Abstract:
Embodiments of computer-implemented methods, systems, computing devices, and computer-readable media are described herein for allowing a mobile network operator to perform services on behalf of a non-internet protocol multimedia subsystem (non-IMS) data provider. In various embodiments, an application server (“AS”) front end of the data provider is communicatively connected to a user data repository (“UDR”) and a home subscription server (“HSS”). The HSS is also connected to the UDR. Neither the non-IMS AS nor the HSS store user data, but instead communicate with the UDR across various reference points. The communication across the reference points facilitates the HSS performing various user services on behalf of the non-IMS AS. Other embodiments include user access and authentication procedures in such a network architecture, as well as corresponding policy and charging architecture.
Abstract:
Methods and apparatus for moving or transferring a mobile station from one type of wireless network to another type of wireless network are described herein. The methods may include employing a source radio access technology (RAT) device, a target RAT device, and a cross wireless network type inter-RAT server to collaboratively communicate with each other to move the mobile station between the different types of wireless networks.
Abstract:
The invention relates to a framework system and methods for connecting a plurality of tools. The system comprises a plug-in mechanism configured to dynamically load the plurality of tools, a data pool having storage space configured to store data sets associated with the plurality of tools, a linking mechanism configured to establish communications links between the loaded plurality of tools to enable coordinated operation of the loaded plurality of tools, a session component configured to record the process history of the operations of the loaded plurality of tool and the system states corresponding to the process history of the operations and an annotation module configured to associate user-provided data corresponding to one or more of the stored data sets.
Abstract:
An interactive visual interface for organizing, locating, searching, and monitoring collections of digital information, designed to harness human spatial memory for organizing and retrieving digital information. In one example, an information map organizes digital information within a two-dimensional space with rapid visual feedback and information access. The organization may be algorithmically computed and user-modified. An interface that supports persistent state information whereby search nodes and document references are spatially fixed so that users may harness their spatial memory to organize and find information quickly.
Abstract:
A method of sharing information associated with a selected application is provided. The method comprises identifying a media type associated with the information, and capturing the information based on the media type. The method further comprises identifying a content type associated with the information, the content type being related to the media type, encoding the information based on the content type, and providing access to the encoded information over a communication network.
Abstract:
An embodiment of the present invention provides a method of enabling emergency services in an unauthenticated state on wireless networks, comprising attempting Extensible Authentication Protocol (EAP) authentication with a public user account by a client whose identity indicates the need to place an emergency call, authenticating the client by a Subscription Service Provider Network's (SSPN's) authentication, authorization and accounting (AAA) server and providing keying material to an authenticator and supplicant, thereby securing wireless link, providing by the SSPN's AAA server a virtual local area network identification (VLAN ID) back to an access point (AP), performing by the AP or a distribution system (DS) infrastructure a per-user policing for the VLAN ID ensuring upper-limit on resource usage commensurate with an emergency call, and routing the emergency call to a Public Safety Answering Point (PSAP) by the SSPN's call manager.
Abstract translation:本发明的一个实施例提供了一种在无线网络上实现未认证状态的紧急服务的方法,包括尝试用公共用户帐户进行可扩展认证协议(EAP)认证,其身份指示需要发出紧急呼叫,认证 客户端通过订阅服务提供商网络(SSPN)的认证,授权和计费(AAA)服务器,并向认证者和请求者提供密钥材料,从而保护无线链路,由SSPN的AAA服务器提供虚拟局域网标识(VLAN ID )返回接入点(AP),由AP或分发系统(DS)基础设施执行用于VLAN ID的每个用户监管,确保与紧急呼叫相称的资源使用的上限,并将紧急呼叫路由到 SSPN的呼叫管理员的公共安全应答点(PSAP)。
Abstract:
A system and method to enable a wireless device having multiple radios to obtain information about wireless networks without each radio having to independently scan for all available networks. The wireless device downloads information from a remote information server, such that the information is later accessible locally. The local information server may be updated independently according to the preferences of the user. The system enables any of the radios to obtain access information without having to perform time- and power-consuming scanning operations, where the access information is sufficient for the radio to make contact with the wireless network, irrespective of whether the radio is tailored to support that network. The system may include wireless neighborhood map(s) of one or more geographic regions. The wireless device is able to ascertain the wireless network landscape of a region without having to actually reside in the geographic region.
Abstract:
A system and method to enable a transparent, outboard, proxy secure channel between two endpoints on a Local Area Network (LAN) using front-end network encryption devices are provided. A secure channel provides an encrypted, authenticated communications pathway that protects an otherwise insecure communications network against threats including passive eavesdropping, active modification and insertion, and impersonation. One version provides a fully transparent secure channel between two endpoints which may be unaware of the data protection being applied. An alternate version enables single-ended communications protection between an endpoint transparently protected by a front-end network encryption device and a remote endpoint having compatible, interoperable encryption software. In a single-ended application, the remote endpoint may be unaware that (1.) the other endpoint is not performing the encryption nor that (2.) a front-end network encryption device is performing the encryption on its behalf.
Abstract:
The present invention relates to the new use of an already known biomolecule methyl-β-orcinol carboxylate of formula I isolated from a lichen (Everniastrum cirrhatum), for treating pathogenic fungal infections of humans that are resistant to polyene and azole antibiotics such as amphotericin B, nystatin, clotrimazole etc.
Abstract:
A method is described that involves operating a computing system within a normal on state and transitioning from the normal on state to a main CPU/OS based state. In the main CPU/OS based state one or more components of the computing system are inactivated so as to cause the computing system to consume less power in the main CPU/OS based state than in the normal on state. The computing system is able to execute software application routines on a main CPU and a main OS of the computing system while in the main CPU/OS based state.