METHODS FOR PROTECTING A HOST DEVICE FROM UNTRUSTED APPLICATIONS BY SANDBOXING

    公开(公告)号:US20180247055A1

    公开(公告)日:2018-08-30

    申请号:US15442545

    申请日:2017-02-24

    Abstract: A method is provided for protecting a host device from untrusted applications. Upon detecting an initial installation and/or execution of an application, the application is executed within a first virtual machine having a first level of monitoring and/or operating constraints. The application may be executed alone in the first virtual machine. Operation of the application may be monitored to ascertain the level of trust for the application. Upon ascertaining a change in a level of trust in the application, the application may be migrated to execute within a second virtual machine having a second level of monitoring and/or operating constraints, wherein the second level of monitoring and/or operating constraints has different operating restrictions than the first level of monitoring and/or operating constraints.

    Method and apparatus for aggregating and presenting data associated with geographic locations

    公开(公告)号:US10942950B2

    公开(公告)日:2021-03-09

    申请号:US15385539

    申请日:2016-12-20

    Abstract: Implementations relate to systems and methods for aggregating and presenting data related to geographic locations. Geotag data related to geographic locations and associated features or attributes can be collected to build a regional profile characterizing a set of locations within the region. Geotag data related to the constituent locations, such as user ratings or popularity ranks for restaurants, shops, parks, or other features, sites, or attractions, can be combined to generate a profile of characteristics of locations in the region. The platform can generate recommendations of locations to transmit to the user of a mobile device, based for instance on the location of the device in the region as reported by GPS or other location service and the regional profile. Geotag data can include audio data analyzed using region-specific terms, and user recommendations can be presented via dynamic menus based on regional profiles, user preferences or other criteria.

    MANAGEMENT OF EMERGENCY ALERT WAKE UP BITS
    7.
    发明申请

    公开(公告)号:US20180014171A1

    公开(公告)日:2018-01-11

    申请号:US15622952

    申请日:2017-06-14

    CPC classification number: H04W4/90 H04H20/59 H04L12/1895 H04L69/323 H04W76/50

    Abstract: Systems and methods are described, which prompt a UE that is receiving at least a physical layer signal from a broadcasting station to look for a new emergency alert. In embodiments, the UE renders content from the broadcasting station based on information received in transmitted physical layer frames. Included within a physical layer frame are bits, such as, ea_wake_up_bits. If the state change of the ea_wake_up_bits indicates that a new emergency message, referencing a new emergency alert, is being transmitted within the physical layer frame, the LTE locates the new emergency message within the physical layer frame and acts on the emergency message if it is applicable to the station to which the UE is tuned. If the emergency message is applicable, the UE acts on the emergency message by using information in the emergency message to locate and render the emergency alert. The emergency message may point to an EAS present on a linear TV service.

    Mobile device based proxy for browser-originated procedures
    9.
    发明授权
    Mobile device based proxy for browser-originated procedures 有权
    基于移动设备的代理,用于浏览器发起的程序

    公开(公告)号:US09516575B2

    公开(公告)日:2016-12-06

    申请号:US14303324

    申请日:2014-06-12

    Abstract: An example method of facilitating communication between a mobile device positioned within an internal network and a target peer includes intercepting, at a proxy executing on a mobile device, a communication to initiate a real-time communication connection with a target peer. The mobile device is coupled to a cellular network, and the internal network is separated from one or more external networks by network address translation (NAT). The example method also includes determining whether the target peer is reachable via the cellular network. The example method further includes when it is determined that the target peer is reachable via the cellular network, sending over the cellular network to the target peer a request to communicate in a first protocol.

    Abstract translation: 促进位于内部网络中的移动设备与目标对等体之间的通信的示例性方法包括在移动设备上执行的代理处拦截用于发起与目标对等体的实时通信连接的通信。 移动设备耦合到蜂窝网络,并且通过网络地址转换(NAT)将内部网络与一个或多个外部网络分离。 该示例方法还包括确定目标对等体是否可通过蜂窝网络到达。 该示例性方法还包括当确定目标对等体经由蜂窝网络可到达时,通过蜂窝网络向目标对等体发送以第一协议进行通信的请求。

    Apparatus and method for securely connecting to a remote server

    公开(公告)号:US10091243B2

    公开(公告)日:2018-10-02

    申请号:US15052736

    申请日:2016-02-24

    Abstract: A method for securely connecting to a remote server that provides improved Internet security. In the method, a client receives a request to connect to a remote server associated with a domain name. The client, when resolving the domain name, determines whether the remote server supports at least one predetermined IP layer security protocol. The client performs a key exchange protocol with the remote server to generate at least one shared secret in response to determining that the remote server supports the at least one predetermined IP layer security protocol. The client connects to the remote server using the at least one shared secret in the IP layer security protocol.

Patent Agency Ranking