Methods, systems, and apparatus, including computer programs encoded on computer storage media, for processing event log data. An example event log processing method includes receiving an event log comprising a plurality of event records describing events that have occurred on each of one or more computer systems over a period of time; converting the event log into a graph, comprising: normalizing the plurality of event records, including anonymizing a unique identifier value in each event record and replacing a variable value in each event record with a predetermined value; representing each normalized event record as one or more nodes in the graph; and generating a plurality of event clusters, wherein each event cluster includes an aggregated group of nodes and is generated based on common attributes of and hierarchical relationships between the normalized event records represented by the nodes in the aggregated group.
Systems, methods, and software can be used to determine security risks in binary software using a software relationship model. In some aspects, a method comprises: receiving a software relationship model that identifies: (i) a set of software components, and (ii) communication interfaces between software components in the set of software components; receiving a set of binary software code; generating a risk assessment for the set of binary software code based on the software relationship model; and generating a notification, based on the risk assessment for the set of binary software code, that indicates security risks associated with the set of binary software code.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
Methods and systems for fingerprinting a malicious behavior. In a first stage of training, a coarse machine learning one-class classifier is trained to detect a first dataset of events, the first dataset of events including a dataset of events representing a malicious behavior and a dataset of events representing non-malicious behavior and a benign machine learning one-class classifier is trained to detect a second dataset of events, the second dataset of events excluding the dataset of events representing malicious activity. An ensemble of models including the benign and coarse machine learning one-class classifiers is applied to the first dataset of events to create a third training set representing the malicious behavior for a second stage of training. A final machine learning one-class classifier is trained in the second stage of training using the third training set. The final machine learning one-class classifier represents a fingerprint of the malicious behavior.
A method at a computing device, the method including receiving, at the computing device, sensor data from a data source; converting, at a playback tool on the computing device, the sensor data into converted data, thereby bypassing abstraction layers at the computing device; and providing the converted data to at least one synthetic sensor on the computing device, wherein each of the at least one synthetic sensor provides an insight regarding operation of the computing device.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
The present disclosure provides, in an aspect, a computer-implemented method for modifying vehicle settings for a vehicle, the method comprising identifying a vehicle occupant having a personalized set of vehicle settings for the vehicle, identifying a condition modifier associated with the vehicle occupant and the personalized set of vehicle settings, and applying a vehicle setting from the set of vehicle settings based on the condition modifier.
B60R 16/037 - Circuits électriques ou circuits de fluides spécialement adaptés aux véhicules et non prévus ailleurs; Agencement des éléments des circuits électriques ou des circuits de fluides spécialement adapté aux véhicules et non prévu ailleurs électriques pour le confort des occupants
The present disclosure provides, in an aspect, a computer implemented method for monitoring a current use of a vehicle in real-time based on historical vehicle use, the method including acquiring, for a vehicle, historical vehicle data indicative of prior vehicle use; generating, using the historical vehicle data, a historical baseline characterizing a historical use of the vehicle; assessing a current use of the vehicle based on the historical baseline, and generating an alert based on the assessment.
A method at a network element for securely sharing services across domains, the method including receiving a request at the network element to add a first domain and an edge domain to a system; provisioning a public key of the network element to the first domain and the edge domain; receiving a public key of the first domain; populating, in the network element, a table with services provided by the first domain or the edge domain; populating, in the network element, a second table with applications installed at the first domain or edge domain and permissions for services for the applications; and controlling access to the services by the applications.
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04L 67/12 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p.ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance
8.
METHOD AND SYSTEM FOR INDIRECT SHARING OF SENSOR INSIGHTS
A method at a first domain for obtaining at least one insight from a second domain, the method including synchronizing a permissions table at the first domain with a master permissions table at a network element; receiving a request for an insight from an application at a bridge in the first domain; confirming an identity of the application; verifying, at the bridge, application permissions using the permissions table at the first domain, the verifying confirming that the application has permission to access the insight; sending a request message from the first domain to the second domain, the request message being signed by a private key of the first domain and requesting the insight; and receiving the insight from the second domain.
A method at a first domain for obtaining at least one insight from a second domain, the method including registering an application with an anchor in the first domain; providing, from the anchor to the application, a first message signed by the anchor; sending, from the first domain to a network domain, the signed message; receiving, from the network domain, at least one signed token, each of the at least one signed token being for a synthetic sensor on the second domain, where the synthetic sensor provides an insight; sending a request message to the second domain, the request message requesting the insight and including the at least one token; and receiving the insight from a synthetic sensor associated with the at least one token.
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
10.
HANDLING SECURITY EVENTS BASED ON REMEDIATION ACTIONS AND RECOVERY ACTIONS
Systems, methods, and software can be used to handle security events of a device based on remediation actions and recovery actions. In some aspects, a method comprises: receiving, by a security gateway, a security event notification associated with a device; determining, by the security gateway and based on the security event notification, a risk level of the device; determining, by the security gateway and based on the risk level, a set of remediation actions and recovery actions; and sending, by the security gateway, an action plan indicating the set of remediation actions and recovery actions.
A method at a computing device including obtaining a first container image from a host computing device; executing a second container image at the computing device, the executing comprising: starting a container from the first container image, the container being for a development environment on the computing device; and customizing the container for a local environment on the computing device, thereby creating a customized container; and compiling developed code within the customized container.
A method at a remote proxy on a first node, the method including receiving, at the remote proxy, a first message from a first module on the first node, the first message being directed to a second module on a second node; verifying the first message at the remote proxy utilizing operating system verification; determining, based on a manifest at the remote proxy, the second node; signing, using a private key for the first node, the first message; and sending the first message to the second node.
H04L 67/56 - Approvisionnement des services mandataires
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
13.
PRESERVING EMERGENCY CALL DURING FAILURE TO TRANSFER SUBSEQUENT TO REGISTRATION WITH THE TARGET NETWORK
A method in a user equipment (UE) for transferring an ongoing connection or ongoing session via a first network includes transmitting a first registration request message to a second network of a first public land mobile network (PLMN); transmitting a first connectivity request message to the second network, the first connectivity request message includes an indication that connectivity belongs to the ongoing connection or the ongoing session; receiving, in response to the first connectivity request message, a message comprising a cause code from the second network; transmitting, in response to receiving the message comprising the cause code, a second registration request message to a third network of a second PLMN, the first PLMN and the second PLMN are different; and transmitting a second connectivity request message to the third network, the second connectivity request message includes the indication that the connectivity belongs to the ongoing connection or the ongoing session.
A method at a network element for configuration for Internet of Things (IoT) devices using manufacturer usage description (MUD) files, the method including receiving at least one MUD Uniform Resource Locator (URL) from an IoT Device; sending, from the network element to at least one MUD Server based on the MUD URL, a Uniform Resource Indicator; responsive to the sending, receiving a plurality of MUD files from the MUD server; creating a plurality of policies from the plurality of MUD files, the plurality of policies corresponding to a normal mode of operation and a secondary mode of operation; and forwarding the plurality of policies to a gateway from the network element.
H04L 12/16 - Dispositions pour la fourniture de services particuliers aux abonnés
H04W 4/90 - Services pour gérer les situations d’urgence ou dangereuses, p.ex. systèmes d’alerte aux séismes et aux tsunamis
H04W 16/00 - Planification du réseau, p.ex. outils de planification de couverture ou de trafic; Déploiement de réseau, p.ex. répartition des ressources ou structures des cellules
15.
PRESERVING EMERGENCY CALL DURING FAILURE TO TRANSFER
A system and method in a user equipment (UE) for transferring an emergency session from a first network to a second network. The method includes transmitting a first registration request message to the second network; receiving a registration reject message from the second network; detecting the emergency session between the UE and the first network is ongoing; transmitting a second registration request message comprising an emergency registration request to the second network; and receiving a registration accept message for the emergency session.
