摘要:
In an embodiment, a UE obtains one or more quorum conditions for communication with a given group from a set of groups to which the UE is registered. The UE searches, over a P2P interface, to identify one or more group members that are registered to the given group and which are proximate to the UE. The UE determines whether the identified one or more group members are sufficient to satisfy at least one of the one or more quorum conditions. The UE selectively triggers a communicative action associated with the given group based on whether the determining determines the at least one quorum condition to be satisfied.
摘要:
The disclosure is related to determining an association among Internet of Things (IoT) devices. A first IoT device receives an identifier of a second IoT device, obtains a schema of the second IoT device based on the identifier of the second IoT device, and determines whether or not there is an association between the first IoT device and the second IoT device based on a schema of the first IoT device and the schema of the second IoT device, where the schema of the first IoT device comprises schema elements and corresponding values of the first IoT device and the schema of the second IoT device comprises schema elements and corresponding values of the second IoT device.
摘要:
The disclosure relates to mechanisms that may be used to route notifications in an Internet of Things (IoT) environment according to user activity and/or proximity detection. More particularly, in various embodiments, an entity that manages the IoT environment may receive one or more messages, actions, or responses that indicate detected activity or detected proximity associated with one or more users from one or more IoT devices in the IoT environment. The management entity may then establish an activity and proximity trail from the one or more messages, actions, or responses that indicate the detected activity or the detected proximity, whereby in response to an IoT device reporting one or more notifications, an IoT device in proximity to at least one of the one or more users may be identified and the one or more notifications may be routed to the identified IoT device.
摘要:
Methods, servers and systems are disclosed for authenticating location information in a message from a sending computing device to a receiving computing device. Location information of a sending computing device at an actual location may be incorporated in the message. Location information in a message may be compared with information regarding the actual location of the sending computing device maintained by a server. The location information in the message may be authenticated based on the comparison.
摘要:
A smart Voice Over LTE (VoLTE) application for allowing a wireless mobile device to select an appropriate access technology for establishing a voice call with a target mobile device, based on the capabilities of the target mobile device. Selection on the client side allows interoperability of a VoLTE wireless mobile device on a circuit switched network without requiring use of a gateway between the circuit switched and VoLTE networks. If the target mobile device is only configured for legacy circuit switched network calls, the wireless mobile device need not begin the call connection on the VoLTE network and instead may establish the call on the circuit switched network from the beginning.
摘要:
The disclosure relates to hosting a group call at a wireless user device. An embodiment receives, by the wireless user device, registration information for a plurality of client devices, receives, by the wireless user device, a call request for a call among two or more of the plurality of client devices, sets up, by the wireless user device, the call among the two or more client devices, receives, by the wireless user device, a media stream, and transmits, by the wireless user device, the media stream to at least one of the two or more client devices.
摘要:
The disclosure relates to mechanisms that may be used to route notifications in an Internet of Things (IoT) environment according to user activity and/or proximity detection. More particularly, in various embodiments, an entity that manages the IoT environment may receive one or more messages, actions, or responses that indicate detected activity or detected proximity associated with one or more users from one or more IoT devices in the IoT environment. The management entity may then establish an activity and proximity trail from the one or more messages, actions, or responses that indicate the detected activity or the detected proximity, whereby in response to an IoT device reporting one or more notifications, an IoT device in proximity to at least one of the one or more users may be identified and the one or more notifications may be routed to the identified IoT device.
摘要:
The disclosure generally relates to offloading communication from a network infrastructure to direct peer-to-peer communication. In particular, a server may receive peer-to-peer status information over the network infrastructure from at least two client devices that intend to communicate, wherein the peer-to-peer status information may include at least coarse or precise location information associated with the client devices. The server may then instruct the client devices to communicate over a direct peer-to-peer connection that bypasses the network infrastructure in response to determining that the location information received from the client devices and other conditions permit offloading the communication from the network infrastructure. For example, the server may determine whether the communication can be offloaded based at least in part on whether an estimated distance between the client devices falls within a maximum range associated with one or more peer-to-peer interfaces supported on one or more of the client devices.
摘要:
Methods and apparatuses for implementing an emergency instruction based on an emergency message from a trusted authority source. The method includes receiving, at an Internet of Things (IoT) device, an emergency secret key from a trusted authority source The method receives, at an IoT device, an emergency message from the trusted authority source; decoding, at an IoT device, the emergency message from the trusted authority source using the emergency secret key to determine a value within the emergency message. The method calculates, at an IoT device, a result based on the determined value. The method implements, at an IoT device, an emergency instruction if the result is above a predetermined threshold.