An Internet of Things device and method for controlling the flow of power to a device through remote instructions. The device may include a battery and a switch coupling the battery to a main circuit, the switch including a sensor detecting a first condition. While detecting the first condition, the switch may be open-circuited, decoupling the battery from the main circuit. While not detecting the first condition, the switch is close-circuited, coupling the battery to the main circuit and providing power. The device may further include a controller coupled to a wireless communications module, which may receive instructions from a remote server. These instructions may instruct the controller to send a disable signal to the switch, preventing the switch from becoming open-circuited when the sensor detects the first condition.
A method at a computing device for anomaly detection, the method including storing, at the computing device, a full batch model for a plurality of data points, wherein each of the plurality of data points is associated with one of a plurality of clusters, and wherein the storing comprises a table for storing information about the plurality of clusters without storing the plurality of data points; receiving a new data point from a hardware sensor; determining that the new data point falls outside the full batch model, thereby detecting an anomaly; and performing an action based on the anomaly.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
3.
ACCESS RESTRICTION OF VEHICLE-ASSOCIATED INFORMATION
In some examples, a system receives vehicle-associated information from a data source associated with a vehicle, and restricts access to the vehicle- associated information based on at least one privacy criterion selected from among a machine learning use criterion relating to use of the vehicle-associated information by a machine learning model, a vehicle motion criterion relating to a movement status of the vehicle, or a person identity criterion relating to an identity of a person in the vehicle.
Systems, methods, and software can be used to control audio output of a vehicle. In some aspects, a rnethod is disclosed cornprising: deterrnining, at a vehicle, a current driving mode of the vehicle; determining, at the vehicle, a plurality of audio output levels based on the current driving mode and one or more preconfigured audio zone profiles; and controlling, by the vehicle, audio equipment of the vehicle to output audio according to the plurality of audio output levels.
B60R 11/02 - Arrangements for holding or mounting articles, not otherwise provided for for radio sets, television sets, telephones, or the like; Arrangement of controls thereof
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
G10K 11/00 - Methods or devices for transmitting, conducting or directing sound in general; Methods or devices for protecting against, or for damping, noise or other acoustic waves in general
There is provided a method and apparatus for identifying malicious code. The method uses machine learning to compare a new code segment to known code segments of malicious code. Code segments are converted to vectors and the cosine similarity of two vectors is used to identify clones. Techniques to train a neural network for handling very long code sequences and obfuscated malicious code are used.
In an aspect, the present disclosures provides a computer-implemented method for applying user settings to a vehicle, the method comprising receiving user settings for a first vehicle, at a second vehicle, and locking access to the user settings on the second vehicle, the user settings being associated with a user; unlocking access to the user settings on the second vehicle based on: authenticating a user token associated with the user and the user settings, and verifying an identity of the user associated with the user token, and applying the user settings to the second vehicle based on synthesizing the user settings of the first vehicle to the second vehicle.
H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
H04W 48/08 - Access restriction or access information delivery, e.g. discovery data delivery
B60R 16/02 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric
A method at a computing device for providing vehicle data to a client, the method including receiving a data object at an ingestor block at the computing device, the ingestor block comprising a plurality of ingestor instances capable of interacting with different entities; converting the data object to a frame; providing the frame to a translation stack at the computing device to convert the frame into a normalized message; and providing the normalized message to the client.
A method comprises obtaining a training set of network data that includes benign network data and malware network data; engaging a feature extraction engine to generate a set of dyads for each source-destination pair in the training set of network data; and training, using the set of dyads, a machine learning engine to differentiate between the benign network data and the inalware network data.
A method at a computing device for finding an association between data objects in a structure, the method including selecting a coordinate location from a grid, the grid defining locations within the structure; finding whether a data object having a data object type is located at the coordinate location; when the data object is located at the coordinate location, associating the data object with other data objects at the coordinate location; and when the data object is not located at the coordinate location: determining through an explicit association that the data object at a second location services the first location; and associating the data object with the coordinate location.
Systems and methods are disclosed for identifying at least one cause of noise in a vehicle audio system. The vehicle audio system may include a plurality of audio channels. Acoustic output may be generated and received through each of the audio channels. Acoustic input may be received from one or more of the audio channels and may be processed to generate processed acoustic input. The processed acoustic input may include a frequency response of the acoustic input. The processed acoustic input may be compared to corresponding channel target input and at least one deviation may be determined. A cause of the at least one deviation may then be determined based on a relationship between the at least one deviation and a set of resolved indications of cause, each of the set of resolved indications of cause corresponding to at least one of a set of recorded causes.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for processing event log data. An example event log processing method includes receiving an event log comprising a plurality of event records describing events that have occurred on each of one or more computer systems over a period of time; converting the event log into a graph, comprising: normalizing the plurality of event records, including anonymizing a unique identifier value in each event record and replacing a variable value in each event record with a predetermined value; representing each normalized event record as one or more nodes in the graph; and generating a plurality of event clusters, wherein each event cluster includes an aggregated group of nodes and is generated based on common attributes of and hierarchical relationships between the normalized event records represented by the nodes in the aggregated group.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for processing event log data. An example event log processing method includes receiving an event log comprising a plurality of event records describing events that have occurred on each of one or more computer systems over a period of time; converting the event log into a graph, comprising: normalizing the plurality of event records, including anonymizing a unique identifier value in each event record and replacing a variable value in each event record with a predetermined value; representing each normalized event record as one or more nodes in the graph; and generating a plurality of event clusters, wherein each event cluster includes an aggregated group of nodes and is generated based on common attributes of and hierarchical relationships between the normalized event records represented by the nodes in the aggregated group.
In some examples, a system receives data relating to an environment of a vehicle. Based on the received data, the system initiates a vehicle preparation action by actuating an adjustable component of the vehicle, the vehicle preparation action to ready the vehicle for a user prior to operation of the vehicle.
Systems and methods for determining a presence of cargo within a container are described. The determination may comprise transmitting a first electromagnetic signal within the container and receiving a first reflected electromagnetic signal corresponding to the first electromagnetic signal. The first reflected electromagnetic signal may be converted into a set of first magnitude values corresponding to a set of bin values representing a respective distance from the radar device. The first magnitude values may be integrated, using a moving window, over successive subranges of bin values to produce a set of integrated magnitude values. A set of integrated base magnitude values may be subtracted from the set of integrated magnitude values to produce a set of normalized integrated magnitude values. A presence of cargo within the container may then be determined by comparing each of the normalized integrated magnitude values with corresponding threshold values.
