摘要:
In an embodiment, a method includes registering applications and network services for notification of an out-of-band introduction, and using the out-of-band introduction to bootstrap secure in-band provisioning of credentials and policies that are used to control subsequent access and resource sharing on an in-band channel. In another embodiment, an apparatus implements the method.
摘要:
A method includes receiving a specification for translating a network policy from a first schema to a second, different schema and translating the network policy into the second different schema based on the specification. A network system is configured based on the translated policy.
摘要:
A method for combining speech recognition with near field communication (NFC) to enable a user to enter, store, and use web addresses on portable devices. A user of a portable device having a NFC reader, a voice input interface, a speech recognition system, and memory enables the NFC reader of the portable device to touch a NFC tag or reader found on an object. The object containing information of interest to a user of the portable device; wherein when the NFC reader and the NFC tag or reader touch, the portable device receives a URI and default keywords associated with the URI. The portable device stores the URI in a persistent storage of the portable device based on the default keywords, and date, time, and location of when and where the URI was obtained. The user of the portable device can then retrieve and use the URI at a later time using the voice input interface and the speech recognition system, wherein when the user speaks the default keywords into the voice input interface, the speech recognition system to retrieve the URI.
摘要:
A paging system uses a stationary personal computer to receive paging signals. The personal computer executes an instruction set, or software, which allows the personal computer to forward or process received page signals. By using a stationary personal computer, received page signals can be used to control the personal computer to contact external devices such as: other personal computers, telephones, fax machines, Internet locations, pagers, and household devices. The personal computer can store received page signals including origination identification information. A multiplex forwarding system can be used by providing identification header information.
摘要:
A system and method for distributing software needed to enable a device coupled to a computer to provide a desired functionality. Static information called a moniker is embedded in the device, and a generic device handler software is installed on the computer. When the device is coupled to the computer, the generic device handler software is executed by the computer to interpret the moniker to identify the software needed to enable the device, determine the enabling software's location, and install it, if necessary. The generic handler software and/or the enabling software performs any further action needed by the device or computer to provide or utilize, respectively, the functionality of the device.
摘要:
A computer system with unattended on-demand availability includes power-saving features which place the system into a Standby mode whenever the system is idle or is not being used. Prior to entering Standby mode, the system sets a hardware timer which indicates when the next scheduled event in the system should be performed. When either the timer expires or another event occurs which requires system operation, the system resumes to the On power state without user intervention. In one embodiment, the system of the present invention allows applications to periodically save their operational states. By saving their operational states, applications are able to guard against power failures and crashes. If a power failure or crash occurs, the system consults restart policies and, if appropriate, automatically re-starts applications to their most recently saved operational states once power is re-stored.
摘要:
A method and apparatus for task scheduling across multiple execution sessions allows each scheduled task to be scheduled to occur at a specific time(s), to occur periodically, or to occur in response to certain system events. A task can be scheduled which requires execution of an application even if the application is not running at the scheduled time or event, and even if the system is in a low-power standby mode at the scheduled time or event. In one embodiment, the present invention keeps track of specific time events by setting a timer(s) which indicates the time which should elapse until a scheduled event is to occur. When a timer expires, the system determines which task is scheduled to occur at the time the timer expires and executes that task. In one embodiment, the present invention checks a scheduling database to determine which task is scheduled to occur when a timer expires.
摘要:
In accordance with some embodiments, multiple navigation changes to a navigation system may be managed. The navigation system may receive and first set of navigation changes. Then, the navigation system may establish communication with a user device. The navigation system may then receive a second set of navigation changes associated with the user device. As a result, the navigation system may merge the first set of navigation changes with the second set of navigation changes.
摘要:
A method according to one embodiment includes the operations of configuring a host processor to receive a message filtering rule, the host processor associated with a vehicle; configuring a bus controller to verify authenticity of the message filtering rule, wherein the bus controller is programmed through an interface, the interface inaccessible from the host processor; filtering messages from the host processor using the verified message filtering rule, wherein the filtering is performed by the bus controller; and transmitting the filtered messages from the bus controller over a bus to one or more electronic control units (ECUs), the ECUs communicatively coupled to the bus.
摘要:
In accordance with some embodiments, data may be collected from vehicles, and then reported to various subscribers with different levels of access privileges and pursuant different levels of security. In some embodiments, the data may be authenticated by a cloud service without revealing the identity of vehicle owner. This may provide enhanced privacy. At the same time, some types of the data may be encrypted for security and privacy reasons. Different information may be provided under different circumstances to different subscribers, such as the government, family members, location based services providers, etc.