A risk-aware access control system and related methods are provided. In accordance with one aspect of the present disclosure, there is a provided a method of risk-aware access control, comprising: detecting a request to perform an action with respect to two factors, the factors being of a factor type selecting people, devices, documents, and location, wherein the factors are of a different factor type; determining a coupling associated with the requested action based on the factors of the requested action; determining a risk level associated with the coupling; denying the requested action in response to a determination that the risk level does not match a security policy; and allowing the requested action in response to a determination that the risk level matches the security policy.
A method and system to signal transmission layers or dedicated reference signal ports to be used in a multiple input multiple output system, the method including providing a downlink control signal containing information for transmission layers or dedicated reference signal ports utilized, the dedicated reference signal ports being associated with the transmission layers; and using the information to demodulate data on each transmission layer.
H04W 72/23 - Canaux de commande ou signalisation pour la gestion des ressources dans le sens descendant de la liaison sans fil, c. à d. en direction du terminal
A method at an asset tracking device, the method including activating a receiver at the asset tracking device; obtaining an intelligent transportation system message using the receiver; determining a position from the intelligent transportation system message; and reporting the determined position to a remote server.
G01S 5/00 - Localisation par coordination de plusieurs déterminations de direction ou de ligne de position; Localisation par coordination de plusieurs déterminations de distance
H04W 4/02 - Services utilisant des informations de localisation
H04W 4/029 - Services de gestion ou de suivi basés sur la localisation
H04W 4/44 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons pour la communication entre véhicules et infrastructures, p.ex. véhicule à nuage ou véhicule à domicile
4.
METHOD AND SYSTEM FOR AUTOMATED PROVISIONING OF DATA FROM MULTIPLE SENSORS
A method at a Supplementary Data Provider within an emergency services network, the method including receiving a message at the Supplementary Data Provider, the message including an identifier and incident data; responsive to receiving the message, creating a resource at the Supplementary Data Provider based on the incident data, the resource being associated with the identifier; receiving an access request from an Emergency Services Provider for Supplementary Data associated with the resource; and responsive to receiving the access request, providing a response with the Supplementary Data.
A server-implemented method is disclosed. The method includes: receiving a request from an IP Multimedia Subsystem (IMS) network node of an IMS network; and in response to receiving the request, providing NAS registration state information associated with a user equipment (UE) to the IMS network node, the NAS registration state information indicating at least one of fourth-generation (4G) single radio voice call continuity (SRVCC) capability of the UE or fifth-generation (5G) SRVCC capability of the UE that is applicable when using an access network supported by a core network, wherein the server is configured to store separate instances of UE SRVCC capabilities, the separate instances including indications of at least one of 4G UE SRVCC capability or 5G UE SRVCC capability that is applicable when using the access network supported by the core network, and wherein the UE is registered with the IMS network using a session initiation protocol (SIP) via the access network.
A method at a computing device including obtaining a first container image from a host computing device; executing a second container image at the computing device, the executing comprising: starting a container from the first container image, the container being for a development environment on the computing device; and customizing the container for a local environment on the computing device, thereby creating a customized container; and compiling developed code within the customized container.
In an aspect, the present disclosures provides a computer-implemented method for applying user settings to a vehicle, the method comprising receiving user settings for a first vehicle, at a second vehicle, and locking access to the user settings on the second vehicle, the user settings being associated with a user; unlocking access to the user settings on the second vehicle based on: authenticating a user token associated with the user and the user settings, and verifying an identity of the user associated with the user token, and applying the user settings to the second vehicle based on synthesizing the user settings of the first vehicle to the second vehicle.
B60R 25/01 - VÉHICULES, ÉQUIPEMENTS OU PARTIES DE VÉHICULES, NON PRÉVUS AILLEURS Équipements ou systèmes pour interdire ou signaler l’usage non autorisé ou le vol de véhicules agissant sur des systèmes ou des équipements de véhicules, p.ex. sur les portes, les sièges ou les pare-brises
B60R 16/037 - Circuits électriques ou circuits de fluides spécialement adaptés aux véhicules et non prévus ailleurs; Agencement des éléments des circuits électriques ou des circuits de fluides spécialement adapté aux véhicules et non prévu ailleurs électriques pour le confort des occupants
B60R 25/24 - Moyens pour enclencher ou arrêter le système antivol par des éléments d’identification électroniques comportant un code non mémorisé par l’utilisateur
G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
In some examples, a first device receives a stream of application audio data, encodes the stream of application audio data, and in response to detecting an end of the stream of application audio data, provides pre-encoded filler audio data from a buffer in the first device as an encoded stream of filler audio data. The first device transmits the encoded stream of application audio data and the encoded stream of filler audio data in an encoded output data stream over a transport to a second device.
In some examples, a first wireless device transmits, within a first band designated for vehicle-related communications, service information for a service, the service information comprising information of a channel in a second band for communication of data of the service, the second band being outside of the first band.
H04W 48/10 - Distribution d'informations relatives aux restrictions d'accès ou aux accès, p.ex. distribution de données d'exploration utilisant des informations radiodiffusées
H04W 12/069 - Authentification utilisant des certificats ou des clés pré-partagées
10.
METHOD AND SYSTEM FOR PROVIDING DATA SECURITY FOR MICRO-SERVICES ACROSS DOMAINS
A method at a network element for securely sharing services across domains, the method including receiving a request at the network element to add a first domain and an edge domain to a system; provisioning a public key of the network element to the first domain and the edge domain; receiving a public key of the first domain; populating, in the network element, a table with services provided by the first domain or the edge domain; populating, in the network element, a second table with applications installed at the first domain or edge domain and permissions for services for the applications; and controlling access to the services by the applications.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 67/63 - Ordonnancement ou organisation du service des demandes d'application, p.ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises en acheminant une demande de service en fonction du contenu ou du contexte de la demande
H04L 67/12 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p.ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance
H04W 4/44 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons pour la communication entre véhicules et infrastructures, p.ex. véhicule à nuage ou véhicule à domicile
In an access device associated with a first network cell, a method for enabling user equipment (UE) to obtain a service unavailable through the first network cell includes receiving a request for the UE to access the service, and identifying, in a message to the UE, a plurality of second network cells providing the service.
A method at a sensor apparatus affixed to a transportation asset, the method including detecting a trigger at the sensor apparatus; taking a threshold number of samples of a displacement-related value of the transportation asset over time; determining that a variance of the threshold number of samples exceeds a threshold; analyzing a frequency property based on the threshold number of samples; and based on the frequency property, determining whether the transportation asset is loaded or unloaded.
Methods, devices, and systems for multi-carrier network operation are disclosed. In one embodiment, a method of performing channel scrambling in a multi-carrier network, wherein the multi-carrier network includes a first component carrier (“CC”) and a second CC between a base station and a user equipment (“UE”) comprises receiving a Cell Radio Network Temporary Identifier (“C-RNTI”) and a cell identification (“ID”) for at least one of the first CC and the second CC; and using the RNTI and the cell ID to perform scrambling of information transmitted on at least one of the first CC and the second CC.
H04W 72/0453 - Ressources du domaine fréquentiel, p.ex. porteuses dans des AMDF [FDMA]
H04L 5/00 - Dispositions destinées à permettre l'usage multiple de la voie de transmission
H04W 72/23 - Canaux de commande ou signalisation pour la gestion des ressources dans le sens descendant de la liaison sans fil, c. à d. en direction du terminal
A method for control of data transmission in a wireless communication system includes receiving, by an application, from a modem, information indicative of a radio coverage condition, where a user equipment (UE) includes the application and the modem; based on the received information, determining that the UE is in an enhanced coverage state; and in response to the determining, controlling uplink data transmission by the modem to reduce power consumption of the UE.
H04W 72/21 - Canaux de commande ou signalisation pour la gestion des ressources dans le sens ascendant de la liaison sans fil, c. à d. en direction du réseau
H04W 4/02 - Services utilisant des informations de localisation
H04W 28/02 - Gestion du trafic, p.ex. régulation de flux ou d'encombrement
15.
Methods and Systems for Provisioning Emergency Numbers
There is provided a method and device for provisioning emergency number information on a user equipment. When a dialed number matches an emergency number from the provisioned emergency number information, the user equipment selects either the circuit switched domain or the packet switched domain and executes a call setup procedure for that domain.
