H04W12/062

INFORMATION PROCESSING APPARATUS, METHOD FOR CONTROLLING THE SAME, AND STORAGE MEDIUM
20230102657 · 2023-03-30 ·

A method for controlling an information processing apparatus for communicating with a first communication apparatus and a second communication apparatus includes a first acquisition step of acquiring connection information for connecting to an access point from the first communication apparatus; and a first transmission step of transmitting the connection information to the second communication apparatus. The connection information transmitted to the second communication apparatus includes information acquired from the first communication apparatus and information stored in advance in a storage area of the information processing apparatus.

METHOD TO ACCESS OR MANAGE AN OPERATOR'S VOICEMAIL SYSTEM FROM A DIGITAL ASSIST OR SMART DEVICE

A method, system and apparatus are disclosed. According to some embodiments, an assistant network node configured to communicate with a proxy network node is provided. The assistant network node includes processing circuitry configured to receive, over an internet, a request message associated with a digital assistant device where the request message inquires about a voicemail function of a voicemail system related to a user of a fixed or cellular network, access the voicemail system based at least in part on the request message where the accessing of the voicemail system is performed without establishing a voice channel in the fixed or cellular network, and return a response message to the digital assistant device over the internet based at least in part on the access of the voicemail system in the fixed or cellular network.

ASSOCIATING DEVICES WITH ACCESS POINTS USING CREDENTIALS

Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a device may transmit, via a broadcast, a first frame that indicates one or more of a device credential or a payload. The device may receive, from the access point, a second frame that indicates one or more of the payload or an access point credential. The device may associate with the access point based at least in part on the access point credential. The device may perform a communication, to a cloud computing system via the access point, after the device has been associated with the access point. Numerous other aspects are described.

ASSOCIATING DEVICES WITH ACCESS POINTS USING CREDENTIALS

Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a device may transmit, via a broadcast, a first frame that indicates one or more of a device credential or a payload. The device may receive, from the access point, a second frame that indicates one or more of the payload or an access point credential. The device may associate with the access point based at least in part on the access point credential. The device may perform a communication, to a cloud computing system via the access point, after the device has been associated with the access point. Numerous other aspects are described.

Terminal information transfer method and relevant products

Embodiments of the present disclosure disclose a method for transmitting terminal information and a related product. The method includes: receiving, by a first network element included in a network device, first information from a terminal.

Biometric access to service providers

A contact may select to use a biometric input to access help and services related to the contact. On a portable computing device, a user may contact a help service. The help service contact address may be known and an app may execute if the contact attempts to communicate with the contact address. The app may receive the biometric data, compare it to known biometric data for the user and determine if the received biometric data is sufficiently close to the stored biometric data, the communication may be forwarded to a help or service agent.

UNAUTHORIZED DEVICE RESOURCE DRAIN PREVENTION

Detection and prevention of resource drain from unauthorized wireless device connections is provided. Responsive to receiving of a connection request from a connecting device, a pre-authentication message is sent to the connecting device, the pre-authentication message including a challenge value. A vehicle hash result is computed using a hash function taking the challenge value and the unique identifier of the vehicle as inputs. A device hash result is received from the connecting device. Responsive to a match of the vehicle hash result and the device hash result, additional hardware of the vehicle is activated to perform a secondary authentication of the connecting device. Responsive to a mismatch, authentication of the connecting device is rejected without activation of the additional hardware, thereby avoiding key-off load from the additional hardware in instances where pre-authentication of the connecting device fails.

UNAUTHORIZED DEVICE RESOURCE DRAIN PREVENTION

Detection and prevention of resource drain from unauthorized wireless device connections is provided. Responsive to receiving of a connection request from a connecting device, a pre-authentication message is sent to the connecting device, the pre-authentication message including a challenge value. A vehicle hash result is computed using a hash function taking the challenge value and the unique identifier of the vehicle as inputs. A device hash result is received from the connecting device. Responsive to a match of the vehicle hash result and the device hash result, additional hardware of the vehicle is activated to perform a secondary authentication of the connecting device. Responsive to a mismatch, authentication of the connecting device is rejected without activation of the additional hardware, thereby avoiding key-off load from the additional hardware in instances where pre-authentication of the connecting device fails.

PROVISIONING OF SECURE APPLICATION

Methods and devices for provisioning a secure application on an electronic device with first issuer data for a first issuer are described. In an embodiment, the provisioning system receives and stores first issuer records. The example provisioning system receives a provisioning request to provision the secure application with the first issuer data. The provisioning request includes identifying information. The example provisioning system evaluates the provisioning request based on at least one of the first issuer evaluation criteria, the first issuer records and the identifying information in the provisioning request. When the provisioning request satisfies the first issuer evaluation criteria, the example provisioning system generates a signal using the communication module to provide the first issuer data to the electronic device to provision the secure application on the electronic device.

PROVISIONING OF SECURE APPLICATION

Methods and devices for provisioning a secure application on an electronic device with first issuer data for a first issuer are described. In an embodiment, the provisioning system receives and stores first issuer records. The example provisioning system receives a provisioning request to provision the secure application with the first issuer data. The provisioning request includes identifying information. The example provisioning system evaluates the provisioning request based on at least one of the first issuer evaluation criteria, the first issuer records and the identifying information in the provisioning request. When the provisioning request satisfies the first issuer evaluation criteria, the example provisioning system generates a signal using the communication module to provide the first issuer data to the electronic device to provision the secure application on the electronic device.