Systems, methods, and software can be used to determine a classification of a network accessible page, for example a web page on Internet. In some aspects, a method comprises receiving, at a gateway, a request for accessing a network accessible page from an end-user device; processing the network accessible page to generate a first embedding that characterizes network attributes of a domain of the network accessible page, and a second embedding that characterizes content attributes of the network accessible page; generating, from the first embedding, a first score that characterizes a predicted similarity between the network accessible page and one or more known network accessible pages; generating, from the second embedding, a second score that characterizes a predicted likelihood that the network accessible page is asking for sensitive information; and using at least the first score and the second score to determine a classification of the network accessible page.
A container comprising a base portion, the base portion having at least one side support; and at least one end support at each end of the base portion; and a flexible, resilient lid portion, the lid portion configured to be installed to the base portion utilizing the resilience in the lid portion for inserting each end of the lid portion into the at least one end support. Further, a method for installing a flexible, resilient lid to a container, the container comprising a base portion having a side support at each side of the container and an end support at each end of the base portion, the method including bending the lid by applying pressure to each end of the lid; aligning the lid with each end support; and releasing the lid, wherein the lid re-forms into a flat lid within the end supports.
In some examples, a system includes an operating system (OS) kemel, one or more hardware processors, and a kernel scheduler. The kernel scheduler receives a first indication that a first thread is to wait for an event, receives a second indication that the first thread has transitioned to a blocked state in which the first thread is blocked on the event, and receives a third indication from a second thread delivering the event, the third indication to unblock the first thread. In response to the third indication, the kernel scheduler causes a transition of the first thread from the wait state to an active state if the first thread is in the wait state and has not yet transitioned to the blocked state, and causes a transition of the first thread from the blocked state to a ready state if the first thread is in the blocked state.
G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
In some examples, a system includes a kernel scheduler to schedule, for execution, threads to run in an address space of an operating system (OS) kernel according to respective priorities associated with the threads, where each thread of the threads has a user persona and a kernel persona. The kernel scheduler switches each respective thread of the threads to the kernel persona of the respective thread in response to scheduling the respective thread for execution responsive to a kernel call from the respective thread. The kernel scheduler preempts a thread in the kernel persona of the thread that is actively executing in response to an event.
G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
In some examples, a system includes a plurality of processors and a kernel scheduler. The kernel scheduler associates each respective processor of the plurality of processors with a collection of clusters, wherein each cluster of the collection of clusters represents a respective different subset of the plurality of processors, and the respective processor is a member of each cluster of the collection of clusters. For each corresponding cluster of the collection of clusters, the kernel scheduler maintains a data structure associated with a ready queue of the kernel scheduler, the data structure comprising elements representing thread priorities, wherein an element of the data structure is associated with an ordered list of threads in the ready queue.
G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
In some examples, a system includes one or more hardware processors, an interrupt service thread to handle an interrupt, and a kernel scheduler to schedule the interrupt service thread as part of a collection of threads to be scheduled.
G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
A waterproof container is provided, the waterproof container including a base portion, the base portion having a base; an outer wall extending from the base; and an inner wall disposed inwardly from the outer wall, thereby forming a channel between the inner wall and the outer wall; and a lid portion, the lid portion having: a slot within the lid portion; and a seal configured to fit within the slot, the seal including a groove therein, wherein the groove of the seal is configured to accept an end of the inner wall therein when the lid portion is affixed to the base portion.
A method at a computing device, the method including receiving, at the computing device, sensor data from a data source; converting, at a playback tool on the computing device, the sensor data into converted data, thereby bypassing abstraction layers at the computing device; and providing the converted data to at least one synthetic sensor on the computing device, wherein each of the at least one synthetic sensor provides an insight regarding operation of the computing device.
The present disclosure provides, in an aspect, a computer-implemented method for modifying vehicle settings for a vehicle, the method comprising identifying a vehicle occupant having a personalized set of vehicle settings for the vehicle, identifying a condition modifier associated with the vehicle occupant and the personalized set of vehicle settings, and applying a vehicle setting from the set of vehicle settings based on the condition modifier.
B60R 16/037 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for occupant comfort
The present disclosure provides, in an aspect, a computer implemented method for monitoring a current use of a vehicle in real-time based on historical vehicle use, the method including acquiring, for a vehicle, historical vehicle data indicative of prior vehicle use; generating, using the historical vehicle data, a historical baseline characterizing a historical use of the vehicle; assessing a current use of the vehicle based on the historical baseline, and generating an alert based on the assessment.
A bracket for affixing a device to a shipping container, the bracket having a base; a first arm and a second arm disposed on distal ends of the base; a first flange and second flange extending from the first arm and the second arm; a first affixing mechanism and a second affixing mechanism to affix the first flange and the second flange respectively to adjacent locking rods on the shipping container, said first affixing mechanism and second affixing mechanism allowing rotation of the locking rods; and a mounting mechanism on the base for mounting the device, wherein the base is configured to fit within a corrugation behind the adjacent locking rods, and at least one portion of the base is configured to contact the shipping container when the first flange and the second flange are behind the adjacent locking rods.
A method at a network element for securely sharing services across domains, the method including receiving a request at the network element to add a first domain and an edge domain to a system; provisioning a public key of the network element to the first domain and the edge domain; receiving a public key of the first domain; populating, in the network element, a table with services provided by the first domain or the edge domain; populating, in the network element, a second table with applications installed at the first domain or edge domain and permissions for services for the applications; and controlling access to the services by the applications.
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
27.
METHOD AND SYSTEM FOR INDIRECT SHARING OF SENSOR INSIGHTS
A method at a first domain for obtaining at least one insight from a second domain, the method including synchronizing a permissions table at the first domain with a master permissions table at a network element; receiving a request for an insight from an application at a bridge in the first domain; confirming an identity of the application; verifying, at the bridge, application permissions using the permissions table at the first domain, the verifying confirming that the application has permission to access the insight; sending a request message from the first domain to the second domain, the request message being signed by a private key of the first domain and requesting the insight; and receiving the insight from the second domain.
