Follow us on Twitter
twitter icon@FreshPatents


Authentication patents

      

This page is updated frequently with new Authentication-related patent applications.




 System and  authenticating local cpe patent thumbnailSystem and authenticating local cpe
Systems, methods, apparatus and other mechanisms for authenticating wireless customer premises equipment (cpe) at a service location by transmitting an authentication trigger signal via a first communication mechanism associated with the service location toward cpe associated with the service location; monitoring a second communication mechanism associated with the service location to detect therefrom any received authentication trigger response signals; and authenticating only cpe associated with a received authentication trigger response signal, wherein at least one of the first and second communication mechanisms comprises a local infrastructure element.. .
Charter Communications Operating, Llc


 Authentication in a radio access network patent thumbnailAuthentication in a radio access network
A method and apparatus for authenticating a mobile device in a second mobile access network when the mobile device is already authenticated in a first mobile access network. An access device receives an authentication request from the mobile device.
Telefonaktiebolaget Lm Ericsson (publ)


 Exclusive preshared key authentication patent thumbnailExclusive preshared key authentication
Preshared keys are assigned to client devices, users, or user groups. The set of valid preshared keys or keys derived therefrom is distributed to network devices such as wireless access points.
Aerohive Networks, Inc.


 Method and  authentication in passive optical network patent thumbnailMethod and authentication in passive optical network
A method and apparatus for authentication in a passive optical network are disclosed. In the disclosure, a first terminal serial number of an onu and a first logic registration code are transmitted from the onu to an olt; if the olt determines that the first terminal serial number does not match a second terminal serial number stored on the olt, the olt judges whether the first logic registration code received from the onu matches a second logic registration code stored on the olt; the olt stores the first terminal serial number received from the onu on the olt if the first logic registration code matches the second logic registration code..
Huawei Technologies Co., Ltd.


 Server apparatus and control method patent thumbnailServer apparatus and control method
A server apparatus according to an embodiment comprises an authentication section and a setting control section. The authentication section executes an authentication processing for determining whether or not a user is the valid one.
Toshiba Tec Kabushiki Kaisha


 Image forming apparatus, control method thereof, storage medium, and cartridge patent thumbnailImage forming apparatus, control method thereof, storage medium, and cartridge
This image forming apparatus determines, in accordance with state information indicating the state of the image forming apparatus, whether or not a timing for executing an authentication process of a removable cartridge has arrived. Furthermore, if the timing for executing a cartridge authentication process has arrived, this image forming apparatus obtains authentication information regarding authentication from the cartridge, and determines, from the authentication information, whether or not an authentication process is required to be executed.
Canon Kabushiki Kaisha


 Efficient infrastructure service discovery with security patent thumbnailEfficient infrastructure service discovery with security
Systems, methods, and apparatuses for efficient infrastructure service discovery with security are disclosed. In one aspect, systems and methods for advertising services available via an access point without requiring a device to connect for discovery are described.
Qualcomm Incorporated


 System and methods for preventing phishing attack using dynamic identifier patent thumbnailSystem and methods for preventing phishing attack using dynamic identifier
The invention includes a method and apparatus for preventing phishing attacks. A first method, for informing a user that a remote server is valid, remote server sends the dynamic identifier to the system (client) and token app, then user validates and confirms whether the dynamic identifier matches between the system and the token app.

 Authentication of communication units patent thumbnailAuthentication of communication units
Techniques concerning the authentication of communication units in a network of communication units are disclosed. At the request of an initiating communication unit, an intermediate communication unit generates a first authentication problem and a first authentication answer that are answerable by a target communication unit.
Silent Circle, Sa


 Identity authentication method and apparatus, and user equipment patent thumbnailIdentity authentication method and apparatus, and user equipment
An identity authentication method includes detecting a scenario in which the user equipment is located, determining, from at least two different authentication levels of the user equipment, an authentication level corresponding to the scenario in which the user equipment is located, acquiring current biometric feature data entered by a user, and determining, according to the current biometric feature data, preconfigured biometric feature data, and the authentication level, whether identity authentication succeeds.. .
Huawei Technologies Co., Ltd.


Continuous authentication system and method based on bioaura

A user authentication system for an electronic device for use with a plurality of wireless wearable medical sensors (wmss) and a wireless base station that receives a biomedical data stream (biostream) from each wms. The system includes a bioaura engine located on a server, the server has a wireless transmitter/receiver with receive buffers that store the plurality of biostreams, the biostream from a single wms lacks the discriminatory power to identify the user, the bioaura engine has a look up stage and a classifier, the classifier generates an authentication output based on the plurality of biostreams, the authentication output authenticates the user's access to the electronic device.
Indian Statistical Institute

Multi-factor authentication with increased security

A multi-factor authentication method and system is provided such that a push notification during an authentication process is only received if a mobile device and user are authenticated prior to receiving the push notification. Either the mobile device itself or a second device sending the push notification may be programmed to either reject or not forward the authentication request.

Securing a computing device accessory

Various embodiments are disclosed that relate to security of a computer accessory device. For example, one non-limiting embodiment provides a host computing device configured to conduct an initial portion of a mutual authentication session with an accessory device, and send information regarding the host computing device and the accessory device to a remote pairing service via a computer network.
Microsoft Technology Licensing, Llc

Method and system for authenticating a user

Method for authenticating a user, comprising the steps of a) providing a central server (101), in communication with at least two authentication service providers (110,120,130) and at least one user service provider (150); b) associating each authentication service provider with at least one respective available level of authentication; c) receiving a request from the user service provider to authenticate a particular user accessing the user service provider via an electronic device (170,180); d) identifying a minimum level of authentication; e) the central server identifying a selected one (110) of said authentication service providers; f) either providing user credential data directly to the selected authentication service provider, without said user credential data being supplied to the central server, or determining that the selected authentication service provider has an active authentication session for the particular user; and g) causing the selected authentication service provider to authenticate the particular user and to provide an authentication response. The invention also relates to a system..
Identitrade Ab

Network element and improved user authentication in communication networks

The present invention proposes a method and network element which allows improving, in different aspects, existing user authentication mechanisms in a communications network (for example, the 802.1x network), using a single network element. To that end, the element managing communications network access (for example, a router) will have a new physical and logical architecture (with various databases and verification and learning mechanisms) expanding the ability of said element, such that said element incorporates an authentication system to manage and provide the mechanisms needed for protecting communications, offering protection, management and automation abilities much greater than the systems existing today..
Tecteco Security Systems, S.l.

Packet generation and authentication in a process chain

A method of verifying a data packet by a data consumer may be provided. The method may include authenticating a first signature in a signature stack of a data packet, where the first signature corresponds to a hashed first content in a content stack, and the first signature is generated at a first network location.
Fujitsu Limited

Request authentication and confirmation

In example embodiments, a system and method performs authentication and confirmation of requests within a control server system. Accordingly, a first message is received from a first device, the control server system responds to the request by providing a first code to the first device and the control server system maps the first code to a first identifier of the first user.
Zeta (better World Technology Pvt. Ltd.)

Systems and methods for providing content and services on a network system

Systems and methods for managing and providing content and services on a network system. Aspects of the invention include controlling user perceived connection speed.
Nomadix, Inc.

Technologies for remote attestation

Technologies for remote attestation include a group member device to generate a signature of a message using a cryptographic key assigned to the group member device by a group manager and determine an authentication path that indicates a plurality of cryptographic hashes necessary to compute a group public key of a group associated with a plurality of group member devices. The cryptographic key is assigned to the group member device based on a permutation of a set of cryptographic keys generated by the plurality of group member devices.
Intel Corporation

Including node and process identifiers in a transaction

A receiver node receives, over a communication fabric, a transaction packet that includes an identifier of a sender node and an identifier of a process at the sender node, the transaction packet sent by the process for a transaction. The receiver node performs authentication for the transaction based on the identifier of the process and the identifier of the sender node..
Hewlett Packard Enterprise Development Lp

Lottery transaction mechanisms

A number of mechanisms can reduce transaction costs and increase the economic viability of a number of products. A combination instant lottery ticket and debit card makes it possible to issue prepaid debit cards having a relatively low monetary value.
Lrb Patents Llc

System and method that facilitates providing a virtual agent

Aspects are disclosed for providing users with a virtual agent at a property. A user is authenticated based on user information included in a request to enter a property secured by a locking mechanism.

Method and system for contactless payments

A method for contactless payment is disclosed. The method comprises, at a point of sale, initiating payment by transmitting a token from a first device to a second device using a speaker associated with a first device, and a microphone associated with the second device; transmitting the token from the second device to a payment server; authenticating the token by the payment server; and upon successful authentication of the token, determining with a payment server whether the authorize of the payment..
Aintu Inc.

Payment platform interface widget generation apparatuses, methods and systems

The payment platform interface widget generation apparatuses, methods and systems (“api-tool”) transforms developer credentials, codes and parameter inputs via the api-tool component into buy widgets, payment acceptance and purchase transaction outputs. In one embodiment, the api-tool may facilitate obtaining a plurality of authentication parameters and widget customization parameters.

Mobile electronic device and electronic payment

Electronic payment methods of an electronic device are provided. An electronic payment method of a first electronic device includes executing, at the first electronic device, an electronic payment application, transmitting, by the first electronic device to a payment server, a request for registration of a common use group including a second electronic device to be registered as a group member, receiving, at the first electronic device, device information of the second electronic device, performing, at the first electronic device, authentication of the second electronic device by using the device information, and transmitting, by the first electronic device, a result of the authentication to the payment server..
Samsung Electronics Co., Ltd.

Digital currency (virtual payment cards) issued by central bank for mobile and wearable devices

Provided is a method for issuing single-use and multiple-use digital currency via a mobile and wearable device. The method may include receiving a currency issuance request from a user, prompting the user to enter a user authentication information, accessing a user account maintained by a currency issuer, generating the digital currency based on payment data of the user account, and providing the digital currency to the mobile and wearable device.
Amobilepay, Inc.

System and benefit distribution with improved proof-of-life features

A method includes determining that a benefit payment is due to be made to a recipient. A data store is accessed, where the data store contains records of payment transactions made by the recipient.
Mastercard International Incorporated

System and delivery receipting and user authentication in unmanned product deliveries

A method includes transporting an item for delivery to a delivery location by an unmanned vehicle. The method further includes receiving a signal that authenticates a recipient present at the delivery location.
Mastercard International Incorporated

Authentication devices

An authentication device comprising a woven authentication pattern, wherein the woven authentication pattern comprises a plurality of pattern forming woven elements each defining at least one pattern defining element or a plurality of pattern defining elements, and each pattern forming woven element is formed by a plurality of threads having contrasting optical or visual properties in twisted mutual engagement, wherein said pattern defining element has a spiralling outline or boundary and adjacent or abutting pattern defining elements of a pattern forming woven element are visually or optically distinguishable.. .
Waitak Labels Factory Limited

Iris authentication apparatus

An iris authentication apparatus includes a memory and a processor. The processor coupled to the memory.
Fujitsu Limited

Spoofing detection device, spoofing detection method, and recording medium

To provide a technology of more accurately detecting spoofing in face authentication, without increasing a scale of a device configuration and a burden on a user. A spoofing detection device includes a facial image sequence acquisition unit, a line-of-sight change detection unit, a presentation information display unit, and a spoofing determination unit.
Nec Corporation

Fingerprint authentication display device and authentication display method

The present disclosure relates to the field of display technology, and discloses a fingerprint authentication display device and method. The fingerprint authentication display device comprises a fingerprint storage unit configured to store the fingerprints of a plurality of authorized users; a user configuration storage unit configured to record user configuration parameters of each authorized user; a fingerprint identifier configured to collect fingerprints and identify the fingerprint information of the authorized user, and send the collected fingerprint to the display unit if the collected fingerprint is the fingerprint of the authorized user; a display unit connected to the user configuration storage unit and configured to read user configuration parameters corresponding to the collected fingerprint and display an image based on the user configuration parameters.
Boe Technology Group Co., Ltd.