H04W 76/18 - Gestion du rejet ou de l'échec de l'établissement
H04W 36/00 - Dispositions pour le transfert ou la resélection
H04W 60/04 - Rattachement à un réseau, p.ex. enregistrement; Suppression du rattachement à un réseau, p.ex. annulation de l'enregistrement utilisant des événements déclenchés
H04W 76/50 - Gestion de la connexion pour les connexions d'urgence
16.
METHOD AND SYSTEM FOR HANDLING DYNAMIC CYBERSECURITY POSTURE OF A V2X ENTITY
A method at a network element, the method including receiving at least one message at the network element, the at least one message being one or both of: an update status information message from an updates server; and an anomaly detection status information message from anomaly detection server; determining, based on the receiving the at least one message, a dynamic cybersecurity posture indication for an intelligent transportation system entity; and providing the dynamic cybersecurity posture indication for the intelligent transportation system entity to an Enrolment Authority, wherein the dynamic cybersecurity posture indication can be included in a certificate relating to the intelligent transportation system entity.
A method at an Intelligent Transportation System (ITS) Transmitting Entity, the method including: generating an ITS message; augmenting the ITS message with an Integrity Report generated by an integrity detection function at the ITS Transmitting Entity to create an augmented ITS message; signing the augmented ITS message with an Authorization Certificate or Ticket, the Authorization Certificate or Ticket including an assurance indication from an Audit Certificate Authority for the integrity detection function; and sending the signed, augmented ITS message to an ITS Receiving Entity.
H04W 12/106 - Intégrité des paquets ou des messages
H04W 4/44 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons pour la communication entre véhicules et infrastructures, p.ex. véhicule à nuage ou véhicule à domicile
18.
METHOD AND SYSTEM FOR ADDITION OF ASSURANCE INFORMATION TO V2X MESSAGING
A method at an Intelligent Transportation System (ITS) Entity, the method including receiving a message from a second ITS entity, the message containing a safety assurance indication, and performing an action at the ITS entity based on the safety assurance indication. Further, an ITS Entity comprising a processor; and a communications subsystem, wherein the ITS Entity is configured to: receive a message from a second ITS entity, the message containing a safety assurance indication, and perform an action at the ITS entity based on the safety assurance indication.
G08G 1/00 - Systèmes de commande du trafic pour véhicules routiers
G06F 19/00 - Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des applications spécifiques (spécialement adaptés à des fonctions spécifiques G06F 17/00;systèmes ou méthodes de traitement de données spécialement adaptés à des fins administratives, commerciales, financières, de gestion, de surveillance ou de prévision G06Q;informatique médicale G16H)
19.
METHOD AND DEVICE FOR AUTOMATED PROVISIONING OF DATA FROM MULTIPLE SENSORS WITHIN AN EMERGENCY SERVICES NETWORK
A method at a Supplementary Data Provider within an emergency services network, the method including receiving a message at the Supplementary Data Provider, the message including an identifier and incident data; responsive to receiving the message, creating a resource at the Supplementary Data Provider based on the incident data, the resource being associated with the identifier; receiving an access request from an Emergency Services Provider for Supplementary Data associated with the resource; and responsive to receiving the access request, providing a response with the Supplementary Data.
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
H04W 4/02 - Services utilisant des informations de localisation
H04W 4/80 - Services utilisant la communication de courte portée, p.ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
H04W 4/90 - Services pour gérer les situations d’urgence ou dangereuses, p.ex. systèmes d’alerte aux séismes et aux tsunamis
In some examples, a system detects an accident involving a first vehicle, and responsive to the detecting of the accident, collects event data relating to the accident from a second vehicle that is different from the first vehicle.
Methods and devices for coding point clouds using direct coding mode to code coordinates of a point within a sub-volume associated with a current node instead of a pattern of occupancy for child nodes. When direct coding is applied to two or more points in the sub-volume, the points are ordered based on one of their respective coordinate values and pairwise coding of those coordinate values is carried out on a bit-by-bit basis. The pairwise coding includes coding whether the bits are the same and, if so, the bit value.
A method of encoding point cloud data using a planar coding mode is disclosed. The planar coding mode may be signaled using a planar mode flag to signal that a current volume is planar. A volume is planar if all of its occupied child nodes are on one side of a plane bisecting the volume. A planar position flag may signal which side of the volume is occupied. Volume data for already-coded occupied volumes of the point cloud is tracked using a data structure stored in memory. Entropy coding may be used to code the planar mode flag and/or the planar position flag. Context determination for coding may take into account a distance between the volume and a closest already-coded occupied volume among those tracked already-coded occupied volumes that have a same index in the data structure as the current volume.
A method at a vehicle computing device for identifying a driver, the method including receiving a first indicator at the vehicle computing device; obtaining, based on the first indicator, a presumed driver identity; receiving at least one second indicator at the vehicle computing device; and verifying the presumed driver identity using the at least one second indicator.
B60K 28/02 - Dispositifs de sécurité pour la commande des ensembles de propulsion spécialement adaptés aux véhicules ou aménagés dans ceux-ci, p.ex. empêchant l'alimentation en carburant ou l'allumage en cas de danger sensibles à des conditions relatives au conducteur
B60R 25/24 - Moyens pour enclencher ou arrêter le système antivol par des éléments d’identification électroniques comportant un code non mémorisé par l’utilisateur
B60R 25/30 - Détection relative au vol ou autres événements relatifs aux systèmes antivol
G06K 9/70 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques utilisant des comparaisons successives des signaux images avec plusieurs références, p.ex. mémoire adressable le choix de la référence suivante dépendant du résultat de la comparaison précédente
A method at an analytics module on a computing device, the analytics module being at a tier within a hierarchy of analytics modules and data sources, the method including receiving a first data set from a data source or a lower tier analytics module; analyzing the first data set to create a second data set; providing the second data set to at least one higher tier analytics module, the second data set being derived from the first data set; and providing at least one of an inference and an interdiction to the lower tier analytics module
G06F 16/90 - Recherche d’informations; Structures de bases de données à cet effet; Structures de systèmes de fichiers à cet effet - Détails des fonctions des bases de données indépendantes des types de données cherchés
B60W 40/00 - Calcul ou estimation des paramètres de fonctionnement pour les systèmes d'aide à la conduite de véhicules routiers qui ne sont pas liés à la commande d'un sous-ensemble particulier
25.
ANGULAR PRIOR AND DIRECT CODING MODE FOR TREE REPRESENTATION CODING OF A POINT CLOUD
A method of encoding or decoding a point cloud for representing a three-dimensional location of an object, the point cloud being generated by a device comprising a plurality of beam emitters. The method comprises using information from the beam emitter such as the location and angle of each beam emitter to more efficiently represent the point cloud data.
A method implemented by a network node is disclosed. The method includes: obtaining registration state information associated with a user equipment (UE) from a first core network node, the registration state information indicating at least one of fourth-generation (4G) UE single radio voice call continuity (SRVCC) capability or fifth-generation (5G) UE SRVCC capability for the UE, wherein the UE is registered with a first IMS network that includes the network node using a session initiation protocol (SIP) via an access network supported by a second core network; and providing, to a second IMS network node, an indication of a single UE SRVCC capability for the UE.
A method of encoding or decoding a point cloud to representing a three-dimensional location of an object, the point cloud being located within a volumetric space, the method including determining at least one closest, relative to azimuthal distance, encoded node to a current node; determining an azimuthal prediction angle for each of the at least one closest encoded node; finding an averaged azimuthal prediction angle from the determined azimuthal prediction angle for each of the at least one closest encoded node; selecting an angular azimuthal context based on the averaged azimuthal predication angle; encoding information representative of the current node based on the azimuthal context to generate the bitstream of compressed point cloud data or decoding information representative of the current node based on the azimuthal context to generate the point cloud data.
