Abstract:
With the proliferation of wireless devices, seamless authentication of devices at distributed locations (e.g., so-called Wi-Fi hotspots) may be essential for convenient use of various devices at these locations. Previous methods for authentication relied on an account-based method using a username and a password inputted from a user. This method may be awkward for mass-distribution of devices. Various embodiments disclosed may provide an authorization client that communicates with one or more servers that relies on client software and message authentication codes for authorization of network access.
Abstract:
A method, system, and computer program product that enables persistent display of advertising and other service provider content during access via a gateway access system to third party content on a separate network. A connection is enabled between a personal computing device (PCD) and the gateway access system. The gateway access system facilitates retrieval of a first content from the network to be displayed within a first window on the PCD. The gateway access system provides program code to the PCD that when executed enables persistent display of a second window on the PCD that does not overlap with the first window. A second content is transmitted for display within the second window on the PCD, where the second content is displayed within the persistent window on the PCD along with the display of the first content.
Abstract:
A predictive network is disclosed for operating in a runtime mode and in a training mode. The network includes a preprocessor (34') for preprocessing input data in accordance with parameters stored in a storage device (14') for output as preprocessed data to a delay device (36'). The delay device (36') provides a predetermined amount of delay as defined by predetermined delay settings in a storage device (18). The delayed data is input to a system model (26') which is operable in a training mode or a runtime mode. In the training mode, training data is stored in a data file (10) and retrieved therefrom for preprocessing and delay and then input to the system model (26'). Model parameters are learned and then stored in the storage device (22). During the training mode, the preprocess parameters are defined and stored in a storage device (14) in a particular sequence and delay settings are determined in the storage device (18). During the runtime mode, runtime data is derived from a distributed control system (24) and then preprocessed in accordance with predetermined process parameters and delayed in accordance with the predetermined delay settings. The preprocessed data is then input to the system model (26') to provide a predicted output, which is a control output to the distributed control system (24).
Abstract:
A neural network system is provided that models the system in a system model (12) with the output thereof providing a predicted output. This predicted output is modified or controlled by an output control (14). Input data is processed in a data preprocess step (10) to reconcile the data for input to the system model (12). Additionally, the error resulted from the reconciliation is input to an uncertainty model to predict the uncertainty in the predicted output. This is input to a decision processor (20) which is utilized to control the output control (14). The output control (14) is controlled to either vary the predicted output or to inhibit the predicted output whenever the output of the uncertainty model (18) exceeds a predetermined decision threshold, input by a decision threshold block (22). Additionally, a validity model (16) is also provided which represents the reliability or validity of the output as a function of the number of data points in a given data region during training of the system model (12). This predicts the confidence in the predicted output which is also input to the decision processor (20). The decision processor (20) therefore bases its decision on the predicted confidence and the predicted uncertainty. Additionally, the uncertainty output by the data preprocess block (10) can be utilized to train the system model (12).
Abstract:
In one or more embodiments, a system can simulate one or more physical mobile devices and can allow respective one or more users to utilize respective one or more simulations via a network. For example, a user, utilizing an application such as a web browser, can interact with a simulated mobile device. For instance, the user can select a function of the simulated mobile device, the simulated mobile device can provide, to the user, a simulation of the function, the first user can manipulate the simulated mobile device, and output of the function can be displayed to the user in accordance with the manipulation of the simulated mobile device. In one or more embodiments, the system can determine and display multiple images, of the simulated mobile, device based on multiple directions of a pointer path. For example, the system can determine the directions based on positions acquired at time intervals.
Abstract:
In one or more embodiments, a system can simulate one or more physical mobile devices and can allow respective one or more users to utilize respective one or more simulations via a network. For example, a user, utilizing an application such as a web browser, can interact with a simulated mobile device. For instance, the user can select a function of the simulated mobile device, the simulated mobile device can provide, to the user, a simulation of the function, the first user can manipulate the simulated mobile device, and output of the function can be displayed to the user in accordance with the manipulation of the simulated mobile device. In one or more embodiments, the system can determine and display multiple images, of the simulated mobile, device based on multiple directions of a pointer path. For example, the system can determine the directions based on positions acquired at time intervals.
Abstract:
In one or more embodiments, a system can emulate one or more physical mobile devices and can allow respective one or more users to utilize respective one or more emulations via a network. In one example, a first user, utilizing a first web browser, can interact with a first emulated mobile device. In another, a second user, utilizing a second web browser, can interact with a second emulated mobile device. In one or more embodiments, the first and second emulated mobile devices can respectively correspond to two different physical mobile devices, and the first and second users can concurrently interact with the first and second emulated mobile devices, respectively. In one or more embodiments, a user can upload a physical mobile device to an emulated mobile device, interact with the emulated device, and download changes made to the emulated mobile device to the physical mobile device.
Abstract:
A system and method for providing roaming access on a network are disclosed. The network includes a plurality of wireless and/or wired access points. A user may access the network by using client software on a client computer (e.g., a portable computing device) to initiate an access procedure. In response, a network management device operated by a network provider may return an activation response message to the client. The client may send the user's username and password to the network provider. The network provider may rely on a roaming partner, another network provider with whom the user subscribes for internet access, for authentication of the user. Industry-standard methods such as RADIUS, CHAP, or EAP may be used for authentication. The providers may exchange pricing and service information and account information for the authentication session. A customer may select a pricing and service option from a list of available options.
Abstract:
A system and method for providing roaming access on a network are disclosed. The network includes a plurality of wireless and/or wired access points. A user may access the network by using client software on a client computer (e.g., a portable computing device) to initiate an access procedure. In response, a network management device operated by a network provider may return an activation response message to the client. The client may send the user's username and password to the network provider. The network provider may rely on a roaming partner, another network provider with whom the user subscribes for internet access, for authentication of the user. Industry-standard methods such as RADIUS, CHAP, or EAP may be used for authentication. The providers may exchange pricing and service information and account information for the authentication session. A customer may select a pricing and service option from a list of available options.
Abstract:
Internet protocol (IP) data service providers may provide several services over a single communications channel and/or circuit. For example, the provider may deliver public services such as Wi-Fi, content, gaming, etc. as well as business-critical “back-office” services such as credit card processing, VoIP, streaming video, video conferencing, etc. Some applications can very demanding from a quality of service standpoint, whereas other applications are unwanted or unauthorized on the network such as worms, viruses, denial of service attacks and/or certain types of peer-to-peer file sharing applications. Applications sharing the communication channel may be classified into one or more application classifications. The available bandwidth over the communications channel and/or circuit may then be managed via a prioritization system that can be parameterized based on the available bandwidth and/or the desired application behavior for given characterized applications. Many of the above unwanted applications can be suppressed, after being classified.