-
公开(公告)号:US20230068989A1
公开(公告)日:2023-03-02
申请号:US17854060
申请日:2022-06-30
Applicant: University of South Carolina
Inventor: Qiang Zeng , Lannan Luo
IPC: H04W12/06 , G06Q10/08 , H04W12/0431
Abstract: Described herein are methods, techniques and systems for a user to conduct authentication via inertial measurement unit data collected by the user's smartphone and video data collected by a drone recording the user operations for mutual authentication, as well as to prevent attacks of the authentication data, wherein correlation can be easily extended to using other information, such as noises, illuminance, GPS, and how the phone flashlight flashes.
-
公开(公告)号:US12231897B2
公开(公告)日:2025-02-18
申请号:US17691697
申请日:2022-03-10
Applicant: UNIVERSITY OF SOUTH CAROLINA
Inventor: Qiang Zeng
IPC: H04W12/50
Abstract: Internet of Things (IoT) devices lack conventional user interfaces, such as keyboards and displays, which make many traditional pairing approaches inapplicable. Proximity-based pairing approaches are very usable, but can be exploited by co-located malicious devices. A secure and usable pairing approach that can be applied to heterogeneous IoT devices still does not exist. The presently disclosed Universal Operation Sensing allows an IoT device to sense the user's physical operations on it without requiring inertial sensors. With this technique, a user holding a smartphone or wearing a wristband can finish pairing in seconds through some very simple operations, e.g., pressing a button or twisting a knob. A presently disclosed pairing protocol uses faithful fuzzy commitment, which is secure and usable.
-
公开(公告)号:US20240331443A1
公开(公告)日:2024-10-03
申请号:US18623120
申请日:2024-04-01
Applicant: University of South Carolina
Inventor: Qiang Zeng
CPC classification number: G06V40/172 , G06F21/44 , G06V20/17 , G06V20/41 , G06V40/168 , G06V40/174 , G06V40/67
Abstract: Described herein are systems and methods for secure and usable authentication techniques for drone delivery that leverages biometric information of faces, unlike traditional biometrics-based approaches, it does not need users to enroll their biometric information and is impervious to common drone attacks.
-
-