H04W12/50

MANAGEMENT OF MULTIPLE DEVICES WITHIN AN ANALYTE MONITORING ENVIRONMENT

Systems, devices, and methods are provided for the management of multiple sensor control devices and/or multiple reader devices in an in vivo analyte monitoring environment, and also for resolving conflicts when merging data collected by different reader devices.

COMMUNICATION APPARATUS, CONTROL METHOD FOR COMMUNICATION APPARATUS, AND STORAGE MEDIUM
20180004929 · 2018-01-04 ·

A communication apparatus includes a first execution unit, a second execution unit, and a selecting unit. The first execution unit performs a first process for setting a wireless parameter, based on information obtained from a captured image. The setting of a wireless parameter is performed between the communication apparatus and another communication apparatus that operates as an access point and that is different from the communication apparatus. The second execution unit performs, based on information obtained from a captured image, a second process for setting a wireless parameter to another communication apparatus that operates as a station and that is different from the communication apparatus. The wireless parameter is one for performing wireless communication with an access point. The selecting unit selects whether the first process or the second process is to be performed, in a case where information is obtained from a first captured image.

WIRELESS ACCESS AUTHENTICATION
20180007551 · 2018-01-04 ·

Examples relate to a method and a device for wireless access authentication. The method is applied to an intelligent gateway which is previously associated with account information of a user. The intelligent gateway may receive an access authentication packet comprising an authentication identification indicating a terminal device; the intelligent gateway may construct an identity verification packet comprising an authentication identification indicating the terminal device and an association account identification indicating an account registered on the intelligent gateway; the intelligent gateway may send the identity verification packet to a cloud server; the intelligent gateway may permit a terminal device corresponding to authentication identification carried in a verification success packet returned by the cloud server to pass the access authentication.

Methods and Systems for Detecting Persons in a Smart Home Environment

The various implementations described herein include methods, devices, and systems for detecting motion and persons. In one aspect, a method is performed at a smart home system that includes a video camera, a server system, and a client device. The video camera captures video and audio, and wirelessly communicates, via the server system, the captured data to the client device. The server system: (1) receives and stores the captured data from the video camera; (2) determines whether an event has occurred, including detected motion; (3) in accordance with a determination that the event has occurred, identifies video and audio corresponding to the event; and (4) classifies the event. The client device receives information indicative of the identified events, displays a user interface for reviewing the video and audio stored by the remote server system, and displays the at least one classification for the event.

ACCESS CONTROL METHOD AND ACCESS CONTROL APPARATUS
20180014188 · 2018-01-11 · ·

Embodiments of the present application disclose access control method and an access control apparatus. A method disclosed herein comprises: sending information associated with authentication of at least one access point device; and controlling at least one second device to access a target access point device through at least one first device; wherein the at least one first device is a device that receives the information associated with authentication of at least one access point device. The methods and apparatus of the embodiments of the present application, by using an authentication manner through cooperation between devices, enable a device currently used by a user to rapidly and efficiently access a target access point device, so as to more efficiently obtain access to a wireless local area network.

CRYPTOGRAPHIC KEY EXCHANGE OVER AN ELECTROSTATIC CHANNEL
20180014186 · 2018-01-11 · ·

Various embodiments relating to exchanging a cryptographic key between a display device and an input device via electrostatic communication are disclosed. In one embodiment, an interactive communication device includes one or more electrodes and a radio transceiver. The one or more electrodes may be excited to capacitively couple with one or more electrodes of a proximate communication device so as to capacitively send a cryptographic key from the interactive communication device to the proximate communication device. The radio transceiver may be configured to communicate with a radio transceiver of the proximate communication device via a radio channel. The interactive communication device may be configured to subsequently exchange encrypted communications with the proximate communication device over the radio channel. The encrypted communications may be encrypted using the cryptographic key.

Communication apparatus, control method, and recording medium
11711610 · 2023-07-25 · ·

A communication apparatus includes a first communication unit for unencrypted communication compliant with a first standard for communication, and a second communication unit for encrypted communication compliant with a second standard for communication, In a case where connection information used for the second communication unit to perform encrypted communication with an external apparatus has been received from the external apparatus via the first communication unit, a control unit records the connection information on a recording medium. In a case where connection with the external apparatus has been established via the first communication unit, the control unit determines whether the connection information is currently recorded on the recording medium, and, in a case where it has been determined that the connection information is not currently recorded on the recording medium, the control unit causes a notification unit to issue a notification indicating that the connection information is not currently recorded.

Electronic device and control method thereof

Disclosed is an electronic device. The electronic device includes a communicator comprising communication circuitry and a processor, the processor is configured to control the communicator to perform communication with an external device based on identifying that a strength of a signal received from an external device is equal to or greater than a predetermined threshold value, and after converting an electronic device to a low power mode, based on identifying that a strength of a signal received from an external device being within a first range, to control the electronic device to perform a secure pairing operation.

Electronic device and control method thereof

Disclosed is an electronic device. The electronic device includes a communicator comprising communication circuitry and a processor, the processor is configured to control the communicator to perform communication with an external device based on identifying that a strength of a signal received from an external device is equal to or greater than a predetermined threshold value, and after converting an electronic device to a low power mode, based on identifying that a strength of a signal received from an external device being within a first range, to control the electronic device to perform a secure pairing operation.

CRYPTOGRAPHY USING RF POWER MEASUREMENT
20180013553 · 2018-01-11 · ·

The embodiments provide a cryptography key for two communicating devices that is based on information known only to the devices. The information may only be determined by the devices. Each device determines the information without communicating key information related to the encryption key with the other. Channel characteristic reciprocity between the devices allows creation of identical keys in each device. Each device sends a signal to the other device at the same power level based on the distance between the devices. The power level may be set to result in a target receive power level at the other device. Each device samples the received signal, generates sampling results, creates a key based on the sampling results and a threshold power level, and utilizes the key. The threshold power level may be based on the target receive power level, or a median power determined from the sampling results.