Follow us on Twitter
twitter icon@FreshPatents


Authentication patents

      

This page is updated frequently with new Authentication-related patent applications.




 Communication control method, user terminal, cellular base station, and access point patent thumbnailCommunication control method, user terminal, cellular base station, and access point
A communication control method according to a first aspect is a method for performing offloading to switch traffic to be transmitted and received between a user terminal and a cellular base station to a wireless lan system. The communication control method comprises: a step a in which the user terminal transmits a wireless lan terminal identifier being an identifier of the user terminal in the wireless lan system, to the cellular base station; and a step b in which the cellular base station, before performing the offloading, transmits the wireless lan terminal identifier received from the user terminal to an access point of the wireless lan system.
Kyocera Corporation


 System and  maintenance and monitoring of filtrations systems patent thumbnailSystem and maintenance and monitoring of filtrations systems
Aspects of the present disclosure are directed toward methods, apparatuses and systems for operating at a fluid-maintenance site. In certain embodiments, the methods, apparatuses, and systems include a fluid filter, a sensor that provides parameters that characterize fluid flowing through the fluid filter, and a wireless interface circuit.
3m Innovative Properties Company


 Systems, methods and apparatuses for enabling wearable device user access to secured electronic systems patent thumbnailSystems, methods and apparatuses for enabling wearable device user access to secured electronic systems
Systems, methods, and apparatuses disclosed enable wearable device (e.g., smartwatch) user access to secured electronic systems based on at least one of user authentication for access to secured electronic system by the wearable device, user biometric authentication by a wireless carrier, user biometric authentication by remote server, user location, and user proximity to a secured electronic system. A wearable device can include a telecommunications carrier identification module (e.g., sim), cellular rf communications, and short-range rf communications.

 Communication apparatus and control method thereof patent thumbnailCommunication apparatus and control method thereof
A communication apparatus comprises a search unit which searches for wireless networks which use a first frequency band and wireless networks which use a second frequency band, an association unit which associates a first wireless network which uses the first frequency band with a second wireless network which uses the second frequency band, the first wireless network and the second wireless network being formed by the same device, a selection unit which selects, a wireless network to connect to, and an authentication unit which performs authentication processing for connecting to the selected wireless network. In a case where the first wireless network is selected, the authentication unit performs control so as to perform authentication processing for connecting to the selected first wireless network and perform authentication processing for connecting to the second wireless network associated with the first wireless network..
Canon Kabushiki Kaisha


 Methods, systems, and computer readable media for providing access network signaling protocol interworking for user authentication patent thumbnailMethods, systems, and computer readable media for providing access network signaling protocol interworking for user authentication
A method for access network signaling protocol interworking for user authentication includes receiving, from a node in an access network, a message formatted according to a signaling protocol of the access network and containing an authentication payload formatted according to an authentication protocol. The method further includes, in response to receiving the message, formulating a message formatted according to a signaling protocol of a cellular network, the message including the authentication payload formatted according to the authentication protocol.
Oracle International Corporation


 Methods, systems, and computer readable media for providing access network protocol interworking and authentication proxying patent thumbnailMethods, systems, and computer readable media for providing access network protocol interworking and authentication proxying
The subject matter described herein includes methods, systems, and computer readable media for access network protocol interworking and authentication proxying. One method includes receiving an authentication request from a node in an access network for authenticating a user using cellular network authentication.
Oracle International Corporation


 Network access identifier including an identifier for a cellular access network node patent thumbnailNetwork access identifier including an identifier for a cellular access network node
A user equipment (ue) sends, to a wireless access node in a wireless local area network (wlan), a network access identifier (nai) that includes an identifier for a cellular access network node. The ue receives an authentication challenge based on information in the nai..
Blackberry Limited


 Telecommunication call management and monitoring system with voiceprint verification patent thumbnailTelecommunication call management and monitoring system with voiceprint verification
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification.
Globel Tel*link Corp.


