Follow us on Twitter
twitter icon@FreshPatents


Authentication patents

      

This page is updated frequently with new Authentication-related patent applications.




 Multimedia exchange system patent thumbnailMultimedia exchange system
A media sharing method has the steps of a user engaging with a system through profile creation and login with authentication, the system engaging one or more media platforms, authorizing the recording data, uploading the recording data to the system, uniquely identifying the recording data, and verifying and authenticating the user. It may also have the step of editing the media before uploading the recording data to the system.

 Authentication management method, information processing apparatus, wearable device, and computer program patent thumbnailAuthentication management method, information processing apparatus, wearable device, and computer program
An authentication management method executed in a plurality of apparatuses cooperating each other communicably connecting, to allow reception of instruction by a user, a first information processing apparatus which performs authentication that the user is a predetermined person and a second information processing apparatus which is worn by the user, in a case where the user wearing the second information processing apparatus has been identified, by the second information processing apparatus, to be the predetermined person, identifying, by the second information processing apparatus, whether or not the first information processing apparatus and the second information processing apparatus are associated with each other as a plurality of apparatuses which perform cooperative processing.. .
Canon Kabushiki Kaisha


 Method and  managing authentication in wireless communication system while subscriber identity module is not available patent thumbnailMethod and managing authentication in wireless communication system while subscriber identity module is not available
A method and apparatus for performing an authentication procedure in a wireless communication system is provided. A mobile equipment, which runs a plurality of applications, detects that a universal integrated circuit card (uicc) of the mobile equipment is in a first status, in which the uicc is able to answer a request, or a second status, in which the uicc is not able to answer a request.
Lg Electronics Inc.


 Method and  acquiring sip signaling decryption parameters patent thumbnailMethod and acquiring sip signaling decryption parameters
Disclosed in the embodiment of the present invention is a method for acquiring session initiation protocol (sip) signaling decryption parameters and the method comprises the following steps: the authentication information of the gm interface and the authentication information of the cx interface are acquired; a security association (sa) decryption table is created according to the acquired authentication information of the cx interface and authentication information of the gm interface, wherein the sa decryption table comprises sip signaling decryption parameters. A device for acquiring sip signaling decryption parameters is also disclosed in the embodiments of the present invention..
Zte Corporation


 System and  collaborative authentication patent thumbnailSystem and collaborative authentication
Systems and methods are disclosed for collaborative authentication of a person based on an interaction with another person. A request for collaborative authentication is sent to the computing device of a person wanting to access a system, including an authentication id unique to the request.
Open Text Sa Ulc


 Anonymous association system utilizing biometrics patent thumbnailAnonymous association system utilizing biometrics
Various exemplary embodiments relate to an anonymous database system. The system includes a plurality of biometric nodes in communication with one another.
Dignity Health


 Authentication patent thumbnailAuthentication
An account authentication method performed at a server, including: receiving a login request sent by an initiating terminal; searching, among binding relationships between initiating terminal identifiers, authentication terminal identifiers, and registered biological characteristic information according to the first terminal's identifier, a matching target binding relationship; when found, sending an authentication request to an authentication terminal corresponding to an authentication terminal identifier; receiving biological characteristic information that is sent by the authentication terminal, and determining, through comparison, whether the biological characteristic information is consistent with registered biological characteristic information included in the target binding relationship; and if so, authenticating the login request.. .
Tencent Technology (shenzhen) Company Limited


 Electronic device, server, and  authenticating biometric information patent thumbnailElectronic device, server, and authenticating biometric information
An electronic device is provided. The electronic device includes a communication circuit configured to communicate with a user terminal and an authentication server, a memory configured to store a plurality of one time password (otp) generation modules and a plurality of module identification information respectively corresponding to the plurality of otp generation modules, and a processor electrically connected with the communication circuit and the memory.
Samsung Electronics Co., Ltd.


 System and  providing wearable authentication and management patent thumbnailSystem and providing wearable authentication and management
A system for wearable authentication and management is disclosed. In particular, the system may include identifying and authenticating a user through biometric data or movement signatures specific to the wearer of a wearable device.
At&t Mobility Ii Llc


 Authenticating activities of accounts patent thumbnailAuthenticating activities of accounts
A system, a medium, and a method involve a communication interface of a server device that receives first activity data associated with a first activity of an account and second activity data associated with a second activity of the account. A processor of the server device determines a first location of the first activity from the first activity data and a second location of the second activity from the second activity data.
Paypal, Inc.


Temporary control of components using location based grants

A device, system, and method gives temporary control of a user device using location based grants. The method performed by a control server of a third party is performed when the user device is in a predetermined area.
Avaya Inc.

Activation of mobile devices in enterprise mobile management

The present disclosure is drawn to systems and methods for activating a mobile device in an enterprise mobile management context. The mobile device is configured to generate a first device security certificate which comprises a device key and an identifier of the mobile device.
Huawei Technologies Co., Ltd

System for management of a monitor apparatus monitoring a device in a customer environment

To install a monitor apparatus module, a monitor apparatus transmits a registration request including a client id and an initial authentication key included in an installer to a management apparatus. When an authentication key related to the client id included in the registration request is yet to be issued, the management apparatus issues an authentication key and provides the same to the monitor apparatus.
Canon Kabushiki Kaisha

Computer-implemented mobile authentication and corresponding computer system

In one embodiment of the present invention a computerized method includes receiving at a personal-mobile device a first communication, which includes information for requesting user verification for logging into an account of a user, via a computing device. The account is with a service provided by an application server.
Sap Se

Distributed authorization

Systems and methods for distributed authorization are described. In some embodiments, an information handling system (ihs) may include a processor; and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the ihs to: receive a first authentication material from a first device; identify, based upon a policy stored in the ihs, a second device; and distribute a second authentication material to the second device..
Dell Products, L.p.

Cloud-based authentication keyboard

Aspects of the subject disclosure may include, for example a method that includes detecting, by a system comprising a processor, a password creation request, obtaining, by the system, an identification of a password requesting application associated with the password creation request, receiving, by the system, an input password, obtaining, by the system, a transformation key for the input password, transforming, by the system, the input password into an adjusted password by applying the transformation key to the input password, and providing, by the system, the adjusted password to the password requesting application. Other embodiments are disclosed..
At&t Intellectual Property I, Lp

Smartphone fraud-proof authorization and authentication for secure interactions

Mobile devices and other devices used in transactions or interactions with other computer systems can be identified by an abstract composite of information unique to the device. For example, the device can record and store when a user first started the device (a date and time of first use), how the device is configured (including any hardware/software identifications, versions, install dates, time when configurations or installations occurred, etc.), etc.
Avaya Inc.

Tokenization of co-network accounts

The present disclosure relates generally to tokenization of a co-network account. A co-network account, as used herein, refers to an account associated with a first transaction processing network for processing transactions initiated using the account and a second transaction processing network for processing transactions initiated using the account.

Systems and methods for authenticating applications to on-board services

Techniques for authenticating client applications to services and/or applications that are provided within an environment that may become disconnected, as a whole, from other networks (e.g., on-board a vehicle) may include receiving an indication of a local service that may be provided within the dis-connectable environment, and authenticating/registering the local service. A request for service(s) may be received from a client application within the dis-connectable environment, and the client application may be authenticated/authorized to access one or more local services.
Gogo Llc

Network connection automation

A computing resource service provider receives a request from a customer to establish a physical connection between a provider network device and a customer network device in a colocation center. Once the connection has been established, the customer may transmit cryptographic authentication information, through the physical connection, to the provider network device.
Amazon Technologies, Inc.

Systems and methods for on-board access control

Techniques for providing access control in environments that may become disconnected, as a whole, from other networks (e.g., on-board a vehicle) may include locally storing access control information within the dis-connectable environment, and locally providing discovery and authentication/authorization services. Local services and/or applications may be registered and authenticated and client applications may be authenticated and/or authorized to one or more locally provided services and/or applications even when the environment is in a disconnected state.
Gogo Llc

Apparatus and processing authentication information

Provided is an information processing apparatus including a physical unclonable function (puf) to generate a unique key using a process variation in a semiconductor manufacturing process, and an encryption unit to encrypt a password and/or bio-information received from a user using the unique key.. .
Ictk Co., Ltd.

Method, hardware and digital certificate for authentication of connected devices

A method of generating a shortcut certificate for authenticating a user digital certificate generated by an issuing certification authority; the method comprising: authenticating the digital certificate of the issuing certification authority; creating the shortcut certificate for the digital certificate of the issuing certification authority when the digital certificate of the issuing certification authority is authenticated; wherein the shortcut certificate comprises a signed entry of an authentication of the issuing certification authority.. .
Arm Ip Limited

Communication device and packet transmission/reception program

A communication device includes, a plurality of authentication generation processing units, which are respectively associated with different sequence number groups each including successive sequence numbers and which execute, in parallel, authentication generation processes for generating authentication information included in the packets based on sequence numbers allocated to the packets, a transmitting unit which transmits packets including the allocated sequence numbers to another communication device in an order in which authentication generation processes by the plurality of authentication generation processing units are completed, a receiving unit which receives a packet from the other communication device, and an authentication processing unit which executes a first authentication process in which the reception packet is authenticated based on a relationship between a sequence number of the reception packet and a sequence number of a preceding reception packet.. .
Fujitsu Limited

System and mobile cross-authentication

The present invention relates to a system and a method for mobile cross-authentication comprising: generating an online authentication code (ocode) and a mobile authentication code (mcode) from an authentication server when performing online authentication, providing the online authentication code (ocode) and the mobile authentication code (mcode) to a computer terminal and a mobile terminal of the user respectively, receiving and verifying the online authentication code and the mobile authentication code received by the computer terminal and the mobile terminal to the authentication server through the mobile terminal and the computer terminal respectively.. .

Digital loss/accident defense system, method, and program

Provided are a digital loss/accident defense system and method, and a program capable of preventing an act of theft and the like in advance by monitoring behavior of a suspicious person in real time in a surveillance target area such as a back facility. The digital loss/accident defense system (1000) comprises mobile terminal devices (30) a plurality of employees respectively carry with them throughout a surveillance target area such as a back facility, a face authentication function unit (111) that collates a face image of a person shot by a monitoring camera (11) with a face image of a suspicious person accumulated in a face information db 160, and a control unit (110) that, in the case of a non-match with an authenticated person's face image or a match with a suspicious person's face image, transmits information regarding the suspicious person to a mobile terminal device (30) closest to the suspicious person based on acquired positional information of the mobile terminal devices (30)..
Technomirai Co., Ltd.

