A risk-aware access control system and related methods are provided. In accordance with one aspect of the present disclosure, there is a provided a method of risk-aware access control, comprising: detecting a request to perform an action with respect to two factors, the factors being of a factor type selecting people, devices, documents, and location, wherein the factors are of a different factor type; determining a coupling associated with the requested action based on the factors of the requested action; determining a risk level associated with the coupling; denying the requested action in response to a determination that the risk level does not match a security policy; and allowing the requested action in response to a determination that the risk level matches the security policy.
A method and system to signal transmission layers or dedicated reference signal ports to be used in a multiple input multiple output system, the method including providing a downlink control signal containing information for transmission layers or dedicated reference signal ports utilized, the dedicated reference signal ports being associated with the transmission layers; and using the information to demodulate data on each transmission layer.
A method at an asset tracking device, the method including activating a receiver at the asset tracking device; obtaining an intelligent transportation system message using the receiver; determining a position from the intelligent transportation system message; and reporting the determined position to a remote server.
G01S 5/00 - Position-fixing by co-ordinating two or more direction or position-line determinations; Position-fixing by co-ordinating two or more distance determinations
H04W 4/02 - Services making use of location information
H04W 4/029 - Location-based management or tracking services
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
4.
METHOD AND SYSTEM FOR AUTOMATED PROVISIONING OF DATA FROM MULTIPLE SENSORS
A method at a Supplementary Data Provider within an emergency services network, the method including receiving a message at the Supplementary Data Provider, the message including an identifier and incident data; responsive to receiving the message, creating a resource at the Supplementary Data Provider based on the incident data, the resource being associated with the identifier; receiving an access request from an Emergency Services Provider for Supplementary Data associated with the resource; and responsive to receiving the access request, providing a response with the Supplementary Data.
A server-implemented method is disclosed. The method includes: receiving a request from an IP Multimedia Subsystem (IMS) network node of an IMS network; and in response to receiving the request, providing NAS registration state information associated with a user equipment (UE) to the IMS network node, the NAS registration state information indicating at least one of fourth-generation (4G) single radio voice call continuity (SRVCC) capability of the UE or fifth-generation (5G) SRVCC capability of the UE that is applicable when using an access network supported by a core network, wherein the server is configured to store separate instances of UE SRVCC capabilities, the separate instances including indications of at least one of 4G UE SRVCC capability or 5G UE SRVCC capability that is applicable when using the access network supported by the core network, and wherein the UE is registered with the IMS network using a session initiation protocol (SIP) via the access network.
A method at a computing device including obtaining a first container image from a host computing device; executing a second container image at the computing device, the executing comprising: starting a container from the first container image, the container being for a development environment on the computing device; and customizing the container for a local environment on the computing device, thereby creating a customized container; and compiling developed code within the customized container.
In an aspect, the present disclosures provides a computer-implemented method for applying user settings to a vehicle, the method comprising receiving user settings for a first vehicle, at a second vehicle, and locking access to the user settings on the second vehicle, the user settings being associated with a user; unlocking access to the user settings on the second vehicle based on: authenticating a user token associated with the user and the user settings, and verifying an identity of the user associated with the user token, and applying the user settings to the second vehicle based on synthesizing the user settings of the first vehicle to the second vehicle.
B60R 25/01 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens
B60R 16/037 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for occupant comfort
B60R 25/24 - Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
G06Q 30/06 - Buying, selling or leasing transactions
In some examples, a first device receives a stream of application audio data, encodes the stream of application audio data, and in response to detecting an end of the stream of application audio data, provides pre-encoded filler audio data from a buffer in the first device as an encoded stream of filler audio data. The first device transmits the encoded stream of application audio data and the encoded stream of filler audio data in an encoded output data stream over a transport to a second device.
In some examples, a first wireless device transmits, within a first band designated for vehicle-related communications, service information for a service, the service information comprising information of a channel in a second band for communication of data of the service, the second band being outside of the first band.
A method at a network element for securely sharing services across domains, the method including receiving a request at the network element to add a first domain and an edge domain to a system; provisioning a public key of the network element to the first domain and the edge domain; receiving a public key of the first domain; populating, in the network element, a table with services provided by the first domain or the edge domain; populating, in the network element, a second table with applications installed at the first domain or edge domain and permissions for services for the applications; and controlling access to the services by the applications.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 67/63 - Routing a service request depending on the request content or context
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
In an access device associated with a first network cell, a method for enabling user equipment (UE) to obtain a service unavailable through the first network cell includes receiving a request for the UE to access the service, and identifying, in a message to the UE, a plurality of second network cells providing the service.
A method at a sensor apparatus affixed to a transportation asset, the method including detecting a trigger at the sensor apparatus; taking a threshold number of samples of a displacement-related value of the transportation asset over time; determining that a variance of the threshold number of samples exceeds a threshold; analyzing a frequency property based on the threshold number of samples; and based on the frequency property, determining whether the transportation asset is loaded or unloaded.
Methods, devices, and systems for multi-carrier network operation are disclosed. In one embodiment, a method of performing channel scrambling in a multi-carrier network, wherein the multi-carrier network includes a first component carrier (“CC”) and a second CC between a base station and a user equipment (“UE”) comprises receiving a Cell Radio Network Temporary Identifier (“C-RNTI”) and a cell identification (“ID”) for at least one of the first CC and the second CC; and using the RNTI and the cell ID to perform scrambling of information transmitted on at least one of the first CC and the second CC.
A method for control of data transmission in a wireless communication system includes receiving, by an application, from a modem, information indicative of a radio coverage condition, where a user equipment (UE) includes the application and the modem; based on the received information, determining that the UE is in an enhanced coverage state; and in response to the determining, controlling uplink data transmission by the modem to reduce power consumption of the UE.
There is provided a method and device for provisioning emergency number information on a user equipment. When a dialed number matches an emergency number from the provisioned emergency number information, the user equipment selects either the circuit switched domain or the packet switched domain and executes a call setup procedure for that domain.
