Patent application number | Description | Published |
20080285520 | METHODS, MEDIA, AND DEVICES FOR MOVING A CONNECTION FROM ONE POINT OF ACCESS TO ANOTHER POINT OF ACCESS - Systems, methods, media, and devices for providing cooperation among digital processing devices in wireless networks are provided. In some embodiments, methods for moving a connection from one point of access to another point of access are provided, sending a request for information from a first mobile node to at least one other node, wherein the request for information contains first information identifying at least one point of access; receiving a response containing second information identifying at least one point of access from the at least one other node; and establishing a connection between the first mobile node and a point of access identified in the second information. In some embodiments, devices that can move a connection from one point of access to another point of access are provided. | 11-20-2008 |
20100135252 | METHODS AND SYSTEMS FOR REDUCING MAC LAYER HANDOFF LATENCY IN WIRELESS NETWORKS - In accordance with the present invention, computer implemented methods and systems are provided for reducing handoff latency in a wireless network. In response to detecting that a handoff is necessary, the present invention uses a selective scanning algorithm that includes the use of a channel mask and/or a caching algorithm for detecting one or more new access points. | 06-03-2010 |
20110010465 | Methods and Systems for Providing Template Based Compression - Methods and systems for providing template based compression are proxided. In some embodiments, methods for providing template based compression on a message having headers and corresponding values are provided, the methods comprising stripping a first portion of the headers and the corresponding values from the message, filtering a second portion of the headers and the corresponding values from the message based on the contents of a template; substituting a third portion of corresponding values in the message with indices from a dictionary corresponding to the third portion of corresponding values; encoding the indices and a fourth portion of the corresponding values into a packet in a different relative order than the corresponding values are arranged in the message, and transmitting the packet to a recipient. | 01-13-2011 |
20110216737 | SYSTEMS, METHODS, AND MEDIA FOR IMPLEMENTING CALL HANDOFF BETWEEN NETWORKS - Systems, methods, and media for implementing call handoff between networks are provided, in some embodiments, systems for implementing call handoff between networks are provided, the systems comprising.: at least one device that: receives a call from a first endpoint; establishes a connection between the first end-point and a conference; calls a second endpoint: establishes a connection between the second end point and the conference; and when one of the first endpoint and the second endpoint is able to be connected to a different network from a current network which the one of the first endpoint and the second endpoint is connected to the conference: establishes a connection between the conference and the one of the first endpoint and the second endpoint via the different network; and removes the connection via the current network between the one of the first endpoint and the second endpoint and the conference. | 09-08-2011 |
20130084828 | METHOD AND APPARATUS FOR PROVIDING CELLPHONE SERVICE FROM ANY DEVICE - A method, non-transitory computer readable medium and apparatus for providing a cellular communication service for any device via a communications network are disclosed. For example, the method receives a log-in request of a user from a device, if the log-in request is authenticated, synchronizes the device with a configuration associated with the user and provides the cellular communication service via a subscription plan subscribed to by the user. | 04-04-2013 |
20130138585 | Methods, Systems, And Computer Program Products For Recommending Applications Based On User Interaction Patterns - A method for recommending an application includes obtaining an input model representing user interaction patterns during execution of a first application. The input model is compared to a reference model representing user interaction patterns during execution of a second application. A similarity is determined between the input model and the reference model. A recommendation of the second application is generated in response to the similarity. | 05-30-2013 |
20130145425 | VERIFICATION SERVICE - Concepts and technologies are disclosed herein for verifying sender information. According to various embodiments of the concepts and technologies disclosed herein, a verification service can determine, receive a request, or receive a call to verify sender information associated with data. The server computer generates and delivers a verification message to a sender device in response to determining that sender information verification is to be provided. The server computer receives a response indicating if the data was sent by the sender device. If the response indicates that the sender device did not send the data, the server computer can block delivery of the data, generate alarms or alerts, take other actions, and/or take no action. If the response indicates that the sender device sent the data, the server computer can deliver the data, provide a verification response to the recipient device, take no action, and/or take other actions. | 06-06-2013 |
20130145465 | MULTILAYERED DECEPTION FOR INTRUSION DETECTION AND PREVENTION - Concepts and technologies are disclosed herein for multilayered deception for intrusion detection. According to various embodiments of the concepts and technologies disclosed herein, a multilayer deception system includes honey servers, honey files and folders, honey databases, and/or honey computers. A multilayer deception system controller generates honey activity between the honey entities and exposes a honey profile with contact information associated with a honey user. Contact directed at the honey user and/or activity at any of the honey entities can trigger alarms and/or indicate an attack, and can be analyzed to prevent future attacks. | 06-06-2013 |
20140006374 | METHOD AND APPARATUS FOR DERIVING AND USING TRUSTFUL APPLICATION METADATA | 01-02-2014 |
20140006375 | METHOD AND APPARATUS FOR ROBUST MOBILE APPLICATION FINGERPRINTING | 01-02-2014 |
20140006418 | METHOD AND APPARATUS FOR RANKING APPS IN THE WIDE-OPEN INTERNET | 01-02-2014 |
20140006440 | METHOD AND APPARATUS FOR SEARCHING FOR SOFTWARE APPLICATIONS | 01-02-2014 |
20140254462 | METHODS, MEDIA, AND DEVICES FOR MOVING A CONNECTION FROM ONE POINT OF ACCESS TO ANOTHER POINT OF ACCESS - Systems, methods, media, and devices for providing cooperation among digital processing devices in wireless networks are provided. In some embodiments, methods for moving a connection from one point of access to another point of access are provided, sending a request for information from a first mobile node to at least one other node, wherein the request for information contains first information identifying at least one point of access; receiving a response containing second information identifying at least one point of access from the at least one other node; and establishing a connection between the first mobile node and a point of access identified in the second information. In some embodiments, devices that can move a connection from one point of access to another point of access are provided. | 09-11-2014 |
20140259112 | Verificaiton Service - Concepts and technologies are disclosed herein for verifying sender information. According to various embodiments of the concepts and technologies disclosed herein, a verification service can determine, receive a request, or receive a call to verify sender information associated with data. The server computer generates and delivers a verification message to a sender device in response to determining that sender information verification is to be provided. The server computer receives a response indicating if the data was sent by the sender device. If the response indicates that the sender device did not send the data, the server computer can block delivery of the data, generate alarms or alerts, take other actions, and/or take no action. If the response indicates that the sender device sent the data, the server computer can deliver the data, provide a verification response to the recipient device, take no action, and/or take other actions. | 09-11-2014 |