 Apparatus and methods for content distribution to packet-enabled devices via a network bridge patent thumbnailApparatus and methods for content distribution to packet-enabled devices via a network bridge
Apparatus and methods for providing content to packet-enabled devices in a content distribution network. In one embodiment, a network architecture is disclosed which enables delivery of content to ip-enabled devices such as mobile smartphones and tablet computers using a traditional high-speed data connection.
Time Warner Cable Enterprises Llc


 Systems and methods for maintaining ownership of and avoiding orphaning of communication sessions patent thumbnailSystems and methods for maintaining ownership of and avoiding orphaning of communication sessions
Systems and methods for improving the handing of communications between network applications in a computer system with connectivity services interfaces that seamlessly handle the communications in an easy-to-use, secure, message-oriented environment are disclosed. Embodiments of systems and methods for maintaining ownership of sessions by applications, and for avoiding the orphaning of communication sessions when activities are terminated are also disclosed.
Unisys Corporation


Transparent asynchronous network flow information exchange

A method for providing a transparent asynchronous network flow exchange is provided. The method may include receiving a query request from a requester, whereby the received query request is associated with a network packet.
International Business Machines Corporation

Cloud device identification and authentication

Methods and apparatuses for authentication and/or provisioning of wireless network devices, and in particular, methods and apparatuses for authentication and/or provisioning of wireless network devices that are communicating with and may be monitored and/or controlled by a remote (e.g., cloud) server.. .

Transmission device, reception device, transmission method, and reception method

A transmission device has a first generator, a second generator, and a transmitter. The first generator generates data to be broadcast-transmitted.
Panasonic Intellectual Property Management Co., Ltd.

Authentication processing method and electronic device supporting the same

An electronic device is provided. The electronic device includes at least one communication module and a processor, wherein the processor is operatively connected to the at least one communication module.
Samsung Electronics Co., Ltd.

System and protecting security of biometric information of driver

A system for applying a security mode related to biometric information of a driver includes a driver authentication unit configured to determine whether a driver is a registered driver; a passenger boarding determination unit configured to determine whether a passenger occupies the vehicle when the driver is a registered driver; and a biometric information providing mode execution unit configured to provide personal or biometric information to the driver when the passenger boarding determination unit determines that the driver is the only occupant of the vehicle, and to execute a security mode when the driver is not a registered driver or when the driver is not the only occupant of the vehicle.. .
Hyundai Motor Company

Smart card for passport, electronic passport, and method, system, and authenticating person holding smart card or electronic passport

A smart card authenticates a cardholder. The smart card includes a substrate, a sensor module, a wireless transceiver module, and a power circuit.
Ivi Holdings Ltd.

Background authentication refresh

Techniques for refreshing an authentication token. Access is granted to a secure computing environment in response to receiving authentication information from a requesting computing device.
Salesforce.com, Inc.

Secure element authentication

Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents.
Microsoft Technology Licensing, Llc

Confidence-based authentication

Disclosed are various embodiments that perform confidence-based authentication of a user. An identification of a user account is obtained from a user, and a minimum confidence threshold is determined.
Amazon Technologies, Inc.

System and secure personal identification

A system and method for securely and automatically identifying users to an inquirer for purposes of obtaining user identifying information is described. The system consisting of at least one client device associated with a user, at least one inquiring device associated with a host, a client information server and a network.

Pre-delivery authentication

Pre-delivery authentication may be required prior to routing and delivery of electronic content. A sender of the electronic content, for example, may require that a recipient authenticate to ensure legitimate use or identity.
At&t Intellectual Property I, L.p.

Method, apparatus, and system for secure authentication

An apparatus and method allowing secure authentication between an application platform and a service invoker. The method includes generating, by the service invoker, a first signature based on a locally stored token, adding, by the service invoker, the first signature and an identification of the service invoker to a service invocation request, and transmitting, by the service invoker, the service invocation request to the application platform for secure authentication based on the first signature and the identification of the service invoker.
Alibaba Group Holding Limited

Authentication device, terminal device, authentication method, and non-transitory computer readable storage medium

An authentication device according to the present application includes an acquisition unit and an authentication unit. The acquisition unit acquires use states in a plurality of terminal devices used by a user.
Yahoo Japan Corporation

Domain joined virtual names on domainless servers

Services from domainless machines are made available in a security domain under a virtual name. Each machine is not joined to the domain but can reach a security domain controller.
Microsoft Technology Licensing, Llc

Storage of captured sensitive data with bypass of local storage

The claimed subject matter includes techniques for storing sensitive data. An example system includes a processor and a computer-readable memory storage device storing executable instructions that can be executed by the processor to cause the processor to send authentication credentials to a service to request authorization to store sensitive data with the service.
Microsoft Technology Licensing, Llc

Systems and methods for authenticating credentials when establishing secure communication connection sessions

