A method at a network element for securely sharing services across domains, the method including receiving a request at the network element to add a first domain and an edge domain to a system; provisioning a public key of the network element to the first domain and the edge domain; receiving a public key of the first domain; populating, in the network element, a table with services provided by the first domain or the edge domain; populating, in the network element, a second table with applications installed at the first domain or edge domain and permissions for services for the applications; and controlling access to the services by the applications.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A method at a first domain for obtaining at least one insight from a second domain, the method including registering an application with an anchor in the first domain; providing, from the anchor to the application, a first message signed by the anchor; sending, from the first domain to a network domain, the signed message; receiving, from the network domain, at least one signed token, each of the at least one signed token being for a synthetic sensor on the second domain, where the synthetic sensor provides an insight; sending a request message to the second domain, the request message requesting the insight and including the at least one token; and receiving the insight from a synthetic sensor associated with the at least one token.
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
3.
METHOD AND SYSTEM FOR A CUSTOMIZED LOCAL BUILD ENVIRONMENT IMAGE
A method at a computing device including obtaining a first container image from a host computing device; executing a second container image at the computing device, the executing comprising: starting a container from the first container image, the container being for a development environment on the computing device; and customizing the container for a local environment on the computing device, thereby creating a customized container; and compiling developed code within the customized container.
A method at a first domain for obtaining at least one insight from a second domain, the method including synchronizing a permissions table at the first domain with a master permissions table at a network element; receiving a request for an insight from an application at a bridge in the first domain; confirming an identity of the application; verifying, at the bridge, application permissions using the permissions table at the first domain, the verifying confirming that the application has permission to access the insight; sending a request message from the first domain to the second domain, the request message being signed by a private key of the first domain and requesting the insight; and receiving the insight from the second domain.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
5.
METHOD AND SYSTEM FOR SHARING SENSOR INSIGHTS BASED ON APPLICATION REQUESTS
A method at a first domain for obtaining at least one insight from a second domain, the method including registering an application with an anchor in the first domain; providing, from the anchor to the application, a first message signed by the anchor; sending, from the first domain to a network domain, the signed message; receiving, from the network domain, at least one signed token, each of the at least one signed token being for a synthetic sensor on the second domain, where the synthetic sensor provides an insight; sending a request message to the second domain, the request message requesting the insight and including the at least one token; and receiving the insight from a synthetic sensor associated with the at least one token.
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
6.
METHOD AND SYSTEM FOR INDIRECT SHARING OF SENSOR INSIGHTS
A method at a first domain for obtaining at least one insight from a second domain, the method including synchronizing a permissions table at the first domain with a master permissions table at a network element; receiving a request for an insight from an application at a bridge in the first domain; confirming an identity of the application; verifying, at the bridge, application permissions using the permissions table at the first domain, the verifying confirming that the application has permission to access the insight; sending a request message from the first domain to the second domain, the request message being signed by a private key of the first domain and requesting the insight; and receiving the insight from the second domain.
A method at a network element for securely sharing services across domains, the method including receiving a request at the network element to add a first domain and an edge domain to a system; provisioning a public key of the network element to the first domain and the edge domain; receiving a public key of the first domain; populating, in the network element, a table with services provided by the first domain or the edge domain; populating, in the network element, a second table with applications installed at the first domain or edge domain and permissions for services for the applications; and controlling access to the services by the applications.
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04L 67/12 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p.ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance
8.
Speech Activity Detection Using Dual Sensory Based Learning
A dual sensory input speech detection method includes receiving, at a first time, a first video image input of a conference participant of the video conference and a first audio input of the conference participant; communicating the first video image input to the video conference; identifying the first video image input as a first facial image of the conference participant; determining, based on the first facial image, the first video image input indicates the conference participant is in a speaking state; identifying the first audio input as a first speech sound; determining, while in the speaking state, the first speech sound originates from the conference participant; and communicating the first audio input to an audio output for the video conference.
G06V 40/16 - Visages humains, p.ex. parties du visage, croquis ou expressions
G06V 10/75 - Appariement de motifs d’image ou de vidéo; Mesures de proximité dans les espaces de caractéristiques utilisant l’analyse de contexte; Sélection des dictionnaires
G06V 20/40 - RECONNAISSANCE OU COMPRÉHENSION D’IMAGES OU DE VIDÉOS Éléments spécifiques à la scène dans le contenu vidéo
G10L 25/78 - Détection de la présence ou de l’absence de signaux de voix
In some examples, a control audio management engine is configured to interact with guest audio services in respective guests that have different audio management capabilities. The control audio management engine receives an indication of a start of a first audio in a first guest of the guests, the indication comprising an audio stream. The control audio management engine sends, to a second guest of the guests, control information to affect playback of a second audio that is playing in the second guest.
B60R 11/02 - Autres aménagements pour tenir ou monter des objets pour postes radio, de télévision, téléphones, ou objets similaires; Disposition de leur commande
G08B 3/00 - Systèmes de signalisation audible; Systèmes d'appel sonore de personnes
H04R 29/00 - Dispositifs de contrôle; Dispositifs de tests
10.
METHOD AND SYSTEM FOR DIGITAL SIGNATURES UTILIZING MULTIPLICATIVE SEMIGROUPS
A method for verification at a computing device of a signed message received from a first party over a public communications channel, the method including extracting a message digest “a” belonging to a semigroup from the signed message; obtaining a public key [c,e] for the first party, including a fixed value checker “c” and an endpoint “e”, checker “c” and endpoint “e” belonging to the semigroup and the endpoint comprising a multiplication of a private key “b” for the first party and the checker “c”, multiplying the message digest “a” and the endpoint “e” to create an endmatter “ae”; extracting a signature “d” from the signed message, the signature “d” belonging to the semigroup and being a multiplication of message digest “a” and private key “b”; multiplying the signature “d” and the checker “c” to create a signcheck “dc”; and verifying that the endmatter “ae” matches the signcheck “dc”.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A method and device for generating message notifications at a mobile device is provided. A current operating context of the mobile device is determined. A first display representation for the received message in accordance with notification display settings associated with the determined current operating context is determined. Gesture information from a touch input component is determined and a second display representation comprising at least a portion of the received message and an action area for performing a direct action in response to the received message in response to the determined gesture information is generated.
H04W 4/12 - Messagerie; Boîtes aux lettres; Annonces
H04L 51/224 - Surveillance ou traitement des messages en fournissant une notification sur les messages entrants, p.ex. des poussées de notifications des messages reçus
G06F 3/0488 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p.ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p.ex. des gestes en fonction de la pression exer utilisant un écran tactile ou une tablette numérique, p.ex. entrée de commandes par des tracés gestuels
H04M 1/72436 - Interfaces utilisateur spécialement adaptées aux téléphones sans fil ou mobiles avec des moyens de soutien local des applications accroissant la fonctionnalité avec des moyens interactifs de gestion interne des messages pour la messagerie textuelle, p.ex. SMS ou courriel
In some examples, a control audio management engine is configured to interact with guest audio services in respective guests that have different audio management capabilities. The control audio management engine receives an indication of a start of a first audio in a first guest of the guests, the indication comprising an audio stream. The control audio management engine sends, to a second guest of the guests, control information to affect playback of a second audio that is playing in the second guest.
A method for providing a user agent (UA) with service identification data. The method includes an application server (AS) transmitting Session Initiation Protocol (SIP) data. The SIP data comprises an identifier of the AS and a service identifier for at least one service supported by the AS. The method further includes the UA receiving the SIP data.
A method for verification at a computing device of a signed message received from a first party over a public communications channel, the method including extracting a message digest "a" belonging to a sem igroup from the signed message; obtaining a public key [c,e] for the first party, including a fixed value checker "c" and an endpoint "e", checker "c" and endpoint "e" belonging to the sem igroup and the endpoint comprising a multiplication of a private key "b" for the first party and the checker "c", multiplying the message digest "a" and the endpoint "e" to create an endmatter "ae"; extracting a signature "d" from the signed message, the signature "d" belonging to the sem igroup and being a multiplication of message digest "a" and private key "b"; multiplying the signature "d" and the checker "c" to create a signcheck "dc"; and verifying that the endmatter "ae" matches the signcheck "dc".
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/14 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
15.
METHOD AND SYSTEM FOR CLOUD EXTENDED ATTRIBUTE PROFILE
A method at a connector device, the method including receiving a first message from a peripheral device, the first message being received over a short range communications protocol connection utilizing a generic reading and writing service attribute profile; repackaging data within the first message into a second message at the connector device; and transmitting the second message to a network element, the transmitting utilizing a second communications connection, wherein the repackaging data populates a field within the second message with information about an attribute profile operation.
H04W 24/02 - Dispositions pour optimiser l'état de fonctionnement
H04W 4/80 - Services utilisant la communication de courte portée, p.ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
H04W 84/18 - Réseaux auto-organisés, p.ex. réseaux ad hoc ou réseaux de détection
H04W 88/18 - Dispositifs de logistique; Dispositifs de gestion de réseaux
16.
Increasing Battery Performance for a Device That Uses Power Saving Features
Described herein are systems and methods to increase battery life of a user equipment (UE) by reducing the amount of time a UE spends in active time listening for paging messages following mobile originate (MO) or mobile terminated (MT) data transfers. A network node may receive, from a UE, a message including an identifier of the UE and a request to set the duration of an active time timer to zero. The network node may determine whether any MT traffic is available for the UE, and send a message to the UE including the duration of the active time timer or some other indicator to indicate to the UE whether or not MT data is awaiting transmission.
