Follow us on Twitter
twitter icon@FreshPatents


Authentication patents

      

This page is updated frequently with new Authentication-related patent applications.




new patent Device and handling authentication procedure
A network comprising a cellular network and a wlan for handling an authentication procedure with a communication device comprises a storage unit for storing instructions and a processing means coupled to the storage unit. The processing means is configured to execute the instructions stored in the storage unit.
Htc Corporation


new patent Terminal device, management device, storage medium adapted for communication between multiple terminal devices within a group
In a business wireless system, a group including a plurality of terminal devices is formed and communication is performed by using at least one base station device to assign a channel to each group. A transmission unit uses a channel assigned by the base station device to a first group for transmission.
Jvc Kenwood Corporation


new patent Electronic apparatus and control method thereof
An electronic apparatus and a control method thereof are disclosed. The electronic apparatus according includes: a first communicator configured to communicate with an authentication terminal device; a second communicator configured to communicate with a new terminal device that is not registered with an access point (ap); a storage configured to store authentication information for accessing the ap; and a controller configured to control the second communicator to transmit the authentication information that is stored in the storage to the new terminal device in response to receiving terminal information of the new terminal device from the authentication terminal device through the first communicator..
Samsung Electronics Co., Ltd.


new patent Securing a wireless mesh network via a chain of trust
A master beacon device emits a data packet that is received and retransmitted by servant beacon devices in a wireless mesh network that enables the beacon devices to detect the received signal strength indicator (“rssi”) of beacon devices in proximity. Each servant beacon device transmits survey data packets comprising the rssis and hardware identifiers of proximate beacon devices to the master beacon device, which constructs a first virtual map of the mesh network.
Google Inc.


new patent System and establishing security in network devices capable of operating in multiple frequency bands
A method includes establishing, in response to a network device operating in the first frequency band, security for the first frequency band and a second frequency band by performing a single authentication in the first frequency band prior to the network device switching operation from the first frequency band to the second frequency band. The method includes transferring, subsequent to the network device switching operation from the first frequency band to the second frequency band, a communication session of the network device from the first frequency band to the second frequency band.
Marvell World Trade Ltd.


new patent Customer communication system
A system for automatic authentication of service requests includes authentication of a remote access device. This authentication may be accomplished automatically prior to text or audio communication between a customer and a service agent.

new patent Device and handling cellular-wireless local area network aggregation
A communication device of handling communication with a network including a cellular network and a wireless local area network (wlan) comprises instructions of receiving a radio resource control (rrc) message configuring cellular-wlan aggregation (cwa) to the communication device from a base station (bs) of the cellular network; deriving a first pairwise master key (pmk) according to the rrc message; deriving a first encryption key for encrypting first data transmitted to the wlan or decrypting second data received from the wlan from the first pmk; releasing the cwa during connecting to the wlan; performing an extensible authentication protocol (eap) authentication and key agreement (aka) procedure with the wlan to derive a second pmk, when releasing the cwa; and deriving a second encryption key for encrypting third data transmitted to the wlan or decrypting fourth data received from the wlan from the second pmk.. .
Htc Corporation


new patent Universal secure imaging workflow
Embodiments disclosed include systems and methods for computer automated print services control comprising authenticating a user credential input via a user device. The system and method includes generating, by a printer driver comprised in the user device, a user interface comprising features supported by a plurality of printing devices.
Thinxtream Technologies Pte. Ltd.


new patent Method and system to provide an accessibility user interface
This disclosure provides a method and system of providing a supplemental user interface (ui) operatively associated with a device, such as a multifunctional device (mfd) or multifunctional printer (mfp). According to an exemplary embodiment of this disclosure, an accessibility ui is provided by a portable computer device, e.g., off-the-shelf tablet, where the table includes a container application including a collection of walk-up user applications to operate the mfd, a set of tablet user environment' configuration applications and a set of helper applications that operate in the background and/or provide transitory screens, such as authentication for operating the mfd..
Xerox Corporation


new patent Customer communication system including scheduling
A system for automatic authentication of service requests includes authentication of a remote access device. This authentication may be accomplished automatically prior to text or audio communication between a customer and a service agent.

new patent

Enabling dynamic authentication with different protocols on the same port for a switch

The invention enables a client device that does not support ieee 802.1x authentication to access at least some resources provided through a switch that supports 802.1x authentication by using dynamic authentication with different protocols. When the client device attempts to join a network, the switch monitors for an 802.1x authentication message from the client device.
Mcafee, Inc.

