G16Y40/50

Identity authentication based on data from Internet of Things devices

A computer-implemented method for identity authentication in a data processing system, including: receiving, by the processor, an authentication request from a user; receiving, by the processor, real-time data from one or more Internet of Things (IoT) devices associated with the user; generating, by the processor, one or more questions based on the real-time data; receiving, by the processor, one or more responses to the one or more questions from the user; comparing, by the processor, the one or more responses from the user with one or more correct answers identified by the processor. If the one or more responses match the one or more correct answers, providing, by the processor, the user with a successful identity authentication.

SMART ANTI-COUNTERFEITING APPARATUS OF THE INTERNET OF THINGS AND AN ANTI-COUNTERFEITING METHOD OF SAME
20230206252 · 2023-06-29 ·

A smart anti-counterfeiting apparatus and method of the Internet of Things comprise: an independent identification code; a PCB board for controlling a motor, and being arranged a chip having an independent MAC address; and a locking apparatus capable of one-time opening after closing; said locking apparatus includes: a rear shell, inside is arranged a motor, on the output shaft arranged with an external thread; a pushing piece, the middle portion provided with an internal thread hole to fit with the output shaft of the motor, and inside which there are several pushing piece thorough holes; a pressure plate arranged an outward convex receiving structure provided with a cavity to fit with the shape of said pushing piece; and a front shell, inside which are arranged several connecting columns fit with the pushing piece thorough holes, and the end of connecting columns being a step structure.

SMART ANTI-COUNTERFEITING APPARATUS OF THE INTERNET OF THINGS AND AN ANTI-COUNTERFEITING METHOD OF SAME
20230206252 · 2023-06-29 ·

A smart anti-counterfeiting apparatus and method of the Internet of Things comprise: an independent identification code; a PCB board for controlling a motor, and being arranged a chip having an independent MAC address; and a locking apparatus capable of one-time opening after closing; said locking apparatus includes: a rear shell, inside is arranged a motor, on the output shaft arranged with an external thread; a pushing piece, the middle portion provided with an internal thread hole to fit with the output shaft of the motor, and inside which there are several pushing piece thorough holes; a pressure plate arranged an outward convex receiving structure provided with a cavity to fit with the shape of said pushing piece; and a front shell, inside which are arranged several connecting columns fit with the pushing piece thorough holes, and the end of connecting columns being a step structure.

SMART SURVEILLANCE SYSTEM AND SMART SURVEILLANCE CONTROL METHOD USING UAV

Provided is a smart surveillance system that includes one unmanned aerial vehicle (UAV), a plurality of Internet of Things (IoT) terminals distributed in a surveillance area, and a plurality of base stations distributed in the surveillance area, wherein the UAV selects any IoT terminal from among the plurality of IoT terminals using deep learning auction training, receives surveillance data from the selected IoT terminal, and transmits the surveillance data to a data center through the Internet and any one base station among the plurality of base stations.

SMART SURVEILLANCE SYSTEM AND SMART SURVEILLANCE CONTROL METHOD USING UAV

Provided is a smart surveillance system that includes one unmanned aerial vehicle (UAV), a plurality of Internet of Things (IoT) terminals distributed in a surveillance area, and a plurality of base stations distributed in the surveillance area, wherein the UAV selects any IoT terminal from among the plurality of IoT terminals using deep learning auction training, receives surveillance data from the selected IoT terminal, and transmits the surveillance data to a data center through the Internet and any one base station among the plurality of base stations.

Methods and systems for submission and validating decentralized verifiable claims in a physical world

Methods and systems for implementing Blockchain-based verifiable claims for use with assets in a physical world, such as Internet-of-Things (IoT) devices, are described. Verifiable claims are integrated with Root of Trust (RoT) technology, in a manner that allows verifiable claims to be linked with physical assets and a “proof” of provisioning of decentralized identity to be established. A system integrates Blockchain and IoT technologies, including Blockchain IoT device with hardware RoT implemented thereon. A validation process leverages RoT of the device to establish a decentralized “proof” of RoT on the Blockchain, which can then be used as a verifiable claim for the device. The validation process can also use the “proof” of RoT to further validate data obtained from the Blockchain IoT device, and to validate business logic allowing context based control of any subsequent transactions. Further, the validation process achieves automation with respect to trustability.

COMMUNICATION SYSTEM FOR AN ELECTRIC BICYCLE
20220311468 · 2022-09-29 ·

Various embodiments provide for a bike-supported communication network that manages and facilitates communications between components of an electric bicycle and a wireless network. In some embodiments, the systems and methods provide a communication system for an electric bicycle that includes a communication device that facilitates wireless communications between the electric bicycle and a wireless network, and an antenna coupled to the communication device and at least partially integrated into a frame component of the electric bicycle.

Enterprise IOT system for onboarding and maintaining peripheral devices

Apparatus and methods for establishing a user Internet of Things (“IoT”) system is provided. The method may be performed by a central IoT hub run on a user's personal computing device. The method may include detecting user devices in electronic communication with the central IoT hub and onboarding, to the user IoT system, user devices determined to be in conformance with baseline security protocols and performance characteristics. The onboarded user device may be IoT nodes. The method may include monitoring enterprise data to pre-emptively identify and address probable failures of the IoT nodes prior to failure of the IoT nodes. The method may also include addressing known failures for each IoT node on the user IoT system.

Enterprise IOT system for onboarding and maintaining peripheral devices

Apparatus and methods for establishing a user Internet of Things (“IoT”) system is provided. The method may be performed by a central IoT hub run on a user's personal computing device. The method may include detecting user devices in electronic communication with the central IoT hub and onboarding, to the user IoT system, user devices determined to be in conformance with baseline security protocols and performance characteristics. The onboarded user device may be IoT nodes. The method may include monitoring enterprise data to pre-emptively identify and address probable failures of the IoT nodes prior to failure of the IoT nodes. The method may also include addressing known failures for each IoT node on the user IoT system.

ENTERPRISE IOT SYSTEM FOR ONBOARDING AND MAINTAINING PERIPHERAL DEVICES

Apparatus and methods for establishing a user Internet of Things (“IoT”) system is provided. The method may be performed by a central IoT hub run on a user's personal computing device. The method may include detecting user devices in electronic communication with the central IoT hub and onboarding, to the user IoT system, user devices determined to be in conformance with baseline security protocols and performance characteristics. The onboarded user device may be IoT nodes. The method may include monitoring enterprise data to pre-emptively identify and address probable failures of the IoT nodes prior to failure of the IoT nodes. The method may also include addressing known failures for each IoT node on the user IoT system.