Digital doorlock system

Provided is a digital doorlock system including a doorlock configured to transmit an ibeacon signal and reduce a period of bluetooth connection when recognizing proximity of a user terminal and a touch or a press on a keypad, wherein the doorlock is wirelessly connected to the user terminal so that an opening/closing operation of the doorlock is controlled, a user application installed in the user terminal and configured to enter a state of being capable of controlling the doorlock upon receiving the ibeacon signal and control the opening/closing operation of the doorlock when wirelessly connected to the doorlock via the user terminal, and a management server configured to provide a password for controlling the opening/closing operation of the doorlock to the user application through user authentication.. .
Chahoo Co., Ltd.

Authentication method and system to verify the authenticity of a product

authentication method to verify the authenticity of products, including associating to each product an electronic identification device having a unique identification code, selecting at least one piece of product information suitable to describe the product, associating to each identification code at least one respective and unique encryption key, encrypting the identification code and the product information, storing the encrypted content in the memory of the electronic identification device, obtaining the identification code and the encrypted content from the electronic identification device, decrypting the encrypted identification code using the encryption key corresponding to the obtained identification code, in case of correspondence between the decrypted identification code and the obtained identification code, decrypting the encrypted product information using the encryption key.. .
1trueid S.r.l.

Apparatus that operates with unit mounted therein and the unit

An apparatus that operates with a detachable unit mounted therein, includes: a storage unit configured to store a public key; and a verification unit configured to verify data held by the mounted unit, based on the public key. The data includes attribute information indicating an attribute of the unit, and authentication information generated from target information including the attribute information with a secret key paired with the public key and from which the target information is restorable, and the verification unit is further configured to detect an anomaly in the attribute information or the authentication information included in the data, by determining whether the attribute information included in the target information restored from the authentication information using the public key matches the attribute information included in the data..
Canon Kabushiki Kaisha

User authentication device, input sensing module for the same, and authenticating user

An electronic device including an input sensing module including a sensing surface to which a palm is input, the sensing surface having a three-dimensional shape, and a control module comparing user palm information with input palm information sensed by the input sensing module to output an authentication signal when a number of data points of the user palm information consistent with the stored input palm information is equal to or greater than a predetermined number.. .
Samsung Display Co., Ltd.

Security through authentication tokens

A computing device (100, 245, 300, 340) arranged for generating an authentication token (at) being a data structure to be used for authenticating a first computing device (100, 340) to a second computing device (100, 340), wherein the computing device (100, 245, 300, 340) is configured to: generate at least one index; retrieve a portion of a data set (mts), the portion being a portion of the data set starting at a position in the data set given by the index; and include the portion in the authentication token (at).. .
Kelisec Ab

Parallelized authentication encoding

A processing system implementing techniques for parallelized authentication encoding is provided. In one embodiment, the processing system includes an accumulator, a register representing a pipeline stage and a processing core coupled to the accumulator and to the register.
Intel Corporation

Methods and systems for secure and reliable identity-based computing

The embodiments herein provide a secure computing resource set identification, evaluation, and management arrangement, employing in various embodiments some or all of the following highly reliable identity related means to establish, register, publish and securely employ user computing arrangement resources in satisfaction of user set target contextual purposes. Systems and methods may include, as applicable, software and hardware implementations for identity firewalls; awareness managers; contextual purpose firewall frameworks for situationally germane resource usage related security, provisioning, isolation, constraining, and operational management; liveness biometric, and assiduous environmental, evaluation and authentication techniques; repute systems and methods assertion and fact ecosphere; standardized and interoperable contextual purpose related expression systems and methods; purpose related computing arrangement resource and related information management systems and methods, including situational contextual identity management systems and methods; and/or the like..
Advanced Elemental Technologies, Inc.

Authentication method and electronic device using the same

An electronic device and an operating method thereof are provided. The electronic device includes a first processor, a second processor, a display, and a first sensor.
Samsung Electronics Co., Ltd.

Material dispenser and notification system

A system for medicine dosage compliance may comprise a dispensing component that provides for medicine to be dispensed based at least upon authorized identification of a user and a secondary authorizer. The dispensing component may comprise an identity authentication component that automatically authenticates an identity of the user and the secondary authorizer at the time of a dispensing event.
Firstenergy Ventures Corp.

Non-volatile memory for secure storage of authentication data

A first non-volatile memory may store first data and a second non-volatile memory may store second data. An authentication component may be coupled with the first non-volatile memory and the second non-volatile memory and may receive a request to perform an authentication operation.
Cryptography Research, Inc.

Method for updating a firmware component and device of measurement and control technology

The present disclosure relates to a method for updating a firmware component of a measurement and control technology device. The method includes: a segment-by-segment reception of a first firmware image; an authentication of the first firmware image based upon a first encryption method; a creation of a second authentication datum for the first firmware image via an algorithm that differs from the first encryption method; a re-transmission of the data used for updating the firmware component as a second firmware image; an authentication of the second-firmware image based upon the second authentication datum; and in the case of a successful authentication of the second firmware image, enabling and execution of the firmware program code..
Endress+hauser Conducta Gmbh+co. Kg

Biometric state switching

Embodiments of the invention provide for biometric state switching. In one embodiment, a biometric state switching method includes storing in a database different fingerprints, each in connection with a different state of a corresponding application.
Sugarcrm Inc.

Biometric shortcuts

Embodiments of the present invention provide a method, system and computer program product for biometric shortcuts. In an embodiment of the invention, a biometric shortcut method includes storing in a database a multiplicity of different fingerprints, each in connection with a different command for a corresponding application and optionally acquired by way of a fingerprint scanner affixed to a computing device.
Sugarcrm Inc.

Firearm with user authentication to remove or add components

A method authenticates a user before the user can remove or attach a component to a firearm. When the user is authenticated, the user can remove or attach a component to the firearm.

Smart entry system

A smart entry system that releases a lock of an opening/closing body includes: a transmission unit that transmits a call signal to a mobile key by wireless communication; a reception unit that receives a response signal from the mobile key responding to the call signal; and a control unit that outputs a call signal transmission command to the transmission unit, performs authentication of the response signal when the reception unit receives the response signal, and outputs a command for unlocking the opening/closing body based on a result of the authentication. The call signal is transmitted by a polling system.
Denso Corporation

Method of marking cellulosic products

Methods for marking cellulosic products, including cellulosic fibers such as lyocell and cellulosic films, including methods for marking such products with a detectable nucleic acid marker to identify and validate the origin or authenticity of the products or items manufactured using such products. Detectably-marked cellulosic products marked with nucleic acid markers for authentication, validation and tracking are also provided..
Apdn (b.v.i.) Inc.

System and geo-location-based mobile user authentication

A system and method is provided for geo-location-based user authentication and data access control. An exemplary method includes receiving a request from a mobile device to access a user account and user data where the request includes current geo-location data that indicates a current geographical location of the mobile device/ an authentication server then determines whether the current geo-location data is within at least one geo zone that indicates approved geographical areas where the mobile device can access the user account and data.
Acronis International Gmbh

Cellular device authentication

When manufacturing, distributing, or selling mobile phones, each phone is associated with an asymmetric cryptographic key pair, comprising a public key and a private key. The private key is stored on the phone, and the public key is stored in a public key repository.
T-mobile Usa, Inc.

System, methods and devices for secure data storage with wireless authentication

A secure data storage device with wireless authentication is provided. The described data storage device is wirelessly unlocked using another wireless device.
Green Tree Labs Inc.

Lte-level security for neutral host lte

Various features pertain to the authentication of mobile devices or other user equipment. In some aspects, a retail-based neutral host lte is provided for use with long term evolution (lte) networks that, among other features, provides a wifi alliance hotspot 2.0 (hs2.0) user experience using lte technology for non-mobile network operator (non-mno) service providers (sps), while maintaining high security assurances as with lte.
Qualcomm Incorporated

Bluetooth voice pairing apparatus and method

A method and apparatus for authenticating a wireless connection between a first device and a second device. In a first aspect, the first device generates a changing passkey code and converts the passkey code to an audio file that is played through a speaker of the first device as an audible signal.
Intel Ip Corporation

Communication method and apparatus using network slice

A communication method and apparatus using a network slice. A method of performing communication on a control plane of a network system including an access network and a core network may receive an attach request from a user equipment, may perform a mutual authentication with the user equipment in response to the attach request, may retrieve a subscription profile for the user equipment in response to the attach request, when the mutual authentication is completed, and may determine a network slice for the user equipment based on the subscription profile..
Electronics And Telecommunications Research Institute

Communication device

A communication device may perform a predetermined communication using a first type communication link via a wireless interface with the target device being a first type device, determine, by using attribute information, which of the first type device or a second type device the target device is, execute an authentication of the target device being the second type device, disconnect the second type communication link without executing an authentication of the target device in a case where it is determined that the target device is the first type device, and perform the predetermined communication using the first type communication link via the wireless interface with the target device being the first type device in a case where the first type communication link is established between the communication device and the target device being the first type device after the second type communication link has been disconnected.. .
Brother Kogyo Kabushiki Kaisha

Communication device

A communication device may receive a first signal including first identification information and attribute information from a target device via the wireless interface, determine which of a first type device or a second type device the target device is by using the attribute information, execute an authentication of the target device by using the first identification information in a case where it is determined that the target device is the first type device, and execute an authentication of the target device by using the second identification information in a case where it is determined that the target device is the second type device and a second signal including second identification information different from the first identification information is received via the wireless interface, the second signal is sent to the communication device from the second type device in accordance with a predetermined application software.. .
Brother Kogyo Kabushiki Kaisha

Communication device

A communication device may receive any one signal among two or more types of signals from a target device, receive format information from the target device, receive a specific signal including information described in the predetermined format from the target device in a case where the format information indicates that the target device supports the predetermined format, determine whether or not related information related to a predetermined application software is included in the specific signal, and execute an authentication of the target device by using first identification information included in the specific signal in a case where it is determined that the related information is included in the specific signal, wherein the authentication of the target device by using information included in the specific signal is not executed in a case where it is determined that the related information is not included in the specific signal.. .
Brother Kogyo Kabushiki Kaisha

Facilitating authentication of a void pantograph

Examples herein disclose receiving and identifier associated with a first void pantograph and identifying a second void pantograph based on the received identifier. The examples facilitate authentication of the first void pantograph by making available the second void pantograph..

Device locator disable authentication

A device locator mode or find my device (fmd) mode can allow a lost, stolen, or misplaced mobile device to be located. The fmd mode can be enabled or disabled on a mobile device.
Apple Inc.