Biometric authentication device, biometric authentication method and computer-readable non-transitory medium

A biometric authentication device includes a memory and a processor coupled to the memory, the processor being configured to execute a process, the process including: storing enrollment biometric information; determining the category of biometric information input in a biometric sensor; comparing input biometric information with each enrollment biometric information that is associated with a category determined in the determining with respect to the input biometric information; and associating, when a first comparison between the input biometric information and the each enrollment biometric information is failed and a second comparison between each enrollment biometric information that is associated with a category determined in the determining with respect to re-input biometric information and the re-input biometric information is succeeded, the each enrollment biometric information having achieved a success of the second comparison with the category determined with respect to the input biometric information.. .
Fujitsu Limited

Method and system for password setting and authentication

A method for password setting and authentication is provided. The method includes receiving a password setting request and acquiring a reference character string and reference input duration information.
Alibaba Group Holding Limited

Method and system for password setting and authentication

A method for password setting and authentication is provided. The method includes receiving a password setting request and acquiring a reference character string and reference input duration information.
Alibaba Group Holding Limited

Storage isolation using i/o authentication

Techniques are described for logically isolating data i/o requests from different operating systems (oses) for a same multi-tenant storage system (mtss). Techniques provide for oses and the mtss to obtain security tokens associated with the oses.
Oracle International Corporation

Condition authentication based upon temporal-spatial analysis of vibrational responsivity

The present invention relates to a method and system for condition authentication based upon temporal-spatial analysis of vibrational responsivity. In particular, the present invention provides temporal tracking of reflected secondary speckle patterns generated when illuminating an object with a source of at least partially coherent beam and while applying a stimulated field at different temporal stimulating frequencies..
Continuse Biometrics Ltd.

Stimuli-based authentication

A method for stimuli-based authentication includes presenting one or more stimuli to a person. The method includes measuring a brainwave response of the person to the one or more stimuli, and authenticating the person based on the measured brainwave response..
Lenovo Enterprise Solutions (singapore) Pte. Lte.

Telematics authentication

Systems and methods for determining the authenticity of vehicle operational data provided by telematics or other devices are provided. Vehicle performance and/or operational data may be collected and the authenticity of the data stream may be determined based on the whether the data stream includes a watermark in a predetermined location of the data stream or whether the data stream includes a data key comprising a predetermined false vehicle performance data reading.
Allstate Insurance Company

Reader/writer device, information processing device, and data transfer control method, and program

A configuration in which both record/reproduction data and a security command can be transferred between a host and a recording device connected to the host is implemented. A usb reader/writer includes a usb-a connector and a usb-micro b connector, and when a power supply host is connected to the usb-micro b connector, and a recording medium is mounted into the usb-a connector side, the reader/writer control unit transfers record/reproduction data of the recording medium through a mass storage class supporting data transfer unit, and transfers a security command applied to an authentication process or the like through a non-mass storage class supporting data transfer unit.
Sony Corporation

Sound output system or internet appliance that supports voice activated commands, and that plays audio data received from a service over a network

An output system, such as a wireless speaker or an internet appliance, that supports voice activated commands is herein disclosed and enabled. The output system is wirelessly connectable to a service operated over a network (e.g., internet) for receiving output data from the service.
Flexiworld Technologies, Inc.

Image forming system and image forming apparatus

An image forming system of an embodiment includes a terminal device that transmits first print data to print an image in monochrome, second print data to print the image in color and a user id; a print data storage section that stores the first print data, the second print data and the user id transmitted from the terminal device in an associated manner; an authentication section that authenticates a user; a list acquisition section that acquires a list including the first and second print data associated with the user id of the user authenticated by the authentication section; a print data acquisition section that acquires one print data selected from the acquired list by the list acquisition section; and an image forming section that prints an image formed with the print data acquired by the print data acquisition section.. .
Toshiba Tec Kabushiki Kaisha

Method and system for implicit authentication

A method and system capable of implicitly authenticating users based on information gathered from one or more sensors, which may be located in one or more devices, and an authentication model trained via a machine learning technique. Data is collected, manipulated, and assessed with the authentication model in order to determine if the user is authentic.
The Trustees Of Princeton University

Floating image display device

A floating image display device includes a floating-image-formation optical system that forms an image at an opening part as a floating image from an image displayed on an image display unit, an authentication unit that judges whether or not a subject passing through the opening part is an authorized subject, and an image control unit that makes the image display unit switch contents of the image when the subject is judged as the authorized subject. The floating-image-formation optical system can include a beam splitter and a retroreflective sheet.
Mitsubishi Electric Corporation

Wearable device controlled vehicle systems

An example of a system to control an in-vehicle system includes a wearable device, a vehicle communications platform operatively disposed in a vehicle, a control module in communication with the vehicle communications platform, and the in-vehicle system. The wearable device is for recognizing a hand gesture.
General Motors Llc

Software-defined vehicular powertrain and operation

A software-defined powertrain transmits commands to at least 4 distributed polyphase motor controllers. A single vehicle control unit transforms operator control indicia into a plurality of individual commands, and securely transmits said commands to each one of a plurality of independent motor controllers mechanically coupled to a single wheel by a polyphase electric motor.

Supply authentication via timing challenge response

In an example implementation, a print supply cartridge comprises a microcontroller to receive a timing challenge and enable authentication of the cartridge by providing a challenge response. The challenge response is provided in a challenge response time that falls within an expected time window..
Hewlett-packard Development Company, L.p.

Apparatus, system and fast basic service set (bss) transition (ft)

Some demonstrative embodiments include apparatuses, devices, systems and methods of a fast basic service set (bss) transition (ft). For example, a wireless station (sta) may be configured to process at least one frame from at least one advertiser access point (ap) over a first frequency band while the sta is associated with a current ap over the first frequency band, the frame including a multiband mobility domain element (mmde) corresponding to a target ap; and to transmit to the advertiser ap an ft authentication request frame over the first frequency band to request an ft from the current ap on the first frequency band to the target ap on the second frequency band, the ft request frame including the mmde corresponding to the target ap..
Intel Ip Corporation

Authentication method, wireless router and computer storage medium

Disclosed is an authentication method applied to a wireless router, the wireless router being configured with a confirmation key. The method comprises: receiving a first wireless access request from a terminal, the first wireless access request carrying identification information uniquely identifying the terminal.
Zte Corporation

Method for authenticating terminal in wireless communication system, and device for same

A method for performing authentication by a base station with a terminal in a wireless communication system, according to an embodiment of the present invention, comprises the steps of: receiving from a terminal a radio resource control (rrc) connection setup request message; determining, on the basis of the rrc connection setup request message, whether or not the terminal requested fast authentication; if the terminal requested fast authentication, transmitting an international mobile subscriber identity (imsi) of the terminal to a mobility management entity (mme) before the rrc connection setup of the terminal is complete; and authenticating the terminal on the basis of the control of the mme, wherein, in the step for authenticating the terminal, non-access stratum (nas) security setup and access stratum (as) security key setup of the terminal are simultaneously performed.. .
Lg Electronics Inc.

User authentication method using phone number and one of nfc apparatus and beacon

A method for authenticating a user using a mobile terminal according to an exemplary embodiment of the present inventive concepts, in a system including an operation server managing a database for storing a first telephone number of a user, a near field wireless communication device, and a mobile terminal, receiving, by an application program installed in the mobile terminal, a uniform resource locator (url) of the operation server from the near field wireless communication device, accessing, by the application program, the operation server using the url and transmitting a second telephone number of the mobile terminal to the operation server, and using, by the application program, a service provided by the operation server according to a result of comparison between the first telephone number and the second telephone number performed by the operation server.. .
Benple Inc.

Advertising multiple service set identifiers

Described herein are techniques for selecting a subset of access points, in an example, a wireless access point stores a plurality of unique keys, each unique key being associated with a respective device. The access point advertises a first service set identifier, the first service set identifier requiring authentication of a device requesting connection at a remotely located authentication server.
Hewlett Packard Enterprise Development Lp

Systems and methods for authentication

A method includes transmitting, by a station to an access point (ap), a fast initial link setup (fils) authentication request and transmitting, by the station to the ap, an authorization request, where the authorization request includes an extensible authentication protocol (eap) over local area network (lan) (eapol) key. The method also includes receiving, by the station from the ap, an association response, where the association response includes the eapol key..
Huawei Technologies Co., Ltd.

Authentication in a wireless communications network

A method and apparatus for authenticating a mobile device in a second network when the mobile device is already authenticated in a first network. An authentication device in the first network generates an authentication master key associated with the mobile device using a first nonce generated by the authentication device and a second nonce generated by the mobile device.
Telefonaktiebolaget Lm Ericsson (publ)

Usage based authentication system

A mechanism for providing additional layer of security to the already existing and authentication mechanism available on a mobile device is provided. According to an embodiment, the system comprises a usage authentication interface (114) that displays one or more mobile software applications for usage based authentication, wherein the usage based authentication interface allows the user to select one or more software applications for usage based authentication.
Tata Consultancy Services Limited

Presence-based content control

Presence based content access control techniques are described in which presence of users is used as a basis for enforcing content restrictions. In an implementation, applications are registered to receive feedback regarding users' presence in relation to a presentation of content via a computing device.
Microsoft Technology Licensing, Llc

Delegated authentication in an internet of things (iot) network

A method includes performing, by a processor of a network controller of a network: storing device identifications corresponding to respective ones of a plurality of devices connected via the network, respectively, storing an association between a first one and a second one of the plurality of devices, the association being represented as a pairing identification code corresponding to the first and second ones of the plurality of devices, receiving a communication from an intruder device, the communication comprising the device identification corresponding to one of the first and the second ones of the plurality of devices, sending a request to the intruder device to communicate the pairing identification code, and denying access to the network to the intruder device responsive to the intruder device failing to communicate the pairing identification code.. .
Ca, Inc.

Proxy authentication

In one embodiment, receiving, by an operating system of the first computing device and from a client application executing on the first computing device, a first request for accessing a set of data associated with a user of the first computing device, wherein the set of data is managed by a second computing device; sending, by the operating system and to the second computing device, a second request for accessing the set of data; receiving, by the operating system and from the second computing device, a response to the second request; and if the response to the second request grants the client application access to the set of data, then forwarding, by the operating system and to the client application, an access token to be used by the client application for accessing the set of data with the second computing device.. .
Facebook, Inc.

Inter-application delegated authentication

Disclosed is a system for delegating authentication of an untrusted application executing on a client device. For delegated authentication, an untrusted application relies on a trusted application executing in the same environment for authentication purposes.
Twitter, Inc.