H04W 60/04 - Rattachement à un réseau, p.ex. enregistrement; Suppression du rattachement à un réseau, p.ex. annulation de l'enregistrement utilisant des événements déclenchés
H04W 68/00 - Avertissement aux utilisateurs, p.ex. alerte ou messagerie, sur l'arrivée d'une communication, un changement de service ou similaires
17.
METHOD AND SYSTEM FOR AZIMUTHAL ANGULAR PRIOR AND TREE REPESENTATION FOR CLOUD COMPRESSION
A method of encoding or decoding a point cloud to representing a three-dimensional location of an object, the point cloud being located within a volumetric space, the method including determining at least one closest, relative to azimuthal distance, encoded node to a current node; determining an azimuthal prediction angle for each of the at least one closest encoded node; finding an averaged azimuthal prediction angle from the determined azimuthal prediction angle for each of the at least one closest encoded node; selecting an angular azimuthal context based on the averaged azimuthal predication angle; encoding information representative of the current node based on the azimuthal context to generate the bitstream of compressed point cloud data or decoding information representative of the current node based on the azimuthal context to generate the point cloud data.
Methods, devices, and systems for the transmission of information in a wireless communication system are disclosed. In one embodiment, a method for the transmission of information in a wireless communication system comprises receiving a downlink message, wherein the downlink message includes a first control channel element; determining a first index using the location of the first control channel element; determining a second index; determining a first orthogonal resource using the first index; determining a second orthogonal resource using the second index; spreading an uplink message using the first orthogonal resource to form a first spread signal; spreading the uplink message using a second orthogonal resource to form a second spread signal; transmitting the first spread signal using a first antenna; and transmitting the second spread signal using a second antenna.
H04B 7/06 - Systèmes de diversité; Systèmes à plusieurs antennes, c. à d. émission ou réception utilisant plusieurs antennes utilisant plusieurs antennes indépendantes espacées à la station d'émission
H04L 5/00 - Dispositions destinées à permettre l'usage multiple de la voie de transmission
H04L 1/06 - Dispositions pour détecter ou empêcher les erreurs dans l'information reçue par réception à diversité utilisant la diversité d'espace
H04L 1/16 - Dispositions pour détecter ou empêcher les erreurs dans l'information reçue en utilisant un canal de retour dans lesquelles le canal de retour transporte des signaux de contrôle, p.ex. répétition de signaux de demande
Methods and systems of segmenting computing devices in a wireless network having an access point broadcasting in a single domain are described. In an exemplary method, a request to join the wireless network is received from a computing device. The request is associated with an identifier. When the identifier is not associated with a virtual network within the wireless network, a virtual network is configured within the wireless network and the identifier is associated thereto and the computing device is assigned thereto. When the identifier is associated with an existing virtual network within the wireless network, the computing device is assigned to the existing virtual network.
H04W 76/11 - Attribution ou utilisation d'identifiants de connexion
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
Methods and devices for encoding a point cloud. A current node associated with a sub-volume is split into further sub-volumes, each further sub-volume corresponding to a child node of the current node, and, at the encoder, an occupancy pattern is determined for the current node based on occupancy status of the child nodes. A probability distribution is selected from among a plurality of probability distributions based on occupancy data for a plurality of nodes neighbouring the current node. The encoder entropy encodes the occupancy pattern based on the selected probability distribution to produce encoded data for the bitstream and updates the selected probability distribution. The decoder makes the same selection based on occupancy data for neighbouring nodes and entropy decodes the bitstream to reconstruct the occupancy pattern.
G06T 9/40 - Codage sous forme arborescente, p.ex. à quatre branches, à huit branches
G06F 17/18 - Opérations mathématiques complexes pour l'évaluation de données statistiques
H03M 7/30 - Compression; Expansion; Elimination de données inutiles, p.ex. réduction de redondance
H04N 19/105 - Sélection de l’unité de référence pour la prédiction dans un mode de codage ou de prédiction choisi, p.ex. choix adaptatif de la position et du nombre de pixels utilisés pour la prédiction
H04N 19/13 - Codage entropique adaptatif, p.ex. codage adaptatif à longueur variable [CALV] ou codage arithmétique binaire adaptatif en fonction du contexte [CABAC]
H04N 19/169 - Procédés ou dispositions pour le codage, le décodage, la compression ou la décompression de signaux vidéo numériques utilisant le codage adaptatif caractérisés par l’unité de codage, c. à d. la partie structurelle ou sémantique du signal vidéo étant l’objet ou le sujet du codage adaptatif
H04N 19/46 - Inclusion d’information supplémentaire dans le signal vidéo pendant le processus de compression
H04N 19/96 - Codage au moyen d'une arborescence, p.ex. codage au moyen d'une arborescence quadratique
A method performed by user equipment (UE) includes receiving a request to access a service unavailable through a first network cell associated with the UE, and receiving a message from an access device associated with the first network cell, wherein the message identifies a plurality of second network cells providing the service.
A method at a user equipment for obtaining emergency codes using a non-Third Generation Partnership Project (3GPP) network, the method including sending a request message to a network node, the request message containing an indication; and receiving, at the user equipment, a response message, the response message including at least one mobile country code (MCC), and the response message indicating an emergency number, type or category information, wherein the emergency number, type or category information is associated with the at least one MCC, and wherein the at least one MCC indicates a portion of a Public Land Mobile Network (PLMN) code to which the emergency number, type or category information applies.
Provided are a method for a terminal transmitting uplink control information (UCI)through a physical uplink control channel (PUCCH) in a wireless communication system, and a terminal using the method. A transmission power to be applied to the uplink control channel is determined on the basis of a value subordinate to a PUCCH format, and at least one type of UCI is transmitted from the physical uplink control channel by using the transmission power that is determined, wherein when the PUCCH format is PUCCH format 3, and the at least one type of UCI includes acknowledgement/negative-acknowledgement(ACK/NACK) and periodic channel state information (CSI), the value subordinate to the PUCCH format is determined on the basis of the number of bits of the ACK/NACK and the number of bits of the periodic CSI.
H04L 27/26 - Systèmes utilisant des codes à fréquences multiples
H04W 76/10 - Gestion de la connexion Établissement de la connexion
H04L 5/00 - Dispositions destinées à permettre l'usage multiple de la voie de transmission
H04L 1/00 - Dispositions pour détecter ou empêcher les erreurs dans l'information reçue
H04L 1/16 - Dispositions pour détecter ou empêcher les erreurs dans l'information reçue en utilisant un canal de retour dans lesquelles le canal de retour transporte des signaux de contrôle, p.ex. répétition de signaux de demande
H04W 52/14 - Analyse séparée de la liaison montante ou de la liaison descendante
A method at a user equipment, the method including receiving a string of indicia identifying at the user equipment, the string further comprising an indicator bit; based on the indicator bit, performing one of: determining whether the user equipment supports one or more indicium of the string of indicia and skipping display of characters corresponding to non-supported indicia; or displaying all indicium within the string of indicia. In other embodiments, utilizing a language delineator to choose a string of indicia to display or providing a language delineator to a network element and using the complete string of indicia received from a network element based on the provided language delineator.
H04M 1/72463 - Interfaces utilisateur spécialement adaptées aux téléphones sans fil ou mobiles avec des moyens permettant d’adapter la fonctionnalité du dispositif dans des circonstances spécifiques pour limiter la fonctionnalité du dispositif
H04W 8/26 - Adressage ou numérotation de réseau pour support de mobilité
H04W 8/02 - Traitement de données de mobilité, p.ex. enregistrement d'informations dans un registre de localisation nominal [HLR Home Location Register] ou de visiteurs [VLR Visitor Location Register]; Transfert de données de mobilité, p.ex. entre HLR, VLR ou réseaux externes
25.
METHODS AND DEVICES FOR TREE SWITCHING IN POINT CLOUD COMPRESSION
Methods and devices for coding point cloud data using volume trees and predicted-point trees. In one embodiment of the disclosure, a method of encoding a point cloud data to generate a bitstream of compressed point cloud data representing a three-dimensional location of a physical object is provided, the point cloud data being located within a volumetric space. The method includes compressing a first part of the point cloud data represented by a first tree of a first type; determining for a given node of the first tree if an assignation to a second type of tree is enabled, said given node still being processed for the first tree; when the assignation is enabled, compressing a second part of the point cloud data represented by a second tree of the second type wherein, features associated with a root node of the second tree are at least partially obtained from the given node.
A method at a network element, the method including receiving at least one message at the network element, the at least one message being one or both of: an update status information message from an updates server; and an anomaly detection status information message from anomaly detection server; determining, based on the receiving the at least one message, a dynamic cybersecurity posture indication for an intelligent transportation system entity; and providing the dynamic cybersecurity posture indication for the intelligent transportation system entity to an Enrolment Authority, wherein the dynamic cybersecurity posture indication can be included in a certificate relating to the intelligent transportation system entity.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04W 4/40 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons
27.
STEERING OF ROAMING IN WIRELESS COMMUNICATION NETWORKS
A method for steering of roaming (SOR) in wireless communication networks includes sending by a mobile equipment (ME) a registration message to a visited public land mobile network (VPLMN). The ME receives a first message from a home public land mobile network (HPLMN) through the VPLMN. The ME determines that the first message has failed a security check. In response to determining that the first message has failed the security check, the ME sends a second message to the VPLMN, the second message including an indication that the first message has failed the security check.