A method at a first domain for obtaining at least one insight from a second domain, the method including registering an application with an anchor in the first domain; providing, from the anchor to the application, a first message signed by the anchor; sending, from the first domain to a network domain, the signed message; receiving, from the network domain, at least one signed token, each of the at least one signed token being for a synthetic sensor on the second domain, where the synthetic sensor provides an insight; sending a request message to the second domain, the request message requesting the insight and including the at least one token; and receiving the insight from a synthetic sensor associated with the at least one token.
In some examples, a control audio management engine is configured to interact with guest audio services in respective guests that have different audio management capabilities. The control audio management engine receives an indication of a start of a first audio in a first guest of the guests, the indication comprising an audio stream. The control audio management engine sends, to a second guest of the guests, control information to affect playback of a second audio that is playing in the second guest.
B60R 11/02 - Arrangements for holding or mounting articles, not otherwise provided for for radio sets, television sets, telephones, or the like; Arrangement of controls thereof
G08B 3/00 - Audible signalling systems; Audible personal calling systems
A method for verification at a computing device of a signed message received from a first party over a public communications channel, the method including extracting a message digest "a" belonging to a sem igroup from the signed message; obtaining a public key [c,e] for the first party, including a fixed value checker "c" and an endpoint "e", checker "c" and endpoint "e" belonging to the sem igroup and the endpoint comprising a multiplication of a private key "b" for the first party and the checker "c", multiplying the message digest "a" and the endpoint "e" to create an endmatter "ae"; extracting a signature "d" from the signed message, the signature "d" belonging to the sem igroup and being a multiplication of message digest "a" and private key "b"; multiplying the signature "d" and the checker "c" to create a signcheck "dc"; and verifying that the endmatter "ae" matches the signcheck "dc".
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
31.
METHOD AND SYSTEM FOR CLOUD EXTENDED ATTRIBUTE PROFILE
A method at a connector device, the method including receiving a first message from a peripheral device, the first message being received over a short range communications protocol connection utilizing a generic reading and writing service attribute profile; repackaging data within the first message into a second message at the connector device; and transmitting the second message to a network element, the transmitting utilizing a second communications connection, wherein the repackaging data populates a field within the second message with information about an attribute profile operation.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
H04L 41/082 - Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
A method at a computing device including obtaining a first container image from a host computing device; executing a second container image at the computing device, the executing comprising: starting a container from the first container image, the container being for a development environment on the computing device; and customizing the container for a local environment on the computing device, thereby creating a customized container; and compiling developed code within the customized container.
A method at a remote proxy on a first node, the method including receiving, at the remote proxy, a first message from a first module on the first node, the first message being directed to a second module on a second node; verifying the first message at the remote proxy utilizing operating system verification; determining, based on a manifest at the remote proxy, the second node; signing, using a private key for the first node, the first message; and sending the first message to the second node.
A method for key agreement between a first party and a second party over a public communications channel, the method including selecting, by the first party, a first value "a"; multiplying the first value "a" by a second value "b" using Knuth multiplication to create a third value "d", the third value "d" being a sem istandard tableau; sending the third value "d" to the second party; receiving, from the second party, a fourth value "e", the fourth value being a second sem istandard tableau comprising the second value "b" multiplied by a fifth value "c" selected by the second party; and creating a shared secret by multiplying the first value "a" with the fourth value "e" using Knuth multiplication, wherein the shared secret matches the third value "d" multiplied by the fifth value "c" using Knuth multiplication.
A device includes a link layer configured to use a first link layer address and a second link layer address, maintain the first link layer address unchanged for a duration of an association of the device with a wireless network, and change the second link layer address from a first value to a second value during the duration.
in some examples, a system receives intormation Paseo on wireiess sensing performed using wireless signals of a wireless interface of a wireless node, the wireless interface of the wireless node to communicate data over a wireless connection established with another wireless device. The system performs authentication in response to the received information.
A method in a user equipment (UE) for transferring an ongoing connection or ongoing session via a first network includes transmitting a first registration request message to a second network of a first public land mobile network (PLMN); transmitting a first connectivity request message to the second network, the first connectivity request message includes an indication that connectivity belongs to the ongoing connection or the ongoing session; receiving, in response to the first connectivity request message, a message comprising a cause code from the second network; transmitting, in response to receiving the message comprising the cause code, a second registration request message to a third network of a second PLMN, the first PLMN and the second PLMN are different; and transmitting a second connectivity request message to the third network, the second connectivity request message includes the indication that the connectivity belongs to the ongoing connection or the ongoing session.
In some examples, a system determines a context relating to a requested service of a vehicle, the context comprising information of a location related to the vehicle. The system authorizes the requested service based on the determined context.
In some examples, a first wireless device transmits, within a first band designated for vehicle-related communications, service information for a service, the service information comprising information of a channel in a second band for communication of data of the service, the second band being outside of the first band.
H04W 48/10 - Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
B60R 16/00 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for
40.
METHOD AND SYSTEM FOR SIGNALING COMMUNICATION CONFIGURATION FOR IOT DEVICES USING MANUFACTURER USAGE DESCRIPTION FILES
A method at a network element for configuration for Internet of Things (IoT) devices using manufacturer usage description (MUD) files, the method including receiving at least one MUD Uniform Resource Locator (URL) from an IoT Device; sending, from the network element to at least one MUD Server based on the MUD URL, a Uniform Resource Indicator; responsive to the sending, receiving a plurality of MUD files from the MUD server; creating a plurality of policies from the plurality of MUD files, the plurality of policies corresponding to a normal mode of operation and a secondary mode of operation; and forwarding the plurality of policies to a gateway from the network element.
A system and method in a user equipment (UE) for transferring an emergency session from a first network to a second network. The method includes transmitting a first registration request message to the second network; receiving a registration reject message from the second network; detecting the emergency session between the UE and the first network is ongoing; transmitting a second registration request message comprising an emergency registration request to the second network; and receiving a registration accept message for the emergency session.
