Patent classifications
H04L63/0492
Network cache of device input for redundancy during device inoperability
There are provided systems and methods for a network cache of device input for redundancy during device inoperability. A device may detect that the device is in danger of failure, for example, if a battery is low on the device, the device is damaged, or the device may lose network connectivity. On detection of such a condition, the device may request that a server that performs electronic transaction processing establish or trigger a mode that allows for caching of transaction data as input for the transaction data is entered to a device, which may be done by sending signaling to the server indicating the condition that affects the device's operability. The server may then cache input for the transaction data. If the device fails prior to approving and completing electronic transaction processing, the server may use the cached data to generate a digital ledger for another entity.
DEVICE AND METHOD FOR THE AUTHENTICATION OF A USER OF A MEDICAL DEVICE
A treatment system (100) for treating a patient comprises a medical device (10) and a portable authentication device (20), wherein the medical device (10) is adapted to output an acoustic signal when a wireless communication connection between the medical device (10) and the portable authentication device (20) is successfully established, the portable authentication device (20) is adapted to receive the acoustic signal, to generate, based on the received acoustic signal, a signal containing a signal corresponding to the received acoustic signal, and to wirelessly transmit the generated signal to the medical device (10), and the medical device (10) is adapted to determine whether or not the portable authentication device (20) is located at a position where acoustic communication between the medical device (10) and the portable authentication device (20) is possible, depending on whether or not it receives the signal containing the signal corresponding to the acoustic signal received by the portable authentication device (20).
Automatic multimedia upload for publishing data and multimedia content
Disclosed herein is a method and system for utilizing a digital data capture device in conjunction with a Bluetooth (BT) enabled mobile device for publishing data and multimedia content on one or more websites automatically or with minimal user intervention. A client application is provided on the BT enabled mobile device. In the absence of inbuilt BT capability, a BT communication device is provided on the digital data capture device. The BT communication device is paired with the BT enabled mobile device to establish a connection. The client application detects capture of data and multimedia content on the digital data capture device and initiates transfer of the captured data, multimedia content, and associated files. The digital data capture device transfers the captured data, multimedia content, and the associated files to the client application. The client application automatically publishes the transferred data and multimedia content on one or more websites.
Network connection method, mobile terminal, electronic device, and graphical user interface
The present disclosure provides a network connection method, a mobile terminal, and an electronic device. The method includes: sending a wireless signal, detecting the wireless signal and indicating that the electronic device is discovered by the electronic device; obtaining a network connection confirm operation and providing a notification to the electronic device by the mobile terminal; decreasing, by the electronic device, a signal transmit power; prompting a user to move closer to the electronic device, indicating a detected signal strength of the electronic device, and sending a wireless network key to the electronic device by the mobile terminal, when a preset condition is met in a process in which the mobile terminal moves closer to the electronic device; and increasing, by the electronic device, the signal transmit power, and connecting to a wireless network. This method and apparatus can be used for artificial intelligence, smart home, Internet of Things, etc.
Distributed monitoring sensor networks
Methods and systems for monitoring multiple sensors over a distributed sensor network to enhance various monitoring operations. In some implementations, an identification of a sensor located in a property and a token that enables the mobile device to obtain data from the sensor are each received by a mobile device from a server. The mobile device is then determined to be within a communication range with the server that is indicated by the identification from the server. In response, data is obtained from the sensor by the mobile device using the token received from the server.
Protection of private data using an enclave cluster
Systems and methods are disclosed for protecting data. An example method includes creating an outer cluster on one or more host machines coupled to a network. The outer cluster includes a plurality of outer nodes. The method also includes creating an enclave cluster on the outer cluster. The enclave cluster includes a plurality of inner nodes, and each inner node of the plurality of inner nodes executes within an enclave of the one or more host machines. The method further includes exposing an application programming interface (API) to the outer cluster, where invocation of the API causes at least one inner node of the enclave cluster to perform an operation on data. The method also includes performing, by an inner node of the enclave cluster, the operation on the data in response to invocation of the API by an outer node of the outer cluster.
SYSTEMS AND METHODS FOR IMPLEMENTING A PROXIMITY LOCK USING BLUETOOTH LOW ENERGY
Systems and methods for implementing a proximity lock using Bluetooth Low Energy are disclosed. According to one embodiment, a Bluetooth low energy proximity lock system may include a host electronic device comprising a computer processor; a peripheral electronic device interfacing with the host electronic device that may include a controller and a first Bluetooth low energy component; and a user device comprising a second Bluetooth low energy component. The controller may, using the first Bluetooth low energy component, identify the second Bluetooth low energy component, determine a radio signal strength between the first Bluetooth radio component and the second Bluetooth low energy component; and generate a command that renders the host electronic device temporarily inoperable in response to the radio signal strength being below a predetermined threshold.
METHODS, MEDIUMS, AND SYSTEMS FOR ACCESSING ANALYTICAL CHEMISTRY SYSTEMS
Exemplary embodiments provides computer-implemented methods, mediums, and apparatuses configured to perform a secure log in and log out of an analytical chemistry system. In one embodiment, a kiosk associated with the analytical chemistry system may receive a request for access on behalf of a user. The analytical chemistry system may be associated with an audit record storing information about an analytical workflow for processing a sample. The user may obtain a security token by logging into a credentialing application. Upon successfully logging in the user's device may be provided with the security token, which may then be exchanged between the kiosk and a mobile device associated with the user. The security token may be validated, and the user may be permitted access to the analytical chemistry system. The audit record may be updated to include a login action that includes an identity of the user.
DRM protected video streaming on game console with secret-less application
Techniques are disclosed for secure playback of protected multimedia content on a game console using a secret-less application. An SSO model can be used for client authentication at a key server, which eliminates the need of storing or using any secret information in the client application. Further, an encrypted content key generated by a content packager using a public key can be deployed in the key URI of a playlist file, which is sent to the key server. The key server can be configured to decrypt the content key using a corresponding private key. Further, the content key and unencrypted samples are protected in the game console client application from debugging and replay attacks by using additional security checks at both the client and key server. By storing secret information remotely from the game console and using the SSO model, DRM policies can be enforced on an untrusted client application.
REMOTE FIREWALL UPDATE FOR ON-BOARD WEB SERVER TELEMATICS SYSTEM
A mobile device includes a processor, a transceiver, and a storage maintaining vehicle associations including phone numbers of telematics control units of vehicles. The device is programmed to identify a change in network address of the transceiver; encrypt the changed network address; and send the encrypted network address to the telematics control units using short message service messages addressed to the phone numbers of the telematics control units. A vehicle includes a storage including paired device data having phone numbers and network addresses of mobile devices and a telematics control unit including a firewall and web server. The firewall is programmed to, in response to receipt of a message from one of the phone numbers including a network address of the mobile device, update the storage to indicate the network address as an originating address authorized to use the web server.