A system and method in a user equipment (UE) for transferring an emergency session from a first network to a second network. The method includes transmitting a first registration request message to the second network; receiving a registration reject message from the second network; detecting the emergency session between the UE and the first network is ongoing; transmitting a second registration request message comprising an emergency registration request to the second network; and receiving a registration accept message for the emergency session.
H04W 36/14 - Resélection d'un réseau ou d'une interface hertzienne
H04W 60/00 - Rattachement à un réseau, p.ex. enregistrement; Suppression du rattachement à un réseau, p.ex. annulation de l'enregistrement
H04W 36/00 - Dispositions pour le transfert ou la resélection
H04W 76/50 - Gestion de la connexion pour les connexions d'urgence
H04W 60/04 - Rattachement à un réseau, p.ex. enregistrement; Suppression du rattachement à un réseau, p.ex. annulation de l'enregistrement utilisant des événements déclenchés
H04W 76/18 - Gestion du rejet ou de l'échec de l'établissement
H04W 4/90 - Services pour gérer les situations d’urgence ou dangereuses, p.ex. systèmes d’alerte aux séismes et aux tsunamis
17.
METHODS AND DEVICES FOR BINARY ENTROPY CODING OF POINT CLOUDS
Methods and devices for encoding a point cloud. A bit sequence signaling an occupancy pattern for sub-volumes of a volume is coded using binary entropy coding. Contexts may be based on neighbour configuration and a partial sequence of previously-coded bits of the bit sequence. A determination is made as to whether to apply a context reduction operation and, if so, the operation reduces the number of available contexts. Example context reduction operations include reducing neighbour configurations based on shielding by sub-volumes associated with previously-coded bits, special handling for empty neighbour configurations, and statistics-based context consolidation.
A method for verification at a computing device of a signed message received from a first party over a public communications channel, the method including extracting a message digest “a” belonging to a semigroup from the signed message; obtaining a public key [c,e] for the first party, including a fixed value checker “c” and an endpoint “e”, checker “c” and endpoint “e” belonging to the semigroup and the endpoint comprising a multiplication of a private key “b” for the first party and the checker “c”, multiplying the message digest “a” and the endpoint “e” to create an endmatter “ae”; extracting a signature “d” from the signed message, the signature “d” belonging to the semigroup and being a multiplication of message digest “a” and private key “b”; multiplying the signature “d” and the checker “c” to create a signcheck “dc”; and verifying that the endmatter “ae” matches the signcheck “dc”.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A method for balancing sensors within a sensor system, the method including receiving, at a gateway, data from a plurality of sensors, each of the plurality of sensors being connected to one of a plurality of sensor modules or the gateway; determining, at the gateway, that a signal strength from a first sensor falls below a threshold, the first sensor being one of the plurality of sensors; and based on the determining, allocating the first sensor to connect to a different one of the plurality of sensor modules, or to the gateway if connected to one of the plurality of sensor modules.
H04L 41/0823 - Réglages de configuration caractérisés par les objectifs d’un changement de paramètres, p.ex. l’optimisation de la configuration pour améliorer la fiabilité
H04W 48/00 - Restriction d'accès; Sélection de réseau; Sélection de point d'accès
H04W 4/70 - Services pour la communication de machine à machine ou la communication de type machine
H04W 24/02 - Dispositions pour optimiser l'état de fonctionnement
H04W 40/24 - Gestion d'informations sur la connectabilité, p.ex. exploration de connectabilité ou mise à jour de connectabilité
H04L 67/125 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p.ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance en impliquant la commande des applications des terminaux par un réseau
H04W 40/14 - Sélection d'itinéraire ou de voie de communication, p.ex. routage basé sur l'énergie disponible ou le chemin le plus court sur la base de la qualité d'émission ou de la qualité des canaux sur la base de la stabilité
A method at a computing device for providing vehicle data to a client, the method including receiving a data object at an ingestor block at the computing device, the ingestor block comprising a plurality of ingestor instances capable of interacting with different entities; converting the data object to a frame; providing the frame to a translation stack at the computing device to convert the frame into a normalized message; and providing the normalized message to the client.
Provided are a method for a terminal transmitting uplink control information (UCI) through a physical uplink control channel (PUCCH) in a wireless communication system, and a terminal using the method. A transmission power to be applied to the uplink control channel is determined on the basis of a value subordinate to a PUCCH format, and at least one type of UCI is transmitted from the physical uplink control channel by using the transmission power that is determined, wherein when the PUCCH format is PUCCH format 3, and the at least one type of UCI includes acknowledgement/negative-acknowledgement (ACK/NACK) and periodic channel state information (CSI), the value subordinate to the PUCCH format is determined on the basis of the number of bits of the ACK/NACK and the number of bits of the periodic CSI.
H04L 27/26 - Systèmes utilisant des codes à fréquences multiples
H04W 76/10 - Gestion de la connexion Établissement de la connexion
H04L 5/00 - Dispositions destinées à permettre l'usage multiple de la voie de transmission
H04L 1/00 - Dispositions pour détecter ou empêcher les erreurs dans l'information reçue
H04L 1/1607 - Dispositions pour détecter ou empêcher les erreurs dans l'information reçue en utilisant un canal de retour dans lesquelles le canal de retour transporte des signaux de contrôle, p.ex. répétition de signaux de demande - Détails du signal de contrôle
H04W 52/14 - Analyse séparée de la liaison montante ou de la liaison descendante
H04W 72/21 - Canaux de commande ou signalisation pour la gestion des ressources dans le sens ascendant de la liaison sans fil, c. à d. en direction du réseau
Systems, methods, and software can be used to detect domain name system tunneling (DNST). In some aspects, a method comprises: receiving a plurality of domain name system (DNS) requests to access one or more domains; processing, by using a machine learning model, the plurality of DNS requests to determine one or more suspicious DNS requests among the plurality of DNS requests; and processing, by using a statistical analysis model, the one or more suspicious DNS requests to determine whether the one or more suspicious DNS requests are potentially malicious DNS requests.
Systems, methods, and software can be used to detect anomalies in source code. In some aspects, a method comprises: obtaining, by a server, one or more attribute values associated with one or more code commits of source code; and generating, by the server and based on the one or more attribute values, an anomaly report indicating a risk level of the source code.
Systems, methods, and software can be used to identify security risks in software code based on software bill of materials (SBOM). In some aspects, a method includes: obtaining, by a server, software code and a SBOM corresponding to the software code; identifying, by the server and based on the SBOM, a library used by the software code; and generating, by the server, a risk assessment based on at least one metric corresponding to the library, where the at least one metric is associated with one or more maintainers of the library.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
Methods and systems for monitoring the behavior of a process. A profile of a software module is obtained. An association request is received from a process. The association request includes an identifier. In response to receiving the association request, successfully validating the identifier based on the profile and establishing an association of a token to data associated with the identifier. A disassociation request is received from the process. The disassociation request includes a token. In response to receiving the disassociation request, using the token to retrieve the data associated with the identifier, determining that the disassociation request is invalid based on the profile and the data associated with the identifier, and based on the determination that the disassociation request is invalid, taking an action.
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
G06F 21/52 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données
26.
METHOD AND SYSTEM FOR ADDITION OF ASSURANCE INFORMATION TO V2X MESSAGING
A method at an Intelligent Transportation System (ITS) Entity, the method including receiving a message from a second ITS entity, the message containing a safety assurance indication, and performing an action at the ITS entity based on the safety assurance indication. Further, an ITS Entity comprising a processor; and a communications subsystem, wherein the ITS Entity is configured to: receive a message from a second ITS entity, the message containing a safety assurance indication, and perform an action at the ITS entity based on the safety assurance indication.
H04W 4/40 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons
H04L 67/12 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p.ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance
H04W 4/06 - Répartition sélective de services de diffusion, p.ex. service de diffusion/multidiffusion multimédia; Services à des groupes d’utilisateurs; Services d’appel sélectif unidirectionnel
H04W 12/069 - Authentification utilisant des certificats ou des clés pré-partagées
Systems, methods, and software can be used to detect backdoors in binary software code. In some aspects, a method comprises: obtaining, by a server, binary software code corresponding to source code; generating, by the server, a backdoor abstraction of the binary software code; and generating, by the server, a backdoor risk assessment based on the backdoor abstraction of the binary software code.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
28.
