H04L63/0492

COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND IMAGE FORMING APPARATUS

In a communication system, an image forming apparatus sends an address of a receiving section to an external device. The external device receives a selection of image data through plural thumbnails displayed on a display section, and wirelessly sends the selected image data to the image forming apparatus with the address. The image forming apparatus receives the selected image data sent with the address by the external device, and prints an image based on the selected image data. The image forming apparatus accepts a selection indicating whether a communication between the external device and the image forming apparatus is performed by a first communication system method or a second communication system method. The image forming apparatus performs sending and/or receiving the image data with the address by the first communication system method when the first communication system method is selected, and performs sending and/or receiving the image data with the address by the second communication system method when the second communication system method is selected.

SHARING CONTENT WITH PERMISSION CONTROL USING NEAR FIELD COMMUNICATION
20180007022 · 2018-01-04 ·

A sending device receives a user input indicating that the user wishes to share and open item of content with a receiving device. A near field communication link is opened between the sending device and the receiving device. Metadata for sharing the open data is gathered on the sending device and a permission setting user interface display is displayed, with the user input mechanism that allows a user to set permissions corresponding to the open item. User actuation of the permission setting user input mechanism is received, the permissions are added to the open item, and the metadata is sent to the receiving device over the near field communication link. The metadata includes a location of the open item. The open item can then be accessed by the receiving device, with the permissions applied to the open item.

AUTOMATIC MULTIMEDIA UPLOAD FOR PUBLISHING DATA AND MULTIMEDIA CONTENT
20230239685 · 2023-07-27 ·

Disclosed herein is a method and system for utilizing a digital data capture device in conjunction with a Bluetooth (BT) enabled mobile device for publishing data and multimedia content on one or more websites automatically or with minimal user intervention. A client application is provided on the BT enabled mobile device. In the absence of inbuilt BT capability, a BT communication device is provided on the digital data capture device. The BT communication device is paired with the BT enabled mobile device to establish a connection. The client application detects capture of data and multimedia content on the digital data capture device and initiates transfer of the captured data, multimedia content, and associated files. The digital data capture device transfers the captured data, multimedia content, and the associated files to the client application. The client application automatically publishes the transferred data and multimedia content on one or more websites.

Speculative Activation for Secure Element Usage

If a secure element accesses a resource that is separate from the secure element, conducting a secure transaction can be inefficient in terms of power or time. Power usage is inefficient if the resource is never permitted to sleep, and transaction time is inefficient if the resource is permitted to sleep, and the user experiences a delay. To enable dual efficiency, a resource entity is permitted to be powered down. The resource entity is then powered up speculatively by an activation controller. The activation controller predicts an upcoming secure transaction based on sensor output, such as a position fix or a detected electromagnetic field. Based on monitored sensor output, the activation controller issues an activation signal to power up the secure element or the resource entity prior to initiation of the upcoming secure transaction. Thus, power can be conserved without introducing a transaction-processing latency.

Physical contact detection for device pairing
11706827 · 2023-07-18 · ·

Devices, methods, and systems for physical contact detection for device pairing are described herein. One device includes a mechanism configured to detect physical contact between the device and a wireless device, a memory, and a processor configured to execute executable instructions stored in the memory to perform a pairing of the wireless device and the device only upon the mechanism detecting the physical contact between the device and the wireless device.

METHOD FOR ACQUIRING ACCESS RIGHTS TO CONDITIONAL ACCESS CONTENT

A method of acquiring access rights to conditional access content. The method comprises receiving an access right on a first terminal through a first communication channel; storing said access right in said first terminal; sending a request for said conditional access content to a content provider, said request containing at least an identifier of an account to which said first terminal is associated, an identifier of the requested content and a piece of information concerning said access right; verifying, by said content provider, the authenticity of said access right using said piece of information concerning the access right; and when there has been a successful verification, marking said access right as used, and sending said conditional access content to at least one terminal linked to said account. The first terminal using near field communication technology (NFC) during at least one transfer of said access rights.

METHODS, SYSTEMS, AND DEVICES FOR VERIFYING A LOCATION OF A COMMUNICATION DEVICE
20230224305 · 2023-07-13 · ·

Aspects of the subject disclosure may include, for example, a processing system determining a first communication device initiating a communication session with a second communication device, and transmitting a notification to the second communication device. The notification indicates to the second communication device to initiate a location verification application on the second communication device, and the location verification application transmits notifications to adjacent network devices. Each notification indicates to an adjacent network device to provide its location to the processing system. Further embodiments include receiving locations from the adjacent network devices, and identifying a first location associated with the second communication device. Additional embodiments include determining that the first location is in proximity to the locations, and establishing the communication session between the first communication device and the second communication device. Other embodiments are disclosed.

Secure password generation and management using NFC and contactless smart cards
11544368 · 2023-01-03 · ·

Various embodiments are directed to securely generating and managing passwords using a near-field communication (NFC) enabled contactless smart card. For example, a secure password may be generated by generating a random number via a random number generator of the contactless smart card and converting the random number to one or more human-readable characters. In another example, a secure cryptographic hash function of the contactless smart card may generate a hash output value, which may be converted to one or more human-readable characters. The human-readable characters may be used as the secure password or it may be transformed to add more layers of security and complexity.

APPROACHES OF PERFORMING DATA PROCESSING WHILE MAINTAINING SECURITY OF ENCRYPTED DATA
20220414234 · 2022-12-29 ·

Systems and methods are provided for receiving encrypted data from a second computing system and instantiating the computing system to process the encrypted data. The instantiation includes decrypting the encrypted data using a private key, performing an operation on the decrypted data, presenting an output indicating a result of the operation on the decrypted data, and re-encrypting the decrypted data. After the data is re-encrypted, the data is transmitted to the second computing system or a third computing system.

SYSTEMS AND METHODS FOR SCALABLE CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS
20220407724 · 2022-12-22 ·

Systems and methods for authentication may include an authentication server. The authentication server may include a processor and a memory. The processor may be configured to transmit an authentication request. The processor may be configured to receive a first response that is responsive to the authentication request, the first response comprising a first cryptogram. The processor may be configured to generate a first challenge based on the first response. The processor may be configured to encrypt the first challenge with a symmetric key. The processor may be configured to transmit the first challenge receive a second response that is responsive to the first challenge, the second response comprising a second cryptogram. The processor may be configured to authenticate the second response.