Follow us on Twitter
twitter icon@FreshPatents


Authentication patents

      

This page is updated frequently with new Authentication-related patent applications.

new patent Method for realizing network access, terminal and computer storage medium
A method for implementing network access, a terminal and a computer storage medium are provided. The method includes that: when detecting that a terminal is located in a non-local network, a network identifier corresponding to the non-local network is acquired, wherein the non-local network is different from a network to which a subscriber identity module (sim) card of a terminal belongs; a data connection is established according to the network identifier, and authentication information of a virtual sim card for accessing the non-local network is acquired; and the terminal accesses the non-local network by using the authentication information of the virtual sim card..
Zte Corporation


new patent Method and establishing network connection
A method and an apparatus are provided for establishing a network connection. According to an example method, in case that a predetermined condition is satisfied, an open authorization first ap established on a router may be searched for.
Beijing Xiaomi Mobile Software Co., Ltd.


new patent System and data offloading in a hetnet
Embodiments of the present disclosure relate to systems and methods for offloading data of a subscriber from the rat type to a second rat type. Embodiments may relate to a method comprising: receiving an access request from an access point [120] based on a connection request received from a user equipment [110], transmitting an authentication request to the user equipment [110] for authenticating a subscriber; receiving an apn name and packet gateway [144] identifier from the home subscriber server [146]; altering the apn name received from the home subscriber server [146]; transmitting the connection request to a packet gateway [144] for authorizing the subscriber for offloading, updating the apn name and the packet gateway [144] identifier at the home subscriber server [146]; and offloading the data from the first rat type to the second rat type, wherein the data is identified based on the subscriber profile..
Reliance Jio Infocomm Limited


new patent System, methods and software for user authentication
A system and method for authenticated-user access, the system including an optical device proximal to an entrance adapted to capture a biometric credential of an individual user, a communication network adapted to receive from and send signals to the optical device, a portable communication device associated with the individual user, the portable communication device in connection with the network and a processor adapted to receive the biometric credential of the user and to match the biometric credential with a previous pre-authorized biometric credential, of the user and to send an authorization key to the portable communication device responsive to the match to provide the individual user with a time-limited access key to the entrance.. .

new patent Method and secured authentication using voice biometrics and watermarking
An apparatus including a computer processor, and a computer memory. The computer processor may be programmed to receive a voice input of a first person and a request for authorization by the first person to access an account from an authorized computer software application; to perform audio watermark recognition technology on the voice input to determine if the voice input satisfies expected audio watermark data stored in the computer memory for a first authorized person; to perform voice biometric technology on the voice input to determine if the voice input satisfies expected voice biometric data stored in the computer memory for the first authorized person; and to produce an output to the authorized computer software application to indicate that the voice input is from the first authorized person, based at least in part on the voice input satisfying expected audio watermark data and expected voice biometric data..

new patent Secure access authorization method
Credentialing systems, methods, and mediums. A method includes sending, by a mobile device and over a network to an installed device, a request for access to the installed device.
Siemens Industry, Inc.


new patent System and controlling authentication of a physiological acquistion device by a patient monitor
A patient monitor includes a data connector configured to connect to a corresponding data connector of an approved physiological data acquisition device to provide data transmission to and from the approved physiological data acquisition device, and a power connector configured to connect to a corresponding power connector of the approved physiological data acquisition device to provide power to the approved physiological data acquisition device. The patient monitor further includes a control module configured to detect connection of a corresponding power connector of an unidentified device at the power connection port and/or a corresponding data connector of the unidentified device to the data connector, and provide a limited power amount to the unidentified device through the power connector.
General Electric Company


new patent Image forming apparatus, controlling the same, and storage medium
An image forming apparatus that performs authentication of a user by a login program that operates on firmware and that, upon detection an abnormality of the login program, restricts execution of a job without causing the login program to terminate, and, while execution of the job is being restricted, controls to enable reception of an operation for disabling the login program via a reception unit for receiving an operation by a user via an operation unit, and, in accordance with the operation for disabling, causes the restricted job to be executed.. .
Canon Kabushiki Kaisha


new patent Computer terminals biometrically enabled for network functions and voice communication
The invention provides a handset that includes a finger-image sensor that provides finger-image-related signals or data for authentication purposes and functions as a telephone handset for use with a computer terminal. A system, including handsets and computer terminals, enables the terminal and/or the handset to access or otherwise participate in at least one network-related function and voice communication in response to authentication of finger-image data provided by the handset..
Bloomberg Finance L.p.


new patent Data verification method
Method for verifying data generated by an electronic device included in equipment, the electronic device including a computing unit, a one-time programmable memory and a volatile memory, the equipment including a rewritable non-volatile memory and a communication bus enabling the electronic device to store data in the rewritable non-volatile memory. The method includes: creating a secured channel by encryption between the equipment and a server; obtaining an authentication key from the server; loading data and a message authentication code from the rewritable non-volatile memory to the volatile memory, the message authentication code obtained by the electronic device from the authentication key and said data prior to the storage of said data and message authentication code in the rewritable non-volatile memory, the electronic device not having kept the authentication key following the obtaining of the message authentication code; verifying said data using the secret key and the message authentication code..
Starchip


new patent

Multi-factor authentication using positioning data

Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity.
Microsoft Technology Licensing, Llc

new patent

System and providing security solutions to protect enterprise critical assets

Exemplary embodiments of the present disclosure are directed towards a system and method for providing security solutions to protect enterprise critical assets. The system comprise a plurality of service requesting host devices enrolled with at least one authentication and authorization unit for accessing a plurality of enterprise applications by a plurality of users, wherein the plurality of enterprise applications provided by a plurality of service providing host devices.

new patent

Distributed data storage system using a common manifest for storing and accessing versions of an object

The present disclosure provides a system and method to perform access control authentication using a cryptographic hash of the encoding of access control rules. The compact cryptographic hash identifier of the access control rules is suitable for inclusion in a name indexing entry, whereas inclusion of the full encoding would result in a large name indexing entry, resulting in disadvantageously large storage requirements and bandwidth usage.
Nexenta Systems, Inc.

new patent

In-vehicle authentication system

An in-vehicle authentication system is disclosed. The in-vehicle authentication system includes a first authentication object apparatus; and a second authentication object apparatus configured to perform communication with the first authentication object apparatus.
Toyota Jidosha Kabushiki Kaisha

new patent

Network authentication of a geo-fenced volume

Provided is a method for managing a software defined network using a software control layer to regulate a geo-fenced volume. The software control layer can use a global positioning system (gps) including a range of latitudes, a range of longitudes and a range of altitudes.
International Business Machines Corporation

new patent

Systems and methods for authenticating a user based on a biometric model associated with the user

Systems and methods as provided herein may create a biometric model associated with a user. The created biometric model may be used to generate challenges that are presented to the user for authentication purposes.
Paypal, Inc.

new patent

Server and/or client device authentication

Embodiments of systems and methods for client and/or server authentication are provided. In one embodiment, a method includes sending information from a mobile network device to a server, wherein the information comprises a seed that is used by both the mobile network device and the server to compute a series of one time passwords.
Paypal, Inc.

new patent

Communication system, communication method, and computer program

A communication system includes: a first communication unit configured to communicate with a terminal apparatus; an authentication unit configured to transmit an authentication screen for inputting authentication information, in response to access from the terminal apparatus; a connection guiding unit configured to connect communication made from the terminal apparatus via the first communication unit and addressed to any destination, to the authentication unit; a display unit configured to display the authentication information input to the authentication screen and output by the terminal apparatus that has been connected to the authentication unit by the connection guiding unit and to which the authentication screen has been transmitted; and a connection control unit configured to permit connection of the terminal apparatus to a network via a second communication unit in accordance with the user input received by the input unit according to display by the display unit.. .

new patent

Information processing device, information management method, and information processing system

An information processing device that is connected to another information processing device includes a memory storing a program, a first authentication information for each user to access the information processing device and a second authentication information in association with the first authentication information for the each user to access the another information processing device; and a processor that performs the program so as to execute a method including the steps of receiving an acquisition request that is sent from a client device according to the first authentication information, transmitting a list including files that are accessible according to the second authentication information in association with the first authentication information of the received acquisition request, receiving an execution request to execute at least one of the files and the folders that are included in the list, and executing a process according to the execution request by using the second authentication information.. .
Ricoh Company, Ltd.

new patent

Apparatus control method, device and system

Provided are an apparatus control method, device and system. The method is applied to a controller of a system.
Suzhou Teknect Engineering Co., Ltd

new patent

Using biometric features for user authentication

An authentication request is sent to a server. An authentication request reply message is received from the server.
Alibaba Group Holding Limited

new patent

Detection of authorized user presence and handling of unauthenticated monitoring system commands

Techniques are described for detecting and handling unauthenticated commands in a property monitoring system. In some implementations, a monitoring system may include sensors located throughout a property, a monitoring control unit, and an input device.
Alarm.com Incorporated

new patent

Vehicle remote control system and vehicle-mounted apparatus incorporated in the same

A vehicle remote control system including an electronic key pre-registered as a device via which a vehicle can be remote-operated, and a mobile communication device pre-registered as a device that belongs to a user of the vehicle. In the system, a vehicle-mounted authentication unit is configured to determine whether or not authentication of the electronic key and the mobile communication device has succeeded, and a vehicle-mounted allowance determination unit is configured to, if it is determined by the vehicle-mounted authentication unit that the authentication of the electronic key and the mobile communication device has succeeded, allow operation of a predetermined vehicle-mounted activation unit..
Denso Corporation

new patent

Moving object tracking device, display device, and moving object tracking method

According to an embodiment, a moving object tracking device includes a memory having computer executable components stored therein; and a processor communicatively coupled to the memory. The processor is configured to perform acquiring a plurality of images; generating a plurality of pieces of tracking information indicating information obtained by tracking a moving object included in the images; generating first associated tracking information obtained by first association targeting the plurality of pieces of tracking information having a mutual time difference equal to or smaller than a threshold; generating second associated tracking information obtained by second association targeting the first associated tracking information and the tracking information, not associated by the first association, based on authentication information for identifying the moving object; and outputting the second associated tracking information..
Kabushiki Kaisha Toshiba

new patent

Method of handling weight data in a data processing system

A method of handling weight data in a data processing system involves acquiring and storing weight data of an item. A verification information is generated for the item based on the weight data, where the verification information is associated to the determined weight, the generation of the verification information including one of the following steps: a) encrypting the weight data where the verification information corresponds to the encrypted weight data, or b) determining a first message authentication code where the verification information corresponds to the first message authentication code, wherein when using the weight data the validity of the weight data for the item is verified by use of the verification information and if the weight data is verified as being valid weight data, a graphic representation of the weight data is generated..
Marel Iceland Ehf

new patent

Component for provisioning security data and product including the same

A security component according to an example embodiment includes: a user authentication processor configured to authenticate the input data by determining whether the input data is provided by an authorized user of the security component based on component user data of the input data; a master key generator configured to generate a master key based on the component user data of the input data in response to the user authentication processor authenticating the input data; a decryption processor configured to generate security data by decrypting encrypted data of the input data based on the master key; and a security storage configured to store the security data.. .
Samsung Electronics Co., Ltd.

new patent

Securing a transaction between a transponder and a reader

A transponder-reader payment system includes a fob including a transponder, and a rfid reader for interrogating the transponder. The system may further include a personalization system for populating onto the fob and rfid reader identifying information and security and authentication keys which may be used during mutual authentication of the fob and the reader and for completing a transaction.
Chartoleaux Kg Limited Liability Company

new patent

Information processing apparatus and information processing method

According to an embodiment, an information processing apparatus includes a communication interface, a memory device, and a controller. The controller inputs an authentication request from an information processing terminal via the communication interface.
Toshiba Tec Kabushiki Kaisha

new patent

Secure real-time transactions

A method including performing, at a mobile device being used by a consumer, an identity authentication of the consumer. The method also can include receiving, at the mobile device, first information from a point-of-sale terminal at a store of a merchant.
Early Warning Services, Llc

new patent

Incremental login and authentication to user portal without username/password

A first set of records is identified as being associated with a first asset. A second set of records is obtained, with the second set of records being associated with a second asset.
Klarna Ab

new patent

System and securely sending and receiving packages via drones

An autonomous vehicle comprising a transport body configured to travel to an identified location, a package retention device for securing one or more packages to the transport body; one or more processors integral to the transport body, wherein the processors are configured by code executing therein to: access shipper and recipient profile data; wherein the shipper and recipient profile data includes location data for shipper and recipient; navigate the autonomous vehicle to a shipping destination and a delivery destination; provide access to the package retention device upon authentication of a shipper presenting a package at a shipping destination, and provide access to the package retention device upon authentication of a recipient retrieving a package at the delivery destination.. .
International Business Machines Corporation

new patent

Run efficiency measuring system, a vehicle and a certificate

A run efficiency measuring system measures both investment into a vehicle for run and actual run performance by the vehicle. The investment means cost of energy, toll, and budgeted time, while the actual run performance means travel distance and saved time.
Nl Giken Incorporated

new patent

Ticket authentication method and ticket authentication device

A ticket authentication method and a ticket authentication device are provided. The ticket authentication method includes the following steps.
Industrial Technology Research Institute

new patent

System and method enabling location, identification, authentication and ranging with social networking features

An extensible system for intercommunication between smartphones and intelligent digital cameras that permits acquisition, identification, authentication and communication outside the cellular and networked interfaces. This concept provides a means for smartphones to intercommunicate securely and directly without network, or radio based wireless connection and to provide private visual and motion-image data communication at reasonable rates between parties outside of the cellular network.
The Quantum Group Inc.

new patent

Path-based access control for message-based operating systems

A system and method enforce file system path-based access controls in a message-based operating system. The system and method enforce a list of rules that provide a grant and an access restriction to file system paths to server applications.
2236008 Ontario Inc.

new patent

Service channel authentication token

A computer system receives an authentication request from a user device and determines a determined device identification from a set of received device attributes. When the device is properly authenticated, the computer system generates an authentication token that is signed by the determined device identification and returns the authentication token to the user device.
Bank Of America Corporation

new patent

Methods, systems, and products for authentication of users

Methods, systems, and products authenticate users for access to devices, applications, and services. Skills of a user are learned over time, such that an electronic model of random subject matter may be generated.
At&t Intellectual Property I, L.p.

new patent

Systems and methods for coordinating applications with a user interface

Systems and methods are disclosed for coordinating applications by detecting a touch input and a related touch input a device locations associated with the applications, one of which is a user authentication application. A parameter may be established with the user authentication application so that the other application runs with the at least one parameter..
Invensense, Inc.

new patent

Multi-input user interaction and behavioral based authentication system for context aware applications

A mobile device which can identify a change in possession of the device and based on a change in possession of the device implement different types of security protocols to follow based on a scoring system regarding threat of the user to the data on the mobile device.. .
International Business Machines Corporation

new patent

Information processing system that authenticates license of application program installed in information processing apparatus, and information processing method

An information processing system includes: one or more information processing apparatuses; and a management server, in which the management server includes a license key table management unit that receives inputs of a serial number, an application id, and a license key from an administrator and registers them in a license key table, and a license key authentication unit that extracts the corresponding license key from the license key table by using the application id and the serial number received from the information processing apparatus in which the application program is installed, and performs license key authentication of the application program by using the extracted license key, and the one or more information processing apparatuses each include an application installation unit that installs the application program, and an authentication requesting unit that transmits the application id and the serial number to the management server to request for license key authentication.. .
Kyocera Document Solutions Inc.

new patent

Apparatus and methods for rights-managed content and data delivery

Methods and apparatus for providing access to content across a plurality of devices and environments. In one embodiment, a downloadable rights profile is utilized in order for a user device to determine whether to provide content to a subscriber.
Time Warner Cable Enterprises Llc

new patent

System and intelligently coupling and connecting mobile terminals to a coordinate-measuring device

A coordinate-measuring system and related method for securely and intelligently coupling and connecting a mobile terminal device to a stationary coordinate-measuring device. A mobile terminal is arranged to be physically separate from and movable in relation to the coordinate-measuring device and is designed for the operation of the coordinate-measuring device.
Carl Zeiss Industrielle Messtechnik Gmbh

new patent

Safety management system for aircraft

The safety management system for a flying object performing flight control by changing, at a motor controller, a power feeding amount to each drive unit based on an instruction from a main control unit includes an authentication information storage unit which records registered identification information for performing operator authentication, authentication accepting means which accepts an input of input identification information, operator authentication means which performs operator authentication of an operator of the flying object based on the input identification information and the registered identification information, and a safety managing unit connected between a power source of the flying object and the motor controller of the flying object, wherein the safety managing unit includes switching means which switches an electrical connection state between the motor controller and the power source based on the result of the operator authentication.. .

System and enabling multi-modal communication

Systems and methods for a multi-tenant communication platform. At a multi-tenant communication platform, and responsive to authentication of a communication request provided by an external system, a routing address record of the communication platform is determined that matches a communication destination of the communication request.
Twilio, Inc.

Signal fingerprinting for authentication of communicating devices

Aspects of the subject disclosure may include, for example, receiving electromagnetic waves at a physical interface of a transmission medium that propagate along the transmission medium without requiring an electrical return path, wherein the electromagnetic waves are guided by the transmission medium, and wherein the electromagnetic waves have a non-optical frequency range. A determination is made as to whether the electromagnetic waves are being received from a second network device according to a comparison of a fingerprint of the electromagnetic waves and an expected fingerprint of expected parameters for the electromagnetic waves transmitted by the second network device.
At&t Intellectual Property I, L.p.

Authentication using application authentication element

Systems, apparatuses, and methods for performing transactions through mobile communication devices using either telecommunications networks or proximity near-field communications systems are disclosed. A mobile communication device may display an application authentication element.

Multi-tiered user authentication methods

Aspects of the present invention provide an approach for user authentication during a user session which potentially requires multiple user authentications. A library of authentication methods is provided for preforming the user authentications.
International Business Machines Corporation

Wireless guest engagement system

A guest engagement system and associated methods provide seamless engagement with guests of facilities through the use of wireless sensing technologies. The system makes use of individual guest devices which are carried by guests and used to automatically identify and authenticate the guests throughout the facility.
Carnival Corporation

Device, device coordination system, and device coordination method

A device communicably connected to one or more storage servers via a network includes circuitry. The circuitry acquires storage setting information including a setting relating to at least one storage server to be used by a user who is identified through a user authentication process.
Ricoh Company, Ltd.

Systems, methods and apparatuses for prevention of relay attacks

The systems, methods and apparatuses described herein provide an apparatus configured for preventing relay attacks on a communication link between the apparatus and a communication partner. The apparatus may comprise a communication port, a timer and a processor.
Ologn Technologies Ag

Mobile caller authentication for contact centers

A call request is received, from a mobile device, to establish a communication with a contact center. For example, the call request may be to establish a voice call with the contact center.
Avaya Inc.

System and transparent multi-factor authentication and security posture checking

A method for creating a secure connection between a remote client computing device and an enterprise asset platform includes a server receiving from a client computing device (ccd) a request being either a registration request or to access the asset platform, including a ccd unique identifier, determining if the ccd is previously blocked from accessing the asset platform, if so then terminating the method. If the request is a registration request, then generating a disambiguation query in accordance with predefined policy, receiving a response to the disambiguation inquiry from the ccd, verifying the contents of the disambiguation query response in relation to a predefined criteria.
General Electric Company

Centralized authentication and reporting tool

A system includes a retrieval engine, an authentication engine, an extraction engine, a determination engine, and an export engine. The retrieval engine receives a request for a data report from a user via a user device.
Bank Of America Corporation

Selective authentication system

A method and authentication mechanism is provided. A request is sent to authenticate a user of the application from a mobile device to an authentication server.
Adp, Llc

Seamless authentication for an application development platform

Various embodiments concern mechanisms for facilitating communication between network-accessible platforms for developing, hosting, or running hybrid applications that utilize resources hosted across multiple platforms. Hybrid applications cause messages or “calls” to be passed between the platforms that must be authenticated.
Financialforce.com, Inc.

Communication apparatus, communication system, communication method, and program

A communication apparatus that transmits a challenge code on the basis of a received request signal and performs authentication of an authentication target apparatus transmitting the request signal on the basis of the challenge code and a response code generated on the basis of the challenge code includes a control unit configured to perform a predetermined fail-safe process when a request signal is received a set number of times or more from the authentication target apparatus before completion of the authentication after the transmission of the challenge code.. .
Honda Motor Co., Ltd

Adaptive token cache management

Embodiments perform token cache management by renewing tokens heuristically. A token renewal request interval is defined based on a configurable lifetime of a token and an acquisition duration.
Vmware, Inc.

Technologies for ccm encryption with 64-bit block ciphers

Technologies for counter with cbc-mac (ccm) mode encryption include a computing device that performs a cbc-mac authentication operation on a message with an encryption key, using a 64-bit block cipher to generate a message authentication code. The computing device generates a first 64-bit authentication block including an 8-bit flag field and a length field of between 11 and 32 bits.
Intel Corporation

Wireless identification device, system, and interactive product authentication for smart advertisement enabled anti-counterfeit package

The present disclosure relates, according to some embodiments, to product authentication systems comprising a wireless identification device including a memory, a tamper evident detection circuit, and an electrically conductive circuit. The product authentication system may be configured to provide marketing information to the authentic wireless identification device.
Silicon Craft Technology Co., Ltd.

A method, a computer program product and a qkey server

The invention relates to a method for tightly coupling context to a secure pin and securely storing an asset in hardware. The method comprises a step of sending the context to a secure element, a step of ensuring that the context is shown to a user, and a step of acquiring user consent by performing an authentication check.
Ubiqu B.v.

Devices and accessories for use in wireless guest engagement systems

A guest engagement system and associated methods provide seamless engagement with guests of facilities through the use of wireless sensing technologies. The system makes use of individual guest devices which are carried by guests and used to automatically identify and authenticate the guests throughout the facility.
Carnival Corporation

Portable wireless devices for use in wireless guest engagement systems

A guest engagement system and associated methods provide seamless engagement with guests of facilities through the use of wireless sensing technologies. The system makes use of individual guest devices which are carried by guests and used to automatically identify and authenticate the guests throughout the facility.
Carnival Corporation

Devices and accessories for use in wireless guest engagement systems

A guest engagement system and associated methods provide seamless engagement with guests of facilities through the use of wireless sensing technologies. The system makes use of individual guest devices which are carried by guests and used to automatically identify and authenticate the guests throughout the facility.
Carnival Corporation

Door locks and assemblies for use in wireless guest engagement systems

A guest engagement system and associated methods provide seamless engagement with guests of facilities through the use of wireless sensing technologies. The system makes use of individual guest devices which are carried by guests and used to automatically identify and authenticate the guests throughout the facility.
Carnival Corporation

Door locks and assemblies for use wireless guest engagement systems

A guest engagement system and associated methods provide seamless engagement with guests of facilities through the use of wireless sensing technologies. The system makes use of individual guest devices which are carried by guests and used to automatically identify and authenticate the guests throughout the facility.
Carnival Corporation

Systems and methods for risk based decisioning

A method and system for creating an assurance level based on authentication data attributes using a computer device coupled to a database are provided. The method includes receiving an authorization request associated with the financial transaction from the sender, the authorization request including a fraud risk assessment of the financial transaction determined by the sender using an authentication response received from the computer device by the sender, the authorization request including one or more reason codes associated with the sender fraud risk assessment.
Mastercard International Incorporated

Network node authentication

An authentication technique is disclosed that uses a distributed secure listing of transactions that includes encrypted data that can be used to authenticate a principal to a verifier.. .
Priv8pay, Inc.

System for authenticating an electronic device by means of an authentication server

A system for authenticating an electronic device by means of an authentication server in order to authenticate a user of said electronic device. The system is adapted to perform an authentication based on a fictive payment transaction and includes the authentication server which is adapted to execute a fictive payment transaction with a predetermined transaction amount with said electronic device and during said execution to receive a first cryptogram from said electronic device; send said first cryptogram to a banking server; and receive from said banking server an acknowledgment if said first cryptogram is valid; when said fictive payment transaction has been executed, compute an authentication identification based on said electronic device's data; said electronic device which is a payment electronic device and which is adapted to execute said fictive payment transaction with said authentication server and during said execution to send said first cryptogram to said authentication server..
Gemalto Sa

System, method, and computer program product for issuing and using debit cards

A system, method, and computer program product are used to issue and track debit cards. A system comprises an enrolling system that verifies an enrollee, associates an enrollee's main and overdraft account, and issues a debit card, an authentication system that receives information regarding a requested transaction of a debit card and that receives information regarding the main and overdraft account associated with the debit card and accepts or rejects the requested transaction based thereon, and a settlement system that generates a periodic report of at least one of the transactions, the main account, and the overdraft account.
Iii Holdings 1, Llc

Systems and methods for expedited processing of authenticated computer messages

A transaction message processing server is configured to receive an authorization request message from a sender computing device, the authorization request message associated with a transaction. The server is also configured to detect a decision data element in an authentication outcome data field of the authorization request message, and interpret the decision data element as an indicator that the transaction is highly authenticated.
Mastercard International Incorporated

Intelligent authentication process

A method for authentication includes receiving consumer information associated with a consumer transmitted over a first data network in a processor operated by an account issuer; determining available account authentication options based on the received consumer information and a database of potential authentication options stored in a memory in the processor; selecting a set of available authentication options from the available account authentication options based on a database of attributes for the potential authentication options stored in the memory in the processor; transmitting consumer information to an authentication provider associated with a selected authentication option over a second data network; receiving an authentication confirmation over the second data network in the processor; and updating the database of attributes for the potential authentication options to include information regarding a successful authentication and the authentication provider associated with the selected authentication option.. .
Buy It Mobility Networks Inc.

User authentication method using fingerprint image and generating coded model for user authentication

A user authentication method using a fingerprint image, the user authentication method includes receiving at least a portion of a fingerprint image of a user; actuating a processor to divide the fingerprint image into a plurality of first sub-blocks; generate a set of input codes by encoding the first sub-blocks based on a coded model; measure a similarity between the set of the input codes and a set of registered codes included in a pre-registered binary codebook; and authenticate the user based on the similarity.. .
Samsung Electronics Co., Ltd.

Authentication screen

Techniques are disclosed relating to authenticating a user via a lock screen. In one embodiment, a computer device presents a two-dimensional matrix of elements on a display of the computing device and detects a continuous gesture performed by a user on the display over the two-dimensional matrix of elements.
Ca, Inc.

Authentication of audio-based input signals

The present disclosure is generally directed a data processing system for authenticating packetized audio signals in a voice activated computer network environment. The data processing system can improve the efficiency and effectiveness of auditory data packet transmission over one or more computer networks by, for example, disabling malicious transmissions prior to their transmission across the network.
Google Llc

Terminal device and computer program

A terminal device (10) comprises a group of sensors (11, 14 to 17) acquiring multiple different pieces of authentication information such as a password, fingerprint information, voiceprint information, and a face image. For each piece of the acquired authentication information, a controller (110) executes a separate authentication procedure based on each piece of authentication information on the basis of a reference level at which the authentication cannot be determined to be successful in authentication by a single piece of authentication information, determines whether the authentication is successful or failed from a combination of results of multiple separate authentication procedures, and unlock the device when determined that the authentication is successful..

Multimode mobile electronic medical record system and working method thereof

The present invention discloses a multimode mobile electronic medical record system and a working method thereof. The multimode mobile electronic medical record system comprises a plurality of mobile terminals, service server, push server, authentication server and cloud server.
Hefei University Of Technology

Targeted collection and storage of online social network data in evidence domains

Techniques and systems are provided for selecting, collecting, and storing online social network (osn) data pertinent to an evidence context. A collection request with content filter parameters, an authentication mode, and a targeted osn identity is received.
Social Evidence, Llc

User authentication in a removable media storage system

An authentication mechanism for dynamic self-provisioning of a magnetic tape cartridge library by a plurality of users for community accessed data storage. Authenticating a host computer and/or users of the host computer for accessing and processing data on a magnetic tape cartridge..
International Business Machines Corporation

User authentication in a removable media storage system

An authentication mechanism for dynamic self-provisioning of a magnetic tape cartridge library by a plurality of users for community accessed data storage. Authenticating a host computer and/or users of the host computer for accessing and processing data on a magnetic tape cartridge..
International Business Machines Corporation

Remote keyless entry message authentication

Method and apparatus are disclosed for remote keyless entry authentication. An example remote keyless entry system includes a key fob and a vehicle.
Ford Global Technologies, Llc

Two-wire authentication system for an aerosol delivery device

An aerosol delivery device is provided that includes a cartridge coupled with a control body. The cartridge is equipped with a heating element, an authentication device and a second switching circuit.
Rai Strategic Holdings, Inc.

Semiconductor Energy Laboratory Co., Ltd.

. .

Idefend Ltd.

. .

. .

. .

. .

. .

Method, apparatus, and system for reestablishing radio communication links due to radio link failure

One feature pertains to a method that includes establishing a radio communication connection with a first radio access node (ran) that uses control plane signaling connections to carry user plane data. The method also includes determining that the wireless communication device is experiencing radio link failure (rlf) with the first ran and that the radio communication connection should be reestablished with a second ran.
Qualcomm Incorporated

Scanning system, management device, computer-readable recording medium, and reading device

Provided is technology that improves user convenience. A scanning system includes a scanner that generates scanning data by scanning a document, and a management device that connects to the scanner, and processes the scanning data based on settings corresponding to a user authenticated by a first user authentication when the scanner executes a first user authentication process.
Seiko Epson Corporation

Security enhancement tool

A method comprises receiving a notification of a new system violation and determining whether the new system violation in combination with one or more of a plurality of existing system violations presents a threat to the system. The method further comprises increasing the security of the system in response to determining that the new system violation in combination with one or more of the plurality of existing system violations presents a threat to the system, wherein increasing the security of the system comprises one or more of increasing an authorization level and increasing an authentication level..
Bank Of America Corporation

Provision of access to a network

Disclosed is a method for granting access for a device to a private local network with a gateway device. The method includes: establishing a connection over the gateway device, wherein a request for accessing the private local network is transmitted; transmitting information on the device; receiving a request for preparing a setup of an authentication procedure; generating a pair of authentication keys; providing one of the generated authentication keys to the device requesting the access to the private local network; initiating the authentication procedure; granting access to the private local network for the device in response to a successful authentication procedure.
Telia Company Ab

System and a applying dynamically configurable means of user authentication

O. Dynamically changing authentication assessment based on determined sensitivity authentication parameter..

Framework for executing operations on systems

Methods and system are disclosed that execute an operation associated with a system. In one aspect, upon receiving a request to execute an operation, a connectivity model establishes a connection with a framework.
Sap Se

Iot device authentication

The disclosed technology is generally directed to device authentication in an iot environment. For example, such technology is usable in authenticating iot devices to an iot hub.
Microsoft Technology Licensing, Llc

Selectively enabling multi-factor authentication for managed devices

Disclosed are various examples of selectively enabling multi-factor authentication for applications on managed devices. An identity provider receives an authentication request for a first client application executed in a managed client device.
Airwatch Llc

Non-intrusive security enforcement for federated single sign-on (sso)

The technology disclosed relates to non-intrusively enforcing security during federated single sign-on (sso) authentication without modifying a trust relationship between a service provider (sp) and an identity provider (idp). In particular, it relates to configuring the idp to use a proxy-url for forwarding an assertion generated when a user logs into the sp, in place of an assertion consumer service (acs)-url of the sp.
Netskope, Inc.

User to user content authentication

Devices, systems and methods for authenticating a user to access electronic content include use of a processor configured to identify a technical condition for the content, access distributor logic providing a first release of the technical condition, receive a request from a subscriber to transfer the first release to an identified user, determine whether to approve or deny the request, and when approved, provide a device associated with the identified user with an authentication that permits the identified user to activate the first release and access the electronic content, and a database that stores the technical condition.. .
Dish Network L.l.c.

System and providing network support services and premises gateway support infrastructure

A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely manages delivery of application services, which can be voice controlled, by a gateway, e.g.
Kip Prod P1 Lp

System and providing network support services and premises gateway support infrastructure

A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely manages delivery of application services, which can be voice controlled, by a gateway, e.g.
Kip Prod P1 Lp

Systems and methods for device authentication

Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a medication delivery device may obtain a transitory identity and may send the transitory identity to a second computing device and a third computing device.
Infosci, Llc

Securing information exchanged between internal and external entities of connected vehicles

Data in vehicle networks has been treated as proprietary assets, due to car makers' concern of potential ip infringement via extraction of confidential vehicular data. To address this concern, an intermediate gateway in between internal and external networks translates proprietary in-vehicle data to rich type data, thus preventing the exposure of raw in-vehicle data.
The Regents Of The University Of Michigan

Controller area network message authentication

Method and apparatus are disclosed for controller area network message authentication. An example disclosed vehicle includes a data bus and a first control unit communicatively coupled to the data bus.
Ford Global Technologies, Llc

Devices and methods for client device authentication

An access point receives from a client a first nonce and a first cryptographic hash for the first nonce, the first cryptographic hash calculated using a first key derived from a second key, the second key input on the client or derived from a passphrase input on the client, derives first keys from each of a stored primary input and at least one stored secondary input valid at the deriving, the stored primary input and the at least one stored secondary input each being one of a second key and a passphrase, verifies the cryptographic hash using each derived first key to find a derived first key that checks the first cryptographic hash, generates a third key and a second cryptographic hash using the derived first key that checks the first cryptographic hash, and sends the third key and the second cryptographic hash to the client.. .
Thomson Licensing

Identity management for computer based testing system

A method and system for identity management and authentication of examination candidates by, for example, capturing biometric data and identification information from an examination candidate and storing the data and information in a database. The method and system includes, for example, capturing biometric data from an individual at a later time for comparison with data stored in the database, and which allows authentication of the individual after determining that the biometric data matches the previously stored data and the individual matches the previously stored information..
Prometric, Inc.

Online identification and authentication

Systems and methods may provide for online identification and authentication. In one example, the method may include generating a credential to represent a relationship based on a common ground of authenticated communication between a first user and a second user, identifying the second user to the first user, authenticating the relationship of the second user to the first user, and initiating, upon authentication, a communication between the first user and the second user..
Intel Corporation

Method of and operating a device by members of a group

A method of operating a device by controlling the device based on input received from group members, uses a sensor unit for monitoring each group member for detecting an instruction provided by a group member. The instruction includes a visual or audible instruction.
Koninklijke Philips N.v.

Method and system for user authentication by voice biometrics

Disclosed is a method including a prior phase for referencing an authorized user, during which this user pronounces a reference phrase at least once, the phrase being converted into a series of reference symbols by a statistical conversion mutual to all of the users to be referenced, and an authentication test phase, including a first step during which a candidate user pronounces the reference phrase at least once, and this pronounced phrase is converted in the same manner as the reference phrase during the prior phase, by using the same conversion, into a sequence of candidate symbols, and a second step during which the series of candidate symbols is compared to the series of reference symbols to determine a comparison result, which is compared to at least one predetermined threshold, determining whether the candidate user who pronounced the phrase during the test phase is indeed the authorized user, providing authentication.. .
Pw Group

Methods and biometric authentication in an electronic device

Embodiments of the disclosure provide methods and apparatus in which a biometric authentication score generated as the result of a biometric authentication algorithm is compared to a threshold value that can be dynamically varied as required to provide a variable level of security. For example, the threshold value may be varied in dependence on the semantic content of a voice signal, and/or the context in which the voice signal was acquired.
Cirrus Logic International Semiconductor Ltd.

Optical feedback for visual recognition authentication

Providing optical watermark signals for a visual authentication session by performing at least the following: receive, at an anti-spoof engine, an instruction to perform visual authentication operations for a visual authentication session, generate, with the anti-spoof engine, an optical watermark signal based on receiving the instruction, wherein the optical watermark signal includes at least one optical identifier to authenticate images captured during the visual authentication session, obtain, with the anti-spoof engine, an image source that includes captured images of the visual authentication session, determine, with the anti-spoof engine, whether the image source includes a reflected optical watermark signal, and compare, with the anti-spoof engine, whether the reflected optical watermark signal matches the generated optical watermark signal based on the determination that the image source includes the reflected optical watermark signal.. .
Mcafee, Inc.

Methods and systems for authenticating users for authorization rule relaxation

A method of authenticating an accountholder for relaxing payment transaction authorization rules is provided. The method is implemented using an authentication computing device in communication with a memory device.
Mastercard International Incorporated

Systems and methods for performing card authentication reads

A request may be received to perform a card authentication read. A card reader may be used to collect data from a card that is read by the card reader.
Trusona, Inc.

Authenticating online transactions using separate computing device

A method for authenticating an online transaction on a first computing device using a second computing device including detecting a request to process sensitive payment information input on the first computing device to complete a transaction, determining that a condition is present associated with the transaction, disabling a payment processing function of the website to prevent a payment from being processed and completed, generating a unique identifier to be displayed on the first computing device, wherein the user scans the unique identifier with a second computing device to initiate an authentication function, authenticating the user operating the first computing device, and enabling, by the processor, the payment processing function of the website to allow the payment to process.. .
Wal-mart Stores, Inc.

Mutual mobile authentication using a key management center

A system, method, and server computer configured to authenticate a consumer device. The consumer device is authenticated via a mobile gateway using challenge-response authentication.

Electronic commerce transaction authentication based on a vehicle travel route data

A device and method in a vehicle control unit for providing electronic commerce transaction authentication are provided. Upon receiving an electronic commerce transaction request relating to a transaction source, the vehicle control unit authenticates the transaction source against a vehicle travel route parameter by comparing the source location data with the vehicle travel route parameter.
Toyota Motor Engineering & Manufacturing North America, Inc.

Method of displaying user interface related to user authentication and electronic device for implementing same

A method and an apparatus are provided. The method and apparatus include a display, a fingerprint sensor formed in at least a part of a display area of the display, and a processor, wherein the processor is configured to identify content including at least one object to be displayed on the display, when the content is not associated with acquisition of fingerprint information, display the at least one object at a predetermined position, and when the content is associated with the acquisition of the fingerprint information, display the at least one object in at least the part of the display area in which the fingerprint sensor is formed.
Samsung Electronics Co., Ltd.

Ultrasonic biometric system with harmonic detection

A system may include a fingerprint sensor system and a control system. The system may be configured to transmit an ultrasonic wave including a first frequency.
Qualcomm Incorporated

Sensor management system

Provided is a system including, as components: a sensor node that includes a sensor unit including power supply means, an rfid tag, authentication means that performs authentication of a telegram written in the rfid tag, and stop instruction means that sends a stop command to the power supply means when the authentication fails, and that is enclosed in a weather-resistant case; and a user terminal that includes storage means in which the telegram is stored, and an rfid reader/writer.. .

Techniques for leveraging multiple cryptographic algorithms for authenticating data

Techniques for authenticating data on a computing device are provided. An example method according to these techniques includes generating a first cryptographic output by applying a first cryptographic algorithm to each block of a first subset of the plurality of blocks of data to be authenticated, combining a last block of the first cryptographic output with a second subset of the plurality of blocks of data to generate an intermediate result, and generating an authentication output by applying a second cryptographic algorithm to the intermediate result, the second cryptographic algorithm being different than the first cryptographic algorithm..
Qualcomm Incorporated

Secure management of user addresses in network service

Methods, systems, and programs are presented for securing user-address information. A first memory is configured according to a first table that does not include information about user identifiers.
Ebay Inc.

Semiconductor memory system and operating method thereof

A semiconductor memory system and an operating method thereof includes: a one-time-programmable memory device storing at least a customer identification (id) identifying a customer; a memory device; and a memory controller including a processor, and coupled to the memory device, containing instructions executed by the processor, and suitable for authenticating whether a program is authorized by a controller provider for the customer in a first-level signature authentication, in accordance with a customer image format, authenticating whether the program is authorized by the customer in a second-level signature authentication, in accordance with a program image format, after the first-level signature authentication is passed, when the customer image indicates the second-level signature authentication, wherein the program image format is different than the customer image format, storing the program into the memory device after the first-level signature authentication and second-level signature authentication are passed, and executing the program after the program is authenticated.. .
Sk Hynix Memory Solutions Inc.

Methods and authentication in an electronic device

Embodiments of the invention provide methods and apparatus for monitoring the routing configuration within an electronic device such that a biometric authentication process can be carried out without interference from other components of the device, such as may occur when the device has become infected with malware for example. The invention may provide a codec or speaker recognition processor, coupled to receive biometric input data, comprising a security module that determines whether a routing configuration complies with one or more rules.
Cirrus Logic International Semiconductor Ltd.

System and a applying dynamically configurable means of user authentication

F. Assigning a authentication score based on compatibility degree of matching user's phonetic information matched to the authenticated phonetic information..

Methods, systems, apparatuses, and techniques for employing augmented reality and virtual reality

Techniques for employing augmented reality or virtual reality information are presented. An information management component (imc) of an augmented reality device (ard) can monitor and detect user activities and conditions in area in proximity to ard.
Rockwell Automation Technologies, Inc.

Authentication using electromagnet signal detection

Systems of an electrical vehicle and the operations thereof are provided. In particular, a motor controller is described.
Nio Usa, Inc.

Method for handling transmission of fraudulent frames within in-vehicle network

An anti-fraud method for use in an in-vehicle network system including a plurality of electronic control units that exchange, in an in-vehicle network, data frames, each having added thereto a message authentication code (mac). The method includes generating a first mac by using a mac key and a value of a counter that counts a number of times a data frame having added thereto a mac is transmitted to the in-vehicle network.
Panasonic Intellectual Property Corporation Of America

Method and system for authentication in autonomous vehicles

Systems of an electrical vehicle and the operations thereof are provided that provide authentication mechanisms of external individuals or computing devices while the vehicle is operating autonomously.. .
Nio Usa, Inc.

Facilitating multigame currencies in multiple online games

A system and method for facilitating multigame currencies in multiple online games and security therewith is disclosed. The multigame currencies may be “spent” and/or “earned” by the players in the individual ones of the multiple online games.
Aftershock Services, Inc.

Verification of cell authenticity in a wireless network using an extended time stamp

We disclose various embodiments that enable a mobile terminal to confirm authenticity of a base station before the mobile terminal proceeds to camp on the corresponding cell, e.g., during an idle mode. In an example embodiment, the authentication processing includes the mobile terminal validating a digital signature included in an information block received from a candidate base station, the digital signature having been generated by the base station using an extended time stamp that indicates the calendar year, month, and/or day in addition to the utc time-counter value.
Alcatel-lucent Usa Inc.

Verification of cell authenticity in a wireless network through traffic monitoring

We disclose various embodiments that enable a mobile terminal to confirm authenticity of a base station before the mobile terminal proceeds to camp on the corresponding cell. In an example embodiment, the authentication processing includes the mobile terminal tuning to a selected control channel of the base station to monitor rf signals transmitted thereon.
Alcatel-lucent Usa Inc.

