Patent classifications
H04W12/68
SYSTEM AND METHODS FOR PROACTIVE PROTECTION AGAINST MALFEASANT DATA COLLECTION
Embodiments of the invention are directed to systems, methods, and computer program products for providing intelligent proactive identification of, and protection against, malfeasant data collection, user device control, or user account access. The invention utilizes a continuous data analysis technique in order to recognize patterns in device data and network communications indicative of remote device control requests, and responds to these identified data points by implemented an automated solution to protect users against unauthorized access of their devices or accounts.
Distributed Content Serving
A method, system and product including obtaining offline user information at an end device, wherein the offline user information is obtained from offline sensors of the end device; based on the offline user information, generating a user profile indicating that a user of the end device matches at least one micro-segment, wherein the at least one micro-segment comprises at least one detailed population category; based on the at least one micro-segment, selecting a campaign from a set of one or more campaigns retained at a server, wherein the campaign comprises one or more rules for displaying at least one content item; monitoring the offline sensors of the end device to identify real time user activities; and upon identifying, based on the real time user activities, that a rule of the one or more rules for displaying a content item is complied with, displaying the content item in the end device.
METHODS AND SYSTEMS FOR FACILITATING VARIABLE AUTHENTICATION OF USERS ON MOBILE DEVICES
Methods and systems are described herein for an improved mechanism for authenticating users. In particular, the methods and systems facilitate variable authentication of users on mobile devices based on current and historical physical movement of the mobile devices at geographic locations and during predetermined time intervals while maintaining user privacy. Specifically, methods and systems authenticate users by comparing current motion data to historical motion data to determine if a user must be re-authenticated. For example, current motion data may be inconsistent with historical motion data and may cause re-authentication of a user. As another example, current motion data may be consistent with historical motion data and may not require re-authentication of a user. Moreover, the methods and systems alleviate privacy concerns by not transmitting sensitive data over one or more wired or wireless networks.
DEVICE, COMPUTER PROGRAM AND METHOD
A device for authenticating a user is described that comprises a sensor configured to measure the movement of a user in response to the interaction of the user with a displayed image and controller circuitry configured to authenticate the user in response to a positive comparison between the movement of the user and a stored movement associated with the user.
DEVICE, COMPUTER PROGRAM AND METHOD
A device for authenticating a user is described that comprises a sensor configured to measure the movement of a user in response to the interaction of the user with a displayed image and controller circuitry configured to authenticate the user in response to a positive comparison between the movement of the user and a stored movement associated with the user.
DEVICE COMMUNICATION MANAGEMENT IN USER ACTIVITY MONITORING SYSTEMS
In some aspects, a method of managing communication between a first electronic device and a second electronic device. The method includes facilitating, by a first electronic device, motion of a second electronic device in a motion sequence; detecting, by the second electronic device, motion of the second electronic device in the motion sequence; determining, by the second electronic device, a key from the motion sequence from the detecting, the key being usable to communicate with the first electronic device; and wirelessly communicating, by a communication interface of the second electronic device, with the first electronic device using the key.
DEVICE COMMUNICATION MANAGEMENT IN USER ACTIVITY MONITORING SYSTEMS
In some aspects, a method of managing communication between a first electronic device and a second electronic device. The method includes facilitating, by a first electronic device, motion of a second electronic device in a motion sequence; detecting, by the second electronic device, motion of the second electronic device in the motion sequence; determining, by the second electronic device, a key from the motion sequence from the detecting, the key being usable to communicate with the first electronic device; and wirelessly communicating, by a communication interface of the second electronic device, with the first electronic device using the key.
Communication method between different electronic devices, server and electronic device supporting same
Disclosed is a server for supporting a communication environment between different electronic devices. The server includes a communication circuit, a memory, and a processor. The processor is electrically connected to the communication circuit and the memory. The processor is configured to receive a first voice signal transmitted from a second electronic device to a first electronic device through the communication circuit. The Processor is also configured to allow the first electronic device to transmit network connection information for connecting with the server to the second electronic device based on whether the first voice signal corresponds to a second voice signal stored in the memory.
Method and Device for Detecting User Data of User Equipment UE, and Storage Medium
This application discloses a method and device for detecting user data of UE, and a storage medium. The central detection node device determines abnormal UE based on core network signaling data, determines an abnormal group feature based on the abnormal UE and sends the abnormal group feature to an edge detection node device. Where the abnormal UE is UE with an abnormal behavior and the abnormal group feature includes an identifier or a user data transmission mode used by the abnormal UE to perform communication.
Device, computer program and method
A device for authenticating a user is described. This device comprises transceiver circuitry configured to receive motion information from a plurality of wearable devices located on a user's body indicative of the motion of the user's body at the location of the respective wearable device at a particular time; and 5 controller circuitry configured to: compare the received motion information and the location of the respective wearable device and authenticate the user in the event of a positive comparison between the received motion information and the location of the respective wearable device with stored motion information and the location of the respective wearable device.