H04W12/65

Methods for Reconfigurable Intelligent Surface (RIS) Aided Cooperative Directional Security

In various embodiments supporting directional security, a user equipment (UE) may receive from a network device a noise resource allocation including an indication of a noise direction and a noise parameter, generate a noise signal based at least in part on the noise parameter, and transmit the noise signal in the noise direction while transmitting a communication transmission signal in a different direction from the noise direction. In various embodiments, a network device may determine a geographic zone of interest, select one or more reconfigurable intelligent surfaces (RISs) associated with the geographic zone of interest, selecting one or more noise transmitting UEs, control the one or more noise transmitting UEs to transmit at least one noise signal, and control the one or more RISs to steer the at least one noise signal into the geographic zone of interest.

Methods for Reconfigurable Intelligent Surface (RIS) Aided Cooperative Directional Security

In various embodiments supporting directional security, a user equipment (UE) may receive from a network device a noise resource allocation including an indication of a noise direction and a noise parameter, generate a noise signal based at least in part on the noise parameter, and transmit the noise signal in the noise direction while transmitting a communication transmission signal in a different direction from the noise direction. In various embodiments, a network device may determine a geographic zone of interest, select one or more reconfigurable intelligent surfaces (RISs) associated with the geographic zone of interest, selecting one or more noise transmitting UEs, control the one or more noise transmitting UEs to transmit at least one noise signal, and control the one or more RISs to steer the at least one noise signal into the geographic zone of interest.

Audio verification

Techniques for enabling a system to verify operations or transactions as being associated with a user account are described. A system receives message data associated with an unverified operation or an unverified transaction. The system generates first audio data that includes a representation of a first digital signature based on at least a first verification code. The system sends a message including second message data with an ability to output the first audio data responsive to first device playing the first audio data within earshot of the second device. The system receives, from a second device, second audio data that represents the first audio data. The system determines that the second audio data includes an audio representation of a second digital signature based on at least the first verification code. The system verifies the unverified operation and associates the operation with the user account to indicate that the operation is a verified operation.

Apparatus and method for authenticating object in electronic device

In accordance with an aspect of the disclosure, an electronic device is provided. The electronic device comprises an antenna array, a wireless communication module electrically connected to the antenna array and configured to form directional beams through the antenna array, at least one processor operatively connected to the wireless communication module; and a memory operatively connected to the at least one processor. The memory stores instructions causing the at least one processor to perform a plurality of operations comprising: transmitting a sequence of first directional beams having a first beam width to scan first regions having a first size through the antenna array, receiving a sequence of first reflected waves generated by reflection of the sequence of the first directional beams from an object through the antenna array, transmitting a sequence of second directional beams having a second beam width narrower than the first beam width to scan second regions, which are included in the first regions and have a second size smaller than the first size, through the antenna array based on at least a portion of the received sequence of the first reflected waves, receiving a sequence of second reflected waves generated by reflection of the sequence of the second directional beams from the object through the antenna array, and authenticating the object based on at least a portion of the sequence of the second reflected waves.

Automated Delivery Security System

A method and system for providing access to a location secured by an electronically activated locking mechanism, the method comprising: detecting a geographical position of a mobile device. Determining that the detected geographical position of the mobile device is proximate to the location secured by the electronically activated locking mechanism. Transmitting a signal causing the electronically activated locking mechanism to unlock.

System and method for encounter identity verification
11706627 · 2023-07-18 · ·

Systems and methods for verifying an identity of a first user involves receiving, at a server, a request from a communicatively coupled device of a second user to access information of the first user. The request includes information retrieved from a passive communication device associated with the first user and location information of the communicatively coupled device. In response, a location of an authenticated mobile device of the first user is determined, and when a location match is present, the identity of the first user is confirmed to the second user, and the second user is permitted to provide input into an account of the first user, such as for rating and reporting the performance of the first user. When a location match is not present, a message is transmitted to the second user indicating the identity of the first user is not confirmed and instructions provided to take action.

System and method for encounter identity verification
11706627 · 2023-07-18 · ·

Systems and methods for verifying an identity of a first user involves receiving, at a server, a request from a communicatively coupled device of a second user to access information of the first user. The request includes information retrieved from a passive communication device associated with the first user and location information of the communicatively coupled device. In response, a location of an authenticated mobile device of the first user is determined, and when a location match is present, the identity of the first user is confirmed to the second user, and the second user is permitted to provide input into an account of the first user, such as for rating and reporting the performance of the first user. When a location match is not present, a message is transmitted to the second user indicating the identity of the first user is not confirmed and instructions provided to take action.

Facial recognition authentication system including path parameters
11693938 · 2023-07-04 · ·

Systems and methods for enrolling and authenticating a user in an authentication system via a user's camera of camera equipped mobile device include capturing and storing enrollment biometric information from at least one first image of the user taken via the camera of the mobile device, capturing authentication biometric information from at least one second image of the user, capturing, during imaging of the at least one second image, path parameters via at least one movement detecting sensor indicating an authentication movement of the mobile device, comparing the authentication biometric information to the stored enrollment biometric information, and comparing the authentication movement of the mobile device to an expected movement of the mobile device to determine whether the authentication movement sufficiently corresponds to the expected movement.

Automated delivery security system

A method and system for providing access to a location secured by an electronically activated locking mechanism, the method comprising: detecting a geographical position of a mobile device. Determining that the detected geographical position of the mobile device is proximate to the location secured by the electronically activated locking mechanism. Transmitting a signal causing the electronically activated locking mechanism to unlock.

Stand-by storage nodes in storage network
11693985 · 2023-07-04 · ·

A method for execution by a storage network, the method begins by determining a failure rate of storage nodes of an active storage pool, establishing a number of standby storage nodes based on the determined failure rate, identifying resource identifiers for the failed storage node, selecting an available standby storage node, facilitating populating the selected available standby storage node with data slices associated with the failed storage node, utilizing the selected available standby storage node, facilitating population of a replacement storage node with the data slices from the selected available standby storage node and facilitating processing of further receive data access requests for data associated with the associated resource identifiers by utilizing the replacement storage node.