H04W12/77

Object control system to control navigation of a moving vehicle when exiting a road or a freeway
11538336 · 2022-12-27 · ·

This application discloses an object control system (OCS) to control navigation of a moving vehicle when exiting from its own road or freeway to a new road or freeway. The new road or freeway is an underpass or overpass and have no physical junction with the moving vehicle's own road or freeway. The moving vehicles obtains its navigation information data from the IoT network it is registered with and a plurality of stationary objects near and in vicinity of an exit. The stationary objects during the time slots assigned to them by OCS transmit variety of information data that assist moving vehicle navigating to the right lane and exit. These stationary objects also provide an operation information data that is used in the new road or freeway in case the vehicle exits to a road or freeway that belongs to a new cell with different operation information data.

MULTIFACTOR AUTHENTICATION USING THREE-DIMENSIONAL DATA OBJECTS FOR CONFIGURABLE WORKSPACES
20220408269 · 2022-12-22 · ·

In some implementations, the device may include a mobile user device having a first side and a second side, the mobile user device having a first wireless communication interface communicatively coupled to a cloud network, an optical imaging camera positioned on the first side of said mobile user device, a first LIDAR camera disposed on the first side, and a display screen disposed on said second side of said mobile user device. In addition, the device may include a conferencing device having an outer enclosure, the conferencing device including a display screen housed withing said outer enclosure, a bezel cover that forms a part of the outer enclosure and covers said display screen, where said bezel cover includes an electrochromatic region that is transparent when electrically energized and said electrochromatic region is opaque when de-energized. The device may include a three-dimensional object encoded with a symbology for representing data in the x-direction, y-direction, and z-direction, said three-dimensional object disposed behind said electrochromatic region of said bezel cover and inside the interior of said enclosure. Moreover, the device may include a remote cloud server having a network interface communicatively coupled to said remote cloud server, the remote cloud server having CPU and a nonvolatile storage.

MULTIFACTOR AUTHENTICATION USING THREE-DIMENSIONAL DATA OBJECTS FOR CONFIGURABLE WORKSPACES
20220408269 · 2022-12-22 · ·

In some implementations, the device may include a mobile user device having a first side and a second side, the mobile user device having a first wireless communication interface communicatively coupled to a cloud network, an optical imaging camera positioned on the first side of said mobile user device, a first LIDAR camera disposed on the first side, and a display screen disposed on said second side of said mobile user device. In addition, the device may include a conferencing device having an outer enclosure, the conferencing device including a display screen housed withing said outer enclosure, a bezel cover that forms a part of the outer enclosure and covers said display screen, where said bezel cover includes an electrochromatic region that is transparent when electrically energized and said electrochromatic region is opaque when de-energized. The device may include a three-dimensional object encoded with a symbology for representing data in the x-direction, y-direction, and z-direction, said three-dimensional object disposed behind said electrochromatic region of said bezel cover and inside the interior of said enclosure. Moreover, the device may include a remote cloud server having a network interface communicatively coupled to said remote cloud server, the remote cloud server having CPU and a nonvolatile storage.

SYSTEM AND METHOD FOR AUTHENTICATING A USER OF A BANKING DEVICE

A banking device in accordance with the present disclosure includes processing circuitry that is configured to receive user authentication information from a mobile device of a user interacting with the mobile device. The user authentication information may include a token indicating that the user of the mobile device is authenticated. The processing circuitry is further configured to contact, in response to reception of the user authentication information a banking server to initiate a banking transaction; and initiate the banking transaction.

Non-transitory computer-readable medium storing computer-readable instructions for terminal device and terminal device
11531505 · 2022-12-20 · ·

A terminal device may obtain a public key and target identification information from a communication device, search for the communication device via a wireless interface of the terminal device, based on the target identification information and a result of the search for the communication device, determine whether the communication device is to establish a wireless connection with an external device or with the terminal device, in a case where it is determined that the communication device is to establish the wireless connection with the external device, send first connection information to the communication device, in a case where it is determined that the communication device is to establish the wireless connection with the terminal device, send second connection information different from the first connection information to the communication device, establish the wireless connection with the communication device via the wireless interface by using the second connection information.

METHODS, MEDIUMS, AND SYSTEMS FOR VERIFYING DEVICES IN AN ENCRYPTED MESSAGING SYSTEM
20220400000 · 2022-12-15 · ·

This application describes methods, mediums, and systems for verifying a device for use in a messaging system. Using the device verification procedures described, a messaging system can securely authorize new devices to send and receive encrypted messages on behalf of a user, preferably without the need to share a private encryption key between the users' different devices. The application describes several techniques that can be used to provide such a system, including distributing a computer-perceptible code that encodes encryption information between a secondary device and a primary device. This allows the information to be distributed without intervention by a server. Other techniques provide unique ways to build and reverify authorized device lists, distribute encryption keys in chat channels, ensure that lists of authorized devices are distributed in the correct order and remain valid for an appropriate amount of time, add new devices to an ongoing or new conversation, and more.

System for automated image authentication and external database verification

A system provides for automated image authentication and external database verification. In particular, the system may perform automatic authentication of an image by extracting data and/or metadata from the image for subsequent analysis. For instance, the extracted data and/or metadata may be compared with historical data to drive authorization processes (e.g., past instances of unauthorized activity). In some embodiments, the system may further use external databases which may be hosted by a trusted third party to perform additional authentication steps and/or verification. In this way, the system may provide a reliable and efficient way to perform authentications.

System for automated image authentication and external database verification

A system provides for automated image authentication and external database verification. In particular, the system may perform automatic authentication of an image by extracting data and/or metadata from the image for subsequent analysis. For instance, the extracted data and/or metadata may be compared with historical data to drive authorization processes (e.g., past instances of unauthorized activity). In some embodiments, the system may further use external databases which may be hosted by a trusted third party to perform additional authentication steps and/or verification. In this way, the system may provide a reliable and efficient way to perform authentications.

Proximity-based access

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for proximity-based access. In some implementations, a computing device detects an attempt to access the computing device while the computing device is in a secured state. In response to detecting the attempt to access the computing device, the computing device sends a first message to a server system over a network. After sending the message, the computing device receives a second message from the server system over the network, the second message comprising authentication data for the computing device. The computing device determines that a mobile device that was previously designated as an authentication factor for accessing the computing device is located within a predetermined level of proximity of the computing device, and the computing device grants access to the computing device.

Access controlling network architectures utilizing cellular signaled access control to restricted services with expected keys in accordance with novel communications protocols, and methods for use thereof
11516666 · 2022-11-29 · ·

In some embodiments, the present disclosure provides an access controlling network architecture may include: a processor in communication with a non-transitory computer readable medium storing application program instructions that when executed, cause the processor to: generate an expected access control digital key for authenticating a computing device that is operationally linked to access-restricted digital resource for accessing; record the expected access control digital key in a computer memory associated with the access controlling platform; cause to display the expected access control digital key at the computing device; receive a mobile originating communication, having: a particular access control digital key and an identity linked to the computing device; perform a confirmation of the particular access control digital key with the expected access control digital key; transmit, when the confirmation is successful, an access authentication indicator; configured to cause to unlock the at least one access-restricted digital resource for accessing.