A system and method in a user equipment (UE) for transferring an emergency session from a first network to a second network. The method includes transmitting a first registration request message to the second network; receiving a registration reject message from the second network; detecting the emergency session between the UE and the first network is ongoing; transmitting a second registration request message comprising an emergency registration request to the second network; and receiving a registration accept message for the emergency session.
Methods and devices for encoding a point cloud. A bit sequence signaling an occupancy pattern for sub-volumes of a volume is coded using binary entropy coding. Contexts may be based on neighbour configuration and a partial sequence of previously-coded bits of the bit sequence. A determination is made as to whether to apply a context reduction operation and, if so, the operation reduces the number of available contexts. Example context reduction operations include reducing neighbour configurations based on shielding by sub-volumes associated with previously-coded bits, special handling for empty neighbour configurations, and statistics-based context consolidation.
A method for verification at a computing device of a signed message received from a first party over a public communications channel, the method including extracting a message digest “a” belonging to a semigroup from the signed message; obtaining a public key [c,e] for the first party, including a fixed value checker “c” and an endpoint “e”, checker “c” and endpoint “e” belonging to the semigroup and the endpoint comprising a multiplication of a private key “b” for the first party and the checker “c”, multiplying the message digest “a” and the endpoint “e” to create an endmatter “ae”; extracting a signature “d” from the signed message, the signature “d” belonging to the semigroup and being a multiplication of message digest “a” and private key “b”; multiplying the signature “d” and the checker “c” to create a signcheck “dc”; and verifying that the endmatter “ae” matches the signcheck “dc”.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
A method for balancing sensors within a sensor system, the method including receiving, at a gateway, data from a plurality of sensors, each of the plurality of sensors being connected to one of a plurality of sensor modules or the gateway; determining, at the gateway, that a signal strength from a first sensor falls below a threshold, the first sensor being one of the plurality of sensors; and based on the determining, allocating the first sensor to connect to a different one of the plurality of sensor modules, or to the gateway if connected to one of the plurality of sensor modules.
H04L 41/0823 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
H04W 48/00 - Access restriction; Network selection; Access point selection
H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
H04W 24/02 - Arrangements for optimising operational condition
H04W 40/24 - Connectivity information management, e.g. connectivity discovery or connectivity update
H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
H04W 40/14 - Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality based on stability
A method at a computing device for providing vehicle data to a client, the method including receiving a data object at an ingestor block at the computing device, the ingestor block comprising a plurality of ingestor instances capable of interacting with different entities; converting the data object to a frame; providing the frame to a translation stack at the computing device to convert the frame into a normalized message; and providing the normalized message to the client.
Provided are a method for a terminal transmitting uplink control information (UCI) through a physical uplink control channel (PUCCH) in a wireless communication system, and a terminal using the method. A transmission power to be applied to the uplink control channel is determined on the basis of a value subordinate to a PUCCH format, and at least one type of UCI is transmitted from the physical uplink control channel by using the transmission power that is determined, wherein when the PUCCH format is PUCCH format 3, and the at least one type of UCI includes acknowledgement/negative-acknowledgement (ACK/NACK) and periodic channel state information (CSI), the value subordinate to the PUCCH format is determined on the basis of the number of bits of the ACK/NACK and the number of bits of the periodic CSI.
H04L 5/00 - Arrangements affording multiple use of the transmission path
H04L 1/00 - Arrangements for detecting or preventing errors in the information received
H04L 1/1607 - Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals - Details of the supervisory signal
H04W 52/14 - Separate analysis of uplink or downlink
H04W 72/21 - Control channels or signalling for resource management in the uplink direction of a wireless link, i.e. towards the network
Systems, methods, and software can be used to detect domain name system tunneling (DNST). In some aspects, a method comprises: receiving a plurality of domain name system (DNS) requests to access one or more domains; processing, by using a machine learning model, the plurality of DNS requests to determine one or more suspicious DNS requests among the plurality of DNS requests; and processing, by using a statistical analysis model, the one or more suspicious DNS requests to determine whether the one or more suspicious DNS requests are potentially malicious DNS requests.
Systems, methods, and software can be used to detect anomalies in source code. In some aspects, a method comprises: obtaining, by a server, one or more attribute values associated with one or more code commits of source code; and generating, by the server and based on the one or more attribute values, an anomaly report indicating a risk level of the source code.
Systems, methods, and software can be used to identify security risks in software code based on software bill of materials (SBOM). In some aspects, a method includes: obtaining, by a server, software code and a SBOM corresponding to the software code; identifying, by the server and based on the SBOM, a library used by the software code; and generating, by the server, a risk assessment based on at least one metric corresponding to the library, where the at least one metric is associated with one or more maintainers of the library.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
Methods and systems for monitoring the behavior of a process. A profile of a software module is obtained. An association request is received from a process. The association request includes an identifier. In response to receiving the association request, successfully validating the identifier based on the profile and establishing an association of a token to data associated with the identifier. A disassociation request is received from the process. The disassociation request includes a token. In response to receiving the disassociation request, using the token to retrieve the data associated with the identifier, determining that the disassociation request is invalid based on the profile and the data associated with the identifier, and based on the determination that the disassociation request is invalid, taking an action.
G06F 21/55 - Detecting local intrusion or implementing counter-measures
G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
26.
METHOD AND SYSTEM FOR ADDITION OF ASSURANCE INFORMATION TO V2X MESSAGING
A method at an Intelligent Transportation System (ITS) Entity, the method including receiving a message from a second ITS entity, the message containing a safety assurance indication, and performing an action at the ITS entity based on the safety assurance indication. Further, an ITS Entity comprising a processor; and a communications subsystem, wherein the ITS Entity is configured to: receive a message from a second ITS entity, the message containing a safety assurance indication, and perform an action at the ITS entity based on the safety assurance indication.
