UWB accessory for a wireless device

    公开(公告)号:US12063059B2

    公开(公告)日:2024-08-13

    申请号:US17579933

    申请日:2022-01-20

    CPC classification number: H04B1/38 H04W4/20 H04W4/80

    Abstract: In aspects of UWB accessory for a wireless device, an attachable ultra-wideband (UWB) accessory includes a UWB radio to communicate with UWB radios in an environment. The attachable UWB accessory has one or more wireless interfaces to wirelessly communicate with radio devices of a wireless device to which the UWB accessory is attached. The attachable UWB accessory can also include a micro-controller that receives UWB ranging data from the UWB radios, and may determine a location of the wireless device in the environment based on the UWB ranging data. The attachable UWB accessory may utilize Bluetooth low energy (BLE) for UWB out-of-band communications. A wireless device can be implemented with the attachable UWB accessory, and the wireless device has a BLE interface to interface with the UWB accessory.

    Object tracking based on UWB tags
    22.
    发明授权

    公开(公告)号:US12004046B2

    公开(公告)日:2024-06-04

    申请号:US17473671

    申请日:2021-09-13

    CPC classification number: H04W4/029 G01S5/02524 G01S19/42

    Abstract: In aspects of object tracking based on UWB tags, a system includes ultra-wideband (UWB) tags located for association with respective objects in an environment, where each UWB tag is identified with a digital label indicative of the association with one or more of the objects. A tracking service is implemented to receive initial location data for the objects from each of the UWB tags that are associated with the objects, and generate an object identity database in which each of the objects are identified by their respective initial location data. The tracking service can monitor for movement of an object that is identified by the initial location data based on subsequent positioning data associated with the object. The movement of an object is monitored for an unauthorized relocation of the object, for a cluster of multiple objects moving together, and/or for an abnormal proximity of multiple objects in the environment.

    Object and Environment Dimensioning Based on UWB Radios

    公开(公告)号:US20230168343A1

    公开(公告)日:2023-06-01

    申请号:US17536499

    申请日:2021-11-29

    CPC classification number: G01S7/41 G01S13/42 G01S13/867

    Abstract: In aspects of object and environment dimensioning based on UWB radios, a system includes objects in an environment that are tagged objects and non-tagged objects. The system includes ultra-wideband (UWB) radios associated with respective tagged objects in the environment. A mapping module is implemented to determine a location of each of the tagged objects in the environment based on a position of the UWB radio associated with a tagged object, and determine a location of each of the non-tagged objects in the environment based on the positions of the UWB radios. The mapping module can also determine dimensions of the environment and the objects based on the location and a relative position of each tagged object and non-tagged object in the environment. In implementations, one or more of the UWB radios are UWB tags located for association with the respective tagged objects.

    Varying computing device behavior for different authenticators

    公开(公告)号:US11562051B2

    公开(公告)日:2023-01-24

    申请号:US16394307

    申请日:2019-04-25

    Abstract: A computing device supports the use of multiple different authenticators for a user to unlock his or her computing device and access his or her user account. An authenticator refers to something that the user knows or has that can be compared to known authentication data in order to authenticate the user. In one or more embodiments, the behavior of the computing device varies for different authenticators by displaying user-selectable content in different visibility modes based on which authenticator is used to authenticate the user. In one content visibility mode content is fully visible on the computing device display screen, whereas in another content visibility mode content visibility on the computing device display screen is reduced. Additionally or alternatively, the behavior of the computing device varies for different authenticators by using different authenticators for different contexts of the computing device.

    Authentication for key access
    25.
    发明授权

    公开(公告)号:US11463449B2

    公开(公告)日:2022-10-04

    申请号:US16450297

    申请日:2019-06-24

    Abstract: Techniques for authentication for key access are described. In the described techniques, interaction between a client device and an assistant device is utilized to authenticate the client device for access to protected functionality and/or content. For instance, proximity between the client device and the assistant device, and physical authentication of a user with the assistant device, are leveraged for authenticating the client device for access to the protected functionality and/or content.