A trusted execution environment on a computing device within an enterprise, whether owned by the enterprise or the employee/user, allows invocation of trusted enterprise applications without hindering external or non-enterprise apps from running on the same computing device. Each of the trusted apps can interact with other trusted apps on the same enterprise computing device in a trusted manner such that other apps or untrusted network connections are prevented for access to the trusted apps. The computing device, however, also executes non enterprise applications which operate independently of the enterprise apps in the same address space using the same unmodified operating system as the enterprise apps on the computing device. The trusted execution environment therefore restricts interprocess communication to be only within the set of enterprise apps and also permits unimpeded operation of other apps under the same OTS (off the shelf) operating system.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 21/53 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p.ex. "boîte à sable" ou machine virtuelle sécurisée
A method of encoding or decoding a point cloud for representing a three-dimensional location of an object, the point cloud being generated by a device comprising a plurality of beam emitters. The method comprises using information from the beam emitter such as the location and angle of each beam emitter to more efficiently represent the point cloud data.
In some examples, an audio sending device receives a stream of application audio data, encodes the stream of application audio data, and in response to detecting an end of the stream of application audio data, provides pre-encoded filler audio data from a buffer in the audio sending device as an encoded stream of filler audio data. The audio sending device transmits the encoded stream of application audio data and the encoded stream of filler audio data in an encoded output data stream over a transport to an audio receiving device.
A mobile device may retrieve service information about a network prior to associating with the network. Utilizing an advertisement protocol to transmit service query messages, a mobile device may receive service query responses from a network that identify the services available prior to establishing network capability. In other words, the messaging is prior to the exchange of any authentication parameters between the device and the network as well prior to the establishment of a recognized session between the device and the network.
H04W 48/14 - Distribution d'informations relatives aux restrictions d'accès ou aux accès, p.ex. distribution de données d'exploration utilisant une requête de l’utilisateur
H04W 4/21 - Signalisation de services; Signalisation de données auxiliaires, c. à d. transmission de données par un canal non destiné au trafic pour applications de réseaux sociaux
H04W 4/50 - Fourniture de services ou reconfiguration de services
H04L 61/4541 - Répertoires pour la découverte de services
H04L 67/51 - Découverte ou gestion de ceux-ci, p.ex. protocole de localisation de service [SLP] ou services du Web
H04L 67/56 - Approvisionnement des services mandataires
H04L 67/568 - Stockage temporaire des données à un stade intermédiaire, p.ex. par mise en antémémoire
H04W 48/08 - Distribution d'informations relatives aux restrictions d'accès ou aux accès, p.ex. distribution de données d'exploration
H04W 48/16 - Exploration; Traitement d'informations sur les restrictions d'accès ou les accès
32.
ANGULAR PRIORS FOR IMPROVED PREDICTION IN POINT-PREDICTIVE TREES
A method of encoding or decoding a point cloud for representing a three-dimensional location of an object, the point cloud being generated by a device comprising a plurality of beam emitters. The method comprises using information from the beam emitter such as the angle of each beam emitter, and the azimuthal distance between each point capture, to more efficiently represent the point cloud data.
Method and devices for coding point cloud data using an angular coding mode. The angular coding mode may be signaled using in an angular mode flag to signal that a volume is to be coded using the angular coding mode. The angular coding mode is applicable to planar volumes that have all of their occupied child nodes on one side of a plane bisecting the volume. A planar position flag may signal which side of the volume is occupied. Entropy coding may be used to code the planar position flag. Context determination for coding may take into account angular information for child nodes or groups of child nodes of the volume relative to a location of a beam assembly that has sampled to point cloud. Characteristics of the beam assembly may be coded into a dedicated syntax in the bitstream.
Method and devices for coding point cloud data using an angular coding mode. The angular coding mode may be signaled using an angular mode flag to signal that a volume is to be coded using the angular coding mode. The angular coding mode is applicable to planar volumes that have all of their occupied child nodes on one side of a plane bisecting the volume. A planar position flag may signal which side of the volume is occupied. Entropy coding may be used to code the planar position flag. Context determination for coding may take into account angular information for child nodes or groups of child nodes of the volume relative to a location of a beam assembly that has sampled the point cloud. Characteristics of the beam assembly may be coded into the bitstream.
H04N 19/96 - Codage au moyen d'une arborescence, p.ex. codage au moyen d'une arborescence quadratique
H04N 19/184 - Procédés ou dispositions pour le codage, le décodage, la compression ou la décompression de signaux vidéo numériques utilisant le codage adaptatif caractérisés par l’unité de codage, c. à d. la partie structurelle ou sémantique du signal vidéo étant l’objet ou le sujet du codage adaptatif l’unité étant des bits, p.ex. de flux vidéo compressé
H04N 19/13 - Codage entropique adaptatif, p.ex. codage adaptatif à longueur variable [CALV] ou codage arithmétique binaire adaptatif en fonction du contexte [CABAC]
H04N 19/167 - Position dans une image vidéo, p.ex. région d'intérêt [ROI]
H04N 19/136 - Caractéristiques ou propriétés du signal vidéo entrant
H04N 19/105 - Sélection de l’unité de référence pour la prédiction dans un mode de codage ou de prédiction choisi, p.ex. choix adaptatif de la position et du nombre de pixels utilisés pour la prédiction
H04N 19/463 - Inclusion d’information supplémentaire dans le signal vidéo pendant le processus de compression par compression des paramètres d’encodage avant la transmission
Methods and systems for removing sensitive information from a digital image. An instruction to share a digital image is received. It is then determined that the digital image contains a depiction of a corporate display medium that is classified as sensitive based on a policy and, based on the determination that the digital image contains the depiction of the corporate display medium that is classified as sensitive based on the policy, the digital image is processed to modify the depiction. The digital image is shared.
A method for providing Cheon-resistance security for a static elliptic curve Diffie-Hellman cryptosystem (ECDH), the method including providing a system for message communication between a pair of correspondents, a message being exchanged in accordance with ECDH instructions executable on computer processors of the respective correspondents, the ECDH instructions using a curve selected from a plurality of curves, the selecting including choosing a range of curves; selecting, from the range of curves, curves matching a threshold efficiency; excluding, within the selected curves, curves which may include intentional vulnerabilities; and electing, from non-excluded selected curves, a curve with Cheon resistance, the electing comprising a curve from an additive group of order q, wherein q is prime, such that q−1=cr and q+1=ds, where r and s are primes and c and d are integer Cheon cofactors of the group, such that cd≤48.
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
A method for control of data transmission in a wireless communication system includes receiving, by an application, from a modem, information indicative of a radio coverage condition, where a user equipment (UE) includes the application and the modem; based on the received information, determining that the UE is in an enhanced coverage state; and in response to the determining, controlling uplink data transmission by the modem to reduce power consumption of the UE.
Systems, methods, and software can be used to handle security events of a device based on remediation actions and recovery actions. In some aspects, a method comprises: receiving, by a security gateway, a security event notification associated with a device; determining, by the security gateway and based on the security event notification, a risk level of the device; determining, by the security gateway and based on the risk level, a set of remediation actions and recovery actions; and sending, by the security gateway, an action plan indicating the set of remediation actions and recovery actions.
Systems, methods, and software can be used for securing in-tunnel messages. One example of a method includes establishing a tunneling connection between a server and an endpoint. The method further includes receiving a packet from the server over the tunneling connection. The method yet further includes determining that the packet comprises a tunneling control message based on at least one address in the packet. Based on the determination of a received packet comprising a tunneling control message, the method can ensure the security of in-tunnel messages based on an indication in the tunneling control message.
A method disclosed herein includes displaying information associated with a first application in a display area of an electronic device, detecting a change in direction of a continuous gesture across at least a portion of the display area between a first direction and a second direction different than the first direction, the continuous gesture associated with a request to display information of a second application, the first application being different than the second application, in response to detecting the change in direction of the continuous gesture, reducing display of the first application to a first portion of the display area and presenting a preview of information associated with the second application in a second portion of the display area in which the first application was presented prior to detection of the continuous gesture, based on a first characteristic of the continuous gesture, discontinuing providing the first information and display the second application in the display area, and based on a second characteristic of the continuous gesture, discontinuing providing the second information and display the first application in the display area.
G06F 3/04883 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p.ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p.ex. des gestes en fonction de la pression exer utilisant un écran tactile ou une tablette numérique, p.ex. entrée de commandes par des tracés gestuels pour l’entrée de données par calligraphie, p.ex. sous forme de gestes ou de texte
G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
H04M 1/7243 - Interfaces utilisateur spécialement adaptées aux téléphones sans fil ou mobiles avec des moyens de soutien local des applications accroissant la fonctionnalité avec des moyens interactifs de gestion interne des messages
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport
G06F 3/04817 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport utilisant des icônes
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
41.
HANDLING SECURITY EVENTS BASED ON REMEDIATION ACTIONS AND RECOVERY ACTIONS
Systems, methods, and software can be used to handle security events of a device based on remediation actions and recovery actions. In some aspects, a method comprises: receiving, by a security gateway, a security event notification associated with a device; determining, by the security gateway and based on the security event notification, a risk level of the device; determining, by the security gateway and based on the risk level, a set of remediation actions and recovery actions; and sending, by the security gateway, an action plan indicating the set of remediation actions and recovery actions.