Interpreting user expression based on captured biometric data and providing services based thereon

Methods and systems for authenticating a user based on user expression. In some embodiments, an authentication service computer receives a user authentication request during a transaction, determines that the user is enrolled in a user expression authentication service, and transmits a prompt message for biometric data to a user device of the user.
Mastercard International Incorporated

Service authorization using auxiliary device

Implementations of the present disclosure relate to systems and methods for service authorization. A server terminal device may receive user authentication information that is stored on the auxiliary device for user authentication associated with an authentication device.
Alibaba Group Holding Limited

Method and providing securities to electronic devices

A secured device including a security hardware module and a method thereof are provided. The secured device generates first user authentication information based on a user input, generates encryption key generation information corresponding to the first user authentication information, receives second user authentication information from an electronic device, and transmits to the electronic device the encryption key generation information corresponding to the first user authentication information when the second user authentication information matches the first user authentication information.
S-printing Solution Co., Ltd.

Provisioning a device to be an authentication device

In certain embodiments, a web services system receives a request to provision a device, such as a telephone, as an authentication device. The web services system initiates display of an image communicating a key to allow the telephone to capture the image and to send key information associated with the key.
Amazon Technologies, Inc.

Systems and methods for secure automated network attachment

A method for automatically attaching a purpose-built electronic device to a provider network includes steps of discovering, by a wi-fi module of the purpose-built electronic device, a wireless data network in operable communication with the provider network selecting, by the wi-fi module, the wireless data network, transmitting a primary authentication certificate from the wi-fi module to an authentication, authorization, and accounting server of the provider network, receiving, by an application server of the provider network, a secondary authentication certificate from a functionality module of the purpose-built electronic device authenticating, by the provider network, the primary and secondary authentication certificates, and attaching the purpose-built device to the provider network.. .
Cable Television Laboratories, Inc

Secure automated device configuration and management

A method may include performing secure device configuration, via a configuration service manager device, for a sip user device. The method includes monitoring, via the configuration service manager device, the sip user device for device authentication problems, configuration file download problems, device registration problems and device third party registration problems.
Verizon Patent And Licensing Inc.

Single sign on for a remote user session

A user accesses a remote session, the connection to which is managed by a connection broker, according to a single sign-on (sso) process. The sso process includes the user entering his or her credentials and being authenticated to the connection broker.
Vmware, Inc.

Late binding authentication

A late-binding token (lbt) is securely generated and provided to a device application. When the lbt is presented and validated, a resource associated with the presentation is bound to the lbt and authenticated for access to a service and provided valid credentials for accessing that service..
Netiq Corporation

System and generating a server-assisted strong password from a weak secret

Disclosed herein is a method for generating a high entropy password using a low entropy password and low-entropy login data comprising supplying the low entropy password to a system comprising a generating client and/or a recovery client; and at least n servers; submitting request data derived, at least in part, from the user's low entropy password, where the request data includes authentication data; engaging in a distributed protocol with at least t servers to generate high-entropy values based on stored cryptographic information and a set of authentication information stored on the at least n servers which is checked against the authentication data provided by the user and/or the generating client and/or a recovery client; and generating the high entropy password.. .
International Business Machines Corporation

Policy enforcement of client devices

A method may include sending, by a client device, an access request to an authentication server device. The access request may include a request to access an administered resource.
Google Inc.

Local device authentication

The disclosed embodiments include computerized methods, systems, and devices, including computer programs encoded on a computer storage medium, for device authentication. For example, the resource device may generate and maintain master access tokens, which may be transmitted to a computing system.
Google Inc.

Techniques for authentication via a mobile device

Techniques for authentication via a mobile device are provided. A mobile device is pre-registered for website authentication services.
Micro Focus Software Inc.

Network service header used to relay authenticated session information

In one embodiment, a system, method, and computer program product are disclosed for authenticating a packet received from a client node, storing the results of the authentication in a cache memory of a service classifier node, and including the results of the authentication in a network service header of a packet before forwarding the packet to downstream service nodes. In one embodiment, the initial authentication is performed in conjunction with an authentication node..
Cisco Technology, Inc.

Multi-tenant enterprise application management

A method performed by a computing system includes receiving from a client component of an enterprise application, a request destined for a service component of the enterprise application, the request comprising authentication data and request data, the authentication data being associated with a current user of the client component, the user associated with an organization. The method further includes performing an authentication process to create principal data and role data associated with the request, the principal data identifying a user.
Red Hat, Inc.

Two-factor user authentication using card matrix

A system receives a request to authenticate a user and determines a first set of cell identifiers of a card matrix to associate with the user. The system receives a first factor, which comprises a first set of received cell values corresponding to the first set of cell identifiers of the card matrix.
Bank Of America Corporation

Method for securing user data with drm keys

Some embodiments provide convenient auto-authentication for user data on a primary device, while still providing a significant level of security, by taking advantage of existing security and cryptographic measures used to communicate with a secondary device. The primary device of some embodiments encrypts the user data on the primary device using a cryptographic key based on a set of keys received from the secondary device.
Apple Inc.

Management of profiles in an embedded universal integrated circuit card (euicc)

Consumer/enterprise and machine-to-machine functions in wireless devices have led to a need for end user consent, security of profile data while permitting remote profile management, and mixed profile types in a shared embedded universal integrated circuit card (euicc). User consent is provided by the device or by the euicc parsing an incoming profile management command and triggering a user prompt on a user interface.
Apple Inc.

Providing communications security to an end-to-end communication connection

A network device provides communications security, like privacy and confidentiality, to an end-to-end communication connection. The network device includes: a first network interface for communicating with a user device; a second network interface for communicating with a communication destination; an authentication unit or a communication connection to an authentication unit located in a communication network for authenticating at least the user device and/or the user of the user device to the network device; a control unit for establishing a first communication connection between the first network interface and the user device and a second communication connection between the second network interface and the destination in response to a request from the user device to establish the end-to-end communication connection between the user device and the destination; and an encryption unit for encrypting and decrypting data transmitted over the first connection and for encrypting and decrypting data transmitted over the second connection..
Vodafone Gmbh

Key distribution in a distributed network environment

A system including a controller and a pool of computing resources to run virtual machines are configured to automatically provision each virtual machine with unique cryptographic constructs. The controller receives a request to instantiate a virtual machine based on an image/template.
Cisco Technology, Inc.

Future generation 5g and multimode 4g and 3g mobile modulation format selectable (mfs) communications

Future generation 5g and multimode 4g and 3g mobile modulation format selectable (mfs) wireless communication networks, cellular systems and devices with fingerprint signal authentication. Touchscreen and motion detectors are controlling mobile devices.

Method and optimizing internet communications

An apparatus and a method by a terminal in a wireless communication system are provided. The method includes transmitting first information including a public land mobile network identifier (plmn id) for a sponsored service, to a first server operated by a service provider, receiving, in response to the first information, second information including a token related to the sponsored service from the first server, transmitting third information requesting the sponsored service based on the token to a second server operated by a network operator corresponding to the plmn id, and receiving authentication information from the second server..
Samsung Electronics Co., Ltd.

Sequential biometric cryptosystem and sequential biometric cryptographic processing method

A sequential biometric cryptosystem includes: a registration terminal that extracts a set of feature data from each of multiple pieces of biological information acquired from each user, sequentially selects, out of these, a group of multiple sets of feature data, incrementing the number of combined sets, creates a protection template for each selected group of feature data, and stores the protection template into a storage apparatus. The sequential biometric cryptosystem also includes an authentication terminal that extracts feature data from a combination including one or more pieces of biological information of a specified user, acquired through a sensor on the user, verifies a combination of the extracted feature data against the protection template derived from the biological information having the same specified attribute, and performs, if the verification is successful, specified processing on the user..
Hitachi, Ltd.

Decoding of encoded audio bitstream with metadata container located in reserved data space

Apparatus and methods for generating an encoded audio bitstream, including by including program loudness metadata and audio data in the bitstream, and optionally also program boundary metadata in at least one segment (e.g., frame) of the bitstream. Other aspects are apparatus and methods for decoding such a bitstream, e.g., including by performing adaptive loudness processing of the audio data of an audio program indicated by the bitstream, or authentication and/or validation of metadata and/or audio data of such an audio program.
Dolby Laboratories Licensing Corporation

Surveillance of a secure area

Embodiments of the invention are directed to a system, method, and computer program product for surveillance of a secure area. The present invention typically includes a memory, a processor, and a module configured to monitor the secure area.
Safetyrange, Inc.

Gate control method, authentication device, and gate control system

A gate control system includes an authentication device and a gate control device. The authentication device specifies a card number of a credit card of a user of a gaming facility, performs a credit inquiry of the credit card using the card number, and transmits permission information indicating that the gate should be opened to the gate control device when a result of the credit inquiry indicates that using the credit card is approved.
Techfirm Inc.

Personal authentication

A method and system of authenticating a person is disclosed. The authentication may include verifying authenticity of the person when interacting with a point of sale system or other authenticating requesting device according to whether biometric information collected proximate in time to the authentication request sufficiently correlates with biometric information previously collected from trust sources..
Cable Television Laboratories, Inc.

Secure contactless card emulation

A device may detect a trigger to perform a contactless transaction. The trigger may relate to the device being within a threshold proximity of a point of sale device.
Accenture Global Solutions Limited

Method and system for securing user access, data at rest and sensitive transactions using biometrics for mobile devices with protected, local templates

Biometric data are obtained from biometric sensors on a stand-alone computing device, which may contain an asic, connected to or incorporated within it. The computing device and asic, in combination or individually, capture biometric samples, extract biometric features and match them to one or more locally stored, encrypted templates.

Terminal device, authentication information management method, and authentication information management system

A terminal device, an authentication information management method, and an authentication information management system for securing a security level of authentication information while maintaining the convenience for a user. A mobile device determines whether communication with a wearable device is possible and determines whether the mobile device is able to communicate with an authentication server.
Ntt Docomo, Inc.

Information processing apparatus, information processing system, authentication method, and recording medium

An information processing apparatus includes: a radio communication unit configured to start emission of radio waves for performing radio communication with a radio tag, and obtain specific information from the radio tag, at least after a time point at which a user in a predetermined range is detected by a detecting unit; a first authentication unit configured to execute first authentication for the radio tag, based on the specific information obtained by the radio communication unit; a second authentication unit configured to execute second authentication for a user included in an image acquired by an imaging unit, based on feature information of the image; and an apparatus authentication unit configured to authorize the user to use the information processing apparatus, if a user of the radio tag authenticated by the first authentication is the same as the user authenticated by the second authentication.. .
Ricoh Company, Ltd.

Liveness determination based on sensor signals

A device includes a memory and a processor. The memory is configured to store a threshold.
Qualcomm Incorporated

Method and using a multi-factor password or a dynamic password for enhanced security on a device

A method and apparatus for performing authentication may comprise: determining a first value of a dynamic password applicable for a first scenario, the dynamic password having a plurality of values for a plurality of scenarios defined by at least one parameter; authenticating a user in the first scenario by a device based on the first value of the dynamic password; determining a second value of the dynamic password applicable for a second scenario; and authenticating the user in the second scenario by the device based on the second value of the dynamic password.. .
Qualcomm Incorporated

Self-authenticating chip

Embodiments of the present invention provide an authenticating service of a chip having an intrinsic identifier (id). In a typical embodiment, an authenticating device is provided that includes an identification (id) engine, a self-test engine, and an intrinsic component.
International Business Machines Corporation

System, method, and device for delivering communications and storing and delivering data

A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is verified, optionally through a downloaded authentication driver.