Mediation server registering identification information for first communication apparatus and performing mediation communication between service provider server and second communication apparatus

The mediation server registers identification information and authentication information to be associated with each other when a registration request is received from a first communication apparatus. The authentication information is for the first communication apparatus to be authenticated for using a first utilization target.
Brother Kogyo Kabushiki Kaisha

Mediation server mediating communication between service provider server and first and second communication apparatuses

In a mediation server a processor registers association information and the authentication information for receiving a service from a service provider server to be correlated with each other. The association information is concerned with first and second communication apparatuses.
Brother Kogyo Kabushiki Kaisha

Remote system monitor

Aspects described herein pertain to monitoring and automatic re-instantiation of a communication session using a monitoring system and/or device and one or more remote systems and/or devices. If a disruption in a communication session occurs, an automated reconnect agent executable can execute on one or more of the remote systems and/or devices to automatically re-instantiate the communication session without or absent requiring human intervention.
Experian Health, Inc.

Request authentication from message content

In example embodiments, a system and method performs authentication and confirmation of requests within a control server system. Accordingly, a first message is received from a first device, the control server system responds to the request by providing a first code to the first device and the control server system maps the first code to a first identifier of the first user.
Zeta (better World Technology Pvt. Ltd.)

Personalized inferred authentication for virtual assistance

Aspects of the technology described herein provide a mechanism for controlling access to secure computing resources based on inferred user authentication. A current user may be authenticated and access to secure computing resources permitted based on a determined probability that the current user is a legitimate user associated with the secure computing resource.
Microsoft Technology Licensing, Llc

Remotely controlling access to a computing device

Embodiments include devices and methods for remotely controlling access to a first computing device. A processor of the first computing device may receive an access request input, and may capture authentication information from the user in response to the access request input.
Qualcomm Incorporated

Broadcast-based trust establishment

A method and apparatus for device authentication are provided. In the method and apparatus, authentication data for a first device is received.
Amazon Technologies, Inc.

Secure archival and recovery of multifactor authentication templates

Systems, apparatuses and methods may provide for generating, at a computing device, a challenge message in response to a recovery request and conducting a verification of one or more responses to the challenge message based on an encryption key stored in a hardware-based trusted execution environment (tee) of the computing device. Additionally, an authentication template associated with a multifactor authentication service may be unlocked if the verification is successful..
Intel Corporation

Negotiating trust degradation for a central entity by peers lacking direct communication with one another

Systems, apparatuses and methods may provide for generating, in response to a decrease in trustworthiness with respect to a controller, a notification message and generating a message authentication code (mac) based on the notification message and one or more locally stored keys. Additionally, the notification message and the mac may be sent to the controller, wherein the notification message is directed to one or more peers in a network associated with the controller.

Securing remote authentication

Authenticating a secure session between a first user entity and an identity provider using a second user entity. The method receiving a request for a session from an entity that purports to be the first user entity.
Microsoft Technology Licensing, Llc

Systems and methods for mutual authentication of electronic devices

Embodiments are provided for mutually authenticating a pair of electronic devices. According to certain aspects, the electronic devices may connect to each other via an out-of-band communication channel.
Google Inc.

System and access authentication

A method for access authentication includes receiving a facial recognition picture from a mobile electronic apparatus of a user. The facial recognition picture is compared to a stored facial recognition picture of the user.
Utc Fire & Security Corporation

Authentication method with enhanced security based on eye recognition and authentication system thereof

An authentication method and system with an enhanced security based on eye recognition includes registering eye information extracted from an input image through a pre-registration process; receiving an eye recognition request; verifying whether a web login request associated with login information that is mapped to the eye information is present in response to receiving an eye recognition request; and performing an eye recognition in response to the web login request associated with the login information being verified to be present.. .
Nhn Entertainment Corporation

Methods and systems for authenticating users

A method of authenticating users is provided that includes storing data in a buffer. The data is within a temporal window and includes biometric data extracted from frames included in a video and quality feature values calculated for each frame.

Methods and establishing a secure communication channel

A method for establishing a secure communication channel between an off-card entity and an embedded universal integrated circuit card (euicc) is provided. The method involves establishing symmetric keys that are ephemeral in scope.
Apple Inc.

System and integrating a transactional middleware platform with a centralized access manager for single sign-on in an enterprise-level computing environment

In accordance with an embodiment, described is a system and method for integrating a transactional middleware platform with a centralized access manager to provide single sign-on authentication in an enterprise-level computing environment. The enterprise-level computing environment can include the transactional middleware platform and one or more soa middleware platforms.
Oracle International Corporation

Server authentication using multiple authentication chains

A client seeking to establish a cryptographically-secure channel to a server has an associated public key acceptance policy. The policy specifies a required number of certificates that must be associated with the server's public key, as well as one or more conditions associated with those certificates, that must be met before the client “accepts” the server's public key.
International Business Machines Corporation

Bootstrapping authentication of second application via confirmation by first application

Disclosed are various embodiments that facilitate bootstrap authentication of a second application by way of a user confirmation via a first application. The first application is authenticated using trusted credentials.
Amazon Technologies, Inc.

Methods and assessing authentication risk and implementing single sign on (sso) using a distributed consensus database

In some embodiments, a method includes receiving, from a client compute device and at a server, a request to access a resource. The request can include an identifier associated with the client compute device.
Ping Identity Corporation

Authentication identity management for mobile device applications

An identity authenticator receives a first authentication credential from a first application at a first computing device. The identity authenticator then determines that the first authentication credential is associated with a second authentication credential for the first application at a second computing device based on a stored authentication identity.
Electronic Arts Inc.

Private simultaneous authentication of equals

A passphrase is assigned to an end user device for use in authenticating the end user device for a network using sae. An identification of the end user device is determined during an authentication process.
Aerohive Networks, Inc.

Apparatus and authentication based on cognitive information

An authentication apparatus and method based on cognitive information. The authentication apparatus based on cognitive information includes an authentication request reception unit for receiving a request to authenticate an authentication target, a behavioral and contextual information collection unit for collecting behavioral and contextual information corresponding to the authentication target, a cognitive information extraction unit for extracting cognitive information corresponding to the request from previously stored big data, and an authentication processing unit for authenticating the authentication target in consideration of the behavioral and contextual information based on the extracted cognitive information..
Electronics And Telecommunications Research Institute

Associating user accounts with enterprise workspaces

Various examples relate to the configuration of enterprise workspaces that can be provided in computing devices. In some examples, a computing device is enrolled with a management service that controls operation of at least a portion of the computing device.
Airwatch Llc

Smart data cards that enable the performance of various functions upon activation/authentication by a user's fingerprint, oncard pin number entry, and/or by facial recognition of the user, or by facial recognition of a user alone, including an automated changing security number that is displayed on a screen on a card's surface following an authenticated biometric match

A smart card such as an emv card that connects, wirelessly or by contact, to a reader or other device, and permits the flow of information/data to/from the card when connected thereto, after fingerprint scanning authorization/user verification system; or image scanning authorization/user verification, or pin number entry from an on-card pad, or both, including a display screen for displaying changing/static user identification data stored thereon/therein alter such authorization/verification.. .

Computer system authentication using security indicator

A method to authenticate an application on a first computer system at a second computer system is disclosed. The first computer system receives an authentication bitmap from a second computer system identifying locations in an application.
Ebay Inc.

Operator authentication for a work machine

A mobile device receives a shared access key corresponding to a work machine. An access code is generated from the shared access key, and from a changing value (such as a time-sensitive value).
Deere & Company

Systems and methods for authenticating user for secure data access using multi-party authentication system

A method for authenticating a user for accessing secure data from a first data provider is provided. The method is implemented by an authentication system of a second data provider.
Mastercard International Incorporated

Presence-based network authentication

Systems and methods are provided to authenticating an electronic device with a wireless network using a presence-based authentication process. As part of the presence-based authentication process, an authentication entity may receive a registration message from an electronic device.
Gogo Llc

System and securing authentication information in a networked environment

This disclosure is directed to systems and methods for securely communicating authentication information in a networked environment such as one involving a client device, a cloud based computing platform, and an enterprise computing environment. Some embodiments may include encrypting, by a client device using a public key, authentication information provided by a user.
Sailpoint Technologies, Inc.

Systems and methods for device to device authentication

A method for authenticating a user device by an authentication computing device is provided. The method includes generating, using the authentication computing device, a locked data file for use in authenticating a user device enrolled in an authentication service, the locked data file is configured to process a challenge and generate a challenge response.
Mastercard International Incorporated

Image processing apparatus and control method thereof

An image processing apparatus is provided. The image processing apparatus includes a storage configured to store an operating system (os) of the image processing apparatus, a script file including a program code and a first electronic signature, and an interpreter program provided to execute the program code on the os; and at least one processor configured to perform an authentication of the first electronic signature with the os in response to the interpreter program executing the program code on the os, and selectively permit or block the execution of the program code according to whether the first electronic signature passes or fails to pass the authentication..
Samsung Electronics Co., Ltd.

Technologies for secure inter-enclave communications

Technologies for secure inter-enclave communication include a computing device having a processor with secure enclave support. The computing device establishes a first secure enclave and a second secure enclave with the secure enclave support of the processor.

Network authentication of multiple profile accesses from a single remote device

A network authentication system and method is described for authenticating multiple profile accesses from a single remote device. A device remote from a web server, yet connected to the web server via, for example, the internet, can allow multiple users to register their profiles within the device.
Cullen/frost Bankers, Inc.

Activating mobile terminal token method

A method for activating a mobile terminal token, comprising: a cloud authentication server generates a seed generation factor according to an activation request, and acquires a server seed secret key and saves the same according to the seed generation factor, and generates an activation code according to the seed generation factor, and generates an activation verification code and transmits the same to a mobile terminal, and encrypts the activation code using the activation verification code to acquire an encrypted activation code, and a cloud authentication management platform generates a two-dimensional code image according to the received encrypted activation code and transmits the same to a client for displaying, and the mobile terminal token acquires the encrypted activation code according to the acquired two-dimensional code image, and decrypts the encrypted activation code using the acquired activation verification code to obtain an activation code, and acquires the seed generation factor from the activation code, and acquires a token seed secret key according to the seed generation factor and saves the same. The present invention can activate the token when the mobile terminal is without network, ensuring the accuracy of the seed, thus improving the token security..
Feitian Technologies Co., Ltd.

Secure object access

A method of a security system to provide access by a requester to an encrypted data object stored in an object store, the requester being authenticated by the object store, the method comprising: receiving, from the object store: the encrypted object having associated an object identifier; and an identifier of the requester; deriving a first cryptographic key to decrypt the object; deriving a second cryptographic key; re-encrypting the object based on the second key and communicating the re-encrypted object to the requester; wherein each of the first and second keys are based on the object identifier, the requester identifier and a secret key portion generated by the security system, the secret key portion being different for each of the first and second keys, the method further comprising: in response to a second authentication of the requester by the security system, communicating the secret key portion for the second key to the requester.. .
British Telecommunications Public Limited Company

Sight-to-speech product authentication

An apparatus comprises: a memory; and a processor coupled to the memory and configured to: receive a spoken phrase associated with a printed phrase from a tamper-evident component of a product; obtain a notification associated with authentication of the product based on the spoken phrase; and provide the notification in a visual manner, in an audio manner, or a combined audio and visual manner. A method comprises: creating a tamper-evident component comprising an obscuring mechanism and a printed phrase, wherein the obscuring mechanism obscures the printed phrase from view; providing the tamper-evident component for integration into a product; receiving a spoken phrase from a first consumer; analyzing the spoken phrase; generating a notification associated with authentication of the product based on the analyzing; and transmitting the notification to the first consumer..
Authentix, Inc.

