Predictive precaching of data based on context
    31.
    发明授权
    Predictive precaching of data based on context 有权
    基于上下文预测数据预处理

    公开(公告)号:US09058324B2

    公开(公告)日:2015-06-16

    申请号:US13631565

    申请日:2012-09-28

    Abstract: A device and method for predictively precaching content on a mobile communication device includes monitoring numerous data sources for contextual data on the activities of the user. The mobile communication device predicts network connectivity outages and affected applications using the contextual data. The mobile communication device notifies the affected applications of the predicted network connectivity outage, and in response the affected applications precache suitable content. The affected applications may employ several precaching strategies in response to the notification, such as downloading content from a remote content server, adjusting content streaming, or adjusting content buffering prior to the predicted network connectivity outage. During the network outage, application service is provided using the precached content. Such precaching may also be accomplished using a local caching proxy server.

    Abstract translation: 用于在移动通信设备上预测性地预处理内容的设备和方法包括监视用于用户活动的上下文数据的许多数据源。 移动通信设备使用上下文数据来预测网络连接中断和受影响的应用。 移动通信设备通知受影响的应用程序预测的网络连通中断,并且响应受影响的应用程序预处理合适的内容。 受影响的应用可以响应于通知而采用若干预制策略,例如从远程内容服务器下载内容,调整内容流,或者在预测的网络连接中断之前调整内容缓冲。 在网络中断期间,使用预安装的内容提供应用服务。 也可以使用本地缓存代理服务器来实现这样的预处理。

    Context-driven local network services

    公开(公告)号:US10735531B2

    公开(公告)日:2020-08-04

    申请号:US15853012

    申请日:2017-12-22

    Abstract: Various embodiments are generally directed to cooperation among networked devices to obtain and use a multiple-frame screenshot. In one embodiment, an apparatus comprises a processor circuit executing a sequence causing the processor circuit to receive a signal conveying a context data; retrieve an aspect of a current context of the apparatus; compare the aspect to the context data; determine whether a context defined as appropriate exists to engage in interactions with one or more other computing devices through a network based on the comparison, the interactions comprising providing a network service to the one or more other computing devices; and engage in the interactions with one or more computing devices through the network when the appropriate context to engage in the interactions exists. Other embodiments are described and claimed herein.

    Technologies for managing sensor anomalies

    公开(公告)号:US10690511B2

    公开(公告)日:2020-06-23

    申请号:US14998231

    申请日:2015-12-26

    Abstract: Technologies for managing sensor anomalies in a compute system include determining whether sensor data received from a first sensor is anomalous based on sensor data from another sensor and a correlation rule. The correlation rule defines an excepted correlation between the first sensor data and the second sensor data. If the correlation between the first sensor data and the second sensor data is not observed, the first sensor data may be deemed anomalous. If so, the first sensor data may be verified using another sensor or other correlation. If the first sensor is determined to be malfunctioning, the compute system may mitigate the loss of the first sensor by using another sensor in its place.

    Technologies for managing sensor conflicts

    公开(公告)号:US10152336B2

    公开(公告)日:2018-12-11

    申请号:US14757833

    申请日:2015-12-26

    Abstract: Technologies for managing sensor conflicts in a compute system include determining an implication of stimuli sensed by two or more sensors of the compute system and determining whether a conflict exists between the determined implications. If a conflict does exist, an amount of discomfort is applied to the compute device. For example, a performance characteristic of the compute device may be adversely impacted based on the determined conflict. In some embodiments, the level of applied discomfort is based on a magnitude, importance, and/or duration of the implication conflict.

    Technologies for managing network privileges based on physical presence

    公开(公告)号:US09871820B2

    公开(公告)日:2018-01-16

    申请号:US14583686

    申请日:2014-12-27

    Abstract: Technologies for managing network privileges of members of graft-network include detecting a computing device in physical presence with a network infrastructure, determining whether the computing device is a member of the graft-network, and establishing initial network privileges for the computing device if the computing device is not a member, without direct programming of the member. The network privileges of members of the graft-network are updated over time as a function of the length of time for which the computing device is in physical presence of the network infrastructure. A computing device may be in physical presence of the network by physical contacting a communication bus of the network infrastructure or being within a limited communication range of the communication bus. New members to the graft-network may be quarantined to reduce risk to the network.

    Method for exchanging strong encryption keys between devices using alternate input methods in wireless personal area networks (WPAN)
    39.
    发明授权
    Method for exchanging strong encryption keys between devices using alternate input methods in wireless personal area networks (WPAN) 有权
    在无线个人区域网络(WPAN)中使用替代输入方法在设备之间交换强加密密钥的方法

    公开(公告)号:US09401902B2

    公开(公告)日:2016-07-26

    申请号:US14156686

    申请日:2014-01-16

    Abstract: A method for exchanging strong encryption keys between devices using alternate input methods. At least two devices that want to communicate with one another are set in key exchange mode. The at least two devices are to communicate with one another using a short range radio or personal area network. The at least two devices negotiate with one another to determine which of the at least two devices will generate an encryption key, wherein device A represents the negotiated device and device B represents the non-negotiated device. Device A generates the encryption key and transmits the encryption key to device B using an out-of band transmission channel. The out-of-band transmission channel may be transmitting the encryption key via audio tones. A validation process determines whether the transmission of the encryption key via the out-of-band transmission channel was successful. If the encryption key has been successfully validated, the at least two devices are enabled to automatically accept communications between them over the short range radio or personal area network.

    Abstract translation: 一种使用替代输入法在设备之间交换强加密密钥的方法。 在密钥交换模式下设置至少两个想要彼此通信的设备。 至少两个设备将使用短距离无线电或个人区域网络彼此通信。 所述至少两个设备彼此协商以确定所述至少两个设备中的哪一个将生成加密密钥,其中设备A表示协商的设备,设备B表示未协商的设备。 设备A生成加密密钥,并使用带外传输通道将加密密钥发送到设备B. 带外传输信道可以经由音频音调发送加密密钥。 验证过程确定经由带外传输信道的加密密钥的传输是否成功。 如果加密密钥已被成功验证,则至少两个设备能够通过短距离无线电或个人区域网络自动接受它们之间的通信。

    Security data aggregation and business intelligence for web applications
    40.
    发明授权
    Security data aggregation and business intelligence for web applications 有权
    Web应用程序的安全数据聚合和商业智能

    公开(公告)号:US09213827B2

    公开(公告)日:2015-12-15

    申请号:US13628219

    申请日:2012-09-27

    CPC classification number: H04L63/1433 G06F21/51 H04L67/02

    Abstract: Systems and methods may provide for detecting a browser request for web content. Additionally, interaction information associated with a plurality of sources may be determined in response to the browser request, and a risk profile may be generated based on the interaction. The risk profile may include at least a portion of the interaction information as well as recommended control actions to mitigate the identified risk. In one example, the risk profile is presented to a user associated with the browser request as well as to a security control module associated with the platform.

    Abstract translation: 系统和方法可以提供用于检测对web内容的浏览器请求。 此外,可以响应于浏览器请求来确定与多个源相关联的交互信息,并且可以基于交互来生成风险简档。 风险简档可以包括交互信息的至少一部分以及推荐的控制动作以减轻所识别的风险。 在一个示例中,将风险简档呈现给与浏览器请求相关联的用户以及与该平台相关联的安全控制模块。

Patent Agency Ranking