new patent

Methods, devices and computer programs for subjecting traffic associated with a service to a specific treatment

A method aims at providing a service in a communication network, and comprises the following steps. An access to a service requiring authentication is initiated by a ue (100), an identity management node (300) authenticates the ue, and then sends, to a pcrf node (400), a message comprising: service information for identifying the service to which access is initiated, identification information for identifying the ue, and authentication information determined upon authenticating the ue.
Telefonaktiebolaget Lm Ericsson (publ)

new patent

Dynamic second factor authentication for cookie-based authentication

A server sends information to a client that allows the client to establish a first key at the client. The server then receives a session id that has been encrypted using the first key.
Cisco Technology, Inc.

new patent

Method, device and system for processing ipv6 network parameter, and aaa server

Provided are a method, device and system for processing an ipv6 network parameter, an aaa server, a n radius client and a bng. The method includes that: an radius access request message sent by an radius client corresponding to a remote user is received; and an radius access accepting message carrying information identifying an ipv6 transition technology type supported by the remote user is sent to the radius client after the remote user passes authentication according to the radius access request message.
Zte Corporation

new patent

Authenticating a browser-less data streaming device to a network with an external browser

A system, method and computer readable device are described herein. A plurality of packets are received at a data streaming device, from a computing device; the packets including authentication information for gaining access to a local network.
Roku, Inc.

new patent

Authorization activation

The present disclosure is directed to systems and methods of obtaining authorization for an application or client to access certain privileged resources on behalf of a user in the oauth2 protocol based on a voice input; validating an authentication token; and logging in to a service based on the validation.. .
Avaya Inc.

new patent

Methods and systems for conducting multi-user interactions on a device using biometric authentication

There is provided a method for use by a mobile device. The method includes launching a software application requiring an identity verification of each of a plurality of users for performing a requested action, the plurality of users including a first user and a second user, receiving a first biometric information of the first user and a second biometric information of the second user, sending the first biometric information of the first user and the second biometric information of the second user to a server, receiving notifications from the server as to whether the first and second biometric information corresponding to biometric information in first user and second user profiles, respectively, and performing the requested action, if the notifications indicate a match..
Disney Enterprises, Inc.

new patent

Secure authentication systems and methods

Systems and methods are provided for authentication by combining a reverse turing test (rtt) with password-based user authentication protocols to provide improved resistance to brute force attacks. In accordance with one embodiment of the invention, a method is provided for user authentication, the method including receiving a username/password pair associated with a user; requesting one or more responses to a first reverse turing test (rtt); and granting access to the user if a valid response to the first rtt is received and the username/password pair is valid..
Intertrust Technologies Corporation

new patent

Disposable browsers and authentication techniques for a secure online user environment

Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for secure use and retention of user credentials, as well as methods for dynamic authentication of users and integrity checking of service providers in online environments.
Authentic8, Inc.

new patent

System and cotextual service delivery via mobile communication devices

A computer automated system and method comprising configuring a single or plurality of mobile devices over a network, validating the configured devices, and communicating contextual information to the configured devices. The devices are authenticated and the authentication is sent to a server over the network, when a contextual service, controlled/offered by the server through a contextual service point in communication with the server, is invoked by the configured mobile device in the vicinity of the contextual service point.
Thinxtream Technologies Ptd. Ltd.

new patent

Data encryption and authentication using a mixing function in a communication system

A method of encrypting and authenticating messages in a communication system includes generating new keys by receiving a plurality of parameters including at least one of an initial key, a nonce, a sequence number, and a previous key. The method may include applying a mix function to generate a subsequent key based on the plurality of parameters for key rolling.
The Boeing Company

new patent

E-mail relay device, e-mail relay method, and non-transitory storage medium

Provided is an e-mail relay device including: an e-mail receiving unit that acquires an e-mail to be delivered before the e-mail reaches a transmission destination, the e-mail being transmitted from a transmission source mailer through simple mail transfer protocol (smtp); a request notification unit that transmits, after the e-mail receiving unit acquires the e-mail to be delivered, a notification e-mail for allowing communication with a predetermined authentication server through ip by using a transmission source e-mail address of the e-mail to be delivered as a destination; a transmission source ip address acquisition unit that acquires, in a case where the transmission source terminal communicates with the predetermined authentication server after the notification e-mail is transmitted, an ip address of a transmission source terminal contained in an ip header of an ip packet transmitted/received during the communication; and a determination unit that determines the reliability of the e-mail to be delivered based on the ip address of the transmission source terminal.. .
Nec Corporation

