H04L29/06

WIRELESS ACCESS AUTHENTICATION
20180007551 · 2018-01-04 ·

Examples relate to a method and a device for wireless access authentication. The method is applied to an intelligent gateway which is previously associated with account information of a user. The intelligent gateway may receive an access authentication packet comprising an authentication identification indicating a terminal device; the intelligent gateway may construct an identity verification packet comprising an authentication identification indicating the terminal device and an association account identification indicating an account registered on the intelligent gateway; the intelligent gateway may send the identity verification packet to a cloud server; the intelligent gateway may permit a terminal device corresponding to authentication identification carried in a verification success packet returned by the cloud server to pass the access authentication.

SYSTEM PERFORMANCE LOGGING OF COMPLEX REMOTE QUERY PROCESSOR QUERY OPERATIONS

Described are methods, systems and computer readable media for performance logging of complex query operations.

METHODS AND ELECTRONIC DEVICES FOR DYNAMIC CONTROL OF PLAYLISTS
20180004480 · 2018-01-04 ·

This disclosure concerns the playback of audio content, e.g. in the form of music. More particularly, the disclosure concerns the playback of streamed audio. In one example embodiment, there is a method of operating an electronic device for dynamically controlling a playlist including one or several audio items. A request to adjust an energy level (e.g. a tempo) associated with the playlist is received. In response to receiving this request, the playlist is adjusted in accordance with the requested energy level (e.g., the tempo).

SELECTIVE VERIFICATION OF SIGNATURES BY NETWORK NODES
20180007063 · 2018-01-04 ·

A network node may include one or more processors. The one or more processors may receive a message that is associated with one or more signatures and one or more second signatures. The one or more signatures may have been validated by a particular node. The one or more processors may determine that the particular node is a trusted node. The network node may be configured not to validate signatures that have been validated by a trusted node. The one or more processors may determine that the one or more signatures have been validated by the particular node. The one or more processors may sign or provide the message, without validating the one or more signatures, based on determining that the one or more signatures have been validated by the particular node.

DISTRIBUTED MEDIA CLASSIFICATION ALGORITHM IN A SERVICE CONTROLLER PLATFORM FOR ENHANCED SCALABILITY
20180007111 · 2018-01-04 ·

A network system and the method is described that splits media identification logic and media classification and/or general data session processing/management logic into separate controllers (e.g., between the local controllers and a service controller). By separating media identification logic and media classification logic (or general media processing/management logic), the system and method allows for greater flexibility and scalability in a network system employing a service controller. In particular, by allowing the local controllers to perform media identification and to construct a single packet that characterizes/describes a media session, the system avoids the need to transmit multiple data packets of a media session to the service controller for classification of the session. Accordingly, the system includes the flexibility a service controller provides while allowing for greater scalability by separating media identification logic and media classification respectively between a local controller and the service controller.

Data Processing Method and Apparatus for Performing Protocol Parsing in a Cloud

The present application discloses a data processing method and apparatus for performing protocol parsing in the cloud. A specific implementation of the method includes: acquiring a slave station data reading rule table that is configured by a user in the cloud; downloading the slave station data reading rule table to a gateway in a slave station; receiving slave station data that is associated with the slave station and that is read by the gateway according to the slave station data reading rule table; parsing the slave station data according to a parsing table in the cloud preset by the user; and processing the parsed slave station data. This implementation implements the processing of data of different communication protocols in the cloud.

SYSTEM AND METHOD FOR MANAGING CALLS
20180007190 · 2018-01-04 ·

A computer-implemented method for managing calls in a collaboration environment is provided. The method includes receiving, by a processor, a call into a collaboration session of the collaboration environment. The method also includes identifying, by the processor, a user from a plurality of users associated with the collaboration session, based on at least one of contextual information regarding the call and information regarding the plurality of users. The method further includes providing, by the processor, an interface on a device associated with the identified user, wherein the interface enables the identified user to instruct the device to handle the call within the collaboration session.

COMPUTER SECURITY ARCHITECTURE AND RELATED COMPUTING METHOD

A computer security architecture applies selected rules from among a set of rules defining one or more security policies to a given set of security context parameters to produce security verdicts, each representing whether a certain action requested by a subject entity is permissible. Each security policy is associated with a corresponding communication interface. A plurality of gateway engines are each associated with at least one of the subject entities and dedicated to interfacing with the security server. Each of the gateway engines carries out monitoring of requested actions by the associated subject entity and, for each requested action, identifies a security context. A security policy is determined for the requested action based on a corresponding security context, and a security verdict is obtained via a communication interface corresponding to the applicable security policy.

METHOD FOR KEY ROTATION
20180007025 · 2018-01-04 ·

A method for key rotation includes initiating key rotation for a user account of a multi-factor authentication platform enabling one-time password authentication using a first symmetric cryptographic key; generating, at an authenticating device, a second symmetric cryptographic key; transmitting, at the authenticating device, the second symmetric cryptographic key to the multi-factor authentication platform; configuring the multi-factor authentication platform and the authenticating device to disable authentication that uses the first symmetric cryptographic key; and configuring the multi-factor authentication platform and the authenticating device to enable authentication that uses the second symmetric cryptographic key.

METHOD AND APPARATUS FOR ENCRYPTING AND DECRYPTING PICTURE, AND DEVICE
20180007019 · 2018-01-04 ·

The present disclosure relates to the field of computer technologies and it discloses a method for encrypting a picture performed at a sending device, the method including: obtaining, by a sending device raw data of a to-be-encrypted picture, a first key, a second key, and location information that is used for adding disturbance data to the raw data; generating the disturbance data, and adding the disturbance data to the raw data according to the location information, to obtain first data; encrypting the first data by using the first key, to obtain the second data, and encrypting the first key and the length of the disturbance data by using the second key, to obtain first encrypted data; and sending the second data, the first encrypted data, and the second key to a receiving device.