A method for natural language processing of a corpus of documents, the method including evaluating the corpus of documents to choose a plurality of topics, using the plurality of topics to generate a topic of topics; and assessing the topic of topics to determine a quality of the natural language processing of the corpus.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for processing event log data. An example event log processing method includes receiving an event log comprising a plurality of event records describing events that have occurred on each of one or more computer systems over a period of time; converting the event log into a graph, comprising: normalizing the plurality of event records, including anonymizing a unique identifier value in each event record and replacing a variable value in each event record with a predetermined value; representing each normalized event record as one or more nodes in the graph; and generating a plurality of event clusters, wherein each event cluster includes an aggregated group of nodes and is generated based on common attributes of and hierarchical relationships between the normalized event records represented by the nodes in the aggregated group.
Systems, methods, and software can be used to determine security risks in binary software using a software relationship model. In some aspects, a method comprises: receiving a software relationship model that identifies: (i) a set of software components, and (ii) communication interfaces between software components in the set of software components; receiving a set of binary software code; generating a risk assessment for the set of binary software code based on the software relationship model; and generating a notification, based on the risk assessment for the set of binary software code, that indicates security risks associated with the set of binary software code.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Methods and systems for fingerprinting a malicious behavior. In a first stage of training, a coarse machine learning one-class classifier is trained to detect a first dataset of events, the first dataset of events including a dataset of events representing a malicious behavior and a dataset of events representing non-malicious behavior and a benign machine learning one-class classifier is trained to detect a second dataset of events, the second dataset of events excluding the dataset of events representing malicious activity. An ensemble of models including the benign and coarse machine learning one-class classifiers is applied to the first dataset of events to create a third training set representing the malicious behavior for a second stage of training. A final machine learning one-class classifier is trained in the second stage of training using the third training set. The final machine learning one-class classifier represents a fingerprint of the malicious behavior.
A method at a computing device, the method including receiving, at the computing device, sensor data from a data source; converting, at a playback tool on the computing device, the sensor data into converted data, thereby bypassing abstraction layers at the computing device; and providing the converted data to at least one synthetic sensor on the computing device, wherein each of the at least one synthetic sensor provides an insight regarding operation of the computing device.
The present disclosure provides, in an aspect, a computer-implemented method for modifying vehicle settings for a vehicle, the method comprising identifying a vehicle occupant having a personalized set of vehicle settings for the vehicle, identifying a condition modifier associated with the vehicle occupant and the personalized set of vehicle settings, and applying a vehicle setting from the set of vehicle settings based on the condition modifier.
B60R 16/037 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided forArrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for occupant comfort
The present disclosure provides, in an aspect, a computer implemented method for monitoring a current use of a vehicle in real-time based on historical vehicle use, the method including acquiring, for a vehicle, historical vehicle data indicative of prior vehicle use; generating, using the historical vehicle data, a historical baseline characterizing a historical use of the vehicle; assessing a current use of the vehicle based on the historical baseline, and generating an alert based on the assessment.
A method at a network element for securely sharing services across domains, the method including receiving a request at the network element to add a first domain and an edge domain to a system; provisioning a public key of the network element to the first domain and the edge domain; receiving a public key of the first domain; populating, in the network element, a table with services provided by the first domain or the edge domain; populating, in the network element, a second table with applications installed at the first domain or edge domain and permissions for services for the applications; and controlling access to the services by the applications.
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
9.
METHOD AND SYSTEM FOR INDIRECT SHARING OF SENSOR INSIGHTS
A method at a first domain for obtaining at least one insight from a second domain, the method including synchronizing a permissions table at the first domain with a master permissions table at a network element; receiving a request for an insight from an application at a bridge in the first domain; confirming an identity of the application; verifying, at the bridge, application permissions using the permissions table at the first domain, the verifying confirming that the application has permission to access the insight; sending a request message from the first domain to the second domain, the request message being signed by a private key of the first domain and requesting the insight; and receiving the insight from the second domain.
A method at a first domain for obtaining at least one insight from a second domain, the method including registering an application with an anchor in the first domain; providing, from the anchor to the application, a first message signed by the anchor; sending, from the first domain to a network domain, the signed message; receiving, from the network domain, at least one signed token, each of the at least one signed token being for a synthetic sensor on the second domain, where the synthetic sensor provides an insight; sending a request message to the second domain, the request message requesting the insight and including the at least one token; and receiving the insight from a synthetic sensor associated with the at least one token.
Systems, methods, and software can be used to handle security events of a device based on remediation actions and recovery actions. In some aspects, a method comprises: receiving, by a security gateway, a security event notification associated with a device; determining, by the security gateway and based on the security event notification, a risk level of the device; determining, by the security gateway and based on the risk level, a set of remediation actions and recovery actions; and sending, by the security gateway, an action plan indicating the set of remediation actions and recovery actions.
A method at a computing device including obtaining a first container image from a host computing device; executing a second container image at the computing device, the executing comprising: starting a container from the first container image, the container being for a development environment on the computing device; and customizing the container for a local environment on the computing device, thereby creating a customized container; and compiling developed code within the customized container.
A method at a remote proxy on a first node, the method including receiving, at the remote proxy, a first message from a first module on the first node, the first message being directed to a second module on a second node; verifying the first message at the remote proxy utilizing operating system verification; determining, based on a manifest at the remote proxy, the second node; signing, using a private key for the first node, the first message; and sending the first message to the second node.