In some examples, a vehicle receives authorization information that identifies an automotive service to be performed on the vehicle, the authorization information further indicating approval of performance of the automotive service on the vehicle by an operator of the vehicle and a vehicle manufacturer. Based on the authorization information, the vehicle enables access of an electronic component of the vehicle by an authorized repair entity to perform the automotive service.
B60R 25/102 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
B60R 25/00 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
43.
METHOD AND SYSTEM FOR ESTABLISHING TRUST FOR A CYBERSECURITY POSTURE OF A V2X ENTITY
A method at an Intelligent Transportation System (ITS) Transmitting Entity, the method including: generating an ITS message; augmenting the ITS message with an Integrity Report generated by an integrity detection function at the ITS Transmitting Entity to create an augmented ITS message; signing the augmented ITS message with an Authorization Certificate or Ticket, the Authorization Certificate or Ticket including an assurance indication from an Audit Certificate Authority for the integrity detection function; and sending the signed, augmented ITS message to an ITS Receiving Entity.
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
44.
METHOD AND SYSTEM FOR HANDLING DYNAMIC CYBERSECURITY POSTURE OF A V2X ENTITY
A method at a network element, the method including receiving at least one message at the network element, the at least one message being one or both of: an update status information message from an updates server; and an anomaly detection status information message from anomaly detection server; determining, based on the receiving the at least one message, a dynamic cybersecurity posture indication for an intelligent transportation system entity; and providing the dynamic cybersecurity posture indication for the intelligent transportation system entity to an Enrolment Authority, wherein the dynamic cybersecurity posture indication can be included in a certificate relating to the intelligent transportation system entity.
A method at an Intelligent Transportation System (ITS) Entity, the method including receiving a message from a second ITS entity, the message containing a safety assurance indication, and performing an action at the ITS entity based on the safety assurance indication. Further, an ITS Entity comprising a processor; and a communications subsystem, wherein the ITS Entity is configured to: receive a message from a second ITS entity, the message containing a safety assurance indication, and perform an action at the ITS entity based on the safety assurance indication.
A method at a Supplementary Data Provider within an emergency services network, the method including receiving a message at the Supplementary Data Provider, the message including an identifier and incident data; responsive to receiving the message, creating a resource at the Supplementary Data Provider based on the incident data, the resource being associated with the identifier; receiving an access request from an Emergency Services Provider for Supplementary Data associated with the resource; and responsive to receiving the access request, providing a response with the Supplementary Data.
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
In some examples, a system detects an accident involving a first vehicle, and responsive to the detecting of the accident, collects event data relating to the accident from a second vehicle that is different from the first vehicle.
50926-CA-PAT ABSTRACT A method within a network of facilitating identification and usage of alternative communication channels by a wireless device operating using a first communication channel is described. The method enables use of as secondary channel by non- primary users of that channel for prescribed times and within prescribed geographic locations. Date Recue/Date Received 2020-12-03
H04W 48/16 - Discovering; Processing access restriction or access information
H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
H04W 76/16 - Setup of multiple wireless link connections involving different core network technologies, e.g. a packet-switched [PS] bearer in combination with a circuit-switched [CS] bearer
49.
METHOD AND SYSTEM FOR A DYNAMIC DATA COLLECTION AND CONTEXT-DRIVEN ACTIONS
A method at an analytics module on a computing device, the analytics module being at a tier within a hierarchy of analytics modules and data sources, the method including receiving a first data set from a data source or a lower tier analytics module; analyzing the first data set to create a second data set; providing the second data set to at least one higher tier analytics module, the second data set being derived from the first data set; and providing at least one of an inference and an interdiction to the lower tier analytics module
G06F 16/90 - Information retrieval; Database structures therefor; File system structures therefor - Details of database functions independent of the retrieved data types
A method at a vehicle computing device for identifying a driver, the method including receiving a first indicator at the vehicle computing device; obtaining, based on the first indicator, a presumed driver identity; receiving at least one second indicator at the vehicle computing device; and verifying the presumed driver identity using the at least one second indicator.
B60K 28/02 - Safety devices for propulsion-unit control, specially adapted for, or arranged in, vehicles, e.g. preventing fuel supply or ignition in the event of potentially dangerous conditions responsive to conditions relating to the driver
51.
METHOD AND SYSTEM FOR PAIRING A CHASSIS AND CONTAINER IN AN ASSET TRACKING SYSTEM
ABSTRACT A method for pairing a first computing device with a second computing device, the method including: detecting motion at the first computing device; determining, at the first computing device, that a pattern of the detected motion corresponds with a saved motion pattern; and activating a communications subsystem on the first computing device based on the determining to begin a pairing process. CA 3094632 2020-09-23
A method and system for determining the weight of a load when the load is placed on a chassis supported by a spring suspension. The method may address the problem of providing improved ways of detecting shipping containers and estimating their weight. The method may use a sensor mounted to the chassis and may include determining the presence of the load by determining that the magnitude of the chassis displacement is greater than a minimum displacement value stored in the memory, and, only if it is determined that the magnitude of the chassis displacement is greater than a minimum displacement value, determining the weight of the load on the basis of the chassis displacement.
G01G 3/00 - Weighing apparatus characterised by the use of elastically-deformable members, e.g. spring balances
G01G 3/08 - Weighing apparatus characterised by the use of elastically-deformable members, e.g. spring balances wherein the weighing element is in the form of a leaf spring
G01G 19/04 - Weighing apparatus or methods adapted for special purposes not provided for in groups for weighing wheeled or rolling bodies, e.g. vehicles for weighing railway vehicles
G01G 23/14 - Devices for determining tare weight or for cancelling out the tare by zeroising, e.g. mechanically operated
CA 3092454 2020-09-02 Abstract In some examples, a source device categorizes a plurality of messages for transmission to a recipient device, the plurality of messages comprising vehicle- related information. Based on the categorizing, the source device identifies selected messages of the plurality of messages to be aggregated. The source device aggregates the selected messages into a single transmission from the source device to the recipient device.
H04L 47/2441 - Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
H04L 47/283 - Flow control; Congestion control in relation to timing considerations in response to processing delays, e.g. caused by jitter or round trip time [RTT]
H04L 47/41 - Flow control; Congestion control by acting on aggregated flows or links
54.
