Patent classifications
H04W12/47
METHOD AND SYSTEM OF AUTOMATICALLY CONNECTING A WIRELESS DEVICE TO NETWORK VIA PHONE
A method includes responsive to a device sensing a phone being adjacent to the device, triggering the device and the phone in a preliminary communication mode; periodically broadcasting by the device in the preliminary communication mode a broadcast message (P2) with a unique identification; detecting a strength of the broadcast message (P2) by the phone; responsive to detecting the strength of the broadcast message (P2) greater than a first threshold (T1), establishing a restricted wireless connection between the phone and the device; transmitting packages between the device and the phone via the restricted wireless connection; detecting strengths of the packages; and responsive to detecting strengths of the packages respectively greater than the first threshold (T1) and a second threshold (T2), establishing a complete wireless communication between the device and the phone so as to connect the device to the network via the phone.
METHOD AND SYSTEM OF AUTOMATICALLY CONNECTING A WIRELESS DEVICE TO NETWORK VIA PHONE
A method includes responsive to a device sensing a phone being adjacent to the device, triggering the device and the phone in a preliminary communication mode; periodically broadcasting by the device in the preliminary communication mode a broadcast message (P2) with a unique identification; detecting a strength of the broadcast message (P2) by the phone; responsive to detecting the strength of the broadcast message (P2) greater than a first threshold (T1), establishing a restricted wireless connection between the phone and the device; transmitting packages between the device and the phone via the restricted wireless connection; detecting strengths of the packages; and responsive to detecting strengths of the packages respectively greater than the first threshold (T1) and a second threshold (T2), establishing a complete wireless communication between the device and the phone so as to connect the device to the network via the phone.
ELECTRONICS MODULE FOR A WEARABLE ARTICLE
An interface (101) is arranged to communicatively couple with an electronics arrangement of the wearable article so as to receive a signal from the electronics arrangement. A controller (103) is communicatively coupled to the interface (101) and arranged to receive the signal from the interface (101). A power source (105) is coupled to the controller (103) and arranged to supply power to the controller (103). A first antenna (107) is arranged to communicatively couple with a mobile device over a first wireless communication protocol. A second antenna (109) is arranged to communicatively couple with the mobile device over a second wireless communication protocol. In response to the mobile device being brought into proximity with the electronics module (100), the first antenna (107) is triggered to transmit information to the mobile device over the first wireless communication protocol.
INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD, AUTHENTICATION DEVICE AND AUTHENTICATION METHOD, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD IN AUTHENTICATION SYSTEM, AND COMPUTER PROGRAM
An information processing apparatus that performs multifactor and multistage authentication procedures is to be provided. An information processing apparatus includes: an authentication procedure processing unit that performs an authentication procedure on an external device, using a tamper-resistant secure element; and a control unit that controls a process for multistage authentication of the external device, the multistage authentication including the authentication procedure. The control unit controls a process of a second authentication procedure using the identification information about the secure element, the identification information being associated with the user account information. The control unit controls execution of the second authentication procedure during an operation in the login authentication procedure.
METHOD FOR PROCESSING AN AUTHORIZATION TO IMPLEMENT A SERVICE, DEVICES AND CORRESPONDING COMPUTER PROGRAM
A method for processing, by a processing entity, of an authorization to implement a service and/or access an item. The method includes: reception, from a requesting device, of a request for implementing a service and/or accessing an item; searching for an indicator of dependency from at least one piece of data of said request for implementation; when an indicator of dependency is present, obtaining an authorization from a verification device to implement said service and/or access said item.
SYSTEMS AND METHODS TO PERFORM CONTACTLESS CARD ACTIVATION
Example embodiments relate to performing activation techniques for contactless cards. For example, embodiments may include performing a near-field communication (NFC) exchange with a contactless card, processing a message comprising data to activate the contactless card, communicating the data to a server to activate the contactless card; and receiving a response from the server, the response to indicate whether the contactless card is successfully activated or not successfully activated.
Anonymous contact tracing with network based hyperlocal authentication
A Network Based Hyperlocal Authentication (NBHA) system and method for anonymous contact tracing is described. The NBHA system and method operates as a background process, which is passwordless and continuously authenticates and performs cryptographic operations to secure communications between a wireless client device and a remote network component. A gateway includes a short-range wireless transmitter that transmits authentication credentials to the wireless client device having a short-range wireless receiver. The wireless client device uses the authentication credentials to authenticate to the remote network component. The network component then generates an exclusive local key for the wireless client device that is transmitted by the gateway. The client device application then requests cryptographic material from the remote network component. The client device application encrypts and decrypts communications to the network component with the cryptographic material and the exclusive local key. The wireless client device encrypts contact tracing data with the shared secret.
SECURITY TAG
A security tag can prohibit unauthorized usage of a device or product. The device may include an electronic nicotine delivery systems (“ENDS”) device, which may include aerosol delivery devices such as smoking articles that produce aerosol. The security tag can prevent usage until authorized. Attempts at usage without authorization can result in the device being unusable. The authorization may include identity confirmation or age verification.
Electronic device for transmitting, to cover device, data acquired from external electronic device, on basis of identification information of cover device, and control method
An electronic device for transmitting, to a cover device, data acquired from an external electronic device, on the basis of identification information of the cover device, and a control method are disclosed. An electronic device according to various embodiments of the present document comprises: a housing; a first antenna and a second antenna which are accommodated in the housing; a first wireless communication circuit set to provide first wireless communication by using the first antenna; a second wireless communication circuit set to provide second wireless communication by using the second antenna; and a control circuit accommodated in the housing and operably connected to the first wireless communication circuit and the second wireless communication circuit, wherein the control circuit detects coupling between a cover device, which can be coupled to one side of the electronic device, and the electronic device, and the cover device includes a third antenna and a third wireless communication circuit set to provide the first wireless communication by using the third antenna, and can be set to: acquire, through the first wireless communication circuit, identification information related to the cover device from the cover device at least on the basis of the detection; acquire, through the second wireless communication circuit, data corresponding to the identification information from an external electronic device; and transmit, through the first wireless communication circuit, the acquired data to the third wireless communication circuit included in the cover device.
Systems and methods for authentication
An authentication method for a tag device includes exchanging authentication codes between the tag device and an authentication server to perform mutual authentication. A reader device acts as a communications bridge between the tag device and the authentication server. The reader device may observe mutual authentication between the tag device and the authentication server as an indicator that the tag device is authentic. A failure of mutual authentication indicates that the tag device is not authentic.