A method of encoding or decoding a point cloud for representing a three-dimensional location of an object, the point cloud being generated by a device comprising a plurality of beam emitters. The method comprises using information from the beam emitter such as the angle of each beam emitter, and the azimuthal distance between each point capture, to more efficiently represent the point cloud data.
H04N 19/96 - Codage au moyen d'une arborescence, p.ex. codage au moyen d'une arborescence quadratique
H04N 19/61 - Procédés ou dispositions pour le codage, le décodage, la compression ou la décompression de signaux vidéo numériques utilisant un codage par transformée combiné avec un codage prédictif
A method at a user equipment, the method including receiving a string of indicia identifying at the user equipment, the string further comprising an indicator bit; based on the indicator bit, performing one of: determining whether the user equipment supports one or more indicium of the string of indicia and skipping display of characters corresponding to non-supported indicia; or displaying all indicium within the string of indicia. In other embodiments, utilizing a language delineator to choose a string of indicia to display or providing a language delineator to a network element and using the complete string of indicia received from a network element based on the provided language delineator.
H04M 1/724 - Interfaces utilisateur spécialement adaptées aux téléphones sans fil ou mobiles
H04M 1/72403 - Interfaces utilisateur spécialement adaptées aux téléphones sans fil ou mobiles avec des moyens de soutien local des applications accroissant la fonctionnalité
30.
METHODS AND DEVICES FOR TREE SWITCHING IN POINT CLOUD COMPRESSION
Methods and devices for coding point cloud data using volume trees and predicted-point trees. In one embodiment of the disclosure, a method of encoding a point cloud data to generate a bitstream of compressed point cloud data representing a three-dimensional location of a physical object is provided, the point cloud data being located within a volumetric space. The method includes compressing a first part of the point cloud data represented by a first tree of a first type; determining for a given node of the first tree if an assignation to a second type of tree is enabled, said given node still being processed for the first tree; when the assignation is enabled, compressing a second part of the point cloud data represented by a second tree of the second type wherein, features associated with a root node of the second tree are at least partially obtained from the given node.
Method and devices for coding point cloud data using an angular coding mode. The angular coding mode may be signaled using an angular mode flag to signal that a volume is to be coded using the angular coding mode. The angular coding mode is applicable to planar volumes that have all of their occupied child nodes on one side of a plane bisecting the volume. A planar position flag may signal which side of the volume is occupied. Entropy coding may be used to code the planar position flag. Context determination for coding may take into account angular information for child nodes or groups of child nodes of the volume relative to a location of a beam assembly that has sampled the point cloud. Characteristics of the beam assembly may be coded into the bitstream.
H03M 7/30 - Compression; Expansion; Elimination de données inutiles, p.ex. réduction de redondance
G01S 7/48 - DÉTERMINATION DE LA DIRECTION PAR RADIO; RADIO-NAVIGATION; DÉTERMINATION DE LA DISTANCE OU DE LA VITESSE EN UTILISANT DES ONDES RADIO; LOCALISATION OU DÉTECTION DE LA PRÉSENCE EN UTILISANT LA RÉFLEXION OU LA RERADIATION D'ONDES RADIO; DISPOSITIONS ANALOGUES UTILISANT D'AUTRES ONDES - Détails des systèmes correspondant aux groupes , , de systèmes selon le groupe
32.
ANGULAR MODE SYNTAX FOR TREE-BASED POINT CLOUD CODING
Method and devices for coding point cloud data using an angular coding mode. The angular coding mode may be signaled using in an angular mode flag to signal that a volume is to be coded using the angular coding mode. The angular coding mode is applicable to planar volumes that have all of their occupied child nodes on one side of a plane bisecting the volume. A planar position flag may signal which side of the volume is occupied. Entropy coding may be used to code the planar position flag. Context determination for coding may take into account angular information for child nodes or groups of child nodes of the volume relative to a location of a beam assembly that has sampled to point cloud. Characteristics of the beam assembly may be coded into a dedicated syntax in the bitstream.
H03M 7/30 - Compression; Expansion; Elimination de données inutiles, p.ex. réduction de redondance
G01S 7/48 - DÉTERMINATION DE LA DIRECTION PAR RADIO; RADIO-NAVIGATION; DÉTERMINATION DE LA DISTANCE OU DE LA VITESSE EN UTILISANT DES ONDES RADIO; LOCALISATION OU DÉTECTION DE LA PRÉSENCE EN UTILISANT LA RÉFLEXION OU LA RERADIATION D'ONDES RADIO; DISPOSITIONS ANALOGUES UTILISANT D'AUTRES ONDES - Détails des systèmes correspondant aux groupes , , de systèmes selon le groupe
In some examples, a user equipment (UE) is registered with a fifth generation (5G) core network. In response to an emergency indication, the UE selects a first domain intended for a call responsive to the emergency indication. Subsequent to selecting the first domain, the UE attempts a combined registration with a second core network different from the 5G core network. In response to attempting the combined registration, the UE receives a further indication that the UE is registered for packet switched services but not circuit switched services. In response to the further indication, the UE selects an access network connected to a third core network to perform the call.
Method and devices for coding point cloud data using a planar coding mode. The planar coding mode may be signaled using in a planar mode flag to signal that a volume is planar. A planar volume has all of its occupied child nodes on one side of a plane bisecting the volume. A planar position flag may signal which side of the volume is occupied. Entropy coding may be used to code the planar mode flag and/or the planar position flag. Context determination for coding may take into account one or more of whether a parent volume containing the volume is planar in occupancy, occupancy of a neighbouring volume at a parent depth, distance between the volume and a closest already-coded occupied volume at a same depth as the volume, plane position, if any, of the closest already-coded occupied volume, and a position of the volume within the parent volume.
Method and devices for coding point cloud data using a planar coding mode. The planar coding mode may be signaled using in a planar mode flag to signal that a volume is planar. A planar volume has all of its occupied child nodes on one side of a plane bisecting the volume. A planar position flag may signal which side of the volume is occupied. Planarity may be determined and signaled with respect to a horizontal plane, vertical plane, or otherwise. Occupancy bits may be inferred as a result of planar coding mode signaling.
A method at a computing device, the method including obtaining sensor data for a vehicle providing one or both of displacement or acceleration information for the vehicle; calculating a vibration frequency for the vehicle; retrieving calibration data for the vehicle, the calibration data comprising at least a first known mass; a second known mass; a vibration frequency for the vehicle at the first known mass; and a vibration frequency of the vehicle at a second known mass; and using the calibration data and the vibration frequency for the vehicle, calculating a load estimation for the vehicle.
G01G 19/03 - Appareils ou méthodes de pesée adaptés à des fins particulières non prévues dans les groupes pour peser des objets à roues ou roulants, p.ex. des véhicules pour peser pendant le mouvement
37.
METHOD AND SYSTEM FOR VEHICLE LOCATION TRACKING USING V2X COMMUNICATION
A method at a network element within a Vehicle to Everything (V2X) Communications Domain, the method including receiving a tracking request at the network element for a target vehicle, the tracking request including identifying information for the target vehicle; creating a target vehicle list based on the tracking request; distributing the target vehicle list to at least one V2X endpoint; receiving at least one sighting report from the at least one V2X endpoint; and forwarding the at least one sighting report to a second network element.
H04W 4/029 - Services de gestion ou de suivi basés sur la localisation
H04W 4/40 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons
H04W 4/06 - Répartition sélective de services de diffusion, p.ex. service de diffusion/multidiffusion multimédia; Services à des groupes d’utilisateurs; Services d’appel sélectif unidirectionnel
H04W 12/00 - Dispositions de sécurité; Authentification; Protection de la confidentialité ou de l'anonymat
In some examples, a wireless device receives, from a wireless access network node, an indication of a supported extended emergency information (EEI) type supported by a wireless local area network (WLAN). The supported EEI type is selected from among a plurality of different EEI types. The wireless device sends a message relating to an emergency call, the message including EEI data according to the supported EEI type.
