Patent classifications
H04W12/50
Securing communication between a wireless data communication accessory for a drug delivery device and an external device
A system comprising a wireless data communication accessory and a drug delivery device is disclosed, wherein the wireless data communication accessory is configured for data exchange with the drug delivery device and to secure data from the drug delivery device using cryptographic information assigned to the drug delivery device.
Securing communication between a wireless data communication accessory for a drug delivery device and an external device
A system comprising a wireless data communication accessory and a drug delivery device is disclosed, wherein the wireless data communication accessory is configured for data exchange with the drug delivery device and to secure data from the drug delivery device using cryptographic information assigned to the drug delivery device.
METHODS, MEDIUMS, AND SYSTEMS FOR VERIFYING DEVICES IN AN ENCRYPTED MESSAGING SYSTEM
This application describes methods, mediums, and systems for verifying a device for use in a messaging system. Using the device verification procedures described, a messaging system can securely authorize new devices to send and receive encrypted messages on behalf of a user, preferably without the need to share a private encryption key between the users' different devices. The application describes several techniques that can be used to provide such a system, including distributing a computer-perceptible code that encodes encryption information between a secondary device and a primary device. This allows the information to be distributed without intervention by a server. Other techniques provide unique ways to build and reverify authorized device lists, distribute encryption keys in chat channels, ensure that lists of authorized devices are distributed in the correct order and remain valid for an appropriate amount of time, add new devices to an ongoing or new conversation, and more.
Method for Unlocking a Lock Using Real-Time Wireless Power Supply
A method for unlocking the lock using real-time wireless power supply includes proceeding with authentication identification of a powerless lock by an electronic key after pairing. Power is wirelessly supplied from the electronic key to the lock when the authentication identification starts or the authentication identification passes. The lock obtains the power wirelessly supplied from the lock to operate. When the authentication identification is identified as being successful, the electronic key outputs an unlocking command to the lock. The lock receiving the unlocking command proceeds with an unlocking operation using the power supplied wirelessly.
Method for Unlocking a Lock Using Real-Time Wireless Power Supply
A method for unlocking the lock using real-time wireless power supply includes proceeding with authentication identification of a powerless lock by an electronic key after pairing. Power is wirelessly supplied from the electronic key to the lock when the authentication identification starts or the authentication identification passes. The lock obtains the power wirelessly supplied from the lock to operate. When the authentication identification is identified as being successful, the electronic key outputs an unlocking command to the lock. The lock receiving the unlocking command proceeds with an unlocking operation using the power supplied wirelessly.
CREDENTIALING METHOD AND APPARATUS FOR FACILITY ACCESS
A credentialing method and apparatus for facility access. The apparatus can include a system that includes one or more BLE beacons located within proximity to a facility, where one or more of the beacons identifies a location or other information unique to its proximity to the facility. The apparatus can further include an eBadge used by a person seeking access to the facility. The eBadge can also in some embodiments be a BLE beacon. Interaction between the one or more BLE beacons, a credentialing provider's app operating on the person's mobile device, and the person's eBadge operate in the system to perform a method of controlled access to the facility. In some embodiments, administrators with access to the credentialing provider's app also can control, monitor, report, and observe details concerning such facility access.
Transferring application data between devices
Methods, systems, and apparatus are described for transferring application data. In one aspect, a method includes causing, by a first component on a first device to establish a wireless connection with a second device; receiving, from a second component on the second device, data specifying one or more applications that are installed on the second device and supported by the second component, each of the applications being separate from the second component; determining, by the first component, that a first application installed on the first device matches one of the applications installed on the second device, the first application being separate from the first component; receiving, by the first component, first application data from the first application; and causing, by the first component, the first device to send the first application data to the second component running on the second device using the wireless connection.
Transferring application data between devices
Methods, systems, and apparatus are described for transferring application data. In one aspect, a method includes causing, by a first component on a first device to establish a wireless connection with a second device; receiving, from a second component on the second device, data specifying one or more applications that are installed on the second device and supported by the second component, each of the applications being separate from the second component; determining, by the first component, that a first application installed on the first device matches one of the applications installed on the second device, the first application being separate from the first component; receiving, by the first component, first application data from the first application; and causing, by the first component, the first device to send the first application data to the second component running on the second device using the wireless connection.
Authenticating and creating accounts on behalf of another user
Embodiments described herein provide for a satellite device that can be associated with a user account of a minor aged (e.g., child or adolescent) user that does not have a smartphone that can be used as a companion device to the satellite device. The satellite device can be configured to be used as a primary device, without reliance upon a paired smartphone. Certain information can be synchronized with the satellite device via the association with the family account. During initial configuration, a set of cryptographic keys can be generated to associate the account of the satellite device with the set of accounts in the family. The satellite device can then access calendars, media, or other data that is shared with user accounts within a family of user accounts.
Systems and methods for delayed-message attack mitigation
A computer-implemented method comprising: establishing, by an operation device, a wireless communication with a remote device; authenticating, by the operation device, the wireless communication with the remote device; receiving, at the operation device, a first command to perform a first operation; establishing a first maximum delay period using an estimated time delay, wherein the estimated time delay comprises an authentication delay, an encryption delay, or a combination thereof; determining, by the operation device, that the first command is received within a first maximum delay period; performing, by the operation device, the first operation; receiving, at the operation device, a second command to perform a second operation; establishing a second maximum delay period using the estimated time delay; determining, by the operation device, that the second command is received within a second maximum delay period; and performing, by the operation device, the second operation instructed in the second command.