Patent classifications
H04L29/06
METHOD AND SYSTEM FOR EFFICIENT MANAGEMENT OF A COMMUNICATION SYSTEM
A method that incorporates the subject disclosure may include, for example, identifying, by a network device comprising a processor, a bearer path through a communication network for carrying internet protocol packets associated with a calling session between a first mobile device and a second mobile device and activating, by the network device, a bridging bearer path at a nearest network element to generate a direct tunnel for carrying the internet protocol packets associated with the calling session and to modify the bearer path to a shortest bearer path, where the nearest network element comprises a network element that is communicatively coupled to both the first mobile device and the second mobile device and that is closest to the first mobile device and the second mobile device. Other embodiments are disclosed.
PROVIDING CELLULAR-SPECIFIC TRANSPORT LAYER SERVICE BY WAY OF CELL-SITE PROXYING IN A NETWORK ENVIRONMENT
A method is provided in one example embodiment and includes receiving a first request from a first user equipment by a first transport layer proxy located within an access network The first request includes a request to establish a user session between the first user equipment and a remote server. The method further includes establishing a first transport layer session between the first user equipment and the first transport layer proxy, establishing a second transport layer session between the first transport layer proxy and the remote server, and establishing a first control channel between the first transport layer proxy and a transport layer function manager within a core network. The method further includes sending session state parameters associated with the first transport layer session and the second transport layer session to the transport layer function manager using the first control channel.
System and Method for Automatically Selecting Images to Accompany Text
A system for selecting an image to accompany text from a user in connection with a social media post. The system is capable of receiving text from the user, identifying one or more search terms based on the text, identifying candidate images from images in one or more image databases using the search terms, presenting one or more candidate images to the user, receiving from the user a selected image from the one or more candidate images, generating the social media post comprising the selected image and the user-submitted text, and transmitting the social media post for display.
SHARING CONTENT WITH PERMISSION CONTROL USING NEAR FIELD COMMUNICATION
A sending device receives a user input indicating that the user wishes to share and open item of content with a receiving device. A near field communication link is opened between the sending device and the receiving device. Metadata for sharing the open data is gathered on the sending device and a permission setting user interface display is displayed, with the user input mechanism that allows a user to set permissions corresponding to the open item. User actuation of the permission setting user input mechanism is received, the permissions are added to the open item, and the metadata is sent to the receiving device over the near field communication link. The metadata includes a location of the open item. The open item can then be accessed by the receiving device, with the permissions applied to the open item.
REMOTELY CONTROLLED MESSAGE QUEUE
Embodiments are directed to a computer system for managing data transfer. The computer system includes a memory, a processor communicatively coupled to the memory, a send component and a receive component having a message queue and a controller. A link interface communicatively couples the send component to the receive component. The link interface includes a mainline channel and a sideband channel, and the computer system is configured to perform a method. The method includes transmitting mainline channel messages over the mainline channel from the send component to the receive component. The method further includes transmitting sideband channel messages over the sideband channel from the send component to the message queue of the receive component. The method further includes utilizing the controller to control a flow of the sideband channel messages to the message queue without relying on sending feedback to the send component about the flow.
SECURE TRANSFER AND USE OF SECRET MATERIAL IN A SHARED ENVIRONMENT
Aspects related to the secure transfer and use of secret material are described. In one embodiment, an encrypted secret key and encrypted revocation data are imported into a trusted execution environment and decrypted with private provider and vendor keys. In this manner, a provider of cryptographic processes is not exposed to the secret key or revocation data of a customer, as the secret key and revocation data are decrypted and stored within the trusted execution environment but not accessed in an unencrypted form. In turn, the provider can receive various instructions to perform cryptographic operations on behalf of the customer. Based on the outcome of a revocation check using the revocation data, the instructions can be performed by the trusted execution environment.
METHOD FOR AUTHENTICATION AND ASSURING COMPLIANCE OF DEVICES ACCESSING EXTERNAL SERVICES
Systems and methods are described for determining whether an electronic computing device complies with the security policy for a network. The invention includes receiving an electronic request signal including an electronically encoded request to allow an electronically encoded process operating on an electronic processor of the electronic computer device to establish electronic communication with a specific target electronic device or service operating on the electronic communications and data network; receiving electronically encoded information about the identity of the electronically encoded process, the electronic computing device, or the use of the electronic computing device; receiving electronically encoded policy elements for the security policy; receiving electronically encoded information about the compliance of the electronic computing device; receiving electronically encoded information related to the identity of the principal of the electronic computing device; and determining whether the electronic computing device complies with the security policy.
PRESENTATION OF COMPUTING ENVIRONMENT ON MULTIPLE DEVICES
A user may interact with a collection of devices that each exhibit particular device properties. Where each device executes and presents an isolated computing environment, inconsistencies may arise in the user interaction by the user with different devices. Alternatively, a terminal server may present a computing environment to various auxiliary devices, but such presentation may fail to utilize some device properties of some devices, and/or may present a computing environment that is not suitable for some devices. Instead, a primary device of the device collection may adapt a primary computing environment to an auxiliary computing environment for each auxiliary device, based upon its device properties. Upon receiving a request to execute an application, the primary device may execute the application within the auxiliary computing environment, and may adapt the application based upon the device properties. The primary device may stream each auxiliary computing environment to the respective auxiliary device.
SYSTEMS AND METHODS FOR SHORT RANGE WIRELESS DATA TRANSFER
Systems and methods for application level authentication are provided for use with the low energy Bluetooth device and accessory. This includes receiving accessory credentials from a server, establishing a Bluetooth low energy connection with the accessory, authenticating with the accessory, and lastly transferring data to the accessory. The transferring of the data may be either a bulk transfer, or a data stream. The authenticating may be an application layer authentication between a device and the accessory using a shared secret key and using a hash function. Additional embodiments include methods for over-the-air firmware updates, and device control of a low energy Bluetooth accessory.
METHOD AND APPARATUS FOR MANAGING THE DISPLAY OF MESSAGES OF A GROUP CHAT
A method includes: upon opening a target communication window, displaying a first subset of communication items target communication window, without concurrently displaying a second and a third subset of communication items in the target communication window, wherein: the first, second, and third subsets of communication items have been received after last closure of the target communication window, and the first subset is received after the second subset, and the second subset is received after the third subset; in response to receiving a second user request to display earlier received communication items and in accordance with a determination that the second user request meets predefined list rollback criteria: ceasing to display the first subset of communication items in the target communication window; and displaying the third subset of communication items in the target communication window, without first displaying the second subset of communication items in the target communication window.