A first-party vendor provides a licensed first-party service on one or more electronic devices, the first-party service associated with a licensed third-party service provided by a third-party vendor on the electronic devices. When a customer purchases a first-party license for the first-party service, the customer may automatically be issued a third-party license that aligns with the first-party license. Furthermore, distribution and activation of the third-party license may be concealed from the customer.
In some examples, a controller receives measurement data from a sensor on a vehicle, determines, based on the measurement data, a condition of usage of the vehicle, and selects a parameter set from among a plurality of parameter sets based on the determined condition of usage of the vehicle, the plurality of parameter sets corresponding to different conditions of usage of the vehicle, where each parameter set of the plurality of parameter sets includes one or more parameters that control adjustment of one or more respective adjustable elements of the vehicle. The controller causes application of the selected parameter set on the vehicle.
B60W 50/00 - COMMANDE CONJUGUÉE DE PLUSIEURS SOUS-ENSEMBLES D'UN VÉHICULE, DE FONCTION OU DE TYPE DIFFÉRENTS; SYSTÈMES DE COMMANDE SPÉCIALEMENT ADAPTÉS AUX VÉHICULES HYBRIDES; SYSTÈMES D'AIDE À LA CONDUITE DE VÉHICULES ROUTIERS, NON LIÉS À LA COMMANDE D'UN SOUS-ENSEMBLE PARTICULIER - Détails des systèmes d'aide à la conduite des véhicules routiers qui ne sont pas liés à la commande d'un sous-ensemble particulier
B60W 10/04 - Commande conjuguée de sous-ensembles de véhicule, de fonction ou de type différents comprenant la commande des ensembles de propulsion
B60W 10/10 - Commande conjuguée de sous-ensembles de véhicule, de fonction ou de type différents comprenant la commande des boîtes de vitesses
B60W 10/18 - Commande conjuguée de sous-ensembles de véhicule, de fonction ou de type différents comprenant la commande des systèmes de freinage
B60W 10/22 - Commande conjuguée de sous-ensembles de véhicule, de fonction ou de type différents comprenant la commande des systèmes de suspension
B60W 10/30 - Commande conjuguée de sous-ensembles de véhicule, de fonction ou de type différents comprenant la commande d'équipements auxiliaires, p.ex. des compresseurs pour la climatisation ou des pompes à huile
44.
Negotiation of Quality of Service (QoS) Information for Network Management Traffic in a Wireless Local Area Network (WLAN)
An access point advertises a management frame quality of service (MFQ) policy that defines an access category used for transmitting a first type of management frame. Each mobile station associated with the access point is to prioritize transmission of management frames according to the MFQ policy advertised by the access point, unless a policy configuration request for the mobile station to prioritize transmission of management frames according to a different MFQ policy has been accepted.
H04W 28/24 - Négociation de l'agrément du niveau de service [SLA Service Level Agreement]; Négociation de la qualité de service [QoS Quality of Service]
H04W 74/00 - Accès au canal sans fil, p.ex. accès planifié, accès aléatoire
45.
NETWORK ADDRESS POLICY INFORMATION RECEIVED IN A PRE-ASSOCIATED STATE
In some examples, a wireless device includes a communication interface to communicate with a wireless network, and at least one processor configured to, receive, from an access point (AP), information including a network address policy of the wireless network. The at least one processor is configured to further, in response to the information including the network address policy, use an address of the wireless device according to the network address policy.
A method for balancing sensors within a sensor system, the method including receiving, at a gateway, data from a plurality of sensors, each of the plurality of sensors being connected to one of a plurality of sensor modules or the gateway; determining, at the gateway, that a signal strength from a first sensor falls below a threshold, the first sensor being one of the plurality of sensors; and based on the determining, allocating the first sensor to connect to a different one of the plurality of sensor modules, or to the gateway if connected to one of the plurality of sensor modules.
H04L 41/0823 - Réglages de configuration caractérisés par les objectifs d’un changement de paramètres, p.ex. l’optimisation de la configuration pour améliorer la fiabilité
H04W 48/00 - Restriction d'accès; Sélection de réseau; Sélection de point d'accès
H04W 4/70 - Services pour la communication de machine à machine ou la communication de type machine
H04W 24/02 - Dispositions pour optimiser l'état de fonctionnement
H04W 40/24 - Gestion d'informations sur la connectabilité, p.ex. exploration de connectabilité ou mise à jour de connectabilité
H04L 67/125 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p.ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance en impliquant la commande des applications des terminaux par un réseau
H04W 40/14 - Sélection d'itinéraire ou de voie de communication, p.ex. routage basé sur l'énergie disponible ou le chemin le plus court sur la base de la qualité d'émission ou de la qualité des canaux sur la base de la stabilité
Described herein is a system with a first network element and a second network element. The first network element contains a processor configured to synchronize with the second network element; and maintain synchronization with the second network element. The first network element is a small cell eNB and the second network element is one of the following: a macro cell enhanced node-B (eNB); or a small cell eNB.
A method at a computing device including obtaining a first container image from a host computing device; executing a second container image at the computing device, the executing comprising: starting a container from the first container image, the container being for a development environment on the computing device; and customizing the container for a local environment on the computing device, thereby creating a customized container; and compiling developed code within the customized container.
A method at a computing device including obtaining a first container image from a host computing device; executing a second container image at the computing device, the executing comprising: starting a container from the first container image, the container being for a development environment on the computing device; and customizing the container for a local environment on the computing device, thereby creating a customized container; and compiling developed code within the customized container.
p is the parity portion of the parity check matrix; the parity portion of the structured base parity check matrix is such so that when expanded, an inverse of the parity portion of the expanded parity check matrix is sparse; and expanding the structured base parity check matrix into an expanded parity check matrix. A method for encoding variable sized data by using the expanded LDPC code; and applying shortening, puncturing. System and method for operating a wireless device to encode data using low-density parity-check (LDPC) encoding is discussed. One example method includes: computing a number of modulated orthogonal frequency-division multiplexing (OFDM) symbols for transmitting the data; computing a number of shortening bits; distributing the number of shortening bits over the at least one LDPC codeword; computing a number of puncturing bits for the at least one LDPC codeword; distributing the number of puncturing bits over the at least one LDPC codeword; determining a criterion using at least one of the number of shortening bits and the number of puncturing bits; if the criterion is met, increasing the number of modulated OFDM symbols and recalculating the number of puncturing bits; generating the encoded data using the number of shortening bits, the number of puncturing bits, and the at least one LDPC codeword; and transmitting the encoded data.
H03M 13/00 - Codage, décodage ou conversion de code pour détecter ou corriger des erreurs; Hypothèses de base sur la théorie du codage; Limites de codage; Méthodes d'évaluation de la probabilité d'erreur; Modèles de canaux; Simulation ou test des codes
H03M 13/11 - Détection d'erreurs ou correction d'erreurs transmises par redondance dans la représentation des données, c.à d. mots de code contenant plus de chiffres que les mots source utilisant un codage par blocs, c.à d. un nombre prédéterminé de bits de contrôle ajouté à un nombre prédéterminé de bits d'information utilisant plusieurs bits de parité
H04L 1/00 - Dispositions pour détecter ou empêcher les erreurs dans l'information reçue
53.
System and Method of Modifying Policy Settings In An Electronic Device
The present invention provides a system and method of modifying policy settings in an electronic device. An embodiment includes a plurality of access stations, each capable of wirelessly transmitting across a geographic region. A mobile electronic device, capable of roaming between regions is operable to establish a wireless link with the access stations. The device is owned by an office which sets communication policies determining through which access stations mobile device can place voice calls. This policy is stored on an office server as a database and periodically transmitted to the device as the device makes contact with the office server over the internet. Hence, the device maintains a copy of this policy database. When placing a voice call, the device first determines which access station is serving the region it is located in and then determines whether it is allowed to place a call through that access station using its policy database.
In a handheld communication device capable of a plurality of wireless communication modes, a method of communication begins by receiving, at the handheld communication device, a notification of an available one of the wireless communication modes. Then, in a data communication window of the communication device, a user-indication of an active one of the available wireless communication modes is provided in accordance with the received communication mode indication. The data communication window is configured to facilitate data communication via the plurality of wireless communication modes, and facilitates the data communication via the active wireless communication mode.
H04M 1/72469 - Interfaces utilisateur spécialement adaptées aux téléphones sans fil ou mobiles pour faire fonctionner le dispositif en sélectionnant des fonctions à partir de plusieurs éléments affichés, p.ex. des menus ou des icônes
H04W 4/60 - Services basés sur un abonnement qui utilisent des serveurs d’applications ou de supports d’enregistrement, p.ex. boîtes à outils d’application SIM
H04W 48/08 - Distribution d'informations relatives aux restrictions d'accès ou aux accès, p.ex. distribution de données d'exploration
H04W 88/06 - Dispositifs terminaux adapté au fonctionnement dans des réseaux multiples, p.ex. terminaux multi-mode
G06F 3/04817 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport utilisant des icônes
H04W 8/22 - Traitement ou transfert des données du terminal, p.ex. statut ou capacités physiques
A method at a remote proxy on a first node, the method including receiving, at the remote proxy, a first message from a first module on the first node, the first message being directed to a second module on a second node; verifying the first message at the remote proxy utilizing operating system verification; determining, based on a manifest at the remote proxy, the second node; signing, using a private key for the first node, the first message; and sending the first message to the second node.
H04L 67/56 - Approvisionnement des services mandataires
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
56.