Communication apparatus, communication system, notification method, and program product

There is provided a communication apparatus including: a first communication unit having a first communication range; a second communication unit having a second communication range wider than the first communication range; a control unit which transmits a request signal for starting communication via the second communication unit from the first communication unit to another communication apparatus, and transmits authentication information from the second communication unit to the another communication apparatus in the case where it is determined that communication with the another communication apparatus via the second communication unit is possible based on a response signal after the first communication unit receives the response signal in response to the request signal; and a notification unit which notifies a user after the second communication unit receives a result of authentication based on the authentication information.. .
Sony Corporation

Method, apparatus, and system for authenticating wifi network

A method, an apparatus, and a system for authenticating a wi-fi network, where a terminal sends, to an associated authentication center when the wi-fi network exists in an area in which the terminal is located, a request message that carries a user identifier, receives access verification information allocated to a user represented by the first user identifier from the associated authentication center, sends, to a wi-fi authentication center, a login request that carries the access verification information, receives authentication information obtained and fed back by the wi-fi authentication center carrying a user identifier corresponding to the access verification information, and determines that the wi-fi network is a secure network when the user identifier carried in the authentication information is the same as the user identifier carried in the request message.. .
Huawei Technologies Co., Ltd.

System and using a symbol as instruction for a target system to request identity information and authentication from a mobile identity

Some implementations may provide a method to have a user authenticated at a point of service. The method includes: accessing, by a target system, a multi-dimensional symbol rendered on a display of a mobile computing device of the user, the multi-dimensional symbol encoding endpoints and actions for the target system to perform in order to request and authenticate an identity of a user; decoding data in the multi-dimensional symbol to retrieve an identity token plus information about the authentication actions and the user's identity system; requesting the corresponding authentication actions of the user's identity system to include specific authentication measures for the user to perform as well as data for the user to release; and performing the authentication actions as requested and encoded in the multi-dimensional symbol such that the physical identity of the user of the mobile computing device is verified and the user consents to release the requested identity information at the point of service..
Morphotrust Usa, Llc

Method for performing multiple authentications within service registration procedure

Embodiments herein provide a method for performing multiple authentications within a service registration procedure. The method includes sending, by a user equipment (ue) a register request message to an ip multimedia subsystem (ims) server.
Samsung Electronics Co., Ltd.

Communication method, authentication method, terminal apparatus, communication system, and authentication apparatus

There are provided a communication method, an authentication method, a terminal apparatus, a communication system, and an authentication apparatus for improving communication quality and a communication opportunity capture rate under an environment in which terminal apparatuses cluster within a two-dimensionally narrow range. The communication method of this invention is a communication method for providing a communication service associated with a principal service to a terminal apparatus, including a step of providing the communication service on the basis of information on the principal service provided to the terminal apparatus.
Sharp Kabushiki Kaisha

Verification of cell authenticity in a wireless network using a system query

We disclose various embodiments that enable a mobile terminal to authenticate a base station before the mobile terminal proceeds to attach to the corresponding network and/or camp on the corresponding cell, e.g., during the initial network selection and attachment or during an idle mode. In an example embodiment, the authentication processing includes the mobile terminal generating and sending to a candidate base station a system query with a nonce.
Alcatel-lucent Usa Inc.

Requesting system information

Systems and methods to request system information are provided. In some aspect, a user equipment (ue) transmits a request for on-demand system information.
Blackberry Limited

Anonymity authentication wireless sensor networks

An anonymity authentication method for wireless sensor networks is provided. A smart card carried by a user is used to provide two-factor verification protection.
National Chin-yi University Of Technology

Authentication for a limited data entry device

An lde authentication system is provided for granting to an lde device access to a resource of a resource provider. In accordance with the lde authentication system, an lde device sends to the resource provider a request to access the resource.
Microsoft Technology Licensing, Llc

Protection of the ue identity during 802.1x carrier hotspot and wi-fi calling authentication

This disclosure relates to techniques for performing wi-fi authentication in a wireless communication system. Public key cryptography may be used to enhance the confidentiality of the user's permanent identity in transit.
Apple Inc.

Method and system for authenticating users in public wireless networks

A method for authenticating a user of a user equipment provided with a mobile cellular network card module in a public wireless network. The method includes, during an authentication procedure following an attempt by the user to access the public wireless network with the user equipment for availing of services provided by the public wireless network: retrieving from the mobile cellular network card module a code that uniquely identifies such mobile cellular network card module; retrieving from a database wireless credentials of the user associated with said retrieved code that uniquely identifies such mobile cellular network card module; providing said retrieved wireless credentials of the user to the public wireless network; and granting the user access to the public wireless network conditioned to the correctness of the provided wireless credentials..
Telecom Italia S.p.a.

Image forming apparatus having circuitry for providing a user authentication input screen and providing a function selection screen displaying authenticated functions

An image forming apparatus is provided, in which the image forming apparatus includes a user database in which user identification information for identifying an user of the image forming apparatus is registered, an operation panel for receiving a key operation input, a secure program used for determining whether a user service can be provided on the basis of the user identification information in the user database and another user identification information input by the user.. .
Ricoh Company, Ltd.

Replaceable item authentication

A replaceable item for a host device, such as a print substance cartridge for a printing device, stores multiple identities. For each identity, the replaceable item stores multiple authentication values, or passwords.
Hewlett-packard Development Company, L.p.

Information processing device and information processing method

There is provided an information processing device, including: an acquisition unit that acquires authentication information and operation information; and a display control unit that controls a display on a basis of the authentication information or the operation information acquired by the acquisition unit. The display control unit causes a lock screen to be displayed in a case in which certain operation information is acquired while an initial screen is being displayed, causes an unlocked return screen to be displayed in a case in which an authentication process based on the authentication information is successful, and controls, on a basis of the operation information, a transition from the lock screen to the return screen conducted in accordance with the authentication process..
Sony Mobile Communications Inc.

Control of internet browsing in a secure environment

A system and method are disclosed for providing internet access to residents of a controlled-environment facility. There are significant dangers associated with provide such residents with internet access due to their criminal history.
Global Tel*link Corp.

System and providing network support services and premises gateway support infrastructure

A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely manages delivery of application services, which can be voice controlled, by a gateway, e.g.
Kip Prod P1 Lp

System and network entity assisted honeypot access point detection

Embodiments of the present invention relate to system and method for one of authenticating an authorized ap [106a] and barring a honeypot ap [106c]. More particularly, the embodiments may disclose a method for authenticating the access point based on a request from a user equipment [104a]; the method comprising steps of: comparing an ap identifier with a pre-configured list of ap identifiers to generate one of a positive response and a negative response; transmitting one of a denial response and a verification request; receiving one of a positive verification response and a negative verification response from the authorized ap [106a]; transmitting one of a positive authentication response to maintain the connection with the authorized ap [106a] in response to the positive verification response and a negative authentication response to release the connection with the honeypot ap [106c] in response to the negative verification response received from the authorized ap [106a]..
Reliance Jio Inforcomm Limited

Device authentication of aircrew mobile devices on board aircraft

Configurations of security settings of an access point arranged on board an aircraft. An exemplary embodiment of a method for configuring security settings of an access point arranged on board an aircraft for the authentication of mobile terminals comprises: receipt of flight-related security data from a mobile terminal via a configuration interface of the access point; and configuring of security settings of the access point in a configuration mode based on the flight-related security data so that automatic authentication of preconfigured mobile terminals for access to the access point is possible..
Airbus Defence And Space Gmbh

Authenticated access to cacheable sensor information in information centric data network

In one embodiment, a method comprises: receiving, by a requestor device in a data network, authentication request parameters for generating a secured request for a data object, the authentication request parameters comprising a shared encryption key and a prescribed update time interval value; generating, by the requestor device, the secured request based on generating a reduced-resolution time value by dividing a current device timestamp value of the requestor device by the prescribed update time interval value, and encrypting the reduced-resolution time value using the shared encryption key; and outputting, by the requestor device, the secured request specifying an object name identifying the data object and the encrypted reduced-resolution time value, enabling a content supplier device to authenticate the secured request based on determining whether the reduced-resolution time value, multiplied by the prescribed update time interval, substantially matches a corresponding timestamp value of the content supplier device.. .
Cisco Technology, Inc.

Response method and system in virtual network computing authentication, and proxy server

A response method and system in virtual network computing authentication, and a proxy server, where the method includes receiving, by a proxy server, a password from a controller, receiving challenge information from a serving end, where the challenge information is generated by the serving end based on the virtual network computing authentication, determining a first response value according to the password and the challenge information, and sending the first response value to the serving end in order to resolve a problem that sensitive data of a user is leaked or decrypted by brute force because a response process in the virtual network computing authentication is completed by a client, thereby improving security in the virtual network computing authentication process.. .
Huawei Technologies Co., Ltd.

Method and device for authenticating based on authenticating device

An authenticating method based on an authenticating device includes: a client obtains an application id according to an uri; requests a server for an authentication using the application id and a user identification; receives current authenticating data from the server; obtains client data object using a challenge value in the current authenticating data; hashes the client data object and the application id in the current authenticating data; obtains a key identification in the current authenticating data; sends current authentication request information including the client parameter, the key identification and key identification length to the authenticating device; receives authentication response information from the authenticating device; requests the server for a signature verification using the authentication response information, the client data object and a session id in the current authenticating data; and the authentication is successful if information returned from the server indicates verification pass, or is failed if otherwise.. .
Feitian Technologies Co., Ltd.

Data transmission method, authentication method, and server

Disclosed are a data transmission method, an authentication method, and a server. The data transmission method performed by a node among a plurality of nodes connected in a hierarchical structure includes generating a node identity (id) comprising at least one from among a virtual address for identifying the node and a group key for identifying a group to which the node belongs, generating a signature of the node by using at least one from among the node id and information about a previous node adjacent to the node, and transmitting a data packet to a server using a node chain formed based on signatures of the nodes..
Samsung Sds Co., Ltd.

Methods providing authentication during a session using image data and related devices and computer program products

A method providing use of an application may include providing a session for a user of the application, wherein the session is provided based on a credential for the user. While providing the session, image data for the session may be obtained, and responsive to the image data for the session, authentication may be performed based on a determination whether the image data for the session includes a facial image that matches the user credential.
Ca, Inc.

Device registration, authentication, and authorization system and method

A system includes one or more processors to receive a registration request, the registration request comprising a representation of a username and a password, verify the username and the password and transmit a one-time-use password, receive the one-time-use password and first device identifier information from a mobile computing device, receive an access request from the mobile computing device comprising the representation of the username and the password, second device identifier information, and application key information, verify the username, the password, the second device identifier information, and the application key information, and transmit a token to the mobile computing device, and receive a resource request from the mobile computing device comprising the token and third device identifier information.. .
Level 3 Communications, Llc

System and authenticating the legitimacy of a request for a resource by a user

A method of authenticating the legitimacy of a request for a resource from a resource provider by a user, including providing an authentication process in which a resource provider message is received and de-assembled, the integrity of the user request message is confirmed, a result indicator as to the legitimacy of the resource provider message is created by performing two or more authenticity checks, and an authentication result is sent.. .
Robojar Pty Ltd

Device fingerprint based authentication

A device fingerprinting system provides an additional factor of authentication. A user device may be redirected, along with user id parameters, to authentication system.
Secureauth Corporation

System and method to share a resource or a capability of a device

A method includes transmitting, from a first device, a message indicating that the first device is available to share a resource. The method includes receiving, at the first device, a request to use the resource, the request received from a second device, where the request includes identification information.
At&t Mobility Ii Llc

Facilitating users to obfuscate user credentials in credential responses for user authentication

A system and method for facilitating users to obfuscate user credentials in credential responses for user authentication are disclosed. A string sequence may be presented to a user for prompting the user to input credential characters sequentially but not continuously.
Aftershock Services, Inc.

Image based method, system and computer program product to authenticate user identity

An authentication process is disclosed which authenticates a user identity with a password that includes at least one portion based on an image that is saved on the user's local device. The password generated may be based on the user selected image and the process may use the image in calculating a hash function for the password.

Authenticating identity for password changes

In an embodiment, a password risk evaluator may receive a request including a user identifier (id) and a password. The password risk evaluator may retrieve a password preference model associated with the user id, and may determine a risk score indicating a likelihood that the password is associated with the user id.
Ca, Inc.

Method for authenticating internet users

A method and system for authenticating an internet user identity by cross-referencing and comparing at least two independent sources of information. A first geographical location of a computer signature of an internet user is identified, and the geographical location of a communication voice device of said internet user is identified to determine a second location.

Need based controller area network bus authentication

Systems and methods are provided and include a control module that receives a communication packet from a communication node that includes at least one of a vehicle sensor and a vehicle system via a controller area network bus. The control module determines whether the communication packet from the communication node indicates that the vehicle sensor or the vehicle system associated with the communication node is operating outside of a predetermined acceptable operating range.
Denso International America, Inc.

Apparatus authentication system, management device, and apparatus authentication method

A management device includes a counter that counts the first number of times authentication of a first communication device has been successful, a generating unit that generates a first password based on the first number of times, and a sending unit that sends a registration request that requests registration of the first password. The first communication device includes a counter that counts the second number of times authentication of the first communication device has been successful, a generating unit that generates a second password based on the second number of times, and a sending unit that sends a connection request that includes the second password.
Fujitsu Limited

System and providing network support services and premises gateway support infrastructure

A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely manages delivery of application services, which can be voice controlled, by a gateway, e.g.
Kip Prod P1 Lp

Method for processing user information detected by at least one detection device of a system

A method for processing user information detected by at least one detection device of a device, in which information concerning at least one user detected by the at least one detection device is transmitted to a number of databases, and in which the information detected by the at least one detection device is at least partially associated with a user profile, and in which all information stored on the number of databases which has been detected by the at least one detection device and associated with the user profile is retrieved from the number of databases, and as a function of a result of an authentication of the user is output to the user on at least one output unit for processing.. .
Robert Bosch Gmbh

Technique for managing profile in communication system

Disclosed are: a communication technique and a system therefor for fusing, with iot technology, a 5g communication system for supporting a data transmission rate higher than that of a 4g system. Provided is a method for installing a profile of a terminal having an embed universal integrated circuit card (euicc) in a mobile communication system, the method comprising: requesting for an euicc authentication certificate to an euicc and receiving the euicc authentication certificate; and transferring a profile package to the euicc so as to install a profile, wherein the received euicc authentication certificate further comprises an euicc manufacturer (eum) authentication certificate..
Samsung Electronics Co., Ltd.

Authentication-based message display method and communication terminal thereof

The present disclosure discloses an authentication-based message display method and a communication terminal thereof. The method includes: a communication terminal determines whether a received message contains a setting content; marking the message as an encrypted message if contains; determining whether an authentication data which is inputted by a user and matches the encrypted message is obtained, when a display request for the encrypted message is received; displaying the encrypted message if obtained, and not displaying the encrypted message if not obtained.
Huizhou Tcl Mobile Communication Co., Ltd

Secure container platform for resource access and placement on unmanaged and unsecured devices

A first computing device receives a service access request to access a service provided by another computing device, the request including user authentication characteristics of a user. The first computing device forwards the service access request to the other computing device.
Appbus, Inc.

A first entity, a second entity, an intermediate node, methods for setting up a secure session between a first and second entity, and computer program products

The invention relates to a method for setting up a secure session between a first entity and a second entity. In an embodiment, the first entity is a user authentication device and the second entity is an application running on a platform.
Ubiqu B.v.

Initial provisioning through shared proofs of knowledge and crowdsourced identification

Systems and methods for initial provisioning through shared proofs of knowledge (poks) and crowdsourced identification are provided. In some embodiments, a method of sharing a pok between a first relying party (rp) server and a second rp server includes receiving, by the first rp server, a request from a client device by a user for sharing the pok.
Antique Books, Inc.

Apparatus and encryption

Disclosed are an encryption apparatus and method. The encryption apparatus includes a storage configured to store a static key table, and at least one processor configured to implement an authenticator configured to perform authentication with an external apparatus and acquire authentication information and a key table generator configured to generate a dynamic key table using authentication information acquired through the authentication..
Samsung Sds Co., Ltd.

Distribution and verification of transaction integrity keys

The present disclosure relates to generating an identifier, an encrypted value that is an original value encrypted, and a message authentication code (mac) at a server device, and to generating a message including a message header and a message body, said message header including the identifier and the mac, and said message body including the encrypted value, and said that the mac key used to compute the message authentication code is included in the original value to be encrypted, and further relates to transmitting the message to a client device.. .
Hewlett Packard Enterprise Developmet Lp

Nfc tag recognition device and nfc tag recognition system including the same

An nfc tag recognition device includes an antenna responsive to signals transmitted by an nfc tag, a radio frequency (rf) signal processor measuring power of the signal received by the antenna from the nfc tag and converting the signal into digital data, an nfc controller extracting an authentication key from the digital data, an authentication signal processor generating an authentication pattern from the nfc tag, and an authentication signal storage storing an authentication key and an authentication pattern of a registered user. The authentication signal processor generates an authorization grant signal if the extracted authentication key matches the stored authentication key and the generated authentication pattern matches the stored authentication pattern..
Samsung Electronics Co., Ltd.

Methods, systems and devices for access control

Methods, systems and devices for access control are provided. The present disclosure provides a communication device of a user communicating access details associated with the facility, to a client system within the vicinity of which the communication device is located, and the client system verifying the access details and transmitting an electronic request to a host server.
Mastercard International Incorporated

Pre-authenticated online ordering system

A computerized method and system for presenting a user interface is provided. A set of user authentication credentials are received from a first user device, the set of user authentication credentials sufficient to uniquely identify a user of the user device as being registered with a network-based publication system.
Ebay Inc.

Method and system for authenticating iot device using mobile device

Provided is an authentication system including: a device authentication agent installed in an internet of things (iot) device with a communication module and generating first device authentication information for authenticating the corresponding iot device; an authentication server connected with the iot device through wired or wireless communication and generating second device authentication information for authenticating the iot device; and a mobile agent installed in a mobile device of a user, connected with the iot device and the authentication server through the wireless communication, and verifying whether the iot device or a message determined to be received from the iot device is authentic according to whether the first device authentication information transmitted from the iot device and the second device authentication information transmitted from the authentication server coincide with each other.. .
Estorm Co., Ltd.

Methods of authenticating a user for data exchange

A method of facilitating the exchange of data between a user having a computing device, and a remote entity, where a first connection has been established between the user and the remote entity, and where the user has associated data exchange information with an application on the computing device, the data exchange information defining properties of the data to be exchanged between the user and the remote entity. The method comprises establishing, at a server, a second connection to the computing device; enabling retrieval of a user authentication attribute associated with the data exchange information; enabling retrieval of a device authentication attribute associated with the data exchange information; enabling authentication of the user using the user authentication attribute; and enabling authentication of the computing device using the device authentication attribute, where data may be exchanged between the computing device and the remote entity in accordance with the data exchange information following authentication of the user and the computing device..
Eckoh Uk Limited

Systems and methods for enhanced verification of new users to a network based service

A computer-based method for verifying a new user during enrollment to a digital wallet application is provided. The method is implemented using a digital wallet computing device including one or more processors in communication with one or more memory devices.
Mastercard International Incorporated

Multi-point authentication for payment transactions

Authentication includes receiving an indication of physical possession of a payment card by a merchant and receiving a purchase request for an authorization of an exchange from the payment account of the cardholder to the merchant. Authentication includes assigning a randomized transaction identifier to the request for the authorization of the exchange.
International Business Machines Corporation

System and object authenticity detection

System for determining authenticity of an object in which a light-source directs collimated or telecentric light toward an authentication-region on the object, which impinges on the authentication-region at a predetermined angle relative to the normal of a plane defined by the object, a portion of the light is reflected from the authentication-region and another portion of the light is scattered from the authentication-region, an imager, focused on the authentication-region, acquires a focused-image of the scattered-light, the image includes image-features related to surface-features-scattering-phenomena of the authentication region, the processor determines correspondence between part of the acquired image and a corresponding part of a stored-image corresponding to the authentication-region, the processor identifies the object as authentic when the acquired-image corresponds to the stored image, the processor identifies the object as non-authentic when the acquired-image does not corresponds the stored-image.. .
Elbit Systems Land And C4i Ltd.

Authentication apparatus and authentication method

The present invention is an authentication apparatus comprising: a prism of an approximately quadrangle-frustum shape, the prism of the approximately quadrangle-frustum shape is arranged so that a bottom side, out of two parallel surfaces of the prism of approximately quadrangle-frustum shape, is a placing surface side for a finger; a first imaging means is arranged below a top surface parallel to the bottom surface, the first imaging means that images an image of the finger transmitted through the top surface; a light source that radiates light to at least one side surface of a first set of side surfaces, out of two sets of side surfaces of the approximately quadrangle-frustum shape that face each other; and a second imaging means that images the image of the finger transmitted through a second set of side surfaces, out of the two sets of side surfaces.. .
Nec Corporation

Physical token based secured charge management of a user equipment

Embodiments for physical token based secured charge management of a user equipment (ue) by a processor. A power charging session is authorized by firmware of the ue for charging the ue upon detecting one or more physical authentication tokens within a selected area of a power charging source or on the power charging source itself, or combination thereof..
International Business Machines Corporation

Mobile, portable authenticating a security article and operating the portable authentication apparatus

A mobile, portable apparatus for authenticating, verification and certification of a security article, the apparatus comprising an enclosure securely housing components of the apparatus; an authentication device operable to authenticate the security article; a power source, preferably of solar type, different type of batteries, uninterruptable power supply, different type of charging facilities and/or any source of energy; an imaging device for simultaneously imaging in opposing and/or multiple directions; a programmable and configurable control panel; an information processing unit; and a printing device for printing and/or special marking on the security article, wherein the imaging device is portably coupled to the authentication device; and wherein the control panel is arranged as an interface command and control center connected to the information processing unit and the other components of the apparatus. The method involves determining whether a registered operator of the portable authentication apparatus is verified; and permitting access to an authentication device of the portable authentication apparatus if the registered operator is verified.
Sicpa Holding Sa

Voice authentication via secondary device

A user initiates a voice request to perform an operation with an external service and provides a voice credential for the operation. A determination is made as to whether the user has used a separate device from that which is associated with the voice request to log into the external service within a preceding amount of time before the voice request and/or within a succeeding amount of time following the voice request.
Ncr Corporation

Biometric identification device with removable card capabilities

A removable card-enabled bpid security device integrates a removable card reader with a biometric authentication component to provide secured access to electronic systems. The device allows for an individual to insert a removable card into an aperture in the physical enclosure of the bpid security device, allowing the removable card and the bpid security device to electronically communicate with each other.
1perfectid, Inc.

System, device, and secure utilization of fingerprints for user authentication

System, device, and method of secure utilization of fingerprints for user authentication. A method includes: capturing a fingerprint that a particular user provides to an electronic device; generating a raw fingerprint signature that corresponds to bodily features of the fingerprint of the particular user; monitoring user interactions of the particular user, during the capturing of the raw fingerprint, via one or more input units of the electronic device; extracting from the monitored user interactions a user-specific characteristic that is user-specific to the interactions of the particular user; generating a user-specific reference fused data-item, by utilizing both: (i) the raw fingerprint signature that was generated, and (ii) the user-specific characteristic that was extracted; subsequently, utilizing the reference fused data-item as a reference for user-authentication..
Biocatch Ltd.

Multi-biometric authentication

A method (100) of authenticating a subject (21) using a plurality of biometric traits, comprising: determining (110) a first data set representative of a first biometric trait that is based on at least one of iris pattern or iris colour of the subject; determining (120) a second data set representative of a second biometric trait that is based on a corneal surface of the subject; comparing (130) the first data set representative of the first biometric trait with a first reference and the second data set representative of the second biometric trait with a second reference; and authenticating (140) an identity of the subject based on the comparison.. .
Wavefront Biometric Technologies Pty Limited

Sensor-based authentication

Embodiments of the present disclosure relate to a new approach for sensor-based authentication to enhance mobile security. In the computer-implemented method, motion related sensor data is obtained.
International Business Machines Corporation

Security device, methods, and systems for continuous authentication

Methods, systems, and computer programs are presented for securing a computing device. One security device includes a processor, memory and a connector.
Nss Lab Works Llc

Authentication system

A system and method for authentication are described herein. An authentication request is received at a combiner proxy (350).
Hewlett-packard Development Company, L.p.

Image forming apparatus and communication system

A login management portion performs user authentication on the basis of a user id and allows login of a user. A transfer control portion transmits, to a predetermined call transfer control device, a transfer setting request for causing a voice communication device to change an incoming call destination of a telephone number that corresponds to the user id of the user whose login has been allowed.
Kyocera Document Solutions Inc.

Unmanned aircraft systems (uas) robotic-platform (drone) management

An unmanned aircraft systems (uas), automated management method is invented for civilian unmanned aerial vehicle (uav) safe, controlled and accountable deployments. The method includes an attachable electronic module, use of a computerized networked enterprise (cloud), biometric operator authentication, all of which provides automated identification, gps tracking location data and recording of all relevant information.

Nanoparticle-serialized oligonucleotide methods, compositions, and articles

The disclosure relates to the use of nanoparticles that are coated with unique oligonucleotide (e.g., dna) sequences of various base lengths (“nano-dna”) that act as barcodes for product authentication, product serialization, brand protection, track-and-trace, intelligent supply chain, and law enforcement. The nano-dna can be incorporated into inks, dyes, resins, labels, and other markings at all manufacturing levels, including the product (unit) level, to encode company and product-specific information.
Board Of Trustees Of Michigan State University

Method, apparatus and computer program product for providing sensor data collection and sensor configuration

A method, apparatus and computer program product provide data collection via a plurality of sensors, user authentication, data storage, and sensor replacement and configuration. The sensors may be integrated in or on various types of devices and/or household objects and may provide a wide range of data regarding users, use of the respective items, and/or their environments.
Nokia Technologies Oy

Building automation systems for online, offline, and hybrid licensing of distributed edge devices

A heating ventilation and air conditioning (hvac) system for a building space includes an hvac device including a processing circuit. The processing circuit is configured to generate an encrypted dynamic key based on a manifest stored on the device.
Johnson Controls Technology Company

Ground station and tether for unmanned aerial vehicles

An unmanned aerial vehicle system includes a ground station including a case, a power supply housed in the case, and a tether having a first end and a second end opposite to the first end. The first end of the tether is coupled to the case.
Stabilis Inc.

Replaceable item authentication

A replaceable item for a host device includes a non-volatile memory and logic. The non-volatile memory stores passwords or authentication values, and/or a cryptographic key.
Hewlett-packard Development Company, L.p.

Method for starting inter-frequency measurement and related device

A method for starting inter-frequency measurement is provided. The method is applied to an inter-frequency network, the inter-frequency network includes a first base station and a second base station, there is an overlapping area between a signal coverage area of the first base station and a signal coverage area of the second base station, and an access priority of the second base station is higher than an access priority of the first base station; user equipment accesses the first base station; a distance between the second base station and an ap is less than a first distance threshold, and the ap is controlled by an ac.
Huawei Technologies Co., Ltd.

Method and securing timing packets over untrusted packet transport network

Methods, devices, systems, techniques, and computer program products are provided to secure timing synchronization to network nodes connected over an inherently insecure best effort public network with mechanisms to improve accuracy of timing protocols such as a statistically estimated edge timestamp offset encoded into the timing message to account for network jitter and processing latency variances incurred due to the security packet processing and encryption; to ensure slave network nodes shall only accept timing messages from trusted timing sources; to establish a secure tunnel with a trusted timing source for exchange of timing packets; to provide authentication and security for timing packets over the insecure public network; and to enhance message anonymity with variable payload padding.. .
Nokia Solutions And Networks Oy

Systems, apparatuses, and methods for secure beacon authentication via mobile devices

Systems, apparatuses, and methods for secure beacon authentication via mobile devices are disclosed. In some example embodiments, a verification element comprises: a memory storing a plurality of non-repeated verification codes; a wireless broadcast element; and a processing circuit electronically coupled to the memory and the wireless broadcast element, the processing circuit being configured to retrieve one of the non-repeated verification codes from the memory and to transfer the non-repeated verification code to the wireless broadcast element, the wireless broadcast element being configured to wirelessly broadcast the non-repeated verification code to a plurality of mobile devices for individual verification of the plurality of mobile devices, the non-repeated verification code being different than any other non-repeated verification code previously retrieved from the memory and used for individual verification of the plurality of mobile devices..
Inmarket Media Llc

Systems, apparatuses, and methods for secure beacon authentication via mobile devices

Systems, apparatuses, and methods for secure beacon authentication via mobile devices are disclosed. In some example embodiments, a verification element comprises: a memory storing a plurality of non-repeated verification codes; a wireless broadcast element; and a processing circuit electronically coupled to the memory and the wireless broadcast element, the processing circuit being configured to retrieve one of the non-repeated verification codes from the memory and to transfer the non-repeated verification code to the wireless broadcast element, the wireless broadcast element being configured to wirelessly broadcast the non-repeated verification code to a plurality of mobile devices for individual verification of the plurality of mobile devices, the non-repeated verification code being different than any other non-repeated verification code previously retrieved from the memory and used for individual verification of the plurality of mobile devices..
Inmarket Media Llc

Communication control apparatus, system, and method therefor

In a communication control method for wireless communication between a first communication device and a second communication device through a wireless communication unit, identification information is notified from the second communication device to the first communication device by using a communication unit other than the wireless communication unit. Wireless communication between the first and second communication devices is performed by the wireless communication unit using the first communication parameter shared in advance, and authentication processing based on identification information is performed.
Canon Kabushiki Kaisha

Method and connection between electronic devices

Disclosed are a method and an apparatus for connecting electronic devices based on biometric information without a certification server. An electronic device includes a wireless communication unit configured to perform wireless communication with an external device; a biometric recognition module; a memory; and a processor connected to the wireless communication unit, the biometric recognition module, and the memory.
Samsung Electronics Co., Ltd.

Methods, systems, and media for recommending collaborators of media content based on authenticated media content input

Methods, systems, and media for recommending collaborators of media content based on authenticated media content input are provided. In some implementations, the method comprises: receiving a request from a content creator to initiate presentation of broadcasted media content using a media device, wherein the request invites a plurality of users to participate in the broadcasted media content; determining that a user of the plurality of users has interacted with the broadcasted media content, wherein the user has been permitted to interact with the broadcasted media content in response to providing user authentication information; determining collaborator information associated with the user based on the user authentication information; and automatically causing, without user interaction, the determined collaborator information to be presented to the content creator for associating with the broadcasted media content..
Google Llc

Method and infrastructure for synchronized streaming of content

Systems and methods for synchronizing the playback of network media across multiple content playback devices, termed herein as “playback devices”, “clients”, or “client devices”. In one implementation, client devices are controlled to parse and buffer media content separately.
Sony Network Entertainment International Llc

Network based call authentication

A device may receive, from a network device, a resolution query associated with a call. The resolution query may include a device identifier of the network device.
Verizon Patent And Licensing Inc.

Secure controlling of vehicle components in a telecommunication network

A telecommunication network, an authentication node, and a method for commissioning an electronically controllable vehicle component of a telecommunication network. For commissioning, the vehicle component requires a verification of authentication data that are to be acquired.
Robert Bosch Gmbh

Securing ordered resource access

Ordered access to resources is controlled by restricting access to additional resources that are accessible when a client device provides an authentication provided when accessing an initial resource. When the client device accesses the initial resources, a set of access parameters are identified describing the request and the client device providing the request, and included with an expiration time in generating a token.
Perimeterx, Inc.

Peer to peer enterprise file sharing

Disclosed are various embodiments for facilitating the distribution of files from a file repository. Files from a file repository can be distributed via peer to peer transmissions where the peer devices can perform authentication functions.
Airwatch Llc

Peer to peer enterprise file sharing

Disclosed are various embodiments for facilitating the distribution of files from a file repository. Files from a file repository can be distributed via peer to peer transmissions where the peer devices can perform authentication functions.
Airwatch Llc

Peer to peer enterprise file sharing

Disclosed are various embodiments for facilitating the distribution of files from a file repository. Files from a file repository can be distributed via peer to peer transmissions where the peer devices can perform authentication functions.
Airwatch Llc

Rfid authentication architecture and methods for rfid authentication

A method for mutual authentication in an rfid system comprising an rfid reader and an rfid tag, the method comprising requesting an identification from the tag, receiving the identification, using the received identification to select a password associated with the identification, generating a password key based on the selected password, encrypting the selected password using the password key, and transmitting the encrypted password to the tag.. .
Neology, Inc.

Method of mutual authentication between agent and data manager in u-health environment

Disclosed is a method of mutual authentication between an agent and a data manager in a u-health environment, in which the agent performs identification recognition using an identification (id) of the agent, i.e., a system-id, a secret key, encryption, and a one-time use random number generator, instead of using biometric scan data of an existing ieee 11073 agent, and hence bidirectional authentication, rather than unidirectional authentication, is allowed.. .
Industry-academic Cooperation Foundation Halla University

Automatic association of authentication credentials with biometrics

A computing device may receive authentication information. Within a time-out period, a fingerprint may also be received.
Apple Inc.

A authenticating a user when logging in at an online service

Provided is a method for authenticating a user when logging in at an online service, where the online service is provided by a server arrangement and the method is based on a communication between the online service and a primary device and between the online service and a secondary device. The method comprising the following steps: a user identification specified by the user at the secondary device and not including any credential is received by the online service; an authentication request is transmitted by the online service to the primary device where the primary device is associated with the user identification; an authentication response comprising at least one credential is transmitted by the primary device to the online service, where the at least one credential originates from a storage in the primary device and is only transmitted through the authentication response upon a successful local authentication of the user at the primary device..
Siemens Aktiengesellschaft

Authentication-free configuration for service controllers

Embodiments generally relate to out-of-band management of a computing system. The present technology discloses enable a primary service controller to provide a centralized configuration of multiple secondary service controllers so that they can share a same configuration.
Quanta Computer Inc.

Private simultaneous authentication of equals

A passphrase is assigned to an end user device for use in authenticating the end user device for a network using sae. An identification of the end user device is determined during an authentication process.
Aerohive Networks, Inc.

Systems and methods for generating multi-dimensional password and authenticating thereof

Systems and methods for multi-dimensional password generation and authentication is provided. The method includes selecting a virtual reality (vr) environment, rendering interactive objects in the vr environment, tracking a first set of activities including user behavior, user interaction with the objects, and changes made to the objects, the behavior including user position(s), head rotation, time spent on a particular position, gps coordinates, and the changes include one of position, shape, color, and rotation of the objects.
Tata Consultancy Services Limited

Systems and methods to authenticate users and/or control access made by users on a computer network using a graph score

A controller for user authentication and access control, configured to: store data representing a graph having: nodes representing data elements associated with accesses made using an access token; and links among the nodes representing connections between the data elements identified in details of the accesses. In response to receiving details of an access made using the access token, the controller updates the graph according to the details and determines a plurality of measurements of the graph.
Idm Global, Inc.

Abstracting an authentication sequence using http

An enterprise server is provisioned with an authentication response language, where the authentication response language allows the enterprise server to issue instructions for authentication steps to an enterprise client, which enables the enterprise client to execute a set of instructions for navigating an authentication sequence. The set of instructions installed into and served by the enterprise server varies depending on a protocol inherently used by the authentication topology.
International Business Machines Corporation

Authenticating mobile applications using policy files

Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, via a first server, a key pair and a policy file associated with a mobile service from a second server.
International Business Machines Corporation

System and associated software for providing advanced data protections in a defense-in-depth system by integrating multi-factor authentication with cryptographic offloading

The advanced data protection system is implemented by distributing data encryption across multiple isolated computing systems and using multi-factor authentication to access remote, protected decryption material. Architectural components include: client application software reading/writing from/to a client data store executing on a client host computer, client application plug-ins communicating with external authentication devices, server application software reading/write data from/to a server data store executing on a host computer which is physically or virtually isolated from the client host computer, authentication devices, components, or systems integrated with or connected to the client computer and exposing programmatic interfaces to client application software, and secure networking components executing on both hosts that provide secure data exchange.
Definitive Data Security, Inc.

Federated mobile device management

In one example of federated mobile device management, a first management server federates with a second management server based on an exchange of one or more identity authentication certificates between them. After the first and second management servers have federated or affiliated, they can exchange mobile device management data, including compliance policies, rules, resources, etc., with each other.
Airwatch Llc

Device provisioning protocol (dpp) using assisted bootstrapping

This disclosure provides systems, methods and apparatus, including computer programs encoded on computer storage media, for enhancing a device provisioning protocol (dpp) with assisted bootstrapping. In one aspect, a configurator device can provision an enrollee device for a network with the assistance of an intermediary device.
Qualcomm Incorporated

Methods for header extension preservation, security, authentication, and protocol translation for rtp over mprtp

Systems, methods, and devices of the various embodiments provide for header extension preservation, security, authentication, and/or protocol translation for multipath real-time transport protocol (mprtp). Various embodiments include methods that may be implemented in a processor of a computing device for mprtp transmission of real-time transport protocol (rtp) packets.
Qualcomm Incorporated

Transaction authentication based on contextual data presentation

Methods, devices, and systems are provided for approving a transaction through an exchange of presented user contextual approval information and approval decryption. The user contextual approval information is generated by a user during a transaction, cryptographically signed, and provided to a transaction server.
Assa Abloy Ab

Replaceable item authentication

A replaceable item for a host device includes a non-volatile memory and logic. The non-volatile memory stores passwords or authentication values, and/or a cryptographic key.
Hewlett-packard Development Company, L.p.

System and authenticating electronic content

The present invention provides for an authenticity marker to be embedded within web page and/or email content which allows a user to validate that the content originates from the true source of the content and is not merely a copy. The method includes a user requesting content in the form of a web page and/or email from a server using a web browser or email client.
Secure Axcess Llc

Key agreement for wireless communication

Methods, systems, and computer programs for performing key agreement operations in a communication system are described. In some aspects, a wireless network operator receives a mobile device identifier and accesses a secret key associated with the mobile device.
Certicom Corp.

Method and system for quantum key distribution based on trusted computing

One embodiment described herein provides a system and method for negotiating quantum data keys between first and second entities. During operation, the system performs a mutual authentication between the first and second entities.
Alibaba Group Holding Limited

Multi-application personal health record microprocessor card

A personal health record card for storing instantly accessible medical information pertaining to the individual associated with the personal health record card is provided. The memory device for storing an individual's personal health information, said memory device comprising: a memory that stores computer readable data, said memory storing: a primary information section comprising information that identifies the individual associated with the memory device and basic information related to the identity of the individual, the primary information accessible by a memory device reader without any authentication; a secondary information section comprising a first level of the individual's sensitive and confidential health information, said secondary information section being accessible only by the memory device reader after authentication; and optionally, a tertiary information section comprising a second level of the individual's sensitive and confidential health information, said tertiary information section being accessible only by the memory device reader after a second level of authentication..
Scs Card Technology Inc.

Decoding of encoded audio bitstream with metadata container located in reserved data space

Apparatus and methods for generating an encoded audio bitstream, including by including program loudness metadata and audio data in the bitstream, and optionally also program boundary metadata in at least one segment (e.g., frame) of the bitstream. Other aspects are apparatus and methods for decoding such a bitstream, e.g., including by performing adaptive loudness processing of the audio data of an audio program indicated by the bitstream, or authentication and/or validation of metadata and/or audio data of such an audio program.
Dolby Laboratories Licensing Corporation

Virtual assistant configured by selection of wake-up phrase

A speech-enabled dialog system responds to a plurality of wake-up phrases. Based on which wake-up phrase is detected, the system's configuration is modified accordingly.
Soundhound, Inc.

Storage container with inventory control

Systems and methods of the invention relate to managing an inventory of items within a storage container. A storage container can house one or more items for distribution among one or more users such as, for instance, employees.
3 Strike, Llc

Method and system for providing telematics services to a machine device

A vehicle processing device authenticates that an authorized user has requested an action by the vehicle, and generates an authentication acknowledgement message. At least two security devices being present within the cabin of, or close to, the vehicle during a predetermined period following an authentication trigger event that occurs while the user performs a predetermined sequence of authentication activities (i.e., button presses, operating the vehicle or a part of it, etc.) provides a basis for the authentication acknowledgement message.
M2md Technologies, Inc.

Access monitoring system for remote locations

A system for compliance monitoring of a user of a monitored location is provided. The system includes at least one checkpoint monitor installed in the monitored location and a system server at a monitoring center being configured to be in communication with each checkpoint monitor via a network.
Wellfence Llc

System and classification and authentication of identification documents using a machine learning based convolutional neural network

The present disclosure describes systems and methods to classify and authenticate id documents based on the information contained on the face of the id document. This present system can automatically classify, authenticate, and extracting data from documents using artificial intelligence (ai) based machine learning for image recognition.
Confirm, Inc.

Augmented reality device and product purchase facilitation

An augmented reality device and method for product purchase facilitation using an augmented reality device are provided. The device includes a display module configured to provide augmented reality visual content, the augmented reality visual content including a virtual image of a product, a biometric authentication module configured to receive biometric data relating to a user and authenticate the user based on the received biometric data, and a transceiver module configured to receive, from a user device, digital payment credentials for facilitating purchase of the product, and transmit the digital payment credentials to a payment processing module for product purchase upon successful authentication of the user..
Mastercard Asia/pacific Pte. Ltd.

Open registry for provenance and tracking of goods in the supply chain

An identity system for the internet of things (iot) that enables users and machines to identify, authenticate and interact with items/goods without relying on a third-party-controlled authentication service. The system includes tags having alphanumeric values and coupled to items/goods and an open registry database and ledger where digital records associated with the items/goods is able to be stored.
Chronicled, Inc

Secure encryption using genomic information

The invention provides an improved genomics-based method and apparatus for identification, authentication, and verification. Genomic information from an individual's genome, is used as an encryption key in methods, systems and apparatus for transmitting data in an encrypted fashion.
Systems Imagination, Inc.

Fingerprint recognition card and operating fingerprint recognition card

A fingerprint recognition card includes a first region configured to receive power from a battery of the fingerprint recognition card, supply the power supplied from the battery to a second region in response to an input of a power button of the fingerprint recognition card, and control activation of a third region based on a fingerprint authentication result provided from the second region, the second region configured to be activated in response to the power supplied from the first region and include a fingerprint sensor configured to sense a fingerprint input by a user of the fingerprint recognition card and the third region configured to be activated based on the control of the first region.. .
Kona I Co., Ltd.

Systems and methods for authenticating a user using private network credentials

A cardholder authentication computing device for authenticating user computing devices during online payment transactions are provided. The cardholder authentication computing device leverages pre-authentication of a user by a private network to facilitate authentication of a user in the context of an online payment transaction between the user and a merchant.
Mastercard International Incorporated

Systems and methods for contactless and secure data transfer

In one embodiment, a method comprises receiving a unique identifier from an item and sending a communication to an electronic device requesting that a user confirm a pending transaction, receiving input from the electronic device associated, and sending the received input to an authentication system for completing a transaction. In another embodiment, a system comprises a sensor, an authentication system, and a transaction processing system.
Capital One Services, Llc

Location-based device and authentication system

Systems and methods for device and payment management include detecting, through a first network, that a user device that is associated with a user is located at a trusted location. A first anticipated activity that is associated with the user is determined.
Paypal, Inc.

Authentication feature in a barcode

A method for serializing products using a barcode and checking authenticity of barcodes. A printing modification introduces an authentication feature into the barcode.
Hicof Inc.

Authentication systems and methods

A system includes a first computing device having a first non-transitory machine-readable storage medium, first communication circuitry, and at least one first processor in communication with the first non-transitory machine-readable storage medium and the first communication circuitry. The at least one first processor is configured to execute instructions stored in the first non-transitory machine-readable storage medium to cause the first communication circuitry to receive a first signal from a first transmission medium, calculate a first authentication value for an object based on data included in the first signal, and cause the first communication circuitry to transmit a second signal to the first transmission medium.
Ark Ideaz, Inc.

