Abstract:
An authentication server may be adapted to (a) authenticate an authentication peer seeking to establish communications via a first network access node; (b) retrieve user profile information associated with the authentication peer; and/or (c) send the user profile information to a network gateway node that facilitates communication services for the authentication peer. A PMIP network node may be adapted to (a) provide wireless network connectivity to an authentication peer via a first network access node; (b) provide a PMIP key to both ends of a PMIP tunnel between the first network access node and a PMIP network node used to provide communications to the authentication peer; (c) provide the PMIP key to a first authenticator associated the first network access node; (d) receive a request at the PMIP network node from a requesting entity to reroute communications for the authentication peer; and/or (e) verify whether the requesting entity knows the PMIP key.
Abstract:
Methods, apparatuses and articles of manufacture for use in a mobile device to determine whether a dynamic user profile is to transition from a first state to a second state based, at least in part, on one or more sensed indicators. The dynamic user profile may be indicative of one or more current inferable user behavior contexts for a user co-located with the mobile device. The mobile device may transition a dynamic user profile from a first state to a second state, in response to a determination that the dynamic user profile is to transition from the first state to the second state, and operatively affect one or more functions performed, at least in part, by the mobile device based, at least in part, on the transition of the dynamic user profile to the second state.
Abstract:
Methods and apparatus for merging peer-to-peer overlay networks. A method includes receiving an advertisement from a second overlay network, determining a size of the second overlay network, performing a self search on the second overlay network based on a persistent node identifier, if the size of the second overlay network is greater than the size of a first overlay network, and joining the second overlay network if the persistent node identifier is not part of the second overlay network. An apparatus includes a transceiver to receive an advertisement from a second overlay network, and a processor coupled to the transceiver to determine a size of the second overlay network, perform a self search on the second overlay network based on a persistent node identifier, and join the second overlay network if the persistent node identifier is not part of the second overlay network.
Abstract:
Methods, systems, computer-readable media, and apparatuses for inferring context are provided. In one potential implementation, first context information associated with a first duration is identified, second context information is accessed to determine a context segmentation boundary; and the first context information and the second context information is then aggregated to generate an inferred segmented aggregated context. In a further implementation, the first context information is used to average inferred contexts, and the context segmentation boundary is used to reset a start time for averaging the first context information.
Abstract:
Methods, systems, computer-readable media, and apparatuses for calendar matching of inferred contexts are described. In one potential embodiment, a mobile device may use context information to generate a calendar of inferred contexts. Label information from raw calendar data may be used to update an inferred context within a calendar of inferred contexts. Additionally, the label may be propagated to future contexts and entries in an inferred context calendar.
Abstract:
Techniques are disclosed for using the hardware and/or software of the mobile device to obscure speech in the audio data before a context determination is made by a context awareness application using the audio data. In particular, a subset of a continuous audio stream is captured such that speech (words, phrases and sentences) cannot be reliably reconstructed from the gathered audio. The subset is analyzed for audio characteristics, and a determination can be made regarding the ambient environment.
Abstract:
Methods and apparatus for merging peer-to-peer overlay networks. A method includes receiving an advertisement from a second overlay network, determining a size of the second overlay network, performing a self search on the second overlay network based on a persistent node identifier, if the size of the second overlay network is greater than the size of a first overlay network, and joining the second overlay network if the persistent node identifier is not part of the second overlay network. An apparatus includes a transceiver to receive an advertisement from a second overlay network, and a processor coupled to the transceiver to determine a size of the second overlay network, perform a self search on the second overlay network based on a persistent node identifier, and join the second overlay network if the persistent node identifier is not part of the second overlay network.
Abstract:
A mobile platform efficiently processes image data, using distributed processing in which latency sensitive operations are performed on the mobile platform, while latency insensitive, but computationally intensive operations are performed on a remote server. The mobile platform acquires image data, and determines whether there is a trigger event to transmit the image data to the server. The trigger event may be a change in the image data relative to previously acquired image data, e.g., a scene change in an image. When a change is present, the image data may be transmitted to the server for processing. The server processes the image data and returns information related to the image data, such as identification of an object in an image or a reference image or model. The mobile platform may then perform reference based tracking using the identified object or reference image or model.
Abstract:
Methods, systems, computer-readable media, and apparatuses for inferring context are provided. In one potential implementation, first context information associated with a first duration is identified, second context information is accessed to determine a context segmentation boundary; and the first context information and the second context information is then aggregated to generate an inferred segmented aggregated context. In a further implementation, the first context information is used to average inferred contexts, and the context segmentation boundary is used to reset a start time for averaging the first context information.
Abstract:
After authentication, one or more messages are generated by one or more devices that are operatively coupled via a communications network to a computer. Based on receipt of user input in a module in a device, a message transmitted by each device (in reliance on the authentication) includes information that is normally internal to the device and indicative of interaction of a user with the device. For example, the message may include an identifier of the device and internal information in the form of an identifier of the module (hardware and/or software), with which the user is interacting. Based on one or more such messages, at least one processor in the computer determines and stores in memory, a state of the user indicative of the user's situation. The user's state may be used in any manner, e.g. to trigger a function in an application or to start a new application.