Patent classifications
G06F2221/2111
Mobile communication terminal and control method therefor
A mobile communication terminal A performs near field communication with another mobile communication terminal B by a near field communication unit and obtains a communication distance with another mobile communication terminal B. An information acquisition unit acquires information on another mobile communication terminal B, information on the mobile communication terminal A, or both of the information when the communication distance to the other mobile communication terminal B is equal to or more than a threshold. An abnormality determination unit determines an abnormal state of the mobile communication terminal A based on information (position information, wearing information, or the like) acquired by the information acquisition unit. When the abnormality determination unit determines that the mobile communication terminal A is in the abnormal state, a lock unit locks the mobile communication terminal A, the other mobile communication terminal B or both of those mobile communication terminals.
Computing device use restriction system
A device control method includes monitoring location of a first user device of a first user and receiving an indication of a location of a second user device. The method further includes monitoring use of the second user device and determining a first time of use on the second user device. The first time of use on the second user device is allocated to a use time of a second user based on the location of the first user device relative to the location of the second user device, and a functional component of a third user device of the second user is disabled based at least on the use time of the second user.
Preventing digital forgery
A set of security templates is maintained including first and second templates. The first template specifies time and location stamp authentication for a file, and contextual security conditions that must be met before the file can be accessed. The second template specifies the time and location stamp authentication, but not the contextual security conditions. One of the first or second security templates is applied to the particular file. When the second security template is applied, a GPS-crypto device adds a time and location stamp to the particular file. The particular file is signed using a private key associated with the GPS-crypto device to generate an authentication signature based on the time and location stamp. The authentication signature is added to the particular file to allow a recipient to verify the time and location stamp of the particular file using a public key corresponding to the private key.
Method and Communication Device for Updating Software
A method in a communication device, and a communication device, for executing a software updating process at the communication device is suggested, where the method is executed by acquiring data captured by at least one sensor which is accessible to the communication device, by comparing the acquired data to predefined conditions for initiating a software updating process, and by initiating the software updating process at the communication device in response to determining that the acquired data meet with predefined conditions for updating software at the communication device.
Application Login Method, Method for Accessing Application Server by Application, and Electronic Device
An application login method for accessing an application server by an application includes techniques for an authentication server to complete login authentication on a client application based on authorization request information of the client application in a login request received from a client terminal, determining an application server in a user home country/region of the client application based on user home country/region identification information of the client application in the login request, generating and sending access information about the application server in the user home country/region of the client application.
User controlled event record system
A user controlled mobile device for use in countering phantom billing fraud in connection with receiving or providing health care services includes one or more components capturing and outputting biometric data and location data, and a data storage device holding an event record created without explicit user intervention indicating whether the particular user was at the particular location, the event record including a timestamp corresponding to events at or near a time of the timestamp including a time of capture of the biometric and location data, the biometric data and location data, where the stored event record serves as the personal audit trail evidencing an existence or absence of phantom billing.
DEVICE AND METHOD FOR PRODUCT OWNERSHIP MANAGEMENT
A first computing device for product ownership management is provided. The first computing device is communicatively coupled to a store management system of a retail store. The circuitry determines a first geo-location associated with the first computing device. The circuitry receives credit information, associated with a purchase of a first product by a first user of the first computing device, from the store management system. The credit information may include a second geo-location associated with purchase of the first product. The circuitry compares the first geo-location and the second geo-location and receives product information associated with the purchased first product, based on the comparison. The circuitry stores the received product information and further generates ownership information for the purchased first product via an ownership management software. The circuitry further controls a display screen to display the stored product information and the generated ownership information.
METHOD, APPARATUS, AND SYSTEM FOR ENHANCED WIRELESS MONITORING OF VITAL SIGNS
Methods, apparatus and systems for enhanced wireless monitoring of vital signs are described. In one example, a described system comprises: a transmitter configured to transmit a wireless signal through a wireless channel of a venue; a receiver configured to receive the wireless signal through the wireless channel; and a processor. The received wireless signal differs from the transmitted wireless signal due to the wireless channel that is impacted by a periodic motion of a vital sign of an object in the venue. The processor is configured for: obtaining a time series of channel information (CI) of the wireless channel based on the received wireless signal, computing a two dimensional (2D) decomposition of the time series of CI (TSCI), enhancing the 2D decomposition, and monitoring the periodic motion of the vital sign based on the enhanced 2D decomposition.
Proximity-sensor supporting multiple application services
A personal digital key (e.g., which can be carried by a human) contains a memory having different service blocks. Each service block is accessible by a corresponding service block access key. As the personal digital key (PDK) moves around, it is detected by sensors. The sensors report position data, thus enabling location tracking of the PDK. The sensors also provide a data path to various applications. An application that has access to a service block access key can therefore access the corresponding service block on the PDK. The sensors themselves may also contain service block access keys.
Systems and methods for authentication using radio frequency tags
Systems and methods for authentication using radio frequency tags are disclosed. In one embodiment, a method for approving a requested operation from a secondary user of a resource that is controlled by a primary user may include (1) a back end comprising at least one computer processor receiving, from a mobile application that is executed by a mobile device associated with a secondary user, a requested operation involving a resource that is controlled by a primary user; (2) the back end receiving a unique identifier from the secondary user mobile application, the unique identifier being read by the mobile application from a tag associated with the secondary user; (3) the back end determining that the received unique identifier matches a stored unique identifier that is associated with the secondary user; and (4) the back end approving the requested operation and communicating the approval to the secondary user mobile application.