摘要:
Systems and Methods for assisting the hearing-impaired are described. The methods rely on obtaining audio signals from the ambient environment of a hearing-impaired person. The audio signals are analyzed by a machine learning model that can classify audio signals into audio categories (e.g. Emergency, Animal Sounds) and audio types (e.g. Ambulance Siren, Dog Barking) and notify the user leveraging a mobile or wearable device. The user can configure notification preferences and view historical logs. The machine learning classifier is periodically trained externally based on labelled audio samples. Additional system features include an audio amplification option and a speech to text option for transcribing human speech to text output.
摘要:
The present disclosure relates to cloud based mobile device management (MDM) systems and methods to use the “cloud” to pervasively manage mobile devices. The cloud based MDM systems and methods provide an ability to manage mobile devices with or without MDM clients while no requiring an MDM appliance or service at the enterprise. This provides a “no hardware, no software” deployment. In an exemplary embodiment, a client-less implementation leverages the ActiveSync protocol proxied through distributed cloud nodes to enforce mobile policies. In another exemplary embodiment, a client-based implementation uses a platform specific application and associated application programming interfaces (API) to connect managed mobile devices and provide MDM features through the cloud. Advantageously, the cloud based MDM systems and methods provide reliability and resiliency, elasticity, lower cost, mobility, integration of management and security, and agility over conventional MDM based solutions.
摘要:
Cloud based social networking policy and compliance systems and methods use the “cloud” to pervasively enforce security and policy on websites such as Web 2.0 social networking sites. The cloud based systems and methods provide a cloud based social networking policy enforcement and compliance system that gives enterprises full control and visibility into what their employees are seeing and posting to various websites. In particular, the cloud based systems and methods provide an enterprise to have granular policy-based Web 2.0 control and detailed compliance reports. Unique, customized policies may be applied to groups and/or individuals. Polices may be customized based on application. Data leakage may be avoided by prevention of file uploads and the like. Additionally, the cloud based systems and methods may provide advanced policies requiring administrator approval for user generated content to be posted to Web 2.0 sites.
摘要:
This invention describes systems and methods for combining the Wireless Local Area Network (WLAN) infrastructure and Wireless Intrusion Prevention Systems (WIPS) by leveraging a common radio platform equipped with more than one WLAN radio and a unified management system. The invention provides all the benefits of the WLAN, without sacrificing the 24×7 dedicated security monitoring and performance troubleshooting available from an overlay WIPS system, while reducing the deployment cost and management complexity, by sharing a common hardware platform for the WLAN Access Point (AP) and WIPS sensor and leveraging an integrated management system.
摘要:
Systems and methods of determining the content of frames transmitted on a wireless network through comparison of captured frames to predetermined statistical patterns.
摘要:
The present disclosure provides secure connectivity to remote networks on demand without requiring an interactive logon at a wireless client. Specifically, the present invention utilizes a proxy in a wireless network, such as an Access Point (AP) or the like, to provide client access to a remote, hosted network external to the wireless network. The present invention utilizes existing wireless security protocols and other security mechanisms between the proxy and the remote, hosted network. In operation, a wireless network proxy responds to a wireless client that is seeking a remote, hosted network, such as through an association request. The wireless network proxy then serves as an intermediary between the remote, hosted network and the wireless client to enable secure end-to-end communication.
摘要:
Security vulnerability assessment for wireless networks is provided. Systems and methods for security vulnerability assessment simulate an attack upon the wireless network, capture the response from the wireless network, and identify a vulnerability associated with the wireless network after analyzing the response from the wireless network.
摘要:
Allocation of buffer space for segment re-ordering is restricted based on a probability that the flow would consume too much space. A flow's current or recently past space consumption is used to predict the flow's activity with respect to future consumption. If the prediction of future consumption is high relative to other flows and to the total allocable buffer space in the device, then a decreasing amount of space than would otherwise be provided is allocated to the flow. In a preferred embodiment, if a flow's buffers are below a predetermined threshold for the flow (i.e., the “flow threshold”), and the amount of overall system memory space is above a predetermined system threshold then buffer allocation can proceed normally for that flow. For example, all of an additional amount of space that the flow may currently be requesting can be allocated to the flow. However, if one or both of the system threshold or the flow threshold requirements are not met then allocation can be according to a prediction of the behavior (i.e., consumption) of the flow.
摘要:
A frame fragmentation method for digital communications over error prone channels is presented. The technique maximizes data throughput based on the bit error rate and frame overhead. The technique can be used to determine optimum fragmentation thresholds for wireless links that are characterized by significant bit error rates.
摘要:
Systems and methods of determining the content of frames transmitted on a wireless network through comparison of captured frames to predetermined statistical patterns.