H04W 92/10 - Interfaces entre des dispositifs formant réseau hiérarchiquement différents entre un dispositif terminal et un point d'accès, c. à d. interface hertzienne sans fil
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04W 80/10 - Protocoles de couche supérieure adaptés à la gestion de sessions, p.ex. protocole d'initiation de session [SIP Session Initiation Protocol]
Aspects of the subject disclosure may include, for example, a method in which a selection is made for a first major constituent, a second major constituent and a minor constituent for forming a desired material. The method can include mixing the first major constituent, the second major constituent and the minor constituent in a single mixing step to provide a mixture of constituents. The method can include drying the mixture of constituents to provide a dried mixture of constituents and calcining the dried mixture of constituents to provide a calcinated mixture of constituents. The method can include processing the calcinated mixture of constituents (by a process including vacuum annealing and hot-pressing) to provide a sputtering target. Other embodiments are disclosed.
Methods of encoding and decoding data in which some data symbols are entropy coded and some data symbols are bypass coded. The encoder separates the coded symbols into an entropy coded stream and a bypass coded stream. The streams are packaged in a data unit that has a payload structured to contain one of the streams in forward order and the other stream in reverse order, with the reverse order stream aligned with the end of the data unit. In this manner, at the decoder, the decoder may begin decoding the forward order stream from its beginning and may also begin decoding the reverse order stream from its beginning at the end of the data unit by extracting symbols in reverse order. The data unit does not need to signal the length of the streams. The decoder determines the length of the data unit from explicit or implicit signaling.
H03M 7/40 - Conversion en, ou à partir de codes de longueur variable, p.ex. code Shannon-Fano, code Huffman, code Morse
H04N 19/13 - Codage entropique adaptatif, p.ex. codage adaptatif à longueur variable [CALV] ou codage arithmétique binaire adaptatif en fonction du contexte [CABAC]
A method of managing access to protected file content is disclosed. The method includes: receiving a request to open a first file stored on the computing device; determining that the first file is a protected file; in response to determining that the first file is a protected file: identifying a first application that is suitable for opening the first file; determining that the first application is an unsecured application; and in response to determining that the first application is an unsecured application, locking the first application to prevent unauthorized access of application data of the first application in a locked state.
Methods and devices for attribute coding for point clouds. In atop-down coding process a predicted geometry-weighted sum of attributes is determined for each occupied sub-volume of a volume based on a prediction operation that uses at least a geometry-weighted sum of attributes for the volume. The prediction operation involves up-sampling data from the preceding (parent) depth of the coding tree. The predicted geometry-weighted sums of attributes and corresponding original geometry-weighted sums of attributes are subtracted, in the attribute domain or in a transform domain to result in residual coefficients. The AC residual coefficients are coded in the bitstream. The transform used has a DC coefficient property, whereby the DC coefficient from transform of the geometry-weighted sums of attributes for the set of child sub-volumes is the geometry-weighted sum of attributes for the volume.
A method at a sensor apparatus affixed to a transportation asset, the method including detecting a trigger at the sensor apparatus; taking a threshold number of samples of a displacement-related value of the transportation asset over time; determining that a variance of the threshold number of samples exceeds a threshold; analyzing a frequency property based on the threshold number of samples; and based on the frequency property, determining whether the transportation asset is loaded or unloaded.
G01D 1/00 - Dispositions pour la mesure donnant des résultats autres que la valeur instantanée d'une variable, d'application générale
G01B 21/32 - Dispositions pour la mesure ou leurs détails, où la technique de mesure n'est pas couverte par les autres groupes de la présente sous-classe, est non spécifiée ou est non significative pour mesurer la déformation dans un solide
G01P 15/00 - Mesure de l'accélération; Mesure de la décélération; Mesure des chocs, c. à d. d'une variation brusque de l'accélération
G06Q 10/08 - Logistique, p.ex. entreposage, chargement ou distribution; Gestion d’inventaires ou de stocks
A method at an electronic device, the method including initiating authentication with a network through a network element; providing a configuration request, the configuration request including an attribute set for the electronic device; and receiving a configuration response, the configuration response including a certificate or credential for future authentication with the network.
A method at a computing device for document rights management, the method comprising: receiving, at the computing device, a document; encrypting the document using a content key; creating a header, the header including a document identifier and an identifier for the computing device; persisting permissions for the document at the computing device; and returning a stream comprised the encrypted document and the header.
Described are methods and systems to identify unauthorized attempts to access an account in a computer system, the account having an authorized user. The methods and systems include determining that a count of failed attempts to access the account exceeds a maximum. Based on the count exceeding the maximum, one or more peer contacts associated with the authorized user are retrieved from stored user data. A failure attribution request is transmitted to the one or more peer contacts and a response is received from at least one of the one or more peer contacts. If the response denies that the authorized user caused the failed attempts, then a security action is taken with respect to the account. The method may include first confirming that the number of failure attributions requests sent has not exceeded an abuse threshold to prevent denial-of-service attacks.
In some examples, a device aggregates data frames into an aggregated data frame for communication in an Outside the Context of a Basic Service Set (OCB) mode.
In some examples, a first wireless device sends, to a second wireless device, a control indication that controls transmission of group-addressed data between the first wireless device and the second wireless device over a wireless local area network (WLAN).
H04W 12/04 - Gestion des clés, p.ex. par architecture d’amorçage générique [GBA]
H04W 4/23 - Signalisation de services; Signalisation de données auxiliaires, c. à d. transmission de données par un canal non destiné au trafic pour publicité sur mobiles
Described herein is a system and method in a user equipment (UE) supporting registration using third generation partnership project (3GPP) access and using non-3GPP access, the method comprising storing, in a memory of the UE, first emergency information received using first registration procedures; receiving, by the UE, a REGISTRATION ACCEPT message using second registration procedures via non-3GPP access; and keeping, in the memory, the first emergency information after receiving the REGISTRATION ACCEPT message.
H04W 60/00 - Rattachement à un réseau, p.ex. enregistrement; Suppression du rattachement à un réseau, p.ex. annulation de l'enregistrement
H04W 8/18 - Traitement de données utilisateur ou abonné, p.ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateur; Transfert de données utilisateur ou abonné
H04W 76/50 - Gestion de la connexion pour les connexions d'urgence
50.
METHOD AND SYSTEM FOR SINGLE PURPOSE PUBLIC KEYS FOR PUBLIC LEDGERS
A method at a computing device in a public ledger cryptography system, the method including creating a purpose string, the purpose string defining transaction parameters for an account within the public ledger cryptography system; using the purpose string to create a private key and associated public key for an account within the public ledger cryptography system; and providing the purpose string for use in verification of a transaction from the account within the public ledger cryptography system.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
H04L 12/16 - Dispositions pour la fourniture de services particuliers aux abonnés
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
51.
DETERMINING SECURITY RISKS IN BINARY SOFTWARE CODE BASED ON EXTRACTED AND ACCESSED NETWORK ADDRESSES
Systems, methods, and software can be used to analyze security risks of a set of binary software code. In some aspects, a computer-implemented method comprises: scanning, by at least one hardware processor, a set of binary software code to identify one or more network addresses accessed by the set of binary software code; for each of the one or more network addresses: determining, by the at least one hardware processor, security level information of the network addresses; and generating, by the at least one hardware processor, a security notification based on the determined security level information for the one or more network addresses, wherein the security notification indicates a security risk of the set of binary software code.
