Patent classifications
H04W12/082
Automated delivery security system
A method and system for providing access to a location secured by an electronically activated locking mechanism, the method comprising: detecting a geographical position of a mobile device. Determining that the detected geographical position of the mobile device is proximate to the location secured by the electronically activated locking mechanism. Transmitting a signal causing the electronically activated locking mechanism to unlock.
Automated delivery security system
A method and system for providing access to a location secured by an electronically activated locking mechanism, the method comprising: detecting a geographical position of a mobile device. Determining that the detected geographical position of the mobile device is proximate to the location secured by the electronically activated locking mechanism. Transmitting a signal causing the electronically activated locking mechanism to unlock.
Managing permissions for different wireless devices to control a common host device
Disclosed herein is a technique for managing permissions associated with the control of a host device that are provided to a group of wireless devices. The host device is configured to pair with a first wireless device. In response to pairing with the first wireless device, the host device grants a first level of permissions for controlling the host device to the first wireless device. Subsequently, the host device can receive a second request from a second wireless device to pair with the host device. In response to pairing with the second wireless device, the host device can grant a second level of permissions for controlling the host device to second wireless device, where the second level of permissions is distinct from the first level of permissions.
Managing permissions for different wireless devices to control a common host device
Disclosed herein is a technique for managing permissions associated with the control of a host device that are provided to a group of wireless devices. The host device is configured to pair with a first wireless device. In response to pairing with the first wireless device, the host device grants a first level of permissions for controlling the host device to the first wireless device. Subsequently, the host device can receive a second request from a second wireless device to pair with the host device. In response to pairing with the second wireless device, the host device can grant a second level of permissions for controlling the host device to second wireless device, where the second level of permissions is distinct from the first level of permissions.
Stand-by storage nodes in storage network
A method for execution by a storage network, the method begins by determining a failure rate of storage nodes of an active storage pool, establishing a number of standby storage nodes based on the determined failure rate, identifying resource identifiers for the failed storage node, selecting an available standby storage node, facilitating populating the selected available standby storage node with data slices associated with the failed storage node, utilizing the selected available standby storage node, facilitating population of a replacement storage node with the data slices from the selected available standby storage node and facilitating processing of further receive data access requests for data associated with the associated resource identifiers by utilizing the replacement storage node.
Activation of cryptographically paired device
An event is detected at a first device. Responsive to the detection, at least some functionality of the first device is deactivated. The presence of a second device, cryptographically paired with the first device, is detected by the first device. Responsive to the detection, at least some functionality of the first device is activated or reactivated.
Activation of cryptographically paired device
An event is detected at a first device. Responsive to the detection, at least some functionality of the first device is deactivated. The presence of a second device, cryptographically paired with the first device, is detected by the first device. Responsive to the detection, at least some functionality of the first device is activated or reactivated.
Priority fallback of SUCI calculation
Method and apparatus are provided for priority fallback of SUCI calculation. In accordance with some implementation, a UE may transmit, in response to receiving an indication of authentication failure for a first SUCI based on a first SUCI parameter, a second SUCI based on a second SUCI parameter different from the first SUCI parameter. In accordance with some implementation, the UE may further transmit a SUCI with NULL SUCI parameter if the UE determines all SUCI parameters supported by the UE has been rejected by the network.
Priority fallback of SUCI calculation
Method and apparatus are provided for priority fallback of SUCI calculation. In accordance with some implementation, a UE may transmit, in response to receiving an indication of authentication failure for a first SUCI based on a first SUCI parameter, a second SUCI based on a second SUCI parameter different from the first SUCI parameter. In accordance with some implementation, the UE may further transmit a SUCI with NULL SUCI parameter if the UE determines all SUCI parameters supported by the UE has been rejected by the network.
Systems and methods for proactive call spam/scam protection using network extensions
The disclosed computer-implemented method for proactive call spam/scam protection may include intercepting network traffic by the at least one processor employing a network extension feature of an operating system of a computing device. The method may additionally include capturing, by the at least one processor employing the network extension feature, a phone number in the network traffic. The method may also include comparing, by the at least one processor employing the network extension feature, the phone number to a plurality of entries in a spam/scam repository. The method may further include performing, by the at least one processor, a security action in response to the comparison. Various other methods, systems, and computer-readable media are also disclosed.