On-demand mailbox synchronization and migration system

A system for managing physical and logical resources to provide on-demand synchronization or migration of mailboxes and their corresponding content. Physical resources are managed by automatically assigning mailbox processing tasks to either reserved computing resources, or computing resources dynamically obtained from cloud computing services.
Bittitan Inc.

Negotiable instruments with intelligent microprint

A negotiable instrument such as a check includes a unique microprint identifier that allows for authentication while preventing unauthorized reproduction and alternation. A printing system generates the identifier after receiving a customer order for printing a plurality of negotiable instruments, to allow inclusion of information that is specific to the customer order and/or the printing process.
Deluxe Corporation

Electrocardiogram (ecg) signal based authentication apparatus and method

An authentication apparatus includes one or more processors configured to temporally implement a neural network, used to extract a feature value from hidden nodes, that is connected to input nodes to which an electrocardiogram (ecg) signal is input so as to share a weight set with the input nodes, and to match the ecg signal and the extracted feature value to a user for registration.. .
Korea Advanced Institute Of Science And Technology

Network edge based access network discovery and selection

An edge device comprising access network discovery and selection function (andsf) features is disclosed. An edge device can be a device located at a logical edge of a wireless network.
At&t Intellectual Property I, L.p.

Virtual subscriber identity module for mobile communication device

A system includes a subscriber identity module (sim) application; a physical sim driver configured to be coupled to a physical sim card; a simulated sim driver; a control switch that selectively couples the sim application to the physical sim driver or the simulated sim driver, wherein the sim application, when coupled to the physical sim driver, is configured to read and write on the physical sim card; and a sim simulator in communication with the control switch and the simulated sim driver, wherein the sim simulator is configured to control the selective coupling of the control switch, and is configured to receive at least one request comprising an authentication request from the simulated sim driver and transmit at least one response comprising an authentication response to the simulated sim driver.. .
Simo Holdings Inc.

Wireless network service transaction protocol

A mobile device may retrieve service information about a network prior to associating with the network. Utilizing an advertisement protocol to transmit service query messages, a mobile device may receive service query responses from a network that identify the services available prior to establishing network capability.
Blackberry Limited

Communication apparatus, communication method, and storage medium

A communication apparatus includes an authentication unit that sets a communication parameter for connecting to a wireless network, and executes authentication processing, with a base station, for registering the communication apparatus to the base station that forms the wireless network, as a management apparatus that is allowed to connect another apparatus to the wireless network, a setting unit that, based on information acquired from code information captured through imaging, sets the communication parameter to another communication apparatus corresponding to the code information, and a registration unit that executes registration processing for registering the other communication apparatus to the base station as the management apparatus, based on at least a condition that the communication parameter is set to the other communication apparatus by the setting unit.. .
Canon Kabushiki Kaisha

Communication apparatus, communication method, and storage medium

A communication apparatus executes an authentication process with a first other communication apparatus based on information acquired from an image obtained by capturing code information of the communication apparatus and receives, from the first other communication apparatus, first information shared between the first other communication apparatus and a second other communication apparatus. The communication apparatus transmits a search signal including second information based on the received first information and has a smaller amount of information than the first information, and transmits the first information to the second other communication apparatus in a case where a response signal in response to the search signal is received from the second other communication apparatus, and then executes a setting process for setting a communication parameter for communicating with the second other communication apparatus..
Canon Kabushiki Kaisha

Method and controlling a device using bluetooth technology

Disclosed are a method and apparatus for forming, by a first device, forming a wi-fi connection with a second device using bluetooth le in a wireless communication system, including receiving an advertising message from the second device, forming a bluetooth le connection with the second device based on the advertising message, transmitting a first write request message to the second device requesting writing of authentication information necessary for performing wi-fi authentication with the third device, wherein the first write request message including the authentication information, receiving a write response message from the second device as a response to the first write request message, and sending a second write request message to request the writing of opcode indicating a wi-fi connection with the third device to the second device. The second write request message includes identification information for identifying the third device, and the wi-fi connection is formed between the second and the third devices based on the authentication information..
Lg Electronics Inc.

Temporary viewer access to videos from programmers while multichannel video programming distributors are unavailable for authentication and authorization

Methods and systems for granting temporary access to videos from a programmer to viewers based on the viewers having subscriptions with a separate mvpd. An examplary technique involves receiving a request for the programmer to provide a video to a viewer and accessing the mvpd to authenticate that the viewer has a subscription with the mvpd and confirm that the viewer is authorized to receive the video.
Adobe Systems Incorporated

Systems and methods for geolocation-based authentication and authorization

Systems and methods are provided for controlling the authentication or authorization of a mobile device user for enabling access to the resources or functionality associated with an application or service executable at the user's mobile device. The user or user's mobile device may be automatically authenticated or authorized to access application or system resources at the device when the current geographic location of the user's mobile device is determined to be within a preauthorized zone, e.g., based on a predetermined geo-fence corresponding to the preauthorized zone.
Mapquest, Inc.

Relayed network access control systems and methods

A computer system for authenticating and managing network traffic may comprise a network link providing a connection to a network, an authentication, authorization, and accounting (aaa) server configured to provide aaa management for the network link, an access controller configured to communicate with the aaa server and to control access to the network link, and a subnetwork of client devices connected to an intermediate relay node. The client devices may be configured to communicate with the access controller and the network link through the intermediate relay node.
Vivint, Inc.

Methods, systems, and computer readable media for remote authentication dial-in user service (radius) topology hiding

A method for remote authentication dial-in user service (radius) topology hiding includes, at a radius signaling router including at least one message processor, receiving a radius message. The method further includes determining whether radius topology hiding is indicated for the radius message.
Oracle International Corportaion

Network device authentication based on hashing content of sequential messages

A method, performed by an authentication processor of a first network device, includes receiving a first message through a network interface circuit from a second network device. The first message contains a first data unit to be operated upon by the first network device.
Ca, Inc.

Shared secret voice authentication

Systems and methods for voice authentication are provided. An example method starts with dynamically generating authentication information and a prompt associated therefor.
Knowles Electronics, Llc

A contextual scanning device with pre-authenticated identity

The present invention relates to a system and method for providing communication based on predefined authenticated configuration. The system includes a contextual scanning reader device providing a mechanism of automatic pre-authentication of user identity without requiring user to enter login id and password.
Vcare Technologies Pvt. Ltd.

Secret store for oauth offline tokens

An authentication system includes an authentication server, an application having a proxy, and a token store. The token store receives an authentication request and sends the request to the authentication server.
Red Hat, Inc.

Virtual communication system

The virtual communication system 10 includes: the communication server 100 that is connectable to the terminal 12 and includes the virtual machine 108; and the authentication server 20 that performs the authentication when the terminal 12 use the communication server 100. The terminal 12, the communication server 100, and the authentication server 20 connect to one another via the intranet 40 and communicate with one another through the vpn.
Applied Electronics Corp.

Verification request

An example method is provided in according with one implementation of the present disclosure. The method includes receiving a verification request from a unique web-key, determining whether the web-key is associated with an account, and receiving an electronic authentication associated with the web-key.
Hewlett Packard Enterprise Development Lp

User-enabled, two-factor authentication service

A user may have real-time control over whether accessing a network service account implements two-factor authentication. When a username and password is provided to log into the network service account, a determination may be made about whether the login attempt is a potential security threat.
Verizon Patent And Licensing Inc.

System for tracking and validation of an entity in a process data network

Embodiments of the invention are directed to a system, method, or computer program product for generating and using a block chain distributed network for tracking and validating a user identification morphing over time. The block chain database comprises a distributed ledger that is updated with real-time identification information including an initial identification of the user.
Bank Of America Corporation

Communication device

A communication device includes, a packet transmission unit that generates and transmits a packet including a first bit string, which is a first part of a bit string of a sequence number indicating an order of transmission of the packet, in a sequence number region in the packet corresponding to sequence number information, a second bit string, which is a second part other than the first part of the bit string of the sequence number, in an extension region other than the sequence number region, and authentication information, which is generated based on the sequence number, in an authentication information region corresponding to the authentication information, and a packet reception unit that receives the packet including the sequence number and the authentication information from another communication device, and authenticates the received packet based on the sequence number and the authentication information included in the received packet.. .
Fujitsu Limited

Secure connections for low power devices

The disclosed embodiments include computerized methods, systems, and devices, including computer programs encoded on a computer storage medium, for establishing secure wireless communications sessions involving low-power devices. A client device may discover a low-power resource device operating within a wireless network.
Google Inc.

System and providing improved optimization for secure session connections

A system for optimizing network traffic is described. The system includes a plurality of appliances.
Citrix Systems, Inc.

Transaction verification through enhanced authentication

Methods, systems, and computer program products for providing transaction verification through enhanced authentication are provided. A method performed by a computer system may include receiving an application programming interface (api) request from a client, detecting a change associated with the api request as compared to a prior use of the api by the client, generating an encrypted challenge to authenticate the api request based on detecting the change, and issuing the encrypted challenge to the client to authenticate the api request..
Ebay Inc.

System and authentication of things

An authentication of things (aot) system includes a cloud server configured to control a cloud domain connected with a plurality of devices, a home server configured to control a home server connected with a plurality of devices, a first device corresponding to a new device, and a second device of a root user connected with the home domain while authentication is completed in the home server. In this case, the first device loads cryptographic material of the cloud server from the cloud server in a pre-deployment stage, the cryptographic material includes at least one selected from the group consisting of an identifier of the first device in the cloud server, a first private key of an id-based cryptography system of the first device in the cloud server, a first pairwise key of the first device in the cloud server, and a counter of the first device, and if the first device is shipped to a trader, the cloud server deletes the first private key from the cloud server..
Universidade Federal De Minas Gerais

Cryptography on a simplified elliptical curve

A cryptographic calculation includes obtaining a point p(x,y) from a parameter t on an elliptical curve y2=f(x) and from polynomials satisfying: −f(x1(t))·f(x2(t))=u(t)2 in the finite body fq, irrespective of the parameter t, q=3 mod 4. A value of the parameter t is obtained and the point p is determined by: (i) calculating x1=x1(t), x2=x2(t) and u=u(t); (ii) testing whether the term f(x−1) is a squared term in the finite body fq and, if so, calculating the square root of the term f(x1), the point p having x1 as abscissa and y1, the square root of the term f(x1), as ordinate; (iii) otherwise, calculating the square root of the term f(x2), the point p having x2, as abscissa and y2, the square root of the term f(x2), as ordinate.
Morpho

Privacy enhanced key management for a web service provider using a converged security engine

In an embodiment, a security engine of a processor includes an identity provider logic to generate a first key pair of a key pairing associating system user and a service provider that provides a web service and having a second system coupled to the system via a network, to perform a secure communication with the second system to enable the second system to verify that the identity provider logic is executing in a trusted execution environment, and responsive to the verification, to send a first key of the first key pair to the second system. This key may enable the second system to verify an assertion communicated by the identity provider logic that the user has been authenticated to the system according to a multi-factor authentication.
Intel Corporation

System and voice authentication over a computer network

Systems, computer-implemented methods, and tangible computer-readable media are provided for voice authentication. The method includes receiving a speech sample from a user through an internet browser for authentication as part of a request for a restricted-access resource, transmitting an authentication request to an authentication server, which compares the speech sample to a previously established speech profile associated with the user, receiving a response from the authentication server, and providing access to the restricted access resource based on the response..
Nuance Communications, Inc.