H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
H04W 4/06 - Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
H04W 12/069 - Authentication using certificates or pre-shared keys
Systems, methods, and software can be used to detect backdoors in binary software code. In some aspects, a method comprises: obtaining, by a server, binary software code corresponding to source code; generating, by the server, a backdoor abstraction of the binary software code; and generating, by the server, a backdoor risk assessment based on the backdoor abstraction of the binary software code.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
28.
RISK ASSESSMENT BASED ON AUGMENTED SOFTWARE BILL OF MATERIALS
Systems, methods, and software can be used to identify security risks in software code based on Software Bill of Materials (SBOM). In some aspects, a method includes: obtaining, by a server, software code and a SBOM corresponding to the software code; identifying, by the server and based on the SBOM, a library used by the software code; and generating, by the server, a risk assessment based on at least one metric corresponding to the library, where the at least one metric is associated with one or more maintainers of the library.
A method comprises obtaining a training set of network data that includes benign network data and malware network data; engaging a feature extraction engine to generate a set of dyads for each source-destination pair in the training set of network data; and training, using the set of dyads, a machine learning engine to differentiate between the benign network data and the malware network data.
Systems and methods for managing data transfers between a secure location and a less secure location. A data transfer checker operating on a mobile device determines whether an attempted data transfer between two locations is permitted. If it is not permitted, then the data transfer is prevented and the user may be notified of the data transfer prevention.
Data is scrambled at a transmitter according to one of a number of predetermined scrambling sequences which are associated with a particular one of a number of predetermined transmit antenna diversity schemes (i.e., a specific number of transmit antenna ports). Received data is decoded using one or more of the known transmit antenna diversity schemes and the scrambled data is descrambled according to a corresponding descrambling sequence (related to the scrambling sequence). Based on the descrambled data, the receiver determines which transmit antenna diversity scheme (i.e., the number of antenna ports) is used by the transmitter. In one specific embodiment, CRC parity data is scrambled in the transmitter and the receiver descrambles the recovered CRC parity data according to a descrambling sequence, computes CRC parity data from the received data, and compares the descrambled CRC parity data to the newly computed CRC parity data.
H04W 72/30 - Resource management for broadcast services
H04W 72/0453 - Resources in frequency domain, e.g. a carrier in FDMA
H04B 7/06 - Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
H04L 5/00 - Arrangements affording multiple use of the transmission path
32.
METHOD AND SYSTEM FOR DATA OBJECT IDENTIFICATION IN VEHICLES
A method at a computing device for finding an association between data objects in a structure, the method including selecting a coordinate location from a grid, the grid defining locations within the structure; finding whether a data object having a data object type is located at the coordinate location; when the data object is located at the coordinate location, associating the data object with other data objects at the coordinate location; and when the data object is not located at the coordinate location: determining through an explicit association that the data object at a second location services the first location; and associating the data object with the coordinate location.
G06V 20/59 - Context or environment of the image inside of a vehicle, e.g. relating to seat occupancy, driver state or inner lighting conditions
G06V 10/22 - Image preprocessing by selection of a specific region containing or referencing a pattern; Locating or processing of specific regions to guide the detection or recognition
Uplink control channel resource allocation for an enhanced downlink control channel is disclosed. A first example method disclosed herein includes receiving, at a user equipment (UE), a downlink control channel carrying a physical uplink control channel (PUCCH) resource indicator, mapping the PUCCH resource indicator to a first offset, mapping a position of the downlink control channel to a second offset, and mapping a linear combination of the first and second offsets to an index identifying a first PUCCH resource. A second example method disclosed herein includes, in response to receiving, at a UE, an indication of a dynamic resource offset in an enhanced physical downlink control channel (ePDCCH) transmitted in a first ePDCCH set, determining a position of the ePDCCH and a subframe offset, and processing the indication of the dynamic resource offset, the position and the subframe offset to determine an allocated uplink control channel resource for the UE.
Systems and methods are disclosed for identifying at least one cause of noise in a vehicle audio system. The vehicle audio system may include a plurality of audio channels. Acoustic output may be generated and received through each of the audio channels. Acoustic input may be received from one or more of the audio channels and may be processed to generate processed acoustic input. The processed acoustic input may include a frequency response of the acoustic input. The processed acoustic input may be compared to corresponding channel target input and at least one deviation may be determined. A cause of the at least one deviation may then be determined based on a relationship between the at least one deviation and a set of resolved indications of cause, each of the set of resolved indications of cause corresponding to at least one of a set of recorded causes.
G10K 11/178 - Methods or devices for protecting against, or for damping, noise or other acoustic waves in general using interference effects; Masking sound by electro-acoustically regenerating the original acoustic waves in anti-phase
A method of processing data for a driving automation system, the method comprising steps of: obtaining sound data from a microphone of an autonomous vehicle; processing the sound data to obtain a sound characteristic; and updating a context of the autonomous vehicle based on the sound characteristic.
A method of generating a display object is provided, the method comprising operating a first processor comprised within a first device to: execute an application; generate an display object associated with the application; output the active display object on the first device; transmit the display object to a second device for output by the second device; and receive user input to the application via the display object output on the second device.
A method at a sensor apparatus affixed to a transportation asset. The method includes calibrating the sensor apparatus by initiating a vertical impact at the transportation asset, measuring spring oscillation and creating a model of the transportation asset. The method further includes detecting, subsequent to the calibrating, an impact event at the sensor apparatus. The method further includes measuring spring oscillation due to the impact event at the sensor apparatus and using the measured spring oscillation in the model created during calibration to create a load mass estimate for the transportation asset.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for processing event log data. An example event log processing method includes receiving an event log comprising a plurality of event records describing events that have occurred on each of one or more computer systems over a period of time; converting the event log into a graph, comprising: normalizing the plurality of event records, including anonymizing a unique identifier value in each event record and replacing a variable value in each event record with a predetermined value; representing each normalized event record as one or more nodes in the graph; and generating a plurality of event clusters, wherein each event cluster includes an aggregated group of nodes and is generated based on common attributes of and hierarchical relationships between the normalized event records represented by the nodes in the aggregated group.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for processing event log data. An example event log processing method includes receiving an event log comprising a plurality of event records describing events that have occurred on each of one or more computer systems over a period of time; converting the event log into a graph, comprising: normalizing the plurality of event records, including anonymizing a unique identifier value in each event record and replacing a variable value in each event record with a predetermined value; representing each normalized event record as one or more nodes in the graph; and generating a plurality of event clusters, wherein each event cluster includes an aggregated group of nodes and is generated based on common attributes of and hierarchical relationships between the normalized event records represented by the nodes in the aggregated group.