METHOD AND SYSTEM FOR PERFORMING IDENTITY CHECKS IN A DISTRIBUTED SYSTEM
A method at a remote proxy on a first node, the method including receiving, at the remote proxy, a first message from a first module on the first node, the first message being directed to a second module on a second node; verifying the first message at the remote proxy utilizing operating system verification; determining, based on a manifest at the remote proxy, the second node; signing, using a private key for the first node, the first message; and sending the first message to the second node.
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
57.
Methods and Systems for Provisioning Emergency Numbers
There is provided a method and device for provisioning emergency number information on a user equipment. When a dialed number matches an emergency number from the provisioned emergency number information, the user equipment selects either the circuit switched domain or the packet switched domain and executes a call setup procedure for that domain.
A method at a computing device for sharing data, the method including defining a dynamically linked data library (DLDL) to include executable code; loading the DLDL from a first process, the loading causing a memory allocation of shared executable code, private data and shared data in a physical memory location; mapping the memory allocation of shared executable code, private data and shared data to a virtual memory location for the first process; loading the DLDL from a second process, the loading causing mapping of the memory allocation of shared executable code and the shared data for the first process to be mapped to a virtual memory location for the second process; and allocating private data in physical memory and mapping to a virtual memory location for the second process.
A verification server comprising a memory and a processor programmed to execute instructions stored in the memory. The instructions include receiving a link registration request including a third-party link to a third-party server, validating the third-party server as a result of receiving the link registration request, generating a unique code as a result of validating the third-party server, and generating a custom link that includes the unique code.
A system and method in a user equipment (UE) for transferring an emergency session from a first network to a second network. The method includes transmitting a first registration request message to the second network; receiving a registration reject message from the second network; detecting the emergency session between the UE and the first network is ongoing; transmitting a second registration request message comprising an emergency registration request to the second network; and receiving a registration accept message for the emergency session.
H04W 36/14 - Resélection d'un réseau ou d'une interface hertzienne
H04W 4/90 - Services pour gérer les situations d’urgence ou dangereuses, p.ex. systèmes d’alerte aux séismes et aux tsunamis
H04W 36/00 - Dispositions pour le transfert ou la resélection
H04W 76/50 - Gestion de la connexion pour les connexions d'urgence
H04W 60/00 - Rattachement à un réseau, p.ex. enregistrement; Suppression du rattachement à un réseau, p.ex. annulation de l'enregistrement
H04W 60/04 - Rattachement à un réseau, p.ex. enregistrement; Suppression du rattachement à un réseau, p.ex. annulation de l'enregistrement utilisant des événements déclenchés
H04W 76/18 - Gestion du rejet ou de l'échec de l'établissement
61.
Detecting the Number of Transmit Antennas in a Base Station
Data is scrambled at a transmitter according to one of a number of predetermined scrambling sequences which are associated with a particular one of a number of predetermined transmit antenna diversity schemes (i.e., a specific number of transmit antenna ports). Received data is decoded using one or more of the known transmit antenna diversity schemes and the scrambled data is descrambled according to a corresponding descrambling sequence (related to the scrambling sequence). Based on the descrambled data, the receiver determines which transmit antenna diversity scheme (i.e., the number of antenna ports) is used by the transmitter. In one specific embodiment, CRC parity data is scrambled in the transmitter and the receiver descrambles the recovered CRC parity data according to a descrambling sequence, computes CRC parity data from the received data, and compares the descrambled CRC parity data to the newly computed CRC parity data.
H04B 7/06 - Systèmes de diversité; Systèmes à plusieurs antennes, c. à d. émission ou réception utilisant plusieurs antennes utilisant plusieurs antennes indépendantes espacées à la station d'émission
H04L 5/00 - Dispositions destinées à permettre l'usage multiple de la voie de transmission
62.
Method and apparatus for controlling access to encrypted data
A method and apparatus for controlling access to encrypted data is provided. The device comprises: a processor and a memory, the processor configured to: control access to encrypted data, stored at the memory, the encrypted data categorized according to a plurality of categories, using a respective encryption key for each category in the plurality of categories; and, control access to a given encryption key according to given criteria associated with a given category, respective criteria different for each respective category, access to the given encryption key including one or more of, when the respective criteria are met, generating the given encryption key and decrypting the given encryption key.
A method at a computing device within an Intelligent Transportation System, the method comprising: determining, at the computing device, whether a short-term certificate is available to sign a message; if the short-term certificate is available, signing the message with a private key associated with the short-term certificate; if the short-term certificate is not available, signing the message with a private key associated with a long-term certificate; and sending the message to a recipient.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04W 4/40 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons
In some examples, a user equipment (UE) obtains a connectivity in a first cell, the connectivity comprising a first type of connection that provides access to services in a local data network. The UE camps on a second cell, determines if the connectivity is not supported in the second cell based on broadcast information from the second cell, the broadcast information comprising information of the second cell, and in response to determining that the connectivity is not supported in the second cell, disconnect the connectivity, wherein the disconnecting comprises sending a Non Access Stratum (NAS) message via the second cell.
H04W 36/32 - La resélection étant déclenchée par des paramètres spécifiques par des données de localisation ou de mobilité, p.ex. des données de vitesse
H04W 36/00 - Dispositions pour le transfert ou la resélection
H04W 48/08 - Distribution d'informations relatives aux restrictions d'accès ou aux accès, p.ex. distribution de données d'exploration
A method for key agreement between a first party and a second party over a public communications channel, the method including selecting, by the first party, a first value “a”; multiplying the first value “a” by a second value “b” using Knuth multiplication to create a third value “d”, the third value “d” being a semistandard tableau; sending the third value “d” to the second party; receiving, from the second party, a fourth value “e”, the fourth value being a second semistandard tableau comprising the second value “b” multiplied by a fifth value “c” selected by the second party; and creating a shared secret by multiplying the first value “a” with the fourth value “e” using Knuth multiplication, wherein the shared secret matches the third value “d” multiplied by the fifth value “c” using Knuth multiplication.
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
66.
METHOD AND SYSTEM FOR KEY AGREEMENT UTILIZING PLACTIC MONOIDS
A method for key agreement between a first party and a second party over a public communications channel, the method including selecting, by the first party, a first value "a"; multiplying the first value "a" by a second value "b" using Knuth multiplication to create a third value "d", the third value "d" being a sem istandard tableau; sending the third value "d" to the second party; receiving, from the second party, a fourth value "e", the fourth value being a second sem istandard tableau comprising the second value "b" multiplied by a fifth value "c" selected by the second party; and creating a shared secret by multiplying the first value "a" with the fourth value "e" using Knuth multiplication, wherein the shared secret matches the third value "d" multiplied by the fifth value "c" using Knuth multiplication.
H04L 9/28 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant un algorithme de chiffrement particulier
67.
Establishing tunneling connection over restrictive networks
Systems, methods, and software can be used for establishing a tunneling connection over restrictive networks. One example of a method includes selecting, at an endpoint, at least one protocol to be used to establish a tunneling connection between the endpoint and a server. The at least one protocol is one of transmission control protocol (TCP) or user datagram protocol (UDP). The method further includes transmitting data between the endpoint and the server over the tunneling connection by using the selected at least one protocol.
H04L 69/16 - Implémentation ou adaptation du protocole Internet [IP], du protocole de contrôle de transmission [TCP] ou du protocole datagramme utilisateur [UDP]
H04L 67/141 - Configuration des sessions d'application
Systems, methods, and software can be used for securing injected codes of a browser plugin. One example of a method includes establishing a code package to be injected into a web page. The code package comprises at least one element, and the at least one element includes a first script to be executed before executing a code of the web page. The method further includes injecting the at least one element to the web page to execute the first script. The execution of the first script comprises generating a script element comprising one or more secrets. The method further comprises appending the script element to the web page and deleting the script element from the web page.
G06F 21/51 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade du chargement de l’application, p.ex. en acceptant, en rejetant, en démarrant ou en inhibant un logiciel exécutable en fonction de l’intégrité ou de la fiabilité de la source
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
G06F 21/56 - Détection ou gestion de programmes malveillants, p.ex. dispositions anti-virus
G06F 7/58 - Générateurs de nombres aléatoires ou pseudo-aléatoires
69.
METHODS AND APPARATUS FOR PROVIDING NETWORK BROADCAST INFORMATION TO WLAN ENABLED WIRELESS COMMUNICATION DEVICES
One illustrative method of providing network broadcast information to a wireless device from a wireless local area network (WLAN) includes the steps of receiving, from one or more available cellular networks or a network database, cellular network broadcast information associated with the one or more available cellular networks; providing the cellular network broadcast information in a generic container message which varies in content and format according to one or more cellular standards associated with the one or more available cellular networks; and causing the generic container message to be regularly broadcasted for receipt and use by a wireless device. In an alternative approach, the steps include regularly broadcasting a network interworking indicator which is indicative of whether cellular network broadcast information is available for receipt from the WLAN; receiving a probe request from a wireless device; and causing the cellular network broadcast information to be sent to the wireless device in the generic container message in response to the probe request from the wireless device. The generic container message may alternatively or additionally include wireless network broadcast information from different types of wireless networks (e.g. Wi-MAX) which are available to the WLAN.
