Abstract:
In aspects of UWB accessory for a wireless device, an attachable ultra-wideband (UWB) accessory includes a UWB radio to communicate with UWB radios in an environment. The attachable UWB accessory has one or more wireless interfaces to wirelessly communicate with radio devices of a wireless device to which the UWB accessory is attached. The attachable UWB accessory can also include a micro-controller that receives UWB ranging data from the UWB radios, and may determine a location of the wireless device in the environment based on the UWB ranging data. The attachable UWB accessory may utilize Bluetooth low energy (BLE) for UWB out-of-band communications. A wireless device can be implemented with the attachable UWB accessory, and the wireless device has a BLE interface to interface with the UWB accessory.
Abstract:
In aspects of object tracking based on UWB tags, a system includes ultra-wideband (UWB) tags located for association with respective objects in an environment, where each UWB tag is identified with a digital label indicative of the association with one or more of the objects. A tracking service is implemented to receive initial location data for the objects from each of the UWB tags that are associated with the objects, and generate an object identity database in which each of the objects are identified by their respective initial location data. The tracking service can monitor for movement of an object that is identified by the initial location data based on subsequent positioning data associated with the object. The movement of an object is monitored for an unauthorized relocation of the object, for a cluster of multiple objects moving together, and/or for an abnormal proximity of multiple objects in the environment.
Abstract:
In aspects of object and environment dimensioning based on UWB radios, a system includes objects in an environment that are tagged objects and non-tagged objects. The system includes ultra-wideband (UWB) radios associated with respective tagged objects in the environment. A mapping module is implemented to determine a location of each of the tagged objects in the environment based on a position of the UWB radio associated with a tagged object, and determine a location of each of the non-tagged objects in the environment based on the positions of the UWB radios. The mapping module can also determine dimensions of the environment and the objects based on the location and a relative position of each tagged object and non-tagged object in the environment. In implementations, one or more of the UWB radios are UWB tags located for association with the respective tagged objects.
Abstract:
A computing device supports the use of multiple different authenticators for a user to unlock his or her computing device and access his or her user account. An authenticator refers to something that the user knows or has that can be compared to known authentication data in order to authenticate the user. In one or more embodiments, the behavior of the computing device varies for different authenticators by displaying user-selectable content in different visibility modes based on which authenticator is used to authenticate the user. In one content visibility mode content is fully visible on the computing device display screen, whereas in another content visibility mode content visibility on the computing device display screen is reduced. Additionally or alternatively, the behavior of the computing device varies for different authenticators by using different authenticators for different contexts of the computing device.
Abstract:
Techniques for authentication for key access are described. In the described techniques, interaction between a client device and an assistant device is utilized to authenticate the client device for access to protected functionality and/or content. For instance, proximity between the client device and the assistant device, and physical authentication of a user with the assistant device, are leveraged for authenticating the client device for access to the protected functionality and/or content.
Abstract:
In aspects of quantum-based security for hardware devices, a computing device includes a processor for application processing in a trusted execution environment, and includes a quantum random number generator to generate quantum random numbers sourced by multiple hardware devices in the computing device. The computing device also includes an embedded secure element that manages connection security of the multiple hardware devices, and is a single root of trust as a secure controller of the quantum random number generator. The computing device also includes a secure switch controlled by the embedded secure element, the secure switch being switchable to connect at least one of the multiple hardware devices to obtain a quantum random number from the quantum random number generator. The secure switch may be a virtualized secure switch implemented in the embedded secure element.
Abstract:
Content visibility on a computing device is controlled based at least in part on the proximity of a wearable device to the computing device. When the wearable device is in close proximity to the computing device and the computing device is unlocked, the computing device operates in a full content visibility mode. In the full content visibility mode all user-selectable content on the computing device is displayed. When the wearable device is not in close proximity to the computing device and the computing device is unlocked, the computing device operates in a reduced content visibility mode. In the reduced content visibility mode content visibility on the computing device screen is reduced, such as by limiting which applications (e.g., application icons or widgets) are displayed.
Abstract:
A wearable device enables access to VPN endpoint devices for secure data communication and privacy for a computing device. The wearable device stores VPN configuration information for a user, which includes the user's VPN credentials for each of one or more remote VPN endpoint devices. When the wearable device is in close proximity to a computing device and is being worn by a user that is authenticated to at least one of the wearable device and the computing device, the wearable device communicates the configuration information to the computing device. The computing device can then use this VPN configuration information to establish a VPN connection to a VPN endpoint device.
Abstract:
A method and apparatus for extending an authentication timeout period for an electronic device includes a primary processor of the electronic device initiating an authentication timeout period at a timeout initiation time and putting the primary processor into a sleep mode. The method also includes awakening the primary processor from the sleep mode at an expiration time, upon expiration of the authentication timeout period, and determining whether an authentication timeout extending input was detected by an adjunct processor of the electronic device at an input detection time that occurred during the authentication timeout period. The method further includes extending the authentication timeout period to expire at an extended expiration time, which is based on the input detection time, when the authentication timeout extending input was detected by the adjunct processor or locking the electronic device when the authentication timeout extending input was not detected by the adjunct processor.
Abstract:
In aspects of environment dead zone determination based on UWB ranging, a system includes ultra-wideband (UWB) radios associated with respective devices in an environment. An automation controller receives UWB ranging data from the UWB radios, and can monitor locations of the respective devices in the environment. The automation controller can detect a loss of coverage by a device connected in the environment, and determine a coverage dead zone within the environment at the location of the loss of coverage by the device based on the UWB ranging data. A computing device can implement the automation controller that receives the UWB ranging data from the UWB radios, and monitors the locations of the respective devices in the environment. The automation controller can detect the loss of coverage by the device, and determine the coverage dead zone within the environment at the location of the loss of coverage by the device.