RISK ASSESSMENT BASED ON AUGMENTED SOFTWARE BILL OF MATERIALS
Systems, methods, and software can be used to identify security risks in software code based on Software Bill of Materials (SBOM). In some aspects, a method includes: obtaining, by a server, software code and a SBOM corresponding to the software code; identifying, by the server and based on the SBOM, a library used by the software code; and generating, by the server, a risk assessment based on at least one metric corresponding to the library, where the at least one metric is associated with one or more maintainers of the library.
G06Q 10/08 - Logistique, p.ex. entreposage, chargement ou distribution; Gestion d’inventaires ou de stocks
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
29.
SYSTEM AND METHOD FOR MACHINE LEARNING BASED MALWARE DETECTION
A method comprises obtaining a training set of network data that includes benign network data and malware network data; engaging a feature extraction engine to generate a set of dyads for each source-destination pair in the training set of network data; and training, using the set of dyads, a machine learning engine to differentiate between the benign network data and the malware network data.
Systems and methods for managing data transfers between a secure location and a less secure location. A data transfer checker operating on a mobile device determines whether an attempted data transfer between two locations is permitted. If it is not permitted, then the data transfer is prevented and the user may be notified of the data transfer prevention.
Data is scrambled at a transmitter according to one of a number of predetermined scrambling sequences which are associated with a particular one of a number of predetermined transmit antenna diversity schemes (i.e., a specific number of transmit antenna ports). Received data is decoded using one or more of the known transmit antenna diversity schemes and the scrambled data is descrambled according to a corresponding descrambling sequence (related to the scrambling sequence). Based on the descrambled data, the receiver determines which transmit antenna diversity scheme (i.e., the number of antenna ports) is used by the transmitter. In one specific embodiment, CRC parity data is scrambled in the transmitter and the receiver descrambles the recovered CRC parity data according to a descrambling sequence, computes CRC parity data from the received data, and compares the descrambled CRC parity data to the newly computed CRC parity data.
H04W 72/30 - Gestion des ressources des services de diffusion
H04W 72/0453 - Ressources du domaine fréquentiel, p.ex. porteuses dans des AMDF [FDMA]
H04B 7/06 - Systèmes de diversité; Systèmes à plusieurs antennes, c. à d. émission ou réception utilisant plusieurs antennes utilisant plusieurs antennes indépendantes espacées à la station d'émission
H04L 5/00 - Dispositions destinées à permettre l'usage multiple de la voie de transmission
32.
METHOD AND SYSTEM FOR DATA OBJECT IDENTIFICATION IN VEHICLES
A method at a computing device for finding an association between data objects in a structure, the method including selecting a coordinate location from a grid, the grid defining locations within the structure; finding whether a data object having a data object type is located at the coordinate location; when the data object is located at the coordinate location, associating the data object with other data objects at the coordinate location; and when the data object is not located at the coordinate location: determining through an explicit association that the data object at a second location services the first location; and associating the data object with the coordinate location.
G06V 20/59 - Contexte ou environnement de l’image à l’intérieur d’un véhicule, p.ex. concernant l’occupation des sièges, l’état du conducteur ou les conditions de l’éclairage intérieur
G06V 10/22 - Prétraitement de l’image par la sélection d’une région spécifique contenant ou référençant une forme; Localisation ou traitement de régions spécifiques visant à guider la détection ou la reconnaissance
Uplink control channel resource allocation for an enhanced downlink control channel is disclosed. A first example method disclosed herein includes receiving, at a user equipment (UE), a downlink control channel carrying a physical uplink control channel (PUCCH) resource indicator, mapping the PUCCH resource indicator to a first offset, mapping a position of the downlink control channel to a second offset, and mapping a linear combination of the first and second offsets to an index identifying a first PUCCH resource. A second example method disclosed herein includes, in response to receiving, at a UE, an indication of a dynamic resource offset in an enhanced physical downlink control channel (ePDCCH) transmitted in a first ePDCCH set, determining a position of the ePDCCH and a subframe offset, and processing the indication of the dynamic resource offset, the position and the subframe offset to determine an allocated uplink control channel resource for the UE.
H04W 72/21 - Canaux de commande ou signalisation pour la gestion des ressources dans le sens ascendant de la liaison sans fil, c. à d. en direction du réseau
H04W 72/23 - Canaux de commande ou signalisation pour la gestion des ressources dans le sens descendant de la liaison sans fil, c. à d. en direction du terminal
H04L 5/00 - Dispositions destinées à permettre l'usage multiple de la voie de transmission
34.
INDIVIDUALIZED AUTOMATIC AUDIO SYSTEM ADJUSTMENT USING INTEGRATED MICROPHONES
Systems and methods are disclosed for identifying at least one cause of noise in a vehicle audio system. The vehicle audio system may include a plurality of audio channels. Acoustic output may be generated and received through each of the audio channels. Acoustic input may be received from one or more of the audio channels and may be processed to generate processed acoustic input. The processed acoustic input may include a frequency response of the acoustic input. The processed acoustic input may be compared to corresponding channel target input and at least one deviation may be determined. A cause of the at least one deviation may then be determined based on a relationship between the at least one deviation and a set of resolved indications of cause, each of the set of resolved indications of cause corresponding to at least one of a set of recorded causes.
G10K 11/178 - Procédés ou dispositifs de protection contre le bruit ou les autres ondes acoustiques ou pour amortir ceux-ci, en général utilisant des effets d'interférence; Masquage du son par régénération électro-acoustique en opposition de phase des ondes acoustiques originales
A method of processing data for a driving automation system, the method comprising steps of: obtaining sound data from a microphone of an autonomous vehicle; processing the sound data to obtain a sound characteristic; and updating a context of the autonomous vehicle based on the sound characteristic.
A method of generating a display object is provided, the method comprising operating a first processor comprised within a first device to: execute an application; generate an display object associated with the application; output the active display object on the first device; transmit the display object to a second device for output by the second device; and receive user input to the application via the display object output on the second device.
A method at a sensor apparatus affixed to a transportation asset. The method includes calibrating the sensor apparatus by initiating a vertical impact at the transportation asset, measuring spring oscillation and creating a model of the transportation asset. The method further includes detecting, subsequent to the calibrating, an impact event at the sensor apparatus. The method further includes measuring spring oscillation due to the impact event at the sensor apparatus and using the measured spring oscillation in the model created during calibration to create a load mass estimate for the transportation asset.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for processing event log data. An example event log processing method includes receiving an event log comprising a plurality of event records describing events that have occurred on each of one or more computer systems over a period of time; converting the event log into a graph, comprising: normalizing the plurality of event records, including anonymizing a unique identifier value in each event record and replacing a variable value in each event record with a predetermined value; representing each normalized event record as one or more nodes in the graph; and generating a plurality of event clusters, wherein each event cluster includes an aggregated group of nodes and is generated based on common attributes of and hierarchical relationships between the normalized event records represented by the nodes in the aggregated group.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for processing event log data. An example event log processing method includes receiving an event log comprising a plurality of event records describing events that have occurred on each of one or more computer systems over a period of time; converting the event log into a graph, comprising: normalizing the plurality of event records, including anonymizing a unique identifier value in each event record and replacing a variable value in each event record with a predetermined value; representing each normalized event record as one or more nodes in the graph; and generating a plurality of event clusters, wherein each event cluster includes an aggregated group of nodes and is generated based on common attributes of and hierarchical relationships between the normalized event records represented by the nodes in the aggregated group.
The present disclosure relates to a method and system for managing a meeting session. In accordance with one example, there is provided a method of managing a meeting session on a server that manages the meeting session, the meeting session comprising one or more participant devices and a presenter device. The method comprises receiving one or more break request messages from the participant devices, and sending a break message to the participant devices, the break message causing a break notification to be displayed on a display of the participant devices.
A method for key agreement between a first party and a second party over a public communications channel, the method including selecting, by the first party, from a semigroup, a first value “a”; multiplying the first value “a” by a second value “b” to create a third value “d”, the second value “b” being selected from the semigroup; sending the third value “d” to the second party; receiving, from the second party, a fourth value “e”, the fourth value comprising the second value “b” multiplied by a fifth value “c” selected by the second party from the semigroup; and creating a shared secret by multiplying the first value “a” with the fourth value “e”, wherein the shared secret matches the third value “d” multiplied by the fifth value “c”.