H04W 4/06 - Répartition sélective de services de diffusion, p.ex. service de diffusion/multidiffusion multimédia; Services à des groupes d’utilisateurs; Services d’appel sélectif unidirectionnel
H04W 48/10 - Distribution d'informations relatives aux restrictions d'accès ou aux accès, p.ex. distribution de données d'exploration utilisant des informations radiodiffusées
H04W 48/14 - Distribution d'informations relatives aux restrictions d'accès ou aux accès, p.ex. distribution de données d'exploration utilisant une requête de l’utilisateur
A method at a computing device, the method including obtaining sensor data for a vehicle providing vibration frequency and magnitude; calculating an energy for each of a low frequency passband and a high frequency passband of a bandpass filter pair; finding an energy ratio based on the energy for the low frequency passband and the energy for the high frequency passband; applying weighting constants to each of the energy for the low frequency passband, the energy for the high frequency passband and the energy ratio to calculate a decision variable; and finding that the vehicle is unloaded if the decision variable is below a threshold and finding that the vehicle is loaded if the decision variable is above a threshold.
Methods and devices are provided for determining a service associated with an unclassified traffic flow in a computer network. Classification information for a plurality of classified traffic flows in the computer network are obtained that indicate an association between each of the classified flows and a service. A primary cluster analysis is performed on the plurality of classified flows and the unclassified flow to associate the unclassified flow to a group of classified flows having a common service. The association between the unclassified flow and the common service is provided to a network security management system.
A method for network selection on a user equipment (UE) device and the UE device are shown. The user equipment device registers on a first network in a wide area cellular network (WACN) band and receives, from a wireless local area network (WLAN), a list of WACNs that support generic access network (GAN) capabilities. The user equipment device selects the WLAN if the first network is on the list.
A method for initiating a Packet Switched emergency call using a user equipment (UE) is presented. The UE includes a plurality of protocol layers. The plurality of protocol layers including an IMS sublayer, a non-access stratum (NAS) layer and an access stratum (AS) layer. The method includes generating an ATTACH REQUEST using the UE. The ATTACH REQUEST has an attach type. The method includes retrieving the attach type of the ATTACH REQUEST using the NAS layer of the UE, and generating an RRC CONNECTION REQUEST. The RRC CONNECTION REQUEST includes an RRC establishment cause based upon the attach type of the attach request.
The present disclosure describes methods and systems for establishing a Session Initiation Protocol Session. One method includes transmitting a first message requesting authentication configuration information; in response to the first message, receiving a second message that includes the authentication configuration information; transmitting a third message that includes authentication information based upon the received authentication configuration information; receiving an authentication challenge request that is formatted according to the second protocol; and in response to receiving the authentication challenge request, transmitting an authentication response to the second network node.
H04W 4/10 - Services de messagerie instantanée vocale ou de messagerie sur appel
H04L 65/4061 - Services par bouton-poussoir, p.ex. bouton-poussoir pour parler ou bouton-poussoir pour vidéo
H04M 15/00 - Dispositions de comptage, de contrôle de durée ou d'indication de durée
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Systems, methods, and software can be used for anomaly detection. In some aspect, a number of training events are obtained. A data structure represented by a decision tree is generated based on the number of training events. A to-be-scored event is obtained and a traversed path is determined for the to-be-scored event. An anomaly score is computed based on the traversed path and the to-be-scored event is determined to be an anomalous or normal event based on the anomaly score.
A method for key agreement between a first party and a second party over a public communications channel, the method including selecting, by the first party, from a semigroup, a first value “a”; multiplying the first value “a” by a second value “b” to create a third value “d”, the second value “b” being selected from the semigroup; sending the third value “d” to the second party; receiving, from the second party, a fourth value “e”, the fourth value comprising the second value “b” multiplied by a fifth value “c” selected by the second party from the semigroup; and creating a shared secret by multiplying the first value “a” with the fourth value “e”, wherein the shared secret matches the third value “d” multiplied by the fifth value “c”.
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
77.
METHOD AND SYSTEM FOR CARGO MASS ESTIMATION USING A VERTICAL ACCELEROMETER
A method at a sensor apparatus affixed to a transportation asset. The method includes calibrating the sensor apparatus by initiating a vertical impact at the transportation asset, measuring spring oscillation and creating a model of the transportation asset. The method further includes detecting, subsequent to the calibrating, an impact event at the sensor apparatus. The method further includes measuring spring oscillation due to the impact event at the sensor apparatus and using the measured spring oscillation in the model created during calibration to create a load mass estimate for the transportation asset.
A mobile transceiver for asset tracking having route monitoring and method of operation are provided. In one aspect, the method comprises: determining a location of the mobile transceiver using the satellite receiver; determining whether the determined location deviates from a planned route; and sending an alert to an asset tracking service when the determined location deviates from the planned route.
G01S 11/02 - Systèmes pour déterminer la distance ou la vitesse sans utiliser la réflexion ou la reradiation utilisant les ondes radioélectriques
G01S 5/02 - Localisation par coordination de plusieurs déterminations de direction ou de ligne de position; Localisation par coordination de plusieurs déterminations de distance utilisant les ondes radioélectriques
G06Q 10/08 - Logistique, p.ex. entreposage, chargement ou distribution; Gestion d’inventaires ou de stocks
G01C 21/34 - Recherche d'itinéraire; Guidage en matière d'itinéraire
G01S 5/00 - Localisation par coordination de plusieurs déterminations de direction ou de ligne de position; Localisation par coordination de plusieurs déterminations de distance
H04W 4/029 - Services de gestion ou de suivi basés sur la localisation
G08G 1/0968 - Systèmes impliquant la transmission d'indications de navigation au véhicule
G08G 1/00 - Systèmes de commande du trafic pour véhicules routiers
79.
METHOD AND SYSTEM FOR REDUCED V2X RECEIVER PROCESSING LOAD USING NETWORK BASED APPLICATION LAYER MESSAGE PROCESSING
A method at a network element for processing a first message destined for an intelligent transportation system station, the method including receiving from a sending entity, or generating, the first message at the network element; based on a source or contents of the first message, performing one of: discarding the first message; or modifying the first message to provide an indication to the intelligent transportation system station of checks the intelligent transportation system does not need to perform, thereby creating a second message; and forwarding the second message to the intelligent transportation system station.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A computer-implemented method comprises receiving a subscription request from at least one subscriber, the subscription request defining one or more subscription parameters; obtaining one or more events from at least one publisher; marshalling the one or more events according to the one or more subscription parameters; and delivering the one or more events to the subscriber based on the marshalling.
A risk-aware access control system and related methods are provided. In accordance with one aspect of the present disclosure, there is a provided a method of risk-aware access control, comprising: detecting a request to perform an action with respect to two factors, the factors being of a factor type selecting people, devices, documents, and location, wherein the factors are of a different factor type; determining a coupling associated with the requested action based on the factors of the requested action; determining a risk level associated with the coupling; denying the requested action in response to a determination that the risk level does not match a security policy; and allowing the requested action in response to a determination that the risk level matches the security policy.
A computer-implemented method comprises sending, to a first device, a request for a signed certificate, the request for the signed certificate comprising a signed hash of data associated with a user, a corresponding public key of the user, and the data associated with the user; sending, to a second device different from the first device, a request for the signed certificate, the request comprising information to retrieve the signed certificate; and obtaining, from the second device, a signed certificate, the signed certificate comprising the public key of the user, the hash of the data associated with the user, and information indicating a health status of the user, the data associated with the user being absent from the signed certificate.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A method and authorization delegation system for authorizing access to resources or services. The method comprising receiving an authorization request from a resource or service provider, the authorization request based on a request by a requestor for access to a resource or service provided by the resource or service provider; determining identity information for the requestor and an authorizer associated with the authorization request; forwarding the authorization request to the authorizer using the identity information; and sending a notification of authorization to the resource or service provider for access to the requested resource or service, the notification of authorization based on a response to the authorization request from the authorizer and an authorization policy. The authorization delegation system comprising a requestor, a resource or service provider, a delegated authorization service, and an authorizer.
A computer-implemented method comprises obtaining data associated with an event ticket and data associated with a digital health certificate of a user; generating a scannable code that includes the data associated with the event ticket and the data associated with the digital health certificate of the user, the scannable code configured to be scanned by a relying party device and causing the relying party device to display at least a notification indicating a ticket status and information associated with the user; and provide the scannable code to memory of a user device.
G06Q 10/02 - Réservations, p.ex. pour billetterie, services ou manifestations
G16H 10/60 - TIC spécialement adaptées au maniement ou au traitement des données médicales ou de soins de santé relatives aux patients pour des données spécifiques de patients, p.ex. pour des dossiers électroniques de patients
G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p.ex. lecture de la lumière blanche réfléchie
A method at a computing device within an Intelligent Transportation System, the method including detecting a traffic event at the computing device; determining no fixed roadside unit is available from the computing device; establishing an Internet Protocol connection from the computing device to a network node; and sending a traffic event message from the computing device to the network node, the traffic event message providing information for the traffic event.
G08G 1/0967 - Systèmes impliquant la transmission d'informations pour les grands axes de circulation, p.ex. conditions météorologiques, limites de vitesse
86.
Method and System for Dynamic Ack/Nack Repetition for Robust Downlink Mac PDU Transmission in LTE
A method and apparatus for dynamic acknowledgement repetition for a downlink medium access control packet data unit transmission ‘MAC PDU’ requiring multiple acknowledgements, the method having the steps of: receiving the downlink MAC PDU requiring multiple acknowledgements; and utilizing a differentiating factor and acknowledgement scheme, sending the multiple acknowledgements.