A method in a user equipment (UE) for transferring an ongoing connection or ongoing session via a first network includes transmitting a first registration request message to a second network of a first public land mobile network (PLMN); transmitting a first connectivity request message to the second network, the first connectivity request message includes an indication that connectivity belongs to the ongoing connection or the ongoing session; receiving, in response to the first connectivity request message, a message comprising a cause code from the second network; transmitting, in response to receiving the message comprising the cause code, a second registration request message to a third network of a second PLMN, the first PLMN and the second PLMN are different; and transmitting a second connectivity request message to the third network, the second connectivity request message includes the indication that the connectivity belongs to the ongoing connection or the ongoing session.
A method at a network element for configuration for Internet of Things (IoT) devices using manufacturer usage description (MUD) files, the method including receiving at least one MUD Uniform Resource Locator (URL) from an IoT Device; sending, from the network element to at least one MUD Server based on the MUD URL, a Uniform Resource Indicator; responsive to the sending, receiving a plurality of MUD files from the MUD server; creating a plurality of policies from the plurality of MUD files, the plurality of policies corresponding to a normal mode of operation and a secondary mode of operation; and forwarding the plurality of policies to a gateway from the network element.
A system and method in a user equipment (UE) for transferring an emergency session from a first network to a second network. The method includes transmitting a first registration request message to the second network; receiving a registration reject message from the second network; detecting the emergency session between the UE and the first network is ongoing; transmitting a second registration request message comprising an emergency registration request to the second network; and receiving a registration accept message for the emergency session.
A method at a network element, the method including receiving at least one message at the network element, the at least one message being one or both of: an update status information message from an updates server; and an anomaly detection status information message from anomaly detection server; determining, based on the receiving the at least one message, a dynamic cybersecurity posture indication for an intelligent transportation system entity; and providing the dynamic cybersecurity posture indication for the intelligent transportation system entity to an Enrolment Authority, wherein the dynamic cybersecurity posture indication can be included in a certificate relating to the intelligent transportation system entity.
A method at an Intelligent Transportation System (ITS) Transmitting Entity, the method including: generating an ITS message; augmenting the ITS message with an Integrity Report generated by an integrity detection function at the ITS Transmitting Entity to create an augmented ITS message; signing the augmented ITS message with an Authorization Certificate or Ticket, the Authorization Certificate or Ticket including an assurance indication from an Audit Certificate Authority for the integrity detection function; and sending the signed, augmented ITS message to an ITS Receiving Entity.
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
19.
METHOD AND SYSTEM FOR ADDITION OF ASSURANCE INFORMATION TO V2X MESSAGING
A method at an Intelligent Transportation System (ITS) Entity, the method including receiving a message from a second ITS entity, the message containing a safety assurance indication, and performing an action at the ITS entity based on the safety assurance indication. Further, an ITS Entity comprising a processor; and a communications subsystem, wherein the ITS Entity is configured to: receive a message from a second ITS entity, the message containing a safety assurance indication, and perform an action at the ITS entity based on the safety assurance indication.
G08G 1/00 - Traffic control systems for road vehicles
G06F 19/00 - Digital computing or data processing equipment or methods, specially adapted for specific applications (specially adapted for specific functions G06F 17/00;data processing systems or methods specially adapted for administrative, commercial, financial, managerial, supervisory or forecasting purposes G06Q;healthcare informatics G16H)
20.
METHOD AND DEVICE FOR AUTOMATED PROVISIONING OF DATA FROM MULTIPLE SENSORS WITHIN AN EMERGENCY SERVICES NETWORK
A method at a Supplementary Data Provider within an emergency services network, the method including receiving a message at the Supplementary Data Provider, the message including an identifier and incident data; responsive to receiving the message, creating a resource at the Supplementary Data Provider based on the incident data, the resource being associated with the identifier; receiving an access request from an Emergency Services Provider for Supplementary Data associated with the resource; and responsive to receiving the access request, providing a response with the Supplementary Data.
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04W 4/02 - Services making use of location information
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
In some examples, a system detects an accident involving a first vehicle, and responsive to the detecting of the accident, collects event data relating to the accident from a second vehicle that is different from the first vehicle.
Methods and devices for coding point clouds using direct coding mode to code coordinates of a point within a sub-volume associated with a current node instead of a pattern of occupancy for child nodes. When direct coding is applied to two or more points in the sub-volume, the points are ordered based on one of their respective coordinate values and pairwise coding of those coordinate values is carried out on a bit-by-bit basis. The pairwise coding includes coding whether the bits are the same and, if so, the bit value.
A method of encoding point cloud data using a planar coding mode is disclosed. The planar coding mode may be signaled using a planar mode flag to signal that a current volume is planar. A volume is planar if all of its occupied child nodes are on one side of a plane bisecting the volume. A planar position flag may signal which side of the volume is occupied. Volume data for already-coded occupied volumes of the point cloud is tracked using a data structure stored in memory. Entropy coding may be used to code the planar mode flag and/or the planar position flag. Context determination for coding may take into account a distance between the volume and a closest already-coded occupied volume among those tracked already-coded occupied volumes that have a same index in the data structure as the current volume.
A method at a vehicle computing device for identifying a driver, the method including receiving a first indicator at the vehicle computing device; obtaining, based on the first indicator, a presumed driver identity; receiving at least one second indicator at the vehicle computing device; and verifying the presumed driver identity using the at least one second indicator.
B60K 28/02 - Safety devices for propulsion-unit control, specially adapted for, or arranged in, vehicles, e.g. preventing fuel supply or ignition in the event of potentially dangerous conditions responsive to conditions relating to the driver
B60R 25/24 - Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
B60R 25/30 - Detection related to theft or to other events relevant to anti-theft systems
G06K 9/70 - Methods or arrangements for recognition using electronic means using sequential comparisons of the image signals with a plurality of reference, e.g. addressable memory the selection of the next reference depending on the result of the preceding comparison
A method at an analytics module on a computing device, the analytics module being at a tier within a hierarchy of analytics modules and data sources, the method including receiving a first data set from a data source or a lower tier analytics module; analyzing the first data set to create a second data set; providing the second data set to at least one higher tier analytics module, the second data set being derived from the first data set; and providing at least one of an inference and an interdiction to the lower tier analytics module
G06F 16/90 - Details of database functions independent of the retrieved data types
B60W 40/00 - Estimation or calculation of driving parameters for road vehicle drive control systems not related to the control of a particular sub-unit
26.
