Patent classifications
H04L63/0492
Partial uses of clustered access rights
Systems and methods are provided for communication networks and network operations for processing partial uses of clustered access rights. The communication networks may include channels such as short-range communication channels, such as Bluetooth, BTLE, and/or near-field communication (NFC) channels.
Method and devices for communicating between an internet of things device and a remote computer system
For communicating between an Internet of Things (IoT) device and a remote computer system, the IoT device transmits an upload data message via a close range communication circuit to a mobile communication device, for forwarding to the remote computer system. The remote computer system receives the upload data message via a mobile radio communication network and stores an address of the mobile communication device, as a communication relay address for the IoT device. The remote computer system transmits a download data message via the mobile radio communication network to the communication relay address, for forwarding to the IoT device. The IoT device receives the download data message from the remote computer system, as forwarded by the mobile communication device via the close range communication circuit.
Sharing system access using a mobile device
Techniques are disclosed relating to using a device to gain access to another system. In some embodiments, a first mobile device performs a pairing operation with a control unit that controls access to a system, the pairing operation including the first mobile device establishing a first cryptographic key with the control unit. The first mobile device receives a request to enable a second mobile device to communicate with the control unit, and in response to receiving the request, the first mobile device generates a second cryptographic key from the first cryptographic key. The first mobile device provides the second cryptographic key to the second mobile device. The second mobile device is configured to send a beacon including a payload encrypted with the second cryptographic key, and the encrypted payload is usable to authenticate the second mobile device to the control unit.
Method and electronic device for information processing
An information processing method includes establishing, in response to a distance between a first electronic device and a second electronic device being less than a distance value, a communication connection between a first communication assembly of the first electronic device and a second communication assembly of the second electronic device; obtaining, by the first electronic device, information of the second electronic device through the first communication assembly and the second communication assembly; and connecting the first electronic device to a network based on the information.
METHODS AND DEVICES FOR GRANTING TEMPORARY REMOTE ACCESS VIA BIOMETRIC DATA
Methods and devices are provided for granting temporary remote access via biometric data. A method may include establishing, by a content computing device, a communication session between the content computing device and a remote computing device. The method may further include receiving, by the content computing device from a biometric sensor, a signal confirming biometric authentication thereby establishing an authentication session between the content computing device and the biometric sensor. The method may further include granting, by the content computing device, the temporary remote access for the remote computing device to the data stored in a data storage of the content computing device during said communication session and while the authentication session remains valid. The content computing device is configured to be proximate to the biometric sensor.
Authenticated device assisted user authentication
A system for user authentication includes an authenticated device with a restricted-access function that a user is able to access in response to verification of an identity of the user by the authenticated device and a proximate device with a restricted-access function that the user is able to access in response to the proximate device receiving authentication data that includes the identity of the user from the authenticated device. The authenticated device is operable to identify an absence of intent of the user to access the restricted-access function of the proximate device, and in response to identifying the absence of intent to access the restricted-access function of the proximate device, emit a locking signal such that, in response to detecting the locking signal, the proximate device enters a locked state and the restricted-access function of the proximate device is inaccessible to the user.
Systems and methods for managing the processing of customer information within a global enterprise
A method for managing customer information pertaining to at least one application associated with a provider. The method includes obtaining initial application information pertaining to the at least one application. The initial application information includes a location of processing of the customer information by the at least one application. The method further includes determining whether additional application information is required based on the location of processing. The method further includes, upon determining that the additional application information is required, obtaining the additional application information based at least in part on the location of processing. The method further includes determining a risk level associated with the at least one application based on the initial application information and the additional application information.
Method and Devices for Communicating Between an Internet of Things Device and a Remote Computer Syst
For communicating between an Internet of Things (IoT) device and a remote computer system, the IoT device may transmit an upload data message via a close range communication circuit to a mobile communication device, for forwarding to the remote computer system. The remote computer system may receive the upload data message via a mobile radio communication network and store an address of the mobile communication device, as a communication relay address for the IoT device. The remote computer system may transmit a download data message via the mobile radio communication network to the communication relay address, for forwarding to the IoT device. The IoT device may receive the download data message from the remote computer system, as forwarded by the mobile communication device via the close range communication circuit.
Security Of Wi-Fi Protected Setup Procedure
Solutions pertaining to improvement in the security of a Wi-Fi Protected Setup (WPS) procedure are proposed. An access point (AP) determines that a WPS procedure is activated. In response, the AP varies a transmission (Tx) power in transmitting one or more WPS management frames during the WPS procedure. Moreover, the AP configures one or more credentials to a station (STA) in response to receiving one or more management frames from the STA.
Method for acquiring access rights to conditional access content
A method of acquiring access rights to conditional access content. The method comprises receiving an access right on a first terminal through a first communication channel; storing said access right in said first terminal; sending a request for said conditional access content to a content provider, said request containing at least an identifier of an account to which said first terminal is associated, an identifier of the requested content and a piece of information concerning said access right; verifying, by said content provider, the authenticity of said access right using said piece of information concerning the access right; and when there has been a successful verification, marking said access right as used, and sending said conditional access content to at least one terminal linked to said account. The first terminal using near field communication technology (NFC) during at least one transfer of said access rights.