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for processing event log data. An example event log processing method includes receiving an event log comprising a plurality of event records describing events that have occurred on each of one or more computer systems over a period of time; converting the event log into a graph, comprising: normalizing the plurality of event records, including anonymizing a unique identifier value in each event record and replacing a variable value in each event record with a predetermined value; representing each normalized event record as one or more nodes in the graph; and generating a plurality of event clusters, wherein each event cluster includes an aggregated group of nodes and is generated based on common attributes of and hierarchical relationships between the normalized event records represented by the nodes in the aggregated group.
A method at a sensor module within a sensor system for communicating with a gateway, the method including storing a timing profile for communications with the gateway; waking a radio core of the sensor module at a threshold time prior to a beacon signal being expected from the gateway; sampling a channel for the beacon signal at the radio core; if the beacon signal is detected: waking a processor on the sensor module; exchanging communication with the gateway; and powering down the processor and radio core upon completion of the exchanging communication.
In some examples, a system receives data relating to an environment of a vehicle. Based on the received data, the system initiates a vehicle preparation action by actuating an adjustable component of the vehicle, the vehicle preparation action to ready the vehicle for a user prior to operation of the vehicle.
B60W 50/00 - COMMANDE CONJUGUÉE DE PLUSIEURS SOUS-ENSEMBLES D'UN VÉHICULE, DE FONCTION OU DE TYPE DIFFÉRENTS; SYSTÈMES DE COMMANDE SPÉCIALEMENT ADAPTÉS AUX VÉHICULES HYBRIDES; SYSTÈMES D'AIDE À LA CONDUITE DE VÉHICULES ROUTIERS, NON LIÉS À LA COMMANDE D'UN SOUS-ENSEMBLE PARTICULIER - Détails des systèmes d'aide à la conduite des véhicules routiers qui ne sont pas liés à la commande d'un sous-ensemble particulier
B60S 1/02 - Nettoyage des pare-brise, fenêtres ou dispositifs optiques
B60W 60/00 - Systèmes d’aide à la conduite spécialement adaptés aux véhicules routiers autonomes
45.
Notifications and Graphical User Interface for Applications in Folders
A method at an electronic device having a display, the method including displaying a user interface on the display, wherein the user interface includes at least one folder icon for a folder, the folder including at least two applications; determining that at least two applications in the folder have at least one notification and at least one application in the folder has more than one notification; and appending, to the folder icon, a badge having a number, wherein the number represents a number of applications in the folder having notifications.
A method includes displaying information associated with an application on an electronic device, providing a visual notification of a received communication, and detecting a gesture. In response to detecting the gesture, a first part of an inbox is displayed while reducing display of the information, including at least partially displaying information associated with the received communication. Based on a characteristic of the gesture, providing the visual notification is discontinued.
G06F 3/04883 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p.ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p.ex. des gestes en fonction de la pression exer utilisant un écran tactile ou une tablette numérique, p.ex. entrée de commandes par des tracés gestuels pour l’entrée de données par calligraphie, p.ex. sous forme de gestes ou de texte
G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
H04M 1/7243 - Interfaces utilisateur spécialement adaptées aux téléphones sans fil ou mobiles avec des moyens de soutien local des applications accroissant la fonctionnalité avec des moyens interactifs de gestion interne des messages
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport
G06F 3/04817 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport utilisant des icônes
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
47.
METHOD AND SYSTEM FOR PROVISIONING DEVICE SPECIFIC WLAN CREDENTIALS
A method at an electronic device, the method including initiating authentication with a network through a network element; providing a configuration request, the configuration request including an attribute set for the electronic device; and receiving a configuration response, the configuration response including a certificate or credential for future authentication with the network.
In some examples, a source device categorizes a plurality of messages for transmission to a recipient device, the plurality of messages comprising vehicle-related information. Based on the categorizing, the source device identifies selected messages of the plurality of messages to be aggregated. The source device aggregates the selected messages into a single transmission from the source device to the recipient device.
H04W 4/44 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons pour la communication entre véhicules et infrastructures, p.ex. véhicule à nuage ou véhicule à domicile
49.
METHOD AND SYSTEM FOR ESTABLISHING TRUST FOR A CYBERSECURITY POSTURE OF A V2X ENTITY
A method at an Intelligent Transportation System (ITS) Transmitting Entity, the method including: generating an ITS message; augmenting the ITS message with an Integrity Report generated by an integrity detection function at the ITS Transmitting Entity to create an augmented ITS message; signing the augmented ITS message with an Authorization Certificate or Ticket, the Authorization Certificate or Ticket including an assurance indication from an Audit Certificate Authority for the integrity detection function; and sending the signed, augmented ITS message to an ITS Receiving Entity.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A method and apparatus for improved battery performance of user equipment in a wireless network having multiple radio resource control (RRC) states, the method comprising the steps of: monitoring, at the user equipment, application data exchange; determining when no application on the user equipment is expected to exchange data; and initiating, from the user equipment, a transition to a less battery demanding radio resource control state or mode.
A method at a computing device within an Intelligent Transportation System, the method comprising: determining, at the computing device, whether a short-term certificate is available to sign a message; if the short-term certificate is available, signing the message with a private key associated with the short-term certificate; if the short-term certificate is not available, signing the message with a private key associated with a long-term certificate; and sending the message to a recipient.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04W 4/40 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons
H04L 67/12 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p.ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance
52.
METHOD AND APPARATUS FOR DYNAMIC SESSION PLACEHOLDER FOR MESSAGE USER INTERFACE
A method and apparatus for representing a conversation of related messages is provided. In a message collection user interface for displaying messages sent and received by a communications device, a dynamic session placeholder is used for a respective conversation of related messages. The message collection user interface is displayed including any dynamic session placeholders in the list of messages. As messages from the conversation are occasioned, the dynamic session placeholder is updated. When the message collection is displayed, it is displayed in accordance with the updated session placeholder.
G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p.ex. des menus
G06Q 10/107 - Gestion informatisée du courrier électronique
H04L 51/216 - Gestion de l'historique des conversations, p.ex. regroupement de messages dans des sessions ou des fils de conversation
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
H04L 51/04 - Messagerie en temps réel ou quasi en temps réel, p.ex. messagerie instantanée [IM]
In some examples, a system detects an accident involving a first vehicle, where the detecting is based on an accident indication received by the service over a network from a second vehicle not involved in the accident, the second vehicle different from the first vehicle, and where the accident indication from the second vehicle is responsive to messages received by the second vehicle from other vehicles. In response to the detecting of the accident, the system verifies that the accident occurred by sending, from the service, queries to a roadside unit and a third vehicle, and receiving, at the service, responses to the queries from the roadside unit and the third vehicle, the responses containing event data collected by the roadside unit and the third vehicle of events in a vicinity of the accident.
G08G 1/01 - Détection du mouvement du trafic pour le comptage ou la commande
H04W 4/90 - Services pour gérer les situations d’urgence ou dangereuses, p.ex. systèmes d’alerte aux séismes et aux tsunamis
H04W 4/40 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons
G07C 5/00 - Enregistrement ou indication du fonctionnement de véhicules
In some examples, in response to determining that a new communication channel is required, a wireless device retrieves information provided from a network node of availability of alternative communication channels for the wireless device. In response to retrieving information that a second communication channel is available for a location within which the wireless device is located, the wireless device removes wireless device specific information and initiates a request to connect to the second communication channel, where the second communication channel is in a frequency range different from a frequency range of the first communication channel.
H04W 48/16 - Exploration; Traitement d'informations sur les restrictions d'accès ou les accès
H04W 24/10 - Planification des comptes-rendus de mesures
H04W 72/0453 - Ressources du domaine fréquentiel, p.ex. porteuses dans des AMDF [FDMA]
H04W 74/08 - Accès non planifié, p.ex. accès aléatoire, ALOHA ou accès multiple par détection de porteuse [CSMA Carrier Sense Multiple Access]
H04W 72/542 - Critères d’affectation ou de planification des ressources sans fil sur la base de critères de qualité en utilisant la qualité mesurée ou perçue
H04W 84/12 - Réseaux locaux sans fil [WLAN Wireless Local Area Network]
A method at a computing device within an Intelligent Transportation System, the method including detecting a traffic event at the computing device; determining no fixed roadside unit is available from the computing device; establishing an Internet Protocol connection from the computing device to a network node; and sending a traffic event message from the computing device to the network node, the traffic event message providing information for the traffic event.