Disabling counterfeit cartridges

A method for disabling counterfeit cartridge operation is provided. The method includes detecting a cartridge in a blade enclosure.
Hewlett Packard Enterprise Development Lp

Resolving detected access anomalies in a dispersed storage network

A method for execution by a storage unit of a dispersed storage network includes receiving an access request from a requestor. An access anomaly of the access request is detected, and the access request is queued for processing in response.
International Business Machines Corporation

System and signature pathway authentication and identification

A computer-implemented security system and method provides signature pathway authentication and identification. The system and method include establishing a user-defined cognitive signature pathway through multiple graphical zones of a graphical user interface.
Passtouch, Llc

Method for generating a signed electronic document with an anti-tamper function

A method is to be implemented by a network server, and includes: receiving input information associated with a handwritten signature inputted on an original document, and a dynamic image associated with a motion of a signer during input of the handwritten signature; compiling a signed document based on the original document, the input information and the dynamic image; generating an authentication value based on a location where the handwritten signature is rendered on the signed document and a location where the dynamic image is rendered on the signed document; and incorporating the authentication value into the signed document to result in an anti-tamper document.. .
Thinkcloud Digital Technology Co., Ltd.

Service control and user identity authentication based on virtual reality

A method for service control and user identity authentication includes recognizing a voice command of a virtual reality (vr) device user for initiating a service supported by a vr application, using a biometric sensor to collect one or more biometric characteristics of the vr device user, performing user identity authentication based on the collected one or more biometric characteristics, and communicating with a server that provides the service for performing the service if the user identity authentication is successful.. .
Alibaba Group Holding Limited

User identity authentication using virtual reality

A method for user identity authentication using virtual reality includes presenting one or more virtual elements on a virtual reality (vr) scenario of a vr application for initiating a service, identifying, using one or more sensors communicably coupled to the vr device, one or more interactive operations of a user of the vr device with the one or more virtual elements, determining whether the one or more interactive operations match one or more predetermined operations for selecting the one or more virtual elements to initiate the service and trigger biometric authentication for user identity authentication, invoking biometric authentication if the one or more interactive operations match one or more predetermined operations, presenting a virtual guidance in the vr scenario for guiding the user to perform the biometric authentication, and presenting a service interface to the user if the biometric authentication is successful.. .
Alibaba Group Holding Limited

User authentication persistence

Methods and apparatuses for user authentication are described. In one example, an active condition of an authenticator device is detected and the identity of the user is authenticated.
Plantronics, Inc.

Direct authentication system and method via trusted authenticators

Systems and methods are provided for enabling online entities to determine whether a user is truly the person who he says using a “two-factor” authentication technique and authenticating customer's identity utilizing a trusted authenticator.. .

Secure data replication

One or more techniques and/or computing devices are provided for secure data replication. For example, a first storage controller may host first storage within which storage resources (e.g., files, logical unit numbers (luns), volumes, etc.) are stored.
Netapp Inc.

Detection and identification of a human from characteristic signals

One or more sensors are configured for detection of characteristics of moving objects and living subjects for human identification or authentication. One or more processors, such as in a system of sensors or that control a sensor, may be configured to process signals from the one or more sensors to identify a person.
Resmed Sensor Technologies Limited

Biometric-electronic key system

A biometric-electronic key system includes an electronic key that stores an electronic key id and a communication peer that is capable of performing wireless communication with the electronic key id. A non-accomplishment notification unit presents the user with a non-accomplishment notification of the biometric authentication when the biometric authentication cannot be accomplished.
Kabushiki Kaisha Tokai Rika Denki Seisakusho

Lens-based security features with multiple lenses dedicated to individual colors for currency and brand authentication

Products, such as branding labels, credit cards, and currency, that are fabricated so as to include an optical security element, which is designed to provide enhanced optical focusing onto each color used in the printed image (or in the ink layer). The optical security assembly may include a carrier film or substrate.
Lumenco, Llc

Authentication for x-ray imaging components

A communication channel for an x-ray imaging system may operatively couple a first imaging component to a second imaging component. The communication channel may include a first connector configured to couple to the first imaging component, a second connector configured to couple to the second imaging component, and a first authentication module configured to authenticate with the second imaging component..
Varex Imaging Corporation

Optical chaos based wireless device fingerprinting

A computer-implemented method for authenticating an access point attempting to access a wireless network is presented. The computer-implemented method includes receiving an authentication challenge from the access point, analyzing the authentication challenge at a wireless node by using an optical chaos generation module having an optical section and a radio frequency (rf) section to facilitate reproducibility, unpredictability, and unclonability of challenge-response pairs, and transmitting an authentication response to the access point..
Nec Laboratories America, Inc.

System and connecting a wi-fi product to a wi-fi network

Disclosed is a method and system for connecting a wi-fi product to an available wi-fi network using a bluetooth connection. The method includes connecting, the wi-fi product to an electronic device through the bluetooth connection, inputting, an authentication credentials related to the available wi-fi network over the electronic device by a user, where the input of the authentication credentials is facilitated by an application residing on a memory medium of the electronic device, sending, by the electronic device, the authentication credentials to bluetooth module of the wi-fi product, sending, by the bluetooth module, the authentication credentials to a wi-fi module configured in the at least one wi-fi product and communicatively linked with the bluetooth module, and registering, the authentication credentials with the available wi-fi network for connecting the wi-fi module to the available wi-fi network..

Connectivity to a core network via an access network

Methods, systems, and devices for wireless communications are described that supports connectivity to a core network via an access network. A user equipment (ue) may establish connectivity with an access network and perform a discovery procedure to identify and select a packet data gateway that provides connectivity to a core network via a core network node.
Qualcomm Incorporated

Method and system for reporting a short message capability via an ip multimedia subsystem

A method and apparatus for operation by a base station are provided. The base station may be configured to receive a request for attachment from a wtru and transmit and receive authentication messages between the wtru and a cellular core network including an hlr.
Interdigital Technology Corporation

System for location based authentication

Embodiments of the present invention describe systems for authenticating an identity of a user or a mobile device of the user. As such, when an event associated with the user is determined to be occurring, an authentication code is generated but not immediately sent to the mobile device of the user.
Bank Of America Corporation

Method for providing content using a head-mounted device, system for executing the method, and content display device

A method of providing content using a head-mounted device. The method includes receiving, by a terminal configured to display a screen for logging in to the application, input of user identification information by a user, wherein the user identification information associates the user with a first application.
Colopl, Inc.

Application redirection system

Systems and methods for redirecting control of a process performed on a browser application on a user device accessing a web application to a native application on the user device include receiving, through a web application controlling a process, a request to perform an action (e.g., user authentication). A determination is made whether the request identifies a native application feature for completing the action that is preferable over a web application feature for completing the same action.
Paypal, Inc.

Authentication of client devices using modified images

Systems and methods for detecting phishing attacks and identifying attackers are described. In embodiments, a server system may modify a template image based on user information and provide the modified image to a user system with a login page.
Salesforce.com, Inc.

Automated data authentication and service authorization via cryptographic keys in a private blockchain

Embodiments of the present invention provide a system for authenticating records belonging to an individual or entity and providing authorized access of said records to service providers. Embodiments of the invention utilize a private blockchain to store various types of records to be conveyed to the service providers.
Bank Of America Corporation

Network authentication of a geo-fenced volume

Provided is a method for managing a software defined network using a software control layer to regulate a geo-fenced volume. The software control layer can use a global positioning system (gps) including a range of latitudes, a range of longitudes and a range of altitudes.
International Business Machines Corporation

User profile selection using contextual authentication

In embodiments, apparatuses, methods and storage media (transitory and non-transitory) are described that are associated with user profile selection using contextual authentication. In various embodiments, a first user of a computing device may be authenticated and have an access control state corresponding to a first user profile established, the computing device may select a second user profile based at least in part a changed user characteristic, and the computing device may present a resource based at least in part on the second user profile.
Intel Corporation

Providing a secure communication channel during active directory disaster recovery

A secure communication channel can be established between a recovery console and a recovery agent during an active directory disaster recovery. This secure channel can be established without employing the kerberos or ntlm authentication protocols.
Quest Software Inc.

Advanced local-network threat response

There are provided measures for enabling advanced local-network threat response. Such measures could exemplarily comprise receiving, at a local-network honeypot entity, a username/password related authentication data in relation to a login attempt to the honeypot entity, triggering a threat response operation at a local-network backend entity upon detection of the username/password related authentication data, the threat response operation comprising testing validity of the username/password related authentication data in one or more local accounts of the local-network, and in case the username/password related authentication data is detected to be valid for any account in the local-network, determining that said account is compromised and locking the compromised account..
F-secure Corporation

Communication control apparatus, communication control method, and recording medium

A communication unit and a controller are included, the communication unit being configured to communicate with a communication apparatus using a first communication procedure in which authentication of the communication apparatus is performed in order to retain a communication session with the communication apparatus and using a second communication procedure that does not require authentication of the communication apparatus in order to communicate with the communication apparatus, the controller being configured to perform, using the first communication procedure and the second communication procedure, control under which it is determined whether a communication session with the communication apparatus is to be retained and perform control under which a limit is put on retaining of the communication session with the communication apparatus through the second communication procedure in a case where the communication apparatus is not authenticated as a certain communication apparatus through the first communication procedure.. .
Canon Kabushiki Kaisha

Secure authentication to provide mobile access to shared network resources

Techniques to perform secure authentication to provide mobile access to shared content are disclosed. In various embodiments, a user credential associated with a request to access content is received at a connector node from a mobile application running on a mobile device.
Emc Ip Holding Company Llc

Identity data based on aggregating input data

A computing device, a system, and a method are provided to receive a number of inputs associated with one or more sensors of the computing device. One or more processors are configured to determine input data based on the number of inputs and authenticate a user account based on the input data.
Paypal, Inc.

Validating internet of things device firmware

A computer-implemented method validates internet of things (iot) device firmware levels for peer-to-peer communication in a network. Communication rules between a first device and a second device are utilized to establish a session to validate iot device firmware levels between the first device and the second device on a network.
International Business Machines Corporation

Multi-level authentication using phone application level data

Embodiments of the present invention provide a multi-level authentication system to provide an additional level of authentication using phone application level data. The system extracts application level data and generates a questionnaire based on the extracted application level data.
Bank Of America Corporation

Proxy-based access to remote database

Proxy-based access occurs between a cloud database and analytical client tool, without requiring a separate intervening application server. A client proxy (tool side) communicates exclusively with a server proxy (database side).
Sap Se

Sram-based authentication circuit

A memory device includes a memory block that includes a plurality of memory bits, wherein each bit is configured to present a first logical state; and an authentication circuit, coupled to the plurality of memory bits, wherein the authentication circuit is configured to access a first bit under either a reduced read margin or a reduced write margin condition to determine a stability of the first bit by detecting whether the first logical state flips to a second logical state, and based on the determined stability of at least the first bit, to generate a physically unclonable function (puf) signature.. .
Taiwan Semiconductor Manufacturing Co., Ltd.

Authentication of a new device by a trusted device

A method, computer program, apparatus, and system for authentication of devices in a network of devices, and more specifically to a challenge-response authentication in which one trusted device presents a question (“challenge”) and another party must provide a valid answer (“response”) to be authenticated. The challenge includes processing data by an application specific integrated circuit (asic)..
Axis Ab

Methods, systems and computer program products for data protection by policing processes accessing encrypted data

The described embodiments relate to data protection methods, systems, and computer program products. A process-based encrypted data access policing system is proposed based on methods of encrypted data file management, process authentication and authorization, trojan detection for authorized processes, encryption key generation and caching, and encrypted-file cache management.
Bicdroid Inc.

Validating internet of things device firmware using a peer-to-peer registry

A computer-implemented method validates internet of things (iot) device firmware levels for peer-to-peer communication in a network using a peer-to-peer registry. Each device in an iot is registered anonymously by utilizing a unique device identifier and a firmware level in a peer-to-peer registry.
International Business Machines Corporation

Method and system for accessing a device by a user

A system for authenticating a user accessing a device includes an authentication server and a ticket granting server. The authentication server is configured to generate a part of an authentication ticket which is combinable with at least one other part generated by at least one other authentication server to produce a complete authentication ticket, and to generate a part of a user session key which is combinable with at least one other part generated by the at least one other authentication server to produce a combined user session key.
Nec Europe Ltd.

Sram-based authentication circuit

A memory device includes a memory cell array comprising a plurality of memory cells wherein each of the plurality of memory cells is configured to be in a data state, and a physically unclonable function (puf) generator. The puf generator further includes a first sense amplifier, coupled to the plurality of memory cells, wherein while the plurality of memory cells are being accessed, the first sense amplifier is configured to compare accessing speeds of first and second memory cells of the plurality of memory cells, and based on the comparison, provide a first output signal for generating a first puf signature..
Taiwan Semiconductor Manufacturing Co., Ltd.

False alarm reduction

Techniques are described for reducing false alarms related to security and automation systems. One method includes receiving a request to activate a security function associated with a automation system, initiating a first security duration after a predetermined time associated with the received request, detecting an occurrence of an event associated with the automation system during the first security duration, initiating a second security duration based on the detecting, and broadcasting a message requesting authentication credentials at a location of the automation system during the second security duration..
Vivint, Inc.

Secure access control method with reader and mobile terminal, in particular such as a telephone terminal

A secure access control method is provided that uses secure access control readers having radiocommunication associated to a microcontroller in connection with a remote processing unit and radiocommunication mobile terminals carried by a user. The method includes emitting an announcement signal having security parameters defining access conditions to mobile terminals that determines and evaluates the power of each signal, notifying the mobile terminal of an access action by the user on the mobile terminal or close reader, and translating it by an access pass.
Systemes Et Technologies Identification (stid)

Frictionless access control system with user tracking and omni and dual probe directional antennas

An access control system includes a mesh network of nodes for tracking and authenticating users throughout a building. The nodes include wireless interfaces.
Sensormatic Electronics, Llc

Automated workflow access based on clinical user role and location

Systems, methods, computer-readable media for automating displays based on admissions, transfers, and discharges are provided. In embodiments, a location associated with a clinician is detected.
Cerner Innovation, Inc.

User and device authentication for web applications

A computing device supports a web authentication (webauthn) application program interface (api) that is configured to exposes functionalities that may substitute for those utilized in the emv (europay, mastercard, and visa) standard for transactions using smart payment instruments like debit and credit cards that include embedded computer chips. The functionality of the webauthn-compliant computing device is analogous to a physical card in the conventional chip and pin (personal identification number) where the chip serves as proof of payment device and the pin as proof of payment account holder..
Microsoft Technology Licensing, Llc

User and device authentication for web applications

A computing device, supporting a web browser and one or more biometric sensors for recognizing a device user by capturing biometric characteristics such as the user's face, iris, or fingerprints, is configured to enable web applications to authenticate the user using password-less or two-factor scenarios to enhance online security while reducing password risks such as password guessing, phishing, and keylogging attacks. The present user and device authentication enables online activities having high potential risks, such as online purchases, to be completed securely and conveniently by providing strong cryptographic proof of both the user and a computing device that is trusted by the user..
Microsoft Technology Licensing, Llc

User account management via a distributed ledger

User access to a set of data stored in a distributed ledger, wherein the distributed ledger is stored by a plurality of node computing entities, is provided. A first node computing entity receives a share key request indicating that a first user account has authorized a second user account to have access to a set of data stored in the distributed ledger.
Alphapoint

Active presence detection with depth sensing

In vision-based authentication platforms for secure resources such as computer systems, false positives and/or false negatives in the detection of walk-away events are reduced or eliminated by incorporating depth information into tracking authenticated system operators.. .

Method and system for countering ransomware

Methods, systems and computer readable media are provide for protecting stored data from ransomware. In an embodiment, the data is stored in an external drive connected to the processor.

Secure unattended network authentication

A system for secure network access by unattended devices is described. The system describes how unattended devices that have encrypted data at rest and/or require secure authentication to an open network may procure the access credentials for authentication and/or decryption.
Hand Held Products, Inc.

Hardening security images

Methods and systems are provided for electronic authentication. A modified electronic image is generated by altering at least a pixel of an electronic image.
Paypal, Inc.

Information processing apparatus determining propriety of use based on authentication result of fingerprint authentication process, control method therefor, and storage medium storing control program therefor

An information processing apparatus is capable of allowing an operation by a finger of which a fingerprint has not been registered, and of improving operability while holding security. A collating unit collates fingerprint information about a finger that touched a touch panel read by a reader unit with registered fingerprint information.
Canon Kabushiki Kaisha

Device to perform secure biometric authentication

Aspect may relate to a device that comprises a sensor and a first secure processor. The sensor may receive an input and generate raw data from the input.
Qualcomm Incorporated

Information processing apparatus, information processing method, and computer program

An information processing apparatus includes an authenticating unit, an acquiring unit, a first specifying unit, and a first display unit. The authenticating unit, when accepting first user information used for authentication of determining whether a user has an authority, compares the first user information and second user information identifying a user having the authority.
Ricoh Company, Ltd.

Authentication device, terminal device, image forming system, and non-transitory computer readable medium

An authentication device includes an input unit that inputs specific information of an application to be installed and specific information of an image forming device which is an installation destination, and a controller that collates the specific information of the application and the specific information of the image forming device with a database to output an authentication result indicating that authentication has been performed or has not been performed.. .
Fuji Xerox Co., Ltd.

Delegating control of a vehicle

An identification of a vehicle is received. An identification of a first user to receive delegation of control of the vehicle is received.
International Business Machines Corporation

Access and driver authentication system with increased security against relay attacks using movement sensor technology integrated into the authentication tool

An authentication system for vehicles that has a minimum of one authentication element for detecting a movement, vibration and/or inclination. An apparatus generates a movement, vibration and/or inclination.
Hella Kgaa Hueck & Co.

Supply authentication via timing challenge response

In an example implementation, a print supply cartridge comprises a microcontroller to receive a timing challenge and enable authentication of the cartridge by providing a challenge response. The challenge response is provided in a challenge response time that falls within an expected time window..
Hewlett-packard Development Company, L.p.

Communication device and terminal device

A communication device may supply connection information to a first wireless interface so as to store the connection information in an interface memory, establish a wireless connection via a second wireless interface with a terminal device by using the connection information after the connection information has been sent to the terminal device, execute a first authentication using first authentication information in a case where the first authentication information is received from the terminal device, send a first registration instruction to the terminal device by using the wireless connection via the second wireless interface in a case where the first authentication is successful, and execute a second authentication using the first authentication information in a case where the first authentication information which has been registered in the terminal device is received from the terminal device after the first registration instruction has been sent to the terminal device.. .
Brother Kogyo Kabushiki Kaisha

Data processing and authentication of light communication sources

Various systems and methods for identifying and performing authentication of visible light communications using optical camera communication techniques are described. In an example, an electronic processing system to authenticate a particular light emitting source includes electronic operations for: detecting, from image data, modulated light data emitted from a light emitting object, where the image data depicts the light emitting object, and where the image data is captured with an image sensor (e.g., of a camera); identifying, from the image data, the light emitting object as a source of the modulated light data; receiving an indication to select the light emitting object as an authenticated source of the modulated light data; and performing a command to process the modulated light data from the authenticated source, with the command performed in response to the indication to select the light emitting object as the authenticated source of the modulated light data..

System and secure pairing of bluetooth devices

A mobile device includes a bluetooth transceiver, the bluetooth transceiver being in an idle power state when not securely paired to a second bluetooth transceiver of a peripheral device. The mobile device further includes an audio interface, the audio interface coupled to the bluetooth transceiver, the audio interface configured to connect to a second audio interface of the peripheral device.
Bbpos Limited

Communication device and terminal device

A communication device may supply both identification information for identifying a specific application program and first authentication information to a wireless interface so as to store both the identification information and the first authentication information in an interface memory. The wireless interface may be configured to send both the identification information and the first authentication information in the interface memory to a first terminal device by using a first communication session.
Brother Kogyo Kabushiki Kaisha

Image forming apparatus and image forming system

In accordance with an embodiment, an image forming apparatus comprises a first image forming section configured to form an image with a visible image forming material; a second image forming section configured to form an image with an invisible image forming material; an image acquisition section configured to acquire a print image that should be printed on a medium as a printed matter; and a processor configured to acquire authentication information for authenticity determination added to the printed matter and carry out an image forming processing on not only the print image with the visible image forming material by the first image forming section but also the authentication information with the invisible image forming material by the second image forming section.. .
Toshiba Tec Kabushiki Kaisha

Cognitive authentication with employee onboarding

Embodiments include method, systems and computer program products for onboarding a new employee to an organization. Aspects include receiving, by a processor, employee data comprising an employee group associated with the new employee of the organization.
International Business Machines Corporation

Detection of compromised credentials as a network service

Techniques for detection of compromised credentials as a network service are disclosed. In some embodiments, a system, process, and/or computer program product for detection of compromised credentials as a network service includes monitoring a plurality of sessions at a firewall, logging a plurality of failed or timed out attempts to authenticate at the firewall in a log, analyzing the log for a pattern of failed or timed out attempts to authenticate at the firewall to identify potentially compromised credentials for authentication, and determining that a set of credentials for authentication have been compromised based on the analysis of the log..
Palo Alto Networks, Inc.

System and delegation of permissions to a third party

A system and method for delegating permissions to a third party are presented. A request to access a first computing resource of a computer server is received from a first user.
Go Daddy Operating Company, Llc

Distributed authentication with thresholds in iot devices

Managing authentication of a child device includes receiving, by a host device, sensor data from a child device, deriving simplified authentication data from the sensor data based on a capability of the child device, storing the simplified authentication data in an authentication profile for the child device, and transmitting the simplified authentication data to the child device, wherein the simplified authentication data is sufficient to allow the child device to authenticate a user without the host device.. .
Mcafee, Inc.

Method and performing initial access procedure based on authentication in wireless communication system

In the present invention, a method and an apparatus for performing initial access procedure based on authentication in a wireless communication system are disclosed. The method may comprise generating a pseudo permanent identifier based on a permanent identifier of the user equipment, transmitting, to a first authentication entity, a first message including the pseudo permanent identifier and an index of a specification authentication key, receiving, from the first authentication entity, a second message including a first mac for at least one a first new authentication key generated by a second authentication entity or a first increased counter at the second authentication entity for a specific authentication counter, and transmitting, to the first authentication entity, a third message including a second mac for at least one a second new authentication key generated by the user equipment or a second increased counter at the user equipment for the specific authentication counter..
Lg Electronics Inc.

Multi factor user authentication on multiple devices

Systems and methods of the present invention provide for a first and second client computer configured to receive and transmit an authentication credential and at least one additional authentication credential respectively. The authentication credentials may be selected from authentication credentials known only to a user, identifying a client computer and/or identifying a characteristic unique to the user.
Go Daddy Operating Company, Llc

Pharmacy authentication methods and systems

An electronic image that includes information identifying a user of a client device is received, as is another electronic image that captures the face of the user. A first account (e.g., a store account) is linked to a second account (e.g., a pharmacy account) if an image of the user extracted from the first electronic image matches the face of the user..
Cvs Pharmacy, Inc.

Driver identification and authentication systems and methods

A method for processing a security authorization is disclosed. The method comprises capturing biometric data with a scanning apparatus of the authentication system and comparing the biometric data to authentication data.
Gentex Corporation

Policy enforcement of client devices

A method may include sending, by a client device, an access request to an authentication server device. The access request may include a request to access an administered resource.
Google Llc

Method, system and device for generating, storing, using, and validating nfc tags and data

A smart tag and methods of interacting with and authenticating interactions with the same are provided. The smart tag is enabled to generate a tag authentication cryptogram (tac) and include the tac in response to a read request.
Assa Abloy Ab

Location determination for user authentication

User authentication techniques based on geographical locations associated with a client device are provided. An example method for authentication of the client device includes receiving an authentication request from the client device.
A10 Networks, Inc.

Shared terminal and display control method

A shared terminal includes circuitry, a receiver, and a transmitter. The circuitry accepts a turning-on to a power switch of the shared terminal that has been turned off, obtains specific terminal identification information for identifying the specific privately-owned terminal.

Timing array as credentials

A multi-dimensional approach can be used to verify a password. In addition to requiring the input of the correct password, the timing at which the characters of the password are input can be determined and compared to stored timing values.

Secondary authentication using user's login status

A method is described for storing a plurality of access tokens, each access token associated with a respective login credential of a plurality of login credentials, and each access token usable to access a respective account of a plurality of accounts of a user. The method further comprising receiving a transaction request from the user for a transaction with a target account and determining a respective user login status of the user for ones of the plurality of accounts using respective access tokens.
Ca, Inc.

Method and system for securely transmitting volumes into cloud

A first computing device is provided for transmitting one or more volumes via a secured connection. The first computing device includes a controller that is executable by one or more processors and is configured to instruct a cloud computing device to generate a worker virtual machine.
Citrix Systems, Inc.

Systems and methods to authenticate users and/or control access made by users on a computer network based on scanning elements for inspection according to changes made in a relation graph

A controller for user authentication and access control, configured to: store data representing a graph having: nodes representing data elements associated with accesses made using an access token; and links among the nodes representing connections between the data elements identified in details of the accesses. In response to receiving details of an access made using the access token, the controller updates the graph according to the details and identifies changes in the graph resulting from update.
Idm Global, Inc.

Time-based network authentication challenges

Techniques for time-based network authentication challenges are disclosed. In some embodiments, a system, process, and/or computer program product for time-based network authentication challenges includes monitoring a session at a firewall to identify a user associated with the session, generating a timestamp for an authentication factor associated with the user after the user successfully authenticates for access to a resource based on an authentication profile, intercepting another request from the user for access to the resource at the firewall, and determining whether the timestamp for the authentication factor is expired based on the authentication profile..
Palo Alto Networks, Inc.

Intercept-based multifactor authentication enrollment of clients as a network service

Techniques for intercept-based multifactor authentication client enrollment as a network service are disclosed. In some embodiments, a system, process, and/or computer program product for intercept-based multifactor authentication client enrollment as a network service includes monitoring a session at a firewall, intercepting a request for access to a resource while monitoring the session at the firewall, determining that a user associated with the session is not enrolled for multifactor authentication, and initiating enrollment of the user for the multifactor authentication..
Palo Alto Networks, Inc.

Multifactor authentication as a network service

Techniques for multifactor authentication as a network service are disclosed. In some embodiments, a system, process, and/or computer program product for multifactor authentication as a network service includes monitoring a session at a firewall, applying an authentication profile based on the new session, and performing an action based on the authentication profile..
Palo Alto Networks, Inc.

Mobile authentication interoperability for digital certificates

A system and method for integrating hierarchical authentication systems and non-hierarchical authentication systems. The system and method is provided in one configuration as a mobile app that functions to allow a mobile device to access highly sensitive data while simultaneously ensuring a highly secured environment utilizing both hierarchical authentication systems and non-hierarchical authentication systems to provide a highly reliable authentication process..

Techniques for secure authentication

Various embodiments are generally directed to techniques for secure message authentication and digital signatures, such as with a cipher-based hash function, for instance. Some embodiments are particularly directed to a secure authentication system that implements various aspects of the cipher-based hash function in dedicated hardware or circuitry.
Intel Corporation

Authenticator, authenticatee and authentication method

According to one embodiment, an authenticator which authenticates an authenticatee, which stores first key information (nkey) that is hidden, includes a memory configured to store second key information (hkey) which is hidden, a random number generation module configured to generate random number information, and a data generation module configured to generate a session key (skey) by using the second key information (hkey) and the random number information. The authenticator is configured such that the second key information (hkey) is generated from the first key information (nkey) but the first key information (nkey) is not generated from the second key information (hkey)..
Toshiba Memory Corporation

Visible light communication of an access credential in an access control system

Methods and systems relating to communication of authentication information in an access control system are disclosed. The authentication information is transmitted to an electronic locking device configured to restrict access to an entry point of the access control system.
Videx, Inc.

Cloud-based connectivity tool and method

A method for conducting a survey or poll includes receiving authentication data from a plurality of users. The received authentication data is evaluated for each user to determine if the authentication data is valid.
Pollmole Corporation

Personal authentication apparatus system and method

A target authentication device includes an electrode to detect an electrical signal associated with a user of the device. The electrical signal represents an authentication code for the device.
Proteus Digital Health, Inc.

Method for safely unlocking and/or locking a vehicle

A method for securely wirelessly unlocking and/or locking a vehicle using a mobile radio including detecting a motion interaction or audio interaction of a user on or with the mobile radio and accessing, in a memory device of the mobile radio, a characteristic user interaction that corresponds to a vehicle opening command. The method further includes establishing whether the user interaction matches the characteristic user interaction and, if there is a match, responding to an authentication request from the vehicle that has been obtained by the mobile radio with an encrypted response message that is sufficient to unlock the vehicle..
Volkswagen Ag

Systems and methods for biometric identity authentication

A method for authenticating a user identity for a data transaction is provided. The method is implemented using an identity authentication computing device in connection with a memory and a data transaction processor.
Mastercard International Incorporated

Electronic transaction verification system with biometric authentication

An electronic transaction verification system for use with transaction tokens such as checks, credit cards, debit cards, and smart cards that gathers and transmits information about the transaction token and biometric data. Customers can be enrolled in the system by receiving customer information that includes at least a biometric datum, associating the received customer information with a transaction instrument issued to the customers and storing the received customer information and the issued transaction instrument information in a database for future reference..
Biometric Payment Solutions

Facial recognition-based authentication

Facial recognition-based authentication comprises obtaining a first image of a target object, updating projection information associated with a display by a display device, obtaining a second image of the target object, the second image being an image of the target object after the projection information is updated, obtaining an image difference data based at least in part on the first image and the second image, and determining whether the target object is a virtual object based at least in part on the image difference data.. .
Alibaba Group Holding Limited

Warp and weft encoding of garment

In various example embodiments, a system and method for authenticating a garment are presented. The authentication system can include a code reader configured to receive an image of a garment.
Ebay Inc.

Self-destruct sram-based authentication circuit

A memory device is disclosed. The memory device includes a memory bit array comprising a plurality of memory bits, wherein each memory bit is configured to present an initial logic state when the memory device is powered on, and an erasion circuit, coupled to the memory bit array, and configured to alter an intrinsic characteristic of at least one of the memory bits so as to alter the initial logic state of the at least one memory bit..
Taiwan Semiconductor Manufacturing Co., Ltd.

Non-transitory computer-readable recording medium, communication management method, and communication management device

A non-transitory computer-readable recoding medium having stored therein a communication management program that causes a communication management device to execute a process. The process includes authenticating a terminal in response to an authentication request from the terminal, receiving a communication content destined to a communication target system, the communication target system sharing access-authentication information with the communication management device, adding a first information with the communication content, the first information corresponding to a result of the authentication request, detecting whether the communication content includes a second information that is identified by the communication target system as information added by the communication management device, deleting the second information when the second information is detected in the communication content; and transmitting the communication content to the communication target system..
Fujitsu Limited

Communication device capable of performing a wireless communication according to nfc (abbreviation of near field communication) standard.--

A communication device may receive a first specific signal not including authentication information from a first terminal device via an nfc interface, change an operation mode of the nfc interface from a first operation mode to a third operation mode, supply first authentication information to the nfc interface, store first authentication information in a predetermined area, change the operation mode of the nfc interface from the third operation mode to the first operation mode, receive a second specific signal including the first authentication information from the first terminal device via the nfc interface and execute an authentication using the first authentication information by determining whether the first authentication information included in the second specific signal is stored in the predetermined area without changing the operation mode of the nfc interface from the first operation mode in a case where the second specific signal is received.. .
Brother Kogyo Kabushiki Kaisha

Enhanced biometric user authentication

Methods and apparatuses for enhanced user biometric authentication are described. In one example, authenticating a user includes storing user authentication pairs in a memory of an authenticator device, each authentication pair comprising an instruction prompt and a stored corresponding user response biometric to the instruction prompt.
Plantronics, Inc.

Information processing apparatus, information processing system, and user authentication method

An information processing apparatus includes a storage unit and a processing unit. The storage unit stores therein first authentication information corresponding to an account of a user on a server, and a session id generated by the server when the user logs in.
Fujitsu Limited

Multi-tenant encryption for storage class memory

Various embodiments are generally directed to the providing for mutual authentication and secure distributed processing of multi-party data. In particular, an experiment may be submitted to include the distributed processing of private data owned by multiple distrustful entities.
Intel Corporation

Printing apparatus with authentication function

A controller performs a first processing including: at a predetermined timing, determining whether a first authentication code stored in a storage of a control board attached to a first control board attachment portion matches a second authentication code stored in a storage of a control board attached to a second control board attachment portion; upon determining that the first authentication code matches the second authentication code, allowing a printer to execute a print processing; and upon determining that the first authentication code does not match the second authentication code, prohibiting the printer from executing the print processing.. .
Riso Kagaku Corporation

Copy copying information between first processing apparatus and second processing apparatus, the first processing apparatus, and the second processing apparatus

In a copy method, a first processing apparatus performs: receiving authentication information from a mobile terminal; storing the received authentication information into an external storage medium connected to a first interface of the first processing apparatus; and storing particular information stored in a first storage of the first processing apparatus, into the external storage medium connected to the first interface. A second processing apparatus performs: receiving the authentication information from the mobile terminal; reading the authentication information stored in the external storage medium connected to a second interface of the second processing apparatus; and storing, into a second storage of the second processing apparatus, the particular information stored in the external storage medium connected to the second interface, when the read authentication information and the received authentication information match each other..
Brother Kogyo Kabushiki Kaisha

Tap-to-dock

A novel docking process introduces a new handshake scheme between a first device (referred to herein as the “dockee”) and a docking device (referred to simply as the “dock”) to communicate a user's intention to connect the dockee and the dock (i.e., dock the dockee to the dock). The handshake consists of two steps: 1) establish a connection over a near field communication (nfc) link to convey information about the docking event; and 2) establish a second connection over the wireless channel to connect the dockee and the dock.
Intel Corporation

Information processing system

A master server includes a mapping management unit that returns, with respect to an address inquiry request for a site server to be in cooperation with a pc, the address inquiry request being sent from the pc, an ip address of the site server to be in cooperation with the pc that sent the address inquiry request. The site server includes an authentication processing unit that authenticates the user in response to an authentication request for the user from the pc, and returns an authentication result to the pc, a permission information providing unit that, when the authentication processing unit succeeds in authentication, obtains the permission information corresponding to the user from the second memory, and provides the permission information to the pc that sent the authentication request, and a second spooler that spools job data from the pc, and outputs the job data to the image forming apparatus..
Kyocera Document Solutions Inc.

Wireless token device

A first computing device is detected as substantially collocated with a wireless token device, using a short-range wireless communication network, and a connection is established between the first computing device and the wireless token device over the short-range wireless network. Authentication data stored in memory of the wireless token device is sent from the wireless token device to the first computing device over the short-range wireless network.
Mcafee, Llc

Mobile device authentication

An entry of a code to the touch-sensitive screen is received through at least one opening in the stencil at one or more predefined locations in the stencil, wherein the one or more predefined locations define at least part of an access code; and it is determined that the entered code equals the at least part of the access code, and in response, the access to the service on the device is granted.. .

Secure broadcast beacon communications

Using various embodiments, methods and systems for secure bluetooth low energy communications, in an unconnected state, are described herein. In one embodiment, conventional ble transmitting device data can be supplemented with authentication information, including a message authentication field which enables receivers to determine if the received beacon/transmitted ble peripheral data is genuine.

Drm addition authentication

There is provided a client device comprising a content protection decoder according to a first standard, comprising: a receiver for receiving an asset associated with content protection; a creation module for creating a content protection for the asset in accordance with the first standard, and including a parameter identifying information additional to the information associated with said standard; an interface for transmitting a request for a license to a license server based on said standard, the request including that parameter, and for receiving a license in response; and a controller for accessing content associated with the asset using the license. There is also provided a license server configured to: receive a license key request in accordance with a standard from a client device; transmit the request to a processing function associated with the standard; receive a parameter associated with the standard from the processing function; parse the parameter to retrieve additional information; process the additional information; access a license in accordance with the standard based on the parsed information; and transmit the accessed license in accordance with the standard to the client device..
Piksel, Inc.

Storage container with inventory control

Systems and methods of the invention relate to managing an inventory of items within a storage container. A storage container can house one or more items for distribution among one or more users such as, for instance, employees.
3 Strike, Llc

Repeater for frictionless access control system

In an access control system, an ancillary user device is used in conjunction with a mobile computing device to broadcast user information for authentication. The mobile computing device and ancillary user device are paired, and user information is transmitted from the mobile computing device to the ancillary user device.
Sensormatic Electronics, Llc

Wireless communication apparatus and processing method thereby

When a wireless network is constructed, a wireless communication apparatus in the wireless network constructed of a plurality of communication apparatuses decides whether to function as a providing source of communication parameters or as a provision destination that receives communication parameters. In a case where it has been decided that this apparatus is to function as the provision destination that receives communication parameters, the apparatus requests authentication when it participates in the wireless network using communication parameters.
Canon Kabushiki Kaisha

Methods and devices for access control of data flows in software defined networking system

The disclosure relates to a method for access control of a data flow in a software defined networking system. The method includes is performed in a controller device and comprises: receiving a first packet associated with a first data flow between a client node and a server node, verifying, based on flow attributes authentication of the first packet, repeating the receiving and verifying for a number of subsequent packets of the first data flow, wherein the number of subsequent packets is set based on type of protocol used for the first data flow and/or a policy set in the controller device, and sending, to an intermediate node along a path of the first data flow, a respective verification message for each successfully verified authentication of the first packet and any subsequent packets, allowing the first packet and any subsequent packets of the first data flow for forwarding..
Telefonaktiebolaget Lm Ericsson (publ)

Traitor tracing for obfuscated credentials

A method, computer program product, and system for providing verification processes associated with a commitment-based authentication protocol are described. A request by a user for access to one or more resources is received, and a presentation policy is transmitted to the user indicating required credentials.
International Business Machines Corporation

Work smart key device

A work method for a smart key device. A host machine acquires data from a trusted server via a browser and then transmits the data to a smart key device; the smart key device performs a signing operation when the data transmitted by the host machine is received and when a user confirmed by pressing a key and then returns a signing result to the host machine; and the host machine transmits data returned by the smart key device to the trusted server to verify the validity of the smart key device.
Feitian Technologies Co., Ltd.

Automatic provisioning of services to network-connected devices

The disclosed embodiments include computerized methods and systems that automatically provision one or more services available to an internet-of-things (iot) devices upon connection to and registration onto communications network. In one aspect, a device may receive, from a computing system, data specifying one or more first services provisioned to the device.
The Toronto-dominion Bank

Distributed storage of authentication data

A biometric server receives, a transmission of a biometric sample and an encrypted enrollment template of the user from a client device, wherein the encrypted enrollment template comprises an encrypted mathematical representation of historical biometric data of the user, and wherein the biometric sample comprises a current snapshot of the biometric data. The biometric server decrypts the encrypted enrollment template to an enrollment template using an enrollment template key.
International Business Machines Corporation

Networked storage system and method

A networked storage system and method provides multiple lockers arranged in a modular configuration, and multiple security means for accessing and monitoring lockers through an interconnected network of processors, user identifiers, and detectors that alert to unauthorized access to the lockers. The lockers are networked with a central kiosk and a remote processor for a user to access the lockers, for storing locker information, for monitoring lockers, and for processing events at lockers.
Shanghai Yishan Industrial Co., Ltd.

Mirrored communication devices in carrier networks

In some embodiments, an apparatus includes one or more communication sub-systems; and an identity mirror component in communication with the one or more communication sub-systems. In response to selection, on an another device, of the apparatus from among a plurality of devices, receive, from the another device, carrier user identity information and carrier authentication key information associated with the carrier user identity information.
Intel Corporation

Digital certificate for verifying application purpose of data usage

A method of creating an application purpose certificate, comprising: receiving from a software publisher an application code and declared privacy information, the declared privacy information includes at least one allowed usage purpose for each of a plurality of data types; analyzing the application's usage of data of each of the plurality of data types; verifying the usage is compliant with the least one allowed usage purpose according to the analysis; creating an encrypted digital purpose certificate, the digital purpose certificate is unique for the application code; and sending the digital purpose certificate to the software publisher to be bundled with the application code and a publisher authentication certificate.. .
International Business Machines Corporation

Cdn-based access control method and related device

A content delivery network based (cdn-based) access control method, includes receiving, by a cdn server, a hypertext transfer protocol (http) request from a user terminal and identification information of the user terminal, where the http request includes an access ticket, sending the identification information of the user terminal and the http request to a service server, receiving an http response including a content fingerprint when an authentication result indicating that the access ticket is valid, obtaining the content resource according to the content fingerprint, and sending the content resource to the user terminal.. .
Huawei Technologies Co., Ltd.

Systems, methods and computer-readable storage media facilitating mobile device guest network access

Mobile device access to a guest network is facilitated. A method comprises: detecting a home network having an associated access point based on the device being within a first defined proximity of the associated access point; and transmitting information indicative of a request to establish a guest network via the associated access point of the home network and providing authentication information for an entity associated with the device.
Network Performance Research Group Llc

Systems and methods for location-based authentication

Systems and methods are disclosed for performing location-based authentication using location-aware devices. One method includes: receiving an access request comprising authentication credentials and a first location from a first location-aware device; receiving a second location from a second location-aware device associated with the authentication credentials; and upon determining that the first location and second location are within a pre-determined distance, authenticating the authentication credentials..
Oath Inc.

Service operation management using near-field communications

Various techniques for the management and control of service operations using near-field communication (nfc) technologies are disclosed. In an example, a master computing system operates to identify a device configuration that enables a service operation upon a remote client device, identify an authentication value to authenticate permission to enable the service operation with the remote client device, and generate an nfc data payload including the authentication value and device configuration.

Authentication framework for a client of a remote database

Disclosed herein is a technique for authenticating an application operating on a client device with an authentication server device based on user credentials associated with an identity provider. In particular, the authentication server device facilitates the authorization process between the application and the identity provider without exposing, to the application, either the user credentials or an authorization code generated by the identity provider..
Apple Inc.

Method for in-line tls/ssl cleartext encryption and authentication

We describe a method, device and system for communicating to a peer via a network. A segment is received formatted according to a first network protocol, the received segment having clear-text payload data in a payload portion of the received segment.
Chelsio Communications, Inc.

System and authenticating and enabling functioning of a manufactured electronic device

A system and method for authenticating and enabling functioning of a manufactured electronic device are disclosed. A particular embodiment includes: an obfuscation code generator to produce an obfuscation code having a first portion representing manufacturing or physical characteristics of a particular paired system and a second portion representing one or more identifiers of the particular paired system, the obfuscation code generator to use the obfuscation code to obtain an authentication key; and an obfuscation state machine configured with a pre-defined quantity of state elements, a pre-defined quantity of the state elements being functional state elements, the obfuscation state machine being programmed with the authentication key to cause the obfuscation state machine to transition a protected device from an initial obfuscation state to a functional state, the embedded active obfuscation unit being further configured to load random bit-selected values from the obfuscation code into the obfuscation state machine for the values of the state elements and to load a different set of random bit-selected obfuscation values from the obfuscation code into the obfuscation state machine for the values of the functional state elements of the obfuscation state machine, thereby causing the protected device to transition from the initial obfuscation state through a set of obfuscation states before reaching the functional state for normal operation..
Anvaya Solutions, Inc.

