Speculative activation for secure element usage

    公开(公告)号:US12232041B2

    公开(公告)日:2025-02-18

    申请号:US17758277

    申请日:2020-03-12

    Applicant: Google LLC

    Abstract: If a secure element accesses a resource that is separate from the secure element, conducting a secure transaction can be inefficient in terms of power or time. Power usage is inefficient if the resource is never permitted to sleep, and transaction time is inefficient if the resource is permitted to sleep, and the user experiences a delay. To enable dual efficiency, a resource entity is permitted to be powered down. The resource entity is then powered up speculatively by an activation controller. The activation controller predicts an upcoming secure transaction based on sensor output, such as a position fix or a detected electromagnetic field. Based on monitored sensor output, the activation controller issues an activation signal to power up the secure element or the resource entity prior to initiation of the upcoming secure transaction. Thus, power can be conserved without introducing a transaction-processing latency.

    AUTOMATED DEVICE ACCESS
    3.
    发明申请

    公开(公告)号:US20240370548A1

    公开(公告)日:2024-11-07

    申请号:US18778192

    申请日:2024-07-19

    Applicant: Apple Inc.

    Inventor: Matthew E. LAST

    Abstract: A method of unlocking a locked device includes receiving a device identifier over a wireless communication protocol, determining if the device identifier is associated with a list of trusted devices, transmitting a request to generate an acoustic signal over the wireless communication protocol based on the determination, receiving the acoustic signal as an audio sound generated external to the locked device, estimating a distance between a source of the audio sound and the locked device, and unlocking the locked device based on the estimation.

    REAL-TIME ADAPTIVE FACILITY DEPLOYMENT
    4.
    发明公开

    公开(公告)号:US20240365096A1

    公开(公告)日:2024-10-31

    申请号:US18766247

    申请日:2024-07-08

    Applicant: GOOD2GO, INC.

    Inventor: Frances Heller

    Abstract: A system allows an end-user to locate and gain access to an access-controlled facility or resource, such as a restroom, phone charging station, or Wi-Fi hot spot. Some implementations of the system monitor the formation and concentration of individuals into crowds that may place a higher demand on facilities and resources located near the crowd. The system may distribute mobile facilities to areas that offer convenient access to potential developing crowds, and when the system determines that there is a disparity between available resources and crowd demand reaches a certain level it may deploy one or more mobile facilities to positions proximate to that crowd. A mobile facility may also be requested on demand by a user or organizer, and some implementations provide cost sharing mechanisms and other user benefits related to requesting and accessing the facility.

    SYSTEMS AND METHODS FOR A PERSONALLY ALLOCATED INTERFACE FOR USE IN A WELDING SYSTEM

    公开(公告)号:US20240351128A1

    公开(公告)日:2024-10-24

    申请号:US18738775

    申请日:2024-06-10

    CPC classification number: B23K9/1087 G06F21/35

    Abstract: A welding system having a welding power supply, a wire feeder coupled to the welding power supply, and a welding torch coupled to the wire feeder and configured to output wire from the wire feeder is provided. In particular, the welding system includes a wireless module (e.g., gateway) disposed within a component of the welding system, or as an independent component within the welding system. For example, the wireless module may be disposed within the welding power supply, the wire feeder, or the welding torch. The wireless module is configured to wirelessly transmit to and receive welding information, such as operator identification information, from a wireless personal device. The wireless personal device is uniquely associated with a welding operator operating the welding system.

    GESTURE AUTHENTICATION USING A SMART RING
    7.
    发明公开

    公开(公告)号:US20240333711A1

    公开(公告)日:2024-10-03

    申请号:US18623396

    申请日:2024-04-01

    Applicant: BLUEOWL, LLC

    Abstract: A smart ring includes a housing configured to be worn by a user. The smart ring also can include sensors and a processor. The processor can perform a first authentication operation by collecting body movement representing a candidate movement. The first authentication operation can include comparing the candidate movement to a known authentication movement and when the candidate movement is determined to correspond to the known authentication movement, generating a first signal. The processor also can perform a second authentication operation which can include detecting contact between the smart ring and a component external to the smart ring. The second authentication operation further can include generating a second signal indicating that the candidate has been authenticated as the known user. The processor further can cause the second device to grant the candidate access to the resource when the second device receives the first and second signals. Other embodiments are disclosed.

    Post-Provisioning Authentication Protocols
    10.
    发明公开

    公开(公告)号:US20240289775A1

    公开(公告)日:2024-08-29

    申请号:US18657263

    申请日:2024-05-07

    Inventor: Erin Stacy Smith

    Abstract: More effective authentication protocols for provisioning electronic devices are provided. An approval signal responsive to a provisioning request may be transmitted in real-time, such as under four seconds in certain embodiments. An authentication score for the provisioning request may be calculated even after transmitting the approval signal. In certain embodiments, information gathered from the successful provisioning of a device can be used in the authentication scoring process. Authentication scores deemed to fall below a requisite threshold may be used to suspend the provisioned device, therefore, limit the ability for the device to utilize the account, however, without withdrawing the approval or granted digital token. Certain implementations may negate the need to transmit further approvals or confirmations following determining an authentication score met a threshold.

Patent Agency Ranking