Abstract:
A computer-implemented method comprises sending, to a first device, a request for a signed certificate, the request for the signed certificate comprising a signed hash of data associated with a user, a corresponding public key of the user, and the data associated with the user; sending, to a second device different from the first device, a request for the signed certificate, the request comprising information to retrieve the signed certificate; and obtaining, from the second device, a signed certificate, the signed certificate comprising the public key of the user, the hash of the data associated with the user, and information indicating a health status of the user, the data associated with the user being absent from the signed certificate.
Abstract:
A method for processing a wake-up trigger frame includes receiving, at a wake-up radio of a device and from an access point, a wake-up trigger frame, where the wake-up trigger frame includes a group receiver identity; and in response to determining that the device is associated with the group receiver identity, sending a signal to a primary radio of the device to turn on the primary radio.
Abstract:
A method at a wireless station for receiving an out-of-band wakeup trigger, the method including receiving, at the wireless station, a message from an access point, the message providing an indication that the access point supports out-of-band signaling; associating with the access point over a first radio technology; establishing a connection with the access point using a second radio technology; entering a sleep state for a radio using the first radio technology; and upon receiving a wakeup trigger over the connection using the second radio technology, waking up the radio for the first radio technology for communication with the access point.
Abstract:
A mobile communication device identifies and selects a wireless local area network (WLAN) available for communications in its coverage area. Automatically, without detecting any requests made by a user via a browser application.. The mobile device initiates a request (e.g. an HTTP GET request) to a predetermined server site of a communication network which is outside of the WLAN. In response to initiating the request, the mobile device receives a response message via the WLAN and identifies, from the response message, whether the request to the predetermined server site has been redirected to a redirect server site. The WLAN may be a WLAN “hotspot,” where the redirect server site is a login server. The identifying may be performed by comparing content from the response message to predetermined content of the predetermined server site. In response to identifying that the request has been redirected, the mobile device causes an indication to be produced at its user interface. Access to a communication service (such as a “push”-data service) may be subsequently expediently obtained.
Abstract:
A system, method and device for adjusting a communication parameter for a network communicating with a communication device are provided. The method comprises: monitoring for a condition relating to a first network that has been in communication with the communication device; and determining whether an adjustment is to be implemented on a communication parameter of a second communication network that has been in communication with the communication device based on the condition and if so, implementing the adjustment to the communication parameter for the second communication network.
Abstract:
A device in a peer-to-peer (P2P) group has the role of group owner. A different device in the P2P group may take on the role of group owner without ending the P2P group and create a new P2P group. Multiple P2P groups may be merged into a single P2P group. A single P2P group may be split into multiple independent P2P groups, each with its own group owner. A group owner of a P2P group may notify the client devices in the P2P group that it is about to leave the P2P group. A client device in a P2P group may be appointed in a new role of backup group owner, to take on the role of group owner in the event of a departure of the group owner, thereby providing continuity. Techniques for maintaining upper layer continuity through changes in topology of P2P groups are disclosed.
Abstract:
A method at a sensor apparatus affixed to a transportation asset, the method including detecting a trigger at the sensor apparatus; taking a threshold number of samples of a displacement-related value of the transportation asset over time; determining that a variance of the threshold number of samples exceeds a threshold; analyzing a frequency property based on the threshold number of samples; and based on the frequency property, determining whether the transportation asset is loaded or unloaded.
Abstract:
Methods and systems of segmenting computing devices in a wireless network having an access point broadcasting in a single domain are described. In an exemplary method, a request to join the wireless network is received from a computing device. The request is associated with an identifier. When the identifier is not associated with a virtual network within the wireless network, a virtual network is configured within the wireless network and the identifier is associated thereto and the computing device is assigned thereto. When the identifier is associated with an existing virtual network within the wireless network, the computing device is assigned to the existing virtual network.
Abstract:
A voice assistant proxy for voice assistant servers and related methods. The voice assistant proxy comprises a processor configured to convert voice data to text using speech-to-text synthesis, determine a voice command from the text, determine whether the voice command is associated with sensitive data based on a set of criteria, route the voice command to an enterprise voice assistant server in response to a determination that the voice command is sensitive, route the voice command to a third party voice assistant server in response to a determination that the voice command is not sensitive.
Abstract:
A method at a power-limited computing station for communicating in an intelligent transport system, the method including operating the computing station in one of a non-critical radio operating state and a safety-critical radio operating state; receiving a trigger at the computing station; determining whether the trigger should cause the computing station to transition a radio operating state; and if the trigger should cause the computing station to transition the radio operating state, changing the radio operating state to the other of the non-critical radio operating state and the safety-critical radio operating state.