Systems, methods, and software can be used to detect security risks in binary software code. In some aspects, a computer-implemented method comprises: receiving, at an electronic device, a set of binary software code to be loaded onto the electronic device; disassembling, by the electronic device, the set of binary software code into a set of assembly code; determining, by the electronic device, a number of occurrences of an assembly instruction in the set of assembly code; and determining, by the electronic device, whether the set of binary software code has a security risk based on the number of occurrences of the assembly instruction.
G06F 21/56 - Détection ou gestion de programmes malveillants, p.ex. dispositions anti-virus
G06F 21/51 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade du chargement de l’application, p.ex. en acceptant, en rejetant, en démarrant ou en inhibant un logiciel exécutable en fonction de l’intégrité ou de la fiabilité de la source
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
53.
METHODS AND DEVICES FOR BINARY ENTROPY CODING OF POINT CLOUDS
Methods and devices for encoding or decoding a point cloud. A bit sequence signalling an occupancy pattern for sub-volumes of a volume is coded using entropy coding. For a current sub-volume, probabilities of respective entropy coders for entropy coding the occupancy pattern may be selected based on occupancy data for a plurality of neighbouring sub-volumes of the current sub-volume and on occupancy data for subdivisions of the neighbouring sub-volumes.
Methods and devices for encoding a point cloud. More than one frame of reference is identified and a transform defines the relative motion of a second frame of reference to a first frame of reference. The space is segmented into regions and each region is associated with one of the frames of reference. Local motion vectors within a region are expressed relative to the frame of reference associated with that region. Occupancy of the bitstream is entropy encoded based on predictions determined using the location motion vectors and the transform associated with the attached frame of reference.
H03M 7/30 - Compression; Expansion; Elimination de données inutiles, p.ex. réduction de redondance
G06F 17/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
G06F 5/00 - Procédés ou dispositions pour la conversion de données, sans modification de l'ordre ou du contenu des données maniées
55.
METHODS AND DEVICES FOR ON-THE-FLY CODER MAPPING UPDATES IN POINT CLOUD CODING
Methods and systems for encoding and decoding data, such as point cloud data. The methods may include using a coder map to map a range of discrete dependency states to a smaller set of binary coders each having an associated coding probability. The selection of one of the discrete dependency states may be based on a contextual or situational factors, which may include a prediction process, for a particular symbol, such as an occupancy bit. The coder map is updated after each symbol is coded to possibly alter to which binary coder the selected discrete dependency state maps.
Methods and devices for encoding a point cloud. A bit sequence signalling an occupancy pattern for sub- volumes of a volume is coded using binary entropy coding. For a given bit in the bit sequence, a context may be based on a sub- volume neighbour configuration for the sub-volume corresponding to that bit. The sub-volume neighbour configuration depends on an occupancy pattern of a group of sub-volumes of neighbouring volumes to the volume, the group of sub-volumes neighbouring the sub-volume corresponding to the given bit. The context may be further based on a partial sequence of previously-coded bits of the bit sequence.
A method at a computing device within an Intelligent Transportation System (ITS), the method including: receiving a first message, the first message including at least tailoring information for a first ITS endpoint and intended journey details for the first ITS endpoint; storing all or a subset of data from the first message; obtaining a full certificate revocation list; creating a tailored certificate revocation list based on data in the first message and the full certificate revocation list, the tailored certificate revocation list containing certificates or identifiers of certificates for ITS endpoints that may be encountered by the first ITS endpoint when navigating a route provided in the intended journey details; and providing the tailored certificate revocation list to the first ITS endpoint.
H04W 4/44 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons pour la communication entre véhicules et infrastructures, p.ex. véhicule à nuage ou véhicule à domicile
G08G 1/00 - Systèmes de commande du trafic pour véhicules routiers
H04W 4/46 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons pour la communication de véhicule à véhicule
A computer includes a memory and a processor programmed to execute instructions stored in the memory. The instructions include processing a binary file to determine a security risk associated with the binary file. Processing the binary file includes determining a characteristic from metadata of the binary file. The security risk associated with the binary file is based at least in part on the characteristic of the binary file.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
A computer includes a memory and a processor programmed to execute instructions stored in the memory. The instructions include filtering dependency code from a binary file to separate the dependency code from custom code in the binary file. The instructions further include evaluating the custom code in the binary file for a security risk.
G06F 21/56 - Détection ou gestion de programmes malveillants, p.ex. dispositions anti-virus
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
A source wireless device sends an indication of support for one or more broadcast services that broadcasts information over a wireless local area network (WLAN).
H04W 4/06 - Répartition sélective de services de diffusion, p.ex. service de diffusion/multidiffusion multimédia; Services à des groupes d’utilisateurs; Services d’appel sélectif unidirectionnel
H04W 48/08 - Distribution d'informations relatives aux restrictions d'accès ou aux accès, p.ex. distribution de données d'exploration
In some examples, a vehicle-to-everything (V2X) endpoint receives V2X service control information that indicates whether the V2X endpoint is allowed to use one or more V2X services. The V2X endpoint sends, to a network, the V2X service control information when attempting to access a V2X service or a group of V2X services, and receives, from the network in response to the sending of the V2X service control information, V2X authorization information relating to accessing one or more V2X services.
H04L 12/18 - Dispositions pour la fourniture de services particuliers aux abonnés pour la diffusion ou les conférences
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04W 4/06 - Répartition sélective de services de diffusion, p.ex. service de diffusion/multidiffusion multimédia; Services à des groupes d’utilisateurs; Services d’appel sélectif unidirectionnel
H04W 4/46 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons pour la communication de véhicule à véhicule
Methods and devices for encoding a point cloud, where occupancy data for child sub-volumes is context-adaptively encoded based on contexts selected, at least in part, using an occupancy score determined for each child sub-volume. The occupancy score for each child sub-volume of a parent sub-volume is determined based on the occupancy status of a plurality of neighbouring sub-volumes neighbouring the parent sub-volume and a respective weight assigned to each of the neighbouring sub-volumes vis-à-vis that child sub-volume, and wherein the respective weight reflects a strength of correlation between occupancy of that neighbouring sub-volume and occupancy of that child sub-volume.
H03M 7/30 - Compression; Expansion; Elimination de données inutiles, p.ex. réduction de redondance
G06F 17/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
G06F 5/00 - Procédés ou dispositions pour la conversion de données, sans modification de l'ordre ou du contenu des données maniées
63.
METHODS AND DEVICES FOR LOSSY CODING OF POINT CLOUD OCCUPANCY
Methods and devices for lossy encoding of point clouds. Rate-distortion optimization is used in coding an occupancy pattern for a sub-volume to determine whether to invert any of the bits of the occupancy pattern. The assessment may be a greedy evaluation of whether to invert bits in the coding order. Inverting a bit of the occupancy pattern amounts to adding or removing a point from the point cloud. A distortion metric may measure distance between the point added or removed and its nearest neighbouring point.
H03M 7/30 - Compression; Expansion; Elimination de données inutiles, p.ex. réduction de redondance
G06F 17/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
G06F 5/00 - Procédés ou dispositions pour la conversion de données, sans modification de l'ordre ou du contenu des données maniées
64.
PREDICTOR-COPY CODING MODE FOR CODING OF POINT CLOUDS
Methods and devices for encoding a point cloud. A predictor-copy coding mode is described in which an encoder copies the predicted points for a sub-volume rather than encoding the occupancy data for the original points in the sub-volume. A predictor-copy coding mode flag is coded in the bitstream to signal to the decoder whether predictor-copy coding mode is active or inactive. The predictor-copy coding mode flag may only be coded for sub-volumes that are eligible to use the mode. Eligibility may be based on depth within the coding tree and/or size of the sub-volume. Predictor-copy coding mode has the result of early termination of a branch of the coding tree. Instead of decoding the occupancy for the remainder of the branch, a decoder copies the predicted points that are positioned within the sub-volume as the reconstructed points of the point cloud for that sub-volume.