ENABLING SINGLE RADIO VOICE CALL CONTINUITY (SRVCC) IN A SECOND ACCESS WHEN A USER EQUIPMENT (UE) IS USING A FIRST ACCESS
A method implemented by a network node is disclosed. The method includes: obtaining registration state information associated with a user equipment (UE) from a first core network node, the registration state information indicating at least one of fourth-generation (4G) UE single radio voice call continuity (SRVCC) capability or fifth-generation (5G) UE SRVCC capability for the UE, wherein the UE is registered with a first IMS network that includes the network node using a session initiation protocol (SIP) via an access network supported by a second core network; and providing, to a second IMS network node, an indication of a single UE SRVCC capability for the UE.
Methods and systems for detecting a privacy violation in an image file. A policy to be used by a master imaging application is obtained and a file system is monitored for a digital image modified by a monitored imaging application. It is then determined that the digital image file includes at least some content in violation of a defined setting for the master imaging application and, based on the determination that the digital image file includes at least some content in violation of the defined setting for the master imaging application, taking an action.
Methods and systems for removing sensitive information from a digital image. An instruction to share a digital image is received. It is then determined that the digital image contains a depiction of a corporate display medium that is classified as sensitive based on a policy and, based on the determination that the digital image contains the depiction of the corporate display medium that is classified as sensitive based on the policy, the digital image is processed to modify the depiction. The digital image is shared.
ABSTRACT A method at a computing device, the method including obtaining sensor data for a vehicle providing vibration frequency and magnitude; calculating an energy for each of a low frequency passband and a high frequency passband of a bandpass filter pair; finding an energy ratio based on the energy for the low frequency passband and the energy for the high frequency passband; applying weighting constants to each of the energy for the low frequency passband, the energy for the high frequency passband and the energy ratio to calculate a decision variable; and finding that the vehicle is unloaded if the decision variable is below a threshold and finding that the vehicle is loaded if the decision variable is above a threshold. CA 3095389 2020-10-07
G01G 3/16 - Weighing apparatus characterised by the use of elastically-deformable members, e.g. spring balances wherein the weighing element is in the form of a solid body stressed by pressure or tension during weighing measuring variations of frequency of oscillations of the body
58.
METHODS AND DEVICES FOR TREE SWITCHING IN POINT CLOUD COMPRESSION
Methods and devices for coding point cloud data using volume trees and predicted-point trees. In one embodiment of the disclosure, a method of encoding a point cloud data to generate a bitstream of compressed point cloud data representing a three-dimensional location of a physical object is provided, the point cloud data being located within a volumetric space. The method includes compressing a first part of the point cloud data represented by a first tree of a first type; determining for a given node of the first tree if an assignation to a second type of tree is enabled, said given node still being processed for the first tree; when the assignation is enabled, compressing a second part of the point cloud data represented by a second tree of the second type wherein, features associated with a root node of the second tree are at least partially obtained from the given node.
A method and intelligent recording and action system (IRAS) for initiating action based on content played by a vehicle infotainment system in a vehicle is described. The method comprises detecting a voice command in an audio signal received by a microphone; determining that the voice command relates to audio content output by the vehicle infotainment system and parsing buffered output audio content from the vehicle infotainment system to extract data relating to the voice command; and initiating an action based on the extracted data and the voice command. The IRAS comprises a microphone for detecting a voice command in an audio signal; modules for determining that the voice command relates to audio content output by the vehicle infotainment system, parsing buffered output audio content from the vehicle infotainment system to extract data relating to the voice command, and initiating an action based on the extracted data and the voice command.
A method at a computing device within an Intelligent Transportation System, the method including detecting a traffic event at the computing device; determining no fixed roadside unit is available from the computing device; establishing an Internet Protocol connection from the computing device to a network node; and sending a traffic event message from the computing device to the network node, the traffic event message providing information for the traffic event.
G08G 1/00 - Traffic control systems for road vehicles
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
A method and apparatus for managing parameter ranges in a monitoring system includes storing a plurality of predetermined parameter ranges, receiving from a remote sensing device a measured parameter measured at the remote sensing device, determining a first parameter range based on the plurality of predetermined parameter ranges such that the measured parameter is within the first parameter range, transmitting a message to the remote sensing device that includes the first parameter range.
In some examples, a user equipment (UE) is registered with a fifth generation (5G) core network. In response to an emergency indication, the UE selects a first domain intended for a call responsive to the emergency indication. Subsequent to selecting the first domain, the UE attempts a combined registration with a second core network different from the 5G core network. In response to attempting the combined registration, the UE receives a further indication that the UE is registered for packet switched services but not circuit switched services. In response to the further indication, the UE selects an access network connected to a third core network to perform the call.
In some examples, an electronic device includes a plurality of network interfaces to communicate over respective different networks, and a storage medium to store information associating a first application of the electronic device with a first profile, and associating a second application of the electronic device with a second profile. The first profile selects a first network interface of the plurality of network interfaces to use for communications, and the second profile selects a second network interface of the plurality of network interfaces to use for communications.
Abstract A document management system having context-based access control and related methods are provided. The document management system determines whether to perform user authentication based on derived context-information comprising one or a combination of derived user-context parameters and document-context parameters that provide additional context to document access requests. Date Recue/Date Received 2020-07-10
A method and system of estimating human perception of audibility of audio alerts in the presence of background noise. In the audibility estimation system, a microphone generates an input signal corresponding to an audio alert. A processor receives the input signal and generates an audibility metric representing human perception of audibility of the audio alert based on a comparison between a background noise estimate and an audio alert estimate, and causes an action to be taken based on the audibility metric.
A method of echo cancellation in hands-free communication is disclosed. The method includes: receiving, via a receive signal processor, a far-end audio signal; providing the far-end audio signal to: an acoustic echo canceller module as a reference signal, and at least one loudspeaker for playback; determining an external gain value associated with the far-end audio signal, the external gain applied to the far-end audio signal downstream of the receive signal processor and prior to playback from the at least one loudspeaker; adjusting at least one parameter of the acoustic echo canceller module based on the external gain value; receiving playback output of the far-end audio signal from the at least one loudspeaker as an input signal to a microphone; and processing the microphone input signal by the adjusted acoustic echo canceller module to produce an echo-cancelled signal.
