Abstract:
A wearable device enables access to VPN endpoint devices for secure data communication and privacy for a computing device. The wearable device stores VPN configuration information for a user, which includes the user's VPN credentials for each of one or more remote VPN endpoint devices. When the wearable device is in close proximity to a computing device and is being worn by a user that is authenticated to at least one of the wearable device and the computing device, the wearable device communicates the configuration information to the computing device. The computing device can then use this VPN configuration information to establish a VPN connection to a VPN endpoint device.
Abstract:
In aspects of UWB accessory for a wireless device, an attachable ultra-wideband (UWB) accessory includes a UWB radio to communicate with UWB radios in an environment. The attachable UWB accessory has one or more wireless interfaces to wirelessly communicate with radio devices of a wireless device to which the UWB accessory is attached. The attachable UWB accessory can also include a micro-controller that receives UWB ranging data from the UWB radios, and may determine a location of the wireless device in the environment based on the UWB ranging data. The attachable UWB accessory may utilize Bluetooth low energy (BLE) for UWB out-of-band communications. A wireless device can be implemented with the attachable UWB accessory, and the wireless device has a BLE interface to interface with the UWB accessory.
Abstract:
In aspects of UWB automation experiences controller, a system includes ultra-wideband (UWB) radios associated with respective devices in an environment. An automation controller receives UWB ranging data from the UWB radios, and can monitor locations of the respective devices in the environment based on the UWB ranging data received from the UWB radios. The automation controller can determine a location change of a device in the environment, and update an automation experience in the environment based on the location change of the device in the environment. A computing device can implement the automation controller to monitor interactions with the respective devices, and monitor the locations of the respective devices in the environment. The automation controller can update an automation experience in the environment based on an interaction and the locations of the respective devices in the environment.
Abstract:
In aspects of object contextual control based on UWB radios, a system includes ultra-wideband (UWB) radios associated with respective devices in an environment. The system can include camera devices that capture motions in the environment. Alternatively or in addition, the system can include a mobile wireless device moved in the environment to generate motions detected by sensors of the mobile wireless device. A motion controller can determine a motion indication to interact with a device in the environment based on a location of the device as determined by a position of the UWB radio associated with the device. The motion controller can then initiate a control communication to the device to control the device based on the motion indication to interact with the device.
Abstract:
In aspects of environment mapping based on UWB tags, a system includes ultra-wideband (UWB) tags located for association with respective objects in an environment, where each UWB tag is identified with a digital label indicative of the association with one or more of the objects. A mapping module is implemented to determine a location of each of the UWB tags in the environment, and determine relative positions of each of the UWB tags with respect to each other. The mapping module can generate a location association map of the objects in the environment based on the location and the relative position of each of the UWB tags associated with the respective objects. In an environment within a building, the mapping module can generate the location association map as a floor plan of the building, including the objects location in the building.
Abstract:
In aspects of object tracking based on UWB tags, a system includes ultra-wideband (UWB) tags located for association with respective objects in an environment, where each UWB tag is identified with a digital label indicative of the association with one or more of the objects. A tracking service is implemented to receive initial location data for the objects from each of the UWB tags that are associated with the objects, and generate an object identity database in which each of the objects are identified by their respective initial location data. The tracking service can monitor for movement of an object that is identified by the initial location data based on subsequent positioning data associated with the object. The movement of an object is monitored for an unauthorized relocation of the object, for a cluster of multiple objects moving together, and/or for an abnormal proximity of multiple objects in the environment.
Abstract:
In aspects of quantum-based security for hardware devices, a computing device includes a processor for application processing in a trusted execution environment, and includes a quantum random number generator to generate quantum random numbers sourced by multiple hardware devices in the computing device. The computing device also includes an embedded secure element that manages connection security of the multiple hardware devices, and is a single root of trust as a secure controller of the quantum random number generator. The computing device also includes a secure switch controlled by the embedded secure element, the secure switch being switchable to connect at least one of the multiple hardware devices to obtain a quantum random number from the quantum random number generator. The secure switch may be a virtualized secure switch implemented in the embedded secure element.
Abstract:
In embodiments of hardware verification with RFID-stored build information, a device includes hardware components and a wireless radio tag to store build information for hardware verification of the hardware components in the device. A bootloader can interrogate the wireless radio tag to obtain the build information and compare the build information to current information of the hardware components in the device. The bootloader can then determine whether the current information matches the build information. If the current information does not match the build information, then the build information for the hardware components can be stored in the wireless radio tag, and functionality of the hardware components in the device is limited.
Abstract:
A modular portable device system and method improves the quality of the interface between a core device and an add-on module via an interconnection system specifically applicable to modular systems. A multi-pin connector array accessible from outside the base device is configured and located to electrically connect to a mating array on the add-on module when the two devices are docked. In an embodiment, the multi-pin connector array includes a command/control pin configured to support multiple functions such as, but not limited to, device detection, interrupt functions, mode changes and wake functions.
Abstract:
A method includes collecting physical layer and data layer connectivity information from a plurality of wide area networks using a plurality of mobile devices independently of the wide area networks. A server receives the physical layer and data layer connectivity information, relates the connectivity information to specific wide area networks and to a plurality of geographic locations to create a network statistics database. The server also receives mobile device state information including mobile device location information and predicts that connectivity for a specific mobile device will fall below acceptable criteria based on the network statistics database. The server generates a list of candidate donor mobile devices to serve as data connection sources for the specific mobile device based on the network connectivity information and the mobile device state information and selects a donor device from the list of candidate donor devices based on a weighting algorithm.