Entry control system

An integrated security system which seamlessly assimilates with current generation logical security systems. The integrated security system incorporates a security controller having standard network interface capabilities including wee 802.x and takes advantage of the convenience and security offered by smart cards and related devices for both physical and logical security purposes.
Assa Abloy Ab

Systems and methods for authentication

Systems and methods for authentication are provided. One system includes a device configured to sense electrical characteristics of an item coupled with a person and a memory storing a plurality of electrical signatures corresponding to measured electrical characteristics for a plurality of items.
Intermec, Inc.

Method and authentication system for registering a random security feature

The invention relates to a method and an authentication system for registering a random security feature (8) of a product (5) in a database (10) on the basis of a reproducible identification feature (6) of the product (5), wherein the security feature (8) is being linked to the identification feature (6), and said random security feature (8) is being registered on the condition that a preliminary authentication check (15) of the product (5) is positive, such that any subsequent definitive authentication checks of the product (5) may use the registered security feature.. .
Authentic Vision Gmbh

Systems and methods for secure authentication of transactions initiated at a client device

A method for authenticating a cardholder for a candidate purchase using an authentication computing device in communication with a memory is provided. The method includes receiving an authentication profile associated with the cardholder during an enrollment process for an authentication service, storing the authentication profile within the memory, and receiving an authentication request for the candidate purchase over a first communication link.
Mastercard International Incorporated

Methods, systems and products for authentication

Multiple authentication procedures enhance security of internet transactions. For example, a request is received from a customer to access a service.
At&t Intellectual Property I, L.p.

Mutual authentication of a user and service provider

The present invention relates to a method and system for mutual authentication of a user and service provider, said method comprising acts of: authenticating an event by a key generation module (kgm), said event is generated on a computing device by a user, sending a shared secret of registered user for the event by an authentication server to the key generation module (kgm), generating one time key by the kgm for the event, transmitting the one time key by appending the shared secret to registered user mobile device, and performing at least one of: authenticating the user for said event by the kgm when a registered user enters the one-time key on the computing device within a predetermined time period, or terminating the event upon receipt of predefined key sequence from the mobile device.. .
Kachyng, Inc.

Cross-channel security authentication

Various embodiments each include at least one of systems, devices, methods, and software for cross-channel security authentication, such as with regard to providing of payment card (e.g., credit and debit card) data for payment within a transaction. One such embodiment, in the form of a method includes receiving, by a payment account app on a mobile device, a payment authorization request and subsequently receiving approval or denial input within the payment account app following receipt of valid payment account authentication input.
Ncr Corporation

Method and system of authentication of electronic payments

In one aspect, a computerized system for authentication of an electronic payment on a computing device, the system includes a computer memory in the computing device a payment page. The payment page includes at least one element, from the financial institution in response to the initiation.

Location based authentication

A portable consumer device that is used to conduct a transaction at a merchant is authenticated. Information provided to a server computer includes locations of a merchant and a mobile communication device possessed by a consumer.

Contactless smart-card reader with security and hybrid multi-core parallel verifying process

A contactless smart-card reader with security and hybrid multi-core parallel verifying process is provided. The reader obtains a card number via an antenna and a card-recognizing unit.
Baoruh Electronic Co., Ltd.

Automated financial transactions

Arrangements relate to processing financial transactions on an automated teller machine (atm). An atm identifier can be presented on a display of the atm.
International Business Machines Corporation

Systems and methods for authentication based on human teeth pattern

An automated system and method to authenticate one or more users based on capturing one or more images of a set of teeth, obtaining a selected image from the one or more captured images and extracting a portion of the selected image to obtain an extracted image. Each extracted image is converted into a grayscale image and stored in a database along with the username and the user keyword of the one or more users.
Tata Consultancy Services Limited

System and identity proofing and knowledge based authentication

Illustrative methods, processes, and software remotely prove the identity of individuals fully compliant with identity proofing policies. The embodiments receive a request to verify an identity from an applicant device.
Michigan Health Information Network - Mihin

Storing identification data as virtual personally identifiable information

The present disclosure describes methods and systems for storing virtual personal identifiable information. In some implementations, the information is collected during the authentication of identification (id) documents.
Confirm, Inc.

Sensor for increasing security using biometric data, mobile device including the same, and authentication the mobile device

A sensor for increasing security using biometric data, a mobile device including the same, and an authentication method of the mobile device are provided. The sensor includes a fingerprint sensor configured to detect fingerprint data of a user contacting a fingerprint acquisition region, a plurality of electrodes, and a bio sensor connected to the electrodes to detect at least one type of biometric data.
Samsung Electronics Co., Ltd.

Device and biometrics authentication

A biometrics authentication apparatus and a biometrics authentication method are disclosed. The biometrics authentication apparatus includes: a light source configured to emit a light; a modulator configured to change a spatial distribution of the light that is scattered and reflected from a region of interest of a user; a detector configured to detect an integral power of the light that is scattered from the region of interest; and a processor configured to obtain a measurement signal based on the integral power of the light, compare the measurement signal with a reference signal stored in a memory, and determine whether to authenticate the user based on a degree of match between the measurement signal and the reference signal..
Samsung Electronics Co., Ltd.

Product authentication using barcode characteristics

An apparatus comprising: a memory; and a processor coupled to the memory and configured to: obtain an image of a barcode from a product, wherein the barcode comprises a signature; obtain a notification associated with authentication of the product based on the signature; and provide the notification as an audio, a video, or a combination of audio and video. A method comprising: obtaining a smart device; coupling a scanner system to the smart device; obtaining a product comprising a barcode; scanning, using the scanner system, the barcode to obtain an image of the barcode, wherein the barcode comprises a signature; and obtaining, using the smart device and based on the signature, a notification associated with authentication of the product..
Authentix, Inc.

Methods and systems for user authentication in a computer system using multi-component log-ins, including image-based log-ins

In computer-based user authentication, a user may establish or enhance security for a component of a multi-component password by performing a security operation on a selected component of the password. The security operation may comprise encrypting the selected component.

Tpm 2.0 platform hierarchy authentication after uefi post

A method of accessing a trusted platform module in a computing device is disclosed. The method includes storing a platform authorization key in a memory of the computing device that includes the trusted platform module.
Lenovo Enterprise Solutions (singapore) Pte. Ltd.

Systems and methods for analyzing, assessing and controlling trust and authentication in applications and devices

Systems and methods for receiving a request to analyze trust of a client system and perform actions based on a client trust profile. A trust rating server device receives a request from a client computing device to analyze the trust on the device.
The Privacy Factor, Llc

Biometrics for user identification in mobile health systems

A wearable device may include a sensor system capable of obtaining physiological from a user's body. Some wearable devices may include a substance delivery system.
Qualcomm Incorporated

Biometric authentication

In an example biometric authentication system, a light beam generator may be configured to generate a light beam. The light beam may be projected to a retina of a user's eye and reflected from the retina.
Empire Technology Development Llc

Systems and methods for paired device authentication

A pair of remote computing devices for authenticating a user of one of the pair of remote computing devices is provided. The pair of remote computing devices includes a first computing device and a second computing device.
Mastercard International Incorporated

Wearable device, system including the same, and operation methods thereof

A wearable device may include: an authentication unit suitable for authenticating a user by verifying user identification information of the user; a sensor suitable for detecting contact between the authenticated user and the wearable device; a wireless communication unit suitable for wirelessly provide link success information to an electronic device requiring user authentication; and a control unit suitable for controlling the wireless communication unit to provide the link success information to the electronic device during the contact after success of the authentication of the authentication unit.. .
Sk Hynix Inc.

Identity risk score generation and implementation

Embodiments are directed to providing an identity risk score as part of an authentication assertion, applying operating heuristics to determine an operating application's validity and to providing identity risk scores to requesting third parties. In one scenario, an authentication server receives from a cloud service portal various user credentials from a user.
Microsoft Technology Licensing, Llc.

Authentication

Robotic customer service agents are provided such that, when properly authenticated, they are operable to perform a customer service task. A contact center may dispatch a robot, an accessory for a customer-owned robot, or instructions to transform an unconfigured robot, such as a generic robot, into a configured robot operable to perform the task.
Avaya Inc.

Authentication system and method

An object of the present invention is to provide an authentication system and method which can reduce a burden on a user while ensuring security by using a combination of a plurality of authentication methods. A method for authentication of the present invention comprises the steps of: obtaining a first authentication performance value for each transaction based on initial input information at a transaction; determining whether or not additional authentication is required for authentication of a person by comparing the first authentication performance value and the authentication performance threshold value required for authentication of a person; presenting, if the additional authentication is required, a plurality of authentication methods from which one authentication method or a combination of authentication methods can be selected so as to satisfy an additional authentication performance value obtained using the first authentication performance value and the authentication performance threshold value; and obtaining a second authentication performance value based on additional input information using the one or more authentication methods selected from the plurality of presented authentication methods, and determining whether to authenticate by comparing the additional authentication performance value and the second authentication performance value..
The University Of Tokyo

Electronic device capable of easy application creation

An electronic device includes: a central processing unit (cpu), and a storage device. The storage device includes: a first application; an add-on including: a first programming portion configured in a first programming language and a second programming portion configured in a second programming language and called by the first programming portion; and a second application using the add-on.
Kyocera Document Solutions Inc.

Information processing apparatus, control method thereof, and non-transitory computer readable medium

An information processing apparatus comprises: a communication unit which performs short-range wireless communication with an external apparatus configured to provide a predetermined function; a first determination unit which determines, based on information obtained from the external apparatus by the communication unit, whether to perform authentication processing in order to utilize the predetermined function of the external apparatus; and an authentication unit which performs the authentication processing if the first determination unit determines to perform the authentication processing.. .
Canon Kabushiki Kaisha

Method for authenticating signals received from a constellation of satellites

The positioning signals broadcast by the gnss constellations on civilian frequencies are likely to be counterfeited, while the use of authentic signals is becoming increasingly critical for certain applications. According to the invention, the authentication of gnss signals is performed by analysis of consistency between the measurements of parameters characteristic of the signals (direction of arrival, amplitude, phase) and their state model, said state model taking account of an emulation by software and electronic means of displacements of the phase centre of the antenna and/or of the main lobe of the radiation pattern.
Centre National D'etudes Spatiales

Systems and methods for estimating a geographical location of an unmapped object within a defined environment

Methods, systems, and non-transitory computer readable media are provided for rendering at an electronic terminal a first set of graphical user interfaces to request a first set of data from a user, receiving, at a central server in communication with the electronic terminal, the first set of data from the user, communicating the first set of data via a stateless edge appliance to a third party verification server in a selected one of a plurality of third party computer networks to validate the first set of data, rendering a second set of graphical user interfaces to request a second set of data from the user, communicating the second set of data to the third party verification server to authenticate the second set of data, and authenticating the user in response to receipt of authentication of the second set of data.. .
Wal-mart Stores, Inc.

