Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

1090 results about "Network identification" patented technology

Network identity (network ID) is a portion of the TCP/IP address that is used to identify individuals or devices on a network such as a local area network or the Internet. Network ID is designed to ensure the security of a network and related resources.

Automatic network selection methods and apparatus using a steered PLMN

Methods and apparatus for automatically selecting a wireless communication network by user equipment using a “steered” PLMN are disclosed. A home network identification, a list of prioritized roaming network identifications, and a steered network identification are stored in memory (e.g. a SIM or USIM) of the user equipment. In an automatic network selection procedure, a scanning operation is performed to receive one or more network identifications corresponding to one or more available wireless communication networks in a coverage area. The user equipment attempts to select a wireless communication network in the coverage area by comparing the received network identifications from the scanning operation with the steered network identification. If a match between a received network identification and the steered network identification is identified, a wireless communication network corresponding to the received network identification that matches the steered network identification is selected and registered with by the user equipment. This procedure is performed in lieu of use of the list of prioritized roaming network identifications of the user equipment. By setting the steered network identification via an over-the-air programming procedure when necessary (e.g. on a per region basis), a home network operator may “steer” user equipment to any desired network immediately and efficiently.
Owner:LEPATENT (BEIJING) CONSULTING CORP LTD

Messaging system involving wireless communications and methods therefor

A messaging system (11) for conveying messages between a host server (15) and a client (13a) that is part of a GSM network and a method therefor. The GSM network includes an SMS facility to convey messages between its clients using an SMSC (25), each wireless client having a network identifying number (NIN) associated with it to uniquely identify the client within the GSM network. Each message comprises a message packet (43) including the address (49) of an intended recipient, the address (47) of the sender of the message and the message itself (51). The host server (15) may be selectively connected to a plurality of different client types (13) via the Internet (19) to convey messages therebetween. Each client has a client identifying number (CIN) associated with it to uniquely identify it to the host server (15). The host server (15) and the SMSC (25) are interconnected by the Internet (19) or another computer network to provide for communications therebetween. One of the clients (13) of the host server (15) is a wireless client (13a) and has its CIN corresponding to its NIN. The host server (15) has an access code (AC) to uniquely identify it to the SMSC (25) and a unique identification number (UIN) ascribed to: (i) a prescribed action performed by it, and (ii) an entity that is the subject of the prescribed action. The messages sent in message packet (43) between the host server (15) and the wireless client (13a) in connection with a particular prescribed action and entity include: (i) a combination of the AC and the UIN ascribed to the particular action and entity as the address of the host server (15); and (ii) the NIN as the address of the wireless client. The SMSC (25) also uses the AC in the address of the intended recipient or the sender to recognize messages sent to or received from the host server (15) and routs the messages accordingly.
Owner:CHIKKA PTE LTD

Methods and apparatus for producing a user-controlled PLMN list for a SIM/USIM card with use of a user agent application

Methods and apparatus for producing a user-controlled PLMN list for a SIM / USIM card with use of a user agent application are disclosed. Selection indication data corresponding to at least one of a plurality of network attribute type preferences is received at the user agent application. The selection indication data may be received through a user interface of the user equipment, a user application of the user equipment, or both. The at least one selected network attribute type preference is indicative of a preference to prioritize network selection based on at least one network attribute type of a plurality of network attributes types (e.g. cost, bandwidth, quality, number of available features, etc.). A list of network identifications associated with a plurality of wireless communication networks is ranked in accordance with a ranking of network attributes of the at least one selected network attribute type made available by the plurality of wireless communication networks. The ranked list of network identifications is then stored as a user-controlled PLMN list in the SIM / USIM. An automatic network selection process may then be performed with use of the user-controlled PLMN list. As apparent, network selection may be controlled and facilitated by the end user in a more conceptual fashion. Other additional and alternative advantageous features are described in the detailed description.
Owner:MALIKIE INNOVATIONS LTD

Human behavior recognition method based on attention mechanism and 3D convolutional neural network

The invention discloses a human behavior recognition method based on an attention mechanism and a 3D convolutional neural network. According to the human behavior recognition method, a 3D convolutional neural network is constructed; and the input layer of the 3D convolutional neural network includes two channels: an original grayscale image and an attention matrix. A 3D CNN model for recognizing ahuman behavior in a video is constructed; an attention mechanism is introduced; a distance between two frames is calculated to form an attention matrix; the attention matrix and an original human behavior video sequence form double channels inputted into the constructed 3D CNN and convolution operation is carried out to carry out vital feature extraction on a visual focus area. Meanwhile, the 3DCNN structure is optimized; a Dropout layer is randomly added to the network to freeze some connection weights of the network; the ReLU activation function is employed, so that the network sparsity isimproved; problems that computing load leap and gradient disappearing due to the dimension increasing and the layer number increasing are solved; overfitting under a small data set is prevented; and the network recognition accuracy is improved and the time losses are reduced.
Owner:NORTH CHINA ELECTRIC POWER UNIV (BAODING) +1

System for securely communicating amongst client computer systems

A data transaction processing system in which transaction data is entered by the user in response to prompts in a template which is tailored to each user application. The template and entered data are accumulated into data transactions that are immediately transmitted upon completion to an external database server for processing and storage. The data transaction is received via standard protocols at the database server which, depending upon the application, stores the entire data transaction, explodes the data transaction to produce ancillary records which are then stored, and/or forwards the data transaction or some or all of the ancillary records to other database servers for updating other databases associated with those database servers. In response to requests from the transaction entry device, the database server may return data streams for use in completing the fields in the data transaction or in presenting a menu on the display which was read in from the database server or a remote phone mail system. The transaction entry device is integrated with a telephone and is accessed via a touch screen, an optional keyboard, a magnetic card reader, voice entry, a modem, and the like.
A plurality of such database servers under the control of broad operations system server (BOSS) software and a plurality of form-driven client computing devices are provided to create an open platform system for receiving and transmitting transaction data to or from the client devices, other applications and databases. Advantageously, a locator server computer serves to retrieve IP address numbers, PSTN numbers and other network identification information for use in identifying and locating, e.g., an originating user and a destination client device. A robust security and authentication scheme along with robust storage protects the transmission of sensitive or confidential data.
Owner:CYBERFONE TECH

Centralized identification and authentication system and method

A method and system is provided by a Central-Entity, for identification and authorization of users over a communication network such as Internet. Central-Entity centralizes users personal and financial information in a secure environment in order to prevent the distribution of user's information in e-commerce. This information is then used to create digital identity for the users. The digital identity of each user is dynamic, non predictable and time dependable, because it is a combination of user name and a dynamic, non predictable and time dependable secure code that will be provided to the user for his identification.
The user will provide his digital identity to an External-Entity such as merchant or service provider. The External-Entity is dependent on Central-Entity to identify the user based on the digital identity given by the user. The External-Entity forwards user's digital identity to the Central-Entity for identification and authentication of the user and the transaction.
The identification and authentication system provided by the Central-Entity, determines whether the user is an authorized user by checking whether the digital identity provided by the user to the External-Entity, corresponds to the digital identity being held for the user by the authentication system. If they correspond, then the authentication system identifies the user as an authorized user, and sends an approval identification and authorization message to the External-Entity, otherwise the authentication system will not identify the user as an authorized user and sends a denial identification and authorization message to the External-Entity.
Owner:AMERITECH SOLUTIONS INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products