CPC

CPC Class H04W

45 patents in CPC class H04W

45 Patents
0 Views
Updated 2/24/2026

Top Patents

An electronic device is provided. The electronic device includes a communication circuit configured to perform wireless communication, a memory configured to store an exercise schedule to be divided into a plurality of segments, and a processor configured to electrically connect with the communication circuit and the memory. The processor is configured to send a segment automatically selected based on at least one of a policy defined in the electronic device or attributes of an external device from among the plurality of segments included in the exercise schedule to the external device, if the electronic device connects with the external device through the wireless communication and to receive an exercise record collected by the external device from the external device, if the electronic device connects with the external device again through the wireless communication after the wireless communication is disconnected.

Example techniques facilitate for applying a share restriction to a curated playlist within a shared playback queue. In example implementations, a first media playback system may share its playback queue with a second media playback system. The playback queue of the first media playback system may include a curated playlist associated with a share restriction. When sharing its playback queue of the first media playback system, the first media playback system may enforce the share restriction on the curated playlist as queued in a second playback queue of the second media playback system.

Systems and devices generating biometrics associated with events triggered by actions of a users are disclosed, improving security, trust factors, functionality and automation potential. In accordance with the invention, redesign of operating systems, software, storage, medium formatting, applications (apps) and services, busses, compilers and chips smoothly incorporate biometrics, implying changes to software, internal chip machine code/internal operating system, storage medium, applications, communications structure and formatting and services. Improvements extend to private and public networks, cloud computing and potentially the networks' least common denominator elements. A wholly electronic trusted commerce solution is envisaged, taking advantage of electronic currency such as a bit coin, uniquely identified paper money combined with electronics and NFC or RFID variable wireless capabilities. Improvements also extent to forensic analysis for law enforcement and government. Features and routing priorities can be tailored in a network to regulate flow of biometrically marked with respect to other data.

Fingerprint gestures
US-106213242020

User authentication for a user device can leverage one or more fingerprint sensor regions capable of detecting and/or recognizing a user's fingerprints. The user can define a fingerprint gesture or sequence of fingerprint gestures as a passcode, with access to a protected function being conditional on the user performing the defined fingerprint gesture or sequence of fingerprint gestures. Different fingerprint gestures or fingerprint gesture sequences can invoke or authorize different functions of the device. Fingerprint gestures from two or more users in the same location or in different locations can be used to unlock a protected function of a device.

An identity authentication method is provided, including: obtaining a virtual-resource data processing request sent by a mobile terminal, the virtual-resource data processing request carrying a prestored digital fingerprint, and the digital fingerprint being generated by using device information and user information; performing virtual-resource data processing authentication on the virtual-resource data processing request according to a pre-established user value transfer behavior model; after virtual-resource data processing authentication succeeds, generating a value transfer token according to the digital fingerprint, and returning the value transfer token to the mobile terminal; receiving a value transfer request sent by the mobile terminal, the value transfer request carrying the value transfer token; and checking whether the value transfer token is valid, if the value transfer token is valid, identity authentication succeeding; otherwise, identity authentication failing.

A method of authenticating access on an electronic device. A digital image overlaid by an array of alphanumeric characters is displayed on a three-dimensional display of the electronic device. The digital image includes a three-dimensional representation of a scene and is displayed in three-dimensional coordinates. The array of alphanumeric characters is positioned on the three-dimensional display with respect to the digital image in three dimensions in response to received input. Access to the electronic device is authenticated in response to detecting that a designated character in the digital image is aligned with a designated object in the digital image.

Explore More Patents

Discover additional patents in the cpc category

Browse All Patents