H04M 9/08 - Two-way loud-speaking telephone systems with means for conditioning the signal, e.g. for suppressing echoes for one or both directions of traffic
H04M 9/10 - Two-way loud-speaking telephone systems with means for conditioning the signal, e.g. for suppressing echoes for one or both directions of traffic with switching of direction of transmission by voice frequency
H04R 3/02 - Circuits for transducers for preventing acoustic reaction
67.
METHOD FOR MULTI-STAGE COMPRESSION IN SUB-BAND PROCESSING
A sub-band processing system for reducing computational complexity and memory requirements is disclosed. The sub-band processing system includes: a first logic that partitions and stores a frequency spectrum of bins of real and imaginary data into a smaller number of sub-bands; a second logic that executes a first lossy compression for a first set of the sub-bands, wherein the first set includes those sub-bands having indices that are greater than or equal to a first index; and a third logic that executes, subsequent to a frequency spectrum processing of the lossy compressed data rendered by the second logic, a second lossy compression for a second set of the sub-bands, wherein the second set includes those sub-bands having indices that are less than the first index and greater than or equal to a second index.
A method at a system including a firewall and at least one application, the method including obtaining, at the at least one application, a new address for a service provider for the at least one application; triggering a firewall update; obtaining a new firewall configuration; and updating the firewall, wherein the updating the firewall allows a connection from the at least one application to the new address for the service provider.
A method and system for adaptive noise masking powertrain noise in a vehicle is described. The method comprises: determining frequency and amplitude characteristics of the powertrain noise; determining amplitude characteristics of background noise in the vehicle; dynamically generating a masking audio signal based on the determined characteristics of the powertrain noise and background noise; and outputting the masking audio signal in a cabin of the vehicle. The system includes: a processor; a memory storing processor- executable instructions that, when executed, cause the processor to determine frequency and amplitude characteristics of the powertrain noise and to determine amplitude characteristics of background noise in the vehicle; a masking noise generator for dynamically generating a masking audio signal based on the determined characteristics of the powertrain noise and background noise; and one or more vehicle cabin loudspeakers for receiving and outputting the masking audio signal in a cabin of the vehicle.
B60R 16/037 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for occupant comfort
G10K 11/178 - Methods or devices for protecting against, or for damping, noise or other acoustic waves in general using interference effects; Masking sound by electro-acoustically regenerating the original acoustic waves in anti-phase
70.
INTERWORKING SYSTEM AND OPERATION IN V2X APPLICATIONS
A communication system and method for supporting a plurality of vehicle-to- everything radio access technologies (V2X RATs) is provided. The communication system configured to support multiple V2X RATs transmits, using a first V2X RAT, an indication of its availability to support an interworking function between the plurality of V2X RATs. The communication system receives an instruction to provide the interworking function between different V2X RATs. The interworking function may be incorporated in a vehicle that is joined to a platoon configured to use a first V2X RAT, and provide the interworking function between the first and a second V2X RAT. The interworking function may be used to add further vehicles to the platoon that communicate using only the second V2X RAT.
H04W 48/10 - Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
H04W 48/04 - Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction or speed
H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
71.
METHOD AND SYSTEM FOR SHIPPING CONTAINER LOAD ESTIMATION
A method at a computing device, the method including obtaining sensor data for a vehicle providing one or both of displacement or acceleration information for the vehicle; calculating a vibration frequency for the vehicle; retrieving calibration data for the vehicle, the calibration data comprising at least a first known mass; a second known mass; a vibration frequency for the vehicle at the first known mass; and a vibration frequency of the vehicle at a second known mass; and using the calibration data and the vibration frequency for the vehicle, calculating a load estimation for the vehicle.
G01G 19/03 - Weighing apparatus or methods adapted for special purposes not provided for in groups for weighing wheeled or rolling bodies, e.g. vehicles for weighing during motion
Devices and methods of managing data stored within a container. The container may be associated with at least one registered user. The data within the container may be encrypted by a data encryption key (DEK). A computing device includes: a security module including a crypto-processor, a main processor, and memory. The memory stores instructions that, when executed, configure a processor to: authenticate a user based on a user secret associated with the container and generate a soft key based on the user secret. The instructions cause a crypto-processor to generate a secure generator output including a crypto key component and generate a hardened user key based on a key agreement protocol using the soft key and the crypto key component. The instructions cause a processor to construct an unencrypted DEK associated with the hardened user key and decrypt the subset of data using the unencrypted DEK.
A method at a network element within a Vehicle to Everything (V2X) Communications Domain, the method including receiving a tracking request at the network element for a target vehicle, the tracking request including identifying information for the target vehicle; creating a target vehicle list based on the tracking request; distributing the target vehicle list to at least one V2X endpoint; receiving at least one sighting report from the at least one V2X endpoint; and forwarding the at least one sighting report to a second network element.
H04W 4/029 - Location-based management or tracking services
H04W 4/06 - Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
H04W 12/00 - Security arrangements; Authentication; Protecting privacy or anonymity
H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
In some examples, a wireless device receives, from a wireless access network node, an indication of a supported extended emergency information (EEI) type supported by a wireless local area network (WLAN). The supported EEI type is selected from among a plurality of different EEI types. The wireless device sends a message relating to an emergency call, the message including EEI data according to the supported EEI type.
H04W 92/10 - Interfaces between hierarchically different network devices between terminal device and access point, i.e. wireless air interface
H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
H04L 67/51 - Discovery or management thereof, e.g. service location protocol [SLP] or web services
H04L 67/52 - Network services specially adapted for the location of the user terminal
75.
METHOD AND SYSTEM FOR APPLICATION AUTHENTICITY ATTESTATION
A method at a network element for attestation of applications, the method including sending a challenge to an application at an electronic device; receiving a response from the electronic device; processing the response; and upon determining that the response is invalid based on the processing, taking an enforcement action against the application.
A method for managing radio communications between a gateway and a plurality of sensors of a system for tracking assets is disclosed. The method includes: obtaining properties of a currently tracked asset; determining a current connection configuration for radio connections between the gateway and the plurality of sensors; identifying a preferred connection configuration for radio connections between the gateway and the plurality of sensors based on the properties of the currently tracked asset, the preferred connection configuration having at least one physical layer characteristic that is different from the current connection configuration; and in response to the identifying, causing the gateway and at least one of the plurality of sensors to switch from the current connection configuration to the preferred connection configuration for establishing a new radio connection.
