Patent classifications
G16Y30/10
Automated IoT device configuration using user profile
A service layer (SL) function may be used for managing a user profile that is associated with a SL user and using this profile to automatically configure different types of devices connected to an IoT service provider's platform. A SL function may be used to support user data privacy and security when data is imported and exported between gateways or servers temporarily.
PUBLIC KEY ENCRYPTION USING SELF POWERED TIMERS
A one-time self-powered timer circuit whose state can be measured only once, after which the timer will de-synchronize itself. In this manner, the timers can only be used for one-pad authentication. The security of the public-key distribution algorithms that will exploit the synchronization between billions of hardware-software timers, time reversibility of software timer and time irre-versibility of hardware timers and one-time read-out to deliver classical and quantum-like benefits. System-on-chip and circuit imple-mentation of the self-powered timer array, read-out, programming and initialization modules that implements the proposed public-key distribution algorithms.
INTERNET OF THINGS (IoT) DEVICE, IoT DEVICE MANAGEMENT SYSTEM, AND METHOD FOR MANAGING IoT DEVICE
An Internet of Things (IoT) device includes a first memory disposed in a normal zone; a first driver disposed in the normal zone; and a second driver disposed in a secure zone. The first driver is configured to perform: (a) monitoring the first memory to generate data change information of the first memory, the data change information being information on changes of data in the first memory; (b) transmitting the data change information to the second driver; and (c) controlling an operating state of the IoT device based on an instruction for the operating state received from the second driver. The second driver is configured to perform: (d) transmitting the data change information to a specified IoT device management system; and (e) receiving the instruction for the operating state from the IoT device management system and transmitting the instruction for the operating state to the first driver.
Establishing connections between IOT devices using authentication tokens
Various systems and methods of establishing a trusted pairing relationship between IoT devices, through the exchange of authentication service proof of possession tokens, are described herein. In an example, a trusted pairing relationship is established between IoT devices, through access control and credential resources based on communication via intermediary devices and services. The IoT devices may request or receive access to or information from a resource based on the trusted relationship.
Establishing connections between IOT devices using authentication tokens
Various systems and methods of establishing a trusted pairing relationship between IoT devices, through the exchange of authentication service proof of possession tokens, are described herein. In an example, a trusted pairing relationship is established between IoT devices, through access control and credential resources based on communication via intermediary devices and services. The IoT devices may request or receive access to or information from a resource based on the trusted relationship.
Determination device, determination method, and determination program
A determination apparatus according to a first embodiment collects information regarding communication performed by an IoT device. The determination apparatus extracts patterns used for detecting unauthorized communication performed by the IoT device from information that has been collected. Also, the determination apparatus approximates a change in the cumulative value of the number of patterns to a function that expresses a predetermined curve, thereby calculating the degree of convergence of the change. Also, the determination apparatus determines whether or not the degree of convergence is no less than a predetermined value.
Determination device, determination method, and determination program
A determination apparatus according to a first embodiment collects information regarding communication performed by an IoT device. The determination apparatus extracts patterns used for detecting unauthorized communication performed by the IoT device from information that has been collected. Also, the determination apparatus approximates a change in the cumulative value of the number of patterns to a function that expresses a predetermined curve, thereby calculating the degree of convergence of the change. Also, the determination apparatus determines whether or not the degree of convergence is no less than a predetermined value.
Apparatus for setting control authority for smart home and method thereof
An apparatus for setting control authority for a smart home is provided. The apparatus includes an information collector that collects driving information and registration information of each vehicle registered in one account from a car-to-home service system, and a controller that sets control authority for one smart home to one vehicle based on the driving information and registration information collected by the information collector.
Apparatus for setting control authority for smart home and method thereof
An apparatus for setting control authority for a smart home is provided. The apparatus includes an information collector that collects driving information and registration information of each vehicle registered in one account from a car-to-home service system, and a controller that sets control authority for one smart home to one vehicle based on the driving information and registration information collected by the information collector.
Mitigation of cyberattacks on cellular devices
A pause command is sent to a Subscriber Identity Module (SIM) card of a cellular device in response to detecting a cyberattack against the cellular device on the cellular network. To mitigate the cyberattack, the SIM card temporarily disconnects the cellular device from the cellular network for a pause time. The SIM card prohibits the cellular device from connecting to the cellular network during the pause time and automatically allows the cellular device to reconnect to the cellular network after the pause time.