G06F21/44

SECURITY SYSTEM, VEHICLE, SECURITY DEVICE, AND VALIDITY DETERMINATION METHOD

A security system includes an information transmission device, and a security device to which a target device is connectable. The information transmission device and the security device are connected to each other via a network. The information transmission device transmits, to the security device, generation information to be used for generating reference identification information. The security device generates the reference identification information by using the generation information received from the information transmission device via the network. The security device acquires identification information of the target device connected to the security device. The security device compares the acquired identification information with the generated reference identification information, and determines validity of the target device connected thereto, based on a result of comparison.

Systems and Methods for Authentication of Security Devices Having Chaosmetrics Features
20230052463 · 2023-02-16 ·

Systems, methods and devices for authentication of security devices having chaosmetrics features are disclosed. In one aspect, embodiments of the present disclosure include a method which can be implemented on a system to perform authentication of a security device. In one embodiment, the method includes detecting a scan of the security device by a user device, identifying a rotational orientation of the user device in relation to the security device and/or generating a fingerprint of the security device specific to the user device having the rotational orientation in relation to the security device. An image similarity index of an authentication scan of the security device and the fingerprint generated for the security device can be determined and a positive authentication result can be identified for the authentication request of the security device responsive to determination that the image similarity index exceeds a threshold value.

Systems and Methods for Authentication of Security Devices Having Chaosmetrics Features
20230052463 · 2023-02-16 ·

Systems, methods and devices for authentication of security devices having chaosmetrics features are disclosed. In one aspect, embodiments of the present disclosure include a method which can be implemented on a system to perform authentication of a security device. In one embodiment, the method includes detecting a scan of the security device by a user device, identifying a rotational orientation of the user device in relation to the security device and/or generating a fingerprint of the security device specific to the user device having the rotational orientation in relation to the security device. An image similarity index of an authentication scan of the security device and the fingerprint generated for the security device can be determined and a positive authentication result can be identified for the authentication request of the security device responsive to determination that the image similarity index exceeds a threshold value.

Setup procedures for an electronic device
11582517 · 2023-02-14 · ·

In some embodiments, an electronic device can guide the user in setting up the device for the first time or after a factory reset. In some embodiments, an electronic device facilitates suggesting and installing applications on the electronic device during device setup. In some embodiments, an electronic device facilitates transferring settings and information from another electronic device during device setup.

Setup procedures for an electronic device
11582517 · 2023-02-14 · ·

In some embodiments, an electronic device can guide the user in setting up the device for the first time or after a factory reset. In some embodiments, an electronic device facilitates suggesting and installing applications on the electronic device during device setup. In some embodiments, an electronic device facilitates transferring settings and information from another electronic device during device setup.

Data collecting in issue tracking systems
11579954 · 2023-02-14 · ·

A system and method for allowing an assignee to rapidly collect data about a bug/error that is associated with the execution of a software application on a computing device. The method includes including receiving, from a client device, a request to resolve an error associated with an execution of an application on a remote server. The request includes configuration information for connecting to the remote server and an identifier to a component of the application. The method includes determining one or more files associated with the component of the application. The method includes establishing a connection to the remote server using the configuration information. The method includes retrieving the one or more files from the remote server via the connection. The method includes granting, to an assignee device, access to the one or more files that were retrieved from the remote server.

Data collecting in issue tracking systems
11579954 · 2023-02-14 · ·

A system and method for allowing an assignee to rapidly collect data about a bug/error that is associated with the execution of a software application on a computing device. The method includes including receiving, from a client device, a request to resolve an error associated with an execution of an application on a remote server. The request includes configuration information for connecting to the remote server and an identifier to a component of the application. The method includes determining one or more files associated with the component of the application. The method includes establishing a connection to the remote server using the configuration information. The method includes retrieving the one or more files from the remote server via the connection. The method includes granting, to an assignee device, access to the one or more files that were retrieved from the remote server.

Authenticating software images
11580215 · 2023-02-14 · ·

Methods, systems, and devices for authenticating software images are described. A system may include one or more control units that use software images for managing different functions of the system. The system may also include a secure storage device configured to validate or authenticate the software images used by the different control units of the system. A software image of a control unit may be authenticated by generating a first hash associated with a portion of its underlying source code and generating a second hash associated with a corresponding portion of the source code of the copy of the software image stored to the secure storage device. Different patterns of the source code of the software images may be used to generate the hashes. The first hash and second hash may be compared, and the software image may be authenticated based on the hashes matching.

Authenticating software images
11580215 · 2023-02-14 · ·

Methods, systems, and devices for authenticating software images are described. A system may include one or more control units that use software images for managing different functions of the system. The system may also include a secure storage device configured to validate or authenticate the software images used by the different control units of the system. A software image of a control unit may be authenticated by generating a first hash associated with a portion of its underlying source code and generating a second hash associated with a corresponding portion of the source code of the copy of the software image stored to the secure storage device. Different patterns of the source code of the software images may be used to generate the hashes. The first hash and second hash may be compared, and the software image may be authenticated based on the hashes matching.

Provisioning platform for machine-to-machine devices

Techniques described herein include a platform and process for provisioning user information onto a machine-to-machine device in order to enable the machine-to-machine device to conduct transactions utilizing the user information. In some embodiments, a user device is used to relay information between a machine-to-machine device and a provisioning service provider computer. In some embodiments, a machine-to-machine device is connected to the provisioning service provider computer via a network connection. Upon receiving a request to provision the machine-to-machine device, the service provider computer may identify the device from a device identifier. The service provider computer may generate an access credential or token for the machine-to-machine device. The access credential, token, and/or one or more policies may be provisioned onto the machine-to-machine device.