Patent classifications
H04W12/009
Interactive local information interface
Example implementations include a method, apparatus and computer-readable medium for managing and communicating local information of an area, comprising receiving a user identification information of a user in the area. The implementations further include determining a user identification of the user based on the user identification information. Additionally, the implementations further include obtaining a first information based on the user identification, wherein the first information comprises a first set of local information associated with the area. Additionally, the implementations further include instructing display of the first information. Additionally, the implementations further include receiving a user input from the user in response to the first information. Additionally, the implementations further include instructing display of a second information based on the user identification and the user input, wherein the second information comprises a second set of local information of the area based on at least one local device and the user input.
Ransomware protection for cloud storage systems
Exemplary security applications and systems are described herein. Such embodiments may be configured to provide backup functionality and ransomware protection for cloud storage systems. The described embodiments may monitor cloud storage systems to detect and classify various events. And the embodiments may perform any number of actions based on classified events, such as transmitting notifications to users, preventing a user or application from accessing the cloud storage system, and/or restoring infected files.
COMMUNICATION DEVICE AND METHOD FOR SECURE COMMUNICATION
A first communication device for use in a wireless communication system to communicate with a second communication device comprises circuitry configured to transmit probe signals into multiple directions, receive echo signals in response to the transmitted probe signals, and determine the position of a potentially eavesdropping communication device from the received echo signals.
SYSTEMS AND METHODS FOR MANAGEMENT OF NON-FUNGIBLE TOKENS AND CORRESPONDING DIGITAL ASSETS
Systems and techniques are described for situational token-associated media output. A system receives sensor data captured by at least one sensor of a media device. The system identifies, based on the sensor data, a relationship between the media device and an anchor element that is associated with a token. The system identifies the token in a payload of at least one block of a distributed ledger. The token corresponds to media content according to the distributed ledger. The system generates a representation of the media content corresponding to the token. In response to identifying the relationship between the media device and the anchor element, the system outputs the representation of the media content.
ACTIVATION OF GATEWAY DEVICE
Systems and methods for activating an interface device for use at a premises are described. An interface device may be activated for a security system at the premises. The interface device may communicate with a remote server to request activation. The remote server may also be in communication with a user device. A correspondence of a first address of the interface device and a second address of the user device may be used to authorize the interface device for activation. The interface device may receive an activation message and begin communicating with and controlling a security system and other devices at the premises.
System and method to deliver converged public and private network services over disparate access mediums across regional markets
Systems, methods, and devices for providing a user equipment (UE) device that is associated with a private network service (PrNS) and communicatively attached a public WiFi network in a remote market being serviced by a different headend than the UE device's home network with public or private network services.
Vehicle access based on RF digests/backgrounds
According to certain examples, a circuit-based wireless communications system provides secure access to a vehicle by way of certain circuitry configure to compare a first RF background observed for a vehicle-located RF receiver that is part of a vehicle-located circuit secured to a vehicle, with a second RF background observed for a wireless-communications vehicle-access circuit that includes another RF receiver. In response, a distance metric is generated to indicate a degree of similarity between the first RF background and the second RF background, and based on whether this metric satisfies a threshold, access to the vehicle may be granted via the wireless-communications vehicle-access circuit.
Safety network of things
An apparatus includes a first sensor, and a network interface that sends a registration request and receives a recording request. The registration request indicates an identity of the first sensor, an Internet address of the apparatus, and a physical address of the apparatus. The recording request identifies the first sensor. The first sensor records data to produce a recording, at least in part based on the recording request.
FUGITIVE GAS DETECTION SYSTEM
A fugitive gas detection system is provided. The system includes a cloud service, a plurality of reach-based components, a plurality of wireless gas sensors. The reach-based components comprise backhauls and gateways. The wireless gas sensors are acted as nodes to acquire sensor data in a local mesh network and the nodes are connected to the cloud service through the reach-based components, one node can transmit the sensor data to other sensor nodes of the local mesh network. The system measures flammable gas levels with speed, economy and accuracy.
ENVIRONMENTAL TASK-BASED AUTHENTICATION
A processing system may detect a physical location of a user via at least one mobile computing device of the user, where the user is to be authenticated for a network-based transaction, identify at least one network-connected sensor device at the physical location, and determine, from the at least one network-connected sensor device, a set of environmental conditions of an environment of the physical location. The processing system may next identify at least one action for the user to perform to interact with at least one aspect of the environment in accordance with the set of environmental conditions and transmit an instruction to the user to perform the at least one action. The processing system may then obtain sensor data from the at least one network-connected sensor device, determine, from the sensor data, that the user performed the at least one action, and authenticate the user for the network-based transaction.