The present disclosure relates to a method and system for managing a meeting session. In accordance with one example, there is provided a method of managing a meeting session on a server that manages the meeting session, the meeting session comprising one or more participant devices and a presenter device. The method comprises receiving one or more break request messages from the participant devices, and sending a break message to the participant devices, the break message causing a break notification to be displayed on a display of the participant devices.
A method for key agreement between a first party and a second party over a public communications channel, the method including selecting, by the first party, from a semigroup, a first value “a”; multiplying the first value “a” by a second value “b” to create a third value “d”, the second value “b” being selected from the semigroup; sending the third value “d” to the second party; receiving, from the second party, a fourth value “e”, the fourth value comprising the second value “b” multiplied by a fifth value “c” selected by the second party from the semigroup; and creating a shared secret by multiplying the first value “a” with the fourth value “e”, wherein the shared secret matches the third value “d” multiplied by the fifth value “c”.
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for processing event log data. An example event log processing method includes receiving an event log comprising a plurality of event records describing events that have occurred on each of one or more computer systems over a period of time; converting the event log into a graph, comprising: normalizing the plurality of event records, including anonymizing a unique identifier value in each event record and replacing a variable value in each event record with a predetermined value; representing each normalized event record as one or more nodes in the graph; and generating a plurality of event clusters, wherein each event cluster includes an aggregated group of nodes and is generated based on common attributes of and hierarchical relationships between the normalized event records represented by the nodes in the aggregated group.
A method at a sensor module within a sensor system for communicating with a gateway, the method including storing a timing profile for communications with the gateway; waking a radio core of the sensor module at a threshold time prior to a beacon signal being expected from the gateway; sampling a channel for the beacon signal at the radio core; if the beacon signal is detected: waking a processor on the sensor module; exchanging communication with the gateway; and powering down the processor and radio core upon completion of the exchanging communication.
In some examples, a system receives data relating to an environment of a vehicle. Based on the received data, the system initiates a vehicle preparation action by actuating an adjustable component of the vehicle, the vehicle preparation action to ready the vehicle for a user prior to operation of the vehicle.
B60W 50/00 - CONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT - Details of control systems for road vehicle drive control not related to the control of a particular sub-unit
B60S 1/02 - Cleaning windscreens, windows, or optical devices
B60W 60/00 - Drive control systems specially adapted for autonomous road vehicles
45.
Notifications and Graphical User Interface for Applications in Folders
A method at an electronic device having a display, the method including displaying a user interface on the display, wherein the user interface includes at least one folder icon for a folder, the folder including at least two applications; determining that at least two applications in the folder have at least one notification and at least one application in the folder has more than one notification; and appending, to the folder icon, a badge having a number, wherein the number represents a number of applications in the folder having notifications.
A method includes displaying information associated with an application on an electronic device, providing a visual notification of a received communication, and detecting a gesture. In response to detecting the gesture, a first part of an inbox is displayed while reducing display of the information, including at least partially displaying information associated with the received communication. Based on a characteristic of the gesture, providing the visual notification is discontinued.
G06F 3/04883 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
H04M 1/7243 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
G06F 3/04817 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
47.
METHOD AND SYSTEM FOR PROVISIONING DEVICE SPECIFIC WLAN CREDENTIALS
A method at an electronic device, the method including initiating authentication with a network through a network element; providing a configuration request, the configuration request including an attribute set for the electronic device; and receiving a configuration response, the configuration response including a certificate or credential for future authentication with the network.
In some examples, a source device categorizes a plurality of messages for transmission to a recipient device, the plurality of messages comprising vehicle-related information. Based on the categorizing, the source device identifies selected messages of the plurality of messages to be aggregated. The source device aggregates the selected messages into a single transmission from the source device to the recipient device.
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
49.
METHOD AND SYSTEM FOR ESTABLISHING TRUST FOR A CYBERSECURITY POSTURE OF A V2X ENTITY
A method at an Intelligent Transportation System (ITS) Transmitting Entity, the method including: generating an ITS message; augmenting the ITS message with an Integrity Report generated by an integrity detection function at the ITS Transmitting Entity to create an augmented ITS message; signing the augmented ITS message with an Authorization Certificate or Ticket, the Authorization Certificate or Ticket including an assurance indication from an Audit Certificate Authority for the integrity detection function; and sending the signed, augmented ITS message to an ITS Receiving Entity.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
A method and apparatus for improved battery performance of user equipment in a wireless network having multiple radio resource control (RRC) states, the method comprising the steps of: monitoring, at the user equipment, application data exchange; determining when no application on the user equipment is expected to exchange data; and initiating, from the user equipment, a transition to a less battery demanding radio resource control state or mode.
A method at a computing device within an Intelligent Transportation System, the method comprising: determining, at the computing device, whether a short-term certificate is available to sign a message; if the short-term certificate is available, signing the message with a private key associated with the short-term certificate; if the short-term certificate is not available, signing the message with a private key associated with a long-term certificate; and sending the message to a recipient.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
52.
METHOD AND APPARATUS FOR DYNAMIC SESSION PLACEHOLDER FOR MESSAGE USER INTERFACE
A method and apparatus for representing a conversation of related messages is provided. In a message collection user interface for displaying messages sent and received by a communications device, a dynamic session placeholder is used for a respective conversation of related messages. The message collection user interface is displayed including any dynamic session placeholders in the list of messages. As messages from the conversation are occasioned, the dynamic session placeholder is updated. When the message collection is displayed, it is displayed in accordance with the updated session placeholder.