H03M 7/30 - Compression; Expansion; Elimination de données inutiles, p.ex. réduction de redondance
G01S 7/48 - DÉTERMINATION DE LA DIRECTION PAR RADIO; RADIO-NAVIGATION; DÉTERMINATION DE LA DISTANCE OU DE LA VITESSE EN UTILISANT DES ONDES RADIO; LOCALISATION OU DÉTECTION DE LA PRÉSENCE EN UTILISANT LA RÉFLEXION OU LA RERADIATION D'ONDES RADIO; DISPOSITIONS ANALOGUES UTILISANT D'AUTRES ONDES - Détails des systèmes correspondant aux groupes , , de systèmes selon le groupe
A verification server comprising a memory and a processor programmed to execute instructions stored in the memory. The instructions include receiving a link registration request including a third-party link to a third-party server, validating the third-party server as a result of receiving the link registration request, generating a unique code as a result of validating the third-party server, and generating a custom link that includes the unique code.
In some examples, a device detects a calling identifier received as part of initiating a call matches an emergency identifier, the emergency identifier associated with information from which to derive a Uniform Resource Name (URN). The device detects that the device is in a first network different from a second network, where the second network configured the emergency identifier. In response to detecting that the device is in the first network different from the second network, the device includes a URN, urn:service:sos, in a Session Initiation Protocol (SIP) INVITE message to be transmitted.
H04W 4/90 - Services pour gérer les situations d’urgence ou dangereuses, p.ex. systèmes d’alerte aux séismes et aux tsunamis
H04W 8/18 - Traitement de données utilisateur ou abonné, p.ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateur; Transfert de données utilisateur ou abonné
H04W 8/26 - Adressage ou numérotation de réseau pour support de mobilité
67.
NETWORK ADDRESS POLICY INFORMATION RECEIVED IN A PRE-ASSOCIATED STATE
In some examples, a wireless device includes a communication interface to communicate with a wireless network, and at least one processor configured to, while the wireless device is in a pre-associated state, receive, from the wireless network, information including a network address policy of the wireless network. The at least one processor is configured to further, in response to the information including the network address policy, use an address of the wireless device according to the network address policy.
In some examples, an electronic device receives configuration information relating to network connectivity with a network of a vehicle, the configuration information including a credential. The electronic device establishes, using the configuration information, a connection with the network of the vehicle to access a service, and revokes the credential in response to a termination of the access of the service.
H04W 76/18 - Gestion du rejet ou de l'échec de l'établissement
H04W 8/18 - Traitement de données utilisateur ou abonné, p.ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateur; Transfert de données utilisateur ou abonné
69.
PUBLIC WARNING SYSTEM NOTIFICATIONS IN A MOBILE DEVICE USING ALTERNATIVE WIRELESS TECHNOLOGIES
A method at a user equipment, the method including receiving at the user equipment over a first technology, an emergency notification, the emergency notification providing information for a second technology capable of carrying an emergency message; and activating the second technology using the information for the second technology to receive the emergency message.
H04W 4/90 - Services pour gérer les situations d’urgence ou dangereuses, p.ex. systèmes d’alerte aux séismes et aux tsunamis
H04B 1/3805 - TRANSMISSION - Détails des systèmes de transmission non caractérisés par le milieu utilisé pour la transmission Émetteurs-récepteurs, c. à d. dispositifs dans lesquels l'émetteur et le récepteur forment un ensemble structural et dans lesquels au moins une partie est utilisée pour des fonctions d'émission et de réception avec des récepteurs auxiliaires intégrés
H04H 20/59 - Dispositions spécialement adaptées à des applications spécifiques, p.ex. aux informations sur le trafic ou aux récepteurs mobiles aux situations d'urgence ou de détresse
H04L 12/18 - Dispositions pour la fourniture de services particuliers aux abonnés pour la diffusion ou les conférences
H04W 48/08 - Distribution d'informations relatives aux restrictions d'accès ou aux accès, p.ex. distribution de données d'exploration
H04W 88/06 - Dispositifs terminaux adapté au fonctionnement dans des réseaux multiples, p.ex. terminaux multi-mode
H04L 27/10 - Systèmes à courant porteur à modulation de fréquence, p.ex. utilisant une manipulation à décalage de fréquence
G01S 17/02 - Systèmes utilisant la réflexion d'ondes électromagnétiques autres que les ondes radio
G01S 17/88 - Systèmes lidar, spécialement adaptés pour des applications spécifiques
G01S 7/48 - DÉTERMINATION DE LA DIRECTION PAR RADIO; RADIO-NAVIGATION; DÉTERMINATION DE LA DISTANCE OU DE LA VITESSE EN UTILISANT DES ONDES RADIO; LOCALISATION OU DÉTECTION DE LA PRÉSENCE EN UTILISANT LA RÉFLEXION OU LA RERADIATION D'ONDES RADIO; DISPOSITIONS ANALOGUES UTILISANT D'AUTRES ONDES - Détails des systèmes correspondant aux groupes , , de systèmes selon le groupe
A method comprising transmitting, by a user equipment (UE) to a network node, a registration message comprising at least one of a first indicator configured to indicate emergency call information display capability, a second indicator configured to indicate language information, or a third indicator configured to indicate a status of previously received emergency information, and receiving, by the user equipment from the network node, a registration accept message.
A method for misbehaviour warnings in an intelligent transportation system (ITS) including determining at a network server that an ITS station is misbehaving. In response to determining that the ITS station is misbehaving, the network server transmits a misbehaviour warning message to the ITS station indicating that the ITS station is misbehaving. In response to transmitting the misbehaviour warning message and determining that the ITS station is continuing to misbehave, the network server includes information of the ITS station in a certificate revocation list (CRL) and transmits the CRL.
An electronic device includes a storage to store a plurality of profiles relating to respective different operation modes of the electronic device, the plurality of profiles specifying different power consumption modes. At least one processor is configured to determine a given use case of the electronic device, and select a power consumption mode of the electronic device using a given profile selected from among the plurality of profiles based on a given operation mode.
Systems, methods, and software can be used to provide secure sensor data. In some aspects, a computer-implemented method includes: receiving, at a sensor security evaluation application executing on a device, sensor data from a sensor on the device; determining, by the sensor security evaluation application, a security confidence score associated with the sensor data; and transmitting, from the sensor security evaluation application, the security confidence score and the sensor data to a smart machine processor on the device.
H04W 12/00 - Dispositions de sécurité; Authentification; Protection de la confidentialité ou de l'anonymat
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
G06F 21/51 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade du chargement de l’application, p.ex. en acceptant, en rejetant, en démarrant ou en inhibant un logiciel exécutable en fonction de l’intégrité ou de la fiabilité de la source
G06F 21/85 - Protection des dispositifs de saisie, d’affichage de données ou d’interconnexion dispositifs d’interconnexion, p.ex. les dispositifs connectés à un bus ou les dispositifs en ligne
G05D 1/00 - Commande de la position, du cap, de l'altitude ou de l'attitude des véhicules terrestres, aquatiques, aériens ou spatiaux, p.ex. pilote automatique
In some examples, a vehicle includes a plurality of network controllers, a WI-FI wireless local area network (WLAN) over which at least a first network controller and a second network controller of the plurality of network controllers are to communicate, wherein a link between the first network controller and the second network controller through the WI-FI WLAN is a synchronized link.
In some examples, a wireless device selects a selected rate bucket of a plurality of different rate buckets, a rate bucket of the plurality of different rate buckets comprising a plurality of coding rates.
H04W 4/44 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons pour la communication entre véhicules et infrastructures, p.ex. véhicule à nuage ou véhicule à domicile
77.
