会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明申请
    • DEVICE AND METHODS FOR MANAGEMENT AND ACCESS OF DISTRIBUTED DATA SOURCES
    • 用于管理和访问分布式数据源的设备和方法
    • US20140096199A1
    • 2014-04-03
    • US13631453
    • 2012-09-28
    • Manish DaveVishwa HassanBhaskar D. GowdaMrigank Shekhar
    • Manish DaveVishwa HassanBhaskar D. GowdaMrigank Shekhar
    • G06F21/00
    • G06F21/604H04L63/0884H04L67/10
    • A device and method for provided access to distributed data sources includes a cloud security server configured to associate any number of data sources and client devices with a cloud security server account. The cloud security server assigns trust levels to the data sources and the client devices. A client device requests data from the cloud security server. The cloud security server authenticates the client device and verifies the trust levels of the client device and the requested data. If verified, the cloud security server brokers a connection between the client device and the data source, and the client device accesses the requested data. Data sources may include cloud service providers and local storage devices. The cloud security server may assign a trust level to a client device for a limited time or revoke a trust level assigned to a client device. Other embodiments are described and claimed.
    • 用于提供对分布式数据源的访问的设备和方法包括配置为将任意数量的数据源和客户端设备与云安全服务器帐户关联的云安全服务器。 云安全服务器为数据源和客户端设备分配信任级别。 客户机设备从云安全服务器请求数据。 云安全服务器对客户端设备进行身份验证,并验证客户端设备的信任级别和请求的数据。 如果验证,则云安全服务器将客户端设备和数据源之间的连接进行代理,客户端设备访问所请求的数据。 数据源可能包括云服务提供商和本地存储设备。 云安全服务器可以在有限的时间内为客户端设备分配信任级别,或者撤消分配给客户端设备的信任级别。 描述和要求保护其他实施例。
    • 7. 发明申请
    • TETHERING OF MOBILE WIRELESS DEVICES
    • 移动无线设备的设计
    • US20140254499A1
    • 2014-09-11
    • US13792693
    • 2013-03-11
    • Vishwa HassanBhaskar D. GowdaMrigank ShekharManish DaveAkshay Chandrasekhar
    • Vishwa HassanBhaskar D. GowdaMrigank ShekharManish DaveAkshay Chandrasekhar
    • H04W72/02
    • H04W12/08H04W4/80H04W12/00403H04W48/18H04W88/04
    • Embodiments of computer-implemented methods, systems, computing devices, and computer-readable media are described herein for tethering of mobile wireless devices. In some embodiments, a computing device configured for tethering may include a processor and a tethering application operated by the processor to associate a first mobile wireless device with a community of mobile wireless devices eligible for tethering to the first mobile device based on eligibility criteria; identify, among the community of mobile devices, a second mobile wireless device to tether with the first mobile device, based on communication information exchange among the mobile wireless devices in the community, including the first mobile device; and based on a result of the identifying, cause the first mobile device to tether to the second mobile device, so as to enable the first mobile device to connect to a wireless communication network via the second mobile device. Other embodiments may be described and claimed.
    • 本文描述了计算机实现的方法,系统,计算设备和计算机可读介质的实施例,用于移动无线设备的捆绑。 在一些实施例中,配置用于网络连接的计算设备可以包括由处理器操作的处理器和网络共享应用,其基于资格标准将第一移动无线设备与符合第一移动设备绑定的移动无线设备的社区关联; 基于包括第一移动设备在内的社区中的移动无线设备之间的通信信息交换,在移动设备的社区之间识别第二移动无线设备,以与第一移动设备系绳; 并且基于所述识别的结果,使所述第一移动设备系到所述第二移动设备,以使得所述第一移动设备能够经由所述第二移动设备连接到无线通信网络。 可以描述和要求保护其他实施例。