Remote application for controlling access

A dual authentication access control system for controlling access to a secured area is disclosed, wherein a supervisor is allowed to approve access requests by a person wanting to gain access to the secured area from a remote location. In some cases, the person requesting access to the secured area enters his credentials and submits an access request.
Honeywell International Inc.

Securing transactions on an insecure network

Systems and methods are provided for enhancing the security of a multi-network computing environment in which at least one of the networks is not secure and at least one of the communicating devices does not send secure messages. An authorization service may maintain two authentication codes that are associated with a client or a computing device.
Sigue Corporation

Enhanced authentication security applicable in an at least partially insecure network environment

Systems and methods are provided for enhancing the security of a multi-system transaction environment in which the computer hardware and/or software of at least one device participating in transaction authorization does not support encrypted communications, and/or where at least one communication associated with the transaction is sent over a network in a manner that will likely be capable of being intercepted, listened to or monitored by an untrusted party. An authorization service may maintain two different codes associated with each of a number of different clients or client devices.
Sigue Corporation

Accepting issuer credentials at checkout

A computer-implemented method presents on a merchant checkout graphical user interface associated with a payment processor widget. The payment processor widget determines affiliations of a plurality of accounts and a plurality of issuers of a user.

Method of host-directed illumination and system for conducting host-directed illumination

A method of host-directed illumination for verifying the validity of biometric data of a user is provided that includes capturing biometric data from a user with an authentication device during authentication and directing illumination of the biometric data from a host authentication system during the capturing operation. Moreover, the method includes comparing illumination characteristics of the captured biometric data against illumination characteristics expected to result from the directing operation, and determining that the user is a live user when the illumination characteristics of the captured biometric data match the illumination characteristics expected to result from the directing operation..
Daon Holdings Limited

Memorabilia provenance authentication

Embodiments of the invention for the track, categorize, or authenticate the provenance of historical artifacts. The invention couples an artifact to at least one unique identifier.
Provenance

Secure transactions in a memory fabric

In an example, transactions are secured between electronic circuits in a memory fabric. An electronic circuit may receive a transaction integrity key.
Hewlett Packard Enterprise Development Lp

Secure health data storage and transaction system

Embodiments of the invention are directed to a system, method, or computer program product for a transaction apparatus for secure data storage and consolidation of medication adherence, health and wellness data for easy implementation and utilization during a transaction. The transaction apparatus may be configured, in various embodiments, for receiving, storing, encrypting, decrypting, encoding, decoding, accessing, transferring, writing, and/or presenting transaction data including, but not limited to, health care data, medication adherence data, wellness data, location data, authentication data, identification data, access data, personal data, and/or other data associated with a user.
Elements Of Genius, Inc.

Method and secure credential entry without physical entry

A storage device is provided with memory configured to store user authentication data for accessing an operating system executing on a host computer. A processor is provided to receive a command indicating readiness to accept input from the operating system, and to retrieve the user authentication data from the memory in response to the command..
Kingston Digital, Inc.

Method and device for identity authentication

Disclosed in the application are a method and device for identity authentication. The method comprises: when the terminal is in the specified stress state, action attribute information of the terminal is collected; the action attribute information is processed by matching with preset sample information; if the action attribute information is matched with the sample information, the authentication is successful, and if the action attribute information is not matched with the sample information, the authentication is failed.
Alibaba Group Holding Limited

Method and a management system for user authentication and prescription refill verification

Described is a method and system for the secure management and verification of prescriptions allowing patients, doctors and dispensers to access prescriptions as directed by patients. An example method may include generating a code vector including a series of authentication codes, storing at least one of the authentication codes on a peripheral device, maintaining an indication of a next expected authentication code from the code vector, allowing prescription creation by a user when the peripheral device is detected and determined to be an authorized device, and that the authentication code provided from the peripheral device matches the next expected authentication code, storing a prescription associated with a patient having a patient pin, wherein the prescription is provided by the user, generating a plurality of refill verification codes associated with the prescription, and authorizing dispensing responsive to receipt of one of the plurality of refill verification codes and the patient pin..
Rxguard, Llc

Wireless connection establishing methods and wireless connection establishing apparatuses

Embodiments of this application provide for establishment of a wireless connection. A method comprises: generating connection authentication information according to related information of a wired connection between a first device and a second device; and sending, in case of disconnection of, a wireless connection establishing request in such a manner that the request can be received by the second device, where the request comprises the connection authentication information.
Beijing Zhigu Rui Tuo Tech Co., Ltd.

Deriving a wlan security context from a wwan security context

Techniques for deriving a wlan security context from an existing wwan security context are provided. According to certain aspects, a user equipment (ue) establishes a secure connection with a wireless wide area network (wwan).
Qualcomm Incorporated

Method and securing timing packets over untrusted packet transport network

Methods, devices, systems, techniques, and computer program products are provided to secure timing synchronization to network nodes connected over an inherently insecure best effort public network with mechanisms to improve accuracy of timing protocols such as a statistically estimated edge timestamp offset encoded into the timing message to account for network jitter and processing latency variances incurred due to the security packet processing and encryption; to ensure slave network nodes shall only accept timing messages from trusted timing sources; to establish a secure tunnel with a trusted timing source for exchange of timing packets; to provide authentication and security for timing packets over the insecure public network; and to enhance message anonymity with variable payload padding.. .
Nokia Solutions And Networks Oy

Protected control frames

Certain aspects of the present disclosure generally relate to wireless communications and, more particularly, to protecting control frames with power-related subfields. One example apparatus for wireless communications generally includes a processing system configured to generate a control frame comprising one or more power-related subfields and an integrity check value calculated based, at least in part, on the one or more power-related subfields and a transmitter configured to transmit the control frame.
Qualcomm Incorporated

Communication apparatus, sharing communication parameters, and program

When information for setting communication parameters includes predetermined information, a communication apparatus performs an authentication process involving wireless communication of authentication information generated using random information and information for use in the authentication process included in the information for setting the communication parameters. When the information for setting communication parameters does not include the predetermined information, the communication apparatus performs an authentication process involving wireless communication of authentication information generated using information for use in the authentication process and without using the random information..
Canon Kabushiki Kaisha

Method and system for authenticating a user

The invention relates to a method and system for authenticating a user, wherein an application transmits a query comprising identification data to an authentication service, the authentication service determines the address of a mobile terminal linked to the user on the basis of the identification data and transmits a request comprising a transaction identifier to the mobile terminal, the mobile terminal performs an enquiry for input of a biometric security feature, grants access to a private key saved on the mobile terminal upon input of a valid security feature, signs the transaction identifier using the private key and transmits the signed transaction identifier back to the authentication service, and the authentication service verifies the signature of the signed transaction identifier and, in the case of the presence of an authentic signature, transmits a confirmation of the query back to the application.. .
Finpin Technologies Gmbh

Identifying a mobile computing device

A mobile computing device, such as a cellular telephone or cellular network capable tablet or pda, can be identified by a phone number associated with the mobile computing device. A mobile computing device can include a subscriber identity module (sim) card that can be used to identify the mobile computing device and to connect the mobile computing device to a communications network operated by the communications carrier or another communications carrier.
Google Inc.

Method of backing up profile and apparatus therefor

A method and apparatus for backing up a profile of in a repository are disclosed. The method of backing up a profile is a method of backing up a profile in a subscriber management server, and includes receiving a backup request for a profile stored in an authentication module from the authentication module, providing information for at least one repository to the authentication module, the information being generated by confirming a state of the at least one repository to back up the profile according to the backup request, and storing the profile in a repository selected by the authentication module based on the information for at least one repository.
Kt Corporation

Non-transitory computer-readable recording medium storing computer-readable instructions for terminal device

A terminal device may send a registration request, which requests the server to register virtual printer relation information related to a virtual printer, to a server, and communicate a wireless profile with an existent printer using a first terminal interface. The wireless profile may be used in a wireless network, which is established by using a second terminal interface, and is a wireless network to which both the terminal device and the existent printer are to belong.
Brother Kogyo Kabushiki Kaisha

Mobile terminal apparatus

A mobile terminal apparatus checks if a user is a proper user based on the operation of the user and, if the result of authentication is negative, uploads predetermined data, which is part of data stored in a memory, to a predetermined server. After the transmission is completed, the mobile terminal apparatus erases the uploaded data from the memory.
Sony Mobile Communications, Inc.

System and providing virtual desktop extensions on a client desktop

The system and method described herein may identify one or more virtual desktop extensions available in a cloud computing environment and launch virtual machine instances to host the available virtual desktop extensions in the cloud. For example, a virtual desktop extension manager may receive a virtual desktop extension request from a client desktop and determine whether authentication credentials for the client desktop indicate that the client desktop has access to the requested virtual desktop extension.
Micro Focus Software Inc.

Beacon spoofing prevention

In one embodiment, a beacon signal is received from a beacon device. Either a mobile device or a server identifies a beacon authentication value from the beacon signal.
Cisco Technology, Inc.

Communication system, communication method, and communication device

A communication system includes a first communication device that determines, using identification information on a frame, whether to receive the frame, and a second communication device that belongs to a network identical to the first communication device. A report frame includes a detection of an attack on the network and target identification information that is identification information included in a frame used to perform the attack.
Fujitsu Limited

Communication system, access authentication method and system based on communication system

A communication system and an access authentication method and system based on such a communication system are described. In the system, a context generation function entity is arranged to generate a user context and store the generated user context in a context database matched with the context generation function entity, and a service access control function entity is arranged to acquire the user context from the context database and authenticate a terminal initiating an access request by adopting the user context.
Zte Corporation

Mutual authentication method and authentication apparatus

A first device generates first encrypted data from a second public key corresponding to second id regarding a second device and a first random number and transmits first id regarding the first device, second id, and first encrypted data. The second device generates second encrypted data from a first public key corresponding to the first id and a second random number, generates second verification data by generating a second shared-key candidate from the second random number, the first encrypted data, and a second private key, and transmits the second encrypted data and second verification data.
Fujitsu Limited

Passive security enforcement

Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user's interactions with the computing system.
Microsoft Technology Licensing, Llc

Device system for performing group authentication and operating method thereof

A device system that performs group authentication and an operating method thereof are provided. The device system includes multiple devices.
Samsung Electronics Co., Ltd.