Construction machine

A hydraulic excavator (1) includes a wireless authentication device (52) performing wireless authentication with a portable key device (51) and a vehicle body controller (48) for starting an engine (15) based on authentication by the wireless authentication device (52) and an operation of a start switch (12). The wireless authentication device (52) transmits a request signal within an authenticable range and performs authentication when it receives an id code for authentication replied from the portable key device (51) based on the transmitted request signal.
Hitachi Construction Machinery Tierra Co., Ltd.

On-sale vehicle sharing accessory device and system

Systems and methods disclosed herein include providing an on-sale vehicle, receiving an access request for the on-sale vehicle from a buyer, approving the access request, transmitting at least one authentication key, confirming an identity of the buyer, initiating a test drive, monitoring the test drive, and completing a transaction upon conclusion of the test drive including revoking the at least one authentication key in response to the buyer not purchasing the on-sale vehicle or revoking an authentication key of a prior titleholder in response to the buyer purchasing the on-sale vehicle.. .
Gm Global Technology Operations Llc

Construction machine

A hydraulic excavator (1) includes a wireless authentication device (42) performing wireless authentication with a portable key device (41) and a vehicle body controller (39) allowing or prohibiting start of the engine (15) on the basis of authentication by the wireless authentication device (42) and an operation of a power switch (12). The wireless authentication device (42) transmits a request signal within an authenticable range and performs authentication when it receives an id code for authentication replied from the portable key device (41) on the basis of the transmitted request signal.
Hitachi Construction Machinery Tierra Co., Ltd.

Compact pill bottle cap requiring biometric authentication for removal

A pill bottle cap provides access to authorized users using a biometric authentication feature. The pill bottle cap broadly includes: a shroud; a plurality of clamp members, each movably mounted to the shroud; a drive member interconnected with each of the clamp members to cause the clamp members to move in a first direction when the drive member is actuated in a first direction, and to cause the clamp members to move in a second direction when the drive member is actuated in a second direction; an actuator configured to actuate the drive member to selectively move in each of the first and second directions; and biometric identification module coupled to the actuator, and configured to activate the actuator to cause the selective movement upon identification of an authorized user.

Mtc service management using nfv

A method and system for machine type communication (mtc) service management using network function virtualization (nfv) is disclosed. In an embodiment, a method for a machine type communication (mtc) service management using a virtual network function (vnf) includes receiving, by a virtual serving gateway (v-s-sgw), a request for an mtc service from a mtc device through a radio node associated with the mtc device; sending, by the v-s-sgw, an authentication request to an mtc server to authenticate the mtc device; receiving, by the v-s-sgw, an authentication response from the mtc server; and establishing, by the v-s-sgw, an mtc bearer between the v-s-sgw and the radio node if the authentication is successful; wherein the v-s-sgw comprises a virtual connection management (v-cm) and a serving gateway (s-sgw)..
Huawei Technologies Co., Ltd.

Methods and sim-based authentication of non-sim devices

Methods and apparatus presented herein allow a non-sim device to access a paid wi-fi network by having a server emulate the non-sim device as a related sim-enabled device to a mobile operator. The mobile operator is led to believe that the non-sim device is the related sim-enabled device, and thereby grants authorization to the non-sim device to access the paid wi-fi network..
Google Inc.

System and mobile identity protection for online user authentication

An automated system and method for authenticating entities or individuals attempting to access a computer application, network, system or device using a wireless device is provided. The system employs one or more short-range wireless interfaces (e.g.

Secure nonscheduled video visitation system

Described are methods and systems in which the censorship and supervision tasks normally performed by secured facility personnel are augmented or automated entirely by a secure nonscheduled video visitation system. In embodiments, the secure nonscheduled video visitation system performs voice biometrics, speech recognition, non-verbal audio classification, fingerprint and other biometric authentication, image object classification, facial recognition, body joint location determination analysis, and/or optical character recognition on the video visitation data.
Global Tel *link Corporation

Mobile image forming apparatus

A service providing system includes a client apparatus that gives an instruction to provide a service according to an operation of the client apparatus by a user, a mobile apparatus that receives the instruction to provide the service, moves to the user who has performed the operation, performs authentication of the user, and provides the service to the user, and a stationary apparatus that is placed on a fixed position and provides a service. In a case where the authentication of the user fails although the mobile apparatus receives the instruction to provide the service and moves to the user who has performed the operation, the mobile apparatus stops the providing of the service and entrusts the stationary apparatus with the providing of the service..
Fuji Xerox Co., Ltd.

Image processing system, wearable computer, user authentication, and non-transitory recording medium storing computer readable program

A wearable computer includes: a first storage that permanently stores a first characteristic therein, the first characteristic representing a physical characteristic of an owner of the wearable computer; an obtaining portion that obtains a second characteristic, the second characteristic representing a physical characteristic of a user who wears the wearable computer; a determination portion that determines whether the user is the owner based on the first characteristic and the second characteristic; a first request portion that requests, when the user is determined to be the owner, to allow the user to log into another device; a second storage that temporarily stores the second characteristic therein; and a second request portion that requests, when the user is not determined to be the owner, to allow the user to log into that another device by sending the second characteristic stored in the second storage portion to that another device.. .
Konica Minolta, Inc.

Pull print system that improves security performance

Provided is a pull printing system that is capable of improving security performance over that of a typical system. When authentication based on identification information and authentication information of a person providing a transmission instruction from a user terminal is successful, a pull printing server of the pull printing system correlates a printing job from the user terminal with identification information of a person providing an execution instruction from the user terminal, and spools the printing job.
Kyocera Document Solutions Inc.

Control device for user authentication, image processing apparatus, image processing method, information processing system, and non-transitory computer readable medium storing program

A control device includes a wireless communication section, a detection section that detects a user's approach, an acquisition section that acquires authentication information and authority information regarding a user of a terminal when receiving a request from the terminal by the wireless communication section, and a control section that controls a processing section of an information processing apparatus so that a function corresponding to the acquired authority information is realized when the approach of the user of the terminal is detected by the detection section.. .
Fuji Xerox Co., Ltd.

Personal allowed number system

A system and method for preventing or facilitating communications between individuals who reside in detention environments (such as e.g., prisons or correctional facilities) and individuals who are not in such detention environments using an automated authentication or verification.. .
Intelmate Llc

System and anti-phishing authentication

A method and system for providing security against phishing attacks. The method can include receiving a login id from a client, and providing an encrypted commitment to the client.
Jpmorgan Chase Bank, N.a.

Systems and methods for using video for user and message authentication

Aspects of the disclosed technology include a method including identifying, by a computer device, a message; encoding, by the computer device, the message; receiving, by the computer device, a video of a user reciting the encoded message; and providing, by the computer device, the message and the video for verification an authenticity of the message.. .
Georgia Tech Research Corporation

Method of, and , secure online electronic communication

A method for secure electronic communication between one or more clients on one or more client computing devices. The method includes establishing a networked secure exchange server, where the networked secure exchange server comprises one or more secure electronic data exchange environments for communication between one or more clients.
Always Organised Ltd.

Authentication in a computer system

An authentication arrangement comprises a first security protocol server configured to manage authenticators for log in to a first set of hosts managed by the first security protocol server and a second security protocol server. The hosts are adapted to accept access requests based on information on authenticators.

Integrated hosted directory

Methods, systems, and devices for enterprise-wide management of disparate devices, applications, and users are described. A cloud-based central server may maintain an integrated hosted directory, which may allow user authentication, authorization, and management of information technology (it) resources across device types, operating systems, and software-as-a-service (saas) and on-premises applications.
Jumpcloud, Inc.

Bi-directional authentication between a media repository and a hosting provider

A hosting provider may be bi-directionally authenticated with one or more media repositories. The hosting provider preferably has domain name registration and hosting capabilities.
Go Daddy Operating Company, Llc

Enhancing authentication and source of proof through a dynamically updatable biometrics database

The present invention provides for biometric authentication of users using current, updatable biometric data/standards. In this regard, the present invention provides for creation of a registry of authentication information that dynamically, over time, receives biometric authentication-related information (e.g., photographs, voice samples, fingerprints, signatures and the like) from diverse devices configured to capture/sense such.
Bank Of America Corporation

Biometric metadata bureau

Biometric markers are seen as a secure and convenient way to control an individual's access to systems. The data that comprise these access controls, however, can be spoofed by nefarious third parties.
Experian Health, Inc.

Multi-factor authentication system and method

To authorize a client device to access a secure resource hosted on a web server, the present methods and systems may provide executable instructions including a challenge token to the client device, which, in turn, may cause the client device to provide executable instructions, including the challenge token, to a mobile client device via a persona area network. The executable instructions provided to the mobile client device may request the mobile client device to return a verification token.

Token device re-synchronization through a network solution

Example embodiments provide a method that includes generating, at an authentication server, a first token value. The authentication server receives a request for the first token value from a server of the site being accessed by a device of a user.
Ebay Inc.

Secure, automatic second factor user authentication using push services

A network-based multi-factor authentication approach is provided. A request to access a protected network resource and user credentials are received from a client by an application server hosting the resource.
Fortinet, Inc.

Application authentication wrapper

Disclosed are various approaches for implementing an application authentication wrapper. An authentication request, such as a kerberos request, is created for authenticating the computing device.
Airwatch Llc

Communication apparatus, reminder apparatus, and information recording medium

Provided is a communication apparatus (121) that securely manages passwords for utilizing a server apparatus. A generator (203) generates a random table having the same number of rows and the same number of columns as a password table associated with a server name specified in an authentication request received by a receiver (202).

Authentication system, reminder terminal, and information recording medium

At a reminder terminal (121), a table creator (204) creates a table having pieces of a random letter string contained in each element. A password register (205) causes the user to view the table, and prompts the user to register, in the resource server, a password that is a registration letter string obtained by arranging pieces of the letter string contained in the extracted elements from the table in accordance with the selection sequence for the user.
Passlogy, Co., Ltd.

