Security management on a mobile device

    公开(公告)号:US10820204B2

    公开(公告)日:2020-10-27

    申请号:US16119427

    申请日:2018-08-31

    Inventor: Kaustubh Joshi

    Abstract: Example mobile devices disclosed herein include a camera, memory including computer-executable instructions, and a processor to execute the instructions to at least associate a location of the mobile device with picture data obtained with the camera. The processor is also to assign a first data tag to the picture data when the location of the mobile device corresponds to a first area, the first data tag to identify a first security level for the picture data, or assign a second data tag to the picture data when the location of the mobile device does not correspond to the first area, the second data tag to identify a second security level for the picture data. The processor is further to determine whether to permit an application to access the picture data based on whether the first data tag or the second data tag is assigned to the picture data.

    VOICE GATEWAY FOR FEDERATED VOICE SERVICES
    83.
    发明申请

    公开(公告)号:US20200211541A1

    公开(公告)日:2020-07-02

    申请号:US16234343

    申请日:2018-12-27

    Abstract: Devices, computer-readable media, and methods for submitting a modified voice input to a service based upon a user intent determined from a voice input in accordance with a voice interface of the service are disclosed. A processing system including at least one processor may obtain a voice input of a user, determine an intent from the voice input, identify a first service, from among a plurality of services, in accordance with the intent, and formulate a first modified voice input from the voice input in accordance with a voice interface of the first service, where each of the services is associated with one of a plurality of different voice interfaces. The processing system may further submit the first modified voice input to the first service, obtain a first voice response from the first service, and present a voice output to the user in accordance with the first voice response.

    Application Deployment Engine
    84.
    发明申请

    公开(公告)号:US20200186593A1

    公开(公告)日:2020-06-11

    申请号:US16790848

    申请日:2020-02-14

    Abstract: Concepts and technologies are disclosed herein for an application deployment engine. A processor that executes an application deployment engine can receive an application request. The processor can obtain network topology data that indicates availability of resources of a data center, an application template associated with the application, and a running time during which an application placement plan is to be identified out of a large number of placement scenarios within the running time. The application template can describe an application flow path associated with the application. The processor can identify the application placement plan, where the application placement plan can include an optimal placement of the application at the data center, before a given running time expires by pruning the large search space. The processor can generate a command to effect deployment of the application in accordance with the application placement plan.

    COLLABORATIVE SCHEDULING OF LAST HOP CELLULAR TRAFFIC

    公开(公告)号:US20190215715A1

    公开(公告)日:2019-07-11

    申请号:US16357495

    申请日:2019-03-19

    Abstract: An eNodeB or other cell access point device can receive demand data from mobile devices served by the cell. The demand data can represent an estimate of demand over a future period for network resources (e.g., bandwidth). The cell can aggregate this demand data and determine price data for the time period or for various intervals of the time period, then transmit the price data to the mobile devices. The price data can operate as a collaborative approach to scheduling traffic. For example, data (e.g., delay tolerant data) can be shifted (e.g., delayed for a few seconds) based on an examination of the price data in conjunction a determined priority of the data. Such can be applicable to data traffic not traditionally thought of as delay tolerant such as streaming video or web browsing, and can be accomplished without negatively impacting the quality of service or experience of the client.

    Security management on a mobile device

    公开(公告)号:US10070315B2

    公开(公告)日:2018-09-04

    申请号:US14089942

    申请日:2013-11-26

    Inventor: Kaustubh Joshi

    Abstract: A method for managing security levels on a mobile device includes receiving a capsule including first data; assigning a first data tag to the capsule, the first data tag identifying a security level for the first data; storing the capsule on the mobile device; executing a process on the mobile device, the process associated with an application tag; allowing the process to access the first data when the application tag matches the first data tag, the process for generating second data in response to the first data.

    SYSTEMS AND METHODS TO ACHIEVE SEQUENTIAL CONSISTENCY IN REPLICATED STATES WITHOUT COMPROMISING PERFORMANCE IN GEO-DISTRIBUTED, REPLICATED SERVICES

    公开(公告)号:US20180173745A1

    公开(公告)日:2018-06-21

    申请号:US15387178

    申请日:2016-12-21

    CPC classification number: G06F16/2365 G06F16/2336 G06F16/275

    Abstract: A system includes a plurality of sites a first plurality of key value data stores and a second plurality of key value stores. The first plurality of key value stores are provided with eventually consistent semantics for storing a plurality of keys. The second plurality of key value stores are provided with strongly consistent semantics for creating and storing locks created by a client. The system further includes a service for performing operations on the first plurality of key value store replicas and the second plurality of key value store replicas. the operations performed by the service conform to the following properties: when a client acquires a lock to a set of keys from the plurality of keys to create a set of locked keys, the client is guaranteed a consistent version that reflects a most recent update to each key in the set of locked keys; when the client performs reads and writes to the set of locked keys all reads and writes are ordered and other writers are excluded; and when a member key of the set of locked keys is unlocked, anyone can read and write to the member key, and values of member key replicas are eventually consistent.

    Baseband unit pooling using shared scheduler

    公开(公告)号:US12177871B2

    公开(公告)日:2024-12-24

    申请号:US17809363

    申请日:2022-06-28

    Abstract: Described is centralized scheduling of baseband unit resources of a hub, including allocating and deallocating baseband unit resources of a distributed unit instance based on anticipated and/or actual demand for the resources. For example, when user equipment transitions to a connected state, a corresponding message can be detected and used to determine whether sufficient baseband unit resources exist to handle the traffic of the newly connecting user equipment. If not, additional baseband unit resources are allocated, coupled to a node (cell), and the node scheduled to handle the user equipment traffic. When user equipment transitions to an inactive state, the corresponding command can be detected and used to determine whether the baseband unit resources are still needed for other traffic. If not, the baseband unit resources are deallocated.

Patent Agency Ranking