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06Q 10/107 - Computer-aided management of electronic mailing [e-mailing]
H04L 51/216 - Handling conversation history, e.g. grouping of messages in sessions or threads
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
H04L 51/04 - Real-time or near real-time messaging, e.g. instant messaging [IM]
In some examples, a system detects an accident involving a first vehicle, where the detecting is based on an accident indication received by the service over a network from a second vehicle not involved in the accident, the second vehicle different from the first vehicle, and where the accident indication from the second vehicle is responsive to messages received by the second vehicle from other vehicles. In response to the detecting of the accident, the system verifies that the accident occurred by sending, from the service, queries to a roadside unit and a third vehicle, and receiving, at the service, responses to the queries from the roadside unit and the third vehicle, the responses containing event data collected by the roadside unit and the third vehicle of events in a vicinity of the accident.
In some examples, in response to determining that a new communication channel is required, a wireless device retrieves information provided from a network node of availability of alternative communication channels for the wireless device. In response to retrieving information that a second communication channel is available for a location within which the wireless device is located, the wireless device removes wireless device specific information and initiates a request to connect to the second communication channel, where the second communication channel is in a frequency range different from a frequency range of the first communication channel.
A method at a computing device within an Intelligent Transportation System, the method including detecting a traffic event at the computing device; determining no fixed roadside unit is available from the computing device; establishing an Internet Protocol connection from the computing device to a network node; and sending a traffic event message from the computing device to the network node, the traffic event message providing information for the traffic event.
A method at a computing device within an asset management system, the method including receiving a leasing indication at the computing device, the leasing indication providing at least one asset in the asset management system is leased to a lessee; duplicating an asset record for each of the at least one asset, created a duplicated record; assigning a policy based on the lessee to the duplicated record; and providing a pointer within the asset record to the duplicated record.
In some examples, a controller receives information of a route of a vehicle, and selects a first parameter set from among a plurality of parameter sets based on the route of the vehicle, the plurality of parameter sets corresponding to different conditions of usage of the vehicle, where each parameter set of the plurality of parameter sets includes one or more parameters that control adjustment of one or more respective adjustable elements of the vehicle. The controller causes application of the first parameter set to control a setting of the one or more adjustable elements of the vehicle.
B60W 50/00 - CONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT - Details of control systems for road vehicle drive control not related to the control of a particular sub-unit
B60W 40/02 - Estimation or calculation of driving parameters for road vehicle drive control systems not related to the control of a particular sub-unit related to ambient conditions
G07C 5/02 - Registering or indicating driving, working, idle, or waiting time only
G07C 5/08 - Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle, or waiting time
58.
System and method for determining trust for SIP messages
A method for performing initial registration is provided. The method includes receiving a server timeout message, the server timeout message including at least a field set to a value equal to a value received during a first registration. The method further includes initiating restoration procedures by performing an initial registration.
H04L 69/40 - Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
Methods and systems for detecting a privacy violation in an image file. A policy to be used by a master imaging application is obtained and a file system is monitored for a digital image modified by a monitored imaging application. It is then determined that the digital image file includes at least some content in violation of a defined setting for the master imaging application and, based on the determination that the digital image file includes at least some content in violation of the defined setting for the master imaging application, taking an action.
In some implementations, a method of wireless communications between a wireless communications network and wireless user equipment includes receiving, using a primary Time Division Duplex (TDD) configuration, data on a primary component carrier in a first frequency band. Using a secondary TDD configuration, data on a secondary component carrier is received in a second frequency band different from the first frequency band. A Hybrid Automatic Repeat Request (HARQ) for data received on the secondary component carrier is transmitted using a supplemental TDD configuration. A transmission or retransmission on the secondary component carrier uses a supplemental TDD configuration as well. The supplemental TDD configuration is different from the secondary TDD configuration. Furthermore, an uplink supplemental configuration may be different from a downlink supplemental configuration.
A method in a first wireless communication device for displaying current location information representing a current location of a second wireless communication device. The method entails, from within a communication application executing on a processor of the first wireless communication device, receiving the current location information representing the current location of the second wireless communication device, performing a reverse look-up of the received current location of the second wireless communication device to determine address information, displaying a map from within the communication application, and identifying the received current location information on the displayed map with a name associated with the determined address information.
Methods and devices for determining whether a mobile device has been compromised. File tree structure information for the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in a portion of memory. The file tree structure information is analyzed to determine that the mobile device has been compromised, has not been compromised, or might be compromised. Based on determining that the mobile device might be compromised, the mobile device is instructed to execute a restricted action. If the restricted action occurs on the mobile device then it is determined that the mobile device has been compromised. Based on that determination, an action is taken.
Systems and methods for determining a presence of cargo within a container are described. The determination may comprise transmitting a first electromagnetic signal within the container and receiving a first reflected electromagnetic signal corresponding to the first electromagnetic signal. The first reflected electromagnetic signal may be converted into a set of first magnitude values corresponding to a set of bin values representing a respective distance from the radar device. The first magnitude values may be integrated, using a moving window, over successive subranges of bin values to produce a set of integrated magnitude values. A set of integrated base magnitude values may be subtracted from the set of integrated magnitude values to produce a set of normalized integrated magnitude values. A presence of cargo within the container may then be determined by comparing each of the normalized integrated magnitude values with corresponding threshold values.
G01S 7/41 - RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES - Details of systems according to groups , , of systems according to group using analysis of echo signal for target characterisation; Target signature; Target cross-section
G06Q 10/08 - Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
64.
METHODS AND DEVICES FOR SELECTING OBJECTS IN IMAGES
Methods and devices for manipulating an image are described. The method comprises receiving image data, the image data including a first image obtained from a first camera and a second image obtained from a second camera, the first camera and the second camera being oriented in a common direction; identifying one or more boundaries of an object in the image data by analyzing the first image and the second image; and displaying a manipulated image based on the image data, wherein the manipulated image includes manipulation of at least a portion of the first image based on boundaries of the object.