Suppression of authorization risk feedback to mitigate risk factor manipulation in an authorization system

Dynamic risk communication associated with a computer device may include automatically detecting one or more security risk factors for the computer device based on current context information associated with the computer device. Whether an attempt is being made via the computer device to manipulate the one or more risk factors in an attempt to reduce a security level of a computer-implemented authentication procedure may be determined.
International Business Machines Corporation

Multi-link convergence method, server, client, and system

A multi-link convergence method include: receiving a first binding request sent by a client using a first link; sending a first lsid to the client using the first link; receiving a first authentication request sent by the client using the first link; performing authentication on the first link according to the first authentication request; if the first link is authenticated successfully, sending a bid to the client using the first link; receiving a second binding request sent by the client using a second link, where the second binding request carries the bid; sending a second lsid to the client using the second link; receiving a second authentication request sent the client by using the second link; performing authentication on the second link according to the second authentication request; and if the second link is authenticated successfully, sending a binding acknowledgement message to the client by using the second link.. .
Huawei Technologies Co., Ltd.

Methods and a self-organized layer-2 enterprise network architecture

In some embodiments, an apparatus includes a network node operatively coupled within a network. The network node is configured to send a first authentication message upon boot up, and receive, in response to the first authentication message, a second authentication message configured to be used to authenticate the network node.
Juniper Networks, Inc.

Systems and methods for managing encryption keys for single-sign-on applications

The disclosed computer-implemented method for managing encryption keys for single-sign-on applications may include (1) receiving, from an identity service, notification of a request to access encrypted data on a cloud service, the notification including a session key for encrypting and decrypting a master key for decrypting cloud service keys, (2) deriving the master key, (3) decrypting, using the master key, a cloud service key for decrypting data on the cloud service, (4) storing the master key, encrypted using the session key, (5) receiving an additional notification of an additional request to access encrypted data on an additional cloud service, the notification including the session key, (6) without again obtaining the authentication element from the user, decrypting the master key, and (7) decrypting, using the master key, an additional cloud service key for decrypting data on the additional cloud service. Various other methods, systems, and computer-readable media are also disclosed..
Symantec Corporation

Secure system for coupling wearable devices to computerized devices with displays

A system has a first electronic device with optical sensor, digital radio transceiver, and processor with firmware; this device is typically portable or wearable. The system also has a computerized device with a display, a second digital radio transceiver, and a second processor with firmware.
The Trustees Of Dartmouth College

Data management method, computer program for same, recording medium thereof, user client for executing data management method, and security policy server

The present invention provides a data management method, a computer program for the same, a recording medium thereof, a user client for executing the method, and a security policy server. The method is executed by a user client that is network-linked to a db server and a security policy server, the method including: 1) recognizing a user id through a user authentication; 2) detecting whether a db control application is executed; 3) determining whether the application is allowed to be used for the user id; 4) determining whether the db server is allowed to be accessed by the user id when determining that the application is allowed to be used; 5) allowing access to the db server when determining that the db server is allowed to be accessed; and 6) when data is transmitted from the db server, encrypting and managing the data according to a preset user right policy..
Fasoo. Com Co., Ltd

Product authentication and item identification

The present invention provides methods, reagents, and apparatus for authenticating and identifying products. Methods of the invention are easy to implement but difficult to replicate, simulate, alter, transpose, or tamper with.
Authentiform Technologies, Llc

Method and wireless vehicular access device authentication

A computer-implemented method includes receiving a request from a mobile device to activate a recognition sequence. The method also includes transmitting a plurality of time-stamped recognition codes to the device, responsive to the request.
Ford Global Technologies, Llc

Car sharing system and in-vehicle car sharing system

A car sharing system includes: an ic card carried by a user and including an identification id of the user; an in-vehicle apparatus that is mounted on a vehicle, and includes a card reading portion reading the ic card and a switch control portion performing an on-off control of a vehicle power source switch that allows traveling of a vehicle; and a management apparatus that is disposed in a reservation management center, wirelessly communicates with the in-vehicle apparatus, manages an operation status of the vehicle, and further manages reservation information. The in-vehicle apparatus reads the ic card by the card reading portion and, based on authentication of an the identification id by collation between the identification id, which is read, and the reservation information, executes a check-in process of the vehicle and turns on the vehicle power source switch..
Denso Corporation

Video record receipt system and use

Methods and systems for authenticated video acquisition and dissemination are disclosed. A temporally continuous video is acquired and sent to a server.

Image forming apparatus and social security number registration system

An image forming apparatus includes a reading device that reads an image from a document, a storage device, and a central processing unit (cpu). The storage device stores therein an authentication kit, a scan extension kit, and a specific information collection program.
Kyocera Document Solutions Inc.

Protecting digital security and effectiveness of an incentive

An incentive is to be securely provided. A security authentication identification is received.
Treats, Inc.

Method of auto-detection of an attempted piracy of an electronic payment card, corresponding card, terminal and program

A method of auto-detection of attempted piracy of an electronic payment card. The method includes the following acts implemented by the card: detection of a sequence of suspect operations implemented in interaction with the card, and storing in the card a corresponding suspect status; interaction of the card with a distinct entity and authentication, by the card, of the distinct entity; and communication, by the card, of the stored suspect status to the authenticated distinct entity..
Ingenico Group

System and authenticating network transaction trustworthiness

A system and method for authenticating network transaction trustworthiness, a bottom layer of the system supports two mainstream operating systems, i.e., windows and linux; basic management modules, i.e., respectively a communication management module, a certificate management module and a database management module are above the bottom layer support; a fourth-party authentication domain is above the foundation management modules; a user domain, an e-merchant domain, a third-party payment domain and the like are also provided. The method comprises the steps: 1) when a network transaction occurs, uploading, by a user, a digital certificate to perform digital authentication by logging into a security client, and simultaneously uploading, by an e-merchant and a third-party payment platform, digital certificates thereof to perform corresponding digital authentication; 2) after the digital authentication passes, downloading, by the user, a behavior certificate through a user behavior certificate downloading module, and formally entering, by the three parties, a transaction process; etc..
Tongji University

System and authentication using payment protocol

Methods, systems, and devices are disclosed for using a payment processing network as an authorization engine to access secure physical areas, such as college dormitories, office buildings. A keycard with a cryptogram generator is presented by a user to an access device, and the access device or associated computer sends an access request message formatted like a payment authentication request message to an aggregator/acquirer and payment processing network.

Adaptable authentication processing

Embodiments of the invention are directed to systems and methods that enable authentication of a user via an authentication application that is different than a wallet application that is being used to process a transaction. The wallet application may contain payment devices and/additional wallet applications..

Barcode reader and accessory for the barcode reader

A barcode reader and an accessory are disclosed. A barcode reader may include an interface for communication with a host computer via a wireless or wired link and an authentication system to establish mutual authentication with the host computer.
The Code Corporation

Method and secure signing and utilization of distributed computations

An approach is provided for providing secure signing and utilization of distributed computations. A distributed computation authentication platform causes, at least in part, a signing of one or more computation closures of at least one functional flow.
Nokia Technologies Oy

Key management for secure memory address spaces

A processor employs a security module to manage authentication and encryption keys for the processor. The security module can authenticate itself to other processing systems, such as processing systems providing software to be executed at the processor, can generate keys for encrypting address spaces for the provided software, and can securely import and export information at the encrypted address spaces to and from the processing system.
Advanced Micro Devices, Inc.

Staged control release in boot process

Integrity validation of a network device may be performed. A network device comprising a secure hardware module, may receive a root key.
Interdigital Patent Holdings, Inc.

Debug architecture

Roughly described, a method of restricting access of a debug controller to debug architecture on an integrated circuit chip, the debug architecture comprising an access controller, a plurality of peripheral circuits, and a shared hub, the shared hub being accessible by the access controller and the plurality of peripheral circuits, the method comprising: at the access controller, authenticating the debug controller; at the access controller, following authentication, assigning to the debug controller a set of access rights, the set of access rights granting the debug controller partial access to the debug architecture; and after assigning the set of access rights, allowing the debug controller access to the debug architecture as allowed by the set of access rights.. .
Ultrasoc Technologies Ltd.

Authentication based on object recognition

Various systems, mediums, and methods herein describe aspects of an authentication system. The system may receive a request from a user device to authenticate a user.
Paypal, Inc.

Ic card, ic module, and ic card system

Provided are an ic card, an ic module and an ic card system that can improve the security. An ic card of embodiments has a generation unit and an authentication unit.
Kabushiki Kaisha Toshiba

Authentication system, user terminal, control device, service providing device, program, and authentication method

An authentication system of an embodiment includes a control device, a user terminal, and a service providing device. The control device includes a storage unit, an information acquisition unit, an authentication processing unit, and a control management unit.
Toshiba Solutions Corporation

Operating system based authentication

Methods, systems, and computer program products are included for authenticating computing devices. An exemplary method includes associating a security key with an operating system of a first computing device, wherein the security key is generated from a serial number corresponding to the first computing device.
Paypal, Inc.

Information processing device and cooperative distributed storage system

In a network system that a plurality of information processing devices are connected via a network, an information processing device includes an information dividing part configured to generate a plurality of divided information by dividing user information, a state information acquisition part configured to acquire state information of the network system, and a destination determination part configured to determine a plurality of destinations fir storing a plurality of divided information distributed thereto in response to variations of the state information. The destination determination part determines destinations based on network communication speed, physical distances between information processing devices, authentication methods applied to information processing devices, or free spaces of storage units of information processing devices.
Nec Corporation

Method for loading executable program instructions into a chip card during active operation

The method includes authenticating a chip card terminal to a chip card by a chip card operating system, verifying the authorisation of the chip card terminal to load executable program instructions by the chip card operating system, storing data in a predefined memory region of the nvm, which data indicate a successful execution of the authentication and the verification, by the chip card operating system, starting the execution of a boot loader by the chip card operating system and interrupting the execution of the chip card operating system following the start of the boot loader, reading the data from the predefined memory region by the boot loader, loading the program instructions from the chip card terminal into the nvm by the boot loader on the precondition that the data indicate the successful authentication and verification in the predefined memory region.. .
Bundesdruckerei Gmbh

Cloud services activation for a printing device

Examples of activating cloud services for a printing device are disclosed. In one example implementation according to aspects of the present disclosure, a printing device activation process to activate a printing device is performed concurrently with a cloud credentials process to receive a cloud authentication token.
Hewlett-packard Development Company, L.p.

Printing system, and recording medium therefor, that enable spooling of instruction execution type print jobs in print apparatus in accordance with print-regulating information

A printing system includes a server, an electronic device and a print apparatus. The electronic device includes a central processing unit (cpu) and a storage device storing a printer driver.
Kyocera Document Solutions Inc.