G08G 1/0967 - Systèmes impliquant la transmission d'informations pour les grands axes de circulation, p.ex. conditions météorologiques, limites de vitesse
A method at a computing device within an asset management system, the method including receiving a leasing indication at the computing device, the leasing indication providing at least one asset in the asset management system is leased to a lessee; duplicating an asset record for each of the at least one asset, created a duplicated record; assigning a policy based on the lessee to the duplicated record; and providing a pointer within the asset record to the duplicated record.
In some examples, a controller receives information of a route of a vehicle, and selects a first parameter set from among a plurality of parameter sets based on the route of the vehicle, the plurality of parameter sets corresponding to different conditions of usage of the vehicle, where each parameter set of the plurality of parameter sets includes one or more parameters that control adjustment of one or more respective adjustable elements of the vehicle. The controller causes application of the first parameter set to control a setting of the one or more adjustable elements of the vehicle.
B60W 50/00 - COMMANDE CONJUGUÉE DE PLUSIEURS SOUS-ENSEMBLES D'UN VÉHICULE, DE FONCTION OU DE TYPE DIFFÉRENTS; SYSTÈMES DE COMMANDE SPÉCIALEMENT ADAPTÉS AUX VÉHICULES HYBRIDES; SYSTÈMES D'AIDE À LA CONDUITE DE VÉHICULES ROUTIERS, NON LIÉS À LA COMMANDE D'UN SOUS-ENSEMBLE PARTICULIER - Détails des systèmes d'aide à la conduite des véhicules routiers qui ne sont pas liés à la commande d'un sous-ensemble particulier
B60W 40/02 - Calcul ou estimation des paramètres de fonctionnement pour les systèmes d'aide à la conduite de véhicules routiers qui ne sont pas liés à la commande d'un sous-ensemble particulier liés aux conditions ambiantes
G07C 5/02 - Enregistrement ou indication du temps de circulation, de fonctionnement, d'arrêt ou d'attente uniquement
G07C 5/08 - Enregistrement ou indication de données de marche autres que le temps de circulation, de fonctionnement, d'arrêt ou d'attente, avec ou sans enregistrement des temps de circulation, de fonctionnement, d'arrêt ou d'attente
58.
System and method for determining trust for SIP messages
A method for performing initial registration is provided. The method includes receiving a server timeout message, the server timeout message including at least a field set to a value equal to a value received during a first registration. The method further includes initiating restoration procedures by performing an initial registration.
H04L 65/1104 - Protocole d'initiation de session [SIP]
H04L 65/403 - Dispositions pour la communication multipartite, p.ex. pour les conférences
H04L 65/611 - Diffusion en flux de paquets multimédias pour la prise en charge des services de diffusion par flux unidirectionnel, p.ex. radio sur Internet pour la multidiffusion ou la diffusion
H04L 69/22 - Analyse syntaxique ou évaluation d’en-têtes
H04L 69/40 - Dispositions, protocoles ou services de réseau indépendants de la charge utile de l'application et non couverts dans un des autres groupes de la présente sous-classe pour se remettre d'une défaillance d'une instance de protocole ou d'une entité, p.ex. protocoles de redondance de service, état de redondance de protocole ou redirection de service de protocole
G06F 3/12 - Sortie numérique vers une unité d'impression
G06F 11/20 - Détection ou correction d'erreur dans une donnée par redondance dans le matériel en utilisant un masquage actif du défaut, p.ex. en déconnectant les éléments défaillants ou en insérant des éléments de rechange
H04L 67/1095 - Réplication ou mise en miroir des données, p.ex. l’ordonnancement ou le transport pour la synchronisation des données entre les nœuds du réseau
H04L 101/385 - Identificateur de ressource uniforme pour le protocole d'ouverture de session [URI SIP]
59.
STORED IMAGE PRIVACY VIOLATION DETECTION METHOD AND SYSTEM
Methods and systems for detecting a privacy violation in an image file. A policy to be used by a master imaging application is obtained and a file system is monitored for a digital image modified by a monitored imaging application. It is then determined that the digital image file includes at least some content in violation of a defined setting for the master imaging application and, based on the determination that the digital image file includes at least some content in violation of the defined setting for the master imaging application, taking an action.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
G06F 18/21 - Conception ou mise en place de systèmes ou de techniques; Extraction de caractéristiques dans l'espace des caractéristiques; Séparation aveugle de sources
G06F 18/22 - Critères d'appariement, p.ex. mesures de proximité
60.
SYSTEM AND METHOD FOR SUPPORTING INTER-BAND CARRIER AGGREGATION WITH DIFFERENT UL/DL TDD CONFIGURATIONS
In some implementations, a method of wireless communications between a wireless communications network and wireless user equipment includes receiving, using a primary Time Division Duplex (TDD) configuration, data on a primary component carrier in a first frequency band. Using a secondary TDD configuration, data on a secondary component carrier is received in a second frequency band different from the first frequency band. A Hybrid Automatic Repeat Request (HARQ) for data received on the secondary component carrier is transmitted using a supplemental TDD configuration. A transmission or retransmission on the secondary component carrier uses a supplemental TDD configuration as well. The supplemental TDD configuration is different from the secondary TDD configuration. Furthermore, an uplink supplemental configuration may be different from a downlink supplemental configuration.
A method in a first wireless communication device for displaying current location information representing a current location of a second wireless communication device. The method entails, from within a communication application executing on a processor of the first wireless communication device, receiving the current location information representing the current location of the second wireless communication device, performing a reverse look-up of the received current location of the second wireless communication device to determine address information, displaying a map from within the communication application, and identifying the received current location information on the displayed map with a name associated with the determined address information.
Methods and devices for determining whether a mobile device has been compromised. File tree structure information for the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in a portion of memory. The file tree structure information is analyzed to determine that the mobile device has been compromised, has not been compromised, or might be compromised. Based on determining that the mobile device might be compromised, the mobile device is instructed to execute a restricted action. If the restricted action occurs on the mobile device then it is determined that the mobile device has been compromised. Based on that determination, an action is taken.
Systems and methods for determining a presence of cargo within a container are described. The determination may comprise transmitting a first electromagnetic signal within the container and receiving a first reflected electromagnetic signal corresponding to the first electromagnetic signal. The first reflected electromagnetic signal may be converted into a set of first magnitude values corresponding to a set of bin values representing a respective distance from the radar device. The first magnitude values may be integrated, using a moving window, over successive subranges of bin values to produce a set of integrated magnitude values. A set of integrated base magnitude values may be subtracted from the set of integrated magnitude values to produce a set of normalized integrated magnitude values. A presence of cargo within the container may then be determined by comparing each of the normalized integrated magnitude values with corresponding threshold values.
G01S 7/41 - DÉTERMINATION DE LA DIRECTION PAR RADIO; RADIO-NAVIGATION; DÉTERMINATION DE LA DISTANCE OU DE LA VITESSE EN UTILISANT DES ONDES RADIO; LOCALISATION OU DÉTECTION DE LA PRÉSENCE EN UTILISANT LA RÉFLEXION OU LA RERADIATION D'ONDES RADIO; DISPOSITIONS ANALOGUES UTILISANT D'AUTRES ONDES - Détails des systèmes correspondant aux groupes , , de systèmes selon le groupe utilisant l'analyse du signal d'écho pour la caractérisation de la cible; Signature de cible; Surface équivalente de cible
G06Q 10/08 - Logistique, p.ex. entreposage, chargement ou distribution; Gestion d’inventaires ou de stocks
64.
METHODS AND DEVICES FOR SELECTING OBJECTS IN IMAGES
Methods and devices for manipulating an image are described. The method comprises receiving image data, the image data including a first image obtained from a first camera and a second image obtained from a second camera, the first camera and the second camera being oriented in a common direction; identifying one or more boundaries of an object in the image data by analyzing the first image and the second image; and displaying a manipulated image based on the image data, wherein the manipulated image includes manipulation of at least a portion of the first image based on boundaries of the object.
