H04L29/06

MANAGEMENT OF MULTIPLE DEVICES WITHIN AN ANALYTE MONITORING ENVIRONMENT

Systems, devices, and methods are provided for the management of multiple sensor control devices and/or multiple reader devices in an in vivo analyte monitoring environment, and also for resolving conflicts when merging data collected by different reader devices.

RELAY DEVICE AND AIR CONDITIONING SYSTEM

A relay device communicably connects an upper-level air conditioning system and a lower-level air conditioning system that use different protocols. An upper-side communicator is connected to a first bus, and transmits and receives communication packets to and from the upper-level air conditioning system. A lower-side communicator is connected to an outdoor device that is a master device, and transmits and receives communication commands to and from the lower-level air conditioning system. An association information memory stores association information obtained by associating an address in the upper-level air conditioning system allocated to each device in the lower-level air conditioning system with identification information on each device in the lower-level air conditioning system. A processor performs a mutual conversion on the communication packets and the communication commands based on the association information stored in the association information memory.

AUTHENTICATION METHOD, DEVICE, SERVER, AND SYSTEM, AND STORAGE MEDIUM
20180006818 · 2018-01-04 ·

The present disclosure discloses an authentication method performed at a server, including: generating, based on a first account that is possessed by a user of a first device and that corresponds to a first application, corresponding token information; sending the token information to the first device to be shared by the first device with devices in a device group in a replication restriction manner; performing, based on the token information, authentication on a second device that is in the device group; granting permission of accessing the first account to the second device when the authentication succeeds; and triggering the first device to switch from a state of first account-based login to the first application to a state of suspending the login to the first application when it is determined that the second device logs in to the first application based on the permission of accessing the first account.

DATA ENCRYPTION AND DECRYPTION METHOD AND ENCRYPTION AND DECRYPTION DEVICE

An encryption method for data includes acquiring data to be encrypted and user information set relevant to the encryption, sending a key acquisition instruction to a terminal corresponding to the user information, receiving a key returned from the terminal corresponding to the user information, encrypting the data to be encrypted by using the key, and transmitting encrypted data to the terminal corresponding to the user information.

DISPLAYING THE ACCESSIBILITY OF HYPERLINKED FILES
20180007029 · 2018-01-04 ·

The accessibility of a hyperlinked files is displayed. A hyperlink that references a resource is extracted from a target file. An attempt to acquire the resource is made by performing a first authentication operation. A first object is received in response to performing the authentication operation. A second object is acquired by performing a second authentication operation using pre-determined authentication information. The first object and the second object are compared to determine if the first object is the same as the second object. Information indicating the accessibility of the resource is presented via a display apparatus.

METHOD AND SYSTEM FOR FACILITATING TERMINAL IDENTIFIERS
20180004852 · 2018-01-04 · ·

Embodiments of the present application disclose a method for providing a terminal identifier to a terminal. During operation, a security server receives a registration information set from the terminal, in which the registration information set includes multiple pieces of equipment information from the terminal. The security server then generates a terminal identifier based on the multiple pieces of equipment information in the registration information set. The security server then returns the terminal identifier to the terminal.

ANOMALY AND MALWARE DETECTION USING SIDE CHANNEL ANALYSIS

The present disclosure describes systems and methods for detecting malware. More particularly, the system includes a monitoring device that monitors side-channel activity of a target device. The monitoring device that can work in conjunction with (or independently of) a cloud-based security analytics engine to perform anomaly detection and classification on the side-channel activity. For example, the monitoring device can calculate a first set of features that are then transmitted to the security analytics engine for anomaly detection and classification.

MACHINE-TO-MACHINE PROTOCOL INDICATION AND NEGOTIATION

Network entities may indicate and negotiate one or more new protocols for communications using a current protocol.

Indications may include one or more protocols which are supported, one or more protocols which are preferred, and the level of desire of preferences. Indications may further include schedules of times during which certain protocols are supported and/or schedules of functions for which certain protocols are preferred. Indications may be evaluated and acted upon immediately or stored for future reference. Evaluation may include comparison of relative desire levels and needs of various entities. Protocols may be messaging protocols, transport protocols, or combinations thereof.

USING MULTIPLE CREDENTIALS FOR ACCESS AND TRAFFIC DIFFERENTIATION
20180007057 · 2018-01-04 ·

The disclosure relates in some aspects to establishing connectivity with a network using a first set of credentials and determining whether additional connectivity needs to be established (e.g., using a second set of credentials) to communicate data. The disclosure relates in some aspects to the use of multiple credentials for access and service connectivity. For example, traffic generated by a device may be authorized based on a different set of credentials than the set of credentials used to access the network (e.g., to connect to an LTE network for a PDN connection). In this way, traffic belonging to a specific service or application can be charged and policed based on service specific needs. The disclosure thus relates in some aspects to the use of access credentials and service credentials. These different types of credentials can be used to enable traffic differentiation and policing based on the credentials in use.

POST-CONFERENCE PLAYBACK SYSTEM HAVING HIGHER PERCEIVED QUALITY THAN ORIGINALLY HEARD IN THE CONFERENCE

Some aspects of the present disclosure involve the recording, processing and playback of audio data corresponding to conferences, such as teleconferences. In some teleconference implementations, the audio experience heard when a recording of the conference is played back may be substantially different from the audio experience of an individual conference participant during the original teleconference. In some implementations, the recorded audio data may include at least some audio data that was not available during the teleconference. In some examples, the spatial characteristics of the played-back audio data may be different from that of the audio heard by participants of the teleconference.