METHOD AND SYSTEM FOR HYBRID COLLECTIVE PERCEPTION AND MAP CROWDSOURCING
A method at a network element for collective perception in an intelligent transportation system, the method including receiving, from each of a plurality of intelligent transportation system stations, a local dynamic map; creating, based on the local dynamic map from each of the plurality of intelligent transportation system stations, a local collective perception map; and distributing the local collective perception map to at least one of the plurality of intelligent transportation system stations.
Methods and devices for coding and communicating geographical position. The sending device quantizes the geographical coordinate system and sends its position as the delta or remainder after quantization. The receiving device determines its own quantized position and disambiguates between possible quantized coordinate positions of the sending device to identify the sending device's actual quantized coordinate position. From this, the receiving device determines the position of the sending device using the identified actual quantized coordinate position and the delta position data sent by the sending device. The receiving device may then trigger an action based on the determined position of the sending device.
G08G 1/0967 - Systèmes impliquant la transmission d'informations pour les grands axes de circulation, p.ex. conditions météorologiques, limites de vitesse
H04W 4/02 - Services utilisant des informations de localisation
H04W 4/40 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons
G01S 19/05 - Systèmes de positionnement par satellite à radiophares émettant des messages horodatés, p.ex. GPS [Système de positionnement global], GLONASS [Système global de navigation par satellite] ou GALILEO Éléments coopérants; Interaction ou communication entre les différents éléments coopérants ou entre les éléments coopérants et les récepteurs fournissant des données d'assistance
H04W 64/00 - Localisation d'utilisateurs ou de terminaux pour la gestion du réseau, p.ex. gestion de la mobilité
G01S 5/00 - Localisation par coordination de plusieurs déterminations de direction ou de ligne de position; Localisation par coordination de plusieurs déterminations de distance
79.
METHODS AND DEVICES FOR PREDICTIVE CODING OF POINT CLOUDS
Methods and devices for encoding a point cloud. A bit sequence signaling an occupancy pattern for sub-volumes of a volume is coded. Predictive coding is used to find a set of predicted points, from which a corresponding predicted occupancy pattern may be determined. The search for and selection of a coding mode for generating the set of predicted points may include a geometric distortion metric for evaluating how closely the geometry of the predicted set of points aligns with the geometry of the set of points to be coded. The geometric distortion metric may include a sum of absolute value distance between each point and its nearest predicted point. The metric may sum a logarithm of the distances to match more closely with coding rate cost.
Methods and devices for encoding a point cloud. A bit sequence signaling an occupancy pattern for sub-volumes of a volume is coded. Predictive coding is used to find a set of predicted points, from which a corresponding predicted occupancy pattern may be determined. The predicted occupancy pattern may be used to determine the contexts for entropy coding the occupancy pattern. The determination may include determining for each sub-volume, whether it contains a predicted point or not and, in some cases, the count of predicted points within the sub-volume. Various threshold numbers of predicted points may cause the selection of different context sets for coding the occupancy pattern. The predictive coding may be enabled by determining that the prediction of occupancy of a parent volume to the volume met a threshold level of accuracy.
A method at a network element for processing a first message destined for an intelligent transportation system station, the method including receiving from a sending entity, or generating, the first message at the network element; based on a source or contents of the first message, performing one of: discarding the first message; or modifying the first message to provide an indication to the intelligent transportation system station of checks the intelligent transportation system does not need to perform, thereby creating a second message; and forwarding the second message to the intelligent transportation system station.
H04L 1/24 - Tests pour s'assurer du fonctionnement correct
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
82.
METHODS AND DEVICES FOR BINARY ENTROPY CODING OF POINT CLOUDS
Methods and devices for encoding a point cloud. A bit sequence signaling an occupancy pattern for sub-volumes of a volume is coded using binary entropy coding. Contexts may be based on neighbour configuration and a partial sequence of previously-coded bits of the bit sequence. A determination is made as to whether to apply a context reduction operation and, if so, the operation reduces the number of available contexts. Example context reduction operations include reducing neighbour configurations based on shielding by sub-volumes associated with previously-coded bits, special handling for empty neighbour configurations, and statistics-based context consolidation.
A method at a sensor apparatus, the method including calculating a value for a target function based on at least one sensor of the sensor apparatus; determining that the value of the target function is within a defined threshold range for a defined time period, thereby finding an in-flight state for the sensor apparatus; and turning off transmission from a radio of the sensor apparatus based on the in-flight state.
H04Q 9/00 - Dispositions dans les systèmes de commande à distance ou de télémétrie pour appeler sélectivement une sous-station à partir d'une station principale, sous-station dans laquelle un appareil recherché est choisi pour appliquer un signal de commande ou
G06Q 10/08 - Logistique, p.ex. entreposage, chargement ou distribution; Gestion d’inventaires ou de stocks
Described herein are systems and methods to increase battery life of a user equipment (UE) by reducing the amount of time a UE spends in active time listening for paging messages following mobile originate (MO) or mobile terminated (MT) data transfers. A network node may receive, from a UE, a message including an identifier of the UE and a request to set the duration of an active time timer to zero. The network node may determine whether any MT traffic is available for the UE, and send a message to the UE including the duration of the active time timer or some other indicator to indicate to the UE whether or not MT data is awaiting transmission.
A method for steering of roaming (SOR) in wireless communication networks includes sending by a mobile equipment (ME) a registration message to a visited public land mobile network (VPLMN). The ME receives a first message from a home public land mobile network (HPLMN) through the VPLMN. The ME determines that the first message has failed a security check. In response to determining that the first message has failed the security check, the ME sends a second message to the VPLMN, the second message including an indication that the first message has failed the security check.
A method for sensor provisioning in a wireless sensor network includes determining, at a gateway, that no neighboring gateway is present; in response to no neighboring gateway present, measuring signal strengths from a plurality of sensors; based on the measured signal strengths, identifying a sensor from the plurality of sensors to be paired with the gateway; and in response to identifying the sensor, pairing the gateway and the sensor to enable a secured connection between the gateway and the sensor.
A method at a portable sensor apparatus for detecting an approaching vehicle, the method including detecting, using at least one detector at the sensor apparatus, signal energy of a signal from the approaching vehicle; analyzing the signal energy using a processor at the sensor apparatus to determine that an alarm should be triggered; and based on the analyzing, causing the alarm from an alert mechanism on the sensor apparatus.
G01S 17/93 - Systèmes lidar, spécialement adaptés pour des applications spécifiques pour prévenir les collisions
G01S 11/12 - Systèmes pour déterminer la distance ou la vitesse sans utiliser la réflexion ou la reradiation utilisant des ondes électromagnétiques autres que les ondes radio
G08B 21/02 - Alarmes pour assurer la sécurité des personnes
88.
METHODS AND DEVICES FOR ENTROPY CODING POINT CLOUDS
Methods and devices for encoding a point cloud. A current node associated with a sub-volume is split into further sub-volumes, each further sub-volume corresponding to a child node of the current node, and, at the encoder, an occupancy pattern is determined for the current node based on occupancy status of the child nodes. A probability distribution is selected from among a plurality of probability distributions based on occupancy data for a plurality of nodes neighbouring the current node. The encoder entropy encodes the occupancy pattern based on the selected probability distribution to produce encoded data for the bitstream and updates the selected probability distribution. The decoder makes the same selection based on occupancy data for neighbouring nodes and entropy decodes the bitstream to reconstruct the occupancy pattern.
H03M 7/30 - Compression; Expansion; Elimination de données inutiles, p.ex. réduction de redondance
H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p.ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
H04L 12/753 - Découverte de l’arborescence de routage, p.ex. conversion de la topologie maillée de réseau en topologie arborescente
89.