H04N 13/239 - Image signal generators using stereoscopic image cameras using two 2D image sensors having a relative position equal to or related to the interocular distance
A method at a sensor apparatus, the method including calculating a value for a target function based on at least one sensor of the sensor apparatus; determining that the value of the target function is within a defined threshold range for a defined time period, thereby finding an in-flight state for the sensor apparatus; and turning off transmission from a radio of the sensor apparatus based on the in-flight state.
H04Q 9/00 - Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom
G01P 15/14 - Measuring acceleration; Measuring deceleration; Measuring shock, i.e. sudden change of acceleration by making use of gyroscopes
G01P 1/00 - MEASURING LINEAR OR ANGULAR SPEED, ACCELERATION, DECELERATION OR SHOCK; INDICATING PRESENCE OR ABSENCE OF MOVEMENT; INDICATING DIRECTION OF MOVEMENT - Details of instruments
A method at a vehicle computing device for identifying a driver, the method including receiving a first indicator at the vehicle computing device; obtaining, based on the first indicator, a presumed driver identity; receiving at least one second indicator at the vehicle computing device; and verifying the presumed driver identity using the at least one second indicator.
B60R 25/24 - Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
B60R 25/045 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens operating on the propulsion system, e.g. engine or drive motor by limiting or cutting the electrical supply to the propulsion unit
B60R 25/08 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens operating on brakes or brake systems
B60R 25/10 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
B60R 25/102 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
B60R 25/31 - Detection related to theft or to other events relevant to anti-theft systems of human presence inside or outside the vehicle
B60R 25/34 - Detection related to theft or to other events relevant to anti-theft systems of conditions of vehicle components, e.g. of windows, door locks or gear selectors
A continuous authentication system and related methods are provided. The system detects requests to perform user actions. A security value is associated with each user action. The system determines a subsequent session security level in response to an adjustment to a session security level by a security value of a requested user action. The requested user action is permitted and the session security level is adjusted based on the security value of the requested user action in response to a determination by the system that the subsequent session security level is greater than or equal to a threshold session security level. A user authentication challenge is caused (e.g., prompted) in response to a determination by the system that the subsequent session security level is less than the threshold session security level. The requested user action is permitted and the session security level is adjusted based on the security value of the requested user action in response to a successful user authentication challenge. The requested user action is rejected in response to an unsuccessful user authentication challenge.
The present disclosure provides, in an aspect, computer-implemented method for generating data associated with a vehicle event, the method including obtaining vehicle event data for a vehicle event associated with a vehicle; identifying a parameter associated with the vehicle event; emulating the parameter based on simulating the vehicle event with the vehicle event data and a model of the parameter, and extrapolating parameter data based on the simulated vehicle event.
Systems, methods, and software can be used to determine a classification of a network accessible page, for example a web page on Internet. In some aspects, a method comprises receiving, at a gateway, a request for accessing a network accessible page from an end-user device; processing the network accessible page to generate a first embedding that characterizes network attributes of a domain of the network accessible page, and a second embedding that characterizes content attributes of the network accessible page; generating, from the first embedding, a first score that characterizes a predicted similarity between the network accessible page and one or more known network accessible pages; generating, from the second embedding, a second score that characterizes a predicted likelihood that the network accessible page is asking for sensitive information; and using at least the first score and the second score to determine a classification of the network accessible page.
Methods and systems for fingerprinting a malicious behavior. In a first stage of training, a coarse machine learning one-class classifier is trained to detect a first dataset of events, the first dataset of events including a dataset of events representing a malicious behavior and a dataset of events representing non-malicious behavior and a benign machine learning one-class classifier is trained to detect a second dataset of events, the second dataset of events excluding the dataset of events representing malicious activity. An ensemble of models including the benign and coarse machine learning one-class classifiers is applied to the first dataset of events to create a third training set representing the malicious behavior for a second stage of training. A final machine learning one-class classifier is trained in the second stage of training using the third training set. The final machine learning one-class classifier represents a fingerprint of the malicious behavior.
A method at a module within a sensor system for updating a timing profile, the method including: turning on a radio of the sensor module for a first time duration; detecting signals from other modules within the sensor system; for each signal, storing data comprising a time such signal is received and an identifier for a module sending such signal; sending the data to a server; and receiving the timing profile from the server.
According to one aspect, a system and method of exchanging GRUUs (Globally Routed User Agent URI (Uniform Resource Identifier)) between a first telephony-enabled device and a second telephony enabled device using a circuit-switched message is provided. Once exchanged, the telephony enabled devices can exchange SIP (session initiated protocol) communications routed by the GRUUs. Any one of the telephony-enabled devices can add a media component to the SIP communications. According to another aspect, a system and method of generating GRUUs is provided. According to another aspect, a system and method of handing off communications to a packet switched network from a circuit switched network is provided.
Methods and devices for determining whether a mobile device has been compromised. The mobile device has a managed portion of memory and an unmanaged portion of memory, a managed profile and an unmanaged profile, and the managed profile includes files stored in the managed portion of memory and the unmanaged profile includes files stored in the unmanaged portion of memory. The managed profile is governed by a device policy set by a remote administrator. File tree structure information for the unmanaged profile of the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in the unmanaged portion of memory. It is determined from the file tree structure information that the mobile device has been compromised and, based on that determination, an action is taken.
A method at a computing device including mapping, within a corpus of documents having both natural language terms and computer language terms, each term as a natural language term or a computer language term, thereby creating mapped terms; and applying at least one Latent Dirichlet Allocation (LDA) model to the mapped terms to create topics that correlate the natural language terms and computer language terms.