Authentication methods and authentication apparatuses

authentication methods and apparatuses are provided. The authentication method comprises: acquiring, from a server, first server authentication information of a user, the first server authentication information being encrypted by using at least one first key obtained from a first number of characters in a user password of the user; acquiring the first number of characters input by the user in a password input area; decrypting the first server authentication information by using at least one second key obtained from the first number of characters input; feeding back at least one first authentication response to the user at least according to the decrypted first server authentication information; and sending an authentication request to the server based on a server authentication pass instruction of the user, the authentication request being used to request the server to authenticate the user..
Beijing Zhigu Rui Tuo Tech Co., Ltd

Native authentication experience with failover

Disclosed are various embodiments for providing a native authentication experience with failover. A network service authenticates a first application executed in a computing device in a first instance using one or more authentication factors received via a platform-specific application programming interface that is native to the computing device.
Amazon Technologies, Inc.

Secure remote access for secured enterprise communications

Methods and systems for securing communications with an enterprise from a remote computing system are disclosed. One method includes initiating a secured connection with a vpn appliance associated with an enterprise using service credentials maintained in a secure applet installed on a remote computing device, and initiating communication with an authentication server within an enterprise via the secured connection.
Unisys Corporation

Production of cryptographic signatures

A method and system configured to produce a cryptographic signature on a message, under a key, at a user computer wherein the key is shared between the user computer, which stores a first key-share, and an authentication computer, which stores a second key-share and a first authentication value. The user computer encodes the message to produce a blinded message, produces the first authentication value from a user password and a secret value, and produces a second authentication value by encoding the first authentication value and a nonce.
International Business Machines Corporation

Relational encryption

A method includes encrypting a first plaintext vector using a relational linearity encryption scheme to generate a first linearity ciphertext and using a relational proximity encryption scheme to generate a first proximity ciphertext. The method includes communicating the first linearity and the first proximity ciphertexts to a server.
Fujitsu Limited

Distributed single sign-on

Respective cryptographic shares of password data, dependent on a user password, are provided at n authentication servers. A number t1≦n of the password data shares determine if the user password matches a password attempt.
International Business Machines Corporation

Methods for cryptographic delegation and enforcement of dynamic access to stored data

Methods for cryptographic delegation and enforcement of dynamic access to stored data are disclosed. An example method includes generating for a first modified data block, a new per-block hash value using as a hash function input data contained in the first modified data block or a new per-block hash message authentication code (hmac) using as hash function inputs a new per-block hash key and data contained in the first modified data block, writing the new per-block hash value or the new per-block hmac to data block metadata associated with the modified data block in the protected data object, and writing the first modified data block to one of the data blocks of the protected data object..
Trustwave Holdings, Inc.

Audio encoder and decoder with program loudness and boundary metadata

Apparatus and methods for generating an encoded audio bitstream, including by including program loudness metadata and audio data in the bitstream, and optionally also program boundary metadata in at least one segment (e.g., frame) of the bitstream. Other aspects are apparatus and methods for decoding such a bitstream, e.g., including by performing adaptive loudness processing of the audio data of an audio program indicated by the bitstream, or authentication and/or validation of metadata and/or audio data of such an audio program.
Dolby Laboratories Licensing Corporation

Item label with a tag

A label has a portion that is readable by a human being and a portion that is readable by a machine. The label includes information stored using a spectral content of reflected from a tag.
Trutag Technologies, Inc.

Method of, and system for, preventing unauthorized products from being sold on online sites

Unauthorized products are prevented from being sold on online websites. Product identifier keys and private authentication keys are stored in a database of an authentication server.
Zortag, Inc.

Authentication based on data content and data partitions

Examples disclosed herein relate to authentication based on data content and data partitions. In one implementation, a processor may execute instructions to determine the likelihood of authenticity based on partitions of the authentication data and content of the authentication data.
Hewlett-packard Development Company, L.p.

Method and system for call authentication and providing reliability

Disclosed herein are a method and system for authenticating a user and providing reliability based on phone approval. The method includes receiving, by a service provision server, a service provision request from a first terminal; determining, by the service provision server, whether a type of requested service is service requiring verification of reliability of the user, and transmitting a phone authentication request, including the service type and authentication terminal information about a second terminal, to a phone authentication server; sending, by the phone authentication server, an authentication information request guidance message to the second terminal, acquiring authentication information, performing authentication of the user, and transmitting an authentication result to the service provision server; when the authentication results indicates a success or confirmation of approval, providing requested service to the first terminal; and cumulatively storing the authentication result, and statistically processing the authentication result, thus generating a reliability level..
Thinkat Co., Ltd.

Online transaction authorization via a mobile device application

A method and system for providing a service node for authenticating online transactions. The authentication service node improves the ability to verify that an online transaction is made by an authenticated user.
Genband Us Llc

System and method using authorization and direct credit messaging

A merchant computer generates a token including a “pay-me” merchant account identifier and transaction data for a transaction conducted by a consumer. The merchant token can be obtained by a mobile communication device and transmitted to a payment processing network along with a device identifier for the mobile communication device and an authentication token provided by the consumer.

Point of sale transactions

A system provides for a self-checkout terminal with various components. A receiver receives shopping data including prices of items that a customer has physically acquired or placed in a cart.
Diebold Nixdorf, Incorporated

Biometric authentication device, biometric authentication method and computer-readable non-transitory medium

A biometric authentication device includes: an acquisition device configured to acquire eye information of a user; a memory; and a processor coupled to the memory and the processor configured to: extract a first eye feature based on recognition characteristic from the eye information; extract a second eye feature based on eye movement characteristic from the eye information; and match a first eye feature enrolled in advance with the first eye feature extracted by the first extractor, and to match a second eye feature enrolled in advance with the second eye feature extracted by the second extractor.. .
Fujitsu Limited

Biometrics authentication device and biometrics authentication method

A biometrics authentication device is configured to include: a filter that extracts from an input image directional features that respectively correspond to directions different from each other; an perpendicular filter that, from among the directional features extracted from the filter, decreases a luminance value of the entirety of a directional feature that corresponds to a prescribed direction, increases a luminance value of the entirety of a directional feature that corresponds to a direction perpendicular to the directional feature that corresponds to the prescribed direction, and outputs other directional features with no change; a non-directional feature generation processing unit that generates a non-directional feature on the basis of the directional features output from the perpendicular filter; a matching processing unit that obtains a similarity between the non-directional feature and a registered non-directional feature stored in a storing unit; and a determining unit that determines identity by using the similarity.. .
Fujitsu Frontech Limited

Unlocking a portable electronic device by performing multiple actions on an unlock interface

The disclosure provided herein includes a multi-step authentication process to unlock a portable electronic device. To unlock the device, a user can use a touch screen on the device to select an access category, to select an access subcategory, and to enter an access subcategory value.
Light Cone Corp.

Utilization of biometric data

A method for authenticating a user on a device is provided. The method comprises receiving an authentication request.
Bio-key International, Inc.

Allowing access to applications based on user handling measurements

Authenticating users comprises a computing device that receives a manual authentication input of a user and initiates a first user session between the user and the user computing device. The device communicates a request for a first user authorization data from an authentication technology associated with the one or more computing devices and receives the first user authentication data.
Google Inc.

Information processing apparatus, control the same and storage medium

An information processing apparatus that can avoid an ieee802.1x re-authentication process due to a communication speed setting change made at the time of transitioning to the power-saving state and realize both of security and power-saving. Fixed link speed with which both a mfp 100 and a communication apparatuses are compatible is set on the basis of acquired pieces of link speed setting information about the mfp 100 and the communication apparatus.
Canon Kabushiki Kaisha

System and establishing a connection to a wireless local area network through a personal area network connection

A method for establishing a connection to a wireless local area network connection through an access point on a target device having a limited user interface through a wireless personal area network connection between the target device and a controlling device with a superior user interface, such as a smart phone. The process of establishing a connection begins with the creation of a wireless personal area network connection bond between the target device and the controlling device.

Wireless communication relay apparatus, automatic response method in wireless communication relay apparatus, and non-transitory computer readable medium

A wireless communication relay apparatus (10) according to the present invention outputs, when there is an incoming call from a base station (30) (yes in step s1) and the connection authentication between the wireless communication relay apparatus (10) and the wireless communication terminal (20) has not yet been completed (no in step s2), an instruction to start the connection authentication to the user as an in-apparatus incoming notification state (step s21) and sends a message or a hold tone indicating that the connection authentication is currently being executed to a caller of the incoming call (step s26). After that, when the connection authentication is completed (yes in step s28), the incoming call is connected to the wireless communication terminal (20) (step s3)..
Nec Platforms, Ltd.

Radio base station and control method therefor

A radio base station (10) of the present invention comprises: a determination unit (101) that determines whether to perform an off-the-air of a cell (11) managed by the local radio base station (10); a communication unit (102) that communicates with the other radio base stations (10) managing peripheral cells and with a communication provider apparatus (20) managing the bearer information of a user terminal (2); and a communication control unit (103). When it is determined that the off-the-air of the cell of the local radio base station (10)is to be performed, the communication control unit (103) transmits, to the other radio base stations (10) managing the peripheral cells, the authentication code of the user terminal (2) existing in the cell of the local radio base station (10).
Nec Corporation

Authentication method, mobile communications authentication platform, and device

Embodiments disclose an authentication method, a mobile communications authentication platform, and a device. The method of the embodiments of the present invention includes: receiving, by a mobile communications authentication platform, first identifier information of a first device and second identifier information of a second device.
Huawei Technologies Co., Ltd.

Mobility management entity, terminal, and identity authentication method

A mobility management entity (mme), a terminal and an identity authentication method are disclosed. The mme comprises: a sending unit, configured to send an identity authentication request, an encryption key and a corresponding digital certificate to a terminal when detecting that a mapping relation between a globally unique temporary terminal identity and an international mobile subscriber identity code is lost, so that the terminal is enabled to verify the mobility management entity according to the digital certificate, use the encryption key to encrypt the international mobile subscriber identity code when the verification is successful, and send the encrypted international mobile subscriber identity code to the mobility management entity; a receiving unit, configured to receive the encrypted international mobile subscriber identity code sent by the terminal; and a decrypting unit, configured to decrypt the encrypted international mobile subscriber identity code according to a stored decryption key corresponding to the encryption key..
Yulong Computer Telecommunication Scientific (shenzhen) Co., Ltd.

Information pushing method, server, sharer client and third-party client

Disclosed in an embodiment of the present application is an information pushing method, comprising: a wireless network sharer client obtaining a first identifier of a wireless network selected from a wireless network list scanned/stored by a wireless network sharer terminal, and sending the same to a server; the server generating a second identifier and sending the same to the wireless network sharer client; the wireless network sharer changing the first identifier of the wireless network into a third identifier based on the second identifier; the wireless network sharer client obtaining a wireless network list updated by a wireless network sharer mobile terminal and sending the third identifier of the selected wireless network in the list to the server; and the server comparing the second identifier with the third identifier, and allowing successful authentication when the two identifiers are consistent, and registering information about the devices of the wireless network.. .
Alibaba Group Holding Limited

Method and safe network access point detection

An approach is provided for determining the authenticity of an available wireless network access point. The approach involves detecting one or more available wireless network access points.
Intel Corporation

Management method and management server for using sim cards

First, an mvno 230a that has obtained one or more sim cards logs in to a management screen provided by an mvne 210 in association with a user id of the mvno 230a. From the standpoint of the mvne 210, it is determined whether a user id of a user who has accessed a management screen of a management server of the mvne 210 is under mvno contract (s301).
Soracom, Inc.