METHODS AND DEVICES USING DIRECT CODING IN POINT CLOUD COMPRESSION
Methods and devices for coding point clouds using direct coding mode to code coordinates of a point within a sub-volume associated with a current node instead of a pattern of occupancy for child nodes. Eligibility for use of direct coding is based on occupancy data from another node. If eligible, then a flag is represented in the bitstream to signal whether direct coding is applied to points in the sub-volume or not.
H03M 7/30 - Compression; Expansion; Elimination de données inutiles, p.ex. réduction de redondance
H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p.ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
H04L 12/753 - Découverte de l’arborescence de routage, p.ex. conversion de la topologie maillée de réseau en topologie arborescente
A computer includes a memory and a processor programmed to execute instructions stored in the memory. The instructions include identifying a function in a binary file, assigning one of a plurality of classifications to the function, and determining that the function requires stack cookie protection based at least in part on the classification assigned to the function.
G06F 21/52 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données
G06F 21/54 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par ajout de routines ou d’objets de sécurité aux programmes
G06F 21/56 - Détection ou gestion de programmes malveillants, p.ex. dispositions anti-virus
91.
METHODS AND SYSTEMS FOR PROVISIONING EMERGENCY NUMBERS
There is provided a method and device for provisioning emergency number information on a user equipment. When a dialed number matches an emergency number from the provisioned emergency number information, the user equipment selects either the circuit switched domain or the packet switched domain and executes a call setup procedure for that domain.
A method of applying information on the display of the electronic device includes displaying content elements associated with an application running on the electronic device on a display of the electronic device, receiving a selection of a content element associated with the application running on the electronic device, determining an identity profile having an associated key, encrypting information associated with the selected content element utilizing the key associated with the determined identity profile to generate encrypted information, displaying the encrypted information in the selected content element.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
G06F 3/0488 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p.ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p.ex. des gestes en fonction de la pression exer utilisant un écran tactile ou une tablette numérique, p.ex. entrée de commandes par des tracés gestuels
A method for selecting a Public Land Mobile Network (PLMN) at a user equipment (UE), comprising receiving, from a network entity, a list of PLMN identifiers, attempting to register the UE with a network using at least one PLMN identifier from the list of PLMN identifiers, and if the attempt to register with the network is successful, performing a Session Initiation Protocol (SIP) registration to an Internet Protocol (IP) Multimedia Sub-system (IMS) associated to the PLMN identifier.
H04W 60/00 - Rattachement à un réseau, p.ex. enregistrement; Suppression du rattachement à un réseau, p.ex. annulation de l'enregistrement
H04W 60/04 - Rattachement à un réseau, p.ex. enregistrement; Suppression du rattachement à un réseau, p.ex. annulation de l'enregistrement utilisant des événements déclenchés
H04W 48/18 - Sélection d'un réseau ou d'un service de télécommunications
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
94.
STATIC PROGRAM ANALYSIS OF A PARTIAL SOFTWARE PROGRAM
A method for analyzing a partial software program includes receiving a first software program. The first software program is designed to execute using a second software program. A first symbolic value indicates a characteristic of the second software program. The first software program is analyzed using a static program analysis, where the static program analysis generates a second symbolic value based on the first symbolic value. The second symbolic value indicates a characteristic of the first software program. The first software program is analyzed independent of an availability of the second software program. In response to determining that the second symbolic value is associated with a predetermined characteristic and that the first software program would perform an action associated with the second symbolic value if the first software program was executed using the second software program, a warning signal is generated.
G06F 21/56 - Détection ou gestion de programmes malveillants, p.ex. dispositions anti-virus
G06F 11/36 - Prévention d'erreurs en effectuant des tests ou par débogage de logiciel
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
95.
IDENTIFYING FUNCTIONS PRONE TO LOGIC ERRORS IN BINARY SOFTWARE COMPONENTS
Systems, methods, and software can be used to identify functions prone to logic errors in software components using binary static analysis. In some aspects, one computer-implemented method includes identifying a function defined within a binary software component; determining one or more complexity characteristics of the function based on included instructions; determining, based on the complexity characteristics, whether the function is likely to produce errors when the instructions included in the function are executed by a processor; and in response to determining that the function is likely to contain errors, generating an indication that the function requires further review.
Systems, methods, and software can be used to analyzing binary software components utilizing multiple instruction sets. In some aspects, one computer- implemented method includes identifying a program section in a binary software component; performing a first disassembly process according to a first instruction set on the program section to produce a first disassembly result; performing a second disassembly process according to a second instruction set different from the first instruction set on the program section to produce a second disassembly result; comparing the first disassembly result to the second disassembly result; and determining a utilized instruction set associated with the program section based at least in part on comparing the first disassembly result to the second disassembly result, wherein the utilized instruction set is either the first instruction set or the second instruction set.
A method for evaluating contextual risk profiles at a computing device (110, 212, 312) in a vehicle (310), the method including obtaining information about a proximate vehicle (320, 330); utilizing the information to create a risk profile for the proximate vehicle (320, 330); and based on the risk profile, initiating an action at computing device (110, 212, 312).
B60W 30/16 - Contrôle de la distance entre les véhicules, p.ex. pour maintenir la distance avec le véhicule qui précède
B60W 40/04 - Calcul ou estimation des paramètres de fonctionnement pour les systèmes d'aide à la conduite de véhicules routiers qui ne sont pas liés à la commande d'un sous-ensemble particulier liés aux conditions ambiantes liés aux conditions de trafic
B60W 50/14 - Moyens d'information du conducteur, pour l'avertir ou provoquer son intervention
B60W 50/00 - COMMANDE CONJUGUÉE DE PLUSIEURS SOUS-ENSEMBLES D'UN VÉHICULE, DE FONCTION OU DE TYPE DIFFÉRENTS; SYSTÈMES DE COMMANDE SPÉCIALEMENT ADAPTÉS AUX VÉHICULES HYBRIDES; SYSTÈMES D'AIDE À LA CONDUITE DE VÉHICULES ROUTIERS, NON LIÉS À LA COMMANDE D'UN SOUS-ENSEMBLE PARTICULIER - Détails des systèmes d'aide à la conduite des véhicules routiers qui ne sont pas liés à la commande d'un sous-ensemble particulier
Systems, methods, and software can be used to detect remote application profiling. In some aspects, one computer-implemented method includes receiving, over a network, a request from a network client directed to a particular application executed by an application server; determining whether the recei ved request deviates from a communications profile associated with the particular application; in response to determining that the received request deviates from the communications profile, identifying the network client as an attacker; and in response to identifying the network client as an attacker, performing a defensive response with respect to the network client.
In some examples, a system receives, over a network, position data acquired by a position sensor of a device, and sensor data acquired by a further sensor of the device while the position sensor of the device is inactive, the sensor data from the further sensor indicating a direction of travel of the device. The system determines, using the sensor data acquired by the further sensor of the device, a heading and movement of the device relative to a position indicated by the position data, and updates a position of the device according to the determined heading and movement.
G01C 21/12 - Navigation; Instruments de navigation non prévus dans les groupes en utilisant des mesures de la vitesse ou de l'accélération exécutées à bord de l'objet navigant; Navigation à l'estime
H04W 4/02 - Services utilisant des informations de localisation
H04W 4/021 - Services concernant des domaines particuliers, p.ex. services de points d’intérêt, services sur place ou géorepères
H04M 1/00 - COMMUNICATIONS TÉLÉPHONIQUES Équipement de sous-station, p.ex. pour utilisation par l'abonné
100.
AUTHENTICATING USER EQUIPMENTS THROUGH RELAY USER EQUIPMENTS
In some examples, a first user equipment (UE) sends an indication to an application server that the first UE is to use a relay UE to access a network. The first UE receives, from the application server, a first identity different from a second identity of the first UE. The first UE uses the first identity to register with the network to authenticate the first UE.