to reach the 5G service. If the packet satisfies the policy, the enterprise network queries a map server to identify a location of a 5G border in the enterprise network that is connected to the 5G service. The enterprise network can transmit the WiFi packet on the tunnel with priority to meet SLA using the location of the 5G border.

Mutual authentication system

A wireless communication system enables one-sided authentication of a responder device (120) by an initiator device (110) and mutual authentication of both devices. Embodiments of the initiator may have a message unit (116) and a state machine (117). The initiator starts by acquiring a responder public key via an out-of-band action and sends an authentication request. The responder sends an authentication response comprising responder authentication data based on a responder private key and a mutual progress status indicative of the mutual authentication being in progress for enabling the responder device to acquire an initiator public key via a responder out-of-band action. The initiator state machine is arranged to provide a mutual authenticating state, engaged upon receiving the mutual progress status, for awaiting mutual authentication. Thereby long time-out periods during wireless communication are avoided, while also enabling the initiator to report communication errors to the user within a short time.

System and method for monitoring proxy devices and selecting therefrom
11764987 · 2023-09-19 · ·

A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The tunnel device is selected based on an attribute, such as IP Geolocation. A tunnel bank server stores a list of available tunnels that may be used, associated with values of various attribute types. The tunnel devices initiate communication with the tunnel bank server, and stays connected to it, for allowing a communication session initiated by the tunnel bank server. Upon receiving a request from a client to a content and for specific attribute types and values, a tunnel is selected by the tunnel bank server, and is used as a tunnel for retrieving the required content from the web server, using standard protocol such as SOCKS, WebSocket or HTTP Proxy. The client only communicates with a super proxy server that manages the content fetching scheme.

System and method for monitoring proxy devices and selecting therefrom
11764987 · 2023-09-19 · ·

A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The tunnel device is selected based on an attribute, such as IP Geolocation. A tunnel bank server stores a list of available tunnels that may be used, associated with values of various attribute types. The tunnel devices initiate communication with the tunnel bank server, and stays connected to it, for allowing a communication session initiated by the tunnel bank server. Upon receiving a request from a client to a content and for specific attribute types and values, a tunnel is selected by the tunnel bank server, and is used as a tunnel for retrieving the required content from the web server, using standard protocol such as SOCKS, WebSocket or HTTP Proxy. The client only communicates with a super proxy server that manages the content fetching scheme.

SETTING SYSTEM AND SETTING METHOD FOR SETTING BASE STATION DEVICE

An OSS generates second identification information from first identification information, and generates setting information of a low power base station device based on the second identification information while reflecting position information. When verification of the first identification information is successful, the OSS transmits third identification information of a security GW and fourth identification information of an EMS to the low power base station device. The EMS receives a power on notification from the low power base station device via an IPsec tunnel established at the security GW. The OSS identifies the second identification information from the first identification information included in the power on notification, and writes the setting information identified from the second identification information to the low power base station device.

Local traffic offload function with overloaded S5 and SGI interface
11778449 · 2023-10-03 · ·

A system and method is disclosed for allowing a Third-Party (TP) User Equipment (UE) to use a base station/access point (BS/AP), such as a 4G eNodeB (eNB) or a 5G gNodeB (gNB) of a private network, such as an enterprise network to access components of a network core, such as an Evolved Packet Core (EPC) in the TP network while also having access to features provided by or through components of an EPC within the private network.