H04W12/33

Portable communication terminal control system, portable communication terminal and recording medium
11546329 · 2023-01-03 · ·

A portable communication terminal control system includes a plurality of first portable communication terminals and a second portable communication terminal. A first processor in the first portable communication terminal performs a first portable communication terminal side determination process which determines whether communication connection is in an established state between a first portable communication terminal and the second portable communication terminal. The first processor performs a transmission control process in which, in response to determination that the communication connection with the other first portable communication terminal is in the established state and that the communication connection with the second portable communication terminal is in the established state, a release signal is transmitted to the second portable communication terminal. The second portable communication terminal includes a second processor which, in response to receiving the release signal, shifts the second portable communication terminal to the released state.

Portable communication terminal control system, portable communication terminal and recording medium
11546329 · 2023-01-03 · ·

A portable communication terminal control system includes a plurality of first portable communication terminals and a second portable communication terminal. A first processor in the first portable communication terminal performs a first portable communication terminal side determination process which determines whether communication connection is in an established state between a first portable communication terminal and the second portable communication terminal. The first processor performs a transmission control process in which, in response to determination that the communication connection with the other first portable communication terminal is in the established state and that the communication connection with the second portable communication terminal is in the established state, a release signal is transmitted to the second portable communication terminal. The second portable communication terminal includes a second processor which, in response to receiving the release signal, shifts the second portable communication terminal to the released state.

WIRELESS COMMUNICATION METHOD BETWEEN A CLIENT OBJECT AND A SERVER OBJECT
20220408264 · 2022-12-22 ·

The present inventions concerns a method for wireless communication between a client object (2) and a server object (1), characterized in that it comprises the implementation by a gateway (10) of steps of: (a) Detecting advertising packets broadcast by said server object (1); (b) Establishing a first connection between the gateway (10) and said server object (1) so as to block the broadcasting by said server object (1) of advertising packets, and retrieving identification information from said server object (1); (c) Establishing a second connection between the gateway (10) and said client object (2), by using as gateway (10) identification information said retrieved identification information of said server object (1), so as to simulate with the client object (2) a connection with the server object (1).

Notification Prompt Method, Server, and Storage Medium
20220398334 · 2022-12-15 ·

This application provides a notification prompt method, a server, and a storage medium. The method includes: when a notification is received, determining a target terminal that meets a preset notification prompt condition from terminal devices on which an account of a target user is logged in; obtaining identity information of a user currently using the target terminal; and when detecting, based on the identity information, that only the target user is currently using the target terminal, controlling the target terminal to prompt the notification in a first prompt mode, where preview content of the notification is displayed in the first prompt mode; or when detecting, based on the identity information, that a plurality of users are currently using the target terminal, controlling the target terminal to prompt the notification in a second prompt mode, where preview content of the notification is not displayed in the second prompt mode.

Method of Authenticating the Identity of a User Wearing a Wearable Device
20220391487 · 2022-12-08 ·

The method comprises obtaining a first source of authentication information for the user comprising a feature set extracted from biometric data sensed by sensors of the wearable device (S101). The extracted feature set is input into a recognition algorithm which uses the extracted feature set and predetermined feature set representing an authorised user that is authorised to use the wearable device, and generates a confidence level indicating the likelihood that the user wearing the wearable device is the authorised user (S102). A second source of authentication information is obtained from the user (S103). The method identifies, from the second source of authentication information, whether the user is authorised to use the wearable device (S104). If the user is authorised, the method authenticates the identity of the user wearing the wearable device as corresponding to the authorised user (S105).

SECURITY MECHANISM FOR WIRELESS AUTHENTICATION DEVICES

Location-based validation of a wireless authentication device. A request is received by a security hardware computing device for an action requiring authentication in connection with security hardware. A security hardware location is received or accessed. A wireless authentication device location of a wireless authentication device in possession of a requester is received by security hardware computing device. The security hardware computing device receives a mobile device location for a mobile device in possession of the requester. The security hardware computing device determines whether the security hardware location, the mobile device location, and the wireless authentication device location are in a proximity. The security hardware computing device performs the action requiring authentication in connection with the security hardware.

Establishing a secure communication link

This disclosure is directed to devices, systems, and techniques for establishing a secure connection between two or more devices. In some examples, a device is configured for wireless communication. The device comprises signal reception circuitry configured to receive communications transmitted according to at least a first communication protocol, communication circuitry configured for wireless communication according to at least a second communication protocol, and processing circuitry electrically coupled to the signal reception circuitry and the communication circuitry. The processing circuitry is configured to receive, via the signal reception circuitry, a first signal according to the first communication protocol. In response to receiving the first signal, the processing circuitry is further configured to transmit, via the communication circuitry, a second signal according to the second communication protocol and establish a secure link according to the second communication protocol.

System on a chip (SoC) communications to prevent direct memory access (DMA) attacks

This disclosure describes system on a chip (SOC) communications that prevent direct memory access (DMA) attacks. An example SoC includes an encryption engine and a security processor. The encryption engine is configured to encrypt raw input data using a cipher key to form an encrypted payload. The security processor is configured to select the cipher key from a key store holding a plurality of cipher keys based on a channel ID describing a {source subsystem, destination subsystem} tuple for the encrypted payload, to form an encryption header that includes the channel ID, to encapsulate the encrypted payload with the encryption header that includes the channel ID to form a crypto packet, and to transmit the crypto packet to a destination SoC that is external to the SoC.

Authenticated device assisted user authentication

A system for user authentication includes an authenticated device with a restricted-access function that a user is able to access in response to verification of an identity of the user by the authenticated device and a proximate device with a restricted-access function that the user is able to access in response to the proximate device receiving authentication data that includes the identity of the user from the authenticated device. The authenticated device is operable to identify an absence of intent of the user to access the restricted-access function of the proximate device, and in response to identifying the absence of intent to access the restricted-access function of the proximate device, emit a locking signal such that, in response to detecting the locking signal, the proximate device enters a locked state and the restricted-access function of the proximate device is inaccessible to the user.

Authenticated device assisted user authentication

A system for user authentication includes an authenticated device with a restricted-access function that a user is able to access in response to verification of an identity of the user by the authenticated device and a proximate device with a restricted-access function that the user is able to access in response to the proximate device receiving authentication data that includes the identity of the user from the authenticated device. The authenticated device is operable to identify an absence of intent of the user to access the restricted-access function of the proximate device, and in response to identifying the absence of intent to access the restricted-access function of the proximate device, emit a locking signal such that, in response to detecting the locking signal, the proximate device enters a locked state and the restricted-access function of the proximate device is inaccessible to the user.