Methods and systems for training a neural network. In a first stage of training, a coarse machine learning one-class classifier is trained using a first training set including a signal and noise and a noise machine learning one-class classifier is trained using a second training set excluding the signal. An assembly of models including the noise machine learning one-class classifier and the coarse machine learning one-class classifier is applied to the first training set to create a third training set representing the signal for a second stage of training. A final machine learning one-class classifier is trained in the second stage of training using the third training set representing the signal.
A method for reporting power headroom-related information for a plurality of aggregated carriers. The method includes reporting in a bitmap the power headroom-related information for a number of the aggregated carriers that is less than or equal to the total number of aggregated carriers, wherein the power headroom-related information is one of a power headroom for at least one of the aggregated carriers and a path loss for at least one of the aggregated carriers.
H04W 52/36 - Transmission power control [TPC] using constraints in the total amount of available transmission power with a discrete range or set of values, e.g. step size, ramping or offsets
H04L 5/00 - Arrangements affording multiple use of the transmission path
H04W 52/24 - TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters
H04W 52/34 - TPC management, i.e. sharing limited amount of power among users or channels or data types, e.g. cell loading
H04W 72/20 - Control channels or signalling for resource management
H04W 72/21 - Control channels or signalling for resource management in the uplink direction of a wireless link, i.e. towards the network
Systems, methods, and software can be used to detect software errors in a binary code. In some aspects, a method comprises: obtaining a binary code; generating a base memory-write profile for the binary code, wherein the base memory-write profile comprises a count of memory updates for each of a plurality of memory locations during an execution of the binary code according to a base input; for each of a plurality of test inputs, generating a test memory-write profile for the binary code, wherein the test memory-write profile comprises a count of memory updates for each memory location during an execution of the binary code according to the test input; comparing the base memory-write profile and the plurality of test memory-write profiles; and generating a notification based on the comparison, wherein the notification indicates whether there is a difference between the base memory-write profile and the plurality of test memory-write profiles.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
78.
Handheld Electronic Device and Associated Method Providing Time Data in a Messaging Environment
An improved handheld electronic device and an associated method are provided in which time data regarding certain aspects of a messaging conversation on a handheld electronic device are made available to a user. Such time data is provided, for instance, in situations where an interruption has occurred during a messaging conversation. Time data can also be provided to a user on demand in certain circumstances.
H04L 51/04 - Real-time or near real-time messaging, e.g. instant messaging [IM]
G06F 15/02 - Digital computers in general; Data processing equipment in general manually operated with input through keyboard and computation using a built-in program, e.g. pocket calculators
H04M 1/72436 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. SMS or e-mail
H04L 51/58 - Message adaptation for wireless communication
H04L 51/216 - Handling conversation history, e.g. grouping of messages in sessions or threads
A method at a first device for enabling a device-to-device wireless link, the method detecting whether a presence signal of a second device is received over a first time period, the presence signal of the second device having a time-slot boundary; and if the presence signal of the second device is not detected, initiating a time-slot boundary by the first device including: transmitting a first presence signal of the first device in a selected time-slot; and checking for an acknowledgment to the first presence signal.
Systems, methods, and software can be used to identify API use in a binary code. In some aspects, a method comprises: obtaining a base memory-write profile description for a binary code, wherein the description comprises: a base memory-write profile for each of a plurality of API calls in the binary code, wherein the base memory-write profile comprises a count of memory updates for each of a plurality of memory locations during an execution of a corresponding API call; receiving an execution request that invokes the binary code; generating an execution memory-write profile for the request, wherein the execution memory-write profile comprises a count of memory updates for each memory location during an execution of the request; determining, based on a comparison between the execution memory-write profile and the base memory-write profiles in the description, an API call corresponding to the request; and generating a notification indicating the determined API call.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
In some examples, a system includes one or more hardware processors, an interrupt service thread to handle an interrupt, and a kernel scheduler to schedule the interrupt service thread as part of a collection of threads to be scheduled.
A container comprising a base portion, the base portion having at least one side support; and at least one end support at each end of the base portion; and a flexible, resilient lid portion, the lid portion configured to be installed to the base portion utilizing the resilience in the lid portion for inserting each end of the lid portion into the at least one end support. Further, a method for installing a flexible, resilient lid to a container, the container comprising a base portion having a side support at each side of the container and an end support at each end of the base portion, the method including bending the lid by applying pressure to each end of the lid; aligning the lid with each end support; and releasing the lid, wherein the lid re-forms into a flat lid within the end supports.
B65B 7/28 - Closing semi-rigid or rigid containers or receptacles not deformed by, or not taking-up shape of, contents, e.g. boxes or cartons by applying separate preformed closures, e.g. lids, covers
83.
Methods and devices for binary entropy coding of point clouds
Methods and devices for encoding a point cloud. A bit sequence signaling an occupancy pattern for sub-volumes of a volume is coded using binary entropy coding. Contexts may be based on neighbour configuration and a partial sequence of previously-coded bits of the bit sequence. A determination is made as to whether to apply a context reduction operation and, if so, the operation reduces the number of available contexts. Example context reduction operations include reducing neighbour configurations based on shielding by sub-volumes associated with previously-coded bits, special handling for empty neighbour configurations, and statistics-based context consolidation.
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and including an indication of the security level in a header of the message. The message is then sent to a recipient.
In some examples, a system includes a kernel scheduler to schedule, for execution, threads to run in an address space of an operating system (OS) kernel according to respective priorities associated with the threads, where each thread of the threads has a user persona and a kernel persona. The kernel scheduler switches each respective thread of the threads to the kernel persona of the respective thread in response to scheduling the respective thread for execution responsive to a kernel call from the respective thread. The kernel scheduler preempts a thread in the kernel persona of the thread that is actively executing in response to an event.
In some examples, a system includes an operating system (OS) kernel, one or more hardware processors, and a kernel scheduler. The kernel scheduler receives a first indication that a first thread is to wait for an event, receives a second indication that the first thread has transitioned to a blocked state in which the first thread is blocked on the event, and receives a third indication from a second thread delivering the event, the third indication to unblock the first thread. In response to the third indication, the kernel scheduler causes a transition of the first thread from the wait state to an active state if the first thread is in the wait state and has not yet transitioned to the blocked state, and causes a transition of the first thread from the blocked state to a ready state if the first thread is in the blocked state.