ANGULAR PRIOR AND DIRECT CODING MODE FOR TREE REPRESENTATION CODING OF A POINT CLOUD
A method of encoding or decoding a point cloud for representing a three-dimensional location of an object, the point cloud being generated by a device comprising a plurality of beam emitters. The method comprises using information from the beam emitter such as the location and angle of each beam emitter to more efficiently represent the point cloud data.
A method implemented by a network node is disclosed. The method includes: obtaining registration state information associated with a user equipment (UE) from a first core network node, the registration state information indicating at least one of fourth-generation (4G) UE single radio voice call continuity (SRVCC) capability or fifth-generation (5G) UE SRVCC capability for the UE, wherein the UE is registered with a first IMS network that includes the network node using a session initiation protocol (SIP) via an access network supported by a second core network; and providing, to a second IMS network node, an indication of a single UE SRVCC capability for the UE.
A method of encoding or decoding a point cloud to representing a three-dimensional location of an object, the point cloud being located within a volumetric space, the method including determining at least one closest, relative to azimuthal distance, encoded node to a current node; determining an azimuthal prediction angle for each of the at least one closest encoded node; finding an averaged azimuthal prediction angle from the determined azimuthal prediction angle for each of the at least one closest encoded node; selecting an angular azimuthal context based on the averaged azimuthal predication angle; encoding information representative of the current node based on the azimuthal context to generate the bitstream of compressed point cloud data or decoding information representative of the current node based on the azimuthal context to generate the point cloud data.
A method of encoding or decoding a point cloud for representing a three-dimensional location of an object, the point cloud being generated by a device comprising a plurality of beam emitters. The method comprises using information from the beam emitter such as the angle of each beam emitter, and the azimuthal distance between each point capture, to more efficiently represent the point cloud data.
H04N 19/61 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding in combination with predictive coding
A method at a user equipment, the method including receiving a string of indicia identifying at the user equipment, the string further comprising an indicator bit; based on the indicator bit, performing one of: determining whether the user equipment supports one or more indicium of the string of indicia and skipping display of characters corresponding to non-supported indicia; or displaying all indicium within the string of indicia. In other embodiments, utilizing a language delineator to choose a string of indicia to display or providing a language delineator to a network element and using the complete string of indicia received from a network element based on the provided language delineator.
H04M 1/724 - User interfaces specially adapted for cordless or mobile telephones
H04M 1/72403 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
31.
METHODS AND DEVICES FOR TREE SWITCHING IN POINT CLOUD COMPRESSION
Methods and devices for coding point cloud data using volume trees and predicted-point trees. In one embodiment of the disclosure, a method of encoding a point cloud data to generate a bitstream of compressed point cloud data representing a three-dimensional location of a physical object is provided, the point cloud data being located within a volumetric space. The method includes compressing a first part of the point cloud data represented by a first tree of a first type; determining for a given node of the first tree if an assignation to a second type of tree is enabled, said given node still being processed for the first tree; when the assignation is enabled, compressing a second part of the point cloud data represented by a second tree of the second type wherein, features associated with a root node of the second tree are at least partially obtained from the given node.
Method and devices for coding point cloud data using an angular coding mode. The angular coding mode may be signaled using an angular mode flag to signal that a volume is to be coded using the angular coding mode. The angular coding mode is applicable to planar volumes that have all of their occupied child nodes on one side of a plane bisecting the volume. A planar position flag may signal which side of the volume is occupied. Entropy coding may be used to code the planar position flag. Context determination for coding may take into account angular information for child nodes or groups of child nodes of the volume relative to a location of a beam assembly that has sampled the point cloud. Characteristics of the beam assembly may be coded into the bitstream.
Method and devices for coding point cloud data using an angular coding mode. The angular coding mode may be signaled using in an angular mode flag to signal that a volume is to be coded using the angular coding mode. The angular coding mode is applicable to planar volumes that have all of their occupied child nodes on one side of a plane bisecting the volume. A planar position flag may signal which side of the volume is occupied. Entropy coding may be used to code the planar position flag. Context determination for coding may take into account angular information for child nodes or groups of child nodes of the volume relative to a location of a beam assembly that has sampled to point cloud. Characteristics of the beam assembly may be coded into a dedicated syntax in the bitstream.
In some examples, a user equipment (UE) is registered with a fifth generation (5G) core network. In response to an emergency indication, the UE selects a first domain intended for a call responsive to the emergency indication. Subsequent to selecting the first domain, the UE attempts a combined registration with a second core network different from the 5G core network. In response to attempting the combined registration, the UE receives a further indication that the UE is registered for packet switched services but not circuit switched services. In response to the further indication, the UE selects an access network connected to a third core network to perform the call.
Method and devices for coding point cloud data using a planar coding mode. The planar coding mode may be signaled using in a planar mode flag to signal that a volume is planar. A planar volume has all of its occupied child nodes on one side of a plane bisecting the volume. A planar position flag may signal which side of the volume is occupied. Entropy coding may be used to code the planar mode flag and/or the planar position flag. Context determination for coding may take into account one or more of whether a parent volume containing the volume is planar in occupancy, occupancy of a neighbouring volume at a parent depth, distance between the volume and a closest already-coded occupied volume at a same depth as the volume, plane position, if any, of the closest already-coded occupied volume, and a position of the volume within the parent volume.