Embedding protected memory access into a rfid authentication process based on a challenge-response mechanism

A rfid tag (501), reader (502) and protocol allow a protected read operation in a two-step tag authentication with cipher-block cryptography. A challenge-response mechanism using a shared secret symmetric key (638) for tag authentication includes a challenge and information to read data from a tag's memory (637).
Centro De Pesquisas Avançadas Wernher Von Braun

Non-linear physically unclonable function (puf) circuit with machine-learning attack resistance

Embodiments include apparatuses, methods, and systems for a physically unclonable function (puf) circuit. The puf circuit may include an array of puf cells to generate respective response bits of an authentication code in response to a challenge bit string.
Intel Corporation

Methods and systems for unmanned aircraft systems (uas) traffic management

Provided are methods comprising transmitting an authentication request for an operator of an unmanned aircraft system (uas) to an uas traffic management (utm) server, transmitting flight plan data to the utm server if the authentication request is successful, receiving operational data that comprises first traffic data, displaying at least a portion of the operational data, receiving flight data from the uas, transmitting the flight data to the utm server, and receiving updated operational data comprising second traffic data based on the flight data.. .
The Board Of Regents Of The Nevada System Of Higher Education On Behalf Of The University Of

Analytic identity measures for physical access control methods

A personal electronic device enables access to and occupancy of a secure space by providing measures of behaviors, personal attributes, history of transactions and movements that are used to validate continuous authentication and authorization of the device's possessor. This addresses the vulnerability of a misplaced, lost, or stolen electronic credential.

Neural network for eye image segmentation and image quality estimation

Systems and methods for eye image segmentation and image quality estimation are disclosed. In one aspect, after receiving an eye image, a device such as an augmented reality device can process the eye image using a convolutional neural network with a merged architecture to generate both a segmented eye image and a quality estimation of the eye image.
Magic Leap, Inc.

Commercial transaction system, administration server, and program

A commerce system includes an ec server connecting to a user terminal and executes e-commerce, a customs clearance authentication server that administers pre-customs clearance information, and an administration server connected to the customs clearance authentication server and the ec server. The administration server receives a registration request including product information regarding a product, transmits the registration request to the customs clearance authentication server, receives pre-customs clearance information regarding the product from the customs clearance authentication server, and notifies the pre-customs clearance information to the ec server.
Acd Inc.

System and automatically authenticating a caller

Systems and methods include an input interface that receives registration information including a contact number input into a mobile device of a user, a call interface that transmits a call signal to a call center system, wherein the call signal comprises the call signal contact number that placed a call associated with the call signal and a communication interface that transmits the registration information to a profile database that stores the registration information as a profile for authenticating the mobile device user and identifying information from the mobile device of the user during the call. The call center system includes a call authentication processor that retrieves the user profile, an authentication interface that receives the identifying information, and an authentication processor that compares the identifying information with the user profile, and routes the call on an authenticated call path if the identifying information at least partially matches the user profile..
Capital One Financial Corporation

Secure element having multiple users

Techniques are disclosed relating to secure data storage. In various embodiments, a mobile device includes a wireless interface, a secure element, and a secure circuit.
Apple Inc.

System and methods for authenticating a user using biometric data

A computer-based method for authenticating a user using biometric data is provided. The method is implemented using a biometric validation server in communication with a memory.
Mastercard International Incorporated

System and linking bill payment service with remittance

An enrollment of a receiver in a biometric authentication system is obtained. The receiver is challenged with a pre-remittance biometric challenge from the biometric authentication system prior to initiating a remittance to the receiver.
Mastercard International Incorporated

Mobile device authentication

Various embodiments herein each include at least one of systems, methods, software, and data structures for mobile device authorization of checks written on a checking account by an authorized individual. One embodiment, in the form of a method, includes receiving input with regard to a check within an authorized account session for the account on which the check is drawn.
Ncr Corporation

Multi-modal user authentication

Various systems and methods for providing a mechanism for multi-modal user authentication are described herein. An authentication system for multi-modal user authentication includes a memory including image data captured by a camera array, the image data including a hand of a user; and an image processor to: determine a hand geometry of the hand based on the image data; determine a palm print of the hand based on the image data; determine a gesture performed by the hand based on the image data; and determine a bio-behavioral movement sequence performed by the hand based on the image data; and an authentication module to construct a user biometric template using the hand geometry, palm print, gesture, and bio-behavioral movement sequence..

Systems and methods for authenticating a user based on captured image data

Systems and methods are provided for authenticating a user of a computing device. The system comprises one or more memory devices storing instructions, and one or more processors configured to execute the instructions to provide, to a computing device associated with a user, an indication of a prescribed authentication parameter.
Capital One Services, Llc

Authentication of a smart pen and computing device

Method and system are provided for authentication for pairing of a smart pen with a computing device. The method, which is carried out at a smart pen, may include: sensing a signature event carried out by a user writing with the smart pen on an input user interface of the computing device; recording a signature resulting from the signature event; authenticating the signature by comparing to a stored previously recorded signature at the smart pen.
International Business Machines Corporation

Authentication of a smart pen and computing device

Method and system are provided for authentication for pairing of a smart pen with a computing device. The method, which is carried out at a smart pen, may include: sensing a signature event carried out by a user writing with the smart pen on an input user interface of the computing device; recording a signature resulting from the signature event; authenticating the signature by comparing to a stored previously recorded signature at the smart pen.
International Business Machines Corporation

Patient-centered vehicle emergency application and web interface that provides emergency personnel with vehicle data and personalized occupant health information

A mobile device stores medical credentials for one or more occupants of a vehicle. Responsive to receipt of an indication of an emergency event at the vehicle, the mobile device sends the credentials, an authentication code, and vehicle information to a cloud server to cause the cloud server to construct web content including the vehicle information and medical information accessible using the credentials.
Ford Global Technologies, Llc

Device access control

Examples are provided for device access control. In one example, a computing device to which access is controlled includes a display device for presenting a user interface, a processor, and a storage device storing instructions executable by the processor to, for each of a threshold number of rounds, display a plurality of candidate regions, each candidate region including a plurality of candidate authentication objects, and receive input indicating a device access control response.
Harman International Industries, Incorporated

Access control for integrated circuit devices

Security systems for microelectronic devices physically lock the hardware itself and serve as a first line of defense by preventing overwriting, modification, maniplation or erasure of data stored in a device's memory. Implementations of the security systems can respond to lock/unlock commands that do not require signal or software interactivity with the functionality of the protected device, and which therefore may be consistent across devices.

Secure industrial control system

A secure industrial control system is disclosed herein. The industrial control system includes a plurality of industrial elements (e.g., modules, cables) which are provisioned during manufacture with their own unique security credentials.
Bedrock Automation Platforms Inc.

Authenticating a respondent to an electronic survey

This disclosure generally covers systems and methods that, in some embodiments, provide an electronic survey template for creating a user customizable electronic survey including authentication features. Those authentication features include, in some embodiments, authenticating questions with elements that capture a digitally drawn signature, digital image, fingerprint, or voiceprint.
Qualtrics, Llc

Distributed trust as secondary authentication mechanism

A computer system supports secondary authentication mechanism for authentication of a user, where the computer system may provide a variety of services including financial, scientific, academic, or governmental services. The computer system utilizes a multiphase distributed trust model in which the user is authenticated based on distributed trust of a set of randomly selected trusted contacts from a large set of trusted contacts initially chosen during an enrollment phase.
Bank Of America Corporation

Biometric authentication based on gait pattern or writing motion with an inertial measurement unit

The present invention relates to use an inertial measurement unit (imu) to record the acceleration trajectory of a person's gait or pen-less handwriting motion or any predesignated gestures, and to convert the data to a unique biometric pattern. The pattern is unique for each case and can be used as biometric security authentication..
Hong Kong Baptist University

Voice authentication within messaging systems

A user is initially trained for voice authentication within a messaging platform session. After training and during the same session or a different session with the messaging platform session or with a different messaging platform, and when the user requests during such session a sensitive operation be performed on behalf of the user with an external service, a randomly generated voice challenge is delivered to the user during that session.
Ncr Corporation

Authenticating executing user authentication

Provided is an authenticating apparatus that by a simple method improves security when entering a password. The authentication-processing unit executes user authentication by comparing an entered password that is entered with a preset set password.
Kyocera Document Solutions Inc.

Multifactor authentication from messaging systems

A user is assigned an initial risk score during a session with a messaging platform. During the session, the user attempts an operation with an external service.
Ncr Corporation

Image capturing control method, image capturing control system, and image capturing control server

An image capturing control server receives permitted terminal identification information being first terminal identification information identifying a first image capturing terminal from an authentication server via a wan, and sets the permitted terminal identification information as setting information for a communicator that communicates via a lan. When receiving, via the lan, second terminal identification information identifying a second image capturing terminal and image capturing control information for controlling an image capturing camera, the communicator determines whether the second image capturing terminal is the first image capturing terminal by determining whether the received second terminal identification information agrees with the first terminal identification information set as the permitted terminal identification information.
Panasonic Intellectual Property Corporation Of America

Image forming apparatus using cloud services, image communication method therefor, and storage medium

An image forming apparatus which eliminates a need for a user to operate a mobile terminal each time he or she sends an image file from the image forming apparatus using a cloud service and therefore enhances ease of operation. First user authentication of the user is performed for the image forming apparatus.
Canon Kabushiki Kaisha

Authentication value for a fluid ejection device

A fluid ejection device includes a plurality of analog devices, and a storage element storing an authentication value based on electrical characteristics of a subset of the plurality of analog devices.. .
Hewlett-packard Development Company, L.p.

. .

Using a wlan interworking gateway (wig) for offloading ue traffic from cellular network to wlan

There is provided a method comprising receiving, at a control node associated with a plurality of access points of a first network (e.g. A wlan interworking gateway-wig), information from an access point of a second network (e.g.
Nokia Solutions And Networks Oy

System and authentication in distributed computing environment

The present invention relates to a method and system for managing profiles for use with touch systems. A user logs into a communal device using a pointer paired with a mobile device.
Smart Technologies Ulc

Authentication using dynamic verbal questions based on social and geospatial history

An approach is provided for authenticating a user. Geolocations are collected during a first time period and social media interactions are collected during a second time period.
International Business Machines Corporation

Coexistence interference mitigation during wireless local area network authentication

Methods and apparatuses for mitigating coexistence interference in a wireless device between a wlan interface and a wpan interface during a wlan authentication process. The wireless device associates with a wlan access point (ap), and after receiving a wlan association response from the wlan ap, the wireless device alternates between wlan time periods, during which wlan transmission is enabled and wpan transmission is disabled, and wpan time periods, during which wpan transmission is enabled and wlan transmission is disabled, during the wlan authentication process.
Apple Inc.

Protecting wlcp message exchange between twag and ue

A method of protecting wlan control protocol (wlcp) message exchange between a trusted wlan access gateway (twag) (112) of a trusted wlan access network (twan) (110) and a user equipment (ue) (101) are provided. The method comprises deriving, by an authentication, authorization, and accounting, (aaa) server (103) of an evolved packet core (epc) network which is interfaced with the twan, and by the ue, a master session key (msk) and an extended msk (emsk), sending, from the aaa server to a trusted wlan aaa proxy (twap) (113) of the twan and an access point (ap) (111) of the twan, the msk or a key derived from at least the msk, and deriving, by the twan or by the aaa server, and by the ue, from the msk, the emsk, or the key derived from at least the msk or the emsk, a key for protecting the wlcp message exchange.—corresponding devices, computer programs, and computer program products are further provided..
Telefonaktiebolaget Lm Ericsson (publ)

Methods and systems for authentic interoperability

Systems, methods, and computer readable mediums for authenticating a device perform a method of receiving, at a second device, a first authentication protocol reauthentication response for the device, the authentication response including a reauthentication master session key (rmsk), transmitting, at the second device, a second first authentication protocol reauthentication response to a first access point based on the reauthentication master session key, generating, at the second device, a first pairwise master key (pmk) based on the reauthentication master session key, generating, at the second device, a key message to include the first pairwise master key, and transmitting, at the second device, the key message to the second access point.. .
Qualcomm Incorporated

Mitigation of problems arising from sim key leakage

Method, system or universal integrated circuit card (uicc) for or configured to provision a uicc, with a key, the uicc containing an initial subscriber key shared between the uicc and an authentication centre, comprising: exchanging a new key between the uicc and the authentication centre using a communication between the uicc and the authentication centre authenticated using the initial subscriber key. Using the new key, in place of the initial subscriber key, for further communications with the uicc..
Vodafone Ip Licensing Limited

Techniques for deriving security keys for a cellular network based on performance of an extensible authentication protocol (eap) procedure

Techniques are described for wireless communication. A method for wireless communication at a user equipment (ue) includes performing an extensible authentication protocol (eap) procedure with an authentication server via an authenticator.
Qualcomm Incorporated

On-demand network function re-authentication based on key refresh

Methods, systems, and devices for wireless communication are described. A user equipment (ue) may determine that a security context with a network node has been established for more than a threshold time period.
Qualcomm Incorporated

Virtual device with internet protocol security tunnel

An electronic device that establishes one or more internet protocol security (ipsec) tunnels with an evolved packet core (epc) for another electronic device is described. In particular, the electronic device may receive, from the other electronic device, extensible authentication protocol (eap) information using a wireless local area network (wlan) communication protocol, where the eap information includes credentials used by the epc to authenticate the other electronic device.
Ruckus Wireless, Inc.

Phishing detection and prevention

Some embodiments of the present invention include a method for detecting and preventing phishing and include generating an authentication cookie based on encrypting an authentication token and a time when the authentication token is generated, the authentication cookie to be installed in a user computing system. The method further includes receiving a login request from the user computing system, the login request including login information, the authentication cookie, and a first detection token, decrypting the authentication cookie in the login request to generate a second detection token, and comparing the first detection token with the second detection token to determine whether the login information is compromised..
Salesforce.com, Inc.

Global attestation procedure

A method, computer program product, and system for authenticating a computing device by geographic attestation includes a processor utilizing executing an authentication application utilizing location services executing on the computing device to obtain location data from the location services. The processor obtains the location data and creates and encodes a data structure in a secured area of a memory; the data structure is only accessible to the authentication application.
International Business Machines Corporation

Secure transfer of authentication information

A secure method connects to an application run on a server from a client computer device, by a user who does not have the authentication data of the account declared in the application, the account including at least one proxy id. The disclosure also relates to the application and associated authentication data, implementing a proxy [mandatary gateway] including a memory for recording, for each user declared by a primary account comprising at least one user id, the list of resource targets c and accounts to which the user has access..
Wallix

Method and managing authentication in a decentralized or distributed network of cyber- physical systems

An example of this method and apparatus in use is a scenario with an internet-connected non-authenticator device (a “non-authenticator end agent”) in a commercial/retail location whereby the owner (an “owner interested agent”) of that device, very likely the owner of the commercial/retail location, has authenticated that device using their authenticator (an “authenticator end agent”) on a decentralized or distributed network. In this example, the owner has pre-defined the semantics of that device's end agent sub-class(es), state machine sub-classes (if any), and its classes and attributed of service to commercial/retail customers in the device's “semantic data model”.

Method for authenticating optical network unit, optical line terminal, and optical network unit

A method for authenticating an optical network unit (onu) and devices for an optical line terminal (olt) and an optical network unit (onu) where an onu is not allowed to be migrated in an authorized manner to an olt of another vendor for use and binds the onu and a particular vendor. The method also includes, when an onu goes online, obtaining, by the olt, first vendor information of the onu, where the first vendor information is vendor information of a vendor to which the onu belongs; comparing, by the olt, the first vendor information with second vendor information, where the second vendor information is vendor information of a vendor to which the olt belongs; and if a comparison result indicates that the olt and the onu belong to different vendors, determining, by the olt, that authentication on the onu fails..
Huawei Technologies Co., Ltd.

User authentication via device characteristics

An embodiment of the invention may include a method, computer program product and system for authenticating a user device. The embodiment may include receiving a plurality of device parameter from a user device.
International Business Machines Corporation

Mobile application bundled with metadata database

Customization objects stored in a mobile database may be used to customize webpages and applications rendered in, or executed by a mobile application implemented by a mobile device. Upon authenticating the mobile application, a service provider may determine whether any customization objects have been updated since a previous authentication of the mobile application, and may update the mobile database with the updated customization objects.
Salesforce.com.inc.

Methods, systems, and media for authentication of user devices to a display device

Methods, systems, and media for authentication of user devices to a display device are provided. In some implementations, the method comprises: authenticating a first user device to a display device, wherein an authentication token is associated with the authentication of the first user device to the display device, wherein the authentication token is stored on a server in association with an identifier of the first user device, and wherein the first user device is provided with media playback control on the display device in response to the authentication; identifying, using the first user device, a second user device in proximity to the first user device; transmitting, from the first user device to the second user device, an invitation message to authenticate the second user device to the display device; and, in response to receiving a response to the invitation message from the second user device, transmitting, from the first user device to the second user device, the authentication token that causes the second user device to request authentication to the display device from the server, wherein the second user device is provided with media playback control on the display device in response to authenticating with the display device..
Google Inc.

Website authentication using an internet-connected device

The invention is an authentication framework that enables a user to log in to a website using an internet-connected device, such as smartphone, smart watch, smart glasses, or tablet, while browsing on a computer. The framework makes it easier for people with certain disabilities to log in to a website, such as by removing the mandatory step of entering usernames and passwords while giving users multiple options through which they are establish their identity using internet-connected devices.
Syracuse University

System and network user's authentication and registration by way of third party computing device

The present invention concerns generally with a system and method for computer users' registration and authentication using a third-party computing device. The third-party device temporarily assumes the identify of a less secured client computer for the period necessary for the client's authentication or registration..

Multi-session authentication

An approach for multi-session authentication of multiple networked devices is disclosed. A user can create a public key-encrypted message on a client device using biometric data and a one-time password (e.g., one-time password).
Ebay Inc.

Authentication system and authentication method capable of realizing single-sign-on function used for application program on image forming apparatus

The management server authenticates the user on the basis of the authentication request using the user name and the password received from the image forming apparatus, generates user session information obtained in a process of the user authentication process, stores the user session information in association with the ip address of the image forming apparatus in the third memory, and supplies the user session information in response to an inquiry using the ip address from the third party server. The third party server receives the authentication request using the ip address from the image forming apparatus, makes an inquiry to the management server by using the ip address, and authenticates the user on the basis of the returned user session information..
Kyocera Document Solutions Inc.

Systems and methods for providing single sign-on authentication services

Embodiments of the disclosure enable a system to provide authentication services. The system includes a system server that receives data associated with an application service, uses a first key associated with a device identifier corresponding to a user device to decrypt the data associated with the application service, uses a second key associated with a password stored at the system server to encrypt the data associated with the application service, and transmits, to an application server, the data associated with the application service such that the application server is configured to provide the application service for a user associated with the user device.

Ehn venue-specific application provisioning

In order to leverage an enterprise-hosted network (ehn) associated with an entity, a communication technique may dynamically customize an application on a portable electronic device. In particular, the portable electronic device may discover and then may connect to the ehn using a quarantine zone that restricts access to the ehn.
Ruckus Wireless, Inc.

Stateless server-based encryption associated with a distribution list

An example method of decrypting electronic messages includes receiving, by an authentication module of a decryptor device, authentication requests from a plurality of destination clients. The method also includes receiving, by a decryption module of the decryptor device, encrypted electronic messages from the plurality of destination clients.
Red Hat Israel, Ltd.

System and pool-based identity authentication for service access without use of stored credentials

A computer-implemented system and method for pool-based identity authentication for service access without use of stored credentials is disclosed. The method in an example embodiment includes providing provisioning information for storage in a provisioning repository; receiving a service request from a service consumer, the service request including requestor identifying information; generating an authentication request to send to an authentication authority, the authentication request including requestor identifying information; receiving validation of an authenticated service request from the authentication authority; and providing the requested service to the service consumer..
Ebay Inc.

Geolocation dependent variable authentication

In an approach to variable authentication, one or more computer processors receive a request to access secure data from a computing device. The one or more computer processors receive geolocation data associated with the computing device.
International Business Machines Corporation

Communication management system, access point, communication management device, connection control method, communication management method, and program

An object is to prevent concentration of communication traffic at a management node and to avoid a reduction in communication speed. An ap stores information for specifying a permitted terminal permitted to communicate with a communication network, and generates access information when information for specifying a connection request terminal requesting a connection to the communication network through wireless communication is not stored as the information for specifying the permitted terminal, by adding terminal information and ap information to information used for accessing provider information that provides an authentication window used for authentication of the connection request terminal.
Nec Platforms, Ltd.

Pluggable authentication for enterprise web application

A system and method for facilitating authenticating a client application to enable communications with another server-side application running on a server in communication with the client application (client). An example embodiment involves providing an authenticator for the client to a shared library that is accessible to the client and server, and then registering the authenticator for the client at the server.
Oracle International Corporation

System to resolve multiple identity crisis in indentity-as-a-service application environment

According to a non-limiting embodiment, a multiple identity crisis resolution system includes an idaas integrated with a paas. The idaas is integrated with a cloud-based network, and an application module installed in the cloud-based network.
International Business Machines Corporation

Geolocation dependent variable authentication

In an approach to variable authentication, one or more computer processors receive a request to access secure data from a computing device. The one or more computer processors receive geolocation data associated with the computing device.
International Business Machines Corporation

Method for operating server and client, server, and client apparatus

Disclosed is a method for operating a server supporting peer-to-peer communication. One embodiment comprises the steps of: issuing a public key in response to a public key request received from a client and transmitting the public key to the client; receiving a private key from the client and mapping the public key and private key as a key pair; receiving, from the client, a request to generate an identifier comprising one or more items of unique information of the client; generating an identifier corresponding to the client in response to the request to generate an identifier, generating a security key utilizing the unique information, and transmitting the identifier and security key to the client; receiving, from the client, an authentication request comprising the identifier and security key; and authenticating the client in response to the authentication request and transmitting the authentication result to the client..
2ip Co., Ltd.

Confidential mail with tracking and authentication

A method for confidential electronic communication between a sender workstation and a receiver workstation is provided, whereby privacy is guaranteed for the electronic communications transmitted over the public internet. The method of confidential communication is equipped with message tracking and message receipt verification.
Microsoft Technology Licensing, Llc

Systems and devices for hardened remote storage of private cryptography keys used for authentication

The invention provides for systems and devices for hardened remote storage of private cryptography keys used for authentication. The storage device is tamper-responsive, such that receipt of a signal that indicates physical or non-physical tampering with the storage device or its components results in deletion of the private cryptography key(s) from the memory.
Bank Of America Corporation

System and approving transactions

In a transaction between a merchant and a payer, approval of the transaction may be provided by a payment processing system using authentication information provided from a mobile device of the payer. The authentication information may include a location of the payer mobile device which may be compared to a location of a merchant payment device such that the transaction is approved if the payer mobile device is within a defined distance of the merchant payment device..
Ol Security Limited Liability Company

Secure communications using organically derived synchronized processes

This disclosure provides a system and method for secure communications. The method can enable secure machine-to-machine communications within discrete security groups having two or more communication nodes using a zero knowledge authentication process and related cryptography.
Olympus Sky Technologies, S.a.

Method and authentication and validation of persons using gait data

A system for authentication and validation of the identity of a person. The person carries a mobile device configured to measure motion as the person walks or stands still, generating a time record of motion data.
Raytheon Bbn Technologies Corp.

Security improvements in a cellular network

The present disclosure relates to secure communication over a cellular network between a mobile terminal 30 and a network entity 40 via a node of a cellular network, wherein a home public land mobile network, plmn, of the mobile terminal generates a ciphering key, ck, and/or an integrity key, ik, for authentication of the mobile terminal and wherein performance of an authentication and key agreement, aka, procedure between the mobile terminal and the node of the cellular network permits the mobile terminal to determine ck and/or ik. In particular, there is provided the method comprising applying a special key to allow communication of user-plane data between the mobile terminal and the network entity in a trusted manner, wherein the special key is generated from the ck and/or ik but is different from the ck and ik..
Vodafone Ip Licensing Limited

X-ray tube devices and methods for imaging systems

An x-ray tube may include a housing, a cathode, an anode, and a tube auxiliary unit or an authentication module. The cathode and the anode are positioned within the housing.
Varex Imaging Corporation

Visible light communication of an access credential in an access control system

Techniques are disclosed relating to communication of authentication information in an access control system. Authentication information is transmitted to an electronic locking device configured to restrict access to an entry point of the access control system.
Videx, Inc.

Adaptive risk-based verification and authentication platform

In various exemplary embodiments, a system and associated method to perform an adaptive risk-based assessment of a user is disclosed. The method includes assigning a risk assessment process to the user and providing a plurality of assessment factors to the risk assessment process.
Ebay Inc.

Authentication generating flight regulations

Systems and methods for uav safety are provided. An authentication system may be used to confirm uav and/or user identity and provide secured communications between users and uavs.
Sz Dji Technology Co., Ltd

System for user identification and authentication

A method includes obtaining identification data indicative of a subject's identity; identifying the subject using a computer system based on the identification data; obtaining, using one or more sensors, a plurality of authentication data each separately indicative of the subject's identity, at least one of the authentication data being obtained passively; individually analyzing each one of the plurality of authentication data using the computer system; and validating or denying the subject's identity, using the computer system, based on the analysis of the authentication data. Systems for authenticating a subject's identity are also disclosed..
Pinn Technologies

Authentication and fraud prevention in provisioning a mobile wallet

A method including receiving a request from a provider to perform a provisioning of an account to a mobile wallet operating on a mobile device. The method also can include sending an inquiry to a risk determination system to authenticate the provisioning of the account to the mobile wallet.
Early Warning Services, Llc

Authentication and fraud prevention in provisioning a mobile wallet

A method including receiving a request from a mobile wallet operating on a mobile device to perform a provisioning of an account to the mobile wallet. The method also can include generating account information about the account.
Early Warning Services, Llc

Authentication and fraud prevention in provisioning a mobile wallet

A method including receiving an inquiry from a provider to authenticate a provisioning of an account to a mobile wallet. The method also can include determining device ownership information for a mobile device that operates the mobile wallet, account ownership information for the account, device risk information associated with the mobile device, and account risk information associated with the account.
Early Warning Services, Llc

Method and system for authorization of multiple transactions using a single authentication process

A method for authorization of multiple transactions using a single authentication process is described. The method includes determining that a user is an authorized user based on user credentials associated with the user; authorizing a transaction device identified by the authorized user for future electronic transactions with one or more restrictions; and providing previously stored payment card information associated with a user account of the authorized user for electronic transactions initiated at the authorized transaction device in accordance with the one or more restrictions..
Mastercard International Incorporated

Method and system for multi-modal transaction authentication

This invention relates to systems and methods for authenticating transactions using a mobile device based primarily on the introduction of a layer of middleware and wherein the payment networks, merchants, issuing banks, credit reporting bureaus, insurance companies, healthcare providers may customize the implementation of the services based on individual strategy and consumer preferences.. .
Collective Dynamics Llc

Systems and methods for authenticating electronic transactions

The disclosed embodiments provide systems and methods for authenticating electronic transactions. A system for authenticating electronic transactions may include one or more memory devices storing instructions and one or more processors configured to receive transaction data associated with a transaction and further associated with a customer.
Capital One Financial Corporation

User interfaces for stored-value accounts

In some examples, an account is provisioned onto an electronic device. In some examples, the device receives a value to fund the account provisioned on the electronic device.
Apple Inc.

Vehicle settlement system and method

Disclosed herein are a vehicle settlement system and method, and more particularly, a vehicle settlement system and method that utilize object recognition information as settlement authentication information. The vehicle settlement system according to an embodiment includes a vehicle control system, a financial settlement server, and a store system.
Hyundai Motor Company

Mobile device implemented payment functionality based on semantic analysis

Provide herein is a method and system capable of authenticating transactions involving at least one service provider and one or more users who are each in electronic communication. This electronic communication can be, for example, sms, mms, e-mail, or online account messaging.
Bookit Oy Ajanvarauspalvelu

System and biometric verification of ticket users

Techniques are disclosed for validating a ticket based on biometric data provided by a ticket holding user. A ticket controller device broadcasts an inquiry frame specifying a request for authentication data for a ticket user requesting access to a service hosted by the ticket controller.
International Business Machines Corporation

Cloud storage encryption

Techniques are disclosed for securing data in a cloud storage. Plaintext files are stored as secured, encrypted files in the cloud.
Zettaset, Inc.

Countersigning updates for multi-chip devices

A device facilitating countersigning updates for multi-chip devices includes at least one processor configured to receive, from a collocated chip, a data item and a software update, the data item being signed using a private key corresponding to a primary entity associated with the collocated chip and the data item comprising an authentication code generated using a symmetric key corresponding to a secondary entity associated with the software update. At least one processor is further configured to verify the data item using a public key associated with the primary entity.
Apple Inc.

Single-prompt multiple-response user authentication method

A request for authentication from a user of a computer system is received. An authentication prompt is transmitted to the user, wherein the authentication prompt corresponds to a plurality of stored authentication responses, and wherein each of the plurality of stored authentication responses is used to authenticate the user.
International Business Machines Corporation

Method and a system for secure login to a computer, computer network, and computer website using biometrics and a mobile computing wireless electronic communication device

A method of conducting a login transaction on a computer, computer network, and online computer website, comprising: enrolling a user with a single secured authenticating computer, at an enrollment station located at physical premises; after receiving the user identity authentication notification, downloading from the authenticating computer, a secure biometric login (sbl) software module onto the mobile device storage device, wherein the sbl software module is configured with a non-secured section and with an inaccessible secured section, the secured section being provided with one or more encryption keys including a public key that are encapsulated in such a way that they are inaccessible externally to code of the sbl software module and are unextractable; receiving a one-time authenticating quick response (qr) code from the authenticating computer following submission of a request for login privileges by the given conducting party computer; displaying the authenticating qr code on the conducting party computer screen; and receive a notification from the authenticating computer as to whether the request for login privileges is allowed or denied. The acquired biometric identifying samples, the biometric data and the one or more encryption keys of the secured section are never extractably or accessibly stored on the storage device of the mobile device, and are stored by secure means in the authenticating computer..

Application message processing system, method, and application device

The present disclosure provides an application message processing system, method, and application device. The processing system includes an application device and a message forwarder.
Tencent Technology (shenzhen) Company Limited

Terminal device and printer

A terminal device may send a registration request to a print intermediation server. The registration request may cause the print intermediation server to register virtual printer related information.
Brother Kogyo Kabushiki Kaisha

Information processing apparatus, information processing system, information processing method, and non-transitory computer readable medium

An information processing apparatus includes: a memory that stores authentication information on a user that utilizes a service provided by a service device in correlation with each application for utilizing the service; a unit that executes the application in response to an instruction from the user; a unit that requests user authentication by acquiring the user authentication information correlated with the executed application from the memory and transmitting the acquired authentication information to the service device; a unit that acquires an authentication result transmitted in response to the authentication information; and a unit that re-requests user authentication, when the authentication result indicates a failure in authentication, by an authentication method different from that used in a case of the failure in authentication, by acquiring user authentication information correlated with an application different from the executed application from the memory and transmitting the acquired authentication information to the service device.. .
Fuji Xerox Co., Ltd.

Gait authentication system and method thereof

A gait authentication system and method is provided. The system includes a mobile computing device configured to be carried by a person while moving with a unique gait.
Bae Systems Information And Electronic Systems Integration Inc.

Method, apparatus, and system for establishing cooperative communication

Embodiments of the present disclosure provide a method that includes receiving, by supporting user equipment ue, a pairing request message sent by a network side; and acquiring, by the supporting ue, a friend ue short-distance identifier list when self supporting capability information of the supporting ue indicates that the supporting ue supports a friend ue. The method also includes performing, by the supporting ue, identity authentication on the benefitted ue according to the friend ue short-distance identifier list and a short-distance identifier of a benefitted ue that is carried in the pairing request message.
Huawei Technologies Co., Ltd.

Data transmission apparatus and method

A data transmission method includes requesting, by a plurality of transceivers, an authentication to a main controller, transmitting an authentication acceptance signal and separate decoding keys from the main controller to the transceivers, transmitting an encoded data bundle from the main controller to the transceivers and extracting, by each of the transceivers, some of data in the at least one encoded data bundle using the decoding key.. .
Doosan Heavy Industries & Construction Co., Ltd.

Untrusted device access to services over a cellular network

Cellular networks regularly operate with trusted devices, which typically are trusted because of the integration of a sim card therewith. Untrusted devices typically do not interface with a sim card, and rely on user input through traditional user interfaces for authentication.
T-mobile Usa, Inc.

System and authenticating a user of an electronic device

In certain embodiments, a method of authenticating a user on an electronic device is disclosed. The method includes accessing, by an authentication device, a primary personal identification number (pin) associated with the user.
Wipro Limited

Managing security for a mobile communication device

Implementations include systems and methods for managing security for a mobile communication device. In implementations, a processor of the mobile communication device may determine environment context information.
Qualcomm Incorporated

Secure nonscheduled video visitation system

Described are methods and systems in which the censorship and supervision tasks normally performed by secured facility personnel are augmented or automated entirely by a secure nonscheduled video visitation system. In embodiments, the secure nonscheduled video visitation system performs voice biometrics, speech recognition, non-verbal audio classification, fingerprint and other biometric authentication, image object classification, facial recognition, body joint location determination analysis, and/or optical character recognition on the video visitation data.
Global Tel*link Corporation

Information processing terminal, communication system, information processing method, and recording medium

An information processing terminal: stores a counterpart list of one or more counterpart identifiers each representing a communication counterpart candidate of the information processing terminal; accepts a request destination identifier representing a counterpart information processing terminal, and participation authentication information; determines whether the request destination identifier matches any one of the counterpart identifiers; generates one of first communication start request information and second start request information, each request including the request destination identifier, the participation authentication information, and a request for communicating with the counterpart information processing terminal; and transmits the communication start request information to the communication management apparatus. When the request destination identifier matches the counterpart identifier, the circuitry generates the first start request information addressed to the communication management apparatus.

Method of and system for user authentication in electronic service for transmission of digital objects

A method of and a system for user authentication in an electronic service for transmitting digital objects, the electronic service accessible by a client device via a client application, the client application associated with at least one native network protocol. The method includes receiving a request for access to a user profile in the electronic service, including user account data and at least one user behavior parameter; responsive to at least one user behavior parameter being different from the user behavior parameters stored in the user profile, creating a digital object with an indication of a verification routine; transmitting the digital object via the native network protocol to the client application, the digital object configured to cause the client device to perform the verification routine via at least one non-native network protocol; responsive to the verification routine rendering a positive outcome, granting access to the user profile..
Yandex Europe Ag

Proximity-based device authentication

An accurate distance between two devices can be determined in continuous and secure manner using modulated audible signals containing time-based information. This calculated distance can be used to lock and unlock one of the two devices such that if one of the devices, such as a smart phone or smart watch, is beyond a pre-configured distance from the other device, such as a laptop or tablet, the other device locks and may display a message to the user.
Samsung Electronics Co., Ltd.

Method and system for identifying user information in social network

A method for identifying user information includes obtaining a first user identifier of a user in a social network; obtaining identity authentication information corresponding to the first user identifier; determining whether the identity authentication information is associated with a second user identifier; and storing, when the identity authentication information is associated with the second user identifier, an association relationship between the first user identifier and the second user identifier.. .
Tencent Technology (shenzhen) Company Limited

Systems and methods for device authentication

Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a first computing device may obtain a transitory identity and may send the transitory identity to a second computing device and a third computing device.
Infosci, Llc

User profile selection using contextual authentication

In embodiments, apparatuses, methods and storage media (transitory and non-transitory) are described that are associated with user profile selection using contextual authentication. In various embodiments, a first user of a computing device may be authenticated and have an access control state corresponding to a first user profile established, the computing device may select a second user profile based at least in part a changed user characteristic, and the computing device may present a resource based at least in part on the second user profile.
Intel Corporation

Virtual sim authentication

According to a first aspect of the present disclosed subject matter, a mobile terminal comprises a single cellular modem having concurrent protocol stack that is capable of simultaneous communicating over two channels with at least one mobile network, a logic selector configured to pass authentication information of a sim to the modem, wherein the sim can be a physical sim accommodated in a first slot (native sim) or a virtual sim. The terminal further comprises firmware retained in a non-transitory memory operative to cause the mobile terminal to obtain and authenticate the virtual sim for communicating with the at least one mobile networks, wherein the virtual sim is obtained from a sim server connected to a sim bank that comprises a plurality of sim profiles..

Device security utilizing continually changing qr codes

A method provides device access security via use of periodically changing quick response (qr) codes. The method includes: generating (706) a first authentication qr code and assigning (708) the generated qr code as the current authentication mechanism for accessing the device.
Google Llc

Distributing an authentication key to an application installation

Disclosed are various examples for facilitating distribution of an authentication code to installation of managed applications. An identity certificate is sent to a device by installing a configuration profile on the client device.
Airwatch Llc

Distributing security codes through a restricted communications channel

Disclosed are various examples for facilitating distribution of security codes for a two-factor authentication scheme or one-time passwords. Security codes can represent one-time passwords or shared secrets used to seed one-time password algorithms.
Airwatch Llc

Cross-platform single sign-on accessibility of a productivity application within a software as a service platform

A cross-platform single sign on (cp-sso) experience is provided herein to enable users to access multiple services via a single login when working across different platforms. A user may work across different platform when using multiple devices, when using multiple browsers on a single device, or when an integrated application requires a separate login for access within a host web application or portal service.
Microsoft Technology Licensing, Llc.

Code sequencing

A system, method, and computer-readable medium for challenge-response authentication are provided. A plurality of codes is received over a communication network based on input provided by way of a user interface displaying a plurality of images.
American Express Travel Related Services Company, Inc.

Authorization flow initiation using short-range wireless communication

In general, aspects of the disclosure are directed towards techniques for initiating an authorization flow with a user to enable a user interface-limited client computing device to obtain access to protected resources hosted by a resource service. In some aspects, a computing device comprises at least one processor.
Google Llc

Eliminating abuse caused by password reuse in different systems

Methods, systems, and computer program products for eliminating abuse caused by password reuse in different computer systems are disclosed. For example, a computer-implemented method may include receiving a security request comprising an anonymized version of authentication data from a first computer system of a first organization, analyzing the security request to determine a second computer system of a second organization to contact for detecting reuse of the authentication data, generating a second security request comprising the anonymized authentication data for the second computer system, sending the second security request to the second computer system of the second organization, analyzing a response to the second security request from the second computer system to determine whether the anonymized authentication data associated was detected, and providing a response to the first security request indicating whether the second computer system detected reuse of the authentication data..
Paypal, Inc.

Method and system for user verification

A first server receives a text message addressed to a first text destination and including authentication information the first server establishes a secure connection between the first server and a first mobile device associated with a first user, one of the first user and the first mobile device associated with the first text destination. The authentication information is then provided from the first server to the first mobile device via the secure connection..

Automatic on demand re-authentication of software agents

A system for re-authentication comprises a re-authentication server, implemented by one or more processing devices. The re-authentication server is configured to receive a re-authentication request from an organizational server, process the re-authentication request, and transmit a re-authentication prompt to a user device, wherein the re-authentication request is transmitted from the organizational server to the re-authentication server without being communicated to an application server configured to receive a request for at least one of a service and data from the user device..
Kasisto, Inc.

Binary experimentation on running web servers

Systems and methods to enable on-the-fly modification of running processes on a webserver more quickly and efficiently are discussed herein. A code vault is used to store binaries for use in production code running on a server, which are downloaded and implemented in the running process when authorized by developers.
Microsoft Technology Licensing, Llc.

Methods and systems for managing content subscription data

In some aspects, control circuitry receives, at a content provider server that is associated with a first subscription service, a first authentication key from a content aggregator server that is associated with a second subscription service, prior to the user subscribing to the first subscription service. The control circuitry generates and stores, at the content provider server, the first user account after comparing the first authentication key to acceptable authentication.
Rovi Guides, Inc.

User directed bandwidth optimization

Systems and methods are provided to optimize bandwidth usage associated with a local network. As part of the bandwidth optimization techniques, an authentication entity may receive an indication of an access profile selected by a user of an electronic device.
Gogo Llc

Traffic on-boarding for acceleration through out-of-band security authenticators

A traffic on-boarding method is operative at an acceleration server of an overlay network. It begins at the acceleration server when that server receives an assertion generated by an identity provider (idp), the idp having generated the assertion upon receiving an authentication request from a service provider (sp), the sp having generated the authentication request upon receiving from a client a request for a protected resource.
Akamai Technologies, Inc.

Automatic configuration of a wireless residential access network

A method (30) and system (10) for automatically configuring wireless local area network (wlan) devices (21, 22, 23) of a wireless residential access network (20) is provided. An automatic authorization process initiated by an access point (21) is enabled by utilizing a back-end-network (40, 50) and results in the activation of a basic service set identifier (bssid) based on which auto-pairing of at least one station (22) with the access point (21) is realized.
Thomson Licensing

Communication method based on automotive safety integrity level in vehicle network and the same

An operation method of a first communication node supporting communications between an ethernet-based network and a controller area network (can) includes: receiving an ethernet message from a second communication node belonging to the ethernet-based network; performing an integrity verification on first automotive safety integrity level (asil) authentication information included in the ethernet message; generating a can message based on the ethernet message for which the integrity verification has been completed; and transmitting the can message to a third communication node belonging to the can.. .
Kia Motors Corporation

Authentication server, authentication system, and authentication method

An authentication server according to embodiments performs statistical processing on a plurality of pieces of id data acquired from an electronic device including a puf circuit generating the pieces of id data (s1052 to s1071), determines whether the plurality of pieces of id data are physical random numbers based on a result of the statistical processing (s1072), and when the plurality of pieces of id data are determined to be physical random numbers, recognizes the result of authentication of the electronic device as a success of authentication (s1073), and when the plurality of pieces of id data are determined not to be physical random numbers, recognizes a result of authentication of the electronic device as a failure of authentication (s1074).. .
Kabushiki Kaisha Toshiba

Combined authentication and encryption

A system and methods are provided for establishing an authenticated and encrypted communication connection between two devices with at most two round-trip communications. During establishment of an initial authenticated, encrypted communication connection (or afterward), a first device (e.g., a server) provides the second device (e.g., a client) with a token (e.g., a challenge) that lives or persists beyond the current connection.
Whatsapp Inc.

System and generating a server-assisted strong password from a weak secret

Disclosed herein is a method for generating a high entropy password using a low entropy password and low-entropy login data comprising supplying the low entropy password to a system comprising a generating client and/or a recovery client; and at least n servers; submitting request data derived, at least in part, from the user's low entropy password, where the request data includes authentication data; engaging in a distributed protocol with at least t servers to generate high-entropy values based on stored cryptographic information and a set of authentication information stored on the at least n servers which is checked against the authentication data provided by the user and/or the generating client and/or a recovery client; and generating the high entropy password.. .
International Business Machines Corporation

Secure communications using organically derived synchronized processes

This disclosure provides a system and method for secure communications. The method can enable secure machine-to-machine communications within discrete security groups having two or more communication nodes using a zero knowledge authentication process and related cryptography.
Olympus Sky Technologies, S.a.

System and detecting synthetic speaker verification

Disclosed herein are systems, methods, and tangible computer readable-media for detecting synthetic speaker verification. The method comprises receiving a plurality of speech samples of the same word or phrase for verification, comparing each of the plurality of speech samples to each other, denying verification if the plurality of speech samples demonstrate little variance over time or are the same, and verifying the plurality of speech samples if the plurality of speech samples demonstrates sufficient variance over time.
Nuance Communications, Inc.

