Patent classifications
H04W12/50
Device registration to management domain
The technology disclosed herein pertains to a method for mobile storage device registration to a management domain using a random token and a pin. In at least one implementation, a technology disclosed herein provides a method of authenticating a device on a system, the method including generating a random token, displaying the random token to a user, communicating the random token to an authentication system portal, in response the authentication system portal validating the random token receiving a PIN from the user, and communicating the PIN to the authentication system portal, and receiving a portal IP address and a certificate of authentication from the authentication system portal.
System and method for encounter identity verification
Systems and methods for verifying an identity of a first user involves receiving, at a server, a request from a communicatively coupled device of a second user to access information of the first user. The request includes information retrieved from a passive communication device associated with the first user and location information of the communicatively coupled device. In response, a location of an authenticated mobile device of the first user is determined, and when a location match is present, the identity of the first user is confirmed to the second user, and the second user is permitted to provide input into an account of the first user, such as for rating and reporting the performance of the first user. When a location match is not present, a message is transmitted to the second user indicating the identity of the first user is not confirmed and instructions provided to take action.
System and method for encounter identity verification
Systems and methods for verifying an identity of a first user involves receiving, at a server, a request from a communicatively coupled device of a second user to access information of the first user. The request includes information retrieved from a passive communication device associated with the first user and location information of the communicatively coupled device. In response, a location of an authenticated mobile device of the first user is determined, and when a location match is present, the identity of the first user is confirmed to the second user, and the second user is permitted to provide input into an account of the first user, such as for rating and reporting the performance of the first user. When a location match is not present, a message is transmitted to the second user indicating the identity of the first user is not confirmed and instructions provided to take action.
Methods, systems, and media for protected near-field communications
Methods, systems, and media for protected near-field communications are provided. In some embodiments, the method comprises: receiving, from an NFC tag device, a request for an NFC reader device identifier (ID); transmitting the NFC reader device ID to the NFC tag device; receiving an NFC tag device ID; determining whether the NFC tag device ID matches an NFC tag device ID stored in memory of the NFC reader device; in response to determining that the NFC tag device ID matches the NFC tag device ID, transmitting a password to the NFC tag device; receiving, from the NFC tag device, a shared secret; determining whether the received shared secret matches a shared secret stored in the memory of the NFC reader device; and in response to determining that the received shared secret matches the shared secret, causing an action to be performed by a device associated with the NFC reader device.
Methods, systems, and media for protected near-field communications
Methods, systems, and media for protected near-field communications are provided. In some embodiments, the method comprises: receiving, from an NFC tag device, a request for an NFC reader device identifier (ID); transmitting the NFC reader device ID to the NFC tag device; receiving an NFC tag device ID; determining whether the NFC tag device ID matches an NFC tag device ID stored in memory of the NFC reader device; in response to determining that the NFC tag device ID matches the NFC tag device ID, transmitting a password to the NFC tag device; receiving, from the NFC tag device, a shared secret; determining whether the received shared secret matches a shared secret stored in the memory of the NFC reader device; and in response to determining that the received shared secret matches the shared secret, causing an action to be performed by a device associated with the NFC reader device.
Mobile device vehicle bonding with inactive bond records
A method for forming bonded mobile device connection with a vehicle includes determining a request count comprising a plurality of Bluetooth advertisement requests received from a mobile device with respect to time, determining an invalid Consumer Access Key (CAK) transmission count associated with the plurality of Bluetooth advertisement requests, generating an active bond record with the request count and the invalid CAK transmission count, determining, based on the active bond record, that a Global Attribute Profile (GATT) service associated with the mobile device is inactive, and disabling a Bluetooth advertisement response setting associated with the GATT service.
Mobile device vehicle bonding with inactive bond records
A method for forming bonded mobile device connection with a vehicle includes determining a request count comprising a plurality of Bluetooth advertisement requests received from a mobile device with respect to time, determining an invalid Consumer Access Key (CAK) transmission count associated with the plurality of Bluetooth advertisement requests, generating an active bond record with the request count and the invalid CAK transmission count, determining, based on the active bond record, that a Global Attribute Profile (GATT) service associated with the mobile device is inactive, and disabling a Bluetooth advertisement response setting associated with the GATT service.
LOCKING FUNCTION FOR A MOBILE DEVICE
A mobile device comprises a functional arrangement for performing a function of the mobile device, a coupling device for connecting the mobile device to a stationary device, an authentication device for authenticating the stationary device and an activation device. The authentication device authenticates the stationary device based on information on the stationary device. The activation device activates the functional arrangement when the mobile device is connected to the stationary device by the coupling device, and when the stationary device has been authenticated by the authentication device.
MULTIPLE COEXISTING PERSONAL AREA NETWORKS HAVING DIFFERENT HANDSHAKING
An electronic device is described. This electronic device may include a radio that supports multiple coexisting networks having different handshaking and a common PAN communication protocol. During operation, a single radio in the electronic device may provide different beacons for the coexisting networks. Then, the radio may receive a response associated with another electronic device, where the response may specify a first coexisting network in the coexisting networks. Next, the radio may establish a connection with the other electronic device, where establishing the connection involves performing handshaking associated with the first coexisting network. Note that the common PAN communication protocol may include: Bluetooth, BLE, Zigbee, or Z-Wave.
ACCESSING CORPORATE RESOURCES THROUGH AN ENROLLED USER DEVICE
Systems and methods are described for accessing resources of a Unified Endpoint Management (“UEM”) system through an enrolled device. In an example, an unenrolled device can be paired with an enrolled device. The unenrolled device can connect to the enrolled device on a local network. The enrolled device can verify the unenrolled device using a key provided during pairing. The unenrolled device can send requests for UEM resources to the enrolled device, which the enrolled device can send to a UEM server. The UEM server can send the requested UEM resources to the enrolled device, and the enrolled device can send the UEM resources to the enrolled device over the local network.