CPC

CPC Class H04W

36 patents in CPC class H04W

36 Patents
0 Views
Updated 2/7/2026

Top Patents

In some implementations a computer-accessible medium includes a multimedia-document integration module that includes a heterogeneous distinction identifier between a first multimedia-document and a second multimedia-document and includes an integrator of the first multimedia-document and the second multimedia-document into an integrated multimedia-document, a data capture module that includes a data-extractor of the integrated multimedia-document, a query module that includes a query-generator encapsulated in a corresponding number of enquiry/inquiry transmissions, the enquiry/inquiry transmissions being short-message-service text-messages, a communication-subsystem that includes a transmitter of the enquiry/inquiry transmissions to an external device and receiver of an acknowledgement transmission or a negative-acknowledgement transmission from the external device, the acknowledgement/negative-acknowledgement transmission being a short-message-service text-message, and, a variance analytic module that includes a generator of quantitative variance from the acknowledgement/negative-acknowledgement transmission, the quantitative variance describing statistical variances and discrepancies within the first multimedia-document and within the second multimedia-document and between the first multimedia-document and the second multimedia-document.

The present disclosure relates to a method including: receiving resource requests from clients and converting the resource requests into search requests in sequence; searching a resource list of sensor nodes of cloud according to search conditions of the search request and obtaining a resource ID of the sensor node that meets the search conditions; searching a data list of the sensor node and reading a working frequency of the sensor node in the resource list; comparing the working frequency with a desired frequency in the search conditions to determine if buffered data in the data list can meet requirements; feeding back the buffered data to the clients if the buffered data meets the requirements; and controlling the sensor nodes to collect data according to the search conditions and priorities of the sensor nodes and sending the collected data to the clients if the buffered data cannot meet the requirements.

In one implementation, a method for providing security on an externally connected controller includes launching, by the controller, a kernel level security layer that includes a whitelist of permitted processes on the controller, the whitelist being part of a custom security policy for the controller; receiving, at the security layer, a request to run a particular process; determining, by the security layer, a signature for the particular process; identifying, by the security layer, a verified signature for the process from the whitelist; determining, by the security layer, whether the particular process is permitted to be run on the controller based on a comparison of the determined signature with the verified signature from the whitelist; and blocking, by the security layer, the particular process from running on the automotive controller based on the determined signature not matching the verified signature for the process.

IoT device risk assessment
US-103803482019

Techniques for assessing risks of IoT device. A system utilizing such techniques can include a packet analysis based IoT device risk assessment system and an IoT device risk assessment system. A method utilizing such techniques can include extraction of IoT device risk factors from a device profile of an IoT device and application of assessment weights to the IoT device risk factors to assess a risk level of an IoT device.

Systems, methods, and software for data obfuscation frameworks for user applications are provided herein. An exemplary method includes providing user content to a classification service configured to process the user content to classify portions of the user content as comprising sensitive content, and receiving from the classification service indications of the user content that contains the sensitive content. The method includes presenting graphical indications in a user interface to the user application that annotate the user content as containing the sensitive content, and presenting obfuscation options in the user interface for masking the sensitive content within at least a selected portion among the user content. Responsive to a user selection of at least one of the obfuscation options, the method includes replacing associated user content with obfuscated content that maintains a data scheme of the associated user content.

An online service provisioning process is provided during which the service provider's knowledge about the user to whom the service is delivered does not increase. This is accomplished by presenting user attribute information to the service provider as obfuscated objects that can be independently verified and which are privacy preserving.

Secured file sharing system
US-103803602019

One embodiment provides a file sharing system. During operation, the system identifies a data file to be sent to a second device of a second user and generates a plurality of coded fragments from the data file based on a generator matrix of erasure encoding. An individual coded fragment does not include plaintext data. The system generates a plurality of sub-files, each of which comprises one or more coded fragments, of the data file. The system attaches a first sub-file to an electronic communication destined to the second device, uploads a second sub-file to a cloud provider, and embeds a link, which may expire and is protected based on a verification code, associated with the uploaded second sub-file into the electronic communication. The system sends the electronic communication to the second device and the verification code in a text message to a cell phone of the second user.

A module such as an M2M device or a mobile phone can include a removable data storage unit. The removable data storage unit can include a nonvolatile memory, a noise amplifying memory, and a cryptographic unit. The nonvolatile memory can include (i) shared memory for access by both the module and the cryptographic unit, and (ii) protected memory accessible only by the cryptographic unit. The cryptographic unit can use a noise memory interface and noise amplifying operations in order to increase and distribute bit errors recorded in the noise amplifying memory. The cryptographic unit can (i) generate a random number using the noise amplifying memory and (ii) input the random number into a set of cryptographic algorithms in order to internally derive a PM key pair. The private key can be recorded in protected memory and the public key signed by a certificate authority.

Explore More Patents

Discover additional patents in the cpc category

Browse All Patents