Method and devices for coding point cloud data using a planar coding mode. The planar coding mode may be signaled using in a planar mode flag to signal that a volume is planar. A planar volume has all of its occupied child nodes on one side of a plane bisecting the volume. A planar position flag may signal which side of the volume is occupied. Planarity may be determined and signaled with respect to a horizontal plane, vertical plane, or otherwise. Occupancy bits may be inferred as a result of planar coding mode signaling.
A method at a computing device, the method including obtaining sensor data for a vehicle providing one or both of displacement or acceleration information for the vehicle; calculating a vibration frequency for the vehicle; retrieving calibration data for the vehicle, the calibration data comprising at least a first known mass; a second known mass; a vibration frequency for the vehicle at the first known mass; and a vibration frequency of the vehicle at a second known mass; and using the calibration data and the vibration frequency for the vehicle, calculating a load estimation for the vehicle.
G01G 19/03 - Weighing apparatus or methods adapted for special purposes not provided for in groups for weighing wheeled or rolling bodies, e.g. vehicles for weighing during motion
38.
METHOD AND SYSTEM FOR VEHICLE LOCATION TRACKING USING V2X COMMUNICATION
A method at a network element within a Vehicle to Everything (V2X) Communications Domain, the method including receiving a tracking request at the network element for a target vehicle, the tracking request including identifying information for the target vehicle; creating a target vehicle list based on the tracking request; distributing the target vehicle list to at least one V2X endpoint; receiving at least one sighting report from the at least one V2X endpoint; and forwarding the at least one sighting report to a second network element.
H04W 4/029 - Location-based management or tracking services
H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
H04W 4/06 - Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]Services to user groupsOne-way selective calling services
H04W 12/00 - Security arrangementsAuthenticationProtecting privacy or anonymity
In some examples, a wireless device receives, from a wireless access network node, an indication of a supported extended emergency information (EEI) type supported by a wireless local area network (WLAN). The supported EEI type is selected from among a plurality of different EEI types. The wireless device sends a message relating to an emergency call, the message including EEI data according to the supported EEI type.
Aspects of the subject disclosure may include, for example, a method in which a selection is made for a first major constituent, a second major constituent and a minor constituent for forming a desired material. The method can include mixing the first major constituent, the second major constituent and the minor constituent in a single mixing step to provide a mixture of constituents. The method can include drying the mixture of constituents to provide a dried mixture of constituents and calcining the dried mixture of constituents to provide a calcinated mixture of constituents. The method can include processing the calcinated mixture of constituents (by a process including vacuum annealing and hot-pressing) to provide a sputtering target. Other embodiments are disclosed.
Methods of encoding and decoding data in which some data symbols are entropy coded and some data symbols are bypass coded. The encoder separates the coded symbols into an entropy coded stream and a bypass coded stream. The streams are packaged in a data unit that has a payload structured to contain one of the streams in forward order and the other stream in reverse order, with the reverse order stream aligned with the end of the data unit. In this manner, at the decoder, the decoder may begin decoding the forward order stream from its beginning and may also begin decoding the reverse order stream from its beginning at the end of the data unit by extracting symbols in reverse order. The data unit does not need to signal the length of the streams. The decoder determines the length of the data unit from explicit or implicit signaling.
A method of managing access to protected file content is disclosed. The method includes: receiving a request to open a first file stored on the computing device; determining that the first file is a protected file; in response to determining that the first file is a protected file: identifying a first application that is suitable for opening the first file; determining that the first application is an unsecured application; and in response to determining that the first application is an unsecured application, locking the first application to prevent unauthorized access of application data of the first application in a locked state.
Methods and devices for attribute coding for point clouds. In atop-down coding process a predicted geometry-weighted sum of attributes is determined for each occupied sub-volume of a volume based on a prediction operation that uses at least a geometry-weighted sum of attributes for the volume. The prediction operation involves up-sampling data from the preceding (parent) depth of the coding tree. The predicted geometry-weighted sums of attributes and corresponding original geometry-weighted sums of attributes are subtracted, in the attribute domain or in a transform domain to result in residual coefficients. The AC residual coefficients are coded in the bitstream. The transform used has a DC coefficient property, whereby the DC coefficient from transform of the geometry-weighted sums of attributes for the set of child sub-volumes is the geometry-weighted sum of attributes for the volume.
A method at a sensor apparatus affixed to a transportation asset, the method including detecting a trigger at the sensor apparatus; taking a threshold number of samples of a displacement-related value of the transportation asset over time; determining that a variance of the threshold number of samples exceeds a threshold; analyzing a frequency property based on the threshold number of samples; and based on the frequency property, determining whether the transportation asset is loaded or unloaded.
G01D 1/00 - Measuring arrangements giving results other than momentary value of variable, of general application
G01B 21/32 - Measuring arrangements or details thereof, where the measuring technique is not covered by the other groups of this subclass, unspecified or not relevant for measuring the deformation in a solid
G01P 15/00 - Measuring accelerationMeasuring decelerationMeasuring shock, i.e. sudden change of acceleration
G06Q 10/08 - Logistics, e.g. warehousing, loading or distributionInventory or stock management
A method at an electronic device, the method including initiating authentication with a network through a network element; providing a configuration request, the configuration request including an attribute set for the electronic device; and receiving a configuration response, the configuration response including a certificate or credential for future authentication with the network.
A method at a computing device for document rights management, the method comprising: receiving, at the computing device, a document; encrypting the document using a content key; creating a header, the header including a document identifier and an identifier for the computing device; persisting permissions for the document at the computing device; and returning a stream comprised the encrypted document and the header.