In some examples, a system includes a plurality of processors and a kernel scheduler. The kernel scheduler associates each respective processor of the plurality of processors with a collection of clusters, wherein each cluster of the collection of clusters represents a respective different subset of the plurality of processors, and the respective processor is a member of each cluster of the collection of clusters. For each corresponding cluster of the collection of clusters, the kernel scheduler maintains a data structure associated with a ready queue of the kernel scheduler, the data structure comprising elements representing thread priorities, wherein an element of the data structure is associated with an ordered list of threads in the ready queue.
A method for key agreement between a first party and a second party over a public communications channel, the method including selecting, by the first party, a first value “a”; multiplying the first value “a” by a second value “b” using Knuth multiplication to create a third value “d”, the third value “d” being a semistandard tableau; sending the third value “d” to the second party; receiving, from the second party, a fourth value “e”, the fourth value being a second semistandard tableau comprising the second value “b” multiplied by a fifth value “c” selected by the second party; and creating a shared secret by multiplying the first value “a” with the fourth value “e” using Knuth multiplication, wherein the shared secret matches the third value “d” multiplied by the fifth value “c” using Knuth multiplication.
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
89.
METHODS AND DEVICES USING DIRECT CODING IN POINT CLOUD COMPRESSION
Methods and devices for coding point clouds using direct coding mode to code coordinates of a point within a sub-volume associated with a current node instead of a pattern of occupancy for child nodes. Eligibility for use of direct coding is based on occupancy data from another node. If eligible, then a flag is represented in the bitstream to signal whether direct coding is applied to points in the sub-volume or not.
A waterproof container is provided, the waterproof container including a base portion, the base portion having a base; an outer wall extending from the base; and an inner wall disposed inwardly from the outer wall, thereby forming a channel between the inner wall and the outer wall; and a lid portion, the lid portion having: a slot within the lid portion; and a seal configured to fit within the slot, the seal including a groove therein, wherein the groove of the seal is configured to accept an end of the inner wall therein when the lid portion is affixed to the base portion.
A method and system to signal transmission layers or dedicated reference signal ports to be used in a multiple input multiple output system, the method including providing a downlink control signal containing information for transmission layers or dedicated reference signal ports utilized, the dedicated reference signal ports being associated with the transmission layers; and using the information to demodulate data on each transmission layer.
In an access device associated with a first network cell, a method for enabling user equipment (UE) to obtain a service unavailable through the first network cell includes receiving a request for the UE to access the service, and identifying, in a message to the UE, a plurality of second network cells providing the service.
A method at an analytics module on a computing device, the analytics module being at a tier within a hierarchy of analytics modules and data sources, the method including receiving a first data set from a data source or a lower tier analytics module; analyzing the first data set to create a second data set; providing the second data set to at least one higher tier analytics module, the second data set being derived from the first data set; and providing at least one of an inference and an interdiction to the lower tier analytics module
A method at a computing device, the method including receiving, at the computing device, sensor data from a data source; converting, at a playback tool on the computing device, the sensor data into converted data, thereby bypassing abstraction layers at the computing device; and providing the converted data to at least one synthetic sensor on the computing device, wherein each of the at least one synthetic sensor provides an insight regarding operation of the computing device.
A method at a network element for configuration for Internet of Things (IoT) devices using manufacturer usage description (MUD) files, the method including receiving at least one MUD Uniform Resource Locator (URL) from an IoT Device; sending, from the network element to at least one MUD Server based on the MUD URL, a Uniform Resource Indicator; responsive to the sending, receiving a plurality of MUD files from the MUD server; creating a plurality of policies from the plurality of MUD files, the plurality of policies corresponding to a normal mode of operation and a secondary mode of operation; and forwarding the plurality of policies to a gateway from the network element.
Example methods, apparatus, articles of manufacture and systems for providing secondary coverage in a mobile communication system are disclosed. Example methods for a first device to provide secondary coverage in a mobile communication system include transmitting a secondary coverage signal and receiving a presence indication from a second device. Such example methods can also include reporting the presence indication to an access node of the mobile communication system. Such example methods can further include receiving information from the access node to enable relay node functionality in the first device in response to reporting the presence indication to the access node.
The present disclosure provides, in an aspect, a computer-implemented method for modifying vehicle settings for a vehicle, the method comprising identifying a vehicle occupant having a personalized set of vehicle settings for the vehicle, identifying a condition modifier associated with the vehicle occupant and the personalized set of vehicle settings, and applying a vehicle setting from the set of vehicle settings based on the condition modifier.
B60R 16/037 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for occupant comfort
B60W 40/08 - Estimation or calculation of driving parameters for road vehicle drive control systems not related to the control of a particular sub-unit related to drivers or passengers
B60W 50/08 - Interaction between the driver and the control system
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
A method at an asset tracking device, the method including activating a receiver at the asset tracking device; obtaining an intelligent transportation system message using the receiver; determining a position from the intelligent transportation system message; and reporting the determined position to a remote server.
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
H04W 4/029 - Location-based management or tracking services
G01S 5/00 - Position-fixing by co-ordinating two or more direction or position-line determinations; Position-fixing by co-ordinating two or more distance determinations
H04W 4/02 - Services making use of location information
100.
METHODS AND DEVICES FOR MULTI-POINT DIRECT CODING IN POINT CLOUD COMPRESSION
Methods and devices for coding point clouds using direct coding mode to code coordinates of a point within a sub-volume associated with a current node instead of a pattern of occupancy for child nodes. When direct coding is applied to two or more points in the sub-volume, the points are ordered based on one of their respective coordinate values and pairwise coding of those coordinate values is carried out on a bit-by-bit basis. The pairwise coding includes coding whether the bits are the same and, if so, the bit value.