Patent classifications
H04W12/66
REMOTE DEVICE CONTROL
Disclosed is a server arrangement for control of remote devices, such as Internet of Things devices. The server arrangement comprises a network interface for connection to a gateway device, a data store, and processing means. The processing means are configured to establish through the network interface a network connection to the gateway device, transfer security credentials over the network connection to the gateway device, to enable the gateway device to obtain control of one or more Internet of Things devices, establish an agency relationship with the gateway device to authorise the gateway device to perform control of Internet of Things devices on behalf of the server arrangement, creating a distributed management architecture, assign tasks to be performed the gateway device on behalf of the server arrangement, receive from the gateway device event data relating to Internet of Things devices, and store the event data in the data store.
IDENTITY MANAGEMENT VIA A CENTRALIZED IDENTITY MANAGEMENT SERVER DEVICE
A device can establish an identity for an individual by communicating with a first set of devices. The first set of devices can include a user device, a first server device associated with a certificate authority, or a second server device associated with an identity provider. The device can authenticate the identity of the individual by communicating with a second set of devices. The second set of devices can include the user device, or a third server device associated with a first service provider. The device can authorize the identity of the individual to be used by one or more service providers by communicating with a third set of devices. The third set of devices can include the user device, the third server device, or a fourth server device associated with a second service provider.
COMPLEX COMPOSITE TOKENS
Technologies are shown for trust delegation that involve receiving a first request from a subject client and responding by sending a first token having first permissions to the subject client. A second request from a first actor includes the first token and responding involves linking the first actor to the subject client in a trust stack and sending a second token to the first actor with second permissions, the second token being a first complex token that identifies the subject client and the first actor. A third request from a second actor includes the second token and responding to the third request involves linking the second actor to the first actor in the trust stack, and sending a third token to the second actor partner with third permissions, the third token being a second complex token that identifies the first actor and the second actor.
Multi-Factor Autonomous SIM Lock
Aspects of the subject disclosure may include, for example, initializing a secure timer in a wireless device, determining whether a subscriber identification module (SIM) card installed in the wireless device comprises a carrier identity that matches a carrier identity stored in the machine-readable medium, establishing a network connection with a trusted server, starting the secure timer if the SIM card and network connection are satisfactory, periodically checking the network connection and SIM card until expiry of the secure timer, penalizing the secure timer responsive to a failure of the network connection or SIM card check, and responsive to expiry of the secure timer, unlocking a SIM lock. Other embodiments are disclosed.
Wireless communication device management
A system, for managing wireless devices within a restricted area is disclosed, wherein the system constructs models, containing attributes/characteristics and at least prior history data information associated with wireless devices, wherein the information is used to determine whether the wireless devices are allowed to operate within the area by the device responding to a plurality of inquiries that require the device and/or the user to provide information which is compared to the modeled data.
SYSTEMS AND METHODS FOR SEAMLESSLY CONNECTING DEVICES BASED ON RELATIONSHIPS BETWEEN THE USERS OF THE RESPECTIVE DEVICES
Systems and methods are described for seamlessly connecting devices based on relationships between the users of the respective devices. A media guidance application may determine that a first user has entered an environment (e.g., his/her mother's home) and may determine a frequency with which the first user enters the environment (e.g., daily). In response to determining that the first user visits frequently, the media guidance application may identify a second device in the environment (e.g., a smart TV) that a second user (e.g., the first user's mother) is authorized to grant access rights for. The media guidance application may determine a likelihood that the second user will grant the access rights for the second device to the first user, based on interaction data between the first user and the second user. In response to determining a high likelihood, the media guidance application may transmit the access rights.
Method for Joining a Zigbee Device to a Zigbee Network and Corresponding Zigbee Device
A method for joining a Zigbee device to a Zigbee network, includes starting a Zigbee protocol stack and a Bluetooth protocol stack on the Zigbee device, sending out Zigbee requests to seek for Zigbee networks, sending out Bluetooth beacon messages containing a Zigbee install code, wherein the Zigbee requests and the Bluetooth beacon messages are sent out in a time division multiplex manner.
RECEIVER DEVICE FOR FACILITATING WIRELESS ENERGY RECEPTION
Disclosed herein is a receiver device for facilitating wireless energy reception. Accordingly, the receiver device may include a receiver transceiver. Further, the receiver transceiver may be configured for receiving energy wirelessly from at least one transmitter device. Further, the receiver transceiver may be configured for transmitting a registration request to the at least one transmitter device. Further, the registration request may include a unique receiver device identifier. Further, the at least one transmitter device may be configured for analyzing the registration request. Further, the at least one transmitter device may be configured for accessing a distributed block-chain associated with wireless energy transfer based on analyzing. Further, the at least one transmitter device may be configured for authenticating the receiver device based on the accessing. Further, the at least one transmitter device may be configured for transmitting the energy wirelessly to the receiver transceiver based on the authenticating.
Enhanced secure authentication
A method for authenticating a user of a mobile electronic computing device to perform operations on a first electronic computing device includes receiving a request to access the first electronic computing device. In response to the request to access, a first identifier is sent to the mobile electronic computing device. A second identifier is received from a second electronic computing device. The second electronic computing device is different from the mobile electronic computing device. A determination is made as to whether the first identifier matches the second identifier. When the first identifier matches the second identifier, a trust score is calculated for the user. A determination is made as to whether the trust score is equal to or greater than a threshold. When the trust score is equal to or greater than the threshold, the user is authenticated to login to the first electronic computing device.
Conducting secure interactions utilizing reliability information
Embodiments of the invention are directed assessing reliability between two computing devices. A distributed database may maintain reliability associations between pairs of computing devices. Each reliability association may indicate a particular device has determined (e.g., locally) that another device is reliable. In order to determine an amount of reliability between a first computing device and a second computing device, an ordered combination of the reliability associations may be determined utilizing the distributed database. The ordered combination of reliability associations may identify a reliability path between the first computing device and the second computing device. An amount of reliability may be determined based on the reliability path. An interaction between the devices may be allowed or restricted based at least in part on the amount of reliability between the computing devices.