摘要:
In one aspect, a disclosed method of processing a network packet received by an edge device from a client in a data processing network includes determining a priority category of the network packet when the priority category is indicative of a priority associated with the packet. The method further includes determining a value of a traffic state parameter. The traffic state parameter indicates a level of traffic activity in a backbone network to which the edge device is connected. A traffic policy is then determined that is applicable to the level of traffic activity and the priority category of the network packet. The network packet is then blocked from traversing or permitted to traverse the network packet edge device based on the determined traffic policy. Determining the priority category may include determining a transport protocol port number of the network packet.
摘要:
Responsive to receiving an authentication request from a device, an authentication server determines a confidence level for the authentication request, generates a confidence-weighted challenge to the authentication request. The confidence-weighted challenge being weighted based upon a confidence level. The authentication server, responsive to receiving a challenge response to the confidence-weighted challenge from the device, determines whether to authenticate the user based upon the challenge response. If the authentication server determines that the challenge response satisfies an expected response known to the authentication server, the authentication server permits authentication of the user to access the device. If the authentication server determines the challenge response does not satisfy the expected response known to the authentication server, the authentication server denies authentication of the user to access the device.
摘要:
A system is disclosed that includes a receiving module to receive a request for media content from a mobile electronic device. The system also includes a broadcast module to transmit the requested media content to the mobile electronic device via a broadcast transmission over a first wireless network. The system also includes a unicast module to transmit the requested media content to the mobile electronic device via a unicast transmission over a second wireless network. The second wireless network is different from the first wireless network.
摘要:
A system and method for by which real-time monitoring and communication of usage data is conducted between a set of N numbered of devices where N is and integer. According to an embodiment, a communication network provides a common core architecture in which the devices connected to the system are converged regardless of their access network requirements or functional capacity. The system has the capacity to monitor and analyze all the usage information of each device connected to the system in regards to content, identity, type, quality, quantity, time, status, activity level, and metadata associated with the functions and applications utilized on a device. The analysis is further based on information governing a subscriber's devices, preferences, and features held in a subscriber database integrated within the system. The analyzed usage data is further processed through a variety of applications in order to generate a response, such as; a report, an alarm, or tailored options for interacting with the generating device which is deliverable in any format within the capacity of the receiving device including all multimedia aspects and non-multimedia aspects. The system further communicates the response in real-time to any device within the set as designated by the subscriber. In another aspect of the invention, the analyzed usage data can be stored for on demand requests of a communication response from past analysis.
摘要:
In one aspect, a disclosed method of processing a network packet received by an edge device from a client in a data processing network includes determining a priority category of the network packet when the priority category is indicative of a priority associated with the packet. The method further includes determining a value of a traffic state parameter. The traffic state parameter indicates a level of traffic activity in a backbone network to which the edge device is connected. A traffic policy is then determined that is applicable to the level of traffic activity and the priority category of the network packet. The network packet is then blocked from traversing or permitted to traverse the network packet edge device based on the determined traffic policy. Determining the priority category may include determining a transport protocol port number of the network packet.
摘要:
Systems and methods of organizing a massively multiplayer online game (MMOG) via mobile units are provided. Features of mobile units such as messaging and location based services are incorporated into the game to enhance the user experience. The MMOG provides social networking opportunities to players by associating players based on similarities such as shared interests and activities. These shared interests and activities can be determined based on associations of the players in other situations, such as disparate online games or websites. In addition, advertising content can be provided to players based on similar factors. In an example implementation, the MMOG comprises a game similar to the offline game of tag, wherein players can “tag” each other through in-game interactions via the mobile units. These interactions can be triggered based on players being a fixed predetermined distance from each other.
摘要:
Responsive to receiving an authentication request from a device, an authentication server determines a confidence level for the authentication request, generates a confidence-weighted challenge to the authentication request. The confidence-weighted challenge being weighted based upon a confidence level. The authentication server, responsive to receiving a challenge response to the confidence-weighted challenge from the device, determines whether to authenticate the user based upon the challenge response. If the authentication server determines that the challenge response satisfies an expected response known to the authentication server, the authentication server permits authentication of the user to access the device. If the authentication server determines the challenge response does not satisfy the expected response known to the authentication server, the authentication server denies authentication of the user to access the device.
摘要:
Devices, methods, and computer program products are for facilitating enhanced social interactions using a mobile device. A method for facilitating an enhanced social interaction using a mobile device includes receiving an audio input at the mobile device, determining a salient portion of the audio input, receiving relevant information associated with the salient portion, and presenting the relevant information via the mobile device.
摘要:
Devices and methods are disclosed which relate to an electronic device having a human stimulus receptor which, when activated, suspends activation of a screensaver. The screensaver is activated to conserve the power and life of the electronic device. When latently viewing the electronic device, however, the human stimulus receptor is activated. A countdown starts counting down a pre-determined amount of time once the human stimulus receptor is inactive. At the expiration of the countdown, the screensaver is activated. The human stimulus receptor responds to skin conductivity, natural muscular twitch, pulse, skin temperature, and/or eye movement. Only when the electronic device no longer detects any of these human stimuli will the countdown begin. A user may set the predetermined amount of time.
摘要:
Systems and methods to control access to multimedia are disclosed. A method includes receiving a request for multimedia content at a computing device, retrieving a destination address of a mobile communication device related to an authorized user of the computing device and determining whether the mobile communication device is located within a predetermined distance from the computing device. When the mobile communication device is located within the communicative distance from the computing device, the multimedia content is received at the computing device. When the mobile communication device is not located within the communicative distance from the computing device, an authorization-request message is transmitted via a network to the destination address of the mobile communication device, wherein the authorization-request message includes a request for authorization to receive the multimedia content at the computing device.