Described are methods and systems to identify unauthorized attempts to access an account in a computer system, the account having an authorized user. The methods and systems include determining that a count of failed attempts to access the account exceeds a maximum. Based on the count exceeding the maximum, one or more peer contacts associated with the authorized user are retrieved from stored user data. A failure attribution request is transmitted to the one or more peer contacts and a response is received from at least one of the one or more peer contacts. If the response denies that the authorized user caused the failed attempts, then a security action is taken with respect to the account. The method may include first confirming that the number of failure attributions requests sent has not exceeded an abuse threshold to prevent denial-of-service attacks.
In some examples, a device aggregates data frames into an aggregated data frame for communication in an Outside the Context of a Basic Service Set (OCB) mode.
In some examples, a first wireless device sends, to a second wireless device, a control indication that controls transmission of group-addressed data between the first wireless device and the second wireless device over a wireless local area network (WLAN).
A method at a computing device in a public ledger cryptography system, the method including creating a purpose string, the purpose string defining transaction parameters for an account within the public ledger cryptography system; using the purpose string to create a private key and associated public key for an account within the public ledger cryptography system; and providing the purpose string for use in verification of a transaction from the account within the public ledger cryptography system.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
Described herein is a system and method in a user equipment (UE) supporting registration using third generation partnership project (3GPP) access and using non-3GPP access, the method comprising storing, in a memory of the UE, first emergency information received using first registration procedures; receiving, by the UE, a REGISTRATION ACCEPT message using second registration procedures via non-3GPP access; and keeping, in the memory, the first emergency information after receiving the REGISTRATION ACCEPT message.
Systems, methods, and software can be used to analyze security risks of a set of binary software code. In some aspects, a computer-implemented method comprises: scanning, by at least one hardware processor, a set of binary software code to identify one or more network addresses accessed by the set of binary software code; for each of the one or more network addresses: determining, by the at least one hardware processor, security level information of the network addresses; and generating, by the at least one hardware processor, a security notification based on the determined security level information for the one or more network addresses, wherein the security notification indicates a security risk of the set of binary software code.
Systems, methods, and software can be used to detect security risks in binary software code. In some aspects, a computer-implemented method comprises: receiving, at an electronic device, a set of binary software code to be loaded onto the electronic device; disassembling, by the electronic device, the set of binary software code into a set of assembly code; determining, by the electronic device, a number of occurrences of an assembly instruction in the set of assembly code; and determining, by the electronic device, whether the set of binary software code has a security risk based on the number of occurrences of the assembly instruction.
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
54.
METHODS AND DEVICES FOR BINARY ENTROPY CODING OF POINT CLOUDS
Methods and devices for encoding or decoding a point cloud. A bit sequence signalling an occupancy pattern for sub-volumes of a volume is coded using entropy coding. For a current sub-volume, probabilities of respective entropy coders for entropy coding the occupancy pattern may be selected based on occupancy data for a plurality of neighbouring sub-volumes of the current sub-volume and on occupancy data for subdivisions of the neighbouring sub-volumes.
Methods and devices for encoding a point cloud. More than one frame of reference is identified and a transform defines the relative motion of a second frame of reference to a first frame of reference. The space is segmented into regions and each region is associated with one of the frames of reference. Local motion vectors within a region are expressed relative to the frame of reference associated with that region. Occupancy of the bitstream is entropy encoded based on predictions determined using the location motion vectors and the transform associated with the attached frame of reference.
Methods and systems for encoding and decoding data, such as point cloud data. The methods may include using a coder map to map a range of discrete dependency states to a smaller set of binary coders each having an associated coding probability. The selection of one of the discrete dependency states may be based on a contextual or situational factors, which may include a prediction process, for a particular symbol, such as an occupancy bit. The coder map is updated after each symbol is coded to possibly alter to which binary coder the selected discrete dependency state maps.
Methods and devices for encoding a point cloud. A bit sequence signalling an occupancy pattern for sub- volumes of a volume is coded using binary entropy coding. For a given bit in the bit sequence, a context may be based on a sub- volume neighbour configuration for the sub-volume corresponding to that bit. The sub-volume neighbour configuration depends on an occupancy pattern of a group of sub-volumes of neighbouring volumes to the volume, the group of sub-volumes neighbouring the sub-volume corresponding to the given bit. The context may be further based on a partial sequence of previously-coded bits of the bit sequence.
A method at a computing device within an Intelligent Transportation System (ITS), the method including: receiving a first message, the first message including at least tailoring information for a first ITS endpoint and intended journey details for the first ITS endpoint; storing all or a subset of data from the first message; obtaining a full certificate revocation list; creating a tailored certificate revocation list based on data in the first message and the full certificate revocation list, the tailored certificate revocation list containing certificates or identifiers of certificates for ITS endpoints that may be encountered by the first ITS endpoint when navigating a route provided in the intended journey details; and providing the tailored certificate revocation list to the first ITS endpoint.
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
G08G 1/00 - Traffic control systems for road vehicles
H04W 4/46 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for vehicle-to-vehicle communication [V2V]
A computer includes a memory and a processor programmed to execute instructions stored in the memory. The instructions include processing a binary file to determine a security risk associated with the binary file. Processing the binary file includes determining a characteristic from metadata of the binary file. The security risk associated with the binary file is based at least in part on the characteristic of the binary file.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
A computer includes a memory and a processor programmed to execute instructions stored in the memory. The instructions include filtering dependency code from a binary file to separate the dependency code from custom code in the binary file. The instructions further include evaluating the custom code in the binary file for a security risk.
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
A source wireless device sends an indication of support for one or more broadcast services that broadcasts information over a wireless local area network (WLAN).
