Patent classifications
H04W12/104
SYSTEM AND METHOD FOR ACCOUNT VERIFICATION BY AERIAL DRONE
A verification application executing at a user's mobile phone directs the user to take a photo of an identification document (e.g., driver's license or other form of government issued identification) or of their face. After the verification application sends the image to a backend service, the service may then dispatch a drone to the user's location and take a photograph of the user. The service may then validate the previously-imaged document or photo of the user's face against the photograph of the user and the geolocation sent with the first image. The service may then verify the new account and provision a token to the verification application to complete a secured account generation.
ENHANCEMENT OF FLEXIBILITY TO CHANGE STS INDEX/COUNTER FOR IEEE 802.15.4Z
A method and apparatus of a first network entity in a wireless communication system is provide. The method and apparatus comprises: identifying at least one set of bit strings to generate a ranging scrambled timestamp sequence (STS); identifying at least one initialization vector (IV) field corresponding to the at least one set of bit strings, wherein the at least one IV field comprises a 4-octet string; generating a ranging STS key and IV information element (RSKI IE) that includes the at least one IV field to convey and align a seed that is used to generate the ranging STS; and transmitting, to a second network entity, the generated RSKI IE for updating the ranging STS of the second network entity.
Electronic monitoring and reporting system for discharging judicial obligations
This document is related to enhanced tracking and reporting. An example method may comprise receiving an electronic signal associated with an officer account. The example method may comprise receiving, by a processor, historical data associated with at least one parolee account that is associated with the officer account. The example method may comprise automatically displaying a second set of user interface elements comprising a plurality of sections. The example method may comprise displaying user check-in data in a first section of the second set of user interface elements. The example method may comprise displaying user location data in a second section of the second set of user interface elements. The example method may comprise displaying user interface elements to approve or deny pending check-ins in a third section of the second set of user interface elements.
End-to-end encryption with distributed key management in a tracking device environment
A tracking device can provide a hashed identifier to a mobile device, for instance within an advertisement packet. The mobile device can query each of a plurality of entities with the hashed identifier to identify an entity associated with the hash key used to generate the hashed identifier. In some embodiments, the mobile device can query a centralized key server, which in turn can query the plurality of entities to identify the entity associated with the hash key. The mobile device can then receive a public key from the identified entity, can determine a location of the mobile device, and can encrypt the location with the public key. The mobile device can then provide the hashed identifier and the encrypted location to the identified entity, which can provide the encrypted location to an owner of the tracking device for decryption using a private key corresponding to the public key.
End-to-end encryption with distributed key management in a tracking device environment
A tracking device can provide a hashed identifier to a mobile device, for instance within an advertisement packet. The mobile device can query each of a plurality of entities with the hashed identifier to identify an entity associated with the hash key used to generate the hashed identifier. In some embodiments, the mobile device can query a centralized key server, which in turn can query the plurality of entities to identify the entity associated with the hash key. The mobile device can then receive a public key from the identified entity, can determine a location of the mobile device, and can encrypt the location with the public key. The mobile device can then provide the hashed identifier and the encrypted location to the identified entity, which can provide the encrypted location to an owner of the tracking device for decryption using a private key corresponding to the public key.
SYSTEM AND METHOD FOR VALIDATING AUTHENTICITY OF BASE STATION AND/OR INFORMATION RECEIVED FROM BASE STATION
A communication method and a system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data rates beyond a 4.sup.th-Generation (4G) system with a technology for internet of things (IoT) are provided. The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. A system and a method for validating authenticity of a base station and/or information received from the base station are provided. The method for determining authenticity of system information received from a base station and a cell operated by the base station includes receiving, from a base station, system information, receiving, from a base station, system information, receiving, from the base station, first authenticity information associated with the system information, determining whether the system information is authentic based on the first authenticity information, and determining that a cell operated by the base station is authentic if the system information is authentic.
Accuracy estimation and enhancement of position data using kernel density estimation
A method and device may estimate the accuracy of position data using kernel density estimator. The method may include receiving, from a plurality of user devices, network requests having embedded position data representing locations of the plurality of user devices. The method further includes extracting, from the network requests over a time period, the embedded position data of a user device associated with the plurality of user devices; and receiving baseline position data representing the locations of the user device over the time period. The method included generating a probability density estimate of the locations of the user device based on a kernel density estimator using the baseline position data, determining accuracy scores for the embedded position data using the probability density estimate of the locations, and filtering the embedded position data to remove outliers from the embedded position data.
Methods for sharing private video streams with first responders under facility administrator control
A method enables video surveillance service subscribers to share image streams with individual first responder agencies in the event of emergency. Nominated agencies establish access credentials at the surveillance service data center. A customer administrator selects permissions on each camera via privileged web-browser or mobile device. Permissions enable selection by static meta data such as type, audio, location, motion, recognition, spectrum, and epoch. Setting ranges of time controls access to video streams of present and past epochs. A responding agency presents their access credential and a handle for each shared camera of interest upon receiving an electronic notification from the administrator. Dynamically generating a link to a secure webserver which records geo-location or network identifiers for validation customizes a notification for each responding agency and each event. Under control by a customer administrator, a virtual machine dedicated to each responding agency instantiates a video server.
CONTEXT-BASED RESOURCE ACCESS MEDIATION
Apparatuses, methods, and computer-readable media for a context-based access mediator (“CAM”) are described. The CAM may be configured to mediate access to computer-accessible resources by a user using a computing device after receiving a request from the computing device for the computing device to access a computer-accessible resource. The computer-accessible resource may be local or remote to the computing device. The CAM may be configured to receive the request and to mediate access to the requested resource. Such mediation may be performed through the CAM determining whether the resource may be accessed by the computing device and/or through the CAM determining which resources are available to the be accessed by the computing device. The CAM may be configured to mediate access to computer-accessible resources based on information about a context for the computing device and/or computer-accessible resource. Other embodiments are described and claimed.
SENSOR-BASED AUTHENTICATION, NOTIFICATION, AND ASSISTANCE SYSTEMS
Aspects of the disclosure relate to notification, and assistance systems that may utilize sensor-based authentication techniques. A computing platform may receive user information corresponding to a first user. The user information may be authentication information from a sensor and/or a first communication device associated with the user. Based on the received user information, the computing platform may authenticate an identity of the first user and determine a location of the first user. Then, based on authenticating the identity and determining the location, the sensor may retrieve data corresponding to the first user and transmit the data to a second communication device.