G06F2221/2111

COMMUNICATIONS DEVICE, METHOD AND COMMUNICATIONS SYSTEM FOR MANAGING AN AUTHENTICATION EVENT

A communications device for managing an authentication event is provided, which is configured to generate location data indicative of a geolocation associated with the communications device, retrieve, from a key that is obfuscated and stored in the communications device, the key, sign the location data with the retrieved key, and transmit request data to a communications server apparatus for requesting the authentication event, the request data comprising the signed location data. A method and a communications system for managing an authentication event are also provided.

Method and Device for Determining a Definite Distance

A method for determining a definite safe distance between a wirelessly communicating object transponder and at least one anchor gateway in accordance with a two-way ranging method, wherein transmission and reception timestamps are detected for each communication message via the transponder and the at least one anchor gateway, each of the timestamps from the transponder and the at least one anchor gateway together with at least one respective piece of timestamp monitoring information are transmitted to a failsafe computing device, at least one check is implemented via the failsafe computing device, and the definite safe distance is determined via the failsafe computing device aided by the checked timestamps, where timestamp errors occurring during the detection of the timestamps are caused solely by the transponder or alternatively solely the one anchor gateway.

MODULAR DEVICE MESH NETWORK FOR ASSOCIATED DEVICE INTEGRATION

Embodiments of the present invention provide a system for facilitating a secure way to allow primary users and secondary users to perform interactions remotely via an automated machine and one or more auxiliary devices on the same local network. In particular, the system may assign exclusive control over an automated device and one or more auxiliary devices to a primary user via a computing device connected to the same local network or virtual private network as the automated machine, and may allow the primary user to communicate via the automated machine with a secondary user who wishes to complete one or more resource interactions.

Geographically secure access to container controller

An illustrative example embodiment of a controller associated with a container includes a processor and memory. The controller is configured to generate a derived key based on global positioning system information corresponding to a location of the controller. The controller uses the derived key to authenticate a user device.

System and method for providing multimedia digital rights transfer

A method for transferring digital multimedia rights, the method including but not limited to requesting permission from the destination end user to transfer the digital multimedia rights to the destination end user device; and if the permission is received from the destination end user, canceling the source set of digital multimedia rights associated with the source end user and transferring the source set of digital multimedia rights associated with the source end user to the destination end user device. A system and computer program product are disclosed for performing the method.

Active locking mechanism using machine learning

Methods and systems disclosed herein describe using machine learning to lock and unlock a device. Machine learning may be trained to recognize one or more features. Once the device has been trained to recognize one or more features, a user may define an unlock condition for the device using the one or more trained features. After defining the unlock condition, the device may be locked by verifying the one or more features that the user defined as the unlock condition using machine learning. When verification is successful, the device may be unlocked and the user allowed to access the device.

Methods and apparatus for associating media devices with a demographic composition of a geographic area

Example methods and apparatus for associating media devices with a demographic composition of a geographic area are disclosed. Disclosed example apparatus are to obtain a plurality of Internet Protocol addresses assigned to a media device associated with a panel member. Disclosed example apparatus are also to determine a most used Internet Protocol address from the plurality of Internet Protocol addresses, determine a geographic location corresponding to the most used Internet Protocol address, associate a geographic area with the media device in response to a determination that the geographic location corresponds to a location of an internet service provider, determine a demographic profile associated with the geographic area, and associate the demographic profile with the media device.

Location-based asset usage control
11558744 · 2023-01-17 · ·

A lighting device includes a light source configured to emit a light and a sensor configured to receive identification information from an asset tag of a physical asset. The lighting device further includes a processor configured to send the identification information received from the asset tag and location information of the lighting device to a control device. The processor is further configured to receive a usage control message from the control device and transmit the usage control message, where the usage control message controls whether the physical asset is used at a location indicated by the location information.

SECURE AUTHENTICATION
20230010347 · 2023-01-12 · ·

Methods and systems are disclosed herein for authenticating a user. A security device may use an object associated with a user and a device of the user to authenticate the user, for example, if the user has forgotten a password. A user may insert the object (e.g., a card, or other object) into the security device and may select an option to authenticate via a device that is trusted by both the security device and the user, rather than authenticating by entering a password at the security device.

Allocating requests

This disclosure describes, in part, techniques and systems for enabling new devices introduced into respective environments (“provisionee devices”) to be provisioned by existing devices in the respective environments (“provisioner devices”) in a manner in which the provisioning requests sent by the provisioner devices are allocated over time and, thus, do not overwhelm the provisioning system(s) at any given time.