Multi-channel audio enhancement for television

A comprehensive mechanism is provided for broadcasting and accessing multiple audio sources in connection with the viewing of a television program. In the preferred embodiment, the first step in providing audio is collecting the audio through the use of standard audio capture techniques.
Tvworks, Llc

Printing apparatus including nfc tag, method related thereto, and storage medium

A printing apparatus includes a card reader that reads a card for user authentication, a near field communication (nfc) tag, a memory that stores instructions, and a processor that executes the instructions to determine whether the card reader reads the nfc tag and determine, based on a result of the determination, an operation method of the nfc tag.. .
Canon Kabushiki Kaisha

Inbound calls to intelligent controlled-environment facility resident media and/or communications devices

Systems and methods for inbound calls to controlled-environment facility resident media and/or communications devices may receive, via the device, data associated with the resident operating the device. authentication of the resident operating the device may be verified as associated with an address identifier of the device and it may be confirmed that an inbound calling non-resident is associated with the address identifier.
Securus Technologies, Inc.

Collaborative platform for communication, application development and use

According to innovative aspects, the subject matter described in this disclosure may be embodied in a server having a memory and one or more processors configured to execute instructions stored on the memory, wherein the server is configured to perform operations comprising: transmitting, by a cloud operating system running on the server, a first graphical user interface for display on a client device; receiving authentication information, via the first graphical user interface, at the cloud operating system; receiving a selection of a service, by the cloud operating system, from the client device via the first graphical user interface; and transmitting, by a service operating system running on the server, a second graphical user interface for display on the client device.. .
Doky Inc.

Method for providing trusted service based on secure area and apparatus using the same

Disclosed herein are a method for providing trusted services based on a secure area and an apparatus using the method. The method for providing trusted services includes performing first authentication for using a trusted service of the secure area, created to be separate from a general area, based on a gateway application installed in a mobile terminal; creating a first session between the gateway application and the secure area based on a result of the first authentication and executing a security application based on the first session; performing second authentication for using the trusted service based on the security application; and creating a second session between the security application and the secure area based on a result of the second authentication and providing the trusted service based on the second session..
Electronics And Telecommunications Research Institute

Methods and systems for a cloud terminal to access a household cloud system, and associated cloud-access control devices

A method for a cloud terminal to access a household cloud system is provided, the method including: receiving, at the household cloud system, an access-request message from the cloud terminal; determining, by the household cloud system, whether the access-request message contains a preset message specification, the preset message specification including an access mode, requested contents, and an authentication identification (id) code; if the access-request message contains the preset message specification, determining whether the authentication id code in the access-request message is consistent with a preset id code in the household cloud system; and if the they are consistent, allowing the cloud terminal to access the household cloud system. An associated cloud-access control device and household cloud system are also provided.
Huizhou Tcl Mobile Communication Co., Ltd.

Method and system for real-time authentication of user access to a resource

A method and system for authenticating user access to a resource is disclosed having the steps of receiving an access request from a user to access a resource, sending an authentication request to an authenticator, receiving an authentication response from the authenticator, providing access to the resource if the authentication response is validated by each authenticator; and denying access to the resource if the authentication response is not validated by the authenticator.. .
Lastwall Networks Inc.

Dental wedge

A unified identity wallet system, for allowing a user to manage online digital authentication, authorization, and access rights in a simple and secure manner, can include a unified identity wallet server, a pass repository, a unified identity wallet app, an access authorization app, and a unified identity pass manager. The unified identify wallet app can include a processor, a non-transitory memory, an input/output component, a wallet store, a pass requester, and an access manager.
Dhana Systems Corporation

Information handling system utilizing a smart logo to provide properties of the information handling system

An information handling system includes a plurality of components, and a logo device configured to communicate with one of the components. The logo device includes a logo, a memory, a communication device, and a processor.
Dell Products, Lp

Authentication stick

A communication adapter for authentication of a user includes a receiving unit for receiving encrypted credentials, a decryption unit for decrypting the encrypted credentials and an output unit for outputting the decrypted credentials to a terminal device.. .
Fraunhofer-gesellschaft Zur Foerderung Der Angewandten Forschung E.v.

System and implementing secure communications for internet of things (iot) devices

Novel tools and techniques might provide for implementing secure communications for iot devices. In various embodiments, a gateway or computing device might provide connectivity between or amongst two or more internet of things (“iot”) capable devices, by establishing an iot protocol-based, autonomous machine-to-machine communication channel amongst the two or more iot capable devices.
Centurylink Intellectual Property Llc

Multiple factor authentication in an identity certificate service

Multiple factor authentication in an identity certificate service is disclosed. A certificate including a cryptographically-obscured identifier associated with the end entity is sent from an end entity to a service node.
Mobile Iron, Inc.

Electronic device and authenticating identification information thereof

An electronic device is provided. The electronic device includes a communication interface; a memory configured to store first identification information corresponding to an external electronic device and second identification information corresponding to a communication processor (cp) of the external electronic device, and a processor, wherein the processor is configured to generate authentication information based on at least the first identification information and the second identification information, generate an electronic signature corresponding to the authentication information through encryption of at least a part of data related to the authentication information, and transmit the electronic signature to the external electronic device using the communication interface..
Samsung Electronics Co., Ltd.

Method for dynamic authentication of an object

There is provided a data processor implemented method for dynamic authentication of an object. There is also provided non-transitory computer readable storage mediums and systems for carrying out dynamic authentication of an object..
Mastercard Asia/pacific Pte Ltd

Secure content sharing using content centric approach

A network enabled computer system includes a processor and a dual stack communication module to couple to a network. The dual stack communication module includes information centric network layers and a secure network connection layer, each coupled to an ip connection layer to couple to a network.
Futurewei Technologies, Inc.

Power node communication for device detection and control

Apparatus and techniques described herein can include a load circuit comprising a direct current (dc) input terminal, and a source circuit comprising a direct current (dc) output terminal coupled to the dc input terminal of the load circuit. The source circuit can include a source control circuit configured to provide a current-limited dc output voltage and monitor the current-limited dc output voltage to detect an authentication signal provided at the dc output terminal by the load circuit, the load circuit configured to modulate the voltage at the dc output terminal using a pull-down circuit.
Analog Devices Global

Personal device location authentication for secured function access

A personal device may perform a first triangulation using signal strength information of connections between the personal device and a plurality of in-vehicle components of a vehicle. A secured function request may be sent from the personal device to an access component of the vehicle when a location of the personal device is determined to be within the vehicle by the personal device.
Ford Global Technologies, Llc

Methods and systems for ensuring that an individual is authorized to conduct an activity

A method for ensuring that an individual is authorized to conduct an activity is provided. The method includes conducting, using a processor, an authentication transaction with authentication data captured from an individual desiring to conduct an activity, and determining whether the captured authentication data is legitimate when the individual is successfully authenticated.

Systems and methods for authentication of physical features on identification documents

The present solution disclosed herein is directed to methods and systems for authenticating identification (id) documents. Fake ids are an issue and have become difficult to detect by eye.
Confirm, Inc.

Restricting account use by controlled replenishment

A restriction request message, including a restriction parameter for a secondary account, is received from a device that is associated with a primary account, via a network node that is outside of a secure authorization network. A replenishment request message, including a password and an account replenishment parameter for the secondary account, is also received via a network node that is outside of the authorization network.
Ca, Inc.

Secure payment device and secure payment method thereof

A secure payment device having first and second modes is provided. In the second mode, a payment procedure is activated to receive data of a payment member for a secure payment.
Compal Electronics, Inc.

Online pseudonym verification and identity validation

Methods, systems, and computer program products for authenticating an online user. authentication involves sending a code from a server to a user device equipped with a source of illumination and a camera capable of capturing video imagery of the online user.
Iproov Ltd

System and authenticating user

Provided is a user authentication method using a natural gesture input. The user authentication method includes recognizing a plurality of natural gesture inputs from image data of a user, determining number of the plurality of natural gesture inputs as total number of authentication steps, determining a reference ratio representing a ratio of number of authentication steps requiring authentication pass to the total number of the authentication steps, determining an actual ratio representing a ratio of number of authentication steps, where authentication has actually passed, to the total number of the authentication steps, and performing authentication on the user, based on a result obtained by comparing the actual ratio and the reference ratio..
Electronics And Telecommunications Research Institute

Biometric authentication device, biometric authentication method and computer-readable non-transitory medium

A biometric authentication device includes: a memory; and a processor coupled to the memory and the processor configured to execute a process, the process comprising: extracting a finger crotch from a palm image for comparison; extracting a finger root wrinkle from the palm image for comparison; adjusting at least one of a position of a biometric feature for comparison of the palm image for comparison and a position of an enrollment biometric feature of an enrolled palm image, based on position information of the finger crotch extracted in the extracting of the finger crotch and position information of the wrinkle extracted in the extracting of the finger root wrinkle; and comparing the biometric feature for comparison and the enrollment biometric feature after the adjusting.. .
Fujitsu Limited

Function performing apparatus and portable device

A function performing apparatus includes a function performing unit performing a specific function, a processor, and memory storing computer-readable instructions therein, the computer-readable instructions, when executed by the processor, causing the function performing apparatus to perform, in response to receiving a user authentication information when the user authentication information has been registered in an authentication memory, transitioning a state of the apparatus from a non-permission state to a permission state, registering, in the authentication memory, a device authentication information in association with the user authentication information upon establishing a first connection with a portable device, and transitioning the state of the apparatus from the non-permission state to the permission state when a second connection with the portable device is established and the device authentication information is obtained from the portable device.. .
Brother Kogyo Kabushiki Kaisha

Embedded authentication systems in an electronic device

This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user.
Apple Inc.

Methods and apparatuses for adaptively updating enrollment database for user authentication

An adaptive updating method of an enrollment database is disclosed. The method may include extracting a first feature vector from an input image of a user, determining whether the input image is to be enrolled in an enrollment database based on the first feature vector, second feature vectors of enrollment images including initial enrollment images enrolled in the enrollment database, and a representative vector representing the initial enrollment images, and enrolling the input image in the enrollment database based on a result of the determining..

Electronic drug dispenser system

A medication administration and tracking system is described. The system is equipped with an electric medication dispenser configured to administer medication to a patient in a hospital bed without intervention from hospital staff.

Method and authentication of file read events

A computerized method and apparatus for distinguishing between false positive read events and true positive events of reading a file, comprising determining an amount of date read from the file, in case the amount of data exceeds a threshold generating a true positive read event, otherwise generating a false positive read event in case a decision condition is met, and an apparatus to carry out the same.. .
Varonis Systems, Inc.

Printing system, printing apparatus and non-transitory computer-readable medium storing instructions to terminal apparatus

A printing system includes a terminal apparatus and a printing apparatus. The terminal apparatus includes: a first inputting section; and a processor configured to: transmit a print request for printing an object image indicated by object data to the printing apparatus; receive first input authentication information inputted by a user; and transmit the first input authentication information to the printing apparatus.
Brother Kogyo Kabushiki Kaisha

System for authorizing access based on authentication via separate channel

Embodiments of the invention are directed to a system, method, or computer program product for authorizing access based on authentication via a separate channel. In this way, the invention generates and utilizes tokenized identification of user authentication into third party systems to confirm the user identification and subsequently allow authentication into an application based on receipt of the token.
Bank Of America Corporation

Zero sign-on authentication

A authenticating system and process for authenticating user devices to a access a media service where access to certain portions of the media service may be limited according to a gateway or other device used by a user device to facilitate interfacing a user with the media service. The authentication may be achieved without directly assessing a trustworthiness of the user devices, and optionally, without requiring a user thereof to complete a sign-on operation..
Cable Television Laboratories, Inc.