H04W 4/06 - Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]Services to user groupsOne-way selective calling services
H04W 48/08 - Access restriction or access information delivery, e.g. discovery data delivery
In some examples, a vehicle-to-everything (V2X) endpoint receives V2X service control information that indicates whether the V2X endpoint is allowed to use one or more V2X services. The V2X endpoint sends, to a network, the V2X service control information when attempting to access a V2X service or a group of V2X services, and receives, from the network in response to the sending of the V2X service control information, V2X authorization information relating to accessing one or more V2X services.
H04L 12/18 - Arrangements for providing special services to substations for broadcast or conference
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04W 4/06 - Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]Services to user groupsOne-way selective calling services
H04W 4/46 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for vehicle-to-vehicle communication [V2V]
Methods and devices for encoding a point cloud, where occupancy data for child sub-volumes is context-adaptively encoded based on contexts selected, at least in part, using an occupancy score determined for each child sub-volume. The occupancy score for each child sub-volume of a parent sub-volume is determined based on the occupancy status of a plurality of neighbouring sub-volumes neighbouring the parent sub-volume and a respective weight assigned to each of the neighbouring sub-volumes vis-à-vis that child sub-volume, and wherein the respective weight reflects a strength of correlation between occupancy of that neighbouring sub-volume and occupancy of that child sub-volume.
Methods and devices for lossy encoding of point clouds. Rate-distortion optimization is used in coding an occupancy pattern for a sub-volume to determine whether to invert any of the bits of the occupancy pattern. The assessment may be a greedy evaluation of whether to invert bits in the coding order. Inverting a bit of the occupancy pattern amounts to adding or removing a point from the point cloud. A distortion metric may measure distance between the point added or removed and its nearest neighbouring point.
Methods and devices for encoding a point cloud. A predictor-copy coding mode is described in which an encoder copies the predicted points for a sub-volume rather than encoding the occupancy data for the original points in the sub-volume. A predictor-copy coding mode flag is coded in the bitstream to signal to the decoder whether predictor-copy coding mode is active or inactive. The predictor-copy coding mode flag may only be coded for sub-volumes that are eligible to use the mode. Eligibility may be based on depth within the coding tree and/or size of the sub-volume. Predictor-copy coding mode has the result of early termination of a branch of the coding tree. Instead of decoding the occupancy for the remainder of the branch, a decoder copies the predicted points that are positioned within the sub-volume as the reconstructed points of the point cloud for that sub-volume.
A verification server comprising a memory and a processor programmed to execute instructions stored in the memory. The instructions include receiving a link registration request including a third-party link to a third-party server, validating the third-party server as a result of receiving the link registration request, generating a unique code as a result of validating the third-party server, and generating a custom link that includes the unique code.
In some examples, a device detects a calling identifier received as part of initiating a call matches an emergency identifier, the emergency identifier associated with information from which to derive a Uniform Resource Name (URN). The device detects that the device is in a first network different from a second network, where the second network configured the emergency identifier. In response to detecting that the device is in the first network different from the second network, the device includes a URN, urn:service:sos, in a Session Initiation Protocol (SIP) INVITE message to be transmitted.
In some examples, a wireless device includes a communication interface to communicate with a wireless network, and at least one processor configured to, while the wireless device is in a pre-associated state, receive, from the wireless network, information including a network address policy of the wireless network. The at least one processor is configured to further, in response to the information including the network address policy, use an address of the wireless device according to the network address policy.
In some examples, an electronic device receives configuration information relating to network connectivity with a network of a vehicle, the configuration information including a credential. The electronic device establishes, using the configuration information, a connection with the network of the vehicle to access a service, and revokes the credential in response to a termination of the access of the service.
A method at a user equipment, the method including receiving at the user equipment over a first technology, an emergency notification, the emergency notification providing information for a second technology capable of carrying an emergency message; and activating the second technology using the information for the second technology to receive the emergency message.
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
H04B 1/3805 - Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving with built-in auxiliary receivers
H04H 20/59 - Arrangements specially adapted for specific applications, e.g. for traffic information or for mobile receivers for emergency or urgency
H04L 12/18 - Arrangements for providing special services to substations for broadcast or conference
H04W 48/08 - Access restriction or access information delivery, e.g. discovery data delivery
H04W 88/06 - Terminal devices adapted for operation in multiple networks, e.g. multi-mode terminals
H04L 27/10 - Frequency-modulated carrier systems, i.e. using frequency-shift keying
A method comprising transmitting, by a user equipment (UE) to a network node, a registration message comprising at least one of a first indicator configured to indicate emergency call information display capability, a second indicator configured to indicate language information, or a third indicator configured to indicate a status of previously received emergency information, and receiving, by the user equipment from the network node, a registration accept message.
A method for misbehaviour warnings in an intelligent transportation system (ITS) including determining at a network server that an ITS station is misbehaving. In response to determining that the ITS station is misbehaving, the network server transmits a misbehaviour warning message to the ITS station indicating that the ITS station is misbehaving. In response to transmitting the misbehaviour warning message and determining that the ITS station is continuing to misbehave, the network server includes information of the ITS station in a certificate revocation list (CRL) and transmits the CRL.
An electronic device includes a storage to store a plurality of profiles relating to respective different operation modes of the electronic device, the plurality of profiles specifying different power consumption modes. At least one processor is configured to determine a given use case of the electronic device, and select a power consumption mode of the electronic device using a given profile selected from among the plurality of profiles based on a given operation mode.
In some examples, a vehicle includes a plurality of network controllers, a WI-FI wireless local area network (WLAN) over which at least a first network controller and a second network controller of the plurality of network controllers are to communicate, wherein a link between the first network controller and the second network controller through the WI-FI WLAN is a synchronized link.
