H04W12/47

SMART FABRIC FOR ITEM VERIFICATION AND AUTHENTICATION
20230010248 · 2023-01-12 ·

A service computing system (server) has a storage stored thereon multiple records associated with multiple items. Each item has a piece of smart fabric fixed thereon. Each record stores at least a unique identifier of a piece of smart fabric and a unique identifier of a verification and authentication device associated with the item. The server is configured to receive a verification request from a mobile device containing at least one of a unique identifier of a piece of smart fabric associated with an item, or a unique identifier of a verification and authentication device associated with the item. In response to determining that the identifier of the smart fabric or the identifier of the verification and authentication device is associated with a record, the server generates a token and causes the token to be received by the verification and authentication device, causing the verification and authentication device to transmit data associated with the token to the piece of smart fabric for authentication.

Wireless network synchronization of cells and client devices on a network
11553481 · 2023-01-10 · ·

A system and method for wireless synchronization on a network are disclosed. In one embodiment, the wireless device includes a wireless transceiver and processing circuitry. The wireless transceiver wirelessly receives synchronization information including a superframe from a first wireless, reader device, and wirelessly transmits the synchronization information to a second wireless, reader device and a portable wireless device, and to wirelessly detect a presence of a portable wireless device. The processing circuitry communicates synchronization information to the second wireless, reader device and portable wireless device. The superframe is used to synchronize a wireless data exchange between the third wireless, reader device and the portable wireless device.

COMMUNICATION CONTROL DEVICE, VEHICLE INCLUDING THE SAME, AND COMMUNICATION CONTROL METHOD

A polling processing unit executes a polling process for detecting a device that performs NFC communication. An NFC communication processing unit executes a communication process of performing NFC communication with a mobile device detected by the polling process. Power consumption associated with execution of the communication process is larger than power consumption associated with execution of the polling process. When authentication of the mobile device by an authentication processing unit is completed, or when the execution of the communication process continues for a prescribed time period, the NFC communication processing unit executes a stop process of stopping the communication process until the execution of the communication process is permitted.

Rapid install of IoT devices
11695635 · 2023-07-04 · ·

Devices, systems, and processes for rapid installation of numerous Internet-of-Things (IoT) devices are described. For at least one embodiment, a system for installing multiple Internet-of-Things (IoT) devices may include a multi-device hub communicatively coupled to each of multiple IoT devices. One or more gateways are coupled to the multi-device hub. One or more IoT servers are coupled to at least one of the one or more gateways. The multi-device hub is configured to facilitate a bulk installation of the multiple IoT devices by executing non-transient computer instructions for registering and activating each of the IoT devices with use with one or more IoT servers.

Pairing a Mobile Computer to a Peripheral Wireless Device During Setup Procedures

A method of pairing a mobile computing device with an external device during set up of the mobile computing device, the method comprising, at a computing device initiate a setup application for the mobile computing device; determining if the mobile computing device has an internal scanner; when the mobile computing device does not have an internal scanner: prepare the mobile computing device for pairing with a peripheral scanning device; prepare the peripheral scanning device for pairing with the mobile computing device; pairing the mobile computing device with the peripheral scanning device; and scanning staging indicia with the peripheral scanning device to initiate a device staging application within the mobile computing device.

Proximity-based system for object tracking
11546325 · 2023-01-03 · ·

A system and method provides for tracking of an object. A personal digital key (PDK) includes a profile uniquely associated with the object. A reader is configured to wirelessly communicate with the PDK. The reader receives profile information from the PDK. A tracking server is configured to communicate with the reader. The tracking server is configured to track and log location information of the PDK associated with the object. The location information is received from the reader. A computing device is configured to communicate with the reader and the tracking server, the computing device configured to display data on a display device responsive to receiving the location information from the reader.

SYSTEMS AND METHODS TO PERFORM CONTACTLESS CARD ACTIVATION

Example embodiments relate to performing activation techniques for contactless cards. For example, embodiments may include performing a near-field communication (NFC) exchange with a contactless card, processing a message comprising data to activate the contactless card, communicating the data to a server to activate the contactless card; and receiving a response from the server, the response to indicate whether the contactless card is successfully activated or not successfully activated.

Provisioning of secure application

Methods and devices for provisioning a secure application on an electronic device with first issuer data for a first issuer are described. In an embodiment, the provisioning system receives and stores first issuer records. The example provisioning system receives a provisioning request to provision the secure application with the first issuer data. The provisioning request includes identifying information. The example provisioning system evaluates the provisioning request based on at least one of the first issuer evaluation criteria, the first issuer records and the identifying information in the provisioning request. When the provisioning request satisfies the first issuer evaluation criteria, the example provisioning system generates a signal using the communication module to provide the first issuer data to the electronic device to provision the secure application on the electronic device.

Provisioning of secure application

Methods and devices for provisioning a secure application on an electronic device with first issuer data for a first issuer are described. In an embodiment, the provisioning system receives and stores first issuer records. The example provisioning system receives a provisioning request to provision the secure application with the first issuer data. The provisioning request includes identifying information. The example provisioning system evaluates the provisioning request based on at least one of the first issuer evaluation criteria, the first issuer records and the identifying information in the provisioning request. When the provisioning request satisfies the first issuer evaluation criteria, the example provisioning system generates a signal using the communication module to provide the first issuer data to the electronic device to provision the secure application on the electronic device.

Wireless terminal authentication
11546174 · 2023-01-03 · ·

A device for wireless terminal authentication may include at least one processor configured to receive, from a wireless terminal device, a request for user information, the request comprising a certificate corresponding to the wireless terminal device. The at least one processor may be further configured to verify the certificate based at least in part on a public key stored on the electronic device. The at least one processor may be further configured to, when the certificate is verified, determine whether the certificate indicates that the wireless terminal device is authorized to receive the requested user information. The at least one processor may be further configured to transmit, to the wireless terminal device, the requested user information when the certificate indicates that the wireless terminal device is authorized to receive the requested user information.