A dual sensory input speech detection method includes receiving, at a first time, a first video image input of a conference participant of the video conference and a first audio input of the conference participant; communicating the first video image input to the video conference; identifying the first video image input as a first facial image of the conference participant; determining, based on the first facial image, the first video image input indicates the conference participant is in a speaking state; identifying the first audio input as a first speech sound; determining, while in the speaking state, the first speech sound originates from the conference participant; and communicating the first audio input to an audio output for the video conference.
G10L 25/78 - Détection de la présence ou de l’absence de signaux de voix
G06V 10/75 - Appariement de motifs d’image ou de vidéo; Mesures de proximité dans les espaces de caractéristiques utilisant l’analyse de contexte; Sélection des dictionnaires
G06V 20/40 - RECONNAISSANCE OU COMPRÉHENSION D’IMAGES OU DE VIDÉOS Éléments spécifiques à la scène dans le contenu vidéo
G06V 40/16 - Visages humains, p.ex. parties du visage, croquis ou expressions
A method and system are provided for scheduling data transmission in a Multiple-Input Multiple-Output (MIMO) system. The MIMO system may comprise at least one MIMO transmitter and at least one MIMO receiver. Feedback from one or more receivers may be used by a transmitter to improve quality, capacity, and scheduling in MIMO communication systems. The method may include generating or receiving information pertaining to a MIMO channel metric and information pertaining to a Channel Quality Indicator (CQI) in respect of a transmitted signal; and sending a next transmission to a receiver using a MIMO mode selected in accordance with the information pertaining to the MIMO channel metric, and an adaptive coding and modulation selected in accordance with the information pertaining to the CQI.
H04W 72/08 - Affectation de ressources sans fil sur la base de critères de qualité
H04B 7/06 - Systèmes de diversité; Systèmes à plusieurs antennes, c. à d. émission ou réception utilisant plusieurs antennes utilisant plusieurs antennes indépendantes espacées à la station d'émission
H04L 1/00 - Dispositions pour détecter ou empêcher les erreurs dans l'information reçue
H04L 1/06 - Dispositions pour détecter ou empêcher les erreurs dans l'information reçue par réception à diversité utilisant la diversité d'espace
H04B 7/0452 - Systèmes MIMO à plusieurs utilisateurs
A method is provided for relaying Public Warning System (PWS) messages. The method includes a communications device receiving a PWS message over a first communication technology. The method also includes the communications device relaying all or part of the PWS message over a second communication technology, wherein the second communication technology is different than the first communication technology.
H04W 76/14 - Gestion de la connexion Établissement de la connexion Établissement de la connexion en mode direct
H04W 4/70 - Services pour la communication de machine à machine ou la communication de type machine
H04W 4/80 - Services utilisant la communication de courte portée, p.ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
H04W 4/40 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons
H04W 48/18 - Sélection d'un réseau ou d'un service de télécommunications
H04W 68/12 - Avertissement aux utilisateurs, p.ex. alerte ou messagerie, sur l'arrivée d'une communication, un changement de service ou similaires avertissement inter-réseaux
A method at a computing device for data management between a publisher and at least one subscriber, the method including receiving, at a system element, memory requirements from the publisher; creating a memory allocation of a pool of data objects for the publisher based on the received memory requirements; receiving, at the system element, consumption criteria from each of the at least one subscriber; and adjusting the memory allocation of the pool of data objects based on the consumption criteria received from the at least one subscriber.
A method and apparatus for representing a conversation of related messages is provided. In a message collection user interface for displaying messages sent and received by a communications device, a dynamic session placeholder is used for a respective conversation of related messages. The message collection user interface is displayed including any dynamic session placeholders in the list of messages. As messages from the conversation are occasioned, the dynamic session placeholder is updated. When the message collection is displayed, it is displayed in accordance with the updated session placeholder.
H04L 51/00 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p.ex. courriel
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
H04L 51/04 - Messagerie en temps réel ou quasi en temps réel, p.ex. messagerie instantanée [IM]
92.
Method and System for Updating of an Application Layer for a Third-Party Telematics Provider
A method at a system including a firewall and at least one application, the method including obtaining, at the at least one application, a new address for a service provider for the at least one application; triggering a firewall update; obtaining a new firewall configuration; and updating the firewall, wherein the updating the firewall allows a connection from the at least one application to the new address for the service provider.
A method at a computing device in an intelligent transportation system for reconfiguring a road segment, the method including receiving a request from a second computing device associated with a vehicle to change a configuration for the road segment; determining a road segment configuration; and reconfiguring the road segment based on the determined road segment configuration.
A method for determining an access point name (APN) for mission critical services includes determining, at a user equipment (UE), APN information of a packet data network (PDN) based on at least one of a mission critical organization name, a registered public land mobile network identifier, or a home public land mobile network identifier currently associated with the UE; and connecting to the PDN based on the determined APN information.
A method at a computing device in a public ledger cryptography system, the method including creating a purpose string, the purpose string defining transaction parameters for an account within the public ledger cryptography system; using the purpose string to create a private key and associated public key for an account within the public ledger cryptography system; and providing the purpose string for use in verification of a transaction from the account within the public ledger cryptography system.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
A mobile transceiver having multiple subscriber identity module (SIM) cards and a method of selection is provided. In accordance with one embodiment, there is provided a method of operating a mobile transceiver, comprising: using a cellular transceiver in association with a first subscriber identity module (SIM) card in a plurality of SIM cards to access a first wireless network; and using the cellular transceiver in association with a second SIM card in the plurality of SIM cards to access a second wireless network in response to a failure to access the first wireless network with the first SIM card.
H04W 48/18 - Sélection d'un réseau ou d'un service de télécommunications
H04B 1/3816 - TRANSMISSION - Détails des systèmes de transmission non caractérisés par le milieu utilisé pour la transmission Émetteurs-récepteurs, c. à d. dispositifs dans lesquels l'émetteur et le récepteur forment un ensemble structural et dans lesquels au moins une partie est utilisée pour des fonctions d'émission et de réception avec des connecteurs pour programmer des dispositifs d’identification
H04B 1/3827 - TRANSMISSION - Détails des systèmes de transmission non caractérisés par le milieu utilisé pour la transmission Émetteurs-récepteurs, c. à d. dispositifs dans lesquels l'émetteur et le récepteur forment un ensemble structural et dans lesquels au moins une partie est utilisée pour des fonctions d'émission et de réception Émetteurs-récepteurs portatifs
H04W 48/16 - Exploration; Traitement d'informations sur les restrictions d'accès ou les accès
H04W 64/00 - Localisation d'utilisateurs ou de terminaux pour la gestion du réseau, p.ex. gestion de la mobilité
H04W 48/04 - Restriction d'accès effectuée dans des conditions spécifiques sur la base des données de localisation ou de mobilité de l'utilisateur ou du terminal, p.ex. du sens ou de la vitesse de déplacement
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Recorded and downloadable computer software for providing
cyber-security, endpoint security and data protection and
privacy; recorded and downloadable computer software for use
in the design, development, installation, deployment,
analysis, and monitoring of and maintenance of computer
software in the field of land vehicle computing systems;
recorded and downloadable software for data and software
system integration and system configuration in the
automotive sector; recorded and downloadable software for
customization and integration into land vehicle electronic
computing systems to collect, develop, and organize vehicle
data to manage, trace, and track vehicle history and
performance data, extract vehicle diagnostic data and
telematics, and integrate with third party computer systems;
recorded and downloadable computer software for measuring,
assessing, identifying, detecting, analyzing, preventing,
and responding to cybersecurity threats, attacks, risks, and
vulnerabilities; real-time embedded computer systems for use
with automobiles; recorded and downloadable computer
software for operation and control of autonomous-driving
vehicles; recorded and downloadable computer software for
use in the automotive and transportation sectors, namely,
telematics, advanced driver assistance systems comprising
electronic sensors, cameras, software and hardware that
monitor a motor vehicle and its various systems for the
purpose of the provisioning of automated driver assistance,
and speed control equipment, instrument clusters, namely,
automotive head-up display, automotive navigation systems,
vehicle dashboard gauges, engine sound enhancement,
hands-free vehicle control systems, infotainment systems,
and autonomous driving vehicles; recorded and downloadable
computer software development tools that enable software
developers to program and users to build and configure
software applications in field of land vehicle electronic
computing systems; recorded and downloadable software
developer kits (sdks); recorded and downloadable computer
software for endpoint security, malware analysis,
vulnerability testing, penetration testing, and
vulnerability assessment; recorded and downloadable software
for artificial intelligence, analytics-based machine
learning, and deep learning software, all for the purpose of
the design, development, installation, deployment, analysis,
monitoring of and maintenance of computer software in the
field of land vehicle electronic computing systems; recorded
and downloadable computer software that enable software
developers to design, test, deploy, manage, and monitor
internet of things (IoT) and machine-to-machine (m2m)
devices. Software as a service (SaaS) and platform as a service
(PaaS) services featuring software for providing
cyber-security, data protection and privacy; software as a
service (SaaS) and platform as a service (PaaS) services
featuring computer software platforms for use in the design,
development, installation, deployment, analysis, monitoring
of and maintenance of computer software in the field of land
vehicle electronic computing platforms and systems;
providing temporary use of online non-downloadable software
for comprehensive data integration services; software as a
service (SaaS) and platform as a service (PaaS) services
featuring data and software system integration and system
configuration, and for use as operating systems and safe
execution platform for distributed networked systems in the
automotive sector; software as a service (SaaS) and platform
as a service (PaaS) services featuring software for
customization and integration into land vehicle electronic
computing systems to collect, develop, and organize vehicle
data to manage, trace, and track vehicle history and
performance data, extract vehicle diagnostic data, and
