Patent classifications
H04W12/65
ELECTRONIC APPARATUS, CONTROLLING METHOD OF ELECTRONIC APPARATUS AND SERVER
An electronic apparatus which registers a device to a server by using a voice, and a method therefor are provided. The electronic apparatus includes a communication circuit, a microphone, a memory for storing computer executable instructions, and at least one processor configured to execute the computer executable instructions to acquire, from a voice received through the microphone, information on an external device which a user wishes to register, based on an external device corresponding to the acquired information being searched through the communication circuit, control the communication circuit to transmit information on an access point to the external device to enable the external device to communicate with a server, and control the communication circuit to transmit a registration request with respect to the external device to the server.
PERSONAL AUTHENTICATION DEVICE, PERSONAL AUTHENTICATION METHOD, AND RECORDING MEDIUM
Provided is a personal authentication device capable of simply securing security with little psychological and physical burden of a user to be authenticated. Personal authentication device includes: transmission unit that transmits a first acoustic signal to a user's head; observation unit that observes a second acoustic signal after the first acoustic signal propagation; calculation unit that calculates acoustic characteristics from the first and the second acoustic signal; extraction unit that extracts a feature amount related to a user from the acoustic characteristics; storage control unit that registers the feature amount in the storage unit; identification unit that identifies the user by collating the first feature amount with a second feature amount; and storage unit stores the first feature amount, wherein while identification unit identifies the user as being identical, transmission unit transmits the first acoustic signal every predetermined interval.
Snding Verification Password Responsive to Mobile Device Proximity
A method includes detecting proximity between a mobile device and a remote device associated with a transaction reserved by a user of the mobile device and a mode of the electronic device. A verification password is sent to the remote device responsive to detecting the proximity and the mode. A device includes a module to detect proximity between the device and a remote device associated with a transaction reserved by a user of the device occurring within a predefined distance threshold and a processor coupled to the module. A device includes another module to detect a stationary mode of the electronic device occurring for at least a predefined duration threshold. The processor is sends a verification password to the remote device responsive to detecting the proximity and the mode.
IoT security service
The disclosed technology is generally directed to device security in an IoT environment. For example, such technology is usable in IoT security. In one example of the technology, a set of security rules that is associated with an expected condition of at least one IoT device is stored. IoT data associated with the at least one IoT device is received. The IoT data may be aggregated data that includes at least two different types of data. A determination is made, based on the IoT data, as to whether the set of security rules has been violated. An alert is selectively sent based on the determination.
IoT security service
The disclosed technology is generally directed to device security in an IoT environment. For example, such technology is usable in IoT security. In one example of the technology, a set of security rules that is associated with an expected condition of at least one IoT device is stored. IoT data associated with the at least one IoT device is received. The IoT data may be aggregated data that includes at least two different types of data. A determination is made, based on the IoT data, as to whether the set of security rules has been violated. An alert is selectively sent based on the determination.
Method and System for Auto Filling of Payment Card Information in a Web Application
A method and system for auto filling of payment card information in a web application. The computer-implemented method includes receiving an input code, by an auto fill system configured in a device associated with a user, including one of an audio code or QR code from a payment card when the payment card is in proximity to the device. The received input code is transmitted to an issuing server of the payment card. Thereafter, the computer-implemented method includes receiving payment card information associated with the input code from the issuing server. Once the payment card information is received, the computer-implemented method includes auto filling the payment card information at a payment screen of a web application in the device for completing a transaction on the web application. The present disclosure provides an efficient and error free mechanism for filling of payment card information in a web application.
COOPERATIVE EARLY THREAT DETECTION AND AVOIDANCE IN C-V2X
Method and apparatus for cooperative early threat detection and avoidance in C-V2X. In one aspect, the apparatus detects a threat entity within a threat zone based on data signals received from the threat entity, wherein the threat entity obstructs wireless spectrum or resources utilized in cooperative or automated driving decisions. The apparatus transmits, to at least one second wireless device, a message indicating the threat entity within the threat zone.
COOPERATIVE EARLY THREAT DETECTION AND AVOIDANCE IN C-V2X
Method and apparatus for cooperative early threat detection and avoidance in C-V2X. In one aspect, the apparatus detects a threat entity within a threat zone based on data signals received from the threat entity, wherein the threat entity obstructs wireless spectrum or resources utilized in cooperative or automated driving decisions. The apparatus transmits, to at least one second wireless device, a message indicating the threat entity within the threat zone.
ENVIRONMENTAL TASK-BASED AUTHENTICATION
A processing system may detect a physical location of a user via at least one mobile computing device of the user, where the user is to be authenticated for a network-based transaction, identify at least one network-connected sensor device at the physical location, and determine, from the at least one network-connected sensor device, a set of environmental conditions of an environment of the physical location. The processing system may next identify at least one action for the user to perform to interact with at least one aspect of the environment in accordance with the set of environmental conditions and transmit an instruction to the user to perform the at least one action. The processing system may then obtain sensor data from the at least one network-connected sensor device, determine, from the sensor data, that the user performed the at least one action, and authenticate the user for the network-based transaction.
System and method for secure pairing of Bluetooth devices
A mobile device includes a Bluetooth transceiver, the Bluetooth transceiver being in an idle power state when not securely paired to a second Bluetooth transceiver of a peripheral device. The mobile device further includes an audio interface, the audio interface coupled to the Bluetooth transceiver, the audio interface configured to connect to a second audio interface of the peripheral device. The mobile device is configured to establish an out-of-band audio communication channel to the peripheral device by connecting the audio interface to the second audio interface, the mobile device configured to exchange Bluetooth authentication data with the peripheral device via the out-of-band audio communication channel in response to transitioning to an operating state, the mobile device configured to initialize the Bluetooth transceiver with the Bluetooth authentication data to establish an authenticated and cryptographically protected in-band Bluetooth communication channel allowing the mobile device to be securely paired with the peripheral device.