Image forming apparatus, mobile terminal, image forming system, and non-transitory computer readable medium storing program

Provided is an image forming apparatus including an authentication information reception unit that receives authentication information which is input by a user, an authentication information transmission unit that transmits the received authentication information to a mobile terminal of the user, an image data acquisition unit that allows the mobile terminal to perform authentication by collating the transmitted authentication information and authentication information, which is stored in the mobile terminal, and acquires image data from the mobile terminal in a case in which the authentication is successful, and an image forming unit that forms an image on a recording medium based on the acquired image data.. .
Fuji Xerox Co., Ltd.

Control device, image processing apparatus, non-transitory computer readable medium storing program, information processing control system, and image processing method

A control device includes: a wireless communication section that operates while being continuously supplied with power; and a detection section that detects approach of a user. The control device further includes: an authentication processing section that authenticates a user of a terminal in response to reception of a request from the terminal by the wireless communication section when supply of power to a processing section of an information processing apparatus is stopped; and a control section that starts supplying power to the processing section when the approach of the user of the terminal is detected by the detection section after the authentication succeeds..
Fuji Xerox Co., Ltd.

Random number generation in ferroelectric random access memory (fram)

Disclosed embodiments relate to generating random numbers using two transistor, two capacitor (2t-2c) ferroelectric memory cells. In accordance with one disclosed embodiment, an n-bit random number can be generated by writing to a uniform data pattern to a set of n 2t-2c ferroelectric memory cells in a 1t-1c mode so that all ferroelectric capacitors of the n 2t-2c cells have a polarization state corresponding to the same data value (e.g., all 0's or all l's).
Texas Instruments Incorporated

Sram-based authentication circuit

An authentication circuit coupled to a plurality of memory bits includes a monitoring engine configured to provide a first data pattern to all the bits thereby causing each bit to be in a first data state, detect whether a transition from the first data state to a second data state occurs for each bit in response to a first reducing voltage applied to the plurality of bits, provide a second data pattern to all the bits thereby causing each bit to be in the second data state, and detect whether a transition from the second data state to the first data state occurs for each bit in response to a second reducing voltage applied to the plurality of bits, wherein the first data state is different from the second data state, and a puf controller configured to generate a puf signature based on the transitions of each bit.. .
Taiwan Semiconductor Manufacturing Co., Ltd.

Use of polysaccharide in dendrobium officinale for anti-fatigue

The present invention relates to a glucomannan with a molecular size of 730 kda, called dop, which was previously identified as the unique authentication marker of the expensive herb dendrobium officinals, as the main component for combating fatigue in subjects in need thereof. In particular, the present invention provides the required dosage for dop to provide a potent anti-fatigue effect, stronger than rhodiola rosea extract, and has significant potential to form an anti-fatigue health product..
Hong Kong Baptist University

Methods and use in facilitating the communication of neighboring network information to a mobile terminal with use of a radius compatible protocol

A disclosed example method for requesting neighboring network information from a device involves encoding a request for neighboring network information and sending the request to an authentication server to obtain the neighboring network information. The example method also involves receiving a response to the request, retrieving the neighboring network information contained in the response, and decoding the neighboring network information.
Blackberry Limited

Authentication between wireless client and access point utilizing smart client detection

Methods, systems, and computer readable media may be operable to facilitate an automated pairing between an access point and station through a secure setup procedure. An access point may enter into an auto-connection mode after a boot of the access point, and while operating in the auto-connection mode, the access point may identify a station by retrieving attribute information carried by a probe request that is output from the station.
Arris Enterprises Llc

Information processing apparatus, information processing system, authentication, and medium

An information processing apparatus to authenticate a user, by using a wireless device to obtain predetermined information from a wireless terminal carried by the user, and an imaging device to capture an image of the user, includes a unit to detect an approach of a person; a unit to activate the wireless device and the imaging device upon the approach detected; a unit to transmit a radio wave for having the wireless terminal transmit the predetermined information when the wireless device has been activated; a unit to wirelessly authenticate the user, based on the predetermined information; a unit to authenticate of the user by the captured image of the user; and a unit to permit the user to use the information processing apparatus if the user permitted by the wireless authentication is the same as the user permitted by the image authentication.. .
Ricoh Company, Ltd.

Method and system for managing security keys for user and m2m devices in a wireless communication network environment

Pre shared keys (“psk”) for application and data session security are generated using application authentication secret values stored in a sim device/card. The sim internally uses the secret values as inputs to a security algorithm engine, but the secret values are not accessible outside of the sim.
M2md Technologies, Inc.

Method and system for managing security keys for user and m2m devices in a wireless communication network environment

Pre shared keys (“psk”) for application and data session security are generated using application authentication secret values stored in a sim device/card. The sim internally uses the secret values as inputs to a security algorithm engine, but the secret values are not accessible outside of the sim.
M2md Technologies, Inc.

Flexible configuration and authentication of wireless devices

An apparatus and method for configuring a wireless station for use within a wireless local area network are disclosed. In at least one exemplary embodiment, a pairwise master key is generated by the wireless station and an access point within the wireless local area network.
Qualcomm Incorporated

Method of realizing virtual subscriber identity module card and system thereof

A method of realizing a virtual subscriber identity module (sim) card includes: storing the data stored in the virtual sim card to a cloud server, and connecting the mobile terminal to the cloud server through a network, reading the data stored in the virtual sim card stored in the corresponding cloud server, and establishing a mapping relation between the mobile terminal and the virtual sim card through authentication. In the present disclosure, the mobile terminal is bonded with a sim card, the sim card is multifunctional, and a single sim card corresponds to a plurality of terminals..
Huizhou Tcl Mobile Communication Co., Ltd.

Automatically determining restored availability of multi-channel media distributors for authentication or authorization

Methods and systems are provided for automatically identifying restored availability of multi-channel media distributors for authentication or authorization. For example, during a period of reduced availability for a multi-channel media distributor, the entitlement service diverts some or all requests from reaching the multi-channel media distributor.
Adobe Systems Incorporated

Information processing apparatus, image forming apparatus, information processing method, and non-transitory computer readable medium

An information processing apparatus includes a receiving unit that receives print instruction information; an authenticating unit that performs an authentication for permitting a printing process; an execution unit that executes the printing process when the authentication succeeds; a near field communication unit; a wireless communication unit that performs wireless communication that differs in a communication protocol from the near field communication; a transmitting unit that transmits identification information of the information processing apparatus to a terminal device when a connection via the near field communication is established in response to an operation of passing the terminal device over the near field communication unit; and a control unit that, when the receiving unit receives the print instruction information via the wireless communication using the identification information as a transmission destination, temporarily disables a function of the authenticating unit, and causes the execution unit to execute the printing process.. .
Fuji Xerox Co., Ltd.

Generating and using manifest files including content delivery network authentication data

Techniques for serving a manifest file of an adaptive streaming video include receiving a request for the manifest file from a user device. The video is encoded at different reference bitrates and each encoded reference bitrate is divided into segments to generate video segment files.
Dlvr, Inc.

System, information processing apparatus, and information processing method

An information processing apparatus that can be connected to information terminals and a data storage device through a network, and includes: a storage request receiver that receives conference identification information, information terminal identification information for a user participating in the conference, conference material data, and a storage request of the conference material data; an authentication program generator that generates an authentication program for determining whether the conference material data is capable of being transmitted to any of the information terminals when the conference material data is transmitted to the information terminal based on correspondence information in which pieces of the information terminal identification information are at least correlated with respective pieces of conference identification information, in accordance with the storage request; and a storage controller that stores the conference material data contained in the storage request and the authentication program in the data storage device in a correlated manner.. .
Ricoh Company, Ltd.

Interface discovery and authentication in a name-based network

One embodiment provides an interface discovery system that facilitates interface discovery and authentication. During operation, the system receives a message from an unregistered interface via a local interface of a link adapter.
Cisco Technology, Inc.

Network security management via social media network

Systems and methods for managing users' local security policies based on social media network information are provided. According to one embodiment, a network security appliance of a private network receives authentication request from a client machine and provides a social login interface of a social media network to the client machine.
Fortinet, Inc.

Intrusion detection to prevent impersonation attacks in computer networks

In an embodiment, a central computer performs a data processing method. The central computer receives telemetry data from intrusion sensors.
Cisco Technology, Inc.

Methods and systems for location-based authentication using neighboring sensors

Various embodiments include methods, and computing devices implementing the methods, for authenticating vehicle information by polling selected sensors. A server computing device receiving vehicle information from a reporting vehicle may compare the received vehicle information to contextual information to generate a comparison result, and determine whether the received vehicle information should be evaluated with greater scrutiny based on the comparison result.
Qualcomm Incorporated

Authentication system, operating apparatus, and authentication method

An operating apparatus stores user information including authentication information of users permitted to use a process-carrying-out apparatus; acquires authentication information of a user of the process-carrying-out apparatus; in response, returns a state of the process-carrying-out apparatus from a power saving state into a normal state to carry out a process; carries out authentication of the user based on the authentication information of the user and the stored user information; if the authentication is not successful, requests the process-carrying-out apparatus to carry out authentication the user; if any authentication is successful, permits the use of the process-carrying-out apparatus; and, if the use of the process-carrying-out apparatus is permitted, stores the authentication information of the permitted user.. .
Ricoh Company, Ltd.

Information processing apparatus, control method, and storage medium information processing apparatus and control method

There is provided a mechanism for invalidating, when an apparatus returns from a high-speed shutdown, authentication identification information issued before the apparatus enters the high-speed shutdown.. .
Canon Kabushiki Kaisha

Authentication method, apparatus and system for device

An authentication method, apparatus and system for a device are disclosed. The authentication method includes: selecting at least one of second devices associated with a first device and having an authentication function, if an authentication function of the first device is determined to be faulty; and instructing the selected second device to perform a locking/unlocking authentication operation on the first device.
Boe Technology Group Co., Ltd.

System and method to conduct clinical examinations and securely interact with networked electronic applications

Disclosed herein is a single portable computing device with components for secure authentication and subject identification with a set of integrated electronic diagnostic instruments that accompany a healthcare or veterinary professional as he or she examines or treats a subject before moving to another subject in another location. The device has a network interface so that secure access can be afforded to an electronic application for updating and observation.

Object management for external off-host authentication processing systems

Systems and methods for providing object management for external off-host authentication processing systems are described. In some embodiments, a method may include: identifying, by an information handling system (ihs), raw data to be stored within an object in an off-host memory of an external off-host authentication processing system coupled to the ihs, wherein the external off-host authentication processing system provides a hardware environment segregated from the ihs; collecting authentication data from a user by prompting the user; generating a system identification (id) that uniquely characterizes the ihs without prompting the user; and storing the authentication data, the system id, and the raw data as part of the object in the off-host memory..
Dell Products, L.p.

Web client plugin manager in vcenter managed object browser

A method is provided for a plug-in manager in a virtual machine (vm) system to install or update a plug-in at a web client server in the vm system. The plug-in extends the web client server with a user interface element to interact with a management entity implemented as a vm in the vm system.
Vmware, Inc.

