METHOD AND APPARATUS FOR CONFIGURING SERVICES BASED ON TOUCH SELECTION

    公开(公告)号:US20170372054A1

    公开(公告)日:2017-12-28

    申请号:US15614102

    申请日:2017-06-05

    CPC classification number: G06F21/34 G06F21/6218

    Abstract: An approach is provided for configuring one or more mobile devices to one or more services associated with at least one structure based on various contexts, access criteria, and/or security levels. The access platform determines proximity information of one or more devices with respect to at least a first access point, a second access point, or a combination thereof associated with at least one structure. The access platform next processes and/or facilitates a processing of the proximity information to determine one or more roles, one or more accesses, one or more rights, or a combination thereof. The access platform then determines one or more services to make available based, at least in part, on the one or more roles, the one or more accesses, the one or more rights, or a combination thereof.

    METHOD AND APPARATUS FOR QUERYING CONTENT PROTECTED BY IDENTITY-BASED ENCRYPTION
    2.
    发明申请
    METHOD AND APPARATUS FOR QUERYING CONTENT PROTECTED BY IDENTITY-BASED ENCRYPTION 审中-公开
    通过基于识别的加密来检测内容的方法和装置

    公开(公告)号:US20150237021A1

    公开(公告)日:2015-08-20

    申请号:US14701913

    申请日:2015-05-01

    Abstract: An approach is provided for reducing communication traffic/cost and protecting content by applying recipient criteria in identity-based encryption. A criterion application of a querier causes, at least in part, transmission of a query associated with a first user described according to a first set of criteria. Based on the query, the criterion application of the querier receives one or more second sets of criteria associated with respective second users, wherein the second sets of criteria are matched, at least in part, to the first set of criteria, and wherein at least one of the second sets of criteria is used as a public key for encrypting data according to an identity-based encryption scheme. A criterion application of an information store receives the query associated with the first user, and matches one or more second sets of criteria with all or part of the first set of criteria.

    Abstract translation: 提供了一种通过在基于身份的加密中应用收件人标准来减少通信流量/成本并保护内容的方法。 查询器的标准应用至少部分地导致根据第一组标准描述的与第一用户相关联的查询的传输。 基于查询,查询器的标准应用接收与相应的第二用户相关联的一个或多个第二组标准,其中第二组标准至少部分地与第一组标准相匹配,并且其中至少 第二组标准之一被用作根据基于身份的加密方案来加密数据的公钥。 信息存储的标准应用接收与第一用户相关联的查询,并且将一个或多个第二组标准与第一组标准的全部或部分匹配。

Patent Agency Ranking