H04W12/08

SYSTEM AND METHOD FOR ACCESS CONTROL VIA MOBILE DEVICE

A system is described for controlling an actuating unit that restricts physical access such as a motorized garage door actuator unit. The system comprises a mobile wireless communication device, an electro-mechanical access control security device, and a receiving unit controlling the electro-mechanical access control security device, the receiving unit paired with the mobile wireless communication device for receiving user input for activating the electro-mechanical access control security device via a peer-to-peer communication directly with the mobile wireless communication device, and a pre-authorization of communication of the receiving unit with the mobile wireless communication device, the mobile wireless communication device receiving the pre-authorization from a central security server.

METHOD OF MANAGING SHARED FILES AND DEVICE FOR AUTHENTICATING SUBSCRIBER BY USING SAME

A method of managing a file of a subscriber authenticating module embedded in a terminal device and a module for authenticating a subscriber by using the method. The method of managing the file includes configuring a file structure for one or more profiles and managing one or more files included in the file structure in response to a request. Thus, the method is efficient for a multiple-profile environment.

METHOD OF MANAGING SHARED FILES AND DEVICE FOR AUTHENTICATING SUBSCRIBER BY USING SAME

A method of managing a file of a subscriber authenticating module embedded in a terminal device and a module for authenticating a subscriber by using the method. The method of managing the file includes configuring a file structure for one or more profiles and managing one or more files included in the file structure in response to a request. Thus, the method is efficient for a multiple-profile environment.

IDENTIFICATION OF SOURCES OF MEDIA TRAFFIC THROUGH A NETWORK

A method for identifying one or more unauthorised routes used for the termination of application-to-person (A2P) short message service (SMS) messages to a mobile telecommunications network, and a system for use in performing the method. An application service is stimulated to generate an A2P SMS message, and to send it to a collection point. The message is processed to obtain an identifier identifying a source of the message, and it is determined whether the identifier corresponds to an authorised source of A2P traffic to the network.

IDENTIFICATION OF SOURCES OF MEDIA TRAFFIC THROUGH A NETWORK

A method for identifying one or more unauthorised routes used for the termination of application-to-person (A2P) short message service (SMS) messages to a mobile telecommunications network, and a system for use in performing the method. An application service is stimulated to generate an A2P SMS message, and to send it to a collection point. The message is processed to obtain an identifier identifying a source of the message, and it is determined whether the identifier corresponds to an authorised source of A2P traffic to the network.

Methods and Systems for Detecting Persons in a Smart Home Environment

The various implementations described herein include methods, devices, and systems for detecting motion and persons. In one aspect, a method is performed at a smart home system that includes a video camera, a server system, and a client device. The video camera captures video and audio, and wirelessly communicates, via the server system, the captured data to the client device. The server system: (1) receives and stores the captured data from the video camera; (2) determines whether an event has occurred, including detected motion; (3) in accordance with a determination that the event has occurred, identifies video and audio corresponding to the event; and (4) classifies the event. The client device receives information indicative of the identified events, displays a user interface for reviewing the video and audio stored by the remote server system, and displays the at least one classification for the event.

Methods and Systems for Detecting Persons in a Smart Home Environment

The various implementations described herein include methods, devices, and systems for detecting motion and persons. In one aspect, a method is performed at a smart home system that includes a video camera, a server system, and a client device. The video camera captures video and audio, and wirelessly communicates, via the server system, the captured data to the client device. The server system: (1) receives and stores the captured data from the video camera; (2) determines whether an event has occurred, including detected motion; (3) in accordance with a determination that the event has occurred, identifies video and audio corresponding to the event; and (4) classifies the event. The client device receives information indicative of the identified events, displays a user interface for reviewing the video and audio stored by the remote server system, and displays the at least one classification for the event.

ACCESS CONTROL METHOD AND ACCESS CONTROL APPARATUS
20180014188 · 2018-01-11 · ·

Embodiments of the present application disclose access control method and an access control apparatus. A method disclosed herein comprises: sending information associated with authentication of at least one access point device; and controlling at least one second device to access a target access point device through at least one first device; wherein the at least one first device is a device that receives the information associated with authentication of at least one access point device. The methods and apparatus of the embodiments of the present application, by using an authentication manner through cooperation between devices, enable a device currently used by a user to rapidly and efficiently access a target access point device, so as to more efficiently obtain access to a wireless local area network.

ACCESS CONTROL METHOD AND ACCESS CONTROL APPARATUS
20180014188 · 2018-01-11 · ·

Embodiments of the present application disclose access control method and an access control apparatus. A method disclosed herein comprises: sending information associated with authentication of at least one access point device; and controlling at least one second device to access a target access point device through at least one first device; wherein the at least one first device is a device that receives the information associated with authentication of at least one access point device. The methods and apparatus of the embodiments of the present application, by using an authentication manner through cooperation between devices, enable a device currently used by a user to rapidly and efficiently access a target access point device, so as to more efficiently obtain access to a wireless local area network.

SYSTEM AND METHOD FOR DIGITAL COMMUNICATION BETWEEN COMPUTING DEVICES
20180014241 · 2018-01-11 ·

A wireless communication device, comprising radio frequency transceivers which transmit outbound messages to targeted receivers, and receive the inbound messages addressed to the respective transceiver; each having a processor which controls the transceiver to establish communication sessions according to a protocol, and processes targeting and address information. The transceiver communicates with a telephone device having a telephone address book containing information which defines the targets and address for a telephone network and perhaps other networks. The address book entries are human editable through a human machine user interface. The address book entries are intended for centrally controlled switch networks having hierarchically formatted address information, but since these are at least quasi-unique, they are used as address labels in an unswitched peer-to-peer network formed of the transceivers. This permits a common address scheme across the peer-to-peer network and switched network of the telephone device.