Method and system for item authentication and customization

A method of illumating an item is disclosed. The method includes applying adhesive to the item, interspersing a taggant in the adhesive, illuminating the item with an excitation signal, sensing luminescence emitted by the taggant in response to illumination by the excitation signal, and determining the authenticity of the item based on the sensed emitted luminescence.
United State Postal Service

Online payer authentication service

A payment authentication service authenticates the identity of a payer during online transactions. The authentication service of the present invention allows a card issuer to verify a cardholder's identity using a variety of authentication methods, such as the use of passwords.

Nfc payment method and apparatus implemented on mobile terminal

Disclosed embodiments include an nfc payment method and apparatus implemented on a mobile terminal. In some embodiments, an nfc payment function of a mobile terminal is activated; an nfc connection to a pos terminal is directly established in an inactive-screen state, so as to start the current payment process; payment authentication is performed on a user, so as to instruct the pos terminal to make a payment when the authentication is completed.
Baidu Online Network Technology (beijing) Co., Ltd.

Mobile terminal and controlling method thereof

A mobile terminal and controlling method thereof are disclosed, which facilitates a terminal to be used in further consideration of user's convenience. According to at least one of embodiments of the present invention, a strict authentication procedure for expense payment can be performed via a simple and convenient user interface between a mobile terminal and a terminal user.
Lg Electronics Inc.

Systems and methods for transacting at an atm using a mobile device

The disclosed embodiments provide systems and methods for transacting at a local financial service provider device using a mobile device. The system may include one or more memory devices storing instructions and one or more processors configured to execute the instructions to receive transaction data associated with a transaction request received from a mobile device associated with a customer.
Capital One Services, Llc.

Biometrics authentication based on a normalized image of an object

A method for carrying out a biometrics authentication includes detecting an object from a first image including the object, detecting feature points of the object in the detected object, generating a second image based on the feature points, wherein the second image is a normalized image of the object that is obtained by rotating and resizing the object in the first image, determining whether or not the object in the second image faces front, calculating a feature value of the object upon determining that the object in the normalized image faces front, and comparing the calculated feature value with a reference feature value for the biometrics authentication.. .
Kabushiki Kaisha Toshiba

Low power application access using fingerprint sensor authentication

A method includes detecting an interaction event on a display of a device in a locked mode. The interaction event originates at one of a fingerprint sensor of the device or an application icon and terminates at the other of the fingerprint sensor or the application icon.
Motorola Mobility Llc

Storage device and protecting against virus/malware thereof and computing system having the same

Disclosed is an operating method of a storage device, which includes detecting virus/malware, performing an authentication operation with a host device when the virus/malware is detected, and entering a recovery mode when the authentication operation indicates that authentication is successful.. .
Samsung Electronics Co., Ltd.

Identity authentication method and apparatus

Embodiments of the present disclosure disclose an identity authentication method performed at a computing device, the method including: obtaining a sequence of finger gestures on a touchpad of the computing device from a user, wherein each finger gesture has an associated pressure type on the touchpad; generating a corresponding character string according to the sequence of finger gestures; comparing the character string with a verification code of a user account associated with an application program; in accordance with a determination that the character string matches the verification code, granting the user access to the user account associated with the application program; and in accordance with a determination that the character string does not match the verification code, denying the user access to the user account associated with the application program.. .
Tencent Technology (shenzhen) Company Limited

Input authentication method

An input authentication method for verifying an accuracy of a password data inputted by a user, comprising the steps providing a sensing unit for sensing and reading a decryption data inputted by the user; providing a timing unit used for calculating decryption time intervals lapsed between decryption passwords of the decryption data; providing a recording unit for recording predefined encryption data and corresponding encryption time intervals as well as the decryption data and the decryption time intervals corresponding to the decryption passwords; providing a password verification unit for comparing whether the encryption data matches with the decryption data inputted; and providing a time interval verification unit for generating a number of tolerance intervals based on the predefined tolerance degrees set by the user in order to determine whether the decryption data inputted by the user is accurate based on whether the decryption time intervals inputted by the user are within the corresponding tolerance intervals.. .

Method and a digital leg history

A personalized way to digitally record a person's physical activities over time serves web searching, business advertising, nostalgia, security and object tracing purposes. The chronological digital history of the person's physical presence over a time includes (i) digital network entries from other members who hold their portable wireless short range device near the person's device and transmit a url or other key data and (ii) digital member entries such a digital photograph of a store sign.

Information processing apparatus, information processing system, and information processing method

An information processing apparatus is provided that includes a memory storing a program and a processor configured to execute the program to implement processes of determining whether an execution request for executing a function of the information processing apparatus has been accepted from a user, acquiring information relating to the execution request upon determining that the execution request has been accepted, generating a screen to be displayed on a display unit based on the acquired information relating to the execution request, executing an authentication process with respect to the user, and controlling the display unit to display the generated screen when the user has been successfully authenticated by the authentication process.. .
Ricoh Company, Ltd.

Assisted data input

A piece of text is saved for security verification on a computing device. One or more pieces of related text corresponding to the piece of saved text are generated, where each text element of the one or more pieces of related text is generated based on its proximity to the corresponding text element of the piece of saved text on one or more keyboards on the computing device.
Alibaba Group Holding Limited

Duplicating authentication information between connections

A method includes authenticating, by a computing device, a first connection between one or more storage units and at least one of the computing device and a first user computing device. The method further includes determining, by the computing device, to add a second connection between the one or more storage units and at least one of the computing device and a second user computing device.
International Business Machines Corporation

Information processing system and control method

An information processing system including an apparatus management server and an apparatus management agent in which an agent application controlling communication with the apparatus management server is installed is provided. The apparatus management agent sends an uninstall check request of the agent application when there is an authentication error in communication with the apparatus management server.
Canon Kabushiki Kaisha

Placement of dispersed storage data based on requestor properties

Methods for use in identifying optimal storage units for storage of data in a dispersed storage network (dsn) having geographically distributed storage units. In operation, a data object to be stored is received by a computing device functioning.
International Business Machines Corporation

Authentication system and authentication detecting breath alcohol

It is an object to prevent impersonation in breath measurement by using a portable device. After breath is introduced into a breath introduction inlet 11 of a breath introduction device 1, a first image group is acquired by continuously capturing images over a predetermined period, and after drinking determination based on the introduced breath from the breath introduction inlet 11, the portable device is provided with an imaging device 11 that acquires a second image by capturing an image again and outputs whether or not each image in the first image group and the second image are the images of the same person..
Hitachi, Ltd.

Smart key searching apparatus and method

A smart key searching apparatus includes a start button for selecting engine start or stop, a wireless charger performing wireless charging in a resonant magnetic coupling manner and transmitting an authentication request signal to a smart key, a radio frequency (rf) receiver receiving a response signal regarding the authentication request signal transmitted from the smart key, and a smart key controller requesting, when the start button is operated, the wireless charger to search for a smart key, and controlling power and engine ignition of a vehicle according to a response signal received through the rf receiver.. .
Hyundai Motor Company

Diagnostic methods and apparatuses in vehicle network

A diagnostic method performed by a gateway in a vehicle network, wherein the gateway comprises a controller and a physical (phy) layer which manages ports and is connected to the controller, may comprise receiving, by the controller, a diagnostic request message from an external diagnostic apparatus connected to a first port; receiving, by the controller, a security authentication request message from the external diagnostic apparatus when a security authentication is required for the diagnostic request message; verifying, by the controller, the security authentication request message; and activating, by the phy layer, a port of the phy layer connected to a target communication node to be diagnosed among the ports, under control of the controller, when verification of the security authentication request message is completed.. .
Kia Motors Corporation

Methods and apparatus to discover authentication information in a wireless networking environment

Examples to discover network authentication information in a wireless network involve transmitting during network discovery and prior to authentication, a generic advertisement service (gas) request to a network access point. The request requests authentication information.
Blackberry Limited

System and unified authentication in communication networks

Aspects of the subject disclosure may include, for example, a method comprising authenticating, by a server comprising a processor, a communication device to a first communication network, in accordance with authentication information stored in a first repository of the first communication network. The method also comprises determining, by the server, that a second communication network is accessible to the communication device.
At&t Intellectual Property I, L.p.

Wireless communications

This relates to wireless communications, and in particular to the generation of keying material for security purposes. In particular, a method of performing authentication for a user terminal.
Telefonaktiebolaget Lm Ericsson (publ)

Phone factor authentication

Systems and techniques are described for authenticating a user. A described technique includes receiving, by an identity management application running on a user computer, a request to authenticate a user to access a user application using the user computer.
Vmware, Inc.

Short message service gateway for media streaming security

A processor may receive a request to authenticate an endpoint device associated with a media streaming session, the media streaming session delivered to the endpoint device via a cellular access network, generate an authentication key, and transmit the authentication key to the endpoint device via a short message service message. The processor may further receive a calculated response from the endpoint device, the calculated response based upon the authentication key and a seed key of the endpoint device, determine whether the calculated response matches an expected response based upon the authentication key and the seed key, and authenticate the endpoint device based upon whether the calculated response matches the expected response..
At&t Mobility Ii Llc

Method and device for facilitating authentication over a wireless network

One method for allowing and controlling access to an open wlan network is through the use of a secure website such as a hotspot or captive portal landing page that the device must “log in” to in order to have access to the network. Credentials for a captive portal or hotspot landing page (or other websites) are conventionally managed by a browser application and stored in a browser data storage space.
Blackberry Limited

Method and connecting a communication device to a deployable network without compromising authentication keys

A method and apparatus is provided for connecting a communication device to a deployable system. The deployable system obtains at least one deployable key derived on a fixed system for the deployable system based on an existing key stored on a database of the fixed system, wherein the existing key is used to authenticate a communication device.
Motorola Solutions, Inc

Authentication system and mobile terminal for executing user authentication with ultrasonic communication function

An authentication system comprises a mobile terminal configured to output an ultrasonic wave including authentication information; and a first device configured to receive the ultrasonic wave output by the mobile terminal, carry out authentication on the basis of the obtained authentication information extracted from the ultrasonic wave and allow execution of a job at the time the authentication is established.. .
Toshiba Tec Kabushiki Kaisha

Image forming apparatus and authentication method

An image forming apparatus including applications and system side software for providing system side services to the applications is provided, in which the image forming apparatus includes: an authentication module for displaying an authentication screen on an operation panel of the image forming apparatus, wherein the authentication module allows the image forming apparatus to display a screen for using the image forming apparatus instead of the authentication screen if authentication data input from the authentication screen satisfies an authentication condition, and wherein the authentication module is provided in the image forming apparatus separately from the system side software.. .

Voice communication processing method and system, electronic device, and storage medium

The present disclosure discloses a voice communication processing method and system, an electronic device, and a storage medium. The method includes: initiating from a first account, through a first application, a voice activation request to a server side; receiving a verification code that is returned by the server side and that corresponds to the first account; calling, through the first application, a voice communication authorization interface to send an authentication request comprising the verification code to the server side; the server side providing an authentication result; and initiating operations of the voice communication service interface, based on the authentication result..
Tencent Technology (shenzhen) Company Limited

System and method providing data-driven user authentication misuse detection

Systems, methods, and other embodiments are disclosed for data-driven user authentication misuse detection. In one embodiment, for each of multiple authentication attempts to a computing device by a user via user authentication log messages: user authentication log data having user attribute values is collected; the user authentication log data is transformed into a tracer data structure having the user attribute values organized in a common format; the tracer data structure is augmented with timestamp data to generate an event data structure, where the timestamp data represents a time at which the user authentication log data is observed by the computing device; a user behavior model filter, representing account usage patterns of the user, is updated based at least in part on the event data structure.
Oracle International Corporation

Computer user authentication using machine learning

Systems and methods are described herein for computer user authentication using machine learning. Authentication for a user is initiated based on an identification confidence score of the user.
Cylance Inc.

Systems and methods for scalable-factor authentication

Authentication systems and methods can selectively authenticate a request to access a resource data store storing access rights associated with a user device. The systems and methods can scalably execute challenges workflows as part of the authentication process.
Live Nation Entertainment, Inc.

Shared terminal, communication system, display control method, and recording medium

A shared terminal includes: circuitry to control a display to display an image to a plurality of users, the plurality of users sharing a use of the shared terminal, and obtain, from a first privately-owned terminal owned by a first user of the plurality of users, first terminal identification information for identifying the first privately-owned terminal; a transmitter to transmit, to a terminal management server, an authentication request for authenticating the first privately-owned terminal to allow login of the first user into the shared terminal, the authentication request including the first terminal identification information of the first privately-owned terminal; and a receiver to receive an authentication result indicating whether the first privately-owned terminal is authenticated to allow login of the first user, from the terminal management server. When the authentication result indicates that the first privately-owned terminal is a legitimate terminal and login of the first user is successful, the circuitry controls the display to display a screen for allowing the plurality of users including the first user to draw an image.

Dash-aware network application function (d-naf)

Technology for a network application function (naf) on a network element is disclosed. The naf can authenticate a client using a generic bootstrapping architecture (gba)-based authentication and authorization procedure.
Intel Ip Corporation

User profile selection using contextual authentication

In embodiments, apparatuses, methods and storage media (transitory and non-transitory) are described that are associated with user profile selection using contextual authentication. In various embodiments, a first user of a computing device may be authenticated and have an access control state corresponding to a first user profile established, the computing device may select a second user profile based at least in part a changed user characteristic, and the computing device may present a resource based at least in part on the second user profile.
Intel Corporation

Encrypted biometric authentication

In an embodiment of the present disclosure, an embodiment includes a user device comprises a conversion engine configured to receive a biometric file comprising biometric identification information of a user and convert the biometric file into a first numeric representation. The user device further comprises a hashing engine configured to create a superimposed numeric representation by performing a convolution operation on the first numeric representation and a second numeric representation, wherein the second numeric representation is based on a key file that is different from the biometric file.
Bank Of America Corporation

Authentication method, authentication system, and communication device

A controller and a device generate a shared key by performing mutual authentication using a public key certificate of the controller and a public key certificate of the device. The controller and the device set an expiry for the shared key to one of the expiry of the public key certificate of the controller and the expiry of the public key certificate of the device.
Panasonic Intellectual Property Management Co., Ltd.

Request-specific authentication for accessing web service resources

Requests for access to web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of authentication is provided to grant that request.
Microsoft Technology Licensing, Llc

Sram-based authentication circuit

A memory device includes a memory block comprises a plurality of bits, wherein at least a first bit of the plurality of bits presents an initial logic state each time it is powered on; a start-up circuit configured to power on and off the memory block n times, where n is an odd integer greater than 1, and wherein the at least first bit presents an initial state after each respective power cycle of the memory block; and an authentication circuit, coupled to the memory block, and comprising an election engine that is configured to elect an initial state that occurs (n+1)/2 or more times after n power cycles that are performed by the start-up circuit, as a majority initial logic state for the first bit.. .
Taiwan Semiconductor Manufacturing Co., Ltd.

Generating cryptographic checksums

A method (400) of generating a cryptographic checksum for a message m(x) is provided. The method is performed by a communication device, such as a sender or a receiver, and comprises calculating (405) the cryptographic checksum as a first function g of a division of a second function of m(x), f(m(x)), modulo a generator polynomial p(x) of degree n, g(f(m(x)) mod p(x)).
Telefonaktiebolaget Lm Ericsson (publ)

Active security token with security phantom for porting a password file

An active security token includes: a sentry that controls access to token data disposed on the active security token through verification of user authentication data; the token data including: reference authentication data for verification of user authentication data; and a security phantom including a password file, the security phantom being a public key certificate or a biometric template.. .
Government Of The United States Of America, As Represented By The Secretary Of Commerce

Providing single sign-on (sso) in disjoint networks with non-overlapping authentication protocols

A method of enabling single sign-on (sso) access to an application executing in an enterprise, wherein authorized, secure access to specific enterprise applications are facilitated via an enterprise-based connector. In response to successful authentication of an end user via a first authentication method, a credential associated with the successful authentication is encrypted to generate an encrypted user token.
Akamai Technologies, Inc.

Cryptographic side channel resistance using permutation networks

A method (and structure) includes receiving a challenge for an authentication, in a chip having stored in a memory device therein a secret to be used in an authentication attempt of the chip by an external agent. The chip includes a hardware processing circuit to sequentially perform a processing related to the secret.
International Business Machines Corporation

Systems and methods for geo-fencing device communications

Systems and methods for uav safety are provided. An authentication system may be used to confirm uav and/or user identity and provide secured communications between users and uavs.
Sz Dji Technology Co., Ltd

Apparatus for locking and/or unlocking

An apparatus for locking and/or unlocking, in particular for an access and/or drive authorization and/or for other services in a motor vehicle in the type of a keyless entry/go functionality, for a wireless remote control or the like comprising a first device in the motor vehicle and an associated second device designed in the type of an electronic key, an id-transponder, a chip card or the like, wherein both devices for the intended operation have transmitters and/or receivers for electromagnetic signals which allows a large operation distance and a long battery lifetime of the second device. This is achieved in that the first device transmits a first cyclic repeated signal for the activation and/or authentication of the second device with a first data protocol within a first transmission time interval and with a first cycle time..
Atmel Corporation

Entry managing system

An entry managing system connected to a door-lock device is disclosed. The system controls a camera to start shooting a monitoring video of a monitoring region and stores the monitoring video in a memory when a doorbell trigger receives an operation of a visitor.
Jsw Pacific Corporation

Method and system for facilitating rules-based communications between two external sources

Methods and systems are described herein for facilitating rules-based communications between two external sources. The system comprises a non-transitory storage device that has embodied therein one or more routines operable to deliver initial communications and responses thereto between a first user and a second user.
High Freguency Trading System Llc

Method and system for managing a gamified trustee based social authentication to recover an account of a user

The invention provides a method and system for managing a gamified trustee based social authentication to recover an account of a user. The method for managing the gamified trustee based social authentication to recover the account of the user includes the step of registering a plurality of trustees associated with the user.
The King Abdulaziz City For Science And Technology

Apparatus, system, server and methods for carrying out a transaction

There is provided an apparatus, system, server and method for carrying out a transaction. The apparatus, system, server and method enables positive authentication of a user, so that the transaction can be carried out..
Mastercard Asia/pacific Pte Ltd

User interfaces for stored-value accounts

In some examples, an account is provisioned onto an electronic device. In some examples, the device receives a value to fund the account provisioned on the electronic device.
Apple Inc.

Method and system using quantum random generator

Provided is a settlement authentication method and system using a quantum random number generator. The method includes the steps of requesting, by a mobile terminal, a random number from a bank server and a pos terminal each including a quantum random number generator, periodically receiving a first quantum random number generated by the pos terminal and a second quantum random number generated by the bank server, and simultaneously sending a first quantum random number most recently received from the pos terminal to the bank server and a second quantum random number most recently received from the bank server to the pos terminal when the mobile terminal requests settlement..
Eyl Inc.

Express credential transaction system

A device implementing an express credential transaction system includes at least one processor configured to receive an indication that a payment applet for a service provider has been provisioned on a secure element of the device with a first attribute indicating that the payment applet can be utilized for a transaction without authentication associated with the transaction. The processor is configured to set the first attribute of the payment applet to indicate that authentication is required to utilize the payment applet when another payment applet for the service provider provisioned on the secure element of the device has an attribute that indicates the other payment applet can be utilized for the transaction without user authentication.
Apple Inc.

Method and system for cardless atm transaction via mobile device

A method for initiating a cardless automated teller machine (atm) transaction via a mobile computing device includes: storing, in a memory of a mobile computing device, at least transaction account data and authentication data; receiving, by an input device of the mobile computing device, at least desired transaction data and authentication information; receiving, by the input device of the mobile computing device, a unique identifier associated with an automated teller machine (atm); authenticating, by an authentication module of the mobile computing device, the received authentication information based on the stored authentication data; and electronically transmitting, by a transmitting device of the mobile computing device, at least the received desired data and unique identifier and a result of the authentication to an external computing system.. .
Mastercard International Incorporated

Transaction scheme for offline payment

An authentication factor is received, including an authentication key, an account information of a user, and a dynamic time factor. A bound authentication information is generated by using the authentication factor and a device information of a client device that requested the secure offline payment.
Alibaba Group Holding Limited

Verifying electronic transactions

Electronic payments are verified in an electronic payment system in which at each of multiple rounds there is a set of players v, such that a payment is valid if the payment is authenticated to be valid by a given majority of the players in v. Verifying the electronic payments includes having a player vi in v receive authentication of multiple payments during one of the multiple rounds of the electronic payment system, having vi determine which of the multiple payments are valid, having vi authenticate a subset of the multiple payments that vi determines valid to provide an authenticated payment record, and having vi cause the authenticated payment record to become widely available to enable at least another entity to determine whether a given payment authenticated valid by vi is authenticated to be valid by the given majority of the players in v..

Viewing session takeover in medical imaging applications

A system for viewing session takeover is provided. A plurality of user accounts have access to patient medical data images.
International Business Machines Corporation

Event-based user state synchronization in a local cloud of a cloud storage system

Cloud storage systems and methods are described for providing event-based user state synchronization among the various cloud elements. A global user directory is maintained on a remote cloud storage system.
Egnyte, Inc.

A mobile device and systems to securely remotely access, manage and store an enterprise's data, using employees smart add-ons and mobile devices

A mobile device, a method and system are providing the invention mobile bring your own device (byod) enhanced security management platform solution. The platform enables users to securely access the secured enterprise data and its it management, through the employees/users invention personal mobile device.
Os-new Horizons Personal Computing Solutions Ltd.

Managing latency and power in a heterogeneous distributed biometric authentication hardware

Techniques for authenticating a biometric input are disclosed. An example of a biometric authentication system is configured to receive a biometric input, perform a first authentication process on the biometric input with an application processor, such that the first authentication process generates one or more authentication parameters, provide the one or more authentication parameters to a secure processor, perform a second authentication process on the biometric input on the secure processor, such that the second authentication process utilizes the one or more authentication parameters, and output an authentication score based on the second authentication process..
Qualcomm Incorporated

System and supplying security information

A wearable device having one or more processors configured to receive one or more signals representative of biometric parameter(s) and sensed presence of a user. The one or more processors configured to compare the biometric parameter to a stored user parameter for authentication of the user.
Tokenize, Inc.

Audiovisual associative authentication method, related system and device

Electronic system (106, 109a) for authenticating a user of an electronic service, said system preferably comprising at least one server apparatus, the system being configured to store (122, 112, 200), for a number of users, a plurality of personal voice-prints (204) each of which being linked with a dedicated visual, audiovisual or audio cue (202), for challenge-response authentication of the users, wherein the cues are user-selected, user-provided or user-created, pick (116, 200c, 142, 144), upon receipt of an authentication request associated with a claim of an identity (160) of an existing user of said number of users, a subset of cues (212) for which there are voiceprints of the existing user stored (112), and provide the cues for representation to the user as a challenge, receive (126, 148, 150) sound data indicative of the voice responses uttered by the user to the represented cues, said voice responses being captured utilizing both air and throat microphones, determine (114, 152, 154, 156, 158) on the basis of the sound data, the represented cues and voiceprints linked therewith and the existing user, whether the response has been uttered by the existing user of said number of users, wherein the sound data indicative of the voice responses uttered to the represented cues are preferably matched as concatenated against a concatenated voiceprint established based on the voiceprints linked with the represented cues and the existing user, and provided that this seems to be the case, elevate (116, 152, 200d, 218, 216) the authentication status of the user as the existing user, preferably regarding at least the current communication session. Related method and device (102c) are presented..
Aplcomp Oy

User authentication using prompted text

Methods, computing systems and computer program products implement embodiments of the present invention that include defining a verification string including a sequence of verification characters and a delimiter character between each sequential pair of the verification characters, the delimiter character being different from the verification characters. The verification string to a user, and upon receiving, from the user, a series of verification vocal inputs in response to presenting the verification string, a set of verification features from each of the verification vocal inputs are computed so as to generate sets of verification features.
International Business Machines Corporation

Accessing a user equipment using a biometric sensor concurrently with an authentication pattern

The present application relates to authenticating a user of a user equipment (ue). Specifically, the described aspects include presenting for display an authentication pattern on a display of the ue after receiving an input representing a scan of a fingerprint.
Qualcomm Incorporated

Continuous user authentication

A method of enabling continuous user authentication, comprising: setting up an authentication server to provide authentication data to an enterprise server in parallel to a remote user session with the enterprise server, when the user is using a touch screen device; extracting samples from a user's behavior, to build a library of user specific parameters; and tracking user behavior to authenticate the user, the tracking comprises initial identification of a user of the touch screen device when starting a session with the enterprise server and continuous authentication of the user during the session with the enterprise server.. .
Securedtouch Ltd.

Processing equipment and remote management system

A processing equipment includes a processing unit having a plurality of functions. A retaining unit retains a device identifier capable of identifying the processing equipment.
Nippon Telegraph And Telephone Corporation

Universal serial bus smart hub

A usb smart hub may provide enhanced battery charging, data storage security, vendor matching, device authentication, data capture/debug, and role switching. The smart hub may include an upstream port, a plurality of downstream ports, a processor, and a memory coupled to the processor for storing usb host stack code and configuration parameters.
Microchip Technology Incorporated

Method and system for using pre-existing connections in a dispersed storage network

A method begins with a processing module identifying set of distributed storage (ds) units to process an access request. The method continues with the processing module determining that there is a pre-existing connection between the processing module and the set of ds units and when there is a pre-existing connection determining whether to use the pre-existing connection based on factors associated with the pre-existing connection.
International Business Machines Corporation

Electronic apparatus and operating method thereof

An electronic device and an operating method are provided. The electronic device includes a display and a processor.
Samsung Electronics Co., Ltd.

Information processing system, information processing apparatus, image forming apparatus, methods for controlling the same, and storage medium

The present remote support system is provided as an information processing system including an image forming apparatus, an information processing apparatus, and a relay server. The present information processing apparatus obtains a first session id and temporary authentication information for communicating with the image forming apparatus via the relay server by transmitting a request to the relay server, and the information processing apparatus displays the temporary authentication information on a display.
Canon Kabushiki Kaisha

System and authenticating critical operations on solid-state drives

A method includes: receiving an operational command directed to a solid-state drive (ssd) and a security credential; issuing an asynchronous event from the ssd to an authentication agent including the security credential and a security certificate, wherein the security certificate is encoded based on the security credential and is stored in the ssd; forwarding the security credential and the security certificate from the authentication agent to an authentication server; validating the security certificate based on the security credential at an authentication server; providing a validation response from the authentication server to the authentication agent; forwarding the validation response from the authentication agent to the ssd; and executing the operational command based on the validation response.. .
Samsung Electronics Co., Ltd.

Apparatus for activating an electrically or electronically controlled appliance from an energy-saving passive state

An apparatus for activating an electrically or electronically controlled appliance from an energy-saving passive state, especially a locking system for locking and/or unlocking, in particular for an access and/or authorization and/or for other services for a wireless remote control, for controlling of front doors, for motor vehicles, or the like comprising a first device in the appliance and an associated second device designed in the type of an electronic key, an id-transponder, a chip card or the like, wherein both devices for the intended operation have transmitters and/or receivers for electromagnetic signals is suggested which allows a large operation distance and a long battery lifetime of the second device. This is achieved in that the first device transmits a first cyclic repeated signal for the activation and/or authentication of the second device with a first data protocol within a first transmission time interval and with a first cycle time..
Atmel Corporation

Keyless car sharing mechanism using smartphones and inbuilt wifi systems for authentication

A method of operating/renting keyless motor vehicles includes configuring a user's smartphone to wirelessly communicate with the security systems of at least a selected keyless vehicle, whereby the user's smartphone can transmit a digital key to the security system of a keyless vehicle to permit operation thereof. A digital key for a selected keyless vehicle is transmitted to the user's smartphone, and the user is provided with an authorization code that can be used to gain entry into the selected vehicle.
Ford Global Technologies, Llc

Authentication of mobile servers

In one embodiment, a method, apparatus, and system of authenticating a mobile server may have at least one mobile server configured to execute games of chance on a plurality of mobile gaming devices and an authentication server configured to: determine a location of the at least one mobile server; determine a wireless communication means to communicate with the at least one mobile server based on the location of the at least one mobile server; communicate with the at least one mobile server via the determined wireless communication means; and initiate authentication, by an authentication server, of the at least one mobile server.. .
Nguyen Gaming Llc

Voice interface for a dialysis machine

A dialysis system, comprising: a dialysis machine; an authentication component configured to determine that a source of a voice command received by the dialysis system is an authorized user of the dialysis system; and a processor configured to carry out a function determined based on the voice command.. .
Fresenius Medical Care Holdings, Inc.

Continuous assessment of biological analytes for general wellness

An analyte monitoring platform consisting of a proximity communicator and an implantable biosensor that includes system architecture for biosensor authentication, identification and methods to use analyte sensors for general wellness. The system architecture also permits multi-analyte sensing.
Biorasis, Inc.

Bypassing security authentication scheme on a lost device to return the device to the owner

Some embodiments provide a method for bypassing device security protections to communicate with a contact of a secure device. The method displays a selectable user interface object on the device enabling a user to bypass the security protections of the device.
Apple Inc.

Network access support

In order to support the access of a terminal to a mobile communication network, a network subscriber identifier and a plurality of authentication data sets relating to this network user identifier are transferred to the terminal by an access support server. The plurality of authentication data sets are generated previously by a server of the mobile communication network, after the access support server has transmitted the network subscriber identifier to the server.
Giesecke + Devrient Mobile Sercurity Gmbh

Interactive billboard system for an elevator

An interactive billboard system includes a main control module configured to communicate with a smart device. The main control module has a location module to determine a location of image data transmitted by the smart device, an authentication module that authenticates a smart device based at least in part on authentication information transmitted by the smart device, and a content module that receives content information from the authenticated smart device and transmits the content information to a display positioned in an elevator car..
Otis Elevator Company

Systems and methods to authenticate using vehicle

In one aspect, a vehicle includes an engine, a drive train and chassis, a battery, a wireless transceiver, and a vehicle computing system that controls the engine, drive train, chassis, battery, and wireless transceiver. The vehicle computing system includes a cryptographic processor that has program instructions to communicate with a device separate from the vehicle to provide authentication information to the device via the wireless transceiver..
Lenovo (singapore) Pte. Ltd.

Authentication for device connection using visible patterns

Wireless communication is established between electronic devices by an initiating device transmitting a wireless communication request to a peripheral device; the initiating device detecting a visible electromagnetic pattern displayed on the peripheral device in response to the wireless communication request; the initiating device decoding the visible electromagnetic pattern to generate a passcode; and the initiating device echoing the passcode to the peripheral device to authenticate the wireless communication request without user intervention.. .
International Business Machines Corporation

Apparatus and two-way authentication

A method of an enterprise server for performing two-way authentication with a mobile device in a network is provided. The method includes receiving, by an enterprise server of the network, a user context record (ucr) generated by the mobile device when the mobile device initiates a connection request to the network; calculating, by the enterprise server, an authenticity score based on the received ucr; validating, by the enterprise server, the authenticity of the mobile device based on the authenticity score; and generating and transmitting, by the enterprise server, an information to the mobile device for the mobile device to validate the authenticity of the enterprise server based on the transmitted information..
Samsung Electronics Co., Ltd.

Apparatus and optimizing remote authentication of virtual subscriber identity module on dual-sim dual-standby device

A method for optimizing remote authentication of a virtual subscriber identity module (vsim) for a multi-subscriber identity module (sim) multi-standby (msms) mobile communication device includes: receiving a vsim authentication request from a vsim network; determining whether a previous packet switched (ps) connection between the vsim and the vsim network is available; in response to determining that the previous ps connection between the vsim and the vsim network is available, performing vsim authentication using the previous ps connection between the vsim and the vsim network.. .
Qualcomm Incorporated

Subscription service for authorizing access to media content

Embodiments are provided for automatically providing subscriber authentication and authorization services. For example, a subscription service communicates with an identity service provider to authenticate subscribers requesting video content from programmers and a payment service provider to confirm that authenticated subscribers are authorized to receive the content.
Adobe Systems Incorporated

Image processing device and non-transitory computer-readable medium

An image processing device includes an authenticator, an estimator, and a controller. The authenticator uses authentication information received from a user to authenticate and determine whether or not the user is a person allowed to execute plural functions related to images.
Fuji Xerox Co., Ltd.

Network printer detection and authentication for managed device deployment

Disclosed are various examples for network printer detection and authentication for managed device deployment. In one example, a computing environment can receive an identifier from a client device over a network, where the client device detects the identifier based on a wireless transmission performed by a transmitter in association with a print operation assigned to a network printer.
Airwatch Llc

Electronic apparatus, control device, and recording medium

The electronic apparatus includes a display, a hardware button, a fingerprint sensor, and at least one processor. The fingerprint sensor detects a fingerprint of a finger touching the hardware button.
Kyocera Corporation

Method, apparatus and system for establishing a real-time telecommunication session

Methods, apparatuses and systems for establishing a telecommunication session may include receiving a plurality of communication identifiers of a first type, determining one or more communication identifiers of a second type based on, for each, its association with at least one of the communication identifiers of the first type, associating the one or more communication identifiers of the second type with an identifier of the telecommunication session, receiving a request to join the telecommunication session and bypassing an authentication action and granting the request to join the telecommunication session. Alternatively, methods, apparatuses and systems for establishing a telecommunication session may include initiating, at a time based on at least a time period associated with the telecommunication session, one or more connection requests, each connection request directed to one of the communication identifiers of the second type that is associated with the identifier of the telecommunication session..
Vonage Business Inc.

Security and permission architecture

When a user inputs an action request, such as a requested command, to be performed on a target machine, a management system receives the request and verifies it with a separate authentication and permission system. The verified command request is sent to the target machine.
Microsoft Technology Licensing, Llc

Device-agnostic user authentication and token provisioning

In various embodiments, the user of a client device that executes a remote application is authenticated by first receiving an http or https request to authenticate the user from the remote application. The user is prompted for authentication information, and authentication information is obtained by communicating with a hardware device in electronic communication with the client device.

Enhanced security using wearable device with authentication system

An approach is provided for securing a network-accessible site such as a bank, financial institution, or a user's home system. A request is received from a user of the network-accessible site.
International Business Machines Corporation

Integrated dns service provider services using token-based authentication

Techniques for allowing third-party dns service providers to programmatically initiate changes to dns resource records using an interface provided by a registrar or registry are disclosed. Further, techniques for validating change requests received at such an interface are disclosed.
Verisign, Inc.

End-to-end protection for shrouded virtual servers

Technical solutions are described for securely deploying a shrouded virtual server. An example method includes sending, by a host manager, authentication information of a hosting system to a client device in response to a request from the client device.
International Business Machines Corporation

Method for performing authentication of user equipment for individual services in wireless communication system and the same

A method for performing authentication of a user equipment (ue) for individual services in a wireless communication system according to the present invention, which is performed by a first network node providing a common control function, comprises receiving from a ran (radio access network) node a first message with respect to the ue's request to connect to a core network; and transmitting a second message for requesting authentication of the ue's connection request to a specific second network node on the basis of an indicator included in the first message.. .
Lg Electronics Inc.

Authentication system and method based on authentication annotations

A system and method for providing secure access to electronic records. A processor receives, from a first client, a first request to access the electronic records, authenticates the first client, and provides access to the electronic records in response to determining that the first client is authenticated.
Genesys Telecommunications Laboratories, Inc.

Preventing unauthorized access to secured information systems by injecting device data collectors

Aspects of the disclosure relate to providing information security and preventing unauthorized access to resources of an information system by injecting device data collectors into pages and/or other interfaces provided by and/or otherwise associated with an information system. A computing platform may intercept a request corresponding to a selection of an interface element included in a modified version of a first page associated with a uniform resource locator.
Bank Of America Corporation

Mutual authentication

A first terminal and a server, wherein the first terminal is configured to authenticate the server by: generating a first authentication token, being a data structure to be used for authenticating a first computing device to a second computing device; and sending the first authentication token to the server, wherein the server is configured for receiving the first authentication token and authenticate it; generating a second authentication token for the first terminal; and send the second authentication token to the first terminal, whereby the first terminal is configured for receiving the second authentication token and authenticate it, thereby performing a mutual authentication of the first terminal and the server.. .
Kelisec Ab

Terminal control

A terminal control method includes acquiring eyeball information of a user upon receiving an operation request of the user; sending an application request to a control terminal, the application request carrying the eyeball information, for the control terminal to perform identity authentication according to the eyeball information; receiving permission information returned by the control terminal after the identity authentication is passed; and executing the operation request on the basis of the permission information. Also disclosed are a further terminal control method and corresponding devices..
Guangdong Oppo Mobile Telecommunications Corp. Ltd .

Method for automatically deleting a user password upon successful use of a multi-factor authentication modality

A method is provided for automatically deleting user passwords. Upon receiving a password-less user authentication a password grace period timer is started.
Motorola Solutions, Inc

Methods and user device and authenticator device for authentication of the user device

A method and a user device (110) for authentication of the user device (110) as well as a method and an authenticator device (120) for authentication of the user device (110) are disclosed. The user device (110) generates (a030) a one-time password.
Telefonaktiebolaget Lm Ericsson (publ)

Controlling device operation based on interaction with additional device

Systems and arrangements for modifying the functionality of a computing device are provided. A user may initiate an event at the computing device and may select an option to provide enhanced operations.
Bank Of America Corporation

Identification federation based single sign-on

A computer readable medium having instructions embodied therewith, the instructions executable by a processor or programmable circuitry of a federation server to cause the processor or programmable circuitry to perform operations including configuring a plurality of identification (id) federations between the federation server and a plurality of applications such that each of the plurality of id federations is between the federation server and one of the plurality of applications, receiving a first authentication request for authenticating a user who has been authenticated on a first application of the plurality of applications using an id federation between the first application and the federation server from among the plurality of id federations, and sending a second authentication request to a second application of the plurality of applications for authenticating the user using an id federation between the federation server and the second application from among the plurality of id federations.. .
International Business Machines Corporation

Methods and systems for efficient content delivery

Methods and systems for improved device authentication and presentation of media content to passengers aboard a transportation apparatus are disclosed. In some aspects, authentication of a device may be simplified based on previous associations made between the device, a user, and travel on a transportation apparatus within a particular time period.
Viasat, Inc.

Secure transaction systems and methods

Systems and methods are described that use tag authentication and presence verification techniques in connection with a variety of transactions. In certain embodiments, an authentication device may verify the authenticity of a secure tag by determining whether the secure tag stores secret information provisioned by a trusted authority.
Intertrust Technologies Corporation

Displaying the accessibility of hyperlinked files

The accessibility of a hyperlinked files is displayed. A hyperlink that references a resource is extracted from a target file.
International Business Machines Corporation

Entitlement based wi-fi authentication

This disclosure relates to techniques for performing wi-fi authentication using an entitlement server in a wireless communication system. A wireless station may perform authentication with a carrier network entitlement server, using a protocol other than wi-fi.
Apple Inc.

Adaptive enhanced environment-aware authentication for iot devices

A mechanism is provided for authentication and authorization of an access to a resource by a device may be provided. The device may be a system-on-a-chip resource weak device.
International Business Machines Corporation

Secure captcha test

In one embodiment, a system including a processor to run a web browser application and a captcha challenge application, wherein the web browser application is operative when run to retrieve and present a web page of a website, obtain a request from the website requesting performance of a captcha challenge process, and request the captcha challenge application to perform the captcha challenge process, the captcha challenge application is operative when run to request a captcha challenge test from an authentication server, obtain the captcha challenge test, render a captcha window including the captcha challenge test, obtain a user response to the captcha challenge test, send a value based on the user response to the authentication server, and obtain a response from the authentication server authenticating the user response, and the captcha challenge application and the web browser application are run as different processes by the processor.. .
Cisco Technology, Inc.

User authentication using audiovisual synchrony detection

Methods, computing systems and computer program products implement embodiments of the present invention that include receiving, at a first time, first video and first audio signals generated in response to a user uttering a passphrase, and receiving, at a second time subsequent to the first time, second video and second audio signals generated in response the user uttering the passphrase. Upon computing an audio temporal alignment between the first and the second audio signals and computing a video temporal alignment between the first and the second video signal, the user can be authenticated by comparing the audio temporal alignment to the video temporal alignment..
International Business Machines Corporation

Using dispersal techniques to securely store cryptographic resources and respond to attacks

A dispersed storage network (dsn) includes a dsn memory, which in turn employs multiple distributed storage (ds) units to store encrypted secret material that can be decrypted using an unlock key. The unlock key is stored external to the ds unit, in some cases using multiple data slices dispersed throughout the dsn.
International Business Machines Corporation

Method and system for facilitating authentication

A method and system for facilitating authentication of a user for a network transaction. The method includes receiving a request for a transaction over a first communication channel.
18 Degrees Lab Pte. Ltd.

Methods and systems for pki-based authentication

Methods, systems, and devices are provided for authenticating api messages using pki-based authentication techniques. A client system can generate a private/public key pair associated with the client system and sign an api message using the private key of the private/public key pair and a pki-based cryptographic algorithm, before sending the signed api message to a server system.

Method for authenticating an instrument for processing a biological sample or reagent and system comprising an instrument for processing a biological sample or reagent

A method for authenticating an instrument for processing a biological sample or reagent is disclosed. The method comprises generating a pin code by the instrument, entering the pin code and identification data associated with the instrument in a database of an electronic device, verifying the pin code and identification data at the electronic device, transmitting an authentication certificate to the instrument if the pin code and identification data correspond to target data stored in the database, installing the authentication certificate on the instrument, whereby the instrument is registered with the electronic device, and using the authentication certificate for an encrypted communication between the instrument and the electronic device.
Roche Diagnostics Operations, Inc.

Integrated dns service provider services using certificate-based authentication

Techniques for allowing third-party dns service providers to programmatically initiate changes to dns resource records using an interface provided by a registrar or registry are disclosed. Further, techniques for validating change requests received at such an interface are disclosed.
Verisign, Inc.

Secure mechanism for subsidy lock enforcement

A malicious party may attempt to avoid a mobile network operator (mno) contract involved with subsidy-lock by inserting an interfering piece of hardware called a proxy sim in a device. The device provided herein uses an authentication technique to guard against a proxy-sim attack.
Apple Inc.

Asset authentication in a dynamic, proximity-based network of communication devices

Asset authentication in a dynamic, proximity-based network of communication devices, each having a first interface for establishing the dynamic, proximity-based network by short-range wireless beacon broadcast messaging, and a second interface for communicating with a server by broadband communication. A first communication device sends (210) via the first interface an authentication request to a second communication device having an associated asset.
Crunchfish Ab

Method, apparatus, and system for providing encryption or integrity protection in a wireless network

A core network node identifies a non-usim based authentication procedure to be utilized by a wireless communication device, wcd, being served by the core network node. The node obtains a session key associated with the identified non-usim based authentication procedure.
Telefonaktiebolaget Lm Ericsson (publ)

Authentication system, authentication side device, and security system

The authentication system comprises: the authentication side unit configured to include the intensity modulated weak light source, the first reading unit, the decrypting unit, and the determining unit; and the client side unit configured to include the detecting unit, the second reading unit, and the encrypting unit. The intensity modulated weak light source generates intensity modulated weak light.
Oki Electric Industry Co., Ltd.

