Abstract:
A method, non-transitory computer readable medium, and apparatus for delivering a document obtained on a remote network that is disconnected from a protected network are disclosed. For example, the method receives the document at the remote network that is disconnected from the protected network, stores the document on the mobile endpoint device, detects a presence of the protected network, delivers the document to a repository on the protected network and deletes the document from the mobile endpoint device.
Abstract:
A method, non-transitory computer readable medium, and apparatus for incorporating additional content in a document at a time of processing are disclosed. For example, the method initiates a request to process a document, receives an option to include one or more additional content to the document, selects at least one additional content to add to the printed document from the endpoint device at the time of processing, defines at least one access control of the at least one additional content and sends the request to process the document, wherein the at least one additional content is incorporated into the document that is processed and the at least one additional content has the at least one access control.
Abstract:
Embodiments described herein are directed to a virtual repair of digital media using a virtual repair service. Digital media stored on a digital media device is read using a media player. A request is received by a virtual repair unit from the media player to perform a virtual repair of a segment of unreadable digital content of the digital media. The virtual repair unit retrieves a readable copy of the digital content corresponding to the segment of unreadable digital content identified in the request from a media repository using the virtual repair unit. The virtual repair unit transmits the readable copy of the digital content to the media player for insertion into a buffer of the media player.
Abstract:
A method of printing a document from a mobile device comprises coupling the mobile device to a proximate print device. The method further comprises, by a processor of the mobile device executing a print software application that causes the processor to identify a document to be printed, use data obtained from the mobile device to identify a context at a time that is concurrent with identifying the document, use the context to customize the identified document by identifying and modifying at least one parameter of the identified document, and transmit the customized document to be printed to the print device for printing by the print device. The data obtained from the mobile device comprises one or more of the following data sensed by one or more sensors of the mobile device, or data gathered by one or more mobile applications of the mobile device.
Abstract:
A method of encrypting information using a computational tag may include, by a mobile electronic device, detecting a computational tag within a near field communication range of the mobile electronic device, identifying a document to be encrypted by the mobile electronic device, transmitting the document to the computational tag by the mobile electronic device, receiving, from the computational tag, an encrypted document, wherein the encrypted document comprises an encrypted version of the document that was to be encrypted, and storing the encrypted document in a memory of the mobile electronic device.
Abstract:
A method of printing a document from a mobile device comprises coupling the mobile device to a proximate print device. The method further comprises, by a processor of the mobile device executing a print software application that causes the processor to identify a document to be printed, use data obtained from the mobile device to identify a context at a time that is concurrent with identifying the document, use the context to customize the identified document by identifying and modifying at least one parameter of the identified document, and transmit the customized document to be printed to the print device for printing by the print device. The data obtained from the mobile device comprises one or more of the following data sensed by one or more sensors of the mobile device, or data gathered by one or more mobile applications of the mobile device.
Abstract:
A method for establishing a network connection between a mobile electronic device and a target network device includes establishing a short-range communications link between the mobile electronic device and the target network device. The method may also include, by a processor, executing an application that causes the processor to receive network device information from the target network device, via the short-range communications link, use the identifier associated with the target network device to identify a network to which the target network device is connected, use a transmitter component of the mobile electronic device to establish the network connection between the mobile electronic device and the target network device, via the identified network, and cause the transmitter component to send a communication to the target network device, via the identified network. The network device information comprises an identifier associated with the target network device.
Abstract:
A method of encrypting information using a computational tag may include, by a mobile electronic device, detecting a computational tag within a near field communication range of the mobile electronic device, identifying a document to be encrypted by the mobile electronic device, transmitting the document to the computational tag by the mobile electronic device, receiving, from the computational tag, an encrypted document, wherein the encrypted document comprises an encrypted version of the document that was to be encrypted, and storing the encrypted document in a memory of the mobile electronic device.
Abstract:
A method and system of configuring a network using a network application of a mobile device including detecting a gesture sequence that comprises at least one gesture, in response to a user performed action. The detected gesture sequence may be indicative of network configuration rules associated with at least one network device. The method may further include receiving and storing network access credentials, and accessing a network configuration database. The network configuration database may comprise a plurality of gesture sequences and a plurality of associated tasks. The method may also include determining a match for the detected gesture sequence among the plurality of gesture sequences; determining an associated task based on the match; and performing the associated task to achieve the network configuration action. The associated task may include a network configuration action based on the network configuration rules associated with at least one network device.
Abstract:
A method of encrypting information using a computational tag may include, by a mobile electronic device, detecting a computational tag within a near field communication range of the mobile electronic device, identifying a document to be encrypted by the mobile electronic device, transmitting the document to the computational tag by the mobile electronic device, receiving, from the computational tag, an encrypted document, wherein the encrypted document comprises an encrypted version of the document that was to be encrypted, and storing the encrypted document in a memory of the mobile electronic device.