Patent classifications
H04W12/50
ELECTRONIC APPARATUS, CONTROLLING METHOD OF ELECTRONIC APPARATUS AND SERVER
An electronic apparatus which registers a device to a server by using a voice, and a method therefor are provided. The electronic apparatus includes a communication circuit, a microphone, a memory for storing computer executable instructions, and at least one processor configured to execute the computer executable instructions to acquire, from a voice received through the microphone, information on an external device which a user wishes to register, based on an external device corresponding to the acquired information being searched through the communication circuit, control the communication circuit to transmit information on an access point to the external device to enable the external device to communicate with a server, and control the communication circuit to transmit a registration request with respect to the external device to the server.
Pairing Groups of Accessories
Embodiments that relate to pairing and finding a group of accessory devices are described. In an embodiment, a pairing status is received from a first accessory device, a request is sent to the first accessory device for information on a number of accessory devices in a device group and a number of accessory devices that are proximate to the first accessory device in the device group, information on a second accessory device in the device group is received, a continue pairing message is sent to the second accessory device if the second accessory device is proximate, and a device group profile is created with information on the number of parts and received information on the second accessory device
Pairing Groups of Accessories
Embodiments that relate to pairing and finding a group of accessory devices are described. In an embodiment, a pairing status is received from a first accessory device, a request is sent to the first accessory device for information on a number of accessory devices in a device group and a number of accessory devices that are proximate to the first accessory device in the device group, information on a second accessory device in the device group is received, a continue pairing message is sent to the second accessory device if the second accessory device is proximate, and a device group profile is created with information on the number of parts and received information on the second accessory device
ELECTRONIC DEVICE FOR MANAGING DATA IN BLUETOOTH LOW ENERGY (BLE) COMMUNICATION AND METHOD FOR CONTROLLING THE SAME
According to an embodiment, an electronic device may include: a communication module comprising communication circuitry configured to operate in Bluetooth low energy (BLE), a memory, and at least one processor operatively coupled to the communication module and the memory. The at least one processor may be configured to: receive authentication information about each function from an external electronic device via BLE, the authentication information about each function including information about data for the function and information about an access right level of the function, store the received authentication information about each function in the memory, and control the communication module to transmit an authentication index of each function corresponding to the authentication information about the function to the external electronic device by BLE.
ELECTRONIC DEVICE FOR MANAGING DATA IN BLUETOOTH LOW ENERGY (BLE) COMMUNICATION AND METHOD FOR CONTROLLING THE SAME
According to an embodiment, an electronic device may include: a communication module comprising communication circuitry configured to operate in Bluetooth low energy (BLE), a memory, and at least one processor operatively coupled to the communication module and the memory. The at least one processor may be configured to: receive authentication information about each function from an external electronic device via BLE, the authentication information about each function including information about data for the function and information about an access right level of the function, store the received authentication information about each function in the memory, and control the communication module to transmit an authentication index of each function corresponding to the authentication information about the function to the external electronic device by BLE.
Establishing a secure communication link
This disclosure is directed to devices, systems, and techniques for establishing a secure connection between two or more devices. In some examples, a device is configured for wireless communication. The device comprises signal reception circuitry configured to receive communications transmitted according to at least a first communication protocol, communication circuitry configured for wireless communication according to at least a second communication protocol, and processing circuitry electrically coupled to the signal reception circuitry and the communication circuitry. The processing circuitry is configured to receive, via the signal reception circuitry, a first signal according to the first communication protocol. In response to receiving the first signal, the processing circuitry is further configured to transmit, via the communication circuitry, a second signal according to the second communication protocol and establish a secure link according to the second communication protocol.
Proximity-based access
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for proximity-based access. In some implementations, a computing device detects an attempt to access the computing device while the computing device is in a secured state. In response to detecting the attempt to access the computing device, the computing device sends a first message to a server system over a network. After sending the message, the computing device receives a second message from the server system over the network, the second message comprising authentication data for the computing device. The computing device determines that a mobile device that was previously designated as an authentication factor for accessing the computing device is located within a predetermined level of proximity of the computing device, and the computing device grants access to the computing device.
Method of handling aircraft cargo from a portable panel
Disclosed is a method of operating a Portable Cargo Panel (PCP) for an aircraft, including: detecting a gesture on a display of the PCP; determining that the gesture is a command to view on the display a first cargo compartment; securing a wireless connection with the first control panel therein; receiving, from the first control panel, a health state of each of a plurality of Cargo Handling Units (CHUs) therein; displaying, on the display, the first cargo compartment with the plurality of CHUs and the operational state of the plurality of CHUs; controlling one or more of the CHUs in the first cargo compartment by transmitting, to the first control panel, a command to: run a diagnostic test against the one or more of the plurality of CHUs; or control the plurality of CHUs to move a Unit Load Device (ULD) into, within or out of the first cargo compartment.
GPS-attack prevention system and method for fine timing measurement (FTM) in 802.11AZ
Presented herein are techniques for GPS attack prevention in association with wireless communication devices. In at least one embodiment, a method may include receiving, at a mobile device from a first access point (AP), first location information and one or more of a first token or first neighbor information relating to neighboring APs. The mobile device may receive from a second AP, second location information and one or more of a second token or second neighbor information relating to neighboring APs. The first token may be compared to the second token to determine whether the first and second tokens are consistent, and/or the first neighbor information may be compared to the second neighbor information to determine whether the first and second neighbor information are consistent. It may be determined whether the first location information provided by the first AP and the second location information provided by the second AP are valid based on the comparison(s).
GPS-attack prevention system and method for fine timing measurement (FTM) in 802.11AZ
Presented herein are techniques for GPS attack prevention in association with wireless communication devices. In at least one embodiment, a method may include receiving, at a mobile device from a first access point (AP), first location information and one or more of a first token or first neighbor information relating to neighboring APs. The mobile device may receive from a second AP, second location information and one or more of a second token or second neighbor information relating to neighboring APs. The first token may be compared to the second token to determine whether the first and second tokens are consistent, and/or the first neighbor information may be compared to the second neighbor information to determine whether the first and second neighbor information are consistent. It may be determined whether the first location information provided by the first AP and the second location information provided by the second AP are valid based on the comparison(s).