Systems and methods for improving the handing of communications between network applications in a computer system with connectivity services interfaces that seamlessly handle the communications in an easy-to-use, secure, message-oriented environment are disclosed. Embodiments of systems and methods for maintaining ownership of sessions by applications, and for avoiding the orphaning of communication sessions when activities are terminated are also disclosed.
Unisys Corporation

Systems and methods for modifying access credentials using impersonation in computer systems

Systems and methods for improving the handing of communications between network applications in a computer system with connectivity services interfaces that seamlessly handle the communications in an easy-to-use, secure, message-oriented environment are disclosed. Embodiments of systems and methods for maintaining ownership of sessions by applications, and for avoiding the orphaning of communication sessions when activities are terminated are also disclosed.
Unisys Corporation

Enhanced security for registration of authentication devices

A system, apparatus, method, and machine readable medium are described for enhanced security during registration. For example, one embodiment of a method comprises: receiving a request at a relying party to register an authenticator; sending a code from the user to the relying party through an authenticated out-of-band communication channel; and verifying the identity of the user using the code and responsively registering the authenticator in response to a positive verification..
Nok Nok Labs, Inc.

Authentication for cluster peering

A method and system for authenticating of the pairing of computing devices is described. In an example, a passphrase is established on computing devices.
Netapp, Inc.

Re-programmable secure device

A re-programmable wireless device can store data securely and use near field communication (nfc) to exchange functionality data and/or program code from a central server system through a mobile device. A user requests a new re-programmable wireless device or a new re-programmable wireless device function via an application on the mobile device.
Google Inc.

Methods, systems, and computer readable media for providing access network session correlation for policy control

A method for access network session correlation for policy control includes detecting a remote authentication dial in user service (radius) access session for a user device, including binding the radius access session to a policy node. The method includes detecting a diameter session for the user device.
Oracle International Corporation

Biometric and bluetooth enabled vehicle console and glove box lock

The present invention is directed to a biometric and bluetooth enabled vehicle console and glove box lock that provides a unique apparatus for locking enclosures such as any locking compartment within a vehicle as well as the vehicle doors, vehicle hood and vehicle trunk locks, and the like, with indirect operational control by the means of a smartphone, tablet or a computer. The biometric and bluetooth enabled vehicle console and glove box lock contains a biometric based finger print authentication module, and a bluetooth/rf comm communications enabled module, to prevent a non-owner or unauthorized user from accessing the device..
Iwallet Corporation

Resource management based on physical authentication and authorization

Systems and methods are disclosed that provide for management of resources of one or more systems included in an access-controlled area of a distributed site of an electric power delivery system. In certain embodiments, one or more users entering and access-controlled area may be identified via physical access control credentials provided to an associated access control system.
Schweitzer Engineering Laboratories, Inc.

System and handset operation in a wireless communication network

User equipment (ue) is configured to automatically detect the presence of an access point (ap) in any one of a plurality of venues and to transmit identification information to the ap to authenticate the ue. The venue receiving the authentication request transfers the authentication request and identification information to an authentication server to automatically authenticate the ue whenever it is carried inside a venue.
Mobilitie, Llc

User authentication for credentials back-up service to mobile devices

Back-up credentials data is stored for a user. A communication channel is established with a mobile device.
Mastercard International Incorporated

Authentication code entry system and method

An example method includes displaying, by a first computing device (110) comprising a display (114), each of one or more characters at a location of one or more locations within the display (114); receiving, by the first computing device (110) from a second computing device (150), data indicating at least one selected location of the one or more locations within the display (114); making a determination, by the first computing device (110), that at least one character of the one or more characters matches a predetermined authentication code, wherein each character of the at least one character is displayed at a location of the at least one selected location within the display (114); and after making the determination, sending, by the first computing device (110), a message authorizing a financial transaction. Corresponding operations of the second computing device (150) are disclosed herein..
Thumbzup Uk Limited

Systems and methods for monitoring authentication of transactions to payment networks

Systems and methods for use in monitoring authentication messaging associated with payment account transactions are disclosed. One exemplary method includes monitoring authentication messaging from a merchant plug-in (mpi) associated with at least one merchant.
Mastercard International Incorporated

Verifying online transaction integrity and authentication with qr codes

Embodiments of the present invention provide a method, computer program product, and computer system for verifying transactions over a network. The method includes initiating a proposed transaction with a transaction server.
International Business Machines Corporation

Payment approval platform

A platform for providing a three-tier authorization may be provided. The platform may receive a requestor login from a requestor including requestor access credentials, as well as a purchase request.
Greenlight Me, Inc.