Symmetric encryption key generation using wireless physical layer information without sharing any information pertinent to the key

Symmetric keys are generated by an algorithm that uses the randomness from the wireless phy layer to extract the keys. When used with reconfigurable antennas, the algorithm yields longer keys.
Drexel University

Optically based bankenote authentication system having broke discrimination

A method and a system are disclosed for processing a banknote. The method includes providing a banknote having at least one photonically active security feature, the banknote being moved along a conveyance path; illuminating the at least one security feature with light from a stimulus source; identifying a location of the at least one security feature by detecting an emission from the security feature; directing an excitation source at the identified location; illuminating the at least security feature with light from the excitation source; and detecting a further emission from the photonically active security feature in response to the light from the excitation source.
Spectra Systems Corporation

Method and system for access control

The present disclosure generally relates to a computerized method comprising: communicating access details of the facility from the mobile device to the facility for a first authentication process, the mobile device located in the vicinity of the facility initially in a secured state for preventing access thereto; receiving a request notification on the mobile device in response to positive authentication of the access details from the first authentication process, the request notification comprising a request for biometric data of the user; receiving an input of the biometric data on the mobile device; and communicating the biometric data from the mobile device to a host server for a second authentication process, wherein the facility is configured to change from the secured state to an unsecured state in response to positive authentication of the biometric data from the second authentication process, thereby providing, to the user, access to the facility.. .
Mastercard International Incorporated

Sensors and system for detection of device movement and authentication of device user based on messaging service data from service provider

Features are described for efficiently and accurately provisioning content to a mobile device with limited user interaction. The features include storing a content identifier for a content element and a publication rule for the content element in a data storage device, the publication rule identifying a user to whom the content element can be provided.
Experian Information Solutions, Inc.

Organic light emitting diode ("oled") visual authentication circuit board

A circuit board that includes oled display technology is provided. An oled display may present light patterns recognizable by a hearing or visually impaired users.
Bank Of America Corporation

Retrieving payment information for a user from an authentication server for use in purchase requests to vendors

A payment system receives a purchase request from a client device identifying products or services from a vendor. An authentication server stories payment information in association with various device identifiers.
Venuenext, Inc.

Systems and methods for consolidated message processing

A network translation computing device for processing consolidated messages is disclosed. The network translation computing device receives a web-based authentication response including a plurality of data elements in a web-based format.
Mastercard International Incorporated

Automated package relocation from an unmanned kiosk

Automated package deliveries comprises a server at a package delivery system that receives a request for a package delivery, the request comprising an identification of a package and an identification of a first kiosk location. The server associates the package with an aerial delivery device and a user authentication to retrieve the package.
Google Llc

Online pseudonym verification and identity validation

Methods, systems, and computer program products for authenticating an online user. Authentication involves sending a code from a server to a user device equipped with a source of illumination and a camera capable of capturing video imagery of the online user.
Iproov Ltd.

Simple authentication of elements in blister packages

A simple and quick verification of the authenticity of a blister of elements, such as pills in the pharmaceutical industry, is provided. The pills packaged in a blister can be authenticated using mobile imaging devices such as a mobile smartphone.
I-property Holding Corp.

Authentication and secure transmission of data between signature devices and host computers using transport layer security

A transport layer security (tls) connection is established between a signature device and the host computer via an interface (e.g., a universal serial bus (usb) interface). The signature device acts as a tls server, and the host computer acts as a tls client.
Wacom Co., Ltd.

Apparatus and associated authenticating firmware

A firmware authentication element configured to, based on received firmware and predetermined cryptographic authentication information, provide for cryptographic based authentication of the received firmware to control execution of the received firmware by any one of a plurality of processors.. .

Semiconductor device, data processing device, and authentication method

Even when specific information (first information, second information) about individual sensors is inadequate to identify each of the individual sensors, whether all the sensors coupled to a semiconductor device are authentic can be determined. The semiconductor device can be electrically coupled with plural sensors and is configured as follows.
Renesas Electronics Corporation

Systems and methods to permit an attempt at authentication using one or more forms of authentication

In one aspect, a device includes a processor and storage accessible to the processor. The storage bears instructions executable by the processor to identify at least a first mode of authentication associated with a first predetermined weight, identify at least a second mode of authentication associated with a second predetermined weight, identify a threshold, and permit access at least in part based on the weights meeting the threshold..
Lenovo (singapore) Pte. Ltd.

Systems and methods for authenticating firmware stored on an integrated circuit

The invention discloses a method of authenticating data stored in an integrated circuit. The method includes storing randomized data in the integrated circuit such that the randomized data occupies each address space of the memory circuit that is not occupied by the stored data.
Altera Corporation

Systems and methods for authentication based on electrical characteristic information

In one aspect, a first device includes a processor and storage accessible to the processor. The storage bears instructions executable by the processor to analyze an electrical characteristic associated with an apparatus and perform one or more actions pertaining to authentication of the apparatus based on the analysis of the electrical characteristic.
Lenovo (singapore) Pte. Ltd.

Method of authenticating a user at a security device

A method of authenticating a user at a security device includes providing a first pattern on an authentication device capable of wireless data transmission; searching for authentication devices by the security device via a wireless data connection; loading the first patterns of all found authentication devices in a memory of the security device via the wireless data connection; detecting a second pattern by a detection device of the security device; comparing the detected second pattern to the loaded first patterns; and positively authenticating the user when the detected second pattern matches one of the loaded first patterns.. .
Fujitsu Technology Solutions Intellectual Property Gmbh

Authentication method, mobile device, and storage medium

An authentication method executed by a processor included in a mobile device having a camera, the authentication method includes displaying an image captured by the camera and including irises of a user on a screen of the mobile device based on a position of a displayed guide image specifying positions of eyes; calculating, based on positional relationships between light spots and the regions of the irises, when the light spots included in the image overlap regions of the irises, shift vectors of the light spots when the light spots are shifted until the light spots do not overlap the regions of the irises; and moving the displayed guide image in a movement direction determined based on the shift vectors and executing authentication on the user using the irises displayed based on the position of the displayed guide image after the movement of the guide image.. .
Fujitsu Limited

Using eddy currents of exhaled breath for authentication

In one aspect, a device includes a processor and storage accessible to the processor. The storage bears instructions executable by the processor to compare an infrared (ir) image of a breath of a person and authenticating the person responsive to the image satisfying a match criteria with a prestored image..
Lenovo (singapore) Pte. Ltd.

Using gas chromatography for authentication, advertisements, and therapies

In one aspect, a device includes a processor and storage accessible to the processor. The storage bears instructions executable by the processor to receive at least one output of a gas chromatograph (gc), compare the at least one output to at least one template, and determine whether to authenticate a user responsive to the comparison.
Lenovo (singapore) Pte. Ltd.

Gesture matching mechanism

A mechanism is described to facilitate gesture matching according to one embodiment. A method of embodiments, as described herein, includes selecting a gesture from a database during an authentication phase, translating the selected gesture into an animated avatar, displaying the avatar, prompting a user to perform the selected gesture, capturing a real-time image of the user and comparing the gesture performed by the user in the captured image to the selected gesture to determine whether there is a match..
Intel Corporation

System and identity and reputation score based on transaction history

Techniques for electronic signature process management are described. Some embodiments provide an electronic signature service (“ess”) configured to manage electronic identity cards.
Docusign, Inc.

Image processing apparatus

An image processing apparatus includes a reader, an authentication processor, and a process executor. The reader is configured to detect authentication medium in which authentication information is stored or displayed and read the authentication information from the authentication medium.
Kyocera Document Solutions Inc.

User authentication and data encryption

A user is authenticated based on feature data of a target such as a body-part or other object obtained by a touchscreen of a computing device. When the user positions the target to interact with the touchscreen, interaction data is gathered.
Excalibur Ip, Llc

Disambiguation and authentication of device users

Features are described for efficiently and accurately identifying a user of an electronic device with limited user interaction. The features include receiving a mobile device identifier from the mobile device.
Experian Information Solutions, Inc.

Network authentication system extensions

Example implementations relate to network authentication system extensions. For example, network authentication system extensions may be installed and executed using a system.
Hewlett Packard Enterprise Development Lp

Network printer detection and authentication for managed device deployment

Disclosed are various examples for network printer detection and authentication for managed device deployment. In one example, a computing environment can access a listing of network printers received from a printer discovery service executed in an enterprise device in an intranet behind a firewall.
Airwatch Llc

Authentication structure and authentication method using the same

An authentication structure and an authenticating method using the same are provided. The authentication structure includes a plurality of input couplers that generate surface plasmons by being selectively coupled to lights because the plurality of input couplers are different in terms of at least one of a geometric structure and an arrangement, and an output coupler that outputs a speckle pattern based on the surface plasmons..
Samsung Electronics Co., Ltd.

Locking system for a door

The locking system is provided for controlling the unlocking of a door by an electronic key. The locking system has a first pack configured to be received within a first recessed area of the door, the first pack having an actuator configured and adapted to move a bolt slidingly housed in the lock pack; a second pack configured to be received within a second recessed area of the door; a reader interface adapted to receive an input from the electronic key and a controller adapted to receive the input from the reader interface, authenticate the input, and control the actuator based on the authentication..
Computerized Security Systems, Inc.

Process for making a fabric label containing one unique information and respective authentication process

Storing the picture in an association database (14).. .

System for the automatic control of the access and/or engine start authorization of a user in a vehicle

A system for automatic control of entry and/or motor starting authorization of a user for a vehicle. A control device or a computation device associated with the control device uses at least one statistical computation method to compute a probability of misuse for obtaining an entry and/or motor starting authorization for the vehicle.
Volkswagen Ag

Security device and authentication device

A security device including a pair of transparent substrates having waveguides, wherein, in a waveguide of at least one of the pair of substrates there is disposed a luminescent material that emits light by simultaneously irradiating a first type light and a second type light having different wavelengths, and the first type light and the second type light are made incident on the respective waveguides in a state where the pair of substrates are overlapped with each other and the waveguides are in contact with each other, and thereby the contact part between the waveguides emits light.. .
Zeon Corporation

Multiple sensors-based flexible anti-theft system, and security travel bag and anti-sexual assault garment using flexible anti-theft system

The present invention provides a multiple sensors-based flexible anti-theft system, and a security travel bag and an anti-sexual assault garment using flexible anti-theft system. The flexible anti-theft system will not falsely trigger an alarm due to the overall motion or acceleration changes of a transport vehicle, and can effectively prevent personal articles in a suitcase or bag from theft.
Big Bang Markets Limited

Three-dimensional laminated circuit board, electronic device, information processing system, and information network system

Aiming at providing a three-dimensional laminated circuit board which can be confirmed, in an easy and exact manner, to be an authentic product having been manufactured and packaged honestly; and at providing an electronic device, an information processing system, and an information network system using the same, disclosed is a three-dimensional laminated circuit board that includes a substrate, interconnects, and an authentication pattern; the interconnects being provided in the thickness direction of the substrate; wherein the authentication pattern is provided on the substrate, and is characterized by material, shape, layout, structure or size discriminable from those of the interconnects and the substrate.. .
Napra Co., Ltd.

Communication apparatus, controlling the same, and program

In a case where a communication apparatus fails in authentication when acquiring communication parameters from another communication apparatus and where it is determined that an authentication request signal received from the other communication apparatus has been transmitted by unicast, the communication apparatus notifies said other communication apparatus of an error. On the other hand, even in a case where the communication apparatus fails in authentication, when it is determined that the authentication request signal received from the other communication apparatus has not been transmitted by unicast, the communication apparatus does not notify said other communication apparatus of an error..
Canon Kabushiki Kaisha

Method of communicating and authenticating credentials between a portable computing device and multiple radio frequency identification enabled readers

A method of communicating and authenticating credentials between a portable computing device and multiple radio frequency identification (rfid) enabled readers requires a portable computing device, a rfid reader, and user credentials. The portable computing devices stores user credentials unique to the portable computing device and the rfid reader.

Method and authenticating device in wireless communication system

Disclosed are an authentication method performed by a radio access network (ran) node in a wireless communication system and an apparatus thereof. In the present disclosure, a first message indicating initiation of an authentication procedure of the ran node for multiple user equipments (ues) used for a specific purpose to attach to a network is transmitted, an authentication request message including first security information for authenticating the network is received from the first network node, second security information for authenticating the ran node is transmitted to the first network node, and a complete message indicating completion of the authentication procedure is received from the first network node..
Lg Electronics Inc.

Online identity scoring

Method, media, and system for authentication of a claimant as a claimed identity. Embodiments break the authentication process into two steps.
Hrb Innovations, Inc.

Usage tracking for software as a service (saas) applications

Various of the disclosed embodiments concern computer systems, methods, and programs for brokering logins to software as a service (saas) applications and tracking usage of the saas applications. First, a user, e.g.
Flexera Software Llc

Lte cellular mobile network access system and corresponding communication method

An lte cellular mobile network access system and a corresponding communication method are provided. The system includes a sim card interface device, a mobile terminal, and a nrs accessing to a domestic cellular mobile network.
Beijing Travelrely Software Technologies Co., Ltd.

Packet processing method in pppoe authentication process and relevant device

Embodiments of the present application provide a packet processing method in a point-to-point protocol over ethernet (pppoe) authentication process and a relevant device. A first broadcast access server (bas) exists in a broadcast domain in which a user terminal is located, the first bas supports the pppoe and corresponds to a first operator.
Huawei Technologies Co., Ltd.

Proxy service for uploading data from a source to a destination

Automatically ensuring that data uploads to a secure destination storage repository and data read/download requests are processed from trustworthy sources/requesters is provided. When data uploads are attempted to secure destination storage repositories from sources not previously identified as trustworthy, or when data requests are received for downloading or reading data from such secure storage repositories are received from such sources, the uploads or data requests as passed through a proxy service for authentication.
Microsoft Technology Licensing, Llc

Server based biometric authentication

A server-side biometric authentication system is disclosed that can split data knowledge and processes, so that extensive collusion would be required in order for a fraudster to compromise the system. Biometric data provided by a user during authentication can be matched with a combination of pieces of a biometric template stored across two or more server(s), rather than on a consumer device as is typically done.

Information processing apparatus, non-transitory computer-readable storage medium, and information processing method

An information processing apparatus stores information concerning a communication path for authentication between a first apparatus and a second apparatus that provides a service, in response to a service access request from the first apparatus; transmits the service access request to the second apparatus by using the information concerning the communication path for authentication; transfers, in response to an authentication request from the second apparatus, the authentication request to the first apparatus by using the information concerning the communication path for authentication; transfers, in response to a response including authentication information from the first apparatus, the response including the authentication information to the second apparatus by using the information concerning the communication path for authentication; and receives data of the service provided by the second apparatus and output a content based on the received content.. .
Fujitsu Limited

Zero sign-on using a web browser

Method for enabling zero sign-on (zso) through a standard web browser. The device running the browser is first enrolled with a web service using an installed enrollment agent on the device which authenticates a user of the device.
Centrify Corporation

Protection feature for data stored at storage service

Cloud-based storage services are provided for storing data across multiple devices, where access to the data is subject to a first authentication process. Embodiments are directed to a data protection feature to prevent accidental deletion or modification of the data stored at the cloud via unintended user actions on the clients or actions by nefarious software or hackers.
Microsoft Technology Licensing, Llc

Authentication operating an authentication system

An authentication system for authenticating a human requester requesting a service, wherein the authentication system is configured to establish via a first and a second port of the authentication system an authentication communication channel comprising a first communication channel to the requester and a second communication channel to a human authenticator, such that at least one of an audio stream of a voice of the requester, a video stream of a face of the requester and a 3d-data stream of the face of the requester is transmittable between the end node device of the requester and the end node device of the authenticator; and to record a confirmation message of the authenticator, wherein the confirmation message confirms or rejects at least one of the claimed identity and the requested service.. .

Multiple secrets in quorum based data processing

Methods are described for constructing a secret key by multiple participants such that any quorum combination of participants can generate a fixed number of key components that can be combined by a recipient to generate the secret key. The methods permit an identical secret key to be generated by a different sized quorum from different participants if required.
Pq Solutions Limited

Method and device for providing a key for internet of things (iot) communication

A method and device for providing a key for iot communication are disclosed. The method includes an embodiment whereby an iot device modulates a light signal carrying a security code to generate a modulated light signal, emits the modulated light signal to a personal electronic device, derives a security key from the security code, and performs authentication with a control device based on the security key..
Futurewei Technologies, Inc.

Authenticating device for performing user authentication by using password, and image forming apparatus

Provided is an authenticating device that reduces entry mistakes when entering a password due to touch mistakes in a state in which security is maintained. An image forming apparatus includes a touch panel, an authentication-processing unit, and a touch-mistake-detection unit.
Kyocera Document Solutions Inc.

Authenticating apparatus that executes user authentication by comparing entered password with set password

An image forming apparatus that is an authenticating apparatus includes an authentication-processing unit, a display area, a display-control unit and a re-entry-processing unit. The authentication-processing unit executes user authentication by comparing an entered password with a set password.
Kyocera Document Solutions Inc.

Authenticating nonces prior to encrypting and decrypting cryptographic keys

Data security is enhanced by receiving a request that identifies an encrypted data key, an authentication tag, and additional authenticated data that includes at least a nonce. In some cases, the authentication tag is cryptographically derivable from the encrypted data key and the additional authenticated data.
Amazon Technologies, Inc.

Method for personalizing an authentication token

An authentication token using a smart card that an organisation would issue to its customer, the smart card having a processor for executing a software application that is responsive to a user input to generate a one-time password as an output. The smart card co-operates with an interface device for inputting the user input and displaying the one-time password.
Prism Technologies Llc

Secure authentication of devices without server assistance or pre-shared credentials

Systems and methods for establishing secure communication between electronic devices. In some aspects, at least two computing devices physically interact with each other multiple times, and sensors in each device detect and record the times of the physical interactions.
Idevices, Llc

Method and data transmission

The disclosure relates to a method and an apparatus for data transmission, where the method includes: a first mobile device transmits authentication data to a second mobile device via a sound wave, and transmits data to the second mobile device via a sound wave after the second mobile device has been successfully authenticated, thereby achieving data transmission between the first mobile device and the second mobile device via a sound generating apparatus, such as a microphone and a loudspeaker, in the first mobile device and the second mobile device, with small power consumption and no interference to the antenna related to the voice call of the mobile device.. .
Ora Inc.

Reverberation compensation for far-field speaker recognition

Techniques are provided for reverberation compensation for far-field speaker recognition. A methodology implementing the techniques according to an embodiment includes receiving an authentication audio signal associated with speech of a user and extracting features from the authentication audio signal.
Intel Corporation

System, media, and parking management

Systems, methods, and media for parking management are provided. A method includes receiving from a parker at a first device authentication input and then vehicle input that associates a vehicle with the parker, wherein the vehicle input comprises vehicle registration input or selection of a registered vehicle.
Parkxl, Llc

Authentication-based tracking

Methods and systems integrate digital fingerprint authentication-based identification and location tracking into a single, continuous process in which an authentication-integrated tracking system is simultaneously aware of both the identity and location of each physical object at all times as they move along a conveyance system. Insertion or removal of an object is quickly detected and reported.
Alitheon, Inc.

Systems and methods for enhanced authorization response

According to embodiments of the invention, data not ordinarily sent through a transaction network can be transmitted to a resource provider (e.g., a merchant) in an authorization response message. For example, a location of an authorized user of a credential can be transmitted to a merchant to be compared to the merchant's location.

Systems and methods for use in authenticating consumers in connection with payment account transactions

Disclosed are exemplary embodiments of systems and methods for use in authenticating consumers and/or computing devices to payment accounts. In an exemplary embodiment, a method generally includes generating, by a computing device, an authentication request for a consumer in response to a transaction by the consumer at a merchant.
Mastercard International Incorporated

Systems and methods for use in facilitating transactions

Systems and methods are provided for use in facilitating transactions associated with a payment account. One exemplary method includes receiving an authentication request message for a transaction to a payment account associated with a consumer, where the payment account is associated with at least one authentication procedure requiring input from the consumer to authenticate the consumer in connection with the transaction and where the authentication request message includes at least one detail related to the transaction.
Mastercard International Incorporated

Method and system for preventing forgery

A method for securing an object from forgery involves a seal element having an antenna structure, an object to be secured, and at least one coupling element arranged or arrangeable at the object is supplied. The coupling element influences a value of an oscillating circuit parameter of the antenna structure when the antenna structure is arranged relative to the coupling element at the object.
Giesecke + Devrient Mobile Security Gmbh

Finger print state integration with non-application processor functions for power savings in an electronic device

A system includes a fingerprint sensor, an application processor, and an auxiliary processor. The application processor is operable to arm the fingerprint sensor prior to the application processor entering a low power or sleep mode.
Google Llc

Methods and systems for facilitating secured access to storage devices

The present disclosure discloses methods and systems for facilitating secured access to storage devices. The method includes receiving a request for access to the storage device, the storage device is associated with an identifier, for example, hardware identifier.
18 Degrees Lab Pte. Ltd.

Programmable logic device, information processing apparatus, and processing method

A programmable logic device includes: an encryption unit configured to encrypt data based on a process of an arithmetic processing unit and first checking data added to the data to generate encrypted data, based on an encryption key corresponding to identification information allocated to the arithmetic processing unit, the arithmetic processing unit being implemented in a specific circuit area of a plurality of programmable circuit areas; and a transmission unit configured to transmit identification information output from the specific circuit area and the encrypted data to an authentication unit, and the authentication unit is configured to decrypt the encrypted data received from the transmission unit based on the encryption key corresponding to the identification information received from the transmission unit and to perform an authentication process of decrypted data based on the first checking data added to the decrypted data.. .
Fujitsu Limited

Secure access device

The technology relates to securely providing patient data to caretakers. Verification information from one or more patients may be received by one or more processors.
Eastim Tech, Llc

System and encrypting folder in device

Provided are a system and method of encrypting a folder in a device. The device for controlling access to the folder includes a communication part configured to transmit, to a server, an encryption key generation request with respect to the folder, and receive, from the server, an encryption key associated with the folder that is generated in response to the encryption key generation request, wherein the encryption key generation request includes an identification of the folder and authentication data of a user who accesses the folder is an authorized user; and a controller configured to authenticate the user by using the encryption key..
Samsung Electronics Co., Ltd.

Method and system for secure device based biometric authentication scheme

A method for device based biometric authentication includes: storing, in a computing device, an encrypted biometric template; storing, in a first memory of the computing device, at least a first application program; storing, in a second memory of the computing device, at least a second application program and an encryption key, wherein the second memory is a trusted execution environment; receiving, by the second application program of the computing device, a validation request submitted by the first application program; receiving, by an input device of the computing device, biometric data; decrypting, by the second application program of the computing device, the encrypted biometric template using the encryption key; validating, by the second application program of the computing device, the received biometric data using the decrypted biometric template; and transmitting, by the second application program of the computing device, a result of the validation to the first application program.. .
Mastercard International Incorporated

Oral authentication management

A user manages security of one or more user devices by manipulating one or more sensors located in the user's mouth in a predetermined pattern corresponding to a password. The matching of the predetermined pattern to the password unlocks at least a portion of at least one user device..
International Business Machines Corporation

Information processing system, information processing method, and program

An information processing system includes a data acquisition unit that acquires time-series data related to power consumption of a device, a specification unit that specifies the device corresponding to the power consumption on the basis of the acquired time-series data, and an authentication information acquisition unit that acquires authentication information of the device specified by the specification unit.. .
Nec Corporation

Systems and methods for improving kba identity authentication questions

Certain implementations include systems and methods for improving knowledge-based-authentication (kba) identity authentication questions. A method is provided that includes receiving a set of identity information associated with a subject; querying one or more databases; receiving personally identifiable information; determining, from the personally identifiable information, at least one subject characteristic; producing, with a predictive model and based on the personally identifiable information and on the at least one subject characteristic, at least one knowledge based authentication (kba) identity proofing question having a personally identifiable correct answer; sending, for display on a first computing device associated with the subject, the at least one kba identity proofing question; receiving, responsive to the sending, a response answer; and responsive to a match between the response answer and the personally identifiable correct answer, sending, for display on the first computing device associated with the subject, a first indication of authentication..
Lexisnexis Risk Solutions Inc.

Method for distribution of licenses based on geographical location

Systems and methods for distributing software licenses based on geographical location are provided. In one exemplary embodiment, a method performed by a local interface device in a network for distributing licenses for software applications comprises authenticating the local interface device to a license server in the network for receipt of licenses.
Telefonaktiebolaget Lm Ericsson (publ)

Method of performing authentication with a memory circuit using dynamic random access memory arrays

A memory circuit using dynamic random access memory (dram) arrays. The dram arrays can be configured as cams or rams on the same die, with the control circuitry for performing comparisons located outside of the dram arrays.

Device manipulation using hover

An apparatus may be manipulated using non-touch or hover techniques. Hover techniques may be associated with zooming, virtual feedback, authentication, and other operations.
Microsoft Technology Licensing, Llc

Administration set detection and authentication using cam profiles

An administration set for an infusion pump includes a free-flow prevention device having a movable plunger that includes a cam surface defining an uneven profile along a direction of movement of the plunger, wherein the shape of the cam surface profile indicates the administration set is authorized for use with the infusion pump and may further indicate the specific type of administration set. A sensor in the infusion pump senses movement of the plunger as a platen of the infusion pump is latched and generates a profile signal in the time domain representative of the cam surface profile.
Curlin Medical Inc.

Authentication reader and a dispenser comprising the authentication reader

An authentication reader and a dispenser comprising the authentication reader for authenticating a product having a taggant ink disposed on the product's surface.. .
Sun Chemical Corporation

Parcel box for drone delivery

A parcel receiving system for receiving a package preferably delivered by a drone to an automated parcel box positioned adjacent an opening in the building. It has an extendable platform adapted to extend out of opening 8 and receive package.

Voiceit Technologies, Llc

. .

Adding authenticatable signatures to acknowledgements

A method for wireless communication may include receiving a communication and determining an acknowledgement signature for an acknowledgment in response to the communication. The acknowledgment signature may allow for authentication with the transmitting wireless device.
Qualcomm Incorporated

System and providing a public number-private number telephony system

This invention shows a method for operating a voice communications network that comprises dynamically associating a private number with at least one public number of a circuit-switched voice communication network, authenticating a user of a private number without reliance on a static reproducible data code, receiving an incoming call to the public number and routing the incoming call from a caller to the private number. The method also shows the generation of an outgoing call from the private number and passing the outgoing call through the public number while generating calling party information to a target which preserves the privacy of the caller, and altering an associating of the private number and at least one public number.
Paltalk Holdings, Inc.

Access network determination

The invention relates to a method, by a subscriber database entity (200), to handle a request for subscriber information for a data packet session of one of the subscribers. The subscriber database entity comprises a storage unit (230) storing information about subscribers to a mobile communications network.
Telefonaktiebolaget Lm Ericsson (publ)

Systems and methods for authenticating an online user using a secure authorization server

A secure authorization server computer system for verifying an identity of an end-user is provided. The computer system is programmed to receive, from a computing client, an authentication request at an authorization component.
Mastercard International Incorporated

Authentication for over the top broadcast streaming using automated content recognition

An authenticator in a second user device captures a media sample played on a first user device in proximity to the second user device. The media sample comprises at least one of an audio portion, a video portion or an image portion of a media stream received by the first user device from a remote media streaming source over a network.
Audible Magic Corporation

Trust establishment between a trusted execution environment and peripheral devices

Technologies are provided in embodiments to establish trust between a trusted execution environment (tee) and a peripheral device. Embodiments are configured to communicate with an attestation server to generate an encryption key, and to establish, using the encryption key, a secure connection with an authentication server to enable communication between the authentication server and the peripheral device.
Mcafee, Inc.

Wireless network apparatus, wireless network system, and non-transitory computer readable medium

A wireless network apparatus includes a wireless communication unit, a receiving unit, an acquisition unit, and a setting unit. The wireless communication unit performs wireless communication with a mobile terminal apparatus.
Fuji Xerox Co., Ltd.

Identity authentication method and apparatus

An identity authentication method, comprising: at an electronic device having one or more processors and memory, the electronic device coupled with a display and one or more input devices: receiving an identity authentication request; in response to receiving the identity authentication request, performing an interactive authentication information exchange between the electronic device and a user, including: displaying, on the display, first visual information in a first manner; displaying, on the display, the first visual information in a second manner that is distinct from the first manner, wherein the first visual information displayed in the second manner includes a timing characteristic that is absent from the first visual information displayed in the first manner; receiving user input entered in accordance with the first visual information displayed in the second manner; and verifying that the user input conforms to the timing characteristic in the first visual information displayed in the second manner.. .
Tencent Technology (shenzhen) Company Limited

Authentication and authorization of a privilege-constrained application

Methods and systems are provided for managing access to a client account related (car) resource. When a privilege-constrained (pc) application requests access to an individual client account, a single use authorization (sua) code is created that is associated with the individual client account.
Amazon Technologies, Inc.

Method for obtaining vetted certificates by microservices in elastic cloud environments

A method and is provided for obtaining a vetted certificate for a microservice in an elastic cloud environment. The microservice receives a one-time authentication credential.
Motorola Solutions, Inc

Single sign on proxy for regulating access to a cloud service

Embodiments disclosed herein provide systems, methods, and computer readable media for using a single sign-on proxy to regulate access to a cloud service. In a particular embodiment, a method provides receiving an authentication request from a user system directed to a sso service and determining whether the authentication request satisfies at least one criterion for allowing access to the cloud service associated with the sso service.
Palo Alto Networks, Inc.

Domain joined virtual names on domainless servers

Services from domainless machines are made available in a security domain under a virtual name. Each machine is not joined to the domain but can reach a security domain controller.
Microsoft Technology Licensing, Llc

Authentication using a transaction history

Systems and methods are provided for authenticating a user. In one implementation, a computer-implemented method is provided.
Amazon Technologies, Inc.

Perception-free authentication method and system, and control method and system based on the same

The present disclosure provides a perception-free authentication method. The method includes the following steps: monitoring an authentication request forwarded by a member wireless access point from the terminal device when a cloud ac establishes a communication link with a plurality of wireless access points; and judging whether the authentication request passes authentication; if the authentication request passes authentication, feeding back a first response packet to the member wireless access point forwarding the authentication request to allow the terminal device to directly access the internet; and otherwise, feeding back a second response packet to the member wireless access point forwarding the authentication request, wherein the second response packet includes an authentication record to be sent to a maser wireless access point, generated by sending the authentication request to the cloud ac via a member wireless access point and passing the cloud ac authentication..
Phicomm (shanghai) Co., Ltd.

Network device proximity-based authentication

A wireless system can be used to authenticate a user device via proximity information of wireless network devices. The system can include the user device, the wireless network devices, and a server.
Branch Banking And Trust Company

Systems and methods for re-commissioning a controlled device in a home area network

Systems and methods for preparing and re-commissioning a controlled device in a home area network are described. A utility meter is communicated with.
Control4 Corporation

Method and system for encryption

There is described a validation and authentication system and method for authenticating and validating messages. The system comprises a data store storing one or more digital fingerprints associated with user imaging devices.
Cryptomathic Ltd.

Software authentication before software update

A programming session may be initiated to a vehicle ecu by an update device. A software update for the ecu may be authenticated by the update device using an authentication key.
Ford Global Technologies, Llc

Identification and/or authentication system and method

The present invention relates to an authentication method which allows a user having a personal electronic device (ped) to authenticate, register or login to a recipient system. Upon interacting with the recipient system, the user is prompted for his unique token id.

System and storage medium

A system includes circuitry configured to store, as information that identifies an authentication method, identification information shared with an authentication device that performs authentication of a user of an information processing device in association with an event that occurs in accordance with an operation of the information processing device, which is performed by the user, into a memory, transmit, when the event occurs, the identification information stored in association with the event in the memory to the authentication device, receive a result of the authentication of the user by the authentication method in accordance with the identification information in the authentication device from the authentication device, and execute, when the result of the authentication of the user indicates a success, processing in accordance with the event that has occurred.. .
Fujitsu Limited

Methods and apparatuses for authentication in quantum key distribution and/or quantum data communication

Systems and methods of authenticating and/or communicating key and/or data between communication parties using quantum channels are provided. In some embodiments, authentication may be provided during transmission (including at various stages), without transmission, before transmission, and/or without keys.
University Of Houston System

Extended range and non-extended range operational mode coexistence

Methods, systems, and devices for wireless communication are described. Wireless devices may use multiple transmission modes to enable association and authentication procedures for wireless devices with different capabilities.
Qualcomm Incorporated

Location based voice recognition system

Systems and methods for providing location based voice recognition include receiving, through a first microphone, an audio signal from a first user that includes an audio command requesting a service that requires user authorization before access to at least a portion of the service is granted. The user authorization is based on voice recognition (e.g., voice authentication and/or voice identification) of the audio signal.
Paypal, Inc.

Wireless communication authentication for medical monitoring device

Methods, systems, and devices for short-range low-power wireless communication of analyte information are provided. In some implementations, short-range low-power wireless communication of analyte information may include receiving an electromagnetic wireless communication signal and harvesting energy from the electromagnetic wireless communication signal.
Abbott Diabetes Care Inc.

Authentication for keyless building entry

Systems and methods for controlling access to a building associated with a security and/or automation system may include detecting a presence of at least one person positioned proximate an entry to the building, collecting one or more biometric identifiers from the at least one person, identifying one or more devices within a predetermined proximity of the entry to the building, and granting the person access to the building based at least in part on the collecting and the identifying.. .
Vivint, Inc.

Event-driven authentication of physical objects

A system may include an event trigger processor (etp) configured to receive signals from sensors or another system (fig. 11).
Alitheon, Inc.

Transaction-history driven counterfeit fraud risk management solution

Transaction data is gathered for a plurality of successful payment device transactions in a first environment. The transaction data is filtered to identify successful payment device transactions associated with payment devices for which offline authentication is not supported, to obtain a whitelist.
Mastercard International Incorporated

Zero-wait publishing, searching, and queuing systems and methods

Zero-wait publishing, searching, and queuing systems and methods are disclosed. The system includes a local retail service engagement application installed on a mobile device.
Cloudtraq Llc

Merchandise anti-counterfeiting and authentication method and the non-transitory computer readable medium thereof

The present disclosure relates to a merchandise anti-counterfeiting and authentication method and a non-transitory computer readable medium thereof that depend on a legal tag reader device in a retail shop for a product transaction to read a chip-based tag on a product and transmit product identity information in the chip-based tag, the tag reader device's device identity information and a consumer's user identity information to an authentication server in which the product identity information and the tag reader device's device identity information is authenticated and the consumer's user identity information is saved. When the chip-based tag is read by the tag reader device later, an authentication request to check authenticity of a product will be sent to a consumer by the authentication server according to the consumer's identity information..

System and authenticating a secure payment transaction between a payer and a payee

Disclosed is a payment authentication system and method for secure payment transaction using a payment authentication server. The payment authentication system includes a payer 102, a payer connector 104, a payee device 106, a payment authentication server 108, a payer device 110, a payment authentication system 112, a payment authentication exchange server 114, a payer bank server 116, a payee bank server 118 and the payee 120.

Method and authenticating and processing secure transactions using a mobile device

A method and apparatus for processing secure transactions of a requested service at a merchant point of sale (pos) using a customer mobile device and a virtual payment gateway (vpg) server, the method comprising an authentication and a transaction. The activation establishes a mobile device transport key (mtk) at the mobile device and a server, and assigns a mobile application identifier (maid) to a mobile application of the mobile device.
Bell Identification Bv

Method of retaining transaction context

Methods of transaction authentication are provided. In one such method, at least one first transaction has been conducted, the or each first transaction generating data including first data comprising authentication data and second data identifying the or each first transaction, wherein a given first transaction is between a merchant and a card holder.
Visa Europe Limited

Authentication system

A two way authentication method, including receiving by an authentication server first encrypted data from a merchant computing device, receiving by the authentication server second encrypted data from a customer computing device, determining by the authentication server if the first encrypted data matches the second encrypted data, if the first encrypted data matches the second encrypted data, authenticating the customer computing device, if the first encrypted data does not matches the second encrypted data, not authenticating the customer computing device.. .

Image processing system and image processing sending image data

An image processing system includes a reception unit configured to receive an input of authentication information from a user, an authentication unit configured to authenticate the user based on the authentication information received by the reception unit, a setting unit configured to set a destination of image data, an operation key configured to set a folder of the user as a destination of the image data, and a transmission unit configured to send the image data to a destination set by the setting unit. The image processing system performs control not to allow a destination setting using the operation key, in the case where a destination to be set by the setting unit is limited to a destination to be set using the operation key and a folder to be set in response to an operation of the operation key is the one to be registered by the user..
Canon Kabushiki Kaisha

Authentication device, image processing apparatus, and authentication method

An authentication device includes an operation panel, a registered handwriting procedure acquiring portion, a long-pressing detecting portion, a handwriting detecting portion, and a handwriting authentication portion. The registered handwriting procedure acquiring portion acquires information of a registered handwriting procedure from a storage portion in which the information of the registered handwriting procedure has been stored, which represents a handwriting procedure including a trajectory of a handwriting operation performed on the operation panel and at least one of a time, a speed, and a number of strokes of the handwriting operation.
Kyocera Document Solutions Inc.

Contemporaneous gesture and keyboard entry authentication

A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device.
International Business Machines Corporation

System and secure authentication of a "smart" battery by a host

Systems and methods for providing a battery module 110 with secure identity information and authentication of the identity of the battery 110 by a host 120. In one embodiment, the system for providing a battery module with secure identity information includes: (1) a tamper resistant processing environment 200 located within the battery module 110 and (2) a key generator configured to generate a key based on an identity of the battery module 110 and cause the key to be stored within the tamper resistant processing environment 200..
Texas Instruments Incorporated

Methods for identifying compromised credentials and controlling account access

A system and method includes at an authentication platform that is implemented via one or more computing servers: identifying compromised credential data, wherein compromised credential data comprise compromised credentials for one or more compromised accounts that have been exposed to a malicious actor via an illegitimate method, the compromised credentials including credentials that are useable for authentication to or for accessing the one or more compromised accounts; testing the compromised credentials, wherein testing compromised credentials includes using the compromised credentials to determine a useablility of the compromised credentials to attack one or more different accounts from the one or more compromised accounts; and modifying account access associated with one or more of (i) the one or more compromised accounts and (ii) the one or more different accounts.. .
Duo Security, Inc.

Device, authentication processing method, and computer program product

A device includes a first unit and a second unit, wherein, a first storage controller of the first unit stores in a first storage authentication information used for user authentication, a provision controller of the first unit controls a function provider of the first unit to provide a predetermined function when an authorized user is obtained, a first acquirer of the second unit acquires the authentication information before performance of the user authentication, a first generator of the second unit generates priority user information representing of the acquired authentication information, authentication information corresponding to a user who has been authenticated in user authentication as an authorized user, to which user authentication time information is added, and an authenticator of the second unit performs user authentication by collating the input authentication information with the priority user information and supplies the provision controller of the first unit with a user authentication result.. .

Method for actively connecting to and communicating with apple device and apple device attachment

A method for actively initiating a connection to and communicating with an apple device via usb, relating to the field of communications, and comprising: an apple device attachment, when detecting access by a usb device, determines whether the accessing usb device is an apple device (s1); the apple device attachment establishes a device address for the apple device (s2); the apple device attachment acquires the current communication protocol setup of the apple device, and determines whether the current communication protocol configuration of the apple device is a preset configuration (s3); the apple device attachment sets the current communication protocol configuration of the apple device as the preset configuration (s4); the apple device attachment notifies the apple device to register the apple device attachment to the apple device (s5); the apple device attachment establishes a connection with the apple device (s6); the apple device attachment periodically queries whether communication data has been sent by the apple device, and when detecting communication data has been sent by the apple device, receiving the communication data sent by the apple device and implementing communication with the apple device (s7). The present method can actively initiate a connection with an apple device without using an apple authentication chip, acting as a primary device implementing communication with the apple device..
Feitian Technologies Co., Ltd.

Output systems, information apparatus, or internet appliances supporting voice commands for receiving and for playing selected digital content from a service over a network

Output systems (e.g., information apparatus, internet appliances, audio devices or video output devices) supporting voice commands for playing digital content received from a service provided over a network (e.g., internet) are herein disclosed and enabled. The output system includes a touch sensitive screen interface for receiving security information to access a wireless local area network and for receiving authentication information to access the service over the network.
Flexiworld Technologies, Inc.

Fingerprint event processing method, apparatus, and terminal

Embodiments of the present disclosure relate to the field of communications technologies, and provide a fingerprint event processing method and apparatus, and a terminal, so as to resolve a problem of how to simplify operation steps of using a terminal. The method includes: receiving, by a terminal, a first fingerprint by using a fingerprint sensor; generating, by the terminal, a fingerprint event according to the first fingerprint; when an operation to be executed by the terminal includes an identity authentication operation, executing, by the terminal, the identity authentication operation according to the fingerprint event; and when the operation to be executed by the terminal does not include the identity authentication operation, executing, by the terminal, an operation corresponding to a first preset event according to the first preset event.
Huawei Technologies Co., Ltd.

Method and system for authentication of a paper product in a dispenser

A system and control method are provided for authenticating a paper product dispensed from a dispenser. The paper product formation is loaded into the dispenser, the formation having an identification mark engraved into a surface thereof.
Kimberly-clark Worldwide, Inc.

. .

. .

Connection processing method, communication system, and communication device

A connection processing method includes receiving, by a first processor included in a communication device, first information that specifies a user of the communication device, executing an inquiry for a connection to one or more other communication devices, selecting a target communication device that has transmitted a response including information indicating that the target communication device has second information that specifies the user and has been acquired when the target communication device communicated with another communication device, from among the one or more other communication devices, and transmitting the first information to the target communication device, and receiving, by a second processor included in the target communication device, the first information from the communication device, executing connection processing without executing authentication processing of the user with the communication device, when the received first information matches with the second information, and executing a communication with the communication device.. .
Fujitsu Limited

Method for data communication between nan devices, and nan device for performing data communication

Disclosed are a method for data communication between nan devices, and a nan device for performing data communication. The method for data communication between the nan devices comprises the steps of: receiving a service discovery frame from a second nan device by a first nan device; transmitting a tim element to a second nan device by the first nan device having received the service discovery frame and being triggered by a user action, wherein the tim element includes information related to data buffered with respect to the second nan device; performing, by the first nan device, an authentication procedure and an association procedure with the second nan device on the basis of a request of the second nan device having received the tim element; transmitting a falling frame from the second nan device by the first nan device; and transmitting, by the first nan device, the data buffered with respect to the second nan device, to the second nan device in response to the falling frame..
Lg Electronics Inc.

Method and transmitting data in wireless communication system

The present specification relates to a method for transmitting data by a first neighbor awareness networking (nan) device in a wireless communication system. The method for transmitting data may comprise the steps of: performing a service discovery for a first service with a second nan device through a service discovery frame (sdf); and exchanging data for the first service with the second nan device on the basis of the performed service discovery.
Lg Electronics Inc.

Techniques for fast transition of a connection between a wireless device and a local area network, from a source access node to a target access node

Methods, systems, and devices for wireless communication are described. In one method, a source access node (an) of a local area network (lan) may receive, over a first connection, a set of fast transition (ft) parameters pertaining to authentication.
Qualcomm Incorporated

Bluetooth device as security access key

This application is directed to a system for remotely directing a host device to perform an operation using a key. The key may include a communications circuitry for transmitting data, for example a key identifier or an instruction to perform an operation, within a personal area network created by the communications circuitry.
Apple Inc.

