Patent classifications
H04W12/79
SYSTEMS AND METHODS FOR DIGITAL IDENTITY VERIFICATION
Systems and methods for digital identity verification are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for digital identify verification may include: (1) receiving, from a user electronic device or at a website, an image of an identity document for a user, the identity document comprising an image of the user; (2) processing the identity document with at least one business-specific rule; (3) extracting identity information from the identity document; (4) determining a match rate of the image of the user on the identity document to a captured image; (5) assigning a verification score to the user based on extracted identity information and the match rate; and (6) publishing the verification score to at least one system.
System and Method for Identifying a Remote Device
A system and corresponding method identify a remote device. The system comprises a transceiver and a classifier. The transceiver captures a channel state information (CSI) packet that is sent from a receiver device in response to receiving a calibration packet. The calibration packet is sent by the remote device via transmitter hardware. The classifier extracts a feature set from the CSI packet captured. The feature set is affected by characteristics of the transmitter hardware. The classifier produces a classified feature set by classifying the feature set extracted. The classifier further determines an identifier based on the classified feature set. The identifier corresponds to the remote device. The system enables the remote device to be fingerprinted via the identifier and without the need for software-defined radio (SDR) capabilities. As such, the system can be any low-cost Wi-Fi device, such as a laptop.
MOBILE DEVICE AND INFRASTRUCTURE SYSTEMS
Magnetic field sensors of mobile devices are used for providing the mobile devices with information at a locally extremely restricted area in that, specifically, a magnetic field modulated with the information is locally generated at this position by an information signal generator.
Transmit-side misbehavior condition management
In various embodiments, a vehicle-to-everything (V2X) processing device detecting a misbehavior condition in a system of the vehicle, and prevent the vehicle from sending a V2X message related to the detected misbehavior condition in response to detecting the misbehavior condition in the system of the vehicle. In some embodiments, the V2X processing device may receive information from a plurality of information sources of the vehicle, and may detect the misbehavior condition in the system of the vehicle by performing a cross-check of information received from the plurality of information sources of the vehicle to detect an inconsistency within the received information.
Privacy for directional data
Directional data often conveys particularly sensitive information, such as user location. To protect user privacy, directional data is replaced with modified directional data that is selected based on the actual directional data, a privacy parameter, and a probability distribution on an n-sphere. In this way, the modified directional data value is useful when aggregated with other modified directional data values, but does not infringe the privacy of the directional data of the user.
Privacy for directional data
Directional data often conveys particularly sensitive information, such as user location. To protect user privacy, directional data is replaced with modified directional data that is selected based on the actual directional data, a privacy parameter, and a probability distribution on an n-sphere. In this way, the modified directional data value is useful when aggregated with other modified directional data values, but does not infringe the privacy of the directional data of the user.
SYSTEMS AND METHODS FOR SELECTIVELY PROVIDING WIRELESS SIGNAL CHARACTERISTICS TO SERVICE PROVIDERS
Systems and methods are described for selectively providing data to service providers. Wireless signal characteristics may be transmitted over a wireless network by network equipment in a household, and a map of the household may be generated based on the determined wireless signal characteristics. An API request may be received from a service provider, and an authorization level of the service provider may be determined. Based on the authorization level of the service provider, at least one portion of the map and at least one of the wireless signal characteristics to transmit to the service provider may be identified, and the identified at least one portion of the map and at least one of the wireless signal characteristics may be transmitted to the service provider via the API.
Method and device for securing network
A method, performed by an observer node, of securing a network, includes: receiving a signal over the network; determining, based on a frequency characteristic of the received signal, which is determined according to a physical characteristic of a node, which transmits the received signal, a node, which has transmitted the received signal among a plurality of nodes included in the network; comparing a pre-learned signal pattern of the determined transmission node with a pattern of the received signal to determine whether the determined transmission node is a malicious node; and blocking the signal transmitted from the malicious node by determining that the transmission node is a malicious node.
MANAGEMENT OF AN ADAPTIVE RELAY METHOD FOR LOST-DEVICE BLUETOOTH LOW ENERGY SIGNALING
Techniques and apparatus for managing a message relaying system are described. One technique includes an access point (AP) detecting a first signal and a second signal from a computing device. A validation of the first signal is performed based on parameters of the first signal and the second signal. After the validation, information associated with the first signal is transmitted to a computing system. In another technique, the computing system may designate one of multiple APs reporting information regarding first signals as a primary reporting AP and designate the remaining APs as secondary reporting APs. The computing system may instruct the secondary reporting APs to refrain from reporting information regarding first signals to the computing system.
MANAGEMENT OF AN ADAPTIVE RELAY METHOD FOR LOST-DEVICE BLUETOOTH LOW ENERGY SIGNALING
Techniques and apparatus for managing a message relaying system are described. One technique includes an access point (AP) detecting a first signal and a second signal from a computing device. A validation of the first signal is performed based on parameters of the first signal and the second signal. After the validation, information associated with the first signal is transmitted to a computing system. In another technique, the computing system may designate one of multiple APs reporting information regarding first signals as a primary reporting AP and designate the remaining APs as secondary reporting APs. The computing system may instruct the secondary reporting APs to refrain from reporting information regarding first signals to the computing system.