Crypto voting and social aggregating, fractionally efficient transfer guidance, conditional triggered transaction, datastructures, apparatuses, methods and systems

The crypto voting and social aggregating, fractionally efficient transfer guidance, conditional triggered transaction, datastructures, apparatuses, methods and systems (“socoact”) transforms vote request, vote input inputs via socoact components into vote ui, vote confirmation outputs. A crypto vote request associated with a poll may be obtained from a user.
Fmr Llc

Using a client terminal wireless personal area network (wpan) transceiver for secure element communication

An electronic card connectable to a client terminal via a secure element (se) reader slot. The electronic card comprises a housing sized to be inserted into an se reader slot of a client terminal that has an se slot width and an se slot length and a wpan transceiver, a secure memory which stores security data, a wpan card unit electronically wired to a wpan antenna used to receive wirelessly authentication data, the wpan antenna having wpan antenna width and wpan antenna length which are respectively smaller than the se slot width and the se slot length, and an execution environment having at least one processor which encrypts the authentication data using the security data in a data command and instructs the transmission of the data command by the wpan electronic card unit to the wpan transceiver for further transmission of the data command by the wpan transceiver..
Wise-sec Ltd.

Fingerprint data registering method and fingerprint data registering apparatus

In a fingerprint data registering method, a blurred pseudo image is displayed and, when a fingerprint image for authentication registration is acquired, a fingerprint position of the acquired fingerprint image is extracted. A position in the pseudo image, which corresponds to the extracted fingerprint position, is determined.
Suprema Inc.

Methods and systems for signature analysis and authentication

A method for training a classifier for authenticating signatures hand-drawn on an electronic input element includes receiving a set of multiple signature properties of each of multiple signatures documented over a time range of a common user, each set of multiple signature properties is associated with a time period during which a respective signature was documented at the time range, wherein the plurality of signatures were hand-drawn and digitally recorded using an electronic input element; generating a signature authenticating classifier for authenticating additional signatures of the common user based on the set of multiple signature properties of each of the plurality of signatures, wherein a weight assigned to each the set of multiple signature properties or a portion thereof decreases overtime, the weight is used for the generation of the classifier; and providing the signature authenticating classifier for authenticating the additional signatures.. .
Signpass Ltd.

Method for authenticating fingerprint and authentication apparatus using same

There is provided a method for authenticating a fingerprint. The method includes receiving an inputted fingerprint image; selecting a plurality of comparison target pixels from pixels in the inputted fingerprint image and selecting a plurality of comparison reference pixels from pixels in a pre-stored registered fingerprint image; and determining a similarity of an overlapping area where the inputted fingerprint image overlaps the registered fingerprint image whenever a matching arrangement of each of the comparison target pixels is made with respect to each of the comparison reference pixels.
Suprema Inc.

Authentication of detachable peripheral devices

A system and method for enabling an electronic appliance to verify the authenticity of a detachable peripheral device before that peripheral device is used by measuring a controlled impedance of a common wire and returning a proportional value, wherein the host may change or modulate the impedance of the wire before or during each measurement that the peripheral device makes, and if the peripheral device's reported answer matches the expected answer of the host, then the host device may allow the peripheral device to function properly.. .
Cirque Corporation

Cancellation requests

Examples disclosed herein relate to request authorization and authentication. Examples include to intercept a request from a processing pipeline of a device.
Hewlett-packard Development Company, L.p.

Firmware authentication

Techniques for updating a firmware on a firmware directed processing element are provided. In one aspect, a firmware image may be received at a firmware directed processing element.
Hewlett Packard Enterprise Development Lp

Biometric authentication using gesture

There is provided a biometric authentication method using a portable electronic device. The method includes identifying a gesture of a user to be authenticated through a gesture recognition unit of the portable electronic device and acquiring biometric information of the user through an information input unit of the portable electronic device.
Suprema Inc.

Continuous facial recognition for adaptive data restriction

In an approach to user authentication by facial recognition, a computing device repeatedly detects the faces of users within the field of view of an input device. The computing device determines the presence or absence of the registered user within the field of view of the input device.
International Business Machines Corporation





Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Authentication for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Authentication with additional patents listed. Browse our RSS directory or Search for other possible listings.


1.564

file did exist - 2802

0 - 1 - 55