integrate with third party computer systems; design and
development of computer software; providing temporary use of
non-downloadable computer software for measuring, assessing,
identifying, detecting, analyzing, preventing, and
responding to cybersecurity threats, attacks, risks, and
vulnerabilities; custom software design and development of
real-time embedded computer systems for use with
automobiles; providing online non-downloadable computer
software development tools, namely, computer software
development platforms for development of embedded computer
systems; design, development and software maintenance of
computer systems and software for operation and control of
autonomous-driving vehicles; providing temporary use of
online non-downloadable software for operation and control
of autonomous-driving vehicles; providing temporary use of
online non-downloadable software development platforms for
developing software applications for use in the automotive
and transportation sectors, namely, telematics, advanced
driver assistance systems comprising electronic sensors,
cameras, software and hardware that monitor a motor vehicle
and its various systems for the purpose of the provisioning
of automated driver assistance, and speed control equipment,
instrument clusters, namely, automotive head-up display,
automotive navigation systems, vehicle dashboard gauges,
engine sound enhancement, hands-free vehicle control
systems, infotainment systems, and autonomous driving
vehicles; software development platforms and software
development tools that enable software developers to program
and users to build and configure software applications that
work in conjunction with such non-downloadable software
applications, and platforms and development tools and to
transfer, share, format, manipulate and integrate data,
information and such developer software applications,
platforms and development tools working in conjunction with
and between such non-downloadable software applications, and
platforms and development tools and third party services
(term considered too vague by the International Bureau -
Rule 13 (2) (b) of the Regulations); providing temporary use
of online non-downloadable software applications, software
development platforms, software developer kits (sdks) and
software development tools that enable software developers
to design, test, deploy, manage, and monitor endpoint
devices; providing temporary use of on-line non-downloadable
computer software for endpoint security, malware analysis,
vulnerability testing, penetration testing, and
vulnerability assessment; computer software services,
namely, development, maintenance, repair, installation,
troubleshooting of problems, support in the nature of
diagnosing problems, upgrade and updating, authoring,
provision of information, consultation, design and
customization of computer software and middleware; computer
security consultancy; providing temporary use of
non-downloadable software for artificial intelligence,
analytics-based machine learning, and deep learning
software, all for the purpose of the design, development,
installation, deployment, analysis, monitoring of and
maintenance of computer software in the field of land
vehicle electronic computing platforms and systems; platform
as a service (PAAS) services featuring computer development
platforms that enable software developers to design, test,
deploy, manage, and monitor internet of things (IoT) and
machine-to-machine (m2m) devices.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Recorded and downloadable computer software for providing
cyber-security, endpoint security and data protection and
privacy; recorded and downloadable computer software for use
in the design, development, installation, deployment,
analysis, and monitoring of and maintenance of computer
software in the field of land vehicle computing systems;
recorded and downloadable software for data and software
system integration and system configuration in the
automotive sector; recorded and downloadable software for
customization and integration into land vehicle electronic
computing systems to collect, develop, and organize vehicle
data to manage, trace, and track vehicle history and
performance data, extract vehicle diagnostic data and
telematics, and integrate with third party computer systems;
recorded and downloadable computer software for measuring,
assessing, identifying, detecting, analyzing, preventing,
and responding to cybersecurity threats, attacks, risks, and
vulnerabilities; real-time embedded computer systems for use
with automobiles; recorded and downloadable computer
software for operation and control of autonomous-driving
vehicles; recorded and downloadable computer software for
use in the automotive and transportation sectors, namely,
telematics, advanced driver assistance systems comprising
electronic sensors, cameras, software and hardware that
monitor a motor vehicle and its various systems for the
purpose of the provisioning of automated driver assistance,
and speed control equipment, instrument clusters, namely,
automotive head-up display, automotive navigation systems,
vehicle dashboard gauges, engine sound enhancement,
hands-free vehicle control systems, infotainment systems,
and autonomous driving vehicles; recorded and downloadable
computer software development tools that enable software
developers to program and users to build and configure
software applications in field of land vehicle electronic
computing systems; recorded and downloadable software
developer kits (sdks); recorded and downloadable computer
software for endpoint security, malware analysis,
vulnerability testing, penetration testing, and
vulnerability assessment; recorded and downloadable software
for artificial intelligence, analytics-based machine
learning, and deep learning software, all for the purpose of
the design, development, installation, deployment, analysis,
monitoring of and maintenance of computer software in the
field of land vehicle electronic computing systems; recorded
and downloadable computer software that enable software
developers to design, test, deploy, manage, and monitor
internet of things (IoT) and machine-to-machine (m2m)
devices. Software as a service (SaaS) and platform as a service
(PaaS) services featuring software for providing
cyber-security, data protection and privacy; software as a
service (SaaS) and platform as a service (PaaS) services
featuring computer software platforms for use in the design,
development, installation, deployment, analysis, monitoring
of and maintenance of computer software in the field of land
vehicle electronic computing platforms and systems;
providing temporary use of online non-downloadable software
for comprehensive data integration services; software as a
service (SaaS) and platform as a service (PaaS) services
featuring data and software system integration and system
configuration, and for use as operating systems and safe
execution platform for distributed networked systems in the
automotive sector; software as a service (SaaS) and platform
as a service (PaaS) services featuring software for
customization and integration into land vehicle electronic
computing systems to collect, develop, and organize vehicle
data to manage, trace, and track vehicle history and
performance data, extract vehicle diagnostic data, and
integrate with third party computer systems; design and
development of computer software; providing temporary use of
non-downloadable computer software for measuring, assessing,
identifying, detecting, analyzing, preventing, and
responding to cybersecurity threats, attacks, risks, and
vulnerabilities; custom software design and development of
real-time embedded computer systems for use with
automobiles; providing online non-downloadable computer
software development tools, namely, computer software
development platforms for development of embedded computer
systems; design, development and software maintenance of
computer systems and software for operation and control of
autonomous-driving vehicles; providing temporary use of
online non-downloadable software for operation and control
of autonomous-driving vehicles; providing temporary use of
online non-downloadable software development platforms for
developing software applications for use in the automotive
and transportation sectors, namely, telematics, advanced
driver assistance systems comprising electronic sensors,
cameras, software and hardware that monitor a motor vehicle
and its various systems for the purpose of the provisioning
of automated driver assistance, and speed control equipment,
instrument clusters, namely, automotive head-up display,
automotive navigation systems, vehicle dashboard gauges,
engine sound enhancement, hands-free vehicle control
systems, infotainment systems, and autonomous driving
vehicles; software development platforms and software
development tools that enable software developers to program
and users to build and configure software applications that
work in conjunction with such non-downloadable software
applications, and platforms and development tools and to
transfer, share, format, manipulate and integrate data,
information and such developer software applications,
platforms and development tools working in conjunction with
and between such non-downloadable software applications, and
platforms and development tools and third party services
(term considered too vague by the International Bureau -
Rule 13 (2) (b) of the Regulations); providing temporary use
of online non-downloadable software applications, software
development platforms, software developer kits (sdks) and
software development tools that enable software developers
to design, test, deploy, manage, and monitor endpoint
devices; providing temporary use of on-line non-downloadable
computer software for endpoint security, malware analysis,
vulnerability testing, penetration testing, and
vulnerability assessment; computer software services,
namely, development, maintenance, repair, installation,
troubleshooting of problems, support in the nature of
diagnosing problems, upgrade and updating, authoring,
provision of information, consultation, design and
customization of computer software and middleware; computer
security consultancy; providing temporary use of
non-downloadable software for artificial intelligence,
analytics-based machine learning, and deep learning
software, all for the purpose of the design, development,
installation, deployment, analysis, monitoring of and
maintenance of computer software in the field of land
vehicle electronic computing platforms and systems; platform
as a service (PAAS) services featuring computer development
platforms that enable software developers to design, test,
deploy, manage, and monitor internet of things (IoT) and
machine-to-machine (m2m) devices.
99.
SYSTEM AND METHOD FOR USER AUTHENTICATION BASED ON PASSIVE BIOMETRICS
A computer-implemented method is disclosed. The method includes: receiving, via an input interface associated with an electronic device, a first user input; identifying a first device class based on a current usage mode of the electronic device and a first set of device property values associated with the current usage mode of the electronic device; obtaining normalized values of input features associated with the first user input, the input feature values being normalized based on representative device property values that are defined for the first device class; and performing authentication of a user of the electronic device based on the normalized input feature values associated with the first user input.
The present disclosure described herein relates to a system and method for distributing messages to an electronic device. The method comprises: analyzing data relating to the device to determine a correlation of data relating to a user of the device; selecting an advertisement from a set of advertisements based on the correlation of data; and transmitting the advertisement to the device. The correlation of data may be determined from analyzing movement data and at least one status indicator relating to the device.
G06Q 30/02 - Marketing; Estimation ou détermination des prix; Collecte de fonds
H04W 4/02 - Services utilisant des informations de localisation
H04L 51/222 - Surveillance ou traitement des messages en utilisant des informations de localisation géographique, p.ex. des messages transmis ou reçus à proximité d'un certain lieu ou d'une certaine zone
H04L 51/58 - Adaptation des messages pour la communication sans fil
H04L 51/214 - Surveillance ou traitement des messages en utilisant le transfert sélectif