Abstract:
A method and apparatus for providing radio communication with an electronic object in a local environment are disclosed. For example the method receives via a mobile endpoint device of a user at least one first digital certificate associated with the local environment from a trusted source, and a second digital certificate from the electronic device deployed in the local environment via a wireless connection. The method then authenticates the electronic device using the at least one first digital certificate and the second digital certificate.
Abstract:
A method and apparatus for providing radio communication with an electronic object in a local environment are disclosed. For example the method receives via a mobile endpoint device of a user at least one first digital certificate associated with the local environment from a trusted source, and a second digital certificate from the electronic device deployed in the local environment via a wireless connection. The method then authenticates the electronic device using the at least one first digital certificate and the second digital certificate.
Abstract:
A server includes a key generator and an authenticator. The key generator is configured to receive a request for a first key from a worker device, to create the first key that is associated with a worker, and to transmit the first key to the worker device. The authenticator is in communication with the key generator, the authenticator is configured to receive a second key and identification details from a customer device, to transmit the identification details to the worker device, to receive acknowledgment of the identification details from the worker device, and to authenticate the second key and the identification details with the customer device.
Abstract:
A server includes a key generator and an authenticator. The key generator is configured to receive a request for a first key from a worker device, to create the first key that is associated with a worker, and to transmit the first key to the worker device. The authenticator is in communication with the key generator, the authenticator is configured to receive a second key and identification details from a customer device, to transmit the identification details to the worker device, to receive acknowledgment of the identification details from the worker device, and to authenticate the second key and the identification details with the customer device.
Abstract:
The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.
Abstract:
A server includes a key generator and an authenticator. The key generator is configured to receive a request for a first key from a worker device, to create the first key that is associated with a worker, and to transmit the first key to the worker device. The authenticator is in communication with the key generator, the authenticator is configured to receive a second key and identification details from a customer device, to transmit the identification details to the worker device, to receive acknowledgment of the identification details from the worker device, and to authenticate the second key and the identification details with the customer device.
Abstract:
Systems and methods that utilize femtocell access points (FAP) to perform radio frequency (RF) network sweeps are provided. In one embodiment, a method includes: predicting an availability of an access point (AP) to perform an RF network sweep; and determining that the access point is available to perform the RF network sweep based, at least, on a prediction that a mobile device on a white list for the access point is not likely to access the access point during a time interval associated with performing the RF network sweep. In another embodiment, a method includes: comparing a network quality characteristic for a wireless channel associated with a FAP with a network quality characteristic for a wired network communicatively coupled to the FAP. The network quality characteristics can be the same. The method can then include employing the comparison to determine to which network an impairment is attributable.
Abstract:
A system and method for postage payment utilizes passive RFID tags as postage “stamps”, with the amount of the postage automatically billed to a previously-established customer account. The tags are stored in a separate stamp database and are “enabled” by linking the individual tag to a customer account. The use of the RFID stamps eliminates the need for the customer to know the proper postage beforehand. The existence of a customer account with a proper return address reduces the likelihood of a dead letter. Also, a special category of stamps may be used for automatic reply mail. By virtue of using an RFID tag, the mailed item's progress through the postal delivery system may be tracked from dispatch to delivery.
Abstract:
The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.
Abstract:
Systems and methods that utilize femtocell access points (FAP) to perform radio frequency (RF) network sweeps are provided. In one embodiment, a method includes: predicting an availability of an access point (AP) to perform an RF network sweep; and determining that the access point is available to perform the RF network sweep based, at least, on a prediction that a mobile device on a white list for the access point is not likely to access the access point during a time interval associated with performing the RF network sweep. In another embodiment, a method includes: comparing a network quality characteristic for a wireless channel associated with a FAP with a network quality characteristic for a wired network communicatively coupled to the FAP. The network quality characteristics can be the same. The method can then include employing the comparison to determine to which network an impairment is attributable.