Abstract:
Gesture control uses electromagnetic power signatures. A signal is received and a power of the signal is determined. The power is associated to a command, and the command is executed in response to a gesture.
Abstract:
Methods, systems, and products verify identity of a person. A signature, representing the presence of a device, is acquired. The signature is compared to a reference signature. When the signature favorably compares to the reference signature, then the identity of a user associated with the device is verified.
Abstract:
Methods, systems, and devices are disclosed for detecting encrypted Internet Protocol packet streams. A probe stream having a known observable parameter is generated. The observable parameter exhibits a known characteristic of a known type of data encrypted within a stream of packets. The probe stream is communicated to a network element via a communications network. When the probe stream is received by the network element, the network element can compare the known observable parameter to an actual value. Any difference between the known observable parameter and the actual value can be used to correct for network-induced variation and other effects, thus ensuring accurate detection and identification of data types within encrypted streams of packets.
Abstract:
A trust evaluation may be obtained for a network element in a communication network. Based on this trust evaluation, one or more services may be invoked to address the risk that a potentially untrustworthy network element poses in the communication network. Application programming interfaces (APIs) may automate the invocation of trust-controlled services. An API for a trust-controlled service may be used to directly perform a function on one or more resources in the communication network or may be used to set up an ongoing function on one or more resources in the communication network that may continue until the API is used to terminate the function.
Abstract:
Provided are exemplary embodiments including a method for creating and using a personal encounter history using a communication device. The method involves the communication device receiving the transmission of a pseudo identifier from a proximal communication device where the pseudo identifier is associated with the user of the proximal communication device. Once received, the method continues with the wireless communication device requesting and receiving the actual identification of the user of the proximal communication device that is correlated with the pseudo identifier. The communication device includes a transceiver capable of communicating wirelessly with a mobile telecommunications network, a memory device and a processor. To ensure privacy, the processor is capable of receiving a pseudo identifier from a proximate communication device and then requesting an actual identification correlated with the pseudo identifier of the proximate communication device.
Abstract:
Provided are a wireless communication device and a communication device control method that include a set of templates corresponding to a plurality of potential environmental circumstances. The templates may be stored in a database in the computer readable memory of the communication device. At predetermined intervals, a suite of environmental sensors integral to the communication device may periodically sample the user's environment. The user's environmental circumstances may be derived or inferred by an analysis module based on the output of the suite of environmental sensors and then may be compared to the templates to determine a matching template. An action script is then executed based at least partially on the matching template which may include the contacting of a responding party.
Abstract:
Gesture control uses electromagnetic power signatures. A signal is received and a power of the signal is determined. The power is associated to a command, and the command is executed in response to a gesture.
Abstract:
Usage information is received that describes usage of communication services by a communications device. The usage information is compared to monitoring criteria. When the monitoring criteria are satisfied, an electronic notification message is sent to the communications device before an additional charge is incurred.
Abstract:
Provided are exemplary embodiments including a method for creating and using a personal encounter history using a communication device. The method involves the communication device receiving the transmission of a pseudo identifier from a proximal communication device where the pseudo identifier is associated with the user of the proximal communication device. Once received, the method continues with the wireless communication device requesting and receiving the actual identification of the user of the proximal communication device that is correlated with the pseudo identifier. The communication device includes a transceiver capable of communicating wirelessly with a mobile telecommunications network, a memory device and a processor. To ensure privacy, the processor is capable of receiving a pseudo identifier from a proximate communication device and then requesting an actual identification correlated with the pseudo identifier of the proximate communication device.
Abstract:
In one example, a method and apparatus for optimizing a software defined network configuration are disclosed. In one example, the method determines a first network relative performance parameter for a current configuration of a network, based on respective weighting profiles associated with services for which the network carries data. The method then determines a second network relative performance parameter for a proposed configuration of the network, based on the respective weighting profiles associated with the services for which the network carries data. The proposed configuration is implemented in the network when the second network relative performance parameter is greater than the first network relative performance parameter.