Patent application number | Description | Published |
20090254930 | SYSTEMS AND METHODS FOR DISTRIBUTING AND REDEEMING CREDITS ON A BROADCAST SYSTEM - Methods and systems enable receiving on mobile devices credits, tokens or coupons from mobile TV broadcast service providers. Credits may be delivered via direct unicast messages such as SMS or e-mail, or via broadcast provisioning messages. Subscription response messages may be used to deliver credits to mobile devises which transmit a request for service. Broadcast service providers may push credits to mobile devices by transmitting a solicited pull message or a credit grant push message. Credits may be sent to mobile devices within a credit response message or a long term decryption key message. Credits may be used a purchase transaction, with the broadcast service provider controlling redemption of credits by sending an a long term decryption key message via a unicast network or a short term decryption key message via the broadcast network to cause mobile devices to decrement their stored credits. | 10-08-2009 |
20100064350 | Apparatus and Method for Secure Affinity Group Management - Disclosed is a method for security management in a station. In the method, a pre-registered credential is received. The pre-registered credential has been associated with a network group by a registration entity. The station is established as a member of the network group based on the received pre-registered credential thereby effecting access rights with other member stations participating in the network group. | 03-11-2010 |
20100162348 | METHOD AND APPARATUS FOR PROVIDING NETWORK COMMUNICATION ASSOCIATION INFORMATION TO APPLICATIONS AND SERVICES - A system and method are provided that allow an application on a first terminal to inquire about available network communication associations that it can use to send data to another terminal, thereby avoiding the establishment of a new network communication association with the other terminal. A security information module may serve to collect and/or store information about available network communication associations between the first terminal and another terminal across different layers. The security information module may also assess a trust level for the network communication associations based on security mechanisms used to establish each association and/or past experience information reported for these network communication associations. Upon receiving a request for available network communication associations, the security information module provides this to the requesting application which can use it to establish communications with a corresponding application on the other terminal. | 06-24-2010 |
20100312622 | Methods and Apparatus for Creation, Advertisement, and Discovery of Peer-to-Peer Overlay Networks - Methods and apparatus for creation, advertisement, and discovery of peer-to-peer overlay networks. A method includes detecting one or more communication links that allow a node to communicate with other nodes, determining that a universal overlay network is accessible using at least one communication link, selecting a selected communication link from the at least one communication link, and joining the universal overlay network using the selected communication link. An apparatus includes a transceiver configured to detect one or more communication links that allow a node to communicate with other nodes, and a processor configured to determine that a universal overlay network is accessible using at least one communication link, select a selected communication link from the at least one communication link, and join the universal overlay network using the selected communication link. | 12-09-2010 |
20110004681 | Methods and Apparatus for Enhanced Overlay State Maintenance - Methods and apparatus for enhanced overlay state maintenance in a peer-to-peer overlay network. A first method includes inferring that a first node is leaving the overlay network, and transmitting a decrement message to decrement a size counter value. A second method includes identifying a set of nodes associated with a first node of an overlay network, obtaining a segment length associated with each node of the set of nodes, and determining a size of the overlay network by dividing the total number of nodes in the set of nodes by the sum of the segment lengths. A third method includes identifying a set of nodes associated with a first node of an overlay network, obtaining a size estimate associated with the first node and with each node of the set of nodes, and determining a size of the overlay network by averaging the size estimates. | 01-06-2011 |
20110010458 | Methods and Apparatus for Automated Local Network Formation Using Alternate Connected Interfaces - The described apparatus and methods may include a local network formation module configured to join an overlay network via an available connection, retrieve from the overlay network at least one ad associated with forming a local network, determine if there is at least one matching ad to form the local network, and if no matching ads are determined, then publish an ad with a first local network configuration, or if one or more matching ads are determined, then join a local network according to a second local network configuration corresponding to one of the one or more matching ads. | 01-13-2011 |
20120278625 | Social network based PKI authentication - A user device generates a social graph-based user certificate that conveys a trust level to other users of the social network. A user certificate for a user is obtained, the user having a user public key and corresponding user private key. A plurality of potential signers is identified within one or more social networks. The certificate is then sent to the identified plurality of potential signers. One or more signed versions of the user certificate may be received from at least some of the plurality of potential signers. The user device may assign a signer weight to each signed version of the user certificate, each corresponding signer weight associated with the signer of each signed version of the certificate. The user certificate, the user signature, one or more signed versions of the user certificate, and the user-assigned signer weights are distributed to one or more recipients. | 11-01-2012 |
20130191518 | METHOD AND APPARATUS FOR AUTOMATIC SERVICE DISCOVERY AND CONNECTIVITY - Apparatus and methods for automatic service discovery and connectivity include acts of or components for retrieving service metadata associated with one or more service devices from a connectivity entity, wherein the service metadata comprises connectivity parameters, and configuring one or more links with at least one of the one or more service devices based on the service metadata. Further, the apparatus and methods may include acts of or components for using a service available from the one or more service devices through the one or more links. | 07-25-2013 |
20130273880 | SPATIO-TEMPORAL RANDOM VOTING SCHEME FOR COGNITIVE NETWORKS - A spatio-temporal random voting scheme is provided that incorporates location distribution, spatial randomness, and temporal randomness in the collection of information from a plurality of sensing devices within the cognitive network. The region is divided into a plurality of sectors, where each sector is a portion of the region. A subset of sectors is selected from the plurality of sectors in the region to provide spatial randomness. A device is randomly selected from each sector in the subset of sectors to provide additional spatial randomness to the information collection process. Temporal randomness may be introduced by randomly selecting a timeslot within a sensing window period in which devices are to scan a frequency spectrum band to determine if a signal energy above a threshold is detected. Sensing reports are then collected from the selected sensing devices and used to determine whether the frequency spectrum band is available or in use. | 10-17-2013 |
20130282831 | METHODS AND APPARATUS FOR MERGING PEER-TO-PEER OVERLAY NETWORKS - Methods and apparatus for merging peer-to-peer overlay networks. A method includes receiving an advertisement from a second overlay network, determining a size of the second overlay network, performing a self search on the second overlay network based on a persistent node identifier, if the size of the second overlay network is greater than the size of a first overlay network, and joining the second overlay network if the persistent node identifier is not part of the second overlay network. An apparatus includes a transceiver to receive an advertisement from a second overlay network, and a processor coupled to the transceiver to determine a size of the second overlay network, perform a self search on the second overlay network based on a persistent node identifier, and join the second overlay network if the persistent node identifier is not part of the second overlay network. | 10-24-2013 |
20150033021 | REMOTE ACCESS TO LOCAL NETWORK VIA SECURITY GATEWAY - Multiple protocol tunnels (e.g., IPsec tunnels) are deployed to enable an access terminal that is connected to a network to access a local network associated with a femto access point. A first protocol tunnel is established between a security gateway and the femto access point. A second protocol tunnel is then established in either of two ways. In some implementations the second protocol tunnel is established between the access terminal and the security gateway. In other implementations the second protocol tunnel is established between the access terminal and the femto access point, whereby a portion of the tunnel is routed through the first tunnel. | 01-29-2015 |