A method at an electronic device, the method including initiating authentication with a network through a network element; providing a configuration request, the configuration request including an attribute set for the electronic device; and receiving a configuration response, the configuration response including a certificate or credential for future authentication with the network.
A method at a sensor apparatus affixed to a transportation asset, the method including detecting a trigger at the sensor apparatus; taking a threshold number of samples of a displacement-related value of the transportation asset over time; determining that a variance of the threshold number of samples exceeds a threshold; analyzing a frequency property based on the threshold number of samples; and based on the frequency property, determining whether the transportation asset is loaded or unloaded.
G01D 1/00 - Measuring arrangements giving results other than momentary value of variable, of general application
G01B 21/32 - Measuring arrangements or details thereof, where the measuring technique is not covered by the other groups of this subclass, unspecified or not relevant for measuring the deformation in a solid
G01P 15/00 - Measuring acceleration; Measuring deceleration; Measuring shock, i.e. sudden change of acceleration
A method at a computing device for document rights management, the method comprising: receiving, at the computing device, a document; encrypting the document using a content key; creating a header, the header including a document identifier and an identifier for the computing device; persisting permissions for the document at the computing device; and returning a stream comprised the encrypted document and the header.
In some examples, a device aggregates data frames into an aggregated data frame for communication in an Outside the Context of a Basic Service Set (OCB) mode.
H04L 69/324 - Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the data link layer [OSI layer 2], e.g. HDLC
H04L 12/413 - Bus networks with decentralised control with random access, e.g. carrier-sense multiple-access with collision detection (CSMA-CD)
In some examples, a first wireless device sends, to a second wireless device, a control indication that controls transmission of group-addressed data between the first wireless device and the second wireless device over a wireless local area network (WLAN).
A method and system includes generating event logs, storing in a database log data comprising the generated event logs, identifying a first set of log data by searching the log data for a first log data type, the first log data type having a data structure that includes a generic identifier and a specific data, identifying pairs of generic identifiers and associated specific data in the first set of log data, for each generic identifier of the identified pairs identifying a second set of log data that include the generic identifier but not the specific data, wherein identifying the second set of log data is performed by searching the log data for event logs that include the generic identifier, and updating log data stored in the database by adding, for each of the event logs of the identified second set of log data, the specific data associated with the generic identifier.
G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
G06F 16/90 - Information retrieval; Database structures therefor; File system structures therefor - Details of database functions independent of the retrieved data types
G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
83.
SYSTEMS AND METHODS OF VEHICLE DETECTION WITHIN A VEHICLE PARKING FACILITY
Systems and methods for vehicle detection within a vehicle parking facility. The system includes one or more vehicle detection sensors positioned about the vehicle parking facility. The system includes processor executable instructions for determining a measure of available parking spaces based on sensor data from one or more vehicle detection sensors. The system receives, from an image capture device, image data representing an occupancy state of discrete parking spaces. The system determines, based on the image data, that a subject vehicle occupying a target parking space additionally occupies an area external to the target parking space and, in response, determines a number of unusable parking spaces. The system generates and transmits, to a display, parking space inventory data based on the determined number of unusable parking spaces and the measure of available parking spaces.
A method for managing enrollments of an IoT device is disclosed. The method includes: transmitting a request to enroll the device with a first device management service; receiving, from a server associated with the first device management service, a first policy profile including one or more first device management policies, the first policy profile defining at least one restriction on management of the device by other device management services with which the device enrolls; transmitting a request to enroll the device with a second device management service; receiving, from a server associated with the second device management service, a second policy profile including one or more second device management policies; identifying a subset of the one or more second device management policies which comply with the at least one restriction; and applying the identified subset of the one or more second device management policies on the device.
H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
H04L 41/0893 - Assignment of logical groups to network elements
H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
A method for controlling access to a vehicle is disclosed. The method includes: receiving, from a communication subsystem of the vehicle, a first request to authenticate a user requesting access to the vehicle; sending, to an electronic device associated with the vehicle, an instruction to perform a multiple-factor authentication of a first user of the electronic device; receiving, from the electronic device, a first message indicating that an identity of the first user of the electronic device has been verified based on at least the multiple-factor authentication; and in response to receiving the first message, sending, to the communication subsystem of the vehicle, a second message indicating successful authentication of the first user.
A method of establishing a secure communication channel between a first communication device and a second communication device. The secure communication channel is defined by one or more algorithm options and the one or more algorithm options are associated with one of one or more option categories. The method includes receiving a signal representing one or more selections. The method further includes, for the respective option categories, generating a sorted list of algorithm options based on the received selections and generating a security association proposal including one or more of the algorithm options from the respective sorted lists of algorithm options. The security association proposal is generated based on an order in the sorted list of algorithm options. The method further includes transmitting the security association proposal to the second communication device for establishing the secure communication channel.
A method of dynamically optimizing antenna performance in a wireless sensor network is set forth, comprising scanning multiple frequency bands via successive ones of a plurality of antennae for receiving indications of signal strength at each antenna for each scanned frequency band; and selecting one of said plurality of antennae having highest signal strength over one of said multiple frequency bands for communication over said one of said multiple frequency bands.
H04W 4/38 - Services specially adapted for particular environments, situations or purposes for collecting sensor information
H04B 7/04 - Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
A method at a computing device in a public ledger cryptography system, the method including creating a purpose string, the purpose string defining transaction parameters for an account within the public ledger cryptography system; using the purpose string to create a private key and associated public key for an account within the public ledger cryptography system; and providing the purpose string for use in verification of a transaction from the account within the public ledger cryptography system.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
H04L 12/16 - Arrangements for providing special services to substations
Described herein is a system and method in a user equipment (UE) supporting registration using third generation partnership project (3GPP) access and using non-3GPP access, the method comprising storing, in a memory of the UE, first emergency information received using first registration procedures; receiving, by the UE, a REGISTRATION ACCEPT message using second registration procedures via non-3GPP access; and keeping, in the memory, the first emergency information after receiving the REGISTRATION ACCEPT message.