Systems, methods, and software can be used to provide secure sensor data. In some aspects, a computer-implemented method includes: receiving, at a sensor security evaluation application executing on a device, sensor data from a sensor on the device; determining, by the sensor security evaluation application, a security confidence score associated with the sensor data; and transmitting, from the sensor security evaluation application, the security confidence score and the sensor data to a smart machine processor on the device.
H04W 12/00 - Security arrangementsAuthenticationProtecting privacy or anonymity
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
G06F 21/85 - Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
G05D 1/00 - Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots
In some examples, a wireless device selects a selected rate bucket of a plurality of different rate buckets, a rate bucket of the plurality of different rate buckets comprising a plurality of coding rates.
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
78.
METHOD AND SYSTEM FOR HYBRID COLLECTIVE PERCEPTION AND MAP CROWDSOURCING
A method at a network element for collective perception in an intelligent transportation system, the method including receiving, from each of a plurality of intelligent transportation system stations, a local dynamic map; creating, based on the local dynamic map from each of the plurality of intelligent transportation system stations, a local collective perception map; and distributing the local collective perception map to at least one of the plurality of intelligent transportation system stations.
Methods and devices for coding and communicating geographical position. The sending device quantizes the geographical coordinate system and sends its position as the delta or remainder after quantization. The receiving device determines its own quantized position and disambiguates between possible quantized coordinate positions of the sending device to identify the sending device's actual quantized coordinate position. From this, the receiving device determines the position of the sending device using the identified actual quantized coordinate position and the delta position data sent by the sending device. The receiving device may then trigger an action based on the determined position of the sending device.
G08G 1/0967 - Systems involving transmission of highway information, e.g. weather, speed limits
H04W 4/02 - Services making use of location information
H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
G01S 19/05 - Cooperating elementsInteraction or communication between different cooperating elements or between cooperating elements and receivers providing aiding data
H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
G01S 5/00 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations
80.
METHODS AND DEVICES FOR PREDICTIVE CODING OF POINT CLOUDS
Methods and devices for encoding a point cloud. A bit sequence signaling an occupancy pattern for sub-volumes of a volume is coded. Predictive coding is used to find a set of predicted points, from which a corresponding predicted occupancy pattern may be determined. The search for and selection of a coding mode for generating the set of predicted points may include a geometric distortion metric for evaluating how closely the geometry of the predicted set of points aligns with the geometry of the set of points to be coded. The geometric distortion metric may include a sum of absolute value distance between each point and its nearest predicted point. The metric may sum a logarithm of the distances to match more closely with coding rate cost.
Methods and devices for encoding a point cloud. A bit sequence signaling an occupancy pattern for sub-volumes of a volume is coded. Predictive coding is used to find a set of predicted points, from which a corresponding predicted occupancy pattern may be determined. The predicted occupancy pattern may be used to determine the contexts for entropy coding the occupancy pattern. The determination may include determining for each sub-volume, whether it contains a predicted point or not and, in some cases, the count of predicted points within the sub-volume. Various threshold numbers of predicted points may cause the selection of different context sets for coding the occupancy pattern. The predictive coding may be enabled by determining that the prediction of occupancy of a parent volume to the volume met a threshold level of accuracy.
A method at a network element for processing a first message destined for an intelligent transportation system station, the method including receiving from a sending entity, or generating, the first message at the network element; based on a source or contents of the first message, performing one of: discarding the first message; or modifying the first message to provide an indication to the intelligent transportation system station of checks the intelligent transportation system does not need to perform, thereby creating a second message; and forwarding the second message to the intelligent transportation system station.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
83.
METHODS AND DEVICES FOR BINARY ENTROPY CODING OF POINT CLOUDS
Methods and devices for encoding a point cloud. A bit sequence signaling an occupancy pattern for sub-volumes of a volume is coded using binary entropy coding. Contexts may be based on neighbour configuration and a partial sequence of previously-coded bits of the bit sequence. A determination is made as to whether to apply a context reduction operation and, if so, the operation reduces the number of available contexts. Example context reduction operations include reducing neighbour configurations based on shielding by sub-volumes associated with previously-coded bits, special handling for empty neighbour configurations, and statistics-based context consolidation.
A method at a sensor apparatus, the method including calculating a value for a target function based on at least one sensor of the sensor apparatus; determining that the value of the target function is within a defined threshold range for a defined time period, thereby finding an in-flight state for the sensor apparatus; and turning off transmission from a radio of the sensor apparatus based on the in-flight state.
H04Q 9/00 - Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom
G06Q 10/08 - Logistics, e.g. warehousing, loading or distributionInventory or stock management
Described herein are systems and methods to increase battery life of a user equipment (UE) by reducing the amount of time a UE spends in active time listening for paging messages following mobile originate (MO) or mobile terminated (MT) data transfers. A network node may receive, from a UE, a message including an identifier of the UE and a request to set the duration of an active time timer to zero. The network node may determine whether any MT traffic is available for the UE, and send a message to the UE including the duration of the active time timer or some other indicator to indicate to the UE whether or not MT data is awaiting transmission.
A method for steering of roaming (SOR) in wireless communication networks includes sending by a mobile equipment (ME) a registration message to a visited public land mobile network (VPLMN). The ME receives a first message from a home public land mobile network (HPLMN) through the VPLMN. The ME determines that the first message has failed a security check. In response to determining that the first message has failed the security check, the ME sends a second message to the VPLMN, the second message including an indication that the first message has failed the security check.
A method for sensor provisioning in a wireless sensor network includes determining, at a gateway, that no neighboring gateway is present; in response to no neighboring gateway present, measuring signal strengths from a plurality of sensors; based on the measured signal strengths, identifying a sensor from the plurality of sensors to be paired with the gateway; and in response to identifying the sensor, pairing the gateway and the sensor to enable a secured connection between the gateway and the sensor.