H04N 13/239 - Générateurs de signaux d’images utilisant des caméras à images stéréoscopiques utilisant deux capteurs d’images 2D dont la position relative est égale ou en correspondance à l’intervalle oculaire
G06T 11/60 - Edition de figures et de texte; Combinaison de figures ou de texte
H04N 13/286 - Générateurs de signaux d’images offrant des modes monoscopiques et stéréoscopiques indépendants
G06T 19/20 - Transformation de modèles ou d'images tridimensionnels [3D] pour infographie Édition d'images tridimensionnelles [3D], p.ex. modification de formes ou de couleurs, alignement d'objets ou positionnements de parties
65.
METHOD AND SYSTEM FOR MOVING STATUS DETECTION FOR A SENSOR APPARATUS
A method at a sensor apparatus, the method including calculating a value for a target function based on at least one sensor of the sensor apparatus; determining that the value of the target function is within a defined threshold range for a defined time period, thereby finding an in-flight state for the sensor apparatus; and turning off transmission from a radio of the sensor apparatus based on the in-flight state.
H04Q 9/00 - Dispositions dans les systèmes de commande à distance ou de télémétrie pour appeler sélectivement une sous-station à partir d'une station principale, sous-station dans laquelle un appareil recherché est choisi pour appliquer un signal de commande ou
G01P 15/14 - Mesure de l'accélération; Mesure de la décélération; Mesure des chocs, c. à d. d'une variation brusque de l'accélération en utilisant un gyroscope
G01P 1/00 - MESURE DES VITESSES LINÉAIRES OU ANGULAIRES, DE L’ACCÉLÉRATION, DE LA DÉCÉLÉRATION OU DES CHOCS; INDICATION DE LA PRÉSENCE OU DE L’ABSENCE D’UN MOUVEMENT; INDICATION DE LA DIRECTION D’UN MOUVEMENT - Parties constitutives des instruments
A method at a vehicle computing device for identifying a driver, the method including receiving a first indicator at the vehicle computing device; obtaining, based on the first indicator, a presumed driver identity; receiving at least one second indicator at the vehicle computing device; and verifying the presumed driver identity using the at least one second indicator.
B60R 25/24 - Moyens pour enclencher ou arrêter le système antivol par des éléments d’identification électroniques comportant un code non mémorisé par l’utilisateur
B60R 25/045 - VÉHICULES, ÉQUIPEMENTS OU PARTIES DE VÉHICULES, NON PRÉVUS AILLEURS Équipements ou systèmes pour interdire ou signaler l’usage non autorisé ou le vol de véhicules agissant sur des systèmes ou des équipements de véhicules, p.ex. sur les portes, les sièges ou les pare-brises agissant sur le système de propulsion, p.ex. le moteur ou le moteur d’entraînement en limitant ou en coupant l’alimentation électrique du système de propulsion
B60R 25/08 - VÉHICULES, ÉQUIPEMENTS OU PARTIES DE VÉHICULES, NON PRÉVUS AILLEURS Équipements ou systèmes pour interdire ou signaler l’usage non autorisé ou le vol de véhicules agissant sur des systèmes ou des équipements de véhicules, p.ex. sur les portes, les sièges ou les pare-brises en agissant sur les freins ou les systèmes de freinage
B60R 25/10 - VÉHICULES, ÉQUIPEMENTS OU PARTIES DE VÉHICULES, NON PRÉVUS AILLEURS Équipements ou systèmes pour interdire ou signaler l’usage non autorisé ou le vol de véhicules actionnant un dispositif d’alarme
B60R 25/102 - VÉHICULES, ÉQUIPEMENTS OU PARTIES DE VÉHICULES, NON PRÉVUS AILLEURS Équipements ou systèmes pour interdire ou signaler l’usage non autorisé ou le vol de véhicules actionnant un dispositif d’alarme un signal étant envoyé vers un lieu distant, p.ex. signal radio transmis à un poste de police, à une entreprise de sécurité ou au propriétaire du véhicule
B60R 25/31 - Détection relative au vol ou autres événements relatifs aux systèmes antivol de présence humaine à l’intérieur ou à l’extérieur du véhicule
B60R 25/34 - Détection relative au vol ou autres événements relatifs aux systèmes antivol de l’état des composants du véhicule, p.ex. des fenêtres, des serrures des portes ou des appareils de sélection de changement de vitesse
A continuous authentication system and related methods are provided. The system detects requests to perform user actions. A security value is associated with each user action. The system determines a subsequent session security level in response to an adjustment to a session security level by a security value of a requested user action. The requested user action is permitted and the session security level is adjusted based on the security value of the requested user action in response to a determination by the system that the subsequent session security level is greater than or equal to a threshold session security level. A user authentication challenge is caused (e.g., prompted) in response to a determination by the system that the subsequent session security level is less than the threshold session security level. The requested user action is permitted and the session security level is adjusted based on the security value of the requested user action in response to a successful user authentication challenge. The requested user action is rejected in response to an unsuccessful user authentication challenge.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
The present disclosure provides, in an aspect, computer-implemented method for generating data associated with a vehicle event, the method including obtaining vehicle event data for a vehicle event associated with a vehicle; identifying a parameter associated with the vehicle event; emulating the parameter based on simulating the vehicle event with the vehicle event data and a model of the parameter, and extrapolating parameter data based on the simulated vehicle event.
Systems, methods, and software can be used to determine a classification of a network accessible page, for example a web page on Internet. In some aspects, a method comprises receiving, at a gateway, a request for accessing a network accessible page from an end-user device; processing the network accessible page to generate a first embedding that characterizes network attributes of a domain of the network accessible page, and a second embedding that characterizes content attributes of the network accessible page; generating, from the first embedding, a first score that characterizes a predicted similarity between the network accessible page and one or more known network accessible pages; generating, from the second embedding, a second score that characterizes a predicted likelihood that the network accessible page is asking for sensitive information; and using at least the first score and the second score to determine a classification of the network accessible page.
Methods and systems for fingerprinting a malicious behavior. In a first stage of training, a coarse machine learning one-class classifier is trained to detect a first dataset of events, the first dataset of events including a dataset of events representing a malicious behavior and a dataset of events representing non-malicious behavior and a benign machine learning one-class classifier is trained to detect a second dataset of events, the second dataset of events excluding the dataset of events representing malicious activity. An ensemble of models including the benign and coarse machine learning one-class classifiers is applied to the first dataset of events to create a third training set representing the malicious behavior for a second stage of training. A final machine learning one-class classifier is trained in the second stage of training using the third training set. The final machine learning one-class classifier represents a fingerprint of the malicious behavior.
A method at a module within a sensor system for updating a timing profile, the method including: turning on a radio of the sensor module for a first time duration; detecting signals from other modules within the sensor system; for each signal, storing data comprising a time such signal is received and an identifier for a module sending such signal; sending the data to a server; and receiving the timing profile from the server.
H04W 72/23 - Canaux de commande ou signalisation pour la gestion des ressources dans le sens descendant de la liaison sans fil, c. à d. en direction du terminal
72.
Exchange and use of globally unique device identifiers for circuit-switched and packet switched integration
According to one aspect, a system and method of exchanging GRUUs (Globally Routed User Agent URI (Uniform Resource Identifier)) between a first telephony-enabled device and a second telephony enabled device using a circuit-switched message is provided. Once exchanged, the telephony enabled devices can exchange SIP (session initiated protocol) communications routed by the GRUUs. Any one of the telephony-enabled devices can add a media component to the SIP communications. According to another aspect, a system and method of generating GRUUs is provided. According to another aspect, a system and method of handing off communications to a packet switched network from a circuit switched network is provided.
H04L 41/084 - Configuration en utilisant des informations préexistantes, p.ex. en utilisant des gabarits ou en copiant à partir d’autres éléments
H04M 7/00 - Dispositions d'interconnexion entre centres de commutation
H04W 4/12 - Messagerie; Boîtes aux lettres; Annonces
H04L 65/1069 - Gestion de session Établissement ou terminaison d'une session
H04L 65/1073 - Enregistrement ou annulation de l’enregistrement
H04L 101/39 - Identificateur de ressource uniforme de l'agent utilisateur URI routable à l'échelle mondiale [GRUU] pour le protocole d’ouverture de session [SIP]
73.
