Patent classifications
H04W12/30
ACCOUNT BINDING METHOD, DEVICE, AND SYSTEM
The technology of this application relates to an account binding method, a device, and a system, and relates to the field of electronic technologies. An electronic device logs in to a user account of a first application. After detecting a first preset operation of a user, the electronic device obtains, by using the first application, an OpenID corresponding to the user account of the first application, where the first preset operation is used to indicate to associate a second application with the first application. The electronic device sends the OpenID of identity information of the second application to a server of the first application, and obtains account binding success information from the server of the first application.
METHODS AND DEVICES FOR PHYSICAL ACCESS CONTROL SYSTEMS
An access control system includes a plurality of physical access control readers that form a reader network which utilizes a first communication protocol. The system includes a plurality of mobile communication devices each having a first communication interface and a second communication interface. The first communication interface enables the mobile communication devices to access a mobile communication network which utilizes a second communication protocol, and the second communication interlace enables the mobile communication devices to communicate with the access control readers. The plurality of physical access control readers exchange status information for the plurality of physical access control readers and for the plurality of mobile communication devices over the reader network.
METHODS AND DEVICES FOR PHYSICAL ACCESS CONTROL SYSTEMS
An access control system includes a plurality of physical access control readers that form a reader network which utilizes a first communication protocol. The system includes a plurality of mobile communication devices each having a first communication interface and a second communication interface. The first communication interface enables the mobile communication devices to access a mobile communication network which utilizes a second communication protocol, and the second communication interlace enables the mobile communication devices to communicate with the access control readers. The plurality of physical access control readers exchange status information for the plurality of physical access control readers and for the plurality of mobile communication devices over the reader network.
Provisioning a device in a network
In some examples, a headless device that is without an available user interface and that is to be provisioned for access to a network receives information relating to provisioning of the headless device from a network node. The headless device sends, to a mediator device with a user interface, at least a portion of the received information. The headless device receives, from the mediator device, information to proceed with the provisioning of the headless device.
MOBILE DEVICE DATA SECURITY USING SHARED SECURITY VALUES
A method is disclosed. The method includes providing, by an SDK and a first application in a mobile device, first and second security values to a security value verification module in the mobile device. If the mobile device confirms that the first and second security values match, then a second application can proceed with interaction processing.
MOBILE DEVICE DATA SECURITY USING SHARED SECURITY VALUES
A method is disclosed. The method includes providing, by an SDK and a first application in a mobile device, first and second security values to a security value verification module in the mobile device. If the mobile device confirms that the first and second security values match, then a second application can proceed with interaction processing.
Methods and systems to identify a compromised device through active testing
Methods and devices for determining whether a mobile device has been compromised. File tree structure information for the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in a portion of memory. The file tree structure information is analyzed to determine that the mobile device has been compromised, has not been compromised, or might be compromised. Based on determining that the mobile device might be compromised, the mobile device is instructed to execute a restricted action. If the restricted action occurs on the mobile device then it is determined that the mobile device has been compromised. Based on that determination, an action is taken.
Methods and systems to identify a compromised device through active testing
Methods and devices for determining whether a mobile device has been compromised. File tree structure information for the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in a portion of memory. The file tree structure information is analyzed to determine that the mobile device has been compromised, has not been compromised, or might be compromised. Based on determining that the mobile device might be compromised, the mobile device is instructed to execute a restricted action. If the restricted action occurs on the mobile device then it is determined that the mobile device has been compromised. Based on that determination, an action is taken.
Actionable artificial intelligence (“AI”) notification platform
An actionable alert platform is provided. The platform may utilize artificial intelligence (“AI”) to formulate alert triggers that inform a user regarding unusual activity associated with a target transaction. The platform allows a user to enter customized criteria for an alert trigger and actionable responses for remediating the detected alert trigger. In response to detecting an alert trigger, the platform may formulate and transmit push notifications to a mobile device of user. The user may implement the actionable response directly from within the push notification. The platform may also provide push notifications to the user that advise on a status of the target transaction after applying the actionable response. An AI engine may generate additional alert triggers based on the criteria entered by the user. The AI engine may generate the actionable responses for any alert trigger.
Mobile WLAN gateway
A technique for operating a mobile station as wireless local-area network [“WLAN”] gateway. The mobile station is provided with a gateway application to control the following operations: activating (3-0) the WLAN means as a WLAN base station capable of communicating with at least one WLAN terminal over a WLAN network; creating a network identifier (3-2, 3-4) for the WLAN base station; assigning (3-8, 3-10) an internet protocol address for the at least one WLAN terminal; resolving domain name service [“DNS”] queries (3-12 . . . 3-18) in cooperation with an external DNS service system; assigning at least one port number for each protocol supported by the gateway application; and tunneling internet traffic (3-30 . . . 3-36) between the at least one WLAN terminal and an internet host over the broadband connection.