Patent classifications
H04W12/79
Virtual sensing via sensor sharing for C-V2X scheduling
A configuration for virtual sensing via sensor sharing for C-V2X scheduling. The apparatus receives, from a first wireless device, a message indicating a threat entity within a threat zone. The threat entity transmits data that interferes with transmission of BSMs. The apparatus determines a candidate resource of a set of candidate resources on which to transmit a BSM based at least in part on the message indicating information related to the threat entity from the first wireless device. The apparatus transmits, to at least a third wireless device, the BSM on a determined candidate resource.
Systems and methods for digital identity verification
Systems and methods for digital identity verification are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for digital identify verification may include: (1) receiving, from a user electronic device or at a website, an image of an identity document for a user, the identity document comprising an image of the user; (2) processing the identity document with at least one business-specific rule; (3) extracting identity information from the identity document; (4) determining a match rate of the image of the user on the identity document to a captured image; (5) assigning a verification score to the user based on extracted identity information and the match rate; and (6) publishing the verification score to at least one system.
Location-based control for conferencing systems
A system controller for use in a videoconferencing system having multiple videoconferencing rooms each including a videoconferencing codec, includes a communication interface in communication with a videoconferencing codec located in the same videoconferencing room as the system controller, a memory configured to store information about the videoconferencing room in which the system controller is located, and a processor configured to execute computer-executable instructions stored in the memory to receive one or more commands transmitted by a mobile computing device in response to determining whether a videoconferencing room in which the system controller is located is within a defined proximity of the mobile computing device. The processor is configured to control, via the communication interface, the videoconferencing codec located in the same videoconferencing room as the system controller, according to the one or more commands to establish or control a videoconference in the same videoconferencing room.
DATA TRANSMISSION METHOD AND DEVICE
The present disclosure provides a data transmission method applied to a first node. The method includes sending a first request for transferring a data transmission to a management node, the first request being generated based on to-be-transmitted data; receiving physical layer information sent by the management node in response to the first request, and obtaining an authority to perform the data transmission with a second node, the physical layer information being used to establish a connection with the second node; and transmitting the to-be-transmitted data to the second node based on the authority.
FALSE BASE STATION DETECTION
A user equipment (“UE”) in a wireless communication network can receive a plurality of signals from a plurality of nodes. The UE can further determine a plurality of radio signal strength measurements. Each radio signal strength measurement can be associated with a signal of the plurality of signals received from the plurality of nodes. The UE can further determine whether there is an indication that a first node of the plurality of nodes may be an imposter node based on the plurality of radio signal strength measurements.
VIRTUAL SENSING VIA SENSOR SHARING FOR C-V2X SCHEDULING
A configuration for virtual sensing via sensor sharing for C-V2X scheduling. The apparatus receives, from a first wireless device, a message indicating a threat entity within a threat zone. The threat entity transmits data that interferes with transmission of BSMs. The apparatus determines a candidate resource of a set of candidate resources on which to transmit a BSM based at least in part on the message indicating information related to the threat entity from the first wireless device. The apparatus transmits, to at least a third wireless device, the BSM on a determined candidate resource.
Smoothing-technology-based physical layer blind authentication method and system for time-varying fading channel
Provided is a physical layer blind authentication method for a time-varying fading channel based on a smoothing technique. The method includes that: a transmitter transmits a carrier signal to a wireless channel, the carrier signal includes an authentication signal, a pilot signal and an information signal, and the wireless channel is the time-varying fading channel; a receiver receives the carrier signal, and performs BKIC processing and differential signal processing on the carrier signal to obtain a target authentication signal, performs the differential signal processing on the reference signal to obtain a reference authentication signal, and calculates a correlation between the target authentication signal and the reference authentication signal to obtain a test statistic; and compares the test statistic with a prescribed threshold to determine whether the carrier signal is capable of passing authentication.
System and method employing virtual ledger
A system, method and computer program product for computer based open innovation, includes an asset valuation device receiving asset information regarding one or more tangible or non-tangible assets, and generating a valuation signal, based on the asset information; a self-executing code device receiving the valuation signal, and generating a self-executing code signal, based on the valuation signal; an air router device having both a low band radio channel, and an internet router channel for redundant internet communications, and a malicious code removal device for scrubbing malicious code from data received, receiving the valuation signal, and generating a node voting request signal, based on the valuation signal; and a mesh network having a plurality of node devices receiving the node voting request signal, and generating vote confirmation signals, based on the node voting request signal.
System and method employing virtual ledger
A system, method and computer program product for computer based open innovation, includes an asset valuation device receiving asset information regarding one or more tangible or non-tangible assets, and generating a valuation signal, based on the asset information; a self-executing code device receiving the valuation signal, and generating a self-executing code signal, based on the valuation signal; an air router device having both a low band radio channel, and an internet router channel for redundant internet communications, and a malicious code removal device for scrubbing malicious code from data received, receiving the valuation signal, and generating a node voting request signal, based on the valuation signal; and a mesh network having a plurality of node devices receiving the node voting request signal, and generating vote confirmation signals, based on the node voting request signal.
Systems and methods for device fingerprinting
Systems and methods to reverse-predict a MAC address associated with a computing device are described. In one embodiment, first temporal communication data associated with the computing device is accessed for a first time interval. The first temporal communication data is converted into a first image. Second temporal communication data associated with the computing device is accessed for a second time interval. The second temporal communication data is converted into a second image. An image ensemble including the first image and the second image is analyzed using a neural network. Each image in the image ensemble is converted from temporal communication data associated with the computing device. The neural network learns a temporal pattern associated with the image ensemble. Current temporal communication data associated with the computing device is accessed and converted into a current image. The current image is compared with the temporal pattern. A MAC address associated with the computing device is reverse-predicted responsive to the comparison.