Abstract:
A system may include a device having a program that includes a workflow system public key associated with a workflow system and programming instructions that allow the device to communicate with the workflow system over a communication network. The system may initialize a device by sending communications to the workflow system, receiving a response that includes information encrypted with a workflow system private key, and verifying the authenticity of the response by using the workflow system public key to decrypt the information in the response. The system may register the device for privacy treatment by the workflow system by generating a key pair that includes a client private key and a client public key, generating an encrypted client key by encrypting the client public key with the workflow system public key, including the encrypted client key in a privacy request, and sending the privacy request to the workflow system.
Abstract:
A method for printing a document from a mobile device includes identifying a document to be printed and generating a notification comprising a selection of at least one candidate print device that may be selected for printing. The notification may be generated by analyzing, by one or more mobile device applications, the document to be printed to identify a document context including a security level of the identified document; using data sensed by one or more mobile device sensors to identify a user context including at least a current geographical location of the user; using the user context to detect a print device near the geographical location of the user; and accessing a rule set to determine if the identified document can be printed on the detected print device based on the security level of the identified document; and causing a user interface to output the notification.
Abstract:
A method for establishing a network connection between a mobile electronic device and a target network device includes establishing a short-range communications link between the mobile electronic device and the target network device. The method may also include, by a processor, executing an application that causes the processor to receive network device information from the target network device, via the short-range communications link, use the identifier associated with the target network device to identify a network to which the target network device is connected, use a transmitter component of the mobile electronic device to establish the network connection between the mobile electronic device and the target network device, via the identified network, and cause the transmitter component to send a communication to the target network device, via the identified network. The network device information comprises an identifier associated with the target network device.
Abstract:
A computer-based system for improving medication regimen adherence, including: a container arranged to hold a first medication and including a wireless transceiver and a unique identifier; and a wireless communications device (WCD) including: a memory element configured to store a medication regimen including a prescription for the medication and the unique identifier, the unique identifier associated with the medication regimen; and a processor configured to when the container is within a predetermined distance of the WCD obtain, via the wireless transceiver, the unique identifier from the container, confirm that the unique identifier from the container matches the unique identifier stored in the memory element, obtain data from the container regarding instances of the container being opened, determine, according to the data and the medication regimen, that a reminder to take the medication is desired, and output a sensory reminder signal.
Abstract:
Systems and methods for verifying physical proximity to a network device are provided. The method includes acquiring a tag identifier from a tag fixed in, on, or proximal to a network device, using a computing device. The tag is configured to be read and written to by electronic communication with the computing device, when the computing device is disposed in proximity to the tag. The method further includes transmitting data indicative of the tag identifier to a server, and receiving an authorization confirmation from the server. The method also includes rewriting the tag so as to replace the tag identifier with a new tag identifier, using the computing device, and performing one or more operations with the network device after receiving the authorization.
Abstract:
A method, non-transitory computer readable medium, and apparatus for connecting a mobile device with an output device are disclosed. The method may be performed by a processor of a pairing server. For example, the method receives a request to connect the mobile device of an authenticated user to the output device, identifies the mobile device in a database comprising a register of authenticated users and one or more mobile devices of each one of the authenticated users, and transmits a configuration information and a connection information to the mobile device, wherein the configuration information causes the mobile device to modify a configuration of the mobile device and automatically connect to the output device based on the connection information.
Abstract:
Disclosed herein is a paper based diagnostic device including a portable biomedical diagnostic device comprising, paper, wax, and reagents. The biomedical diagnostic device can analyze biochemical assays in test fluids such as blood, urine, and saliva. Diagnostic devices can include one or more of tracking information, personal identification information, security information, color calibration information, and environmental indicators. The security information can further include keys or codes identifying one or more unique characteristics. One aspect of the security information ensures that only predeterminable vendors are able to determine the results of a test from the diagnostic devices.
Abstract:
Methods and systems for identifying and locating assets. Data can be transmitted at regular intervals from a client to a server for processing by the server and stored in a database associated with the server. Such data characterizes the behavior of a user with respect one or more assets that communicate electronically with the server. Based on the data in the database, an indication of the status of the asset (or assets) can be determined. This indication is then utilized to assist in identifying and/or locating the asset.
Abstract:
A method, non-transitory computer readable medium and apparatus for printing in a pull printing system when a print server is unavailable are disclosed. For example, the method includes receiving a request to print a document, determining that the print server of the pull printing system is unavailable, providing one or more printers to print the document, receiving a selection of a printer from the one or more printers to print the document, transmitting the document to the printer that is selected for printing, determining that the print server is available, and transmitting an update message to the print server that includes the document that was printed, the printer that was selected and one or more print parameters associated with the document, wherein the print server synchronizes a print queue and a print history of the print server based on the update message.
Abstract:
Methods and systems receive location identification tokens from transmitters using a portable computerized device. A first location identification token is received from a first location transmitting device, while the portable computerized device is within a predetermined distance from a designated location. A second location identification token is received from a second location transmitting device. A current location signature is calculated using the first and second location identification tokens. A previously stored location signature associated with the first and second location identification tokens is obtained from a computer readable storage medium. The current location signature is compared with the previously stored location signature to determine a similarity measure. The location identification tokens and the current location signature are stored in a memory and transmitted to a server. The presence of the portable computerized device at the designated location is verified based on the location identification tokens and the current location signature.