Methods and systems for identifying a compromised device through its unmanaged profile
Methods and devices for determining whether a mobile device has been compromised. The mobile device has a managed portion of memory and an unmanaged portion of memory, a managed profile and an unmanaged profile, and the managed profile includes files stored in the managed portion of memory and the unmanaged profile includes files stored in the unmanaged portion of memory. The managed profile is governed by a device policy set by a remote administrator. File tree structure information for the unmanaged profile of the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in the unmanaged portion of memory. It is determined from the file tree structure information that the mobile device has been compromised and, based on that determination, an action is taken.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
G06F 16/13 - Structures d’accès aux fichiers, p.ex. indices distribués
G06F 16/17 - Systèmes de fichiers; Serveurs de fichiers - Détails d’autres fonctions de systèmes de fichiers
G06F 16/22 - Indexation; Structures de données à cet effet; Structures de stockage
G06F 21/56 - Détection ou gestion de programmes malveillants, p.ex. dispositions anti-virus
74.
METHOD AND SYSTEM FOR FINDING ASSOCIATIONS BETWEEN NATURAL LANGUAGE AND COMPUTER LANGUAGE
A method at a computing device including mapping, within a corpus of documents having both natural language terms and computer language terms, each term as a natural language term or a computer language term, thereby creating mapped terms; and applying at least one Latent Dirichlet Allocation (LDA) model to the mapped terms to create topics that correlate the natural language terms and computer language terms.
Methods and systems for training a neural network. In a first stage of training, a coarse machine learning one-class classifier is trained using a first training set including a signal and noise and a noise machine learning one-class classifier is trained using a second training set excluding the signal. An assembly of models including the noise machine learning one-class classifier and the coarse machine learning one-class classifier is applied to the first training set to create a third training set representing the signal for a second stage of training. A final machine learning one-class classifier is trained in the second stage of training using the third training set representing the signal.
A method for reporting power headroom-related information for a plurality of aggregated carriers. The method includes reporting in a bitmap the power headroom-related information for a number of the aggregated carriers that is less than or equal to the total number of aggregated carriers, wherein the power headroom-related information is one of a power headroom for at least one of the aggregated carriers and a path loss for at least one of the aggregated carriers.
H04W 52/36 - Commande de puissance d'émission [TPC Transmission power control] utilisant les limitations de la quantité totale de puissance d'émission disponible avec une plage ou un ensemble discrets de valeurs, p.ex. incrément, variation graduelle ou décalages
H04L 5/00 - Dispositions destinées à permettre l'usage multiple de la voie de transmission
H04W 52/24 - Commande de puissance d'émission [TPC Transmission power control] le TPC étant effectué selon des paramètres spécifiques utilisant le rapport signal sur parasite [SIR Signal to Interference Ratio] ou d'autres paramètres de trajet sans fil
H04W 52/34 - Gestion du TPC, c. à d. partage de la quantité limitée de puissance entre les utilisateurs ou les canaux ou encore les types de données, p.ex. charge des cellules
H04W 72/20 - Canaux de commande ou signalisation pour la gestion des ressources
H04W 72/21 - Canaux de commande ou signalisation pour la gestion des ressources dans le sens ascendant de la liaison sans fil, c. à d. en direction du réseau
H04W 76/10 - Gestion de la connexion Établissement de la connexion
77.
DETECTING SOFTWARE VULNERABILITIES IN A BINARY CODE
Systems, methods, and software can be used to detect software errors in a binary code. In some aspects, a method comprises: obtaining a binary code; generating a base memory-write profile for the binary code, wherein the base memory-write profile comprises a count of memory updates for each of a plurality of memory locations during an execution of the binary code according to a base input; for each of a plurality of test inputs, generating a test memory-write profile for the binary code, wherein the test memory-write profile comprises a count of memory updates for each memory location during an execution of the binary code according to the test input; comparing the base memory-write profile and the plurality of test memory-write profiles; and generating a notification based on the comparison, wherein the notification indicates whether there is a difference between the base memory-write profile and the plurality of test memory-write profiles.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06F 21/54 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par ajout de routines ou d’objets de sécurité aux programmes
78.
Handheld Electronic Device and Associated Method Providing Time Data in a Messaging Environment
An improved handheld electronic device and an associated method are provided in which time data regarding certain aspects of a messaging conversation on a handheld electronic device are made available to a user. Such time data is provided, for instance, in situations where an interruption has occurred during a messaging conversation. Time data can also be provided to a user on demand in certain circumstances.
H04L 51/04 - Messagerie en temps réel ou quasi en temps réel, p.ex. messagerie instantanée [IM]
G06F 15/02 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES Équipement de traitement de données en général commandés manuellement avec entrée par clavier et à calcul commandé par programme incorporé, p.ex. calculettes
H04M 1/72436 - Interfaces utilisateur spécialement adaptées aux téléphones sans fil ou mobiles avec des moyens de soutien local des applications accroissant la fonctionnalité avec des moyens interactifs de gestion interne des messages pour la messagerie textuelle, p.ex. SMS ou courriel
H04L 51/58 - Adaptation des messages pour la communication sans fil
H04L 51/216 - Gestion de l'historique des conversations, p.ex. regroupement de messages dans des sessions ou des fils de conversation
A method at a first device for enabling a device-to-device wireless link, the method detecting whether a presence signal of a second device is received over a first time period, the presence signal of the second device having a time-slot boundary; and if the presence signal of the second device is not detected, initiating a time-slot boundary by the first device including: transmitting a first presence signal of the first device in a selected time-slot; and checking for an acknowledgment to the first presence signal.
H04W 76/14 - Gestion de la connexion Établissement de la connexion Établissement de la connexion en mode direct
H04W 4/70 - Services pour la communication de machine à machine ou la communication de type machine
H04B 7/26 - Systèmes de transmission radio, c. à d. utilisant un champ de rayonnement pour communication entre plusieurs postes dont au moins un est mobile
H04W 8/00 - Gestion de données relatives au réseau
Systems, methods, and software can be used to identify API use in a binary code. In some aspects, a method comprises: obtaining a base memory-write profile description for a binary code, wherein the description comprises: a base memory-write profile for each of a plurality of API calls in the binary code, wherein the base memory-write profile comprises a count of memory updates for each of a plurality of memory locations during an execution of a corresponding API call; receiving an execution request that invokes the binary code; generating an execution memory-write profile for the request, wherein the execution memory-write profile comprises a count of memory updates for each memory location during an execution of the request; determining, based on a comparison between the execution memory-write profile and the base memory-write profiles in the description, an API call corresponding to the request; and generating a notification indicating the determined API call.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06F 21/56 - Détection ou gestion de programmes malveillants, p.ex. dispositions anti-virus
In some examples, a system includes one or more hardware processors, an interrupt service thread to handle an interrupt, and a kernel scheduler to schedule the interrupt service thread as part of a collection of threads to be scheduled.
A container comprising a base portion, the base portion having at least one side support; and at least one end support at each end of the base portion; and a flexible, resilient lid portion, the lid portion configured to be installed to the base portion utilizing the resilience in the lid portion for inserting each end of the lid portion into the at least one end support. Further, a method for installing a flexible, resilient lid to a container, the container comprising a base portion having a side support at each side of the container and an end support at each end of the base portion, the method including bending the lid by applying pressure to each end of the lid; aligning the lid with each end support; and releasing the lid, wherein the lid re-forms into a flat lid within the end supports.
B65B 7/28 - Fermeture de réceptacles ou récipients semi-rigides ou rigides, non déformés par le contenu ou n'en prenant pas la forme, p.ex. boîtes ou cartons en appliquant des fermetures séparées préformées, p.ex. couvercles, capuchons
83.
Methods and devices for binary entropy coding of point clouds
Methods and devices for encoding a point cloud. A bit sequence signaling an occupancy pattern for sub-volumes of a volume is coded using binary entropy coding. Contexts may be based on neighbour configuration and a partial sequence of previously-coded bits of the bit sequence. A determination is made as to whether to apply a context reduction operation and, if so, the operation reduces the number of available contexts. Example context reduction operations include reducing neighbour configurations based on shielding by sub-volumes associated with previously-coded bits, special handling for empty neighbour configurations, and statistics-based context consolidation.