A method at a sensor apparatus affixed to a transportation asset. The method includes calibrating the sensor apparatus by initiating a vertical impact at the transportation asset, measuring spring oscillation and creating a model of the transportation asset. The method further includes detecting, subsequent to the calibrating, an impact event at the sensor apparatus. The method further includes measuring spring oscillation due to the impact event at the sensor apparatus and using the measured spring oscillation in the model created during calibration to create a load mass estimate for the transportation asset.
Methods and systems to mitigate headlight blinding during travel in a vehicle by relaying location data from vehicles to a remote server. The remote server identifies vehicles approaching each other on an otherwise unoccupied roadway and sends one or more of those vehicles a warning signal. The vehicle receiving such as warning signal may then automatically take a headlight mitigation action.
G08G 1/0965 - Arrangements for giving variable traffic instructions having an indicator mounted inside the vehicle, e.g. giving voice messages responding to signals from another vehicle, e.g. emergency vehicle
H04W 4/02 - Services making use of location information
H04W 4/46 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for vehicle-to-vehicle communication [V2V]
92.
VEHICULAR IRRITANT DETECTION AND MITIGATION SYSTEM
Methods and systems for mitigating irritants during travel in a vehicle. The method includes determining, at a remote server, an airborne irritant is present external to the vehicle, which may involve data from the vehicle or from other nearby vehicles. The data may be direct irritant measurements by sensors or may be indirect data indicative of possible irritants. Based on the determination that the airborne irritant is likely present external to the vehicle, an irritant mitigation action is caused within the vehicle. The irritant mitigation action may include displaying a notification signaling presence of the airborne irritant, outputting an audio notification signaling presence of the airborne irritant, closing a window of the vehicle, or closing an air vent of the vehicle.
A method at a computing device within an Intelligent Transportation System (ITS), the method including: receiving a first message, the first message including at least tailoring information for a first ITS endpoint and intended journey details for the first ITS endpoint; storing all or a subset of data from the first message; obtaining a full certificate revocation list; creating a tailored certificate revocation list based on data in the first message and the full certificate revocation list, the tailored certificate revocation list containing certificates or identifiers of certificates for ITS endpoints that may be encountered by the first ITS endpoint when navigating a route provided in the intended journey details; and providing the tailored certificate revocation list to the first ITS endpoint.
A method of controlling access to data on a first electronic device, the method comprising steps of: establishing (302) a shared encryption key with a first software application instance running on a second electronic device; receiving (304) a 'begin session' command sent by the first software application instance and responsive to the 'begin session' command: creating (306) a storage location in a data store of the electronic device; and obtaining (308) a data encryption key; receiving (310) data; encrypting (312) the data using the data encryption key and storing the encrypted data in the storage location; receiving (314) an 'end session' command sent by the first software application instance and responsive to the 'end session' command: discarding (316) the shared encryption key; and deleting (318) the encrypted data from the storage location.
Devices and methods for prolonging battery life of an inventory tracking tag. The tag determines its location and reports to remote server over a cellular data connection using the cellular communication subsystem. The remote server assesses whether the tag is within range of a short-range communication network, such as a WiFi network, and sends an instruction message over the cellular data connection to instruct the tag to use the first short-range communication network. The instruction message may include credentials for connecting to the network. The tag disables the cellular communication subsystem, enables the short-range communication subsystem, and requests a connection to the first short-range communication network for the purpose of sending future location reports to the remote server.
H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
H04W 4/029 - Location-based management or tracking services
H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
In some examples, an electronic device includes a hub configurator to obtain, from a port hub that expands a number of ports for the electronic device, information of topological elements of the port hub, and modify a configuration of the port hub.
A digital audio system, which may be an integrated audio system of a vehicle, includes a microphone, a loudspeaker, and a processor. The processor is operable to modify digital audio signals based on tuning parameters to compensate for acoustic characteristics of the environment. The processor is further operable to detect that modification of digital audio signals based on the tuning parameters cannot fully compensate for the acoustic characteristics of the environment. The detection is based on an audio signal corresponding to audio captured from the environment and/or on the values of the tuning parameters. Upon detecting that modification of digital audio signals based on the tuning parameters cannot fully compensate for the acoustic characteristics of the environment, an indication is provided that the audio system should be calibrated to adjust the tuning parameters to the environment. Related methods and computer-readable media are also disclosed.
A source wireless device sends an indication of support for one or more broadcast services that broadcasts information over a wireless local area network (WLAN).
H04W 4/06 - Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
H04W 48/08 - Access restriction or access information delivery, e.g. discovery data delivery
99.
VEHICLE COMMUNICATION SYSTEMS AND METHODS OF OPERATING VEHICLE COMMUNICATION SYSTEMS
Communication systems in a vehicle and methods of operating the same. The vehicle has a safety belt securable around a vehicle occupant. The system includes processor executable instructions for detecting, at a microphone, a first acoustic input and, in response, determining that the first acoustic input corresponds to audible speech at a speech time. The system detects vibration associated with a speaking vehicle occupant at a vibration time using a vibration sensor associated with the safety belt. The system determines whether the vibration time substantially corresponds to the speech time to identify whether the audible speech originates from the vehicle occupant on which the first safety belt is secured about. In response to identifying that the audible speech originates from the vehicle occupant associated with safety belt, the system adjusts loudspeaker output of at least one loudspeaker.
H04W 4/48 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for in-vehicle communication
B60R 11/02 - Arrangements for holding or mounting articles, not otherwise provided for for radio sets, television sets, telephones, or the like; Arrangement of controls thereof
A computer system includes a processor, a communications subsystem, and a non- transitory computer-readable storage medium. The computer-readable medium stores instructions that when executed by the processor adapt the computer system to receive an indication of a second device selected, at a first device, for update; send an indication signalling the second device to send state information about the second device; receive state information about the second device; determine, based on the state information, that the second device is ready to perform an update; send, to the first device, an indication that the second device is ready to perform the update; receive, from the first device, an indication to update the second device; and, send a corresponding indication to the second device. The second device is configured to begin updating in response to such an indication without any direct interaction with it. Related methods and computer-readable media are also described.