METHOD FOR DETECTING VIDEO SURVEILLANCE DEVICE AND ELECTRONIC DEVICE

    公开(公告)号:US20230388832A1

    公开(公告)日:2023-11-30

    申请号:US18249693

    申请日:2021-09-09

    CPC classification number: H04W24/08 H04N7/18 G06N20/00

    Abstract: Example methods and apparatus for detecting a video surveillance device are described. In one example method, the electronic device determines a target detection channel based on information about an access point around the electronic device, where signal strength of the channel is greater than or equal to a preset threshold, and/or the channel is a channel whose frequency band is a 2.4 GHz frequency band. The electronic device obtains traffic data corresponding to a target device on the channel, and determines, based on the traffic data and a detection model, whether the target device is a video surveillance device.

    COLLABORATIVE POSITIONING METHOD AND WIRELESS TERMINAL

    公开(公告)号:US20170311126A1

    公开(公告)日:2017-10-26

    申请号:US15520779

    申请日:2014-10-20

    Abstract: Embodiments of the present disclosure provide a collaborative positioning method and a wireless terminal, includes: generating, by a wireless terminal, positioning request information, where the positioning request information includes a positioning precision parameter; selecting a wireless communications technology according to the positioning precision parameter, where the selected wireless communications technology is a communications manner used by the wireless terminal to perform collaborative positioning; obtaining, by using the selected wireless communications technology, first collaborative positioning information sent by a neighboring terminal, where the first collaborative positioning information includes location information of the neighboring terminal; and calculating, by the wireless terminal, a current location of the wireless terminal according to the location information of the neighboring terminal. The embodiments of the present disclosure resolve a problem that a requirement on hardware of two collaboration parties is relatively strict.

    FINGERPRINT ANTI-COUNTERFEITING METHOD AND ELECTRONIC DEVICE

    公开(公告)号:US20230018194A1

    公开(公告)日:2023-01-19

    申请号:US17785990

    申请日:2020-12-10

    Abstract: A fingerprint anti-counterfeiting method and an electronic device are provided. The fingerprint anti-counterfeiting method includes: After detecting a fingerprint input action of a user, an electronic device obtains a fingerprint image generated by the fingerprint input action, and obtains a vibration-sound signal generated by the fingerprint input action. The device determines, based on a fingerprint anti-counterfeiting model, whether the fingerprint input action is performed by a true finger. The fingerprint anti-counterfeiting model is a multi-dimensional network model obtained through learning based on fingerprint images for training and corresponding vibration-sound signals. The fingerprint anti-counterfeiting method in embodiments of this application helps improve a protection capability of the electronic device for a fake fingerprint attack.

    INFORMATION VERIFICATION METHOD AND RELATED DEVICE

    公开(公告)号:US20220167172A1

    公开(公告)日:2022-05-26

    申请号:US17543027

    申请日:2021-12-06

    Abstract: An information verification method and a related device are disclosed. The method includes: receiving, by a first profile server, a remote profile management request sent by a remote profile management server, where the remote profile management request includes a first profile owner identifier; obtaining a second profile owner identifier in profile information; determining whether the first profile owner identifier is the same as the second profile owner identifier; and sending a remote profile management command to user equipment when the first profile owner identifier is the same as the second profile owner identifier. In this way, a loss caused to an operator or a profile owner due to a user's access to an invalid network or random profile unlocking is avoided, network security is improved, and a waste of network resources is reduced.

    PROFILE GENERATION METHOD, PROFILE ACQUISITION METHOD, AND RELATED DEVICE AND STORAGE MEDIUM

    公开(公告)号:US20210377722A1

    公开(公告)日:2021-12-02

    申请号:US16956967

    申请日:2019-02-23

    Abstract: If a first SIM card in a terminal device has been registered with a first service provider, when needs to subscribe to a second service provider for registration, the terminal device sends a subscription indication and a subscription identity to a second service provider server. The second service provider server acquires service registration information from a first service provider server according to the subscription indication and the subscription identity, generates a second profile for accessing a second service provider network based on the service registration information which is used by the first SIM card to access a first service provider network. The second profile is generated based on existing service registration information, so the terminal device subscribes to the second service provider for registration. After performing subscription for registration once, no need to submit an identity for verification again, user operations are simplified and user experience is improved.

    INFORMATION VERIFICATION METHOD AND RELATED DEVICE

    公开(公告)号:US20200374694A1

    公开(公告)日:2020-11-26

    申请号:US16638507

    申请日:2017-08-28

    Abstract: An information verification method and a related device. The method includes: receiving, by a first profile server, a remote profile management request sent by a remote profile management server, where the remote profile management request includes a first profile owner identifier; obtaining a second profile owner identifier in profile information; determining whether the first profile owner identifier is the same as the second profile owner identifier; and sending a remote profile management command to user equipment when the first profile owner identifier is the same as the second profile owner identifier. In this way, a loss caused to an operator or a profile owner due to a user's access to an invalid network or random profile unlocking is avoided, network security is improved, and waste of network resources is reduced.

    METHOD FOR SETTING POSITIONING MODE AND MOBILE TERMINAL

    公开(公告)号:US20180149754A1

    公开(公告)日:2018-05-31

    申请号:US15576880

    申请日:2015-06-04

    Abstract: A method includes: obtaining an azimuth and a signal parameter value of each preset satellite of M preset satellites when a mobile terminal is at a first location. The M preset satellites are sorted according to the values of their azimuths and N satellite combinations are obtained from those satellites that are consecutively arranged and have signal parameter values less than preset values. In response to determining that a ratio of the quantity of the preset satellites in the first satellite combination to M is less than a first threshold, the positioning mode of the mobile terminal is set to an outdoor positioning mode. In response to determining that a ratio of the quantity of the preset satellites in the first satellite combination to M is greater than a second threshold, the positioning mode is set to an indoor positioning mode.

    METHOD FOR ADDING AUTHENTICATION ALGORITHM PROGRAM, AND RELEVANT DEVICE AND SYSTEM

    公开(公告)号:US20200045544A1

    公开(公告)日:2020-02-06

    申请号:US16499116

    申请日:2017-03-31

    Abstract: Embodiments of the present invention disclose a method for adding an authentication algorithm program, and a relevant device and system, where the method includes: receiving, by an SM-DP+ server, an authentication algorithm program sent by an MNO, where the authentication algorithm program corresponds to target information, and the target information is at least one of: firmware version information of an eUICC, an EID issuer identifier of the eUICC, platform/operating system version information of the eUICC, or capability information of the eUICC; and generating, by the SM-DP+ server, a bound profile package that includes the authentication algorithm program, and sending the bound profile package to the eUICC by using an LPA. As can be learned, the eUICC can add the authentication algorithm program into the eUICC in time by implementing the authentication algorithm program described in a first aspect.

Patent Agency Ranking