H04W12/02

METHOD AND SYSTEM FOR MANAGING ENCRYPTED DATA OF DEVICES
20180013830 · 2018-01-11 ·

A method for managing data of devices using one or more computing entities includes encrypting, by one or more encrypting entities, the data based on encryption policies using encryption keys; storing the encrypted data as ciphertext at a storing entity; requesting decryption keys to decrypt the stored ciphertext by one or more clients; computing restricted decryption keys based on access right policies for the requesting clients by a security management entity; and providing the generated decryption keys to the requesting clients for decrypting the stored ciphertext.

Methods and Systems for Detecting Persons in a Smart Home Environment

The various implementations described herein include methods, devices, and systems for detecting motion and persons. In one aspect, a method is performed at a smart home system that includes a video camera, a server system, and a client device. The video camera captures video and audio, and wirelessly communicates, via the server system, the captured data to the client device. The server system: (1) receives and stores the captured data from the video camera; (2) determines whether an event has occurred, including detected motion; (3) in accordance with a determination that the event has occurred, identifies video and audio corresponding to the event; and (4) classifies the event. The client device receives information indicative of the identified events, displays a user interface for reviewing the video and audio stored by the remote server system, and displays the at least one classification for the event.

Methods and Systems for Detecting Persons in a Smart Home Environment

The various implementations described herein include methods, devices, and systems for detecting motion and persons. In one aspect, a method is performed at a smart home system that includes a video camera, a server system, and a client device. The video camera captures video and audio, and wirelessly communicates, via the server system, the captured data to the client device. The server system: (1) receives and stores the captured data from the video camera; (2) determines whether an event has occurred, including detected motion; (3) in accordance with a determination that the event has occurred, identifies video and audio corresponding to the event; and (4) classifies the event. The client device receives information indicative of the identified events, displays a user interface for reviewing the video and audio stored by the remote server system, and displays the at least one classification for the event.

CRYPTOGRAPHIC KEY EXCHANGE OVER AN ELECTROSTATIC CHANNEL
20180014186 · 2018-01-11 · ·

Various embodiments relating to exchanging a cryptographic key between a display device and an input device via electrostatic communication are disclosed. In one embodiment, an interactive communication device includes one or more electrodes and a radio transceiver. The one or more electrodes may be excited to capacitively couple with one or more electrodes of a proximate communication device so as to capacitively send a cryptographic key from the interactive communication device to the proximate communication device. The radio transceiver may be configured to communicate with a radio transceiver of the proximate communication device via a radio channel. The interactive communication device may be configured to subsequently exchange encrypted communications with the proximate communication device over the radio channel. The encrypted communications may be encrypted using the cryptographic key.

Systems and methods to prevent private data misuse by insider
11711352 · 2023-07-25 · ·

Described embodiments provide systems and methods for protecting private data or confidential information. A device can receive a request from a client for a page from a server that includes confidential information to be verified with an owner of the confidential information. The device may be intermediary between the client and the server. Prior to providing the page to the client for rendering, the device may replace a first user interface (UI) element having the confidential information in the page, with a second UI element to obfuscate the confidential information. The device may receive an activation of the second UI element to request the owner to verify the confidential information from the client. The device may send to the client an update to the page to include an indication of whether the confidential information has been correctly verified with the owner.

APPARATUS AND METHOD FOR ENHANCING PERSONAL INFORMATION DATA SECURITY

The present disclosure relates to a communication technique for converging a 5G communication system for supporting a higher data rate beyond a 4G system with an IoT technology, and a system therefor. The present disclosure can be applied to intelligent services on the basis of a 5G communication technology and an IoT-related technology (for example, smart home, smart building, smart city, smart car or connected car, healthcare, digital education, retail, security and safety-related service, and the like). The present invention provides a method for enhancing data security, comprising: when a request message including information related to a first privacy level is received from a user device, authenticating the user device; when the user device is an authenticated device as a result of the authentication, verifying the information related to the first privacy level; and when the verification of the information related to the first privacy level is completed, transmitting, to the user device, an image processed on the basis of the first privacy level among images processed on the basis of a plurality of privacy levels.

SIGNAL SENDING METHOD AND DEVICE
20180013515 · 2018-01-11 · ·

The present disclosure discloses a signal sending method and device. The method includes: receiving, by a base station, an uplink pilot signal sent by authorized user equipment, and determining a direction vector parameter and a first channel fading parameter of a channel calculating, according to the direction vector parameter and the first channel fading parameter, a first signal beamformer parameter, determining a transmission area of an artificial noise signal according to the direction vector parameter, and calculating a second signal beamformer parameter; and processing a to-be-transmitted signal by using the first signal beamformer parameter and the second signal beamformer parameter, and transmitting the processed signal. In this way, in a non-target direction, energy leakage of the secrecy signal to the authorized user equipment is relatively small, and transmitted artificial noise signals are concentrated in an area with a relatively high secrecy signal leakage risk.

ELECTRONIC CONTENT REQUESTS

Systems, methods, and computer-readable medium are provided for managing electronic content requests. For example, a user device may collect usage information associated with use of the user device. The user device may transmit data corresponding to a first category of usage information to a service provider. In some examples, a file that comprises a plurality of electronic content items can be received. The file may also contain logic for determining which of the content items to display. The logic may be executed to determine a particular item of the content items to display based at least in part on additional data corresponding to a second category of the usage information. In some examples, the user device may prepare the particular content item for display.

ELECTRONIC CONTENT REQUESTS

Systems, methods, and computer-readable medium are provided for managing electronic content requests. For example, a user device may collect usage information associated with use of the user device. The user device may transmit data corresponding to a first category of usage information to a service provider. In some examples, a file that comprises a plurality of electronic content items can be received. The file may also contain logic for determining which of the content items to display. The logic may be executed to determine a particular item of the content items to display based at least in part on additional data corresponding to a second category of the usage information. In some examples, the user device may prepare the particular content item for display.

HEALTH DEVICE, GATEWAY DEVICE AND METHOD FOR SECURING PROTOCOL USING THE SAME

Disclosed herein are a health device, a gateway device, and a method for securing a protocol using the health device and the gateway device. The method includes performing, by the health device and the gateway device, authentication and key exchange based on security session information; sending, by any one of the health device and the gateway device, an application message protected based on the security session information; and receiving, by a remaining one of the health device and the gateway device, the protected application message.