    Quantum-based security for hardware devices

    公开(公告)号:US11329811B1

    公开(公告)日:2022-05-10

    申请号:US17202272

    申请日:2021-03-15

    Abstract: In aspects of quantum-based security for hardware devices, a computing device includes a processor for application processing in a trusted execution environment, and includes a quantum random number generator to generate quantum random numbers sourced by multiple hardware devices in the computing device. The computing device also includes an embedded secure element that manages connection security of the multiple hardware devices, and is a single root of trust as a secure controller of the quantum random number generator. The computing device also includes a secure switch controlled by the embedded secure element, the secure switch being switchable to connect at least one of the multiple hardware devices to obtain a quantum random number from the quantum random number generator. The secure switch may be a virtualized secure switch implemented in the embedded secure element.

    Controlling content visibility on a computing device based on wearable device proximity

    公开(公告)号:US11093659B2

    公开(公告)日:2021-08-17

    申请号:US16394264

    申请日:2019-04-25

    Abstract: Content visibility on a computing device is controlled based at least in part on the proximity of a wearable device to the computing device. When the wearable device is in close proximity to the computing device and the computing device is unlocked, the computing device operates in a full content visibility mode. In the full content visibility mode all user-selectable content on the computing device is displayed. When the wearable device is not in close proximity to the computing device and the computing device is unlocked, the computing device operates in a reduced content visibility mode. In the reduced content visibility mode content visibility on the computing device screen is reduced, such as by limiting which applications (e.g., application icons or widgets) are displayed.

    Method and Apparatus for Extending an Authentication Timeout Period
    29.
    发明申请
    Method and Apparatus for Extending an Authentication Timeout Period 有权
    扩展认证超时期的方法和装置

    公开(公告)号:US20150082421A1

    公开(公告)日:2015-03-19

    申请号:US14029014

    申请日:2013-09-17

    Abstract: A method and apparatus for extending an authentication timeout period for an electronic device includes a primary processor of the electronic device initiating an authentication timeout period at a timeout initiation time and putting the primary processor into a sleep mode. The method also includes awakening the primary processor from the sleep mode at an expiration time, upon expiration of the authentication timeout period, and determining whether an authentication timeout extending input was detected by an adjunct processor of the electronic device at an input detection time that occurred during the authentication timeout period. The method further includes extending the authentication timeout period to expire at an extended expiration time, which is based on the input detection time, when the authentication timeout extending input was detected by the adjunct processor or locking the electronic device when the authentication timeout extending input was not detected by the adjunct processor.

    Abstract translation: 一种用于扩展电子设备的认证超时时段的方法和装置包括:电子设备的主处理器在超时启动时间启动认证超时时段,并将主处理器置于睡眠模式。 该方法还包括在认证超时期限结束时在到期时间唤醒主处理器的睡眠模式,并且在发生的输入检测时间确定电子设备的附属处理器是否检测到认证超时延长输入 在认证超时期间。 该方法进一步包括:当认证超时延长输入被辅助处理器检测到时,延长到期时间延长认证超时时间,该延长期满时间是基于输入检测时间,当认证超时延迟输入为 未被辅助处理器检测到。

    Environment dead zone determination based on UWB ranging

    公开(公告)号:US12200572B2

    公开(公告)日:2025-01-14

    申请号:US17566530

    申请日:2021-12-30

    Abstract: In aspects of environment dead zone determination based on UWB ranging, a system includes ultra-wideband (UWB) radios associated with respective devices in an environment. An automation controller receives UWB ranging data from the UWB radios, and can monitor locations of the respective devices in the environment. The automation controller can detect a loss of coverage by a device connected in the environment, and determine a coverage dead zone within the environment at the location of the loss of coverage by the device based on the UWB ranging data. A computing device can implement the automation controller that receives the UWB ranging data from the UWB radios, and monitors the locations of the respective devices in the environment. The automation controller can detect the loss of coverage by the device, and determine the coverage dead zone within the environment at the location of the loss of coverage by the device.

Patent Agency Ranking