Patent classifications
H04L29/06
METHOD AND APPARATUS FOR SHARING PRESENTATION DATA AND ANNOTATION
A method and apparatus for sharing presentation data, interactions, and annotation information between devices. The method includes: converting the presentation data into at least one image; transmitting the at least one image to the second device; displaying an image from among the at least one image on a screen of the first device, and transmitting image identification information about the displayed image to the second device; adding annotation data to the displayed image, based on a user input; and transmitting annotation information about the annotation data to the second device. The second device displays an image corresponding to the image identification information on a screen of the second device based on the image identification information, and the second device displays the annotation information on the image displayed on the screen of the second device the annotation information.
System and Method for Secure Machine-To-Machine Communications
Embodiments of the present invention include a method for providing a secure domain name system (DNS) for machine to machine communications. In one embodiment, the method includes storing policy information for machine to machine communications in a global DNS registry database server. The method further includes communicating the policy information for machine to machine communications from the global DNS registry database server to a machine DNS registry server located in an Internet service provider (ISP) network, wherein a control signaling gateway located in the ISP network is configured to utilize the policy information for machine to machine communications to allow only registered controllers associated with a machine to communicate with the machine.
METHODS, APPARATUSES & COMPUTER PROGRAM PRODUCTS FOR UTILIZING VISUAL AUTHENTICATION TOKENS AS CROSS-PLATFORM CREDENTIALS
An apparatus is provided for facilitating cross-platform authentication. The apparatus may include at least one memory and at least one processor configured to detect that a visual token includes data indicating one or more authentication credentials for accessing a communication device in response to scanning the visual token. The computer program code may further cause the apparatus to communicate the authentication credentials of the detected visual token to the communication device to request the communication device to determine whether the authentication credentials are valid for a user. The computer program code may further cause the apparatus to enable access to the communication device in response to receiving an indication from the communication device that the authentication credentials of the detected visual token are valid. Corresponding computer program products and methods are also provided.
MEDIA STREAM FROM SENDER SEEN ON RECEIVER SIDE BEFORE CONFIRMING RECEIPT OF MEDIA STREAM
The present disclosure relates to electronic communication devices, and more specifically to streaming media between the electronic communication devices. The present disclosure relates to a method for setting up a media stream connection between a sending device 100, 110 and at least one receiving device 200, 210. The method comprises sending a session initiation message S10 to the at least one receiving device, sending a request S20 for a list of IP-addresses of the at least one receiving device and receiving S30 the list of IP-addresses from the at least one receiving device. The method further comprises setting up uni-directional or bi-directional connection between the sending device 100, 110 and the at least one receiving device 200, 210 by using the received list of IP-addresses and sending the media stream S50 via the uni-directional or bi-directional connection to the at least one receiving device.
METHOD AND APPARATUS FOR DELEGATING RESOURCES BETWEEN DEVICES
A system performs operations including detecting a request to present a game application, receiving a resources identifier from a second communication device, determining from the resources identifier that the second communication device has one of a computing resource, a presentation resource, or both, selecting a configuration from a plurality of configurations according to an identity of the gaming application and the resources identifier, selecting according to the configuration at least one resource from one of the computing resource, the presentation resource, or both of the second communication device, and delegating processing by the first communication device of a portion of the gaming application according to the at least one resource of the second communication device.
System and Method for Tunneling of Management Traffic
A method of tunneling management traffic includes receiving at a managed system a control feature from a proxy-managed system that is connected to the managed system, determining that the proxy-managed system is not visible to a management system, providing the control feature to the management system in response to determining that the proxy-managed system is not visible, receiving a modification to the control feature from the management system, and providing, from the managed system, the modification to the control feature to the proxy-managed system in response to receiving the modification to the control feature from the management system.
METHOD OF MANAGING SHARED FILES AND DEVICE FOR AUTHENTICATING SUBSCRIBER BY USING SAME
A method of managing a file of a subscriber authenticating module embedded in a terminal device and a module for authenticating a subscriber by using the method. The method of managing the file includes configuring a file structure for one or more profiles and managing one or more files included in the file structure in response to a request. Thus, the method is efficient for a multiple-profile environment.
Playback Device Media Item Replacement
Embodiments are provided for replacing media items in a queue of a playback device. An example implementation involves receiving, at the playback device, first data indicating an addition of a first media item to a queue. The playback device determines that the first media item is no longer accessible to the playback device at a later second time. The playback device initiates a query for a media item similar to the first media item and receives second data indicating that a second media item has replaced the first media item in the queue, the second media item being similar to the first media item. In response, the playback device initiates playback of the second media item on the playback device.
DISTRIBUTED CLIENT-SIDE USER MONITORING AND ATTACK SYSTEM
Methods, systems, and apparatus for use in a distributed client-side user monitoring and attack system are disclosed herein. An example method includes providing a first set of instructions from a security application server to a target application server, the first set of instructions to, when executed, cause a client device to transmit a request for an image to the security application server. In response to the request for the image, a connection is opened between the client device and the security application server. Via the connection opened in response to the request for the image, a second set of instructions is provided to cause the client device to perform a vulnerability test on the target application server and communicate a result of the vulnerability test via the connection.
REGISTRATION OF SIP-BASED COMMUNICATIONS IN A HOSTED VOIP NETWORK
Aspects of the present disclosure involve systems, methods, computer program products, and the like, for implementing a registrar component or functionality in a telecommunications network. In one implementation, the registrar functionality is handled at a Session Border Controller (SBC) or Network Address Translation (NAT) Traversal Manager (NTM) device of the network to alleviate an application server of the network from performing the registration function.