new patent

Relational encryption for password verification

A method of equality verification using relational encryption including receiving a relational key that includes a first relational key component and a registration ciphertext that includes an encryption of a first plaintext data set. The method includes storing the registration ciphertext without decrypting the registration ciphertext.
Fujitsu Limited

new patent

Method to authenticate two devices to establish a secure channel

The present invention relates to a method to authenticate two devices to establish a secure channel, one belonging to a first group of devices, the second belonging to a second group of devices, in a non-traceable manner without the need to share a secret, each group being authenticated by an authority that stores a group secret key into the devices under its authority. The method uses a set of authentication tokens, one for each of the other groups with which the device is intended to communicate, said authentication token comprising at least a random number and a cipher of at least this random number by the secret key of each of these other groups, said authentication tokens being further renewed at each communication with a device from another group..
Gemalto Sa

new patent

Relational encryption for password verification

A method of equality verification using relational encryption including receiving a relational key that includes a first relational key component and a registration ciphertext that includes an encryption of a first plaintext data set. The method includes storing the registration ciphertext without decrypting the registration ciphertext.
Fujitsu Limited

new patent

Method and system for shared key and message authentication over an insecure shared communication medium

A method for shared key generation with authentication in a gateway node includes generating, generating a first set of pseudo-random data corresponding to expected transmissions from a first node that communicates with a second node through a shared communication medium, identifying, with the gateway node, bits transmitted from the second node based on a signals received by the gateway node corresponding to simultaneous transmissions from the first node and the second node, identifying, with the gateway node, expected bit values for the bits from the second node based on a combination of shared secret data stored in a memory of the gateway node with another set of random or pseudo-random data generated by the second node, and authenticating the second node in response to the plurality of bits transmitted from the second node matching the plurality of expected bit values.. .
Robert Bosch Gmbh

new patent

Symmetric encryption device and method used

Symmetric encryption device for protecting information between two end points, including in unicast mode, comprising: a central microprocessor (1), two rj45 connectors (2) and (3), a protective locking module (4), which may be disabled for a predetermined time by means of software, for deleting information contained in the microprocessor or for destroying the latter, based on switches, diodes, or motion sensors, external communication ports (5), (bluetooth, usb, rf) and a 9v battery (6) for supplying power to the locking system and to the microprocessor, used in an online unicast communication, a local network environment, a multicast communication, or a bridge mode configuration. The encryption method may be used for acting as key server, adding/removing new users, certifying that the member sending the keys is the key seer and authentication between users..
Elatentia, S.l.

new patent

Wireless communication authentication for medical monitoring device

Methods, systems, and devices for short-range low-power wireless communication of analyte information are provided. In some implementations, short-range low-power wireless communication of analyte information may include receiving an electromagnetic wireless communication signal and harvesting energy from the electromagnetic wireless communication signal.
Abbott Diabetes Care Inc.

new patent

Customer communication system including service pipeline

A system for automatic authentication of service requests includes authentication of a remote access device. This authentication may be accomplished automatically prior to text or audio communication between a customer and a service agent.

new patent

Electronic device, certification agency server, and payment system

An electronic device is provided. The electronic device includes a communication module configured to communicate with an external device, a biometric authentication module configured to perform biometric authentication, and a processor.
Samsung Electronics Co., Ltd.

new patent

Authentication server-based payments

A method of performing a payment transaction employing a two-factor authentication mechanism. The method includes engaging in cryptographic processing with a cryptographic function having a secret key encoded therein.
Mastercard International Incorporated

new patent

Myriad of payment methods with alternate payment controls

A system and method for providing an email as a command is disclosed. The system and method include formatting an action in an e-commerce system based on an assigned address, wherein communication with the assigned address initiates the action, and authenticating a message addressed to the assigned address, wherein for a positively authenticated message the action is performed.
@pay Ip Holdings Llc

new patent

Method for dropping off a shipment in a motor vehicle, and associated motor vehicle