Identity authentication migration between different authentication systems

An intermediary can securely migrate a security credential between systems despite different underlying encoding technologies used for authentication by the system. This intermediary can also securely migrate an identity between different authentication technologies.
Ca, Inc.

Multi-level authentication for onboard systems

Described herein is a platform and method for providing multi-level authentication by an onboard system in relation to a transaction. In response to receiving information related to a transaction, one or more authentication policies may be identified and provided to an onboard system associated with the transaction.

System and authenticating and enabling an electronic device in an electronic system

A system and method for authenticating and enabling an electronic device in an electronic system are disclosed. A particular embodiment includes: an electronic system comprising: a protected device; a requesting device node, executing on a computing system, the requesting device node including: a device query data packet generator to generate a device query packet including data representing one or more identifiers of the protected device and a particular paired system; and an authentication key retriever to obtain an authentication key based on the device query data packet from an authentication provisioning node using an external data communication; and an obfuscation state machine of the particular paired system configured with a pre-defined quantity of state elements, a pre-defined quantity of the state elements being functional state elements, the obfuscation state machine being programmed with the authentication key to cause the obfuscation state machine to transition the protected device from an initial obfuscation state to a functional state..
Anvaya Solutions, Inc.

Security improvements in a wireless data exchange protocol

A security solution for bluetooth low energy (ble) or equivalent wireless data exchange protocols involves authentication of a peripheral device by a central device using the advertising channel is presented. A method of authenticating a peripheral device in a wireless data exchange has a peripheral device sending an advertising channel protocol data unit (pdu), a central device receiving the advertising channel pdu and the central device sending a scan request scanning pdu to the peripheral device.
Dialog Semiconductor B.v.

Authenticating connections and program identity in a messaging system

A messaging system enables client applications to send and receive messages. The messaging system includes independent component programs performing different functions of the messaging system, such as connection managers that maintain network connections with the client applications, a message router that sends received messages to recipient applications through network connections, and a dispatcher that authenticates other component programs.
Blackrock Financial Management, Inc.

Data generation apparatus, electronic device, and authentication system

A data generation apparatus according to an embodiment comprises a memory space including a plurality of memory cells, each including a resistance change element, a first circuit configured to supply the memory cells included in a first space that represents part of the memory space with a current or a voltage that causes a dielectric breakdown to occur in the resistance change element, a second circuit configured to output a value read from the memory cells included in the first space, and an id generation circuit configured to generate an id using the value output from the second circuit.. .
Kabushiki Kaisha Toshiba

Production of cryptographic signatures

A method and system configured to produce a cryptographic signature on a message, under a key, at a user computer wherein the key is shared between the user computer, which stores a first key-share, and an authentication computer, which stores a second key-share and a first authentication value. The user computer encodes the message to produce a blinded message, produces the first authentication value from a user password and a secret value, and produces a second authentication value by encoding the first authentication value and a nonce.
International Business Machines Corporation

Self-validating request message structure and operation

A method begins by a first device generating a self-validating message by creating a master key, using the master key to create a message encryption key, encrypting a message using the message encryption key to produce an encrypted message, encrypting the master key using a public key of a second device to produce an encrypted master key, and including a message authentication code of the first device in the self-validating message. The method continues by the second device receiving and decoding the self-validating message by verifying the message authentication code of the first device, and when the message authentication code of the first device is verified, decrypting the encrypted master key using a private key of the second device to recover the master key, using the master key to create the message encryption key, and decrypting the encrypted message using the message encryption key to recover the message..
International Business Machines Corporation

Method of performing keyed-hash message authentication code (hmac) using multi-party computation without boolean gates

The subject matter discloses a method operated on at least two servers for a third-party client, the method comprising receiving by a first server a first result of the first irreversible function applied to a secret key from a first third-party client, receiving by a second server a second result of the second irreversible function applied to the secret key from the third-party client, receiving by the first server, a message from a second third-party client, the first server computing a first hash function on said first result and on said message, and sending a result of the first hash function from the first server to the second server, the second server computing a second hash function on said second result and on the result of the first hash function sent from first server and outputting the result generated by second server as hmac result.. .
Dyadic Security Ltd.

Authentication encryption method, authentication decryption method, and information-processing device

An information-processing device is provided with: a plaintext input unit for inputting plaintext; an initial vector generation unit for generating an initial vector; a common key block encryption unit for performing common key block encryption on the initial vector and generating an encrypted initial vector; a pseudorandom number generation unit which, accepting the encrypted initial vector as input, generates a pseudorandom number series in the same length as the plaintext; a keyed hash unit which, accepting the first portion of a ciphertext in which the pseudorandom number series and the plaintext are exclusive-or'ed as input, generates a hash value; and a ciphertext output unit for concatenating the second and first portions of a ciphertext in which the hash value and the encrypted initial vector are exclusive-or'ed and outputting the concatenated portions as a ciphertext.. .
Nec Corporation

Anisotropic magnetic flakes

The invention relates to anisotropic, reflective, magnetic flakes. In a liquid carrier and under influence of an external magnetic field, the flakes attract to one another side-by-side and form ribbons which provide higher reflectivity to a coating and may be used as a security feature for authentication of an object..
Viavi Solutions Inc.

Personal digital key and receiver/decoder circuit system and method

The present invention enables automatic authentication of a personal digital key based upon proximity of the key which is associated with a person. The system enables linking of the personal digital key to an account based upon the automatic authentication.
Proxense, Llc

Communication system, control device, and authentication information determination method

Since two pieces of fraudulently acquired authentication information a are transmitted from a transmission device at relatively short time intervals, a time tp is relatively short, whereas the two pieces of authentication information a are received by a control device at relatively long time intervals, an elapsed time tmax is relatively long and this relationship is different from that in a case where there is no fraudulent work. Thus, it is possible to accurately determine whether received authentication information is fraudulently acquired information on the basis of a relationship between a code included in the authentication information received in the control device and a code that is being selected in the control device, and a relationship between first time information and second time information included in the authentication information received in the control device..
Alps Electric Co., Ltd.

Centralized electronic commerce card transactions

A central transaction server in electronic commerce card authorization system enables the electronic commerce card association to manage and monitor the authentication system. The central transaction server acts as an intermediary for all communications between the access control server used for authentication.

Systems and methods for customized fingerprint authentication

Systems and methods are presented for receiving, at a server computer, a request to register a first fingerprint data, the request including the first fingerprint data and an action to be associated with the first fingerprint data, storing, by the server computer, the first fingerprint data and the action associated with the first fingerprint data, receiving, by the server computer, a request for authentication of a second fingerprint data, analyzing, by the server computer, the second fingerprint data to determine whether it matches stored fingerprint data, determining, by the server computer, that the second fingerprint data matches the stored first fingerprint data, determining, by the server computer, the action associated with the first fingerprint data, and sending, by the server computer, a response indicating that the second fingerprint data matches the stored fingerprint data and including the action associated with the first fingerprint data.. .
Ebay Inc.

Secure identity authentication in an electronic transaction

An approach is provided for securely authenticating an identity of a user participating in an electronic transaction. A request for a biometric identifier/security question is converted to a first quick response (qr) code.
International Business Machines Corporation

Multi-factor mobile user authentication

A system and method are disclosed herein leveraging financial networks standards with mobile device data and secure processing and storage environment knowledge to authenticate a device. For instance, a party to a transaction may utilize these elements of information, not traditionally associated with wireless transactions, to achieve a lower probability of fraud and/or a higher confidence associated with the transaction..
American Express Travel Related Services Company, Inc.

Fingerprint enrollment in smart device

A smart device is used for controlling enrollment in a fingerprint sensing system. The smart device comprises a fingerprint sensor and a number of actions are performed in the smart device that commences with establishing a connection with a wireless communication device.
Fingerprint Cards Ab

Information processing system, information processing method, and non-transitory computer program product

An information processing system includes an apparatus that carries out a function; an application program configured to provide a service using the function is installed; and one or more processors configured to receive a request to carry out the function transmitted from the application program, determine a type of an authentication token included in the request, determine, in response to receiving the request, determine a type of the apparatus, whether the authentication token is valid based on the determined type of the authentication token and the determined type of the apparatus, and cause the apparatus to carry out the function corresponding to the request if the authentication token is determined as being valid.. .
Ricoh Company, Ltd.

User-authentication gestures

This document relates to user-authentication gestures. One example can capture multiple biometric features when a user-authentication gesture is performed as a device authentication attempt.
Microsoft Technology Licensing, Llc

System and device binding metadata with hardware intrinsic properties

A system, device, and method for binding metadata, such as information derived from the output of a biometric sensor, to hardware intrinsic properties by obtaining authentication-related metadata and combining it with information pertaining to a root of trust, such as a physical unclonable function. The metadata may be derived from a sensor such as a biometric sensor, the root of trust may be a physical unclonable function, the combination of the metadata and root of trust information may employ a hash function, and output from such a hash process may he used as an input to the root of trust.
Analog Devices, Inc.

Methods and using credentials to access computing resources

Mechanisms for controlling access to credentials are disclosed. A computing device receives, at a first time, a request associated with a user to initiate a plurality of actions against a computing resource of a plurality of computing resources, the request including a credential identifier that identifies a credential.
Red Hat, Inc.

Direct authentication system and method via trusted authenticators

Systems and methods are provided for enabling online entities to determine whether a user is truly the person who he says using a “two-factor” authentication technique and authenticating customer's identity utilizing a trusted authenticator.. .

Method and system for authenticating and monitoring home health interactions

A system uses a multi-pass authentication method to authenticate the presence of a health care provider co-located with an assigned patient at a specific time and in a specific place that includes a data reader and transmitter with particular capabilities held by the health care provider, a token held by the patient, and a back-end database and internet-based interface. The system includes an object that includes a wirelessly detectable patient identification (id) and an electronic device.

Id tag authentication system and method

A method used to authenticate an item using an identification tag is provided. At the time of manufacture, the tags are created with various hardware attributes (ha), including a unique identifier (uid); and encoded with a signature of a message that includes a url, and optionally a serial number associated with a product to which the tag is to be attached.
Etas Embedded Systems Canada Inc.

Authentication apparatus, authentication method, and non-transitory computer readable medium

An authentication apparatus includes a memory that stores information regarding a device and other device located in the vicinity of the device in association with each other; a receiving unit that, in a case where there is an authentication request from the device, receives information regarding other device located in the vicinity of the device at a time of the authentication request; and an authentication unit that authenticates the device based on the information regarding the other device stored in the memory and the information regarding the other device that is received by the receiving unit at the time of the authentication request.. .
Fuji Xerox Co., Ltd.





Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Authentication for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Authentication with additional patents listed. Browse our RSS directory or Search for other possible listings.


2.4849

file did exist - 13204

2 - 1 - 256