Abstract:
Methods, devices, systems, and non-transitory process-readable storage media for using secure elements to authenticate a data source device for providing reporting data to a recipient device via local point-to-point communications. An embodiment method includes operations performed by a secure processor of a recipient device that include generating a random token, a data encryption key, and a control register, encrypting the generated data using a shared encryption algorithm and a secret key associated with a unique identifier of the data source device, decrypting data re-encrypted by the data source device and sent within a response message using the shared encryption algorithm and the secret key, determining whether decrypted data matches the random token, and identifying the data source device is authenticated in response to determining that decrypted data matches the random token. The unique identifier and secret key may be pre-loaded on the recipient device.
Abstract:
A method, an apparatus, and a computer program product for device control are provided. The apparatus determines that a user equipment (UE) connected to the apparatus receives a call. The apparatus determines a location of the UE. The apparatus adjusts a volume of at least one of a plurality of speakers based on the location of the UE and locations of the plurality of speakers while the UE receives the call.
Abstract:
Methods, devices, systems, and non-transitory process-readable storage media for using secure elements to authenticate a data source device for providing reporting data to a recipient device via local point-to-point communications. An embodiment method includes operations performed by a secure processor of a recipient device that include generating a random token, a data encryption key, and a control register, encrypting the generated data using a shared encryption algorithm and a secret key associated with a unique identifier of the data source device, decrypting data re-encrypted by the data source device and sent within a response message using the shared encryption algorithm and the secret key, determining whether decrypted data matches the random token, and identifying the data source device is authenticated in response to determining that decrypted data matches the random token. The unique identifier and secret key may be pre-loaded on the recipient device.
Abstract:
In an aspect of the present disclosure, a method, a computer-readable medium, and an apparatus are provided to overcome the deficiencies discussed above. The apparatus may include a frontend component and a storage element. The frontend component may include a processor configured to communicate with a second device and to receive a signal from the second device, the signal providing power to the apparatus and providing profile information. The storage element may be coupled to the frontend component and may be configured to receive the profile information and to store the profile information while powered by the frontend component through the signal from the second device.
Abstract:
A method, an apparatus, and a computer program product for device control are provided. The apparatus determines that a user equipment (UE) connected to the apparatus receives a call. The apparatus determines a location of the UE. The apparatus adjusts a volume of at least one of a plurality of speakers based on the location of the UE and locations of the plurality of speakers while the UE receives the call.