Abstract:
Disclosed herein is a method and system for employing power-saving states/modes in electronic devices. The electronic device may be adapted to determine whether an end-user is physically present when the electronic device is in operation or when an end-user display apparatus is inactive. The electronic device may be adapted to prompt an end-user to respond with an appropriate response. Upon determining that the end-user is not physically present, the electronic device may be adapted to enter at least one of a plurality of power-saving modes. The end-user, the network, and the electronic device may each be able to set the power-saving modes. The electronic device may also enter at least one of a plurality of power-saving modes by default. The electronic device may be adapted to maintain an end-user's settings and preferences by employing the power-saving modes.
Abstract:
A network component for processing a packet includes at least one first storage unit, at least one second storage unit, at least one third storage unit, and an action implementation unit. The at least one first storage unit is configured to store an initial bit value selected from within the packet. The at least one second storage unit is configured to store a bit action length value. The at least one third storage unit is configured to store an extracted bit value based upon the initial bit value and the bit action length value. The action implementation unit is configured to implement at least one action on a packet by using an action bit value to modify the extracted bit value.
Abstract:
A network component for processing a packet can include a rules table configured to have a plurality of entries, and sets of first storage units within each one of the plurality of entries. The sets of first storage units are configured to store sets of range checking parameters with respect to the packet. The sets of range checking parameters can identify a plurality of packet field values and a plurality of range values. In addition, the network component can include an action implementation unit configured to implement at least one first action with respect to the packet when at least one of the plurality of packet field values falls within a corresponding pair of range values for one of the plurality of entries. The action implementation unit is also configured to implement at least one second action with respect to the packet when each one of the plurality of packet field values falls within each corresponding pair of range values for one of the plurality of entries, and the action implementation unit can implement at least one third action with respect to the packet when each one of the plurality of the packet field values does not fall within each corresponding pair of range values.
Abstract:
Aspects of the present invention may be found in a system, method, and/or apparatus for packet level security. In embodiment, there is presented a network node for transmitting packets. The network node comprises at least one port, a random number generator, and a circuit. There is at least one port for receiving the packets. The random number generator generates random numbers. The random numbers are associated and vary with different times. The circuit applies particular ones of the random numbers to the packets. There is at least one port for transmitting the packets with the particular ones of the random numbers applied to the packets.
Abstract:
Presented herein are systems and methods for video teleconferencing. A mobile terminal comprises a transceiver, a video decoder, and a display screen. The transceiver receives video data signals from a plurality of mobile terminals. The video decoder generates videos from the video data signals from the plurality of mobile terminals. The display screen simultaneously displays the videos.
Abstract:
Disclosed herein is a method and system for erasing at least a portion of non-volatile memory in an electronic device, such as for example, a mobile handset. The erase command may be received at a processor of the electronic device from an electronic device server via a wireless or a wired communication network. In an embodiment according to the present invention, the electronic device may also prompt an end-user to erase at least a portion of the non-volatile memory. Secure erasure of non-volatile memory may include overwriting at least one selected portion of memory with predetermined data/information and/or randomly generated data/information. In an embodiment according to the present invention, a secure erasure of at least one portion of non-volatile memory may include overwriting one of a plurality of times and at least once the selected portion of non-volatile memory to be erased.
Abstract:
Presented herein are systems and methods for integrating secure identification logic into cell phones. A registration is received, wherein said registration includes an identifier identifying a mobile terminal. Information is transmitted to the mobile terminal, wherein a password is a function of the information.
Abstract:
Presented herein are systems and methods for global positioning system based secure access. A request for access to a computer network is received. A determination is made whether a mobile terminal is within a predetermined location. If the mobile terminal is within the predetermined location, access is granted. If the mobile terminal is outside of the predetermined location, access to the computer network is denied.
Abstract:
A filter for processing a packet can have a plurality of first masks for masking the packet, and a storage unit configured to correspond to the plurality of first masks for storing a first bit map. In addition, the filter can have a first table configured to apply the first bit map thereto. If upon applying the first bit map to the first table results in a match, then at least one specified action is implemented on the packet.
Abstract:
A personal video recorder network facilities the recording and storage of video data, such as home videos, on a remote storage provided by a service provider. The remote storage can be shared among users. Access control is provided for security. A PVR client is used to access the storage and display such stored video content. In one embodiment, the PVR storage is incorporated into a set-top-box.