Apparatus and methods for computerized authentication of electronic documents

A computerized method for authenticating documents having viz sections, the method comprising capturing an image of a document to be authenticated from a scanner and enhancing the captured image, and using a processor for identifying and cropping a viz section in the image.. .
Au10tix Limited

Image forming apparatus and controlling the same

An image forming apparatus and a method of controlling the image forming apparatus are provided. The method includes receiving a reflection signal corresponding to a transmission signal transmitted from the image forming apparatus to a user sensing area, the reflection signal being reflected from a user, determining a distance between the image forming apparatus and the user, based on the received reflection signal, selecting a power consumption mode corresponding to the determined distance from among a plurality of power consumption modes, based on the distance between the image forming apparatus and the user, and performing user authentication or power control according to the selected power consumption mode..
S-printing Solution Co., Ltd.

Sharing a content item

A content item on a content management system can be shared using a generated sharing link. The sharing link can be a custom network address, such as a uniform resource locator (url), which allows the content item to be accessed without authentication.
Dropbox, Inc.

System for escalating security protocol requirements

Disclosed is a system for escalating security protocol requirements. The system typically includes a processor, a memory, and a security protocol module stored in the memory.
Bank Of America Corporation

Systems and methods for the detection of advanced attackers using client side honeytokens

There is provided a method for detecting a malicious attempt to access a service providing server using credentials of a client terminal in a network, the method performed by a malicious event detection server analyzing packets transmitted over the network, comprising: analyzing at least one login-credential associated with an attempt to obtain authentication to access the service providing server to determine whether the login-credential matches an invalid login-credential included in a set of honeytoken-credentials, wherein the set of honeytoken-credentials is stored on a local memory of the client terminal, wherein the set of honeytoken-credentials includes the invalid login-credential and a valid login-credential, wherein the invalid login-credential is invalid for authentication of the client terminal to access the service providing server and the valid login-credential is valid for authentication of the client terminal to access the service providing server; and identifying a malicious event when the login-credential matches the invalid login-credential.. .
Microsoft Technology Licensing, Llc

Systems and methods for data authentication via a stateless edge appliance

Methods, systems, and non-transitory computer readable media are provided for rendering at an electronic terminal a first set of graphical user interfaces to request a first set of data from a user, receiving, at a central server in communication with the electronic terminal, the first set of data from the user, communicating the first set of data via a stateless edge appliance to a third party verification server in a selected one of a plurality of third party computer networks to validate the first set of data, rendering a second set of graphical user interfaces to request a second set of data from the user, communicating the second set of data to the third party verification server to authenticate the second set of data, and authenticating the user in response to receipt of authentication of the second set of data.. .
Wal-mart Stores, Inc.

Method and geographic location based electronic security management

Provided herein are systems, methods and computer readable media for facilitating an authentication process validating the location of a first device, for example, using a second device, before authorizing an action an example apparatus may be configured to receive a request to cause an action from a first device, cause the first device to communicate with a second device to verify a proximity of the first device and the second device, receive verification of the proximity, receive a first identifying data string, receive a second identifying data string, and upon confirmation of a match of the first identifying data string and the second identifying data string, authorizing the action.. .
Cloudwear Inc.

Computer readable storage media for tiered connection pooling and methods and systems for utilizing same

Systems and methods for tiered connection pooling are disclosed herein, which may be used in a method of fulfilling user requests in an enterprise computing system. The method involving generating, by a processing unit, a first connection pool comprising one or more previously used authenticated connections with a resource; generating, by the processing unit, a second connection pool comprising one or more unused authenticated connections with the resource; and generating, by the processing unit, a third connection pool comprising one or more unauthenticated connections with the resource; receiving, by the processing unit, a request from the user device to access the resource, the resource requiring authentication for access; and fulfilling, by the processing unit, the request based on a connection from the first, second, or third connection pool..
Document Storage Systems, Inc.

Information processing method, information processing device, authentication server device, and verification server device

There is provided an information processing method of an information processing device, including acquiring tag-unique information unique to an ic tag from the ic tag through near field communication, acquiring device-unique information unique to the information processing device, transmitting the acquired tag-unique information and the acquired device-unique information to an outside, and receiving, from the outside, an authentication result of the acquired tag-unique information and a verification result of right information for using the ic tag, which are obtained based on the transmitted tag-unique information and device-unique information.. .
Felica Networks, Inc.

Entry and exit control method and apparatus, and user terminal and server for the same

Disclosed are an entry and exit control method and apparatus, and a user terminal and a server. The entry and exit control method may be performed by the entry and exit control apparatus, and include broadcasting location information of the entry and exit control apparatus, receiving an authentication token from the user terminal providing a user authentication interface, verifying the received authentication token, and controlling an entry or an exit based on the verified authentication token, in which the authentication token may be issued by an entry and exit control server communicating with the entry and exit control apparatus at a request of the user terminal..
Electronics And Telecommunications Research Institute

User authentication method with enhanced security

A user authentication method with enhanced security is provided. The method includes generating a first common authentication key if a user of the user terminal enters a private password and providing the generated first common authentication key to an authentication server, registering the first common authentication key and user information by matching the first common authentication key with the user information, generating a second common authentication key in real time if the user enters the private password, generating a server authentication key, generating first server authentication information by calculating a one time password (otp) by using the server authentication key as an operation key, generating a user authentication key, generating first user authentication information by calculating an otp by using the user authentication key as an operation key, and performing user authentication based on whether the first server authentication is identical to the first user authentication..
Ssenstone Inc.

One time passcode

A one-time passcode authentication system includes an application server, an authentication server, and an access device, wherein the access includes an authentication engine configured to receive an authentication request from the authentication server and automatically, or in response to a single user input, initiate an access request to the application server, wherein the access request includes a token extracted from the authentication request, and the application server is configured to receive the access request, query the authentication server to authenticate the token, and enable access to an application if the token is authenticated.. .
Mastercard International Incorporated

System and automatic wireless network authentication in an internet of things (iot) system

A system, apparatus, and method are described for a secure iot wireless network configuration. For example, one embodiment of an internet of things (iot) hub comprises: a local wireless communication interface to establish local wireless connections with one or more iot devices and/or iot extender hubs; a network router to establish network connections over the internet on behalf of the iot devices and/or iot extender hubs; an authentication module pre-configured with a passphrase and a hidden service set identifier (ssid), the authentication module to receive a connection requests from the iot devices and/or an iot extender hubs and to grant the connection requests when the iot devices and/or iot extender hubs use the pre-configured passphrase and hidden ssid; and a firewall of the iot hub to block all outgoing and incoming connection requests other than those directed to designated servers of an iot service with known host names..
Afero, Inc.

Method for reading an identity document

A method for reading an identity document, a readout terminal and a readout system, which simplifies the multiple reading of identity documents. According to the method, an authentication key and an information item are stored in hidden fashion in the chip of the identity document..
Giesecke & Devrient Gmbh

System for assessing network authentication requirements based on situational instance

Embodiments of the invention are directed to a system, method, or computer program product for assessing network authentication requirements based on situational instance. In this regard, the invention dynamically determines specific user authentication requirements for accessing a service or executing an activity based on the determining the user's network connections, geographic location, and applications, in real-time.
Bank Of America Corporation

Method and system for identity-based authentication of virtual machines

A cloud computing system configured to run virtual machine instances is disclosed. The cloud computing system assigns an identity to each virtual machine instance.
Rackspace Us, Inc.

Technique for obtaining a policy for routing requests emitted by a software module running on a client device

One embodiment relates to a method for obtaining, in a communication network, a routing policy indicating rules for routing requests emitted by a software module running on a client device. The method comprises sending, by the client device, a connection request to an authentication server of the communication network in order to attach the client device to the communications network- and receiving, by the client device, a connection context response from the authentication server.
Orange

Registrant defined prerequisites for registering a tertiary domain

Systems and methods of the present invention provide for one or more server computers communicatively coupled to a network and configured to: receive, from a sub domain registration settings control panel displayed on a client computer, rule or prerequisites required for a sub domain registrant to register a sub domain, and store these rules or prerequisites in a database. The server(s) may then receive: a sub domain registration request, an ip address directing http requests to the sub domain; and an authentication verifying that the prerequisite has been fulfilled.
Go Daddy Operating Company, Llc

Service configuration data processing method and apparatus

Disclosed are a method for processing service configuration data and apparatus, in the method, it is to obtain a management internet protocol (ip) address of a terminal device in which a small form-factor pluggable optical network unit (sfp-onu) is located; searching for a registered authentication identifier corresponding to the management ip address in a pre-established binding relationship; obtaining service configuration data according to the registered authentication identifier, and distributing the service configuration data to the sfp-onu, herein the service configuration data is used to start and manage a sfp-onu service. According to a technical solution provided by the present disclosure, a binding relationship can be established through a management ip address of a terminal device and authentication and configuration data of a sfp-onu, so that the sfp-onu can be conveniently managed and a service channel can be automatically opened in existing x-passive optical network (xpon) applications..
Zte Corporation

Method for distributed trust authentication

A method for distributed trust authentication of one or more users attempting to access one or more service providers operating on a network includes performing primary authentication of a user using a first authentication factor, generating a first partial digital signature for a first authentication response to the primary authentication, performing secondary authentication of the user using a second authentication factor, generating a second partial digital signature for the second authentication response to the secondary authentication, combining the first and second partial digital signatures to form a composite digital signature, and validating the composite digital signature.. .
Duo Security, Inc.

Secure remote authentication of local machine services using secret sharing

A method for authentication of a computing device so that shares of a secret may be delivered, over a network that uses a communications protocol which does not require use of an address, and on which an authentication server is listening, comprising the steps of dividing the secret into a first share and a second share, or more; destroying the secret; transmitting the second share, together with a unique identifier, out of band to a pre-designated location; erasing the second share from the computing device; storing the first share at the computing device; broadcasting the unique identifier over the network; accepting a request over the network from an authentication server to initiate an authentication protocol; responding to the request; receiving the second share from the authentication server; and reconstructing the secret using the received second share and the stored first share.. .
Spyrus, Inc.

Seamless authentication and enrollment

Some aspects of the invention may include a computer-implemented method for enrolling voice prints generated from audio streams, in a database. The method may include receiving an audio stream of a communication session and creating a preliminary association between the audio stream and an identity of a customer that has engaged in the communication session based on identification information.
Nice Ltd.

Authentication of users of self service channels

An interactive voice response (ivr) system comprises a memory storing recorded segments of speech by individuals, and a processor configured to enrol individuals. The enrolment process may comprise retrieving one or more of said recorded segments of speech by an individual from said memory and using the retrieved segments to create a voice print for the individual.
Nice Ltd





Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Authentication for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Authentication with additional patents listed. Browse our RSS directory or Search for other possible listings.


3.8927

file did exist - 12978

2 - 1 - 253