H04L67/303

Method and apparatus for the activation of services

An approach is provided for presenting an activation indicator to a user. A connection with a mobile device is detected. Retrieval is caused, at least in part, of a unique hardware identifier associated with the mobile device. It is determined that the mobile device is eligible for a service based on the unique hardware identifier. Presentation is caused, at least in part, of a visual indicator of the eligibility for the service based on the determination.

Method and apparatus for the activation of services

An approach is provided for presenting an activation indicator to a user. A connection with a mobile device is detected. Retrieval is caused, at least in part, of a unique hardware identifier associated with the mobile device. It is determined that the mobile device is eligible for a service based on the unique hardware identifier. Presentation is caused, at least in part, of a visual indicator of the eligibility for the service based on the determination.

Beacon addressing

The present disclosure describes how a master beacon having a known UUID can be used to capture beacons within its range and superimpose a systematic address scheme on those beacons. The superimposed address scheme can then be used as a proxy for the individual beacons when developing applications that make use of the beacons. A master beacon automatically detects each beacon in a plurality of beacons and, for a set of beacons in the plurality of beacons, automatically changes either the first profile identifier or the second profile identifier for each beacon in the set of beacons. The change is such that the first profile identifier or the second profile identifier is identical for each beacon in the set of beacons and is also associated with the master beacon.

Beacon addressing

The present disclosure describes how a master beacon having a known UUID can be used to capture beacons within its range and superimpose a systematic address scheme on those beacons. The superimposed address scheme can then be used as a proxy for the individual beacons when developing applications that make use of the beacons. A master beacon automatically detects each beacon in a plurality of beacons and, for a set of beacons in the plurality of beacons, automatically changes either the first profile identifier or the second profile identifier for each beacon in the set of beacons. The change is such that the first profile identifier or the second profile identifier is identical for each beacon in the set of beacons and is also associated with the master beacon.

Server apparatus, user terminal apparatus, controlling method therefor, and electronic system

Disclosed is a server apparatus. The server apparatus comprises: a communication unit for communicating with a user terminal apparatus; a storage for storing compatible information between devices; and a processor for, if the user terminal apparatus accesses the server apparatus and identification information on the user terminal apparatus is received from the user terminal apparatus, generating recommended device information compatible with the user terminal apparatus on the basis of the information stored in the storage and transmitting the recommended device information to the user terminal apparatus.

Server apparatus, user terminal apparatus, controlling method therefor, and electronic system

Disclosed is a server apparatus. The server apparatus comprises: a communication unit for communicating with a user terminal apparatus; a storage for storing compatible information between devices; and a processor for, if the user terminal apparatus accesses the server apparatus and identification information on the user terminal apparatus is received from the user terminal apparatus, generating recommended device information compatible with the user terminal apparatus on the basis of the information stored in the storage and transmitting the recommended device information to the user terminal apparatus.

Private data sharing system
11637802 · 2023-04-25 ·

A novel architecture for a data sharing system (DSS) is disclosed and seeks to ensure the privacy and security of users' personal information. In this type of network, a user's personally identifiable information is stored and transmitted in an encrypted form, with few exceptions. The only key with which that encrypted data can be decrypted, and thus viewed, remains in the sole possession of the user and the user's friends/contacts within the system. This arrangement ensures that a user's personally identifiable information cannot be examined by anyone other than the user or his friends/contacts. This arrangement also makes it more difficult for the web site or service hosting the DSS to exploit its users' personally identifiable information. Such a system facilitates the encryption, storage, exchange and decryption of personal, confidential and/or proprietary data.

Private data sharing system
11637802 · 2023-04-25 ·

A novel architecture for a data sharing system (DSS) is disclosed and seeks to ensure the privacy and security of users' personal information. In this type of network, a user's personally identifiable information is stored and transmitted in an encrypted form, with few exceptions. The only key with which that encrypted data can be decrypted, and thus viewed, remains in the sole possession of the user and the user's friends/contacts within the system. This arrangement ensures that a user's personally identifiable information cannot be examined by anyone other than the user or his friends/contacts. This arrangement also makes it more difficult for the web site or service hosting the DSS to exploit its users' personally identifiable information. Such a system facilitates the encryption, storage, exchange and decryption of personal, confidential and/or proprietary data.

System, method, and computer program product for coordination among multiple devices

In various embodiments, a method, apparatus, and computer program product are provided involving, at a first device: opening the application on the first device, performing an action utilizing an application, updating a state of the application, for being communicated with the second device; and, at a second device: utilizing the updated state of the application received from the first device, displaying an interface including: a button for opening the application utilizing the second device, and indicia that indicates that the first device has updated at least one aspect of the application, and in response to a detection of the selection of the button, accessing the application utilizing the second device such that the application is accessed so as to reflect the updated state of the application.

Method for generating, sharing and enforcing network profiles for IoT devices

A method and system is provided for setting network policies based on electronic devices connected to a network. The electronic devices present on the network are detected and their behavior is captured using profiles. These profiles are then used to generate network policies based on the electronic devices connected to the network. Instead of reacting to behavior of the electronic devices (e.g., anomaly detection to detect malware), the method and system sets the network policies to prevent unauthorized communications (e.g., before malware is present in the system).