Patent classifications
H04W12/64
Location-based control for conferencing systems
A system controller for use in a videoconferencing system having multiple videoconferencing rooms each including a videoconferencing codec, includes a communication interface in communication with a videoconferencing codec located in the same videoconferencing room as the system controller, a memory configured to store information about the videoconferencing room in which the system controller is located, and a processor configured to execute computer-executable instructions stored in the memory to receive one or more commands transmitted by a mobile computing device in response to determining whether a videoconferencing room in which the system controller is located is within a defined proximity of the mobile computing device. The processor is configured to control, via the communication interface, the videoconferencing codec located in the same videoconferencing room as the system controller, according to the one or more commands to establish or control a videoconference in the same videoconferencing room.
Location-based control for conferencing systems
A system controller for use in a videoconferencing system having multiple videoconferencing rooms each including a videoconferencing codec, includes a communication interface in communication with a videoconferencing codec located in the same videoconferencing room as the system controller, a memory configured to store information about the videoconferencing room in which the system controller is located, and a processor configured to execute computer-executable instructions stored in the memory to receive one or more commands transmitted by a mobile computing device in response to determining whether a videoconferencing room in which the system controller is located is within a defined proximity of the mobile computing device. The processor is configured to control, via the communication interface, the videoconferencing codec located in the same videoconferencing room as the system controller, according to the one or more commands to establish or control a videoconference in the same videoconferencing room.
RESOURCE CONNECTIVITY FOR MULTIPLE DEVICES
Methods for improving resource connectivity for users' various computing devices are disclosed. An example method may include establishing a local connection with a sending device, receiving device status information and task status information from the sending device using the local connection, the task status information identifying at least one media content, and generating a user interface that includes a graphical representation of the device status information and a first control that, when selected, executes the at least one media content in an application on the receiving device. Another example method may include detecting an interaction with a UI element that sets a network sharing status to an on state, identifying a locally stored network as shareable, generating an instance of a network data type for the locally stored network, and associating the instance with the user account so that the locally stored network is shared with the user's other devices.
RESOURCE CONNECTIVITY FOR MULTIPLE DEVICES
Methods for improving resource connectivity for users' various computing devices are disclosed. An example method may include establishing a local connection with a sending device, receiving device status information and task status information from the sending device using the local connection, the task status information identifying at least one media content, and generating a user interface that includes a graphical representation of the device status information and a first control that, when selected, executes the at least one media content in an application on the receiving device. Another example method may include detecting an interaction with a UI element that sets a network sharing status to an on state, identifying a locally stored network as shareable, generating an instance of a network data type for the locally stored network, and associating the instance with the user account so that the locally stored network is shared with the user's other devices.
System and method for monitoring the security configurations of connected devices
A system and method for monitoring and modifying the security configurations of multiple devices is disclosed. The method includes monitoring multiple devices for security triggers and taking action in response to the triggers. The triggers include changes in security configurations, known security issues and pending updates. The devices may be any connected devices, including Internet of Things devices.
Method and system for relay attack prevention incorporating vector check
A method and system for detecting if a relay is present in a PEPS system for a vehicle is provided which includes (a) transmitting LF signals from antennas associated with a vehicle to a key fob using a 3D LF receiver to measure the LF signal level on the x, y and z-axes; (b) selecting two or more parallel antennas associated with the vehicle that are orthogonal to the antenna at the PEPS triggering location; (c) normalizing the x, y and z vectors that are measured by the key fob for the selected two or more parallel antennas associated with the vehicle; and (d) determining if the normalized x, y and z vectors for the selected two or more parallel antennas associated with the vehicle are within a predefined range.
Method and system for relay attack prevention incorporating vector check
A method and system for detecting if a relay is present in a PEPS system for a vehicle is provided which includes (a) transmitting LF signals from antennas associated with a vehicle to a key fob using a 3D LF receiver to measure the LF signal level on the x, y and z-axes; (b) selecting two or more parallel antennas associated with the vehicle that are orthogonal to the antenna at the PEPS triggering location; (c) normalizing the x, y and z vectors that are measured by the key fob for the selected two or more parallel antennas associated with the vehicle; and (d) determining if the normalized x, y and z vectors for the selected two or more parallel antennas associated with the vehicle are within a predefined range.
SYSTEMS AND METHODS FOR MANAGEMENT OF NON-FUNGIBLE TOKENS AND CORRESPONDING DIGITAL ASSETS
Systems and techniques are described for situational token-associated media output. A system receives sensor data captured by at least one sensor of a media device. The system identifies, based on the sensor data, a relationship between the media device and an anchor element that is associated with a token. The system identifies the token in a payload of at least one block of a distributed ledger. The token corresponds to media content according to the distributed ledger. The system generates a representation of the media content corresponding to the token. In response to identifying the relationship between the media device and the anchor element, the system outputs the representation of the media content.
UNMANNED AERIAL VEHICLE PRIVACY CONTROLS
Disclosed in this specification are methods, systems and apparatus, including computer programs encoded on non-transitory computer storage media for unmanned aerial vehicle (UAV) flight operation and privacy controls. Based on geofence types, and UAV distance from a geofence, sensors and other devices connected to a UAV are conditionally operational. Image data collected during a UAV flight may be obfuscated by the UAV while in flight, or via a post-flight process using log data generated by the UAV.
METHOD AND APPARATUS FOR PROVIDING A PRIVACY-PRESERVING YET TARGETED DELIVERY OF LOCATION-BASED CONTENT
An approach is provided for providing a privacy-preserving yet targeted delivery of location-based content. The approach involves, for example, initiating a first transmission of content consumer public key(s) associated with content consumer(s) to a content provider. The approach also involves, in response to the transmission, receiving encrypted content encrypted with the content consumer public key(s). The encrypted content is cryptographically signed with a content provider private key associated with the content provider. The approach further involves initiating a second transmission of the encrypted content to a consumer device. A content provider public key for decrypting the encrypted content is made available based on (1) the consumer device scanning the content provider public key at a location designated by the content provider, or (2) detecting that the consumer device is located within a threshold proximity of the location.