H04W12/009

Fugitive gas detection system

A fugitive gas detection system is provided. The system includes a cloud service, a plurality of reach-based components, a plurality of wireless gas sensors. The reach-based components comprise backhauls and gateways. The wireless gas sensors are acted as nodes to acquire sensor data in a local mesh network and the nodes are connected to the cloud service through the reach-based components, one node can transmit the sensor data to other sensor nodes of the local mesh network. The system measures flammable gas levels with speed, economy and accuracy.

DEVICE-ENABLED ACCESS CONTROL IN A MESH NETWORK
20230216803 · 2023-07-06 · ·

A method including receiving, by a device in communication with a first endpoint and a second endpoint in a mesh network, a first communication from the first endpoint and a second communication from the second endpoint; selectively comparing, by the device, first observed connection state information associated with the first communication with the stored connection state information associated with outgoing communications transmitted by the device, and second observed connection state information associated with the second communication with the stored connection state information; and selectively processing, by the device, the first communication based at least in part on a result of selectively comparing the first observed connection state information with the stored connection state information, and the second communication based at least in part on a result of selectively comparing the second observed connection state information with the stored connection state information. Various other aspects are contemplated.

Misbehavior detection in autonomous driving communications

A first roadway system receives a communication from a second roadway system over a wireless channel, where the communication includes a description of a physical object within a driving environment. Characteristics of the physical object are determined based on sensors of the first roadway system. The communication is determined to contain an anomaly based on a comparison of the description of the physical object with the characteristics determined based on the sensors of the first roadway system. Misbehavior data is generated to describe the anomaly. A remedial action is initiated based on the anomaly.

Malicious anchor node detection and target node localization method based on recovery of sparse terms
11696135 · 2023-07-04 · ·

A malicious anchor node detection and target node localization method based on recovery of sparse terms, includes: S1: establishing an unknown disturbance term by using ranging value attack terms from an attacker to nodes in a wireless sensor network, and introducing a to-be-estimated location of a target node to the unknown disturbance term, to obtain an unknown sparse vector; S2: converting a problem of malicious anchor node detection and target node localization into a problem of recovery of the unknown sparse vector; S3: determining a location of an initial node according to a recursive weighted linear least square method, and recovering and reconstructing the unknown sparse vector with sparsity; and S4: determining a malicious anchor node determination range by approximating a threshold using a recovered value of the unknown sparse vector, to implement malicious anchor node detection, and recovering and determining location information of the target node.

Continuous multifactor device authentication

A device is authenticated for communication over a network based on a sensor data signature and a traffic pattern signature. The sensor data signature and the traffic pattern signature identify the device. A determination is made whether the sensor data signature corresponds to one of a plurality of recognized sensor data signatures. A determination is also made whether the traffic pattern signature of the device corresponds to one of a plurality of recognized traffic pattern signatures. The device is authenticated for communication over the network responsive to determining that the sensor data signature corresponds to one of the plurality of recognized sensor data signatures and the traffic pattern signature corresponds to one of the plurality of recognized traffic pattern signatures.

Vehicle messaging

A central computer includes a first processor and a first memory. A portable computer includes a second processor and a second memory. The portable computer is programmed to: obtain an identifier of a vehicle via a scanner included in the portable computer, and transmit the identifier and first validation data to the central computer, and transmit a message to the central computer for a destination computer. The central computer is programmed to receive the identifier and the first validation data from the portable computer, determine second validation data; identify a destination computer based on the identifier, and upon determining that a comparison of the first validation data and the second validation data meets a specified criterion, transmit the message from the portable computer to the destination computer.

Networked Electronic Device with Secondary Wireless Communication Path for Primary Network Setup
20220418024 · 2022-12-29 ·

An electronic monitoring system is provided that implements at least two communication paths using primary and secondary radios for facilitating self-installation or setup of electronic devices such as monitoring devices and/or various smart home devices using one of the communication paths to transmit various network and other credentials. The system may allow a device to automatically set itself up by scanning for a cooperating network device, such as a hub, that can provide network and/or user account information to the device, facilitating integration or onboarding of the device with minimal or without user action. The secondary radio may have a range at least commensurate with, and typically longer than, the range of the primary radio, permitting device setup anywhere within the system's primary coverage area.

MEC-based distributed computing environment with multiple edge hosts and user devices

Various systems and methods for enhancing a distributed computing environment with multiple edge hosts and user devices, including in multi-access edge computing (MEC) network platforms and settings, are described herein. A device of a lifecycle management (LCM) proxy apparatus obtains a request, from a device application, for an application multiple context of an application. The application multiple context for the application is determined. The request from the device application for the application multiple context for the application is authorized. A device application identifier based on the request is added to the application multiple context. A created response for the device application based on the authorization of the request is transmitted to the device application. The response includes an identifier of the application multiple context.

Method and apparatus for managing user authentication in a blockchain network

Provided is an apparatus for managing user authentication in a blockchain network and the apparatus comprises a processor configured to transmit, to a server, a request for a snapshot identifier (ID) with user data comprising at least one of one-time password, biometric data, context data, routine data, or device metadata, receive the snapshot ID generated based on the user data, initiate a transaction with the snapshot ID in the blockchain network comprising a blockchain server which authenticates the snapshot ID, and output blockchain transaction data associated with the transaction based on the authentication of the snapshot ID.

Data system on a module (DSoM) for connecting computing devices and cloud-based services
11537631 · 2022-12-27 · ·

A communication device (e.g., a data system on a module (DSoM)/a Data System in a Package (DSiP)) for communicatively coupling a computing device with a cloud-based service to synchronize one or more data modifications, on an asynchronous basis with respect to one another is provided. The communication device may be configured to be communicatively coupled to the computing device and may include a wireless cellular transceiver. The communication device may be configured to one or more of transmit at least one data object from the computing device to the cloud-based service and receive at least one data object from the cloud-based service. Embodiments of the present disclosure may provide a distributed replicated spatiotemporal database packaged on a communication device and integrated with an internet-based secure communication hub.