Abstract:
A method of identification used for communication within a network includes generating a network identity associated with a user, modifying the network identity according to a user preference to create a modified network identity, identifying the user with the modified network identity within a first network communication for a first network communication application, and identifying the user with the modified network identity within a second network communication for a second network communication application.
Abstract:
The system and method of information or presentation projection allows a user to present information to single or multiple screens without need of additional cables. Universal Plug and Play (UPnP) is used to advertise, find, and control the display devices. A reverse Terminal Service (TS) session is used to connect the display to the user's machine. Attendance at and receipt of the presentation is addressed from both a presenter side and from an attendee side through a subscription model. This subscription model is facilitated and security of the presentation is addressed through the use meeting invitations. These invitations are generated by the presenter, and may be requested by the attendees.
Abstract:
A terminal coupled to an intelligent telecommunication network may invoke dynamically modifiable subscriber services by transmitting information to a switch to which script files, each containing programming script needed to initiate a calling feature or other advanced subscriber service and a criteria statement used for triggering execution of the programming script, were downloaded thereto from a home location register where the script files may be added, deleted or otherwise modified by a system administrator. A program execution module residing at the switch compares the received information to the criteria statement for each script file downloaded thereto and executes the programming script of the script file having a criteria statement which matches the received string of digits. In wireless systems, the script files are downloaded to an MSC whenever a roaming terminal registers therewith.
Abstract:
The present disclosure is directed to refreshable biosensors and methods for synthesizing and refreshing same. In some embodiments, the refreshable biosensor comprises a plasmonic nanoparticle and a biorecognition element, wherein the biorecognition element is encapsulated with at least one of an organosilica polymer layer or a metal organic framework (MOF).
Abstract:
A retail pharmacy sales system for identifying a customer and identifying which prescriptions the customer is authorized to pick up is disclosed. The system may include a retail pharmacy sales device in communication with a mobile device. The retail pharmacy sales device is configured to identify the customer, receive acknowledgement for the prescriptions, and process the payments for the prescriptions based on communication with the mobile device.
Abstract:
A system and method in one embodiment includes modules for verifying a digital signature of a Microsoft® ActiveX® control, identifying an executable file of the ActiveX control, authorizing the executable file as an updater configured to enable trust propagation, if the digital signature is from an authorized issuer, and installing the ActiveX control. More specific embodiments include hooking an exported function in the executable file and marking a thread calling the exported function as an updater. Hooking the exported function includes patching the executable function so that when the exported function is called during execution of the executable file, a second function is executed before the exported function is executed. Other embodiments include extracting a cabinet file wrapping the ActiveX control, parsing an information file in the cabinet file, and downloading additional components for installing the ActiveX control.
Abstract:
A system for adaptive learning based human detection for channel input of captured human image signals, the system comprising: a sensor for tracking real-time images of an environment of interest; a feature extraction and classifiers generation processor for extracting a plurality of features and classifying the features associated with time-space descriptors of image comprising background modeling, Histogram of Oriented Gradients (HOG) and Haar like wavelet; a processor configured to process extracted feature classifiers associated with plurality of real-time images; combine the plurality of feature classifiers of time-space descriptors; evaluate a linear probability of human detection based on a predetermined threshold value of the feature classifiers in a time window having at least one image frame; a counter for counting the number of humans in the real-time images; and a transmission device configured to send the final human detection decision and number thereof to a storage device.
Abstract:
Examples of achieving quality of service in a wireless local area network via meeting communication channel performance criteria to include a minimum signal-to-noise plus interference ratio and a proportional fairness limit are disclosed.
Abstract:
A set of collaborative contacts may be selected with an invitation user interface. An invitation to participate in a collaborative activity may be sent to the selected contacts from the invitation user interface or from a collaborative application. The invitation may be received by a collaborative services platform. A user of the collaborative services platform may be presented with the invitation along with an ability to choose one of accept, decline and ignore in response to the invitation. The user may choose to accept, decline or explicitly ignore the invitation, and a response may be sent to the sender of the invitation indicating the user's choice. An application programming interface for a collaborative invitation service of the collaborative services platform may include an invitation element, a send invitation element, a respond to invitation element and a cancel invitation element. The cancel invitation element may be used to cancel issued invitations.
Abstract:
A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.