摘要:
There is provided a device application programming interface (API) for securely monitoring and managing mobile broadband devices. There is provided a client device with a processor configured to detect, using an API, the WWAN device, wherein the WWAN device conforms to the API, to perform a mutual authentication with the WWAN device by using a digital certificate of the WWAN device and a client digital certificate of the client device, to establish a secure connection with the WWAN device upon a successful authentication of the mutual authentication with the WWAN device. Moreover, the processor may be configured to issue, using the API, various commands to the WWAN device to monitor and manage the WWAN device.
摘要:
Presented is a system and method for providing policy-based roaming updates for a mobile device. The method includes receiving one or more roaming policies from a server, monitoring several parameters of the mobile device for a change in one or more of the several parameters, and evaluating the one or more of the several parameters and the change according to the one or more roaming policies. The method further includes updating a roaming priority list on the mobile device in response to the evaluating, and roaming, after the updating, according to the roaming priority list for establishing a wireless communication. The roaming priority list may include a home network and one or more roaming networks.
摘要:
A data regeneration device regenerates a digital signal in a low-speed pass-through mode of operation, performs an upstream link equalization procedure on an upstream data link in an equalization mode of operation, performs a downstream link equalization procedure on a downstream data link in the equalization mode of operation, and regenerates the digital signal in a high-speed pass-through mode of operation. The data regeneration device transitions seamlessly from the low-speed pass-through mode of operation to the equalization mode of operation in compliance with a communication protocol. Moreover, the data regeneration device synchronizes completion of the upstream link equalization procedure with completion of the downstream link equalization procedure so that the data regeneration device transitions seamlessly from the equalization mode of operation to the high-speed pass-through mode of operation in compliance with the communication protocol.
摘要:
Presented is a system and method for controlling access to a mobile hotspot on a mobile device utilizing a hotspot management application. The method includes detecting unauthorized data traffic over a tethered link between the mobile device and a tethered device by analyzing a signature of the unauthorized data traffic. Analyzing the signature of the unauthorized data traffic may be carried out utilizing a rules engine, where the rules engine is based on one or more carrier controlled tethering policies and one or more user controlled tethering policies. Detecting unauthorized data traffic may further include detecting an unauthorized tethering application on the mobile device utilizing a database of known unauthorized tethering applications. The method further includes controlling the unauthorized data traffic. The method additionally includes redirecting a user of the mobile device to a captive portal for authorized tethering plan support.
摘要:
A level shifter with cross coupled inverters having different threshold voltages. The output of the level shifter is pulled to a known voltage state during power up. In some examples, one of the inverters includes an additional N-channel transistor wherein the threshold voltage is greater the threshold voltage of the other inverter due to the additional transistor.
摘要:
A system and method for intelligent transcoding: A user is enabled to select a media item that the user desires to have played on a particular rendering device on a network. The media item is then requested from a service provider. Upon receiving the media item, it is determined whether the media item needs intelligent transcoding to be played on the particular rendering device. If the media item needs intelligent transcoding, then the media item is intelligently transcoded. Intelligent transcoding includes one or more of transcoding, transcaling, transrating, transformatting, and transcripting. The media item is then streamed to the particular rendering device.
摘要:
A current boost module receives a signal from the input and the output of a buffer to determine whether the buffer is transitioning between logic states. When the buffer is transitioning, a boost current is provided to a load connected to the buffer output to supplement the current from buffer output, thereby facilitating transition of a signal at the load. The current boost module can shut down the boost current before the signal at the load completes its transition from one logic state to the other.
摘要:
According to some embodiments, remote USB videophone communication is provided. In some embodiments, systems and methods may include receiving first audio and video information from a first user device and emulating the first user device as a universal serial bus device on a universal serial bus host. The systems and methods may further include receiving, from the universal serial bus host, second audio and video information associated with a second user device, and sending the second audio and video information to the first user device.
摘要:
According to some embodiments, remote USB network device control is provided. In some embodiments, systems and methods may include identifying an input device and emulating the input device as a universal serial bus device on a universal serial bus host. The systems and methods may further include determining if mapping information is defined for the input device, wherein the mapping information is to associate an output of the input device with at least one network device coupled to the universal serial bus host.
摘要:
Presented is a system and method for controlling access to a mobile hotspot on a mobile device utilizing a hotspot management application. The method includes detecting unauthorized data traffic over a tethered link between the mobile device and a tethered device by analyzing a signature of the unauthorized data traffic. Analyzing the signature of the unauthorized data traffic may be carried out utilizing a rules engine, where the rules engine is based on one or more carrier controlled tethering policies and one or more user controlled tethering policies. Detecting unauthorized data traffic may further include detecting an unauthorized tethering application on the mobile device utilizing a database of known unauthorized tethering applications. The method further includes controlling the unauthorized data traffic. The method additionally includes redirecting a user of the mobile device to a captive portal for authorized tethering plan support.