A method at a portable sensor apparatus for detecting an approaching vehicle, the method including detecting, using at least one detector at the sensor apparatus, signal energy of a signal from the approaching vehicle; analyzing the signal energy using a processor at the sensor apparatus to determine that an alarm should be triggered; and based on the analyzing, causing the alarm from an alert mechanism on the sensor apparatus.
Methods and devices for encoding a point cloud. A current node associated with a sub-volume is split into further sub-volumes, each further sub-volume corresponding to a child node of the current node, and, at the encoder, an occupancy pattern is determined for the current node based on occupancy status of the child nodes. A probability distribution is selected from among a plurality of probability distributions based on occupancy data for a plurality of nodes neighbouring the current node. The encoder entropy encodes the occupancy pattern based on the selected probability distribution to produce encoded data for the bitstream and updates the selected probability distribution. The decoder makes the same selection based on occupancy data for neighbouring nodes and entropy decodes the bitstream to reconstruct the occupancy pattern.
Methods and devices for coding point clouds using direct coding mode to code coordinates of a point within a sub-volume associated with a current node instead of a pattern of occupancy for child nodes. Eligibility for use of direct coding is based on occupancy data from another node. If eligible, then a flag is represented in the bitstream to signal whether direct coding is applied to points in the sub-volume or not.
A computer includes a memory and a processor programmed to execute instructions stored in the memory. The instructions include identifying a function in a binary file, assigning one of a plurality of classifications to the function, and determining that the function requires stack cookie protection based at least in part on the classification assigned to the function.
G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
92.
METHODS AND SYSTEMS FOR PROVISIONING EMERGENCY NUMBERS
There is provided a method and device for provisioning emergency number information on a user equipment. When a dialed number matches an emergency number from the provisioned emergency number information, the user equipment selects either the circuit switched domain or the packet switched domain and executes a call setup procedure for that domain.
A method of applying information on the display of the electronic device includes displaying content elements associated with an application running on the electronic device on a display of the electronic device, receiving a selection of a content element associated with the application running on the electronic device, determining an identity profile having an associated key, encrypting information associated with the selected content element utilizing the key associated with the determined identity profile to generate encrypted information, displaying the encrypted information in the selected content element.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06F 3/0488 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
A method for selecting a Public Land Mobile Network (PLMN) at a user equipment (UE), comprising receiving, from a network entity, a list of PLMN identifiers, attempting to register the UE with a network using at least one PLMN identifier from the list of PLMN identifiers, and if the attempt to register with the network is successful, performing a Session Initiation Protocol (SIP) registration to an Internet Protocol (IP) Multimedia Sub-system (IMS) associated to the PLMN identifier.
A method for analyzing a partial software program includes receiving a first software program. The first software program is designed to execute using a second software program. A first symbolic value indicates a characteristic of the second software program. The first software program is analyzed using a static program analysis, where the static program analysis generates a second symbolic value based on the first symbolic value. The second symbolic value indicates a characteristic of the first software program. The first software program is analyzed independent of an availability of the second software program. In response to determining that the second symbolic value is associated with a predetermined characteristic and that the first software program would perform an action associated with the second symbolic value if the first software program was executed using the second software program, a warning signal is generated.
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
G06F 11/36 - Prevention of errors by analysis, debugging or testing of software
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
96.
IDENTIFYING FUNCTIONS PRONE TO LOGIC ERRORS IN BINARY SOFTWARE COMPONENTS
Systems, methods, and software can be used to identify functions prone to logic errors in software components using binary static analysis. In some aspects, one computer-implemented method includes identifying a function defined within a binary software component; determining one or more complexity characteristics of the function based on included instructions; determining, based on the complexity characteristics, whether the function is likely to produce errors when the instructions included in the function are executed by a processor; and in response to determining that the function is likely to contain errors, generating an indication that the function requires further review.
Systems, methods, and software can be used to analyzing binary software components utilizing multiple instruction sets. In some aspects, one computer- implemented method includes identifying a program section in a binary software component; performing a first disassembly process according to a first instruction set on the program section to produce a first disassembly result; performing a second disassembly process according to a second instruction set different from the first instruction set on the program section to produce a second disassembly result; comparing the first disassembly result to the second disassembly result; and determining a utilized instruction set associated with the program section based at least in part on comparing the first disassembly result to the second disassembly result, wherein the utilized instruction set is either the first instruction set or the second instruction set.
A method for evaluating contextual risk profiles at a computing device (110, 212, 312) in a vehicle (310), the method including obtaining information about a proximate vehicle (320, 330); utilizing the information to create a risk profile for the proximate vehicle (320, 330); and based on the risk profile, initiating an action at computing device (110, 212, 312).
Systems, methods, and software can be used to detect remote application profiling. In some aspects, one computer-implemented method includes receiving, over a network, a request from a network client directed to a particular application executed by an application server; determining whether the recei ved request deviates from a communications profile associated with the particular application; in response to determining that the received request deviates from the communications profile, identifying the network client as an attacker; and in response to identifying the network client as an attacker, performing a defensive response with respect to the network client.
In some examples, a system receives, over a network, position data acquired by a position sensor of a device, and sensor data acquired by a further sensor of the device while the position sensor of the device is inactive, the sensor data from the further sensor indicating a direction of travel of the device. The system determines, using the sensor data acquired by the further sensor of the device, a heading and movement of the device relative to a position indicated by the position data, and updates a position of the device according to the determined heading and movement.
G01C 21/12 - NavigationNavigational instruments not provided for in groups by using measurement of speed or acceleration executed aboard the object being navigatedDead reckoning
H04W 4/02 - Services making use of location information
H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
H04M 1/00 - Substation equipment, e.g. for use by subscribers