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and including an indication of the security level in a header of the message. The message is then sent to a recipient.
In some examples, a system includes a kernel scheduler to schedule, for execution, threads to run in an address space of an operating system (OS) kernel according to respective priorities associated with the threads, where each thread of the threads has a user persona and a kernel persona. The kernel scheduler switches each respective thread of the threads to the kernel persona of the respective thread in response to scheduling the respective thread for execution responsive to a kernel call from the respective thread. The kernel scheduler preempts a thread in the kernel persona of the thread that is actively executing in response to an event.
In some examples, a system includes an operating system (OS) kernel, one or more hardware processors, and a kernel scheduler. The kernel scheduler receives a first indication that a first thread is to wait for an event, receives a second indication that the first thread has transitioned to a blocked state in which the first thread is blocked on the event, and receives a third indication from a second thread delivering the event, the third indication to unblock the first thread. In response to the third indication, the kernel scheduler causes a transition of the first thread from the wait state to an active state if the first thread is in the wait state and has not yet transitioned to the blocked state, and causes a transition of the first thread from the blocked state to a ready state if the first thread is in the blocked state.
In some examples, a system includes a plurality of processors and a kernel scheduler. The kernel scheduler associates each respective processor of the plurality of processors with a collection of clusters, wherein each cluster of the collection of clusters represents a respective different subset of the plurality of processors, and the respective processor is a member of each cluster of the collection of clusters. For each corresponding cluster of the collection of clusters, the kernel scheduler maintains a data structure associated with a ready queue of the kernel scheduler, the data structure comprising elements representing thread priorities, wherein an element of the data structure is associated with an ordered list of threads in the ready queue.
A method for key agreement between a first party and a second party over a public communications channel, the method including selecting, by the first party, a first value “a”; multiplying the first value “a” by a second value “b” using Knuth multiplication to create a third value “d”, the third value “d” being a semistandard tableau; sending the third value “d” to the second party; receiving, from the second party, a fourth value “e”, the fourth value being a second semistandard tableau comprising the second value “b” multiplied by a fifth value “c” selected by the second party; and creating a shared secret by multiplying the first value “a” with the fourth value “e” using Knuth multiplication, wherein the shared secret matches the third value “d” multiplied by the fifth value “c” using Knuth multiplication.
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
89.
METHODS AND DEVICES USING DIRECT CODING IN POINT CLOUD COMPRESSION
Methods and devices for coding point clouds using direct coding mode to code coordinates of a point within a sub-volume associated with a current node instead of a pattern of occupancy for child nodes. Eligibility for use of direct coding is based on occupancy data from another node. If eligible, then a flag is represented in the bitstream to signal whether direct coding is applied to points in the sub-volume or not.
A waterproof container is provided, the waterproof container including a base portion, the base portion having a base; an outer wall extending from the base; and an inner wall disposed inwardly from the outer wall, thereby forming a channel between the inner wall and the outer wall; and a lid portion, the lid portion having: a slot within the lid portion; and a seal configured to fit within the slot, the seal including a groove therein, wherein the groove of the seal is configured to accept an end of the inner wall therein when the lid portion is affixed to the base portion.
A method and system to signal transmission layers or dedicated reference signal ports to be used in a multiple input multiple output system, the method including providing a downlink control signal containing information for transmission layers or dedicated reference signal ports utilized, the dedicated reference signal ports being associated with the transmission layers; and using the information to demodulate data on each transmission layer.
H04W 72/23 - Canaux de commande ou signalisation pour la gestion des ressources dans le sens descendant de la liaison sans fil, c. à d. en direction du terminal
In an access device associated with a first network cell, a method for enabling user equipment (UE) to obtain a service unavailable through the first network cell includes receiving a request for the UE to access the service, and identifying, in a message to the UE, a plurality of second network cells providing the service.
A method at an analytics module on a computing device, the analytics module being at a tier within a hierarchy of analytics modules and data sources, the method including receiving a first data set from a data source or a lower tier analytics module; analyzing the first data set to create a second data set; providing the second data set to at least one higher tier analytics module, the second data set being derived from the first data set; and providing at least one of an inference and an interdiction to the lower tier analytics module
A method at a computing device, the method including receiving, at the computing device, sensor data from a data source; converting, at a playback tool on the computing device, the sensor data into converted data, thereby bypassing abstraction layers at the computing device; and providing the converted data to at least one synthetic sensor on the computing device, wherein each of the at least one synthetic sensor provides an insight regarding operation of the computing device.
H04N 21/414 - Plate-formes spécialisées de client, p.ex. récepteur au sein d'une voiture ou intégré dans un appareil mobile
H04N 21/2387 - Traitement de flux en réponse à une requête de reproduction par un utilisateur final, p.ex. pour la lecture à vitesse variable ("trick play")
H04N 21/426 - Structure de client; Structure de périphérique de client Éléments internes de client
96.
METHOD AND SYSTEM FOR SIGNALING COMMUNICATION CONFIGURATION FOR IOT DEVICES USING MANUFACTURER USAGE DESCRIPTION FILES
A method at a network element for configuration for Internet of Things (IoT) devices using manufacturer usage description (MUD) files, the method including receiving at least one MUD Uniform Resource Locator (URL) from an IoT Device; sending, from the network element to at least one MUD Server based on the MUD URL, a Uniform Resource Indicator; responsive to the sending, receiving a plurality of MUD files from the MUD server; creating a plurality of policies from the plurality of MUD files, the plurality of policies corresponding to a normal mode of operation and a secondary mode of operation; and forwarding the plurality of policies to a gateway from the network element.
Example methods, apparatus, articles of manufacture and systems for providing secondary coverage in a mobile communication system are disclosed. Example methods for a first device to provide secondary coverage in a mobile communication system include transmitting a secondary coverage signal and receiving a presence indication from a second device. Such example methods can also include reporting the presence indication to an access node of the mobile communication system. Such example methods can further include receiving information from the access node to enable relay node functionality in the first device in response to reporting the presence indication to the access node.
The present disclosure provides, in an aspect, a computer-implemented method for modifying vehicle settings for a vehicle, the method comprising identifying a vehicle occupant having a personalized set of vehicle settings for the vehicle, identifying a condition modifier associated with the vehicle occupant and the personalized set of vehicle settings, and applying a vehicle setting from the set of vehicle settings based on the condition modifier.
B60R 16/037 - Circuits électriques ou circuits de fluides spécialement adaptés aux véhicules et non prévus ailleurs; Agencement des éléments des circuits électriques ou des circuits de fluides spécialement adapté aux véhicules et non prévu ailleurs électriques pour le confort des occupants
B60W 40/08 - Calcul ou estimation des paramètres de fonctionnement pour les systèmes d'aide à la conduite de véhicules routiers qui ne sont pas liés à la commande d'un sous-ensemble particulier liés aux conducteurs ou aux passagers
B60W 50/08 - Interaction entre le conducteur et le système d'aide à la conduite
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
A method at an asset tracking device, the method including activating a receiver at the asset tracking device; obtaining an intelligent transportation system message using the receiver; determining a position from the intelligent transportation system message; and reporting the determined position to a remote server.
H04W 4/44 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons pour la communication entre véhicules et infrastructures, p.ex. véhicule à nuage ou véhicule à domicile
H04W 4/029 - Services de gestion ou de suivi basés sur la localisation
G01S 5/00 - Localisation par coordination de plusieurs déterminations de direction ou de ligne de position; Localisation par coordination de plusieurs déterminations de distance
H04W 4/02 - Services utilisant des informations de localisation
100.
METHODS AND DEVICES FOR MULTI-POINT DIRECT CODING IN POINT CLOUD COMPRESSION
Methods and devices for coding point clouds using direct coding mode to code coordinates of a point within a sub-volume associated with a current node instead of a pattern of occupancy for child nodes. When direct coding is applied to two or more points in the sub-volume, the points are ordered based on one of their respective coordinate values and pairwise coding of those coordinate values is carried out on a bit-by-bit basis. The pairwise coding includes coding whether the bits are the same and, if so, the bit value.