Patent classifications
H04L12/08
Methods and Systems for Connecting Physical Objects to Digital Communications
Disclosed is a system which uses a unique code, for example a QR code, on a physical product. The code is conveniently readable, for example by a smartphone or tablet, and connects the reader to a specific network address. Dynamically variable content is provided at the network address, which may be provided by the product vendor or manufacturer, by the purchaser, or by other parties. The content may vary depending upon which party is accessing the code.
COUNTER AND COUNTING METHOD
A counter includes: a computing module (100) and N counting modules (101). Each counting module includes a plurality of counting spaces corresponding to different counting entries, and counting spaces of the same counting entry in different counting modules have the same address, wherein the counting module is arranged to provide a value for computing to the computing module in response to a counting application of a counting application source. The computing module is arranged to read values of the same counting entry in different counting modules and accumulate the read values to obtain a total count value of the counting entry, N being an integer not less than 1. Also disclosed is a counting method.
Access management
According to an example aspect of the present invention, there is provided an apparatus comprising a memory configured to store an encryption key and a list of access tokens and at least one processing core configured to select a first access token from the list of access tokens based, at least partly, on at least one of a current time and a sequence number, decide, based at least partly on the first access token, whether to grant a user device access to the apparatus, and cause the apparatus to receive a second list of access tokens from at least one of the user device and a second user device.
Access management
According to an example aspect of the present invention, there is provided an apparatus comprising a memory configured to store an encryption key and a list of access tokens and at least one processing core configured to select a first access token from the list of access tokens based, at least partly, on at least one of a current time and a sequence number, decide, based at least partly on the first access token, whether to grant a user device access to the apparatus, and cause the apparatus to receive a second list of access tokens from at least one of the user device and a second user device.
Network application security question detection and modification
A method, system, and computer program product for detecting a network application security question is provided. The method includes receiving permission to access social media sources of a user. The social media sources and Internet based sources of the user are monitored in response to receiving the permission and associated data is generated and stored. A request for access to a secure account of the user is received and a list of security questions is presented to the user. The list of security questions is analyzed with respect to the data and each security question is ranked. An answer to a question of the list is received and analyzed and security attributes of the answer with respect to a potential malicious attempt to provide a predicted answer to for access to secure account are determined. A resulting security process with respect to enabling access to the secure account is executed.
Network application security question detection and modification
A method, system, and computer program product for detecting a network application security question is provided. The method includes receiving permission to access social media sources of a user. The social media sources and Internet based sources of the user are monitored in response to receiving the permission and associated data is generated and stored. A request for access to a secure account of the user is received and a list of security questions is presented to the user. The list of security questions is analyzed with respect to the data and each security question is ranked. An answer to a question of the list is received and analyzed and security attributes of the answer with respect to a potential malicious attempt to provide a predicted answer to for access to secure account are determined. A resulting security process with respect to enabling access to the secure account is executed.
Message processing method, apparatus, electronic control unit and readable storage medium
Provided are a message processing method, an apparatus, an electronic control unit, and a readable storage medium. The method includes configuring different sending times for any two different electronic control units corresponding to the same message ID in sending time configuration information of electronic control units; and when sending messages to a CAN bus, sending, by the electronic control units, the messages to the CAN bus at available sending times according to corresponding sending time configuration information, so that the time for any two different electronic control units corresponding to the same message ID to send messages to the CAN bus is separated. The method can improve the safety of the unmanned system.
Message processing method, apparatus, electronic control unit and readable storage medium
Provided are a message processing method, an apparatus, an electronic control unit, and a readable storage medium. The method includes configuring different sending times for any two different electronic control units corresponding to the same message ID in sending time configuration information of electronic control units; and when sending messages to a CAN bus, sending, by the electronic control units, the messages to the CAN bus at available sending times according to corresponding sending time configuration information, so that the time for any two different electronic control units corresponding to the same message ID to send messages to the CAN bus is separated. The method can improve the safety of the unmanned system.
User interfaces for managing a local network
The present disclosure generally relates to user interfaces for managing a local network using an electronic device, where the electronic device is connected to a router and a plurality of external devices, including a first set of one or more external devices and a second set of one or more external devices, on the local network. The user interfaces enable a user to apply the same network access policy to the first set of one or more external devices and the second set of one or more external devices or to apply different network access policies to the first set of one or more external devices and the second set of one or more external devices, respectively.
User interfaces for managing a local network
The present disclosure generally relates to user interfaces for managing a local network using an electronic device, where the electronic device is connected to a router and a plurality of external devices, including a first set of one or more external devices and a second set of one or more external devices, on the local network. The user interfaces enable a user to apply the same network access policy to the first set of one or more external devices and the second set of one or more external devices or to apply different network access policies to the first set of one or more external devices and the second set of one or more external devices, respectively.