The present disclose is directed to a method for dropping off a shipment in a motor vehicle. In one embodiment, the method comprises: transmission of a digital key to a control device of the motor vehicle, transmission of a piece of authentication information to an authentication element, capture of the piece of authentication information or of a piece of information derived from the piece of authentication information, actuation of a vehicle device to allow access to at least part of the motor vehicle interior by the control device when an authentication condition that evaluates both the piece of authentication information or the derived piece of information and the digital key is met, and actuation of the vehicle device and/or of a further vehicle device to close the motor vehicle following storage of the shipment in the motor vehicle or after a prescribed waiting time..
Audi Ag

new patent

Universal secure imaging workflow

Embodiments disclosed include systems and methods for computer automated print services control comprising authenticating a user credential input via a user device. The system and method includes generating, by a printer driver comprised in the user device, a user interface comprising features supported by a plurality of printing devices.
Thinxtream Technologies Ptd. Ltd.

new patent

Biometric authentication system with proximity sensor

In embodiments of a biometric authentication system with proximity sensor, an electronic device includes a biometric authentication sensor and at least one activation sensor adjacent to the biometric authentication sensor. The activation sensor or sensors activate the biometric authentication sensor in response to detecting proximity of an object at a predetermined distance from the biometric authentication sensor..
Motorola Mobility Llc

new patent

Method and fingerprint recognition and authentication

According to one embodiment of the present invention, provided is a method for fingerprint recognition and authentication, comprising: a step for sequentially acquiring a plurality of slice images including a fingerprint pattern via a fingerprint sensor; a slice dividing unit for dividing the slice images into block images; a step for converting spatial domain information of the block images into frequency domain information, and eliminating information of a high-frequency component by using a low-pass filter; and a step for forming a fingerprint pattern template by matching the block images, from which the information of the high-frequency component has been eliminated.. .
Crucialtec Co., Ltd

new patent

Data security system with encryption

A data security system, and a method of operation thereof, includes a data security transceiver or receiver; an authentication subsystem operatively connected to the data security transceiver or receiver; and a storage subsystem connected to the authentication subsystem.. .
Clevx, Llc

new patent

Source authentication of a software product

Embodiments of the present invention provide systems and methods for authenticating the source code of a software end product. The method includes generating a compound key, which is composed of a set of unique keys generated from a source file.
International Business Machines Corporation

new patent

Medical technical device with network control unit

The invention relates to medical equipment, in particular a dialysis machine, comprising an interface for exchanging data with a network. According to the invention, the interface is activated or deactivated depending on whether the medical equipment is provided with an authentication device..
Fresenius Medical Care Deutschland Gmbh

new patent

Biometric sensor authenticating a user, and a user authenticating method

A module programmed for authenticating said user when said images match reference images of said user, and for revoking said authentication when an opening of the clasp has been detected.. .

new patent

Personal familiarity authentication

A method for computer security. A gallery comprising a first identity of a first human person is maintained, the first identity associated with a plurality of tags, with first properties, useful for identifying the first human person.
Adp, Llc

new patent

Biometric authentication matching using grip detection

In embodiments of an electronic device having a biometric authentication system and grip detection sensor, an authentication circuit is coupled to the biometric authentication sensor and grip detection sensor. The biometric authentication sensor is configured to receive a biometric input sample.
Motorola Mobility Llc

new patent

Device, method, and system of detecting multiple users accessing the same account

Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a possible attacker. The methods include monitoring of user-side input-unit interactions, in general and in response to an interference introduced to user-interface elements.
Biocatch Ltd.

new patent

Method for updating and/or upgrading the operating software of an electronic device

The invention relates to a method for updating and/or upgrading the operating software of an electronic device, particularly a medical device, by means of a user authentication means, particularly a user authentication card, having an integrated memory, which user authentication means a user feeds to the device before the use of the device typical of operation in order to authenticate the user on the device. During the authentication process, one or more software packages are transferred from the user authentication means to the device in order to update and/or upgrade the operating software.
Fresenius Medical Care Deutschland Gmbh

new patent

Invisible inimitable identity, provenance, verification and authentication 7,70 identifier system

The invisible inimitable identity, provenance, verification and authentication 7,70 identifier system is an invisible or visible identifying embodiment having multiple machine readable emission output wavelengths and phosphorescence decay lifetimes generated from crystals contained in the embodiment when subjected to an incident energy source(s), the spatial distribution of the crystals limited only to the embodiment boundary. Comparison of the resulting spectral information histogram, using a preselected percentage of the decay lifetimes, against a database containing the embodiment's pre-established information verifies an item's identity and validates it as authentic.
Invisible Sentry Llc





Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Authentication for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Authentication with additional patents listed. Browse our RSS directory or Search for other possible listings.


1.1916

file did exist - 2615

1 - 1 - 51