H04W12/084

Managing permissions for different wireless devices to control a common host device

Disclosed herein is a technique for managing permissions associated with the control of a host device that are provided to a group of wireless devices. The host device is configured to pair with a first wireless device. In response to pairing with the first wireless device, the host device grants a first level of permissions for controlling the host device to the first wireless device. Subsequently, the host device can receive a second request from a second wireless device to pair with the host device. In response to pairing with the second wireless device, the host device can grant a second level of permissions for controlling the host device to second wireless device, where the second level of permissions is distinct from the first level of permissions.

Multicomputer processing of user data with centralized event control

Aspects of the disclosure relate to multicomputer processing of vehicle operational data from telematics devices and other sources with centralized event control. An event control computing platform may receive vehicle operational data from a telematics device associated with a user. Subsequently, the event control computing platform may identify, based on the received data, whether at least one criterion associated with the user has been satisfied. If the received data indicates that the at least one criterion associated with the user has been satisfied, then the event control computing platform may generate a command configured to cause a change to a subunit of user data and then may transmit the generated command to a subunit provisioning server.

System and method for federated identity functionality for API development
11695774 · 2023-07-04 · ·

A system and method for federated identity functionality for API integration can include creating an identity token associated with an application service; in association with the application service, configuring a linked service token of an external service; storing the linked service token in association with the identity token; invoking the application service which includes validating the identity token and performing an application programming interface (API) interaction with the external service using the linked service token.

Systems and methods for locally conducting delegated authentication at edge nodes

Disclosed herein are embodiments of systems and methods for locally conducting delegated authentication at edge nodes. In an embodiment, an edge node of a managed network receives, from an authentication system, authentication information for a user. The edge node stores the authentication information. The edge node receives, from a user device associated with the user, an authentication request that includes presented authentication information. The edge node determines whether one or more authentication criteria are met for the authentication request, and if so performs a set of authenticating operations. The one or more authentication criteria includes the presented authentication information matching the stored authentication information. The set of authenticating operations includes authenticating the user with respect to the managed network, as well as establishing an authenticated session for the user at the edge node.

Systems and methods for locally conducting delegated authentication at edge nodes

Disclosed herein are embodiments of systems and methods for locally conducting delegated authentication at edge nodes. In an embodiment, an edge node of a managed network receives, from an authentication system, authentication information for a user. The edge node stores the authentication information. The edge node receives, from a user device associated with the user, an authentication request that includes presented authentication information. The edge node determines whether one or more authentication criteria are met for the authentication request, and if so performs a set of authenticating operations. The one or more authentication criteria includes the presented authentication information matching the stored authentication information. The set of authenticating operations includes authenticating the user with respect to the managed network, as well as establishing an authenticated session for the user at the edge node.

System and method for an extender device

Many customers have difficulty setting up a new extender device in the customer premises environment to improve their multimedia service. Some embodiments include configuring an extender device based on existing WiFi network credentials to minimize errors. Some embodiments include an application for mobile devices that may enable the transfer of network credentials from existing multimedia devices on the WiFi network to configure a new extender device in real time. For example, the configuration may be based on a customer account, a corresponding environment, and corresponding multimedia devices associated with the customer account. The extender device may be configured with the network credentials (e.g., a WiFi service set identifier (SSID) and password) that is common to the corresponding multimedia devices associated with the customer account.

CONSENT-BASED AUTHORIZATION SYSTEM FOR TAXATION AND CONSUMER SERVICES
20220417242 · 2022-12-29 ·

The subject matter of this specification can be implemented in, among other things, methods, systems, and computer-readable storage media. A method can include a first server receiving, from a first computing device, first data indicating a consumer service request, a consumer service entity identification (ID), and an authorization token each associated with a first user. The method further includes the first server sending to the second server an identity validation request identifying the first user, wherein the identity validation request comprises the consumer service entity ID and the authorization token. The method further includes the first server receiving from the second server a response to the identity validation request. The method further includes the first server causing an action to be performed corresponding to the consumer service request.

Media context switching between devices using wireless communications channels
11537357 · 2022-12-27 · ·

Methods, systems, and/or devices for media context switching among electronic devices are described herein. In one aspect, a method is performed at a first electronic device. A first media item is played. While playing the first media item, a near-field-communication (NFC) channel is established with a second electronic device while the second electronic device is playing a second media item. First contextual data of the first electronic device is transferred via the NFC channel to the second electronic device, wherein the first contextual data corresponds to the first media item. A playback command for the second media item is received. In response to receiving the playback command for the second media item, the first electronic device plays the second media item.

Media context switching between devices using wireless communications channels
11537357 · 2022-12-27 · ·

Methods, systems, and/or devices for media context switching among electronic devices are described herein. In one aspect, a method is performed at a first electronic device. A first media item is played. While playing the first media item, a near-field-communication (NFC) channel is established with a second electronic device while the second electronic device is playing a second media item. First contextual data of the first electronic device is transferred via the NFC channel to the second electronic device, wherein the first contextual data corresponds to the first media item. A playback command for the second media item is received. In response to receiving the playback command for the second media item, the first electronic device plays the second media item.

Authentication techniques in response to attempts to access sensitive information

The present disclosure describes techniques for changing a required authentication type based on a request for a particular type of information. For example, consider a situation where a user has asked a virtual assistant “who owns this device?” By default, the device may allow biometric authentication to unlock. In response to identification of the owner by the virtual assistant, however, the device may require one or more other types of authentication (e.g., manual entry of a passcode) to unlock the device. In various embodiments, the disclosed techniques may increase the security of the device by making it more difficult for malicious entities to obtain the sensitive information or to access device functionality once the sensitive information has been disclosed. In various embodiments, this may prevent or reduce unauthorized access to the device.