SYSTEMS AND METHODS FOR DEVICE AND/OR DEVICE TYPE IDENTIFICATION USING WIRELESS CHANNEL CHARACTERISTICS

    公开(公告)号:US20250081259A1

    公开(公告)日:2025-03-06

    申请号:US18822806

    申请日:2024-09-03

    Abstract: An access point of a wireless communication network may be configured to receive a solicited wireless communication from an electronic device in response to a request, the solicited wireless communication being transmitted by the electronic device over a channel of the wireless communication network. The access point may extract channel characteristics from the solicited wireless communication, the channel characteristics being timing-dependent effects on the channel associated with the solicited wireless communication. The access point may generate a device fingerprint based at least in part on the channel characteristics, the device fingerprint being specific to hardware of the electronic device. Using the device fingerprint, the access point or another device may determine an identification, indicative of at least one of an identity or a device type, of the electronic device based on a stored device profile representative of at least one authenticated electronic device.

    COMPUTERIZED SYSTEM AND METHOD FOR WEARABLE IDENTITY MANAGEMENT

    公开(公告)号:US20250039171A1

    公开(公告)日:2025-01-30

    申请号:US18360093

    申请日:2023-07-27

    Abstract: Disclosed are systems and methods that provide a novel cross-session authentication framework that enables secure local and/or network sessions to be effectuated via biometric tracking via a wearable device (e.g., smart ring). In some implementations, when a user wearing a smart ring is authenticated with a first secure resource (e.g., a computer system such as a smart phone application associated with the smart ring), such authentication can be maintained and leveraged to access other resources that are separately being securely held. The smart ring, when properly worn, can monitor biometrics (e.g., vital signs) of a user, and based therefrom, determine if and/or when the smart ring is removed/manipulated from the user's finder. Until the smart ring is removed, the smart ring's confirmation of being worn by the user can be leveraged as an identification token that can enable the user access to other securely held information.

Patent Agency Ranking