H04W12/08

Landing page redirect with synchronized mini-servers

Techniques for redirecting a client device from a server to a mini-server are disclosed herein. Initially, the client device establishes a connection with the server. The server provides a landing page to the client device, where the landing page is programmed to include an element that, when selected, redirects the client device away from its connection with the server. In response to a selection of the element, the client device establishes a connection with the mini-server. The mini-server is part of a first local area network (LAN), and, as a result of switching networks, the client device is now a part of a second LAN. The two LANs are connected to one another via a network bridge. The mini-server is able to receive input from the client device and synchronize that input across other mini-servers in the first LAN in order to redundantly store the input.

COMMUNICATION DEVICE, CONTROL METHOD, AND STORAGE MEDIUM
20230011936 · 2023-01-12 ·

In a case where a frequency band in which a wireless network 101 is established by a communication device (102) is switched from a 6 GHz band to another frequency band, the communication device (102) generates a management frame complying with Institute of Electrical and Electronics Engineers (IEEE) 802.11 series standards including Robust Security Network Element (RSNE) including a value “1” in a Management Frame Protection Capable (MFPC) field and a value “0” in a Management Frame Protection Required (MFPR) field, and transmits the generated management frame.

BYSTANDER-CENTRIC PRIVACY CONTROLS FOR RECORDING DEVICES
20230011087 · 2023-01-12 ·

A recording device provides bystander-centric privacy controls for authorizing the storage of a bystander's identifying information (e.g., video or audio recordings of the bystander). Before a recording device can store identifying information of bystanders, the bystanders may indicate to the recording device whether they authorize the storage. If the bystanders do not authorize the storage, the recording device may modify the identifying information captured by sensors, such as a video camera or a microphone, such that the identity of the non-authorizing bystander is not identifiable through the modified identifying information. Thus, bystanders are given increased agency over whether they want to be recorded. Further, if the bystanders do not want to be recorded, sensor data that may identify them is modified by the recording device to prevent unwanted exposure of their identity in recorded content.

Access control for named domain networking

The disclosure is directed to providing content access control in information centric networking (ICN) networks. Methods and systems include hardware and/or software that perform operations for sending to a content provider of an ICN network an access request for content in response to receiving a first content request from a client. The operations also include receiving from the content provider access control information for the content. The operations further include sending to the client a challenge. Additionally, the operations include receiving from the client an authorization of the content provider that includes information obtained by the client from the content provider based on the challenge. Furthermore, the operations include verifying the authorization received from the client using the access control information received from the content provider. Moreover, the operations include sending to the client the content.

Access control for named domain networking

The disclosure is directed to providing content access control in information centric networking (ICN) networks. Methods and systems include hardware and/or software that perform operations for sending to a content provider of an ICN network an access request for content in response to receiving a first content request from a client. The operations also include receiving from the content provider access control information for the content. The operations further include sending to the client a challenge. Additionally, the operations include receiving from the client an authorization of the content provider that includes information obtained by the client from the content provider based on the challenge. Furthermore, the operations include verifying the authorization received from the client using the access control information received from the content provider. Moreover, the operations include sending to the client the content.

Mobile application for smart systems interaction

A building control system includes a plurality of interconnected building systems. A mobile application is configured to be installed on at least one mobile device. The mobile application is configured to cause the mobile device to interface with the building server and to display a graphical user interface (GUI). The GUI includes an elevator pane configured to allow a user to interface with a building elevator control system.

System and method for using unique device identifiers to enhance security

A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can transmit access data to a second electronic device. The access data can be associated with a first access code that can be generated based at least in part on data representing a device identifier of the first electronic device. A device identifier can uniquely identify the first electronic device from a plurality of electronic devices. Transferring the access data can involve transforming the first access code into a second access code that can include data representing a device identifier associated with the second electronic device. Transforming the first access code into the second access code can facilitate access to a resource associated with the access data for a second user, but not for a first user.

System and method for using unique device identifiers to enhance security

A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can transmit access data to a second electronic device. The access data can be associated with a first access code that can be generated based at least in part on data representing a device identifier of the first electronic device. A device identifier can uniquely identify the first electronic device from a plurality of electronic devices. Transferring the access data can involve transforming the first access code into a second access code that can include data representing a device identifier associated with the second electronic device. Transforming the first access code into the second access code can facilitate access to a resource associated with the access data for a second user, but not for a first user.

Information processing method and apparatus

An information processing method includes: obtaining, by a data analytics network element, terminal behavioral information of a plurality of terminals; determining, by the data analytics network element, network-side expected terminal behavioral information based on the terminal behavioral information; and sending, by the data analytics network element, the network-side expected terminal behavioral information to a user data management network element.

Secure elements broker (SEB) for application communication channel selector optimization
11595820 · 2023-02-28 · ·

Systems and methods for managing concurrent secure elements on a mobile device to coordinate with an application or “app” running on the mobile device and an appropriate communications protocol for conducting transactions using the mobile device include: informing, by the processor, the reader device of a preferred app and a communication protocol usable by the preferred app; receiving, by the processor, information about which apps and communication protocols are supported by a reader for processing a transaction; locating, by the processor, a secure element supporting an app and a communication protocol supported by the reader; channeling the communication protocol for the specific configuration of the app and the supporting secure element; activating the secure element that supports the app; and processing, with the activated secure element, using the supported app and communication channel, the transaction with the reader.