Techniques for handover of a connection between a wireless device and a local area network, from a source access node to a target access node

Methods, systems, and devices for wireless communication are described. In one method, a wireless device may securely communicate with a local area network (lan), via a first connection with a source access node (an), based on a first security key.
Qualcomm Incorporated

Service provisioning by local operator

Some embodiments of the present invention relate to an apparatus, a method, and a computer program product related to coexistence of two network operators, for example a local operator and an incumbent operator. In certain embodiments, a method may include monitoring if network information from a server part of an application is received by a client part of the application.
Nokia Solutions And Networks Oy

Authentication for wireless local area networks

A digital credential is generated for a user device. The digital credential is transmitted to the user device via an optical wireless communication access point (owc ap).
International Business Machines Corporation

Proximity discovery, authentication and link establishment between mobile devices in 3gpp lte

The invention enables a device to discover one or more other devices within range for a device-to-device mode of communication. This proximity discovery may trigger a target device, e.g.
Nederlandse Organisatie Voor Toegepast-natuurwetenschappelijk Onderzoek Tno

Authentication carrying out authentication based on captured image, authentication method and server

In accordance with an embodiment, an authentication apparatus comprises an image capturing device, a memory and a controller. The image capturing device photographs a person to acquire a captured image.
Toshiba Tec Kabushiki Kaisha

Call authentication using call forwarding

The invention may verify calls to a telephone device by activating call forwarding to redirect calls for the telephone device to a prescribed destination; receiving a message from a server verifying the call; deactivating call forwarding to receive the call; and reactivating call forwarding when the call is concluded. In another embodiment, the invention may, in response to a telephone device initiating a call to a second telephone device installed with a particular application or software, transmit a message to a server causing it to instruct the second telephone device to deactivate call forwarding.
Pindrop Security, Inc.

Techniques for mobile device personalization

Techniques for mobile device personalization are described. In an embodiment, user credentials for an online service are received at a mobile device kiosk.
Facebook, Inc.

Controlling device data collectors using omni-collection techniques

Aspects of the disclosure relate to controlling device data collectors using omni-collection techniques. A computing platform may receive configuration settings associated with a first collector and a second collector.
Bank Of America Corporation

Systems and methods for proximity identity verification

Systems and methods are provided for authenticating a user of a computing device. An example system includes a memory storing instructions, and a processor configured to execute the instructions to receive an authentication request from a user of a computing device, determine a context of the authentication request, determine a physical location of the user, and perform, based on the context of the authentication request and the physical location of the user, an associate proximity detection.
Capital One Services, Llc

Communication device authentication in small cell network

A technique is provided for authenticating a first communication device located in a coverage area of a base station. The base station receives a localization message from the first communication device, the localization message containing an identifier of the first communication device.
Alcatel Lucent

Multi-factor authentication

An authenticated session with a remote system is established and identified through an authentication token for the session. During that session, a resource is accessed requiring additional authentication beyond what the authentication token was originally authorized for.
Micro Focus Software Inc.

Unique device authentication via a browser

Techniques are disclosed relating to unique device authentication via browser. In one embodiment, a server computer system receives, from a browser program executing on a client computer system, a request to authenticate to a private network.
Ca, Inc.

Secure two-way authentication using encoded mobile image

A method of digital authentication and related devices are disclosed. The method includes providing a scanning application on a computing device prior to scanning a website feature, and scanning website feature, the website feature having been displayed on a web page of another computing device.
Vivial Mobile Llc

Authentication techniques including speech and/or lip movement analysis

A system, apparatus, method, and machine readable medium are described for attesting an authenticator. For example, one embodiment of an apparatus comprises: a processor to execute an app; and an authenticator to generate a first authentication key and to securely store the first authentication key, the authenticator to generate an attestation object usable by a relying party to confirm authenticity of the authenticator, the attestation object including a first component provided by the authenticator, a second component provided by the app, and a signature generated by the first authentication key over a combination of the first and second components..
Nok Nok Labs, Inc.

Wireless authentication of recyclable logistics apparatus

The present invention relates to wireless authentication method and device of recyclable logistics apparatus, the recyclable logistics apparatus comprises a wireless beacon unit which periodically transmits a broadcast frame, the broadcast frame at least includes a unique identity of the wireless beacon unit, and the method comprises the following steps: first mobile terminal receives the broadcast frame and uploads collected first frame information as first upload information to a cloud server, the cloud server generates authentication information according to an authentication rule; the cloud server associates the first upload information with the authentication information and stores them in a database; and the cloud server transmits the authentication information to second mobile terminal, the second mobile terminal also receives the broadcast frame and through the authentication information, collected second frame information is compared with the first frame information which is associated with the authentication information so as to complete delivery. Through the present invention, a user only needs a mobile terminal to automatically receive a broadcast frame to complete an identification operation, and authentication of a cloud server ensures security, thus it is simple to operate, has low cost and high security..
Shanghai Hongyan Returnable Transit Packagings Co., Ltd

Program, authenticating control device

An authentication system, is provided, which includes a control device configured to confirm validity of using a program installed in the control device by confirming whether identification information of the control device satisfies a given condition, and to confirm whether the target device having a function to be used by the control device falls under a valid range of use based on device restriction information that indicates a restriction on the target device permitted to be used and is stored in the control device.. .
Furuno Electric Co., Ltd.

Authenticating mobile lockers

In some embodiments, apparatuses and methods are provided herein useful for the storage, transportation, and delivery of items. A mobile locker is described herein that can be utilized to securely deliver items to a location for subsequent pick-up by a user.
Wal-mart Stores, Inc.

Systems and methods for proximity identity verification

Systems and methods are provided for authenticating a user of a computing device. An example system includes a memory storing instructions, and a processor configured to execute the instructions to receive an authentication request from a user of a computing device, determine a context of the authentication request, determine a physical location of the user, and perform, based on the context of the authentication request and the physical location of the user, an associate proximity detection.
Capital One Services, Llc

Techniques for establishing a secure connection between a wireless device and a local area network via an access node

Methods, systems, and devices for wireless communication are described. In one method, a wireless device may establish a connection with an access node (an) of a local area network (lan).
Qualcomm Incorporated

Secure private location based services

Representative embodiments disclose unique mechanisms to use beacons to provide access to cloud services. In order to access the cloud services a user presents a beacon identifier obtained from a beacon in geographic proximity to a user device used by the user.
Microsoft Technology Licensing, Llc

System and methods for enhancing authentication procedures in an anti-fraud environment

A system, method, and computer readable medium enhance authentication procedures in an anti-fraud environment when an access control server (acs) is unavailable to generate a full authentication for unique identifying information received in a current communication from a website. An availability detector verifies that the access control server remains unavailable.
Mastercard International Incorporated

Systems and methods for delegated cryptography

In some embodiments, an authentication method comprises receiving a request for a digital signature of data from a delegate computer over a secure channel using cryptography to provide authentication, wherein the secure channel comprises at least one wireless communications link; displaying information derived from the data; prompting a user for approval of the request with information derived from the data; in response to receiving approval from the user, creating the digital signature of the data using one or more private keys stored in a key enclave; and sending the digital signature to the delegate computer over the secure channel.. .
Kryptco, Inc.

Mobile information apparatus with an application for receiving digital content from a digital content service over the internet and for wirelessly transmitting or playing at least part of the received digital content at a bluetooth enable output device

Mobile information apparatus (e.g., smart phone, internet appliances, information pad) with software applications for receiving digital content from a service provided over a network (e.g., internet) and for wirelessly playing at least part of the received digital content at a bluetooth enabled output device are herein disclosed and enabled. To receive and play digital content, the software applications may obtain authentication information for accessing the service, receive a list of one or more digital content that is available from the service for selection on the touch sensitive screen interface, receive a selected digital content from among the list displayed on the touch sensitive screen, receive output data from the service related to the selected digital content, and then either play audio data related to the received output data at a speaker of the mobile information apparatus or wirelessly play the audio data at the bluetooth enabled output device..
Flexiworld Technologies, Inc.

Resource locators with keys

Requests are pre-generated to include a cryptographic key to be used in fulfilling the requests. The requests may be encoded in uniform resource locators and may include authentication information to enable a service provider to whom the requests are submitted to determine whether the requests are authorized.
Amazon Technologies, Inc.

System and identity authentication

Embodiments of the present application relate to a method, device, and system for processing data. The method includes receiving a login request from a front-end device, the login request comprising account information of an account associated with the front-end device, determining a confirmation device associated with the front-end device based at least in part on the account information, generating an authentication request based at least in part on the account information, wherein said authentication request comprises said account information, obtaining confirmation information from the confirmation device, the confirmation information being generated based at least in part on the authentication request and confirming the login request, and authenticating, by the authentication system, the front-end device based at least in part on the confirmation information..
Alibaba Group Holding Limited

Virtual router for paths between autonomous-system pairs

Disclosures teach a virtual router operable to change a connection between a first autonomous system (as) and a second as from a first path to a second path. The connection passes packet traffic over intermediate networking infrastructure (ini) between the first as and the second as.
Console Connect Inc.

Systems and methods for providing content and services on a network system

Systems and methods for managing and providing content and services on a network system. Aspects of the invention include controlling user perceived connection speed.
Nomadix, Inc.

Scope-based certificate deployment

The techniques described herein facilitate scope-based certificate deployment for secure dedicated tenant access in multi-tenant, cloud-based content and collaboration environments. In some embodiments, a method is described that he includes receiving an incoming authentication request from an access system, wherein the authentication request includes metadata, extracting the metadata from the authentication request, and processing the metadata to identify a tenant corresponding to the request.
Microsoft Technology Licensing, Llc

Forged command filtering system, collaborative operating system, and related command authentication circuit

A forged command filtering system includes: a secure command generating device for performing a digital signature operation on a selected command to generate a command request; a command transmitting device for receiving and transmitting the command request; a target device; and a command authentication circuit. The command authentication circuit includes: a communication interface for communicating with the command transmitting device or the target device; a secure micro-controller for storing a signature verification key of the secure command generating device; a control circuit for cooperating with the secure micro-controller to authenticate the command request using the signature verification key; and a storage circuit for storing data required for the operations of the control circuit.
Jrsys International Corp.

Providing user authentication

In particular embodiments, a computing device accesses a device identifier that is encoded in the hardware of the computing device. The device identifier is used to generate a device key that will uniquely identify the particular computing device.
Facebook, Inc.

Security authentication system for membership login of online website and method thereof

Disclosed is a security authentication system for a membership login of an online website capable of ensuring a safe membership login without having to directly entering a membership id and a password for a membership login of a certain online website on a user terminal being used in association with a smartphone for a private or public purpose, and a method thereof.. .
Ebay Korea Co., Ltd.

Communication system, communication terminal, authentication method, and non-transitory computer readable medium storing program

A communication system of the present invention includes: a representative communication terminal (20) belonging to a communication group (10) formed by a plurality of communication terminals; subordinate communication terminals (30) to (32) belonging to the communication group (10) and being separate from the representative communication terminal (20); and a node apparatus (40) exerting call processing control relating to the plurality of communication terminals belonging to the communication group (10). The representative communication terminal (20) and the subordinate communication terminals (30) to (32) have shared key information and shared sim information.
Nec Corporation

Authentication for wireless local area networks

A digital credential is generated for a user device. The digital credential is transmitted to the user device via an optical wireless communication access point (owc ap).
International Business Machines Corporation

System and forming and authenticating an integrated circuit

A system and method of forming an authenticatable integrated circuit comprising altering a material property of a semiconductor layer of the integrated circuit such that the semiconductor layer has physically unclonable functions (pufs). The semiconductor layer may be subjected to ion implantation to form amorphous regions including the pufs.
Honeywell Federal Manufacturing & Technologies, Llc

Quality control paper money authentication and system therefor

Provided are a quality control method for banknote identification and a quality control system for banknote identification. The quality control method for banknote identification includes: obtaining a multispectral signal collected by a contact image sensor (cis); extracting a first eigenvalue of the multispectral signal; obtaining a corresponding second eigenvalue according to the first eigenvalue and a pre-set correction conversion value; and inputting the second eigenvalue into a banknote classifier to obtain a corresponding banknote classification result..
Grg Banking Equipment Co., Ltd.

Marking for authentication and access

An authentication system for managing access to an access-restricted system is provided. The system includes a user interface panel for receiving a request for access rights from a user.
Tiburon Lockers Inc.

Authentication techniques including speech and/or lip movement analysis

A system, apparatus, method, and machine readable medium are described for performing eye tracking during authentication. For example, one embodiment of a method comprises: receiving a request to authenticate a user; presenting one or more screen layouts to the user; capturing a sequence of images which include the user's eyes as the one or more screen layouts are displayed; and (a) performing eye movement detection across the sequence of images to identify a correlation between motion of the user's eyes as the one or more screen layouts are presented and an expected motion of the user's eyes as the one or more screen layouts are presented and/or (b) measuring the eye's pupil size to identify a correlation between the effective light intensity of the screen and its effect on the user's eye pupil size; capturing audio of the user's voice; and performing voice recognition techniques to determine a correlation between the captured audio of the user's voice and one or more voice prints..
Nok Nok Labs, Inc.

Systems and methods for user identification using payment card authentication read data

A payment card may be read by a card reader which may include a sensing unit to read a magnetic component of the card. An authentication read may be used to collect a magnetic fingerprint of the card, and/or swipe characteristics of the authentication read.
Trusona, Inc.

System for receiving value from an electronic cash register to an electronic value system using a user device.

A system for currency conversion comprising a currency with at least one denomination, at least one electronic cash register adapted to receive and retain at least one currency further having a module in communication with each register, at least one user device in communication with at least one module, the device including at least one user controllable command, user identification information, and system authentication information, at least one user account adapted to receive and retain the value associated with at least one currency-paid transaction processed by at least one register, at least one redemption outlet adapted to allow at least one user to apply any value in their user account to a desired purpose whereby each user retains the value associated with currency-paid transactions without the necessity of receiving and dealing with physical currency.. .

Method and staging send transactions

A method for performing transactions comprises receiving registration information and transaction specifications, generating a distribution profile based on the registration information, and storing the transaction specifications in the distribution profile. The distribution profile is identified based on an initiation instruction and associated user authentication data, and one of the transaction specifications in the distribution profile is identified based on the initiation instruction.
Moneygram International, Inc.

Radio frequency transactions using a plurality of accounts

The present invention includes systems and methods for facilitating transactions using non-traditional devices. A method of the present invention includes the steps of forming a transaction request at a non-traditional device, and communicating the transaction request to a reader.
Chartoleaux Kg Limited Liability Company

Multi-layered body, and security document

A multilayer body with a functional layer which includes an antenna element as well as with an optical security element which includes at least one electrically conductive partial region which is galvanically connected to the antenna element. A security document with such a multilayer body, as well as a method for the authentication thereof..
Ovd Kinegram Ag

Method of authentication using surface paper texture

A method of authentication using surface paper texture includes steps of capturing a topographic pattern image of a surface of a region of interest of the paper artifact and extracting a plurality of specific features from the captured topographic pattern image. The method further identifies the location of the specific features of the paper artifact from the captured topographic pattern image.
Paper Dna Ag

Anti-theft in firmware

Methods, systems and storage media are disclosed for enhanced system boot processing that authenticates boot code based on biometric information of the user before loading the boot code to system memory. For at least some embodiments, the bio-metric authentication augments authentication of boot code based on a unique platform identifier.
Intel Corporation

Image forming apparatus, image forming system, controlling image forming system, and storage medium

In an image forming system including a storage machine, an authentication server machine, and an output machine, when the output machine performs printing of print data stored in the storage machine, the output machine transmits a device token to the storage machine to request the storage machine for the print data. The storage machine transmits the device token to the authentication server machine to determine whether the device token is valid.
Canon Kabushiki Kaisha

Multi-factor profile and security fingerprint analysis

A security fingerprint architecture is disclosed. A security fingerprint comprises one or more behavioral factors which store a history of events associated with one or more users.
T-mobile Usa, Inc.

Methods and authentication in an electronic device

An electronic device, comprising one or more input devices, for receiving biometric input from a user and generating one or more biometric input signals; an applications processor; a mixer configurable by the applications processor to provide a first signal path between one or more of the input devices and the applications processor; and a biometric authentication module coupled to the one or more input devices via a second signal path that does not include the mixer, for performing authentication of at least one of the one or more biometric input signals.. .
Cirrus Logic International Semiconductor Ltd.

Methods and authentication in an electronic device

An authentication system, comprising: one or more inputs, for receiving biometric input signals from a user; a routing module, configured to selectively route the biometric input signals from the one or more inputs to one or more of a plurality of components, the plurality of components including a biometric authentication module, for processing the biometric input signals and generating an authentication result; and a security module, for receiving a control instruction for the routing module, determining whether or not the control instruction complies with one or more rules, and controlling the routing module based on the control instruction responsive to a determination that the control instruction complies with the one or more rules.. .
Cirrus Logic International Semiconductor Ltd.

Image processing system, method, and non-transitory computer readable medium

An image processing system includes a reception unit that receives an image forming instruction from a user, a retaining unit that retains the image forming instruction in association with the user, an acceptance unit that accepts an execution instruction from the user; an authentication unit that performs authentication of the user, and an image forming unit that executes the image forming instruction retained by the retaining unit in association with the authenticated user. The image forming unit executes the image forming instruction without accepting the execution instruction by the acceptance unit in a case where the authentication unit completes the authentication and cancellation of execution by the user is not present within a holding time..
Fuji Xerox Co., Ltd.

Location-based electric power mediation module, electric vehicle, mediation server, and user certification socket or connector

The present invention relates to a location-based charging/discharging power mediation system of an electric vehicle, and more particularly to a module, an electric vehicle, and an intermediate server for location-based charging/discharging power mediation. The present invention also relates to a user authentication socket or connector used in the power mediation system.
Geo-line Co., Ltd.

System and mobile telephone roaming

A foreign wireless communication system is operated in a local communication network as if the foreign wireless communication system were a local wireless communication system. A data communication link is established between the wireless communication system and a service provider in a local wireless communication network.
Simo Holdings, Inc.

Service discovery

A technique for service discovery is provided. According to an example embodiment, the technique comprises creating in a wireless communication device and in dependence of a service authentication key associated with a service available in the wireless communication device, a concealed service identifier for identification of said service, constructing a service information message comprising a device identifier assigned for said wireless communication device and said concealed service identifier, and transmitting said service information message from the wireless communication device over a wireless link to one or more further wireless communication devices..
Nokia Technologies Oy

Authenticating a device utilizing a secure display

Aspects may relate to a device that comprises a storage, an interface, and a processor. The processor coupled to the interface and operable in a secure mode may be configured to: command the transmission of a nonce through the interface to a server over a channel and receive through the interface a response from the server including an identifier and the nonce over the channel, in which, the response is signed with a private key of the server.
Qualcomm Incorporated

Deauthenticate a client device during an association validation phase based on a plurality of capabilities associated with the client device

Certain implementations of the present disclosure relates to a method, device, and medium to perform association validation of a client device's request during an association validation phase based on a plurality of capabilities associated with the client device. The network device receives an association request to connect to a wireless network.
Aruba Networks,inc.

Method and system to dynamically authenticate and grant access to non-trusted anonymous wi-fi

Aspects of the subject disclosure may include, for example, identifying a request from a portable device for authentication to a first wlan, wherein the user is not registered as a wlan user. An identifier of the device is compared with entries in a list associated with the wlan and, responsive to a first determination that the identifier corresponds to an entry in the list, wireless access is using the first wlan facilitated.
At&t Intellectual Property I, L.p.

Custom fast session transfer security handshake

A method and device for authenticating wireless communication links between devices. The method may comprise sending a first frame from first device to a second device.
Qualcomm Atheros, Inc.

Association data transmission in wireless communication system and device using same

An association method for data transmission between devices in a neighbor awareness network (nan), and a device using the same are provided. A first nan device transmits, to a second nan device, a service discovery frame having a service identifier (id) and association interval information, and transmits an authentication request for requesting authentication at a time indicated by the association interval information..
Lg Electronics Inc.

Image forming apparatus and authentication method

An image forming apparatus comprises a wireless communication section, a terminal authentication section and a login processing section. The wireless communication section wirelessly communicates with a terminal device of a user.
Toshiba Tec Kabushiki Kaisha

Billing engine and use

A wireless communication device associated with a mobile operator network transmits an authentication request for network access via a wireless access point (ap) using a transceiver other than the cellular network transceiver. Device authentication can occur directly with the mobile operator network or via a proxy server.
Mobilitie, Llc

Dynamic multi-factor authentication challenge generation

Dynamic multi-factor authentication challenge selection is provided. A risk associated with an operation that requires authentication of a user of a client device is determined.
International Business Machines Corporation

Transparently enhanced authentication and authorization between networked services

A control system facilitates communication between a plurality of networked services. The control system includes a client agent associated with a first service of the networked services, and a destination agent associated with a second service of the networked services.
Banyanops, Inc.

Method and device for providing authentication information on web page

The present disclosure provides a method for an authentication system to provide authentication information for a web page, comprising: receiving a request for authentication information from a web page; judging whether the web page is redirected to through a relevant search engine; judging whether the web page satisfies a condition of displaying the authentication information; and providing the authentication information to the web page satisfying the condition. By providing authentication information to a web site through a search engine, with the combination of the authentication system with the relevant search engine, the reliability and security of authentication information are enhanced.
Baidu Online Network Technology (beijing) Co., Ltd .

Probabilistic tracking of host characteristics

A system for mitigating network attacks includes a protected network and one or more attack mitigation devices communicatively coupled to the protected network. The attack mitigation devices are configured to receive a request from a host having an ip address and determine whether the ip address is included in a first probabilistic data structure representing addresses of hosts having failed to authenticate using a first authentication procedure.
Arbor Networks, Inc.

Computer network providing secure mobile device enrollment features and related methods

A computer system may include a smart card reader, a credential management system (cms) server, an enrollment server connected with the cms server on an internal lan, and a mobile device associated with a user and configured to initiate enrollment with the enrollment server via an internal enrollment port inaccessible outside of the internal lan. The cms server may cooperate with the smart card reader to authenticate a smart card associated with the user, and generate a secure credential(s) that is stored on the mobile device based upon authentication of the smart card.
Citrix Systems, Inc.

Network apparatus

A network apparatus according to an embodiment comprises: a storage unit configured to store apparatus information in which information on a model identifier of a terminal apparatus and use authentication information indicating that the terminal apparatus is granted a use authentication by a predetermined network operator are associated; a receiver configured to receive, from another network apparatus, information on a model identifier of a user terminal accessing a network managed by the predetermined network operator; and a controller configured to notify, based on the information on the model identifier of the user terminal and the apparatus information, the other network apparatus of information for determining whether or not to provide a communication service to the user terminal.. .
Kyocera Corporation

Rule based device enrollment

Techniques for providing enrollment services for various types of electronic devices in a communication network is disclosed. The electronic devices may include devices associated with a user and headless devices not associated with any user.
Oracle International Corporation

Method for providing an authenticated connection between at least two communication partners

A method for providing an authenticated connection between at least two communication partners and to a communication system. The method includes setting up an anonymous signal-conducting connection between the at least two communication partners; checking the authenticity of a signed certificate used by a first communication partner of the at least two communication partners by a second communication partner of the at least two communication partners; reproducing an authentication code by the second communication partner after the check of the authenticity of the signed certificate used by the first communication partner has been carried out; and confirming the authentication code reproduced by the second communication partner by a user by the first communication partner.
Volkswagen Ag

Securely provisioning a service to a customer equipment

A device may receive a certificate, such as an x.509 certificate, that includes authentication information. The authentication information may uniquely identify a customer equipment.
Verizon Patent And Licensing Inc.

Portable authentication and encryption device and system

A portable electronic device for authentication and encryption communicably attached to a computer system is provided. The portable device may generate and automatically output authentication data for a plurality of accounts on request by a user.

Authentication on a computing device

Systems and/or methods provide a user of a first computing device with the ability to authenticate themselves on a remotely provided process or service using a second computing device on which the user is already authenticated. For example, the techniques of this disclosure provide a user with the ability to securely log into a remotely provided service or application (such as e-mail, cloud computing service, etc.) on a first computing device (e.g., a desktop computer, laptop, tablet, etc.) using a second computing device (e.g., mobile phone) on which the user is already logged into the service or application, without requiring manual entry of authentication information on the first computing device..
Google Llc

Authentication based on telephone number recycling

A method and system for authenticating a user is provided. In some embodiments, a security system determines whether the time since the last authentication was successful is less than a recycle telephone number period (e.g., the minimum time before which a telephone number might be assigned to a new user).
Microsoft Technology Licensing, Llc

System and providing persistent user identification

Embodiments provide a system and method for network tracking. Through various methods of packet encapsulation or ip option filling, one or more packets of information can be tagged with a unique security tag to prevent unauthorized access.
International Business Machines Corporation

Computer-implemented systems and methods of device based, internet-centric, authentication

Systems and computer-implemented methods for authorizing respective access by each of a plurality of internet users to a respective one or more internet services provided by each of a plurality of internet service providers. A system includes a processor, and non-transient computer readable storage media, at a single identity provider.
Probaris Technologies, Inc.

Method for providing an authenticated connection between at least two communication partners

A method for providing an authenticated connection between at least two communication partners and to a communication system. The method includes providing a shared secret key for the at least two communication partners; setting up an anonymous signal-conducting connection between the at least two communication partners, wherein all messages of the connection between the at least two communication partners are encrypted using the shared secret key; and authenticating the connection between the at least two communication partners by a user.
Volkswagen Ag

Arrangement and operating the arrangement containing a substation and at least one terminal device connected to it

A method operates an arrangement having a substation and a terminal device connected to the substation. The terminal device is equipped with a terminal device certificate and a private key.
Siemens Aktiengesellschaft

System and providing secure collaborative software as a service (saas) attestation service for authentication in cloud computing

An architecture and a method are disclosed for providing secure, scalable, and dynamic user configuration in the distributed network for the cloud computing to provide authentication and authorization for the plurality of the users to use the saas service. The system includes a hierarchical tree structure that configures the cloud-computing model by using the certificate less identity-based cryptography to establish the hierarchical relationship between the participating entities.
Institute For Development And Research In Banking Technology (idrbt)

Gprs system key enhancement method, sgsn device, ue, hlr/hss, and gprs system

A gprs system key enhancement method, an sgsn device, ue, and a gprs system are provided. The method includes: receiving, by the sgsn, a request message sent by the ue; acquiring, by the sgsn, an authentication vector including a first ciphering key and a first integrity key from the hlr/hss; when the sgsn determines that the ue is ue of a first type, selecting a ciphering algorithm and an integrity algorithm for the ue, and sending the selected ciphering algorithm and the selected integrity algorithm to the ue; and computing, by the sgsn, a second ciphering key and a second integrity key according to the first ciphering key and the first integrity key..
Huawei Technologies Co., Ltd.

Authentication tag, device, system and method

The invention discloses an authentication system of objects, physical or virtual, comprising an authentication mark and, as an option, an authentication message, generated by an authentication device and controlled by a verification/decoding device in combination with an authentication server managed by an authenticating authority. The authentication mark in the tag/message may comprise gnss rf raw signals and/or gnss raw data.
Centre National D'etudes Spatiales

Electronic device and operating the same

A method of operating an electronic device and an electronic device thereof are provided. The method includes receiving a first voice signal of a first user, authenticating whether the first user has authority to control the electronic device, based on the first voice signal, and determining an instruction corresponding to the first voice signal based on an authentication result and controlling the electronic device according to the instruction.
Samsung Electronics Co., Ltd.

Method for managing parking spaces on public streets

The invention relates to a method for managing on-street parking spaces. The method includes querying, by a unit of a vehicle, vehicle sensors about the occupancy status of a parking space around the vehicle, the setting up of a communication channel between the unit and a remote server, the authentication of the unit with the server, the sending of a message with a public encryption key by the server to the unit, the encryption of the geolocation data and the occupancy status, the sending of the encrypted data to server, the decryption by the server of the received encrypted data, the comparison of the geolocation data received with a database containing referenced parking spaces and the update in the database of the occupancy status of referenced parking spaces..
Gemalto Sa

System and automatically crossing platforms to perform shareholder voting

A system and method for automatically crossing platforms to perform shareholder voting, wherein a user's authentication information is acquired via a first platform to allow the user to perform stock transactions with a first brokerage firm, wherein a command of the first platform allows the mobile device of the user to a second platform on the mobile device, wherein the second server obtains identifying information of the authentication information of the user to identify the user and communicates with the second platform on the mobile device to enable the user to perform a first shareholder voting through the second platform based on the total number of the first stock of the user.. .
Taiwan Depository & Clearing Corporation

Method and electronic device for paymnet using biometric authentication

An electronic device and a method of payment by the electronic device are provided. The electronic device includes a local wireless communication circuit, a first biometric sensor and a second biometric sensor, a security module configured to store payment information corresponding to a payment card, a processor electrically connected to the first biometric sensor, the second biometric sensor, the local wireless communication circuit, and the security module, and a memory electrically connected to the processor, wherein the memory is configured to store instructions that cause the processor to select at least one of the first biometric sensor or the second biometric sensor, based on a security policy of an issuer of the payment card or a security policy of the payment card, authenticate a user by using the selected biometric sensor, and if the authentication is successful, transmit the payment information to an external device through the local wireless communication circuit..
Samsung Electronics Co., Ltd.

Method and system for risk based decisioning for one click checkout

A method for issuer-based decisioning for single action purchases includes: storing an issuer profile, wherein the issuer profile is a structured data set related to an issuing institution including at least a scoring threshold; receiving data from a web server associated with a merchant, the data comprising at least transaction data related to a proposed payment transaction and browser data related to a web browsing application program used to access the web server; calculating a risk score based on at least the transaction data and browser data; determining a purchase procedure of a plurality of purchase procedures based on the calculated risk score and the scoring threshold, wherein the plurality of purchase procedures includes purchase procedures (i) enabling initiation of the payment transaction via a single user action, and (ii) requiring additional user authentication; and electronically transmitting the determined purchase procedure to the web server.. .
Mastercard International Incorporated

Methods for performing internet processes using global positioning and other means

Methods for purchasing of goods or services over the internet. A customer has a customer account set up at a bank with associated account information.
Ecardless Bancorp. Ltd.

Data sharing with card issuer via wallet app in payment-enabled mobile device

A payment-enabled mobile device runs a merchant wallet application. The mobile device engages in a transaction with the merchant at the point of sale.
Mastercard International Incorporated

Electronic device and iris authentication thereof

An electronic device is provided. The electronic device includes an iris recognizing unit that extracts an iris area from one frame of a preview image and performs iris authentication by comparing a feature of the iris area with registered iris information and a processor that determines a match, a no-match, or an iris recognition error based on one of an amount of times that the iris authentication is performed during a first time period and a result of the iris authentication during the first critical time period..
Samsung Electronics Co., Ltd.

Open registry for human identification

An identity system for the internet of things (iot) that enables users and machines to identify, authenticate and interact with items/identities/persons without relying on a third-party-controlled authentication service. The system includes wireless tamperproof tags coupled to items/identities/persons and an open registry database where digital records associated with the items/identities/persons is able to be stored.
Chronicled, Inc

Methods of dynamically securing electronic devices and other communications through environmental and system measurements leveraging tailored trustworthy spaces and continuous authentication

This invention is for a system capable of securing one or more fixed or mobile computing device and connected system. Each device is configured to change its operating posture by allowing, limiting, or disallowing access to applications, application features, devices features, data, and other information based on the current tailored trustworthy space (tts) definitions and rules which provided for various situationally dependent scenarios.
Internet Infrastructure Services Corp.

Adaptive system profile

An approach to generating and regenerating a profile value from features of a system (e.g., a computer system), allows for certain changes of features of the system over time. The system may correspond to a client computer or a particular component of the client computer or a user of a client computer, and may also correspond to a combination of the user (i.e., a biometric characterization of the user) and the client computer or a component of the computer.
Fondazione Universitaria Inuit-"tor Vergata"

Advanced protection system for consumable or detachable parts for an industrial printer

A method for an industrial printer to secure at least one consumable or detachable element, the printer comprising a 1st microcontroller that will make a data transfer with a 2nd microcontroller of the printer or the consumable or detachable element, this method including at least: an authentication of the 2nd microcontroller by the 1st microcontroller, one of the microcontrollers sends at least one secret key sk for data transfers between the two microcontrollers, to the other microcontroller, data exchange between the two microcontrollers by symmetric encryption using the first data transfer secret key sk1.. .
Dover Europe Sàrl

Chained authentication using musical transforms

A service receives a request from a user of a group of users to perform one or more operations requiring group authentication in order for the operations to be performed. In response, the service provides a first user of the group with an image seed and an ordering of the group of users.
Amazon Technologies, Inc.

Enhanced level of authentication related to a software client application within a client computing device

A method for authentication related to a software client application within a client computing device includes: in a first step, an authentication-related command and/or module is invoked by the software client application, and a first group of application protocol data units is exchanged between the client computing device and a subscriber identity module entity; in a second step, a subscriber identity module applet is triggered—via the first group of application protocol data units—to contact a subscriber identity module toolkit and/or to trigger an event, so as to invoke a command of the subscriber identity module toolkit; and in a third step, a second group of application protocol data units are exchanged between the client computing device and the subscriber identity module entity, wherein the subscriber identity module toolkit thereby triggers the client computing device to request a user action from the user of the client computing device.. .
Deutsche Telekom Ag

Electronic device and authenticating biometric information

An electronic device includes a plurality of biometric sensors that each sense pieces of biometric information of different types, respectively, a communication circuit that communicates with an authentication server, a memory that stores a payment application, and a processor electrically connected with the plurality of biometric sensors, the communication circuit, and the memory. The processor is configured to generate pieces of account information respectively corresponding to the plurality of biometric sensors, to make a request for authentication of the biometric information corresponding to the account information to the authentication server using account information, which corresponds to biometric information to be authenticated, from among the pieces of account information, is the payment application is executed, and to receive a response to the request for the authentication from the authentication server..
Samsung Electronics Co., Ltd.

Real-time user authentication using integrated biometric sensor

A computing device includes a housing, a processor, memory, a human interface device (i.e., a keyboard or a trackpad), and a biometric sensor integrated into the housing. The biometric sensor is configured for capturing biometric data (i.e., heartbeat data or a vein scan) from one or more of hands of a user of the device while the user's fingers are interacting with the human interface device.
Google Inc.

Output apparatus, program, output system, and output method

An output apparatus performing communications with a terminal apparatus and an authentication apparatus includes an authentication request unit to transmit an authentication request of a user to the authentication apparatus to acquire, when authentication of the user has succeeded, terminal apparatus information in association with the user, a terminal apparatus information accumulation unit to accumulate the acquired terminal apparatus information, an output data acquisition unit to acquire output data accumulated in the terminal apparatus from the terminal apparatus specified by the acquired terminal apparatus information in association with the user, and an output processor to output the output data. The output data acquisition unit acquires, upon failing to acquire a response to the authentication request of the user from the authentication apparatus, the output data accumulated in the terminal apparatus from the terminal apparatus specified by the terminal apparatus information in association with the user..
Ricoh Company, Ltd.

Authentication apparatus, method, system and program, and server apparatus

A scenario including a combination of procedures of multi-factor authentication required for a terminal to receive provision of a service is stored and managed in association with the service, and a probability that the procedure will succeed is stored and managed in association with each of the procedures, a success probability of the service through the scenario, is calculated based on the probability regarding the procedure to evaluate at least one of security and usability based on the success probability, and the service to the terminal, is controlled according to the evaluation result.. .
The University Of Tokyo

Method for accessing accessible article, and system and accessible article using the same

A method for accessing an accessible article, and a system and an accessible article using the method are provided. The user can establish authentication between the user device and the accessible article via the projectable space instance containing the space id.
Able World International Limited

Optical lens assembly and electronic device including the same

Provided are an optical lens assembly and an electronic device. The optical lens assembly includes a first lens having a positive refractive power, a second lens having a positive or negative refractive power, and a third lens having a negative refractive power.
Samsung Electronics Co., Ltd.

Firearm with user authentication to remove or add components

A method authenticates a user before the user can remove or attach a component to a firearm. When the user is authenticated, the user can remove or attach a component to the firearm.

Authentication reader and a dispenser comprising the authentication reader

An authentication reader and a dispenser comprising the authentication reader for authenticating a product having a taggant ink disposed on the product's surface.. .
Sun Chemical Corporation

Access method in wireless communications network, related apparatus, and system

An embodiment of the present invention provides an access method in a wireless communications network. Authentication and authorization functions of a 3gpp aaa server for a non-3gpp access network can be integrated into a mobility management network element.
Huawei Technologies Co., Ltd.

Method for automatic possession-factor authentication

Systems and methods are provided that include: accessing implicit authentication data from a possession factor associated with an authorized user; at the possession factor or at an authentication platform: generating a possession confidence level using the implicit authentication data, the possession confidence level being one of a plurality of possession confidence levels, the possession confidence level indicating a likelihood that the possession factor is possessed by the authorized user; identifying, among a plurality of varying authentication requirements, an authentication requirement for the transaction based on the possession confidence level, the authentication requirement defines a process or action to prove authority to perform the transaction or a process or action to prove an identity of a user attempting to perform the transaction; and implementing the authentication requirement for the transaction. .
Duo Security, Inc.

System and wireless communication of glucose data

Systems, devices, and methods are disclosed for wireless communication of analyte data. One such method includes, during a first interval, establishing a first connection between an analyte sensor system and a display device.
Dexcom, Inc.

Behavioral authentication

Behavioral authentication is described. A mobile device records a first location of the mobile device.
Salesforce.com, Inc.

Source device, content providing method using the source device, sink device and controlling the sink device

A source device for transmitting content to a sink device is provided. The source device may include an interface configured to perform high-bandwidth digital content protection (hdcp) authentication with the sink device, and a controller configured to determine an hdcp version supported by the sink device, convert the content so as to be encrypted in the hdcp version supported by the sink device in response to a determination that another hdcp version applied to the content is not supported by the sink device, encrypt the converted content in the hdcp version supported by the sink device, and control the interface to transmit the content to the sink device..
Samsung Electronics Co., Ltd.

Authentication chaining by connected devices

In a general aspect, a method for authenticating a plurality of slave devices connected to a master device can include: generating and sending by the master device a respective challenge to each slave device; in each slave device, generating a response to the respective challenge and transmitting it to the master device; verifying by the master device the response of one of the slave devices; returning by the master device the remaining responses to respective slave devices distinct from those that generated the responses; and verifying by each slave device the response returned thereto by the master device and transmitting the result of the verification to the master device.. .
Inside Secure

Shared terminal, communication system, image transmission method, and recording medium

An apparatus, system, and method of controlling transmission of an image, each of which: displays, on a display, an image to a plurality of users, the plurality of users sharing a use of the shared terminal; obtains, from a first privately-owned terminal owned by a first user of the plurality of users, first terminal identification information for identifying the first privately-owned terminal; transmits an authentication request for authenticating the first privately-owned terminal to a terminal management server, the authentication request including the first terminal identification information of the first privately-owned terminal; receives an authentication result of authenticating the first privately-owned terminal from the terminal management server; and when the authentication result indicates that the first privately-owned terminal is a legitimate terminal, and transmits a print request for printing data relating to the image being displayed to a printer through a network.. .

System and wireless communication of glucose data

Systems, devices, and methods are disclosed for wireless communication of analyte data. One such method includes, during a first interval, establishing a first connection between an analyte sensor system and a display device.
Dexcom, Inc.

System and wireless communication of glucose data

Systems, devices, and methods are disclosed for wireless communication of analyte data. One such method includes, during a first interval, establishing a first connection between an analyte sensor system and a display device.
Dexcom, Inc.

System and wireless communication of glucose data

Systems, devices, and methods are disclosed for wireless communication of analyte data. One such method includes, during a first interval, establishing a first connection between an analyte sensor system and a display device.
Dexcom, Inc.

Systems and methods for providing software defined network based dynamic access control in a cloud

A system for providing access control in a cloud includes a software defined network including a software defined network controller. The system is configured to authenticate user access using multi-factor authentication.
At&t Intellectual Property I, L.p.

Usage tracking in hybrid cloud computing systems

Techniques for facilitating usage tracking in hybrid cloud computing systems are disclosed herein. In one embodiment, a method can include receiving, from a private cloud computing system, a request for uploading usage data to a storage in a public cloud computing system.
Microsoft Technology Licensing, Llc

Access authentication for cloud-based shared content

Systems for managing content in a cloud-based service platform. Embodiments operate using a server in a cloud-based environment.
Box, Inc.

System and methods to establish user profile using multiple channels

Embodiments of the disclosure provide a method of establishing a user profile using multiple channels. Embodiments allow compatibility of the user profile across several authentication systems.
Aetna Inc.

Unified authentication application in trunking system, server and terminal

Embodiments of the present disclosure provide a unified authentication method for application in a trunking system, a server and a terminal. The method includes: an application service network element of a server receives a registration request transmitted by a terminal and transmits the registration request to an authorization authentication network element, where the registration request carries a token indicating a unique identity of a user initiating the registration request, and the token is assigned by the authorization authentication network element of the server to the user when the user logs onto the terminal; the authorization authentication network element then performs a token authorization to the user according to the token; and finally the application service network element performs an application service interaction with the terminal if the token authorization is passed..
Chengdu Td Tech Ltd.

Mobile device, authentication device and authentication methods thereof

A mobile device, an authentication device and authentication methods thereof are provided. The mobile device displays a qr code on its display panel, and continuously transmits a wireless signal carrying a hardware serial number of the mobile device.
National Cheng Kung University

Methods and systems for authenticating users

A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction requires access to protected resources. Moreover, the method determines whether inputted information is known, determines a state of a communications device when the inputted information is known, and transmits a biometric authentication request from a server to an authentication system when the state of the communications device is enrolled.
Daon Holdings Limited

Portable electric device and operating method therefor

An operating method for a portable electric device is provided. The portable electric device has a fixing component, a body, and an authentication register.
Htc Corporation

Enhanced authentication based on secondary device interactions

Enhance authentication techniques may include receiving credential data of a secondary device by a primary device, generating a cryptogram using the credential data of the secondary device, and transmitting the cryptogram to an access device to request for authorization to use an account associated with a user of the primary device. The authorization can be granted based on verification of the cryptogram and an interaction activity pattern of interactions between the primary device and a set of communication devices including the secondary device..
Visa International Service Association

Authentication of a client device based on entropy from a server or other device

Methods and systems for authenticating a client device using entropy provided by a server and/or a device paired with the client device are described herein. The system may generate static entropy and time-limited entropy based on data from the server and/or the paired device.
Citrix Systems, Inc.

Computing device with integrated authentication token

Disclosed are various embodiments for a computing device with an integrated authentication token. The computing device includes first circuitry having a processor and a memory and providing general-purpose computing capability.
Amazon Technologies, Inc.

Preventing unauthorized access to secured information systems using multi-device authentication techniques

A computing platform may receive, from a client portal server, a request to authenticate a user to a user account associated with a client portal. Based on identifying an activity associated with the request, the computing platform may select a multi-device authentication method for authenticating the user.
Bank Of America Corporation

Tokenized account information with integrated authentication

Techniques are disclosed relating to tokenized account information with integrated authentication. In some embodiments, a shared secret key is used for tokenization and authentication.
Ca, Inc.

Preventing unauthorized access to secured information systems using tokenized authentication techniques

A computing platform may receive, from a client portal server, a request to authenticate a user to a user account associated with a client portal provided by the client portal server. Based on receiving the request to authenticate, the computing platform may send, to a social messaging server, an authentication token request message.
Bank Of America Corporation

Preventing unauthorized access to secured information systems using tokenized authentication techniques

A computing platform may receive, from a social messaging server, a request to authenticate a user to a user account associated with a client portal. In response to receiving the request, the computing platform may send, to the social messaging server, an authentication token request message.
Bank Of America Corporation

Two-factor authentication for user interface devices in a process plant

Techniques for performing two-factor authentication in a process plant include receiving, at a user interface device, a first type of identification information for a user from an identification device or a physical trait of the user. The user interface device also receives a second type of identification information for the user from knowledge-based information provided by the user.
Fisher-rosemount Systems, Inc.

System and providing vehicle information based on personal authentication and vehicle authentication

An electronic device and method for providing vehicle information based on personal authentication and vehicle authentication are disclosed. According to various example embodiments, an electronic device includes a communication module comprising communication circuitry configured to communicate with a vehicle device and a first server and a processor electrically connected with the communication module, in which the processor is configured to receive an encrypted session key set including at least one session key from the first server, to transmit the encrypted session key set to the vehicle device, receive, from the vehicle device, second vehicle information in which first vehicle information of the vehicle device is encrypted using a first session key of the at least one session key and is signed using a secret key of the vehicle device, and to transmit, to the first server, third vehicle information in which the received second vehicle information is signed using a secret key of a user..
Samsung Electronics Co., Ltd.

Modifying authentication for an application programming interface

Application programming interfaces (apis) can be unintentionally exposed and allow for potentially undesirable use of corporate resources. An api call filtering system configured to monitor api call requests received via an endpoint and api call responses received via a supporting service of an api or web service.
Shape Security, Inc.

Techniques to verify and authenticate resources in a data center computer environment

Embodiments are generally directed apparatuses, methods, techniques and so forth to receive a sled manifest comprising identifiers for physical resources of a sled, receive results of an authentication and validation operations performed to authenticate and validate the physical resources of the sled, determine whether the results of the authentication and validation operations indicate the physical resources are authenticate or not authenticate. Further and in response to the determination that the results indicate the physical resources are authenticated, permit the physical resources to process a workload, and in response to the determination that the results indicate the physical resources are not authenticated, prevent the physical resources from processing the workload..

A establishing trust between a device and an apparatus

There is disclosed a method of establishing trust between an agent device and a verification apparatus, the method comprising: obtaining, at the agent device, a trust credential, wherein the trust credential relates to an aspect of the agent device and comprises authentication information for identifying at least one party trusted by the verification apparatus and/or device data relating to the agent device; transmitting, from the agent device to the verification apparatus, the trust credential; obtaining, at the verification apparatus, the trust credential; analysing, at the verification apparatus, the trust credential; determining, at the verification apparatus, whether the agent device is trusted based on the analysis; and responsive to determining the agent device is trusted, establishing trust between the agent device and the verification apparatus.. .
Arm Limited

Method for distributed trust authentication

A method for distributed trust authentication of one or more users attempting to access one or more service providers operating on a network includes performing primary authentication of a user using a first authentication factor, generating a first partial digital signature for a first authentication response to the primary authentication, performing secondary authentication of the user using a second authentication factor, generating a second partial digital signature for the second authentication response to the secondary authentication, combining the first and second partial digital signatures to form a composite digital signature, and validating the composite digital signature.. .
Duo Security, Inc.

Rfid secure authentication

Authentication systems and methods for a population of devices each associated with an rfid tag are described. For each device, a secret key is combined cryptographically with a publicly-readable unique identifier (uid) of an rfid tag to obtain a unique authorization signature.
Covidien Lp

Virtual network system, virtual network control method, virtual network function database, orchestration apparatus, control apparatus, and control method and control program of control apparatus

A system according to this invention is directed to a virtual network system that prevents unauthorized registration, alteration, or occurrence of erroneous registration even if an operator is to create a network system including a virtual network function produced by a third party. The virtual network system includes an instructor that instructs activation or change of a virtual network function preregistered of providing one of functions included in a virtual network service, an authenticator that authenticates, based on authentication information generated to authenticate a provider of the virtual network function at a time of registering the virtual network function, that the virtual network function instructed to be activated or changed has been validly registered or updated, and a setting unit that sets, when the authenticator authenticates that the virtual network function has been validly registered or updated, the instructed virtual network function as the one of the functions included in the virtual network service..
Nec Corporation

Methods and systems for prioritized authentication between mobile objects

Disclosed are system and methods for prioritized authentication between a plurality of mobile objects. The system comprises: at least a safety application module capable of generating periodically or at specific time instants messages having at least current real-time mobility information of at least the mobile object; at least a mobility module capable of continuously tracking a real-time location information of at least the mobile object; at least a security module having at least one of a signature generation module and a signature verification module, wherein the signature generation module is capable of signing messages generated by the safety application module, wherein the signature verification module is capable of prioritizing the verification of exchanged messages between mobile objects; and at least a communication module capable of transmitting the messages signed by the security module through a network..

Method and system for verifying information of a data item in a plurality of different data items

A method for verifying information of a first data item in a plurality of different data items stored on a server includes a) generating a hash tree, b) computing an authentication path for the first data item based on a recomputation of the hash tree, wherein an authentication path comprises all siblings of tree nodes from the first data item to a root of the hash tree, e) recomputing the root-latish based on the first data item and a computed authentication path of the first data item and comparing the recomputed root-hash with the root-hash of the hash-tree of step a), d) determining a side element in leaves or a tree level above of the hash tree and its authentication path, and e) verifying the authentication path of the side dement.. .
Universitaet Mannheim

Evidence system and method to determine whether digital file is forged or falsified by using smart phone and smart phone having certification function of smart phone screen capture image and method thereof

A system and method for proving forgery of digital file using a smart phone proves whether digital file recorded as digital evidence is tampered after the digital file is created, and is used in digital forensic and criminal investigation by proving that the digital file is not forged through the forgery confirmation system, and the digital file is used for substituting for notary fee, and used as data for proving a situation in an incident, data for proving foundation works after building construction, or evidence data for voice file in a threatening case. Since content transmitting information while using smart phone is stored as digital data through screen capture and a list of applications executed before the capture is converted and stored as hash value, the digital information authentication system through smart phone screen capture confirms actual facts thereafter by proving that the corresponding content is an original copy..
Republic Of Korea (national Forensic Service Director Ministry Of The Interior)

Communication system, node device, communication terminal, key management method, and non-transitory computer-readable medium in which program is stored

A communication system includes a plurality of communication terminals that form a communication group and a node device that carries out an authentication process on each of the communication terminals. The node device derives first keys unique to the respective communication terminals by using information shared between the node device and each communication terminal through the authentication process, derives a second key common to the communication group, calculates an exclusive or between each first key and the second key, and transmits respective xor values obtained through the calculation to the respective communication terminals.
Nec Corporation

User authenticating electrical outlet or connector, power mediating module, and power consuming device

Provided are a user authenticating electrical outlet or connector by which there is no standby power consumption, a power mediating module for receiving power from the electrical outlet or connector and supplying the same to a power consuming device, and the power consuming device that is provided with the power mediating module or receives power via the power mediating module. A user authenticating electrical outlet or connector according to an embodiment of the present invention comprises: an authenticating terminal for receiving authenticating power for user authentication and a transmitted electrical outlet operating password; an authenticating device operated by the authenticating power and determining whether the electrical outlet operating password corresponds to electrical outlet id information; and a micro-current limiting device for allowing a micro-current to flow when a power consuming device is connected to the user authenticating electrical outlet or connector.
Geo-line Co., Ltd.

System and method providing enhanced security ballot image records

The system and method providing enhanced security ballot image records of the present invention includes an enhanced security ballot image tabulator and an enhanced security ballot image audit station. The tabulator processes each ballot of a plurality of ballots to be tabulated to provide an enhanced security ballot image record having diachronically and synchronically coordinated enhanced security ballot image files, each for another ballot of the plurality of ballots to be tabulated.

Security and public safety application for a mobile device with audio/video analytics and access control authentication

An access control system utilizes authorized users' mobile electronic devices for transmitting biometric identifiers in combination with using an access card for authenticating the user's access privileges for unlocking a secure door. The system may further verify proximity of the user's device to the access control reader, which verifies correspondence of the access card with the transmitted biometric characteristics.

System and swapping event tickets

A system for exchanging event tickets, including a database, a computing device, one or more mobile devices, including a seller's mobile device and a buyer's mobile device, a network connecting the computing device and the one or more users' mobile devices, a plurality of modules including authentication module, a geolocation information module for tracking geolocations of the one or more users' mobile devices, a tickets information module, a notifications module, a negotiations platform module, and a confirmation platform module for facilitating an exchange of tickets, wherein the geolocation information module tracks the geolocations of the one or more users' mobile devices and verifies that the geolocations of the seller's mobile device and the buyer's mobile device are within a same venue as a prerequisite to the confirmation platform module facilitating an exchange of tickets.. .

Mobile device security using wearable security tokens

Optimizations are provided for completing a transaction event using authentication information. In particular, a presence of a transaction processing device is initially detected.
Microsoft Technology Licensing, Llc

Communicating authentication information between mobile devices

Techniques are disclosed relating to authentication for user transactions. In some embodiments, a first device of the user provides an option for the user to transfer payment and device signature information to a second device of the user.
Ca, Inc.

Online mobile payment system and method using authentication codes

A mobile payment method includes the steps of making an online purchase at an online store with payment information being received by a web browsing capable device. The web browsing capable device connects to a server and a payment request including a vid is sent to the server.

Member information management system and member information management program

A member information management system stores data of second stage groups h and i and second stage groups j and k and data of members belonging to these second stage groups in a data protection area corresponding to each of a plurality of first stage groups a and b. The data of the second stage groups h, i, j, and k includes presentation data of a registration form of the second stage group and contents data for the second stage group.
Infoscience Corporation

Wireless memory device authentication

A system for wireless memory device authentication is provided, wherein a communications device receives a certified public key from a wireless memory device. The communications device validates the public key and send a challenge to the wireless memory device.
Nokia Technologies Oy

Incorporating risk-based decision in standard authentication and authorization systems

Embodiments of the disclosure provide a method for enhancing standard authentication systems to include risk-based decisions. Risk-based decisions can be selectively implemented within existing authentication systems to strategically modify and supplement security if an unacceptable risk is detected.
Aetna Inc.

Information processing system, information processing device, control method, and storage medium

To provide an information processing system, an information processing device, a control method, and a storage medium capable of maintaining or improving reliability of an emotion value. [solution] an information processing system including: a communication unit configured to acquire information related to an interaction between objects from a sensing device that detects the interaction between the objects; an emotion information database constructed by accumulating an evaluation value used when an emotion value of each object generated on the basis of the information related to the interaction between the objects is calculated; a certification unit configured to certify the sensing device that detects the interaction between the objects and issue certification information to the sensing device; and an authentication unit configured to authenticate the information related to the interaction transmitted from the sensing device on the basis of the certification information issued to the sensing device..
Sony Corporation

Computing device chording authentication and control

Chording techniques are described that may be utilized in a variety of ways to provide inputs to a computing device. The computing device, for instance, may include sensors disposed on a housing of the computing device such that the sensors are configured to detect fingers of a user when grasping the device.
Google Technology Holdings Llc

Authentication based on configuration of interlocking bricks

A system of interlocking smart bricks includes a shell having at least one raised protrusion and at least one hole. A plurality of sensors is disposed within the shell.
International Business Machines Corporation

System, method, and device for delivering communications and storing and delivering data

A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is verified, optionally through a downloaded authentication driver.

Secure prescription of a medical software device

Disclosed is a computer system for activation of a software application capable of executing software functions on a communication terminal in order to assist a patient in a therapeutic treatment determined according to a computerized medical prescription including personal prescription data containing information associated with the treatment prescribed to the patient, the system including:—a database storing the application and the computerized medical prescription; an authentication unit for authenticating the patient to the system using the communication terminal; an activation unit for remotely activating the application and the prescription data on the communication terminal in order to execute the software functions.. .
Voluntis

Mapping account information to server authentication

An authorization prompt issued from a server is detected, and previously-entered account information, is accessed on a user device. A selectable display element corresponding to each set of entered account information is displayed.
Microsoft Technology Licensing, Llc

Data storage device and data processing system having the same

A data storage device and a data processing system having the same are disclosed. The data storage device includes a nonvolatile memory and a controller, coupled to the nonvolatile memory, configured to receive first and second commands generated by a host and control an operation of the nonvolatile memory in response to the first command.
Samsung Electronics Co., Ltd.

Image processing apparatus, non-transitory computer readable medium, and image processing method

An image processing apparatus includes an authenticating unit that performs authentication as to whether a user is an authenticated user who is permitted to use multiple functions, a determining unit that, by use of history information that records an operation made by the authenticated user authenticated by the authenticating unit, determines an expected function that is expected to be executed by the authenticated user among the multiple functions, and a setting attribute for each of setting items that specify how the expected function is to be executed, a setting unit that sets the setting attribute for the expected function determined by the determining unit, and a display that displays, on a display device, an execution screen that shows the setting attribute set by the setting unit and receives an instruction instructing that the expected function be executed.. .
Fuji Xerox Co., Ltd.

Information apparatus and software applications supporting printing of digital content over a network to a registered printer

Software applications and information apparatus supporting output of digital content over a network (e.g., internet) to an output device (e.g., printer) are herein disclosed and enabled. To output digital content, an application for accessing a service provided over the network is installed, the information apparatus is connected to the local area network of the output device, the output device in the local area network (e.g., ieee 802.11) is discovered, output device information is received from the discovered output device, and the output device information is transmitted to the service for registering the output device.
Flexiworld Technologies, Inc.

Electronic component classification

A system and method of electronic component authentication or component classification can reduce the vulnerability of systems (e.g., satellites, weapons, critical infrastructure, aerospace, automotive, medical systems) to counterfeits. Intrinsic deterministically random property data can be obtained from a set of authentic electronic components, processed, and clustered to create a classifier that can distinguish whether an unknown electronic component is authentic or counterfeit..
Battelle Memorial Institute

Method and system for item authentication and customization

A method of illumating an item is disclosed. The method includes applying adhesive to the item, interspersing a taggant in the adhesive, illuminating the item with an excitation signal, sensing luminescence emitted by the taggant in response to illumination by the excitation signal, and determining the authenticity of the item based on the sensed emitted luminescence.
United States Postal Service,

System for advanced protection of consumable or detachable elements

A method of authenticating a consumable or detachable element of a continuous inkjet printer, (cij), comprising: the controller of the printer generating and dispatching a 1st item of random information to an authentication circuit of the element; encrypting the 1st item of random information by the authentication circuit using a 1st encryption algorithm and a 1st secret key to form a 1st item of encrypted random information; dispatching the 1st item of encrypted random information to the controller; encrypting the 1st item of random information by the controller using a 2nd encryption algorithm and a 2nd secret key to form a 2nd item of encrypted random information; and comparing the 1st item of encrypted random information with the 2nd encrypted item of random information. If the consumable element is authenticated, a shared key part of a 3rd key is dispatched by the consumable or detachable element to the cij..
Dover Europe Sàrl

Real time authentication based on blood flow parameters

Blood flow of a user can be measured using a sensor. Sensor data based on the measuring of the blood flow can be generated.
Samsung Electronics Co., Ltd.

Enhanced secure provisioning for hotspots

A ticket-based shared secret authentication is provided. A client device receives a ticket, and performs an authentication with an access point using the ticket.
Avago Technologies General Ip (singapore) Pte. Ltd

Authentication with privacy identity

Methods, systems, and devices for wireless communication are described. A user equipment (ue) may perform authentication procedures using an alternative identity (e.g., a privacy mobile subscriber identity (pmsi)) instead of an international mobile subscriber identity (imsi) to protect the privacy of the user.
Qualcomm Incorporated

Electronic device with gesture actuation of companion devices, and corresponding systems and methods

An electronic device includes a biometric sensor, such as a fingerprint sensor, to identify biometric input. One or more processors are then operable to identify at least one paired device and at least one companion device operating within a wireless communication radius.
Motorola Mobility Llc

Electronic device with biometric authentication control of companion devices, and corresponding systems and methods

An electronic device includes a biometric sensor, such as a fingerprint sensor, that identifies biometric input received at the biometric sensor. One or more processors operable with the biometric sensor identify at least one authentication agent operating on at least one companion device operating within a wireless communication radius of the electronic device.
Motorola Mobility Llc

System for authenticating a user and enabling real-time approval notifications

Embodiments authenticate a user and an associate of an entity and enable real-time approval notifications by requesting one or more authentication credentials from the associate; authenticating the associate based on successful validation of the one or more authentication credentials received from the associate; populating an application for the user at least in part by receiving input from the associate; establishing a secure wireless communication channel with a user device; and wirelessly transmitting, from the system to the user device and over the secure wireless communication channel the populated application; instructions to cause the user device to authenticate the user based on successful validation of one or more user authentication credentials; and instructions to cause the user device, in response to authenticating the user, present the populated application to the user for verification of its accuracy.. .
Bank Of America Corporation

Authentication and key agreement with perfect forward secrecy

Systems and methods for providing authentication key agreement (aka) with perfect forward secrecy (pfs) are disclosed. In one embodiment, a network according to the disclosure may receive an attach request from a ue, provide an authentication request including a network support indicator to a network resource, receive an authentication token from the network resource, such that the authentication token includes an indication that a network supports pfs, provide the authentication token to the ue, receive an authentication response including a ue public key value, obtain a network public key value and a network private key value, determine a shared key value based on the network private key value and the ue public key value, bind the shared key value with a session key value to create a bound shared key value, and use the bound shared key value to protect subsequent network traffic..
Qualcomm Incorporated

Communication system, image processing apparatus, server, and computer-readable medium

A communication system including an image processing apparatus configured to, in response to receiving acquisition instruction information from a server via indirect communication, receive authentication information from an information processing terminal device via near-field wireless communication, transmit the received authentication information to the server via the indirect communication, and in response to receiving communication instruction information, which indicates a method for data communication with a service providing apparatus, from the server via the indirect communication, perform data communication with the service providing apparatus in accordance with the received communication instruction information.. .
Brother Kogyo Kabushiki Kaisha

Information processing apparatus, controlling information processing apparatus, and storage medium

An image forming apparatus controls the use of a remote user interface (rui) by requesting authentication with an rui access password from a client device in a case where the rui access password is set. In a case of a department id management setting, the security setting is different from the rui access password setting.
Canon Kabushiki Kaisha

Authentication method and system by garbled circuit

The invention proposes a method and an associated system for authenticating a user, by means of the redundancy present between several images of a video, the method using garbled circuits, named variant garbled circuits, associated with the alternative bits between the images of the video and a garbled circuit named invariant garbled circuit, associated with the invariant bits between the images of the video, so that the invariant garbled circuit only needs to be evaluated a single time.. .
Safran Identity & Security

Authentication device, authentication system, authentication method, and storage medium

A portable authentication device is provided. The portable authentication device includes: a sensor that detects a biometric information of a subject; a communication interface that communicates with another authentication device; and a hardware processor.
Konica Minolta, Inc.

Portable terminal, method, and storage medium having program stored thereon

A portable terminal includes a hardware processor, a storage, a communication interface that communicates with an external device, and a sensor that detects a subject's biometric information. The external device includes an authentication device that executes an authentication process using the biometric information to authenticate the subject.
Konica Minolta, Inc.

Authentication for blocking shoulder surfing attacks

An approach to authenticating a user for resource access. The approach displays independently bi-directionally rotating concentric layers wherein each of the concentric layers are divided into segments and each segment contains a symbol.
International Business Machines Corporation

Method for customizing controlled smartphone

A method for customizing a controlled smartphone involves downloading a source code and relevant development tool for android 5.1, compiling a rom package to produce a version of rom having the master app, flashing the smartphone with the rom, creating states of “deactivated” and “activated” for the smartphone's various functions, and whitelisting the master app for app installation authentication, incoming/outgoing number authentication, and short text message authentication, thereby achieving control over adolescents' web surfing times and hours, visited websites, used application programs and received messages.. .
Green Net World (fujian) Network Technology Co., Ltd.

User privacy protected location-based authentication on mobile devices

Techniques for implementing location-based authentication in a computing device are provided. An example method according to these techniques includes binding location authentication information to an authentication key for a relying party (rp) application, receiving a request from the rp application for a signed authentication response, obtaining current location information for the computing device, authenticating the current location information for the computing device based on the location authentication information bound to the authentication key, and providing, to the rp application by the computing device, the signed authentication response in response to the authenticating the current location information for the computing device, wherein the signed authentication response is signed using the authentication key bound to the location authentication information..
Qualcomm Incorporated

Authenticating a user and registering a wearable device

An authentication request including at least one of a user identifier and a wearable device identifier of a user is received at a server from a terminal. The server stores a relationship between the user identifier, the wearable device identifier, and a server authentication key.
Alibaba Group Holding Limited

Open registry for internet of things including sealed materials

An identity system for the internet of things (iot) that enables users and machines to identify, authenticate and interact with products and collectibles without relying on a third-party-controlled authentication service. The system includes wireless tamperproof tags coupled to products and an open registry database where a chain of ownership of the items is able to be stored.
Chronicled, Inc.

System and wireless intercommunication and power delivery

A wireless signal may supply a wireless power signal to a device to power the device for an authentication. If the device is authenticated, the wireless signal may be adjusted to provide power to the device.
Comcast Cable Communications, Llc

Improvements relating to the authentication of physical entities

An authentication device (20) comprises one or more flakes of a substantially two-dimensional material (14). The one or more flakes of the substantially two-dimensional material (14) have an operative area configured to emit, by non-resonant photoluminescence, electromagnetic radiation with a property that varies with position in the operative area..
Quantum Base Limited

Simultaneous authentication of a security article and identification of the security article user

Authenticating a security article comprises capturing biographic information from the security article, detecting a physical property of a security feature on and/or in the security article, processing the captured biographic information and the detected physical property of the security feature to determine whether the security article is genuine, and printing a mark depending on the determination.. .
Sicpa Holding Sa

Simultaneous authentication of a security article and identification of the security article user

Authenticating a security article comprises capturing biographic information from the security article, detecting a physical property of a security feature on and/or in the security article, processing the captured biographic information and the detected physical property of the security feature to determine whether the security article is genuine, and outputting a signal indicative of the determination.. .
Sicpa Holding Sa

Simultaneous authentication of a security article and identification of the security article user

Operating a security checkpoint for authenticating a security article, comprising capturing biographic information from the security article; detecting a physical property of a security feature on and/or in the security article; processing the captured biographic information and the detected physical property on and/or in the security article to determine whether the security article is genuine; and operating a gate, moveable between a closed position, to be moved from the closed to the open position depending on the determination.. .
Sicpa Holding Sa

System and authentication and making payment when carrying out on-demand manufacturing

There is provided a system and method for authentication and making payment when carrying out on-demand manufacturing. The system and method ensures that payment can be conveniently made by users and subsequently, appropriate payments are made to parties for their role in the on-demand manufacturing..
Mastercard Asia/pacific Pte Ltd

System and methods for generating, recording, managing and redeeming gift certificates that securely retain their unused balance over multiple partial uses

The present invention comprises a system and associated methods for protecting the unused balance of partially redeemed gift certificates from unauthorized, fraudulent use. The present invention employs a two-part gift certificate identification comprising a static unique id for gift certificate tracking, managing, reporting and reissuing and a separate, random authentication code that changes each time the gift certificate is reissued.
Tickerware Llc

Authentication to authorization bridge using enriched messages

A system of electronic communication is disclosed. The system may: create a pre-authentication transaction number (pre-atn) by combining a number with a special encode value (sev), wherein the sev is a single digit integer value; encrypt the pre-atn using a format preserving encryption (fpe) to generate an encrypted authentication transaction number (atn); and send the encrypted atn to an access control server (acs) to use the encrypted atn to generate a cardholder authentication verification value (cavv) or an accountholder authentication value (aav)..
Cardinalcommerce Corporation

Portable electronic payment security devices, systems and methods

A electronic payment security system having at least two portable electronic devices in predetermined 2-way electronic communication or connectivity with each other with an electronic payment method authentication technology integrated into at least one of the two portable electronic devices. The at least one portable electronic device having the integrated payment method authentication technology transmitting a response request to any portable electronic devices in predetermined 2-way electronic communication with the at least one portable electronic device when the integrated payment method is activated on the at least one portable electronic device at a merchant payment terminal.

System for controlling a service station related to a vehicle

A system for controlling a service station related to a vehicle includes a user interface element (10) with an app installed in a user apparatus (20), an identification element (30), a control element (40) connected to the service station; and a back-end element (50). The identification element (30) is configured to retrieve identifying information and to send it to the back-end element (50), the back-end element (50) is configured to enable via the control element (40) the use of the service station based on the identifying information, and the user interface element (10) after receiving an authentication of an access right from the back-end element (50) is configured to enable the user to start a service of the service station..
Superoperator Oy

Eye gaze authentication

According to an example of the present disclosure, an image collection is loaded. At least one image property of the image collection is randomized, and the image collection is displayed.
Hewlett-packard Development Company, L.p.

Systems and methods for performing fingerprint based user authentication using imagery captured using mobile devices

Technologies are presented herein in support of a system and method for performing fingerprint recognition. Embodiments of the present invention concern a system and method for capturing a user's biometric features and generating an identifier characterizing the user's biometric features using a mobile device such as a smartphone.
Veridium Ip Limited

Method and processing biometric information in electronic device

A method and apparatus for processing biometric information in an electronic device including a processor that operates at a normal mode or at a secure mode, the method comprising, detecting a biometric input event from a biometric sensor module at normal mode, creating biometric data based on sensed data from the biometric sensor module at the secure mode, performing biometric registration or biometric authentication based on the created biometric data at the secure mode, and providing result information of biometric registration or biometric authentication at the normal mode.. .
Samsung Electronics Co., Ltd.

Validation and authentication of digital documents issued by an architect

A method and system for authenticating and validating electronic architectural documents. A document approved by a licensed architect has the architects digital seal and signature associated with or inserted into the document file.
Hks, Inc.

Method and protecting application

The present invention relates to a method for protecting content of an electronic device, comprising the steps of: enabling a first security module to transmit a data encryption request to a second security module when data requiring security is generated according to the execution of a security application by the first security module in a security storage region of a memory; enabling the second security module to generate an encryption key by using the authentication information included in the data encryption request and to encrypt the data included in the data encryption request by using the encryption key; enabling the second security module to transfer the encrypted data to the first security module; and enabling the first security module to store the encrypted data in the security application.. .
Seoul National University R&db Foundation

Method and authentication of a user to a server using relative movement

Method and apparatus for authentication of a user to a server that involves the user performing a requested act and that further involves relative movement between the user and a camera wherein fiducial marks are captured.. .
Brivas Llc

Method and system for automatically selecting an authentication domain

An image processing apparatus and method is provided. The image processing apparatus has one or more processors and a memory that stores instructions for execution by the one or more processors.
Canon U.s.a., Inc.

Deep neural network for iris identification

Systems and methods for iris authentication are disclosed. In one aspect, a deep neural network (dnn) with a triplet network architecture can be trained to learn an embedding (e.g., another dnn) that maps from the higher dimensional eye image space to a lower dimensional embedding space.
Magic Leap, Inc.

Non-intrusive background synchronization when authentication is required

A non-modal notification user interface element is displayed persistently but unobtrusively such that a user may easily determine that authentication credentials are required by a background synchronization process. The non-modal notification is configured such that it may be ignored by the user such that their workflow is not interrupted.
Microsoft Technology Licensing, Llc

Method and computer program product for providing authentication to control access to a computer system using interaction with an output

A system and method for authentication to control access to a computer system includes receiving a first input from a measuring device formed as part of a mobile computing and/or communication device, and comparing the first input to a previously measured and recorded input. Access to the computer system is permitted if the first input is equivalent to the previously measured and recorded input.
Sensipass Ltd.

Method and computer program product for providing authentication to control access to a computer system using a previously measured and recorded input

A system and method for authentication to control access to a computer system includes receiving a first input from a measuring device formed as part of a mobile computing and/or communication device, and comparing the first input to a previously measured and recorded input. Access to the computer system is permitted if the first input is equivalent to the previously measured and recorded input.
Sensipass Ltd.

Independent vehicle security method and apparatus

A vehicle authorization system with a transmitter/receiver capable of activating vehicle functions operably connected to the vehicle, a wireless transmitter/receiver for an authorized vehicle operator that receives communications from the vehicle transmitter/receiver, a sensor in the vehicle security transmitter/receiver that detects at least one vehicle access parameter via an electronic signal, wherein the vehicle transmitter/receiver communicates with the wireless transmitter/receiver responsive to the sensor detecting a second signal associated with the access parameter to affirm a verification signal from the wireless transmitter/receiver that upon verification permits vehicle access by the operator or upon improper or no response activates a vehicle function to prevent access or vehicle operation. The invention consists of a vehicle security device that can both monitor and control vehicle systems, and a user's smart device.
Voyomotive, Llc

Authentication system

A system for creating a combined electronic identification that obtains user information (202) about a user of a hardware device (100), authenticates the user from the user information (202), obtains a hardware profile (208) of the device (100), the hardware profile 208 comprising user generated data stored on the device (100) and links the user information (202) and the hardware profile (208) as a combined electronic identification. The hardware device (100) can be comprised of a main processor, memory, a touchscreen interface, and a wireless communication module, such as a mobile phone, computer, or tablet computer..
Klemm+sohn Gmbh & Co. Kg

Apparatus and enhancing personal information data security

The present disclosure relates to a communication technique for converging a 5g communication system for supporting a higher data rate beyond a 4g system with an iot technology, and a system therefor. The present disclosure can be applied to intelligent services on the basis of a 5g communication technology and an iot-related technology (for example, smart home, smart building, smart city, smart car or connected car, healthcare, digital education, retail, security and safety-related service, and the like).
Samsung Electronics Co., Ltd.

Configuration for multi-factor event authorization

An authorization device receives a message from a content server through a network based upon a first factor of authorization being completed by a playback device requesting playback of content associated with a user account. The authorization device may be a mobile device that is associated with the user.
Disney Enterprises, Inc.

Mobile device to provide enhanced security based upon contextual sensor inputs

Disclosed is a mobile device to provide enhanced security based upon contextual sensor inputs. The mobile device may include: a biometric sensor; a contextual sensor; and a processor.
Qualcomm Incorporated

Internet access authentication method and client, and computer storage medium

The present disclosure discloses an internet access authentication method and client, and a computer storage medium. The internet access authentication method includes establishing a network connection to a subnetwork; displaying, in a browser, a login page specified by a wireless access point, a network application icon used for internet access being displayed on the login page; receiving an operation on the network application icon, and authenticating first data by sending the first data to a network server, the first data comprising: a gateway address, a wireless access point address, and a device address; and making a network connection when authentication on the first data succeeds..
Tencent Technology (shenzhen) Company Limited

Communication system, connection control apparatus, mobile terminal, base station control method, service request method, and program

A communication system, in which a mobile terminal uses a data path that was generated with an isp network by a base station in a home network to access a nw via the isp network, includes an authentication means and connection control means in the isp network. The base station accepts an access request from the mobile terminal and transmits information relating to the base station and the mobile terminal to the connection control means.
Nec Corporation

Method of providing mobile communication provider information and device for performing the same

A method for providing mobile communication provider information and a device for performing the same are disclosed. A terminal having an euicc receives data, in which mobile communication provider information is capsulized and included, and stores the received data in the euicc.
Kt Corporation

Voice control and telecommunications service integration

This disclosure describes techniques that facilitate selectively interacting with a computing resource based on receipt of an incoming voice command. Particularly, a voice control integration system may parse content of an incoming voice command to authenticate an identity of the client, and further determine an intended meaning of the incoming voice command.
T-mobile, Usa, Inc.

Access control method and access control apparatus

Embodiments of the present application disclose access control method and an access control apparatus. A method disclosed herein comprises: sending information associated with authentication of at least one access point device; and controlling at least one second device to access a target access point device through at least one first device; wherein the at least one first device is a device that receives the information associated with authentication of at least one access point device.
Beijing Zhigu Rui Tuo Tech Co., Ltd.

Methods and systems for transferring sim card information

The present invention discloses methods and systems for transferring sim card information from a first device to a server. A first sim card is housed in the first device or in a first modem connected to the first device.
Pismo Labs Technology Limited

Method and system for displaying interactive questions during streaming of real-time and adaptively assembled video

The present disclosure provides a system and method for enabling display of interactive questions during streaming of a real time, dynamic, adaptive and non-sequentially assembled video. The method includes reception of a set of preference data associated with a user and a set of user authentication data.

Method and system for recommending dynamic, adaptive and non-sequentially assembled videos

The present disclosure provides a system and method for recommending dynamic, adaptive and non-sequentially assembled videos. The method includes reception of a set of preference data and a set of user authentication data.

Method and system for real time, dynamic, adaptive and non-sequential stitching of clips of videos

The present disclosure provides a method and system for real time, dynamic, adaptive and non-sequential assembling of one or more mapped fragments of one or more tagged videos. The method includes a step of receiving a set of preference data from pre-defined selection criteria and set of user authentication data.

Method and system for serving advertisements during streaming of dynamic, adaptive and non-sequentially assembled video

The present disclosure provides a system and method for serving one or more advertisements during streaming of dynamic, adaptive and non-sequentially assembled video. The method includes reception of a set of preference data and a set of user authentication data.

Health device, gateway device and securing protocol using the same

Disclosed herein are a health device, a gateway device, and a method for securing a protocol using the health device and the gateway device. The method includes performing, by the health device and the gateway device, authentication and key exchange based on security session information; sending, by any one of the health device and the gateway device, an application message protected based on the security session information; and receiving, by a remaining one of the health device and the gateway device, the protected application message..
Electronics And Telecommunications Research Institute

Remote control authority and authentication

The invention relates to systems and methods to enable a mobile device to be used as a remote control, in order to control one or more remotely controllable objects. In possible embodiments of the invention, proximity-based (or other) remote controls include control authorization to enable the transfer or sharing of control between different remote controls being implemented on different mobile devices, in order to permit different users to transfer or share control of a same remotely controllable object, for example.

Method and system for navigation between segments of real time, adaptive and non-sequentially assembled video

The present disclosure provides a system and method for enabling navigation to one or more discrete segments of a real time dynamic and adaptive non-linear, non-sequentially assembled video. The method includes reception of a set of preference data associated with a user from a pre-defined selection criteria and a set of user authentication data.

Continuous device/uicc based authentication for lte systems

An authentication assurance level associated with an entity, for instance a user equipment, may be computed periodically or in response to an event. The authentication assurance level is compared to an authentication threshold.
Interdigital Patent Holdings, Inc.

Cross platform social networking authentication system

Disclosed in one example is a method of authenticating with multiple social network services. The method may include storing first authentication information associated with a user for a first social networking service using at least one computer processor, receiving second authentication information associated with the user for a second social networking service from a social networking application, and sending to the social networking application the first authentication information.
Zynga Inc.

Method and system for dynamic password based user authentication and password management

The method and system for providing user authentication and password management using user specified dynamic password. A dynamic password is generated based on user defined implicit password construction rules that are only known to the user.

System and generating and using bilaterally generated variable instant passwords

Implementations of a system and method of generating and using bilaterally generated variable instant passwords are disclosed. The system is used to secure electronic transactions (e.g., an auction in which one or more bidders are unknown to the auctioneer).

System and generating and using bilaterally generated variable instant passwords

Implementations of a system and method of generating and using bilaterally generated variable instant passwords are disclosed. In some implementations, a computer implemented method of authenticated dialogue initiation between a user and another party is provided.

Bypassing certificate pinning

A client application performs certificate pinning as a means of authenticating the identity of a server. A proxy is interposed in the communications path of the client and the hosting server and provides a proxy security certificate to the client.
International Business Machines Corporation

Bypassing certificate pinning

A client application performs certificate pinning as a means of authenticating the identity of a server. A proxy is interposed in the communications path of the client and the hosting server and provides a proxy security certificate to the client.
International Business Machines Corporation

Methods, apparatuses & computer program products for utilizing visual authentication tokens as cross-platform credentials

An apparatus is provided for facilitating cross-platform authentication. The apparatus may include at least one memory and at least one processor configured to detect that a visual token includes data indicating one or more authentication credentials for accessing a communication device in response to scanning the visual token.
United Parcel Service Of America, Inc.

Message processing device and message processing method

A message processing device includes a memory and a processor coupled to the memory. The processor is configured to receive a transmission instruction from a first information processing device.
Fujitsu Limited

Method for authenticating client system, client device, and authentication server

Provided are a client system authentication method, a client device, and an authentication server. The client system authentication method includes acquiring a shared key to be shared between a client system and an authentication server in cooperation with the authentication server, generating a virtual address of the client system using identification information of the client system and the shared key, transmitting registration request information including the virtual address to the authentication server, and receiving an authentication key for the client system from the authentication server..
Samsung Sds Co., Ltd.

Cross-domain data-gate for secure transmission of data over publicly shared datalinks

A device for secure transmission of vehicle data over vehicle datalinks that may be shared with passenger devices and are connected to a publicly shared network is provided. The device comprises a processor embedded within a portion of an ethernet cable for a vehicle.
Honeywell International Inc.

Email sender and reply-to authentication to prevent interception of email replies

An electronic messaging system that reviews content of inbound messages, verifies elements of header fields, and initiates an action if name (n) and address (a) of from (f) and reply-to (r) elements of header fields match or do not match, those elements being nf=nr and af≠ar, to protect recipients against inadvertent routing of their reply email to an imposter of the named from sender, thereby mitigating risk of recipients falling prey to what is referred to herein as “reply-to whaling” attacks, within the email security category of anti-phishing.. .

Method for authenticating devices in a medical network

A computer implemented method and system are provided for verifying authenticity of a medical component endpoint. The method is under control of one or more computer systems configured with specific executable instructions.
General Electric Company

Authentication mechanism for 5g technologies

Embodiments of this disclosure provide techniques for securely communicating an imsi over the air from a ue to an sean, as well as for securely validating an unencrypted imsi that the sean receives from the home network, during authentication protocols. In particular, the ue may either encrypt the imsi assigned to the ue using an imsi encryption key (kimsienc) or compute a hash of the imsi assigned to the ue using an imsi integrity key (kimsiint), and then send the encrypted imsi or the hash of the imsi to the serving network.
Futurewei Technologies, Inc.

Apparatus, computer program, and securely broadcasting messages

An apparatus, computer program, and method are provided for securely broadcasting a message to a plurality of recipient devices. In operation, a message is identified, and the message is encrypted utilizing a first key.
Dark Matter L.l.c.

Identity authentication method, apparatus, and storage medium

Embodiments of the present invention disclose an identity authentication method. The method includes: receiving a request for identity authentication on a target user; sending identity-authentication information on the target user to one or more users in social-network-association with the target user; receiving feedback information from the users in social-network-association with the target user based on the identity-authentication information; and obtaining a result of identity authentication on the target user according to the feedback information from the users in social-network-association with the target user..
Tencent Technology (shenzhen) Company Limited

Mac tag list generating apparatus, mac tag list verifying apparatus, mac tag list generating method, mac tag list verifying method and program recording medium

Disclosed is a mac tag list generating apparatus capable of efficiently performing message authentication through which information pertaining to a falsified position as well as existence of falsification can be obtained. This mac tag list generating apparatus is provided with: a group test matrix generating means for generating a group test matrix w, which is a parameter of a combined group test, on the basis of a plurality of items obtained by dividing an obtained message m; and a mac tag list generating means that, while sharing results obtained by applying a pseudo random function to the items forming each row of the generated group test matrix w, sums the results, and then applies the summed results to pseudo random permutation to generate a mac tag list t, which is a mac tag list pertaining to the message m..
Nec Corporation

Instant lottery scratch ticket on-demand printing

The present invention describes a lottery ticket system providing an instant scratch lottery ticket to a consumer on-demand. A customer vending device of the lottery ticket system may be used to receive consumer input.
Bally Gaming, Inc.

Vehicle identification or authentication

A vehicle includes an on board microprocessor that is programmed to receive and transmit multiple authentication factors or a key derived therefrom to a remote server to authenticate the vehicle or a vehicle occupant to a remote server. The multiple authentication factors comprise a plurality of an electronic address of a portable communication device of the occupant sensed by an on board sensor, a wireless remote signal description sensed by an on board sensor, a vehicle-related identifier, a vehicle parameter sensed by the on board processor, an environmental parameter sensed by the on board processor, and a passcode received by the microprocessor from the remote server..
Nextev Usa, Inc.

Method and system for managing door access using beacon signal

A method and system allow management of access to a door using a beacon signal. A user access authority determination unit controls access of a user to a target door based beacon data from beacons installed near a door.
Suprema Inc.

Secure and traceable manufactured parts

A method for the verification and authentication of additive manufactured product, comprising the steps of receiving, from a customer, at least one customer requirement for a product, deriving at least one manufacturing requirement and generating a product geometry file for the product, recording, by a first computing device, to a distributed transaction register, a first transaction reflecting certification of the product geometry file, obtaining a first output reflecting the first transaction, printing the product with a 3d printer, recording, by a second computing device, to the distributed transaction register, a second transaction reflecting the printing of the product and the first output, obtaining a second output reflecting the second transaction, embedding within the product a unique code reflecting the second output, whereby the product geometry file and the printing of said product may be verified with the unique code such that the product may be authenticated.. .

Method for signing up a user to a service for controlling at least one vehicle functionality by means of a user terminal

A method for signing up a user to a service for controlling at least one functionality in a vehicle (10) by means of a user terminal (20) comprises the following steps: —communicating a user identifier and an identifier associated with the vehicle (10) to a server (50); —having the server (50) authenticate an electronics unit (11) of the vehicle (10); —in the event of successful authentication, registering the user identifier and the identifier associated with the vehicle (10) in association with one another in the server (50).. .
Valeo Comfort And Driving Assistance

Biometric, behavioral-metric, knowledge-metric, and electronic-metric directed authentication and transaction method and system

A system to authenticate an entity and/or select details relative to an action or a financial account using biometric, behavior-metric, electronic-metric and/or knowledge-metric inputs. These inputs may comprise gestures, facial expressions, body movements, voice prints, sound excerpts, etc.
Nxt-id, Inc.

Reducing authentication requirements for data transmissions

A method of reducing authentication requirements for data transmissions includes receiving a request for a data transmission between a sender and a receiver. The request includes an amount of data associated with the data transmission.
Alibaba Group Holding Limited

Methods and systems for communicating estimated time of arrival to a third party

A vehicle, based on user preferences and while the vehicle is in motion: in response to identification of a first event (e.g., a third party resident being in a vehicle location and/or on the route of the vehicle) and based on the user preferences, determines that the user desires to perform a transaction with the third party, automatically sends a first communication to the third party for the user (the first communication being part of a secure session and enabling authentication of the user by the third party), at a second later time and while the vehicle is in motion, and in response to identification of a second event, automatically sends a different second communication to the third party. The second communication is part of the secure session and enables the third party to complete the transaction with the user..
Nextev Usa, Inc.

Pre-authentication of mobile payments

An embodiment of the invention may include a method, computer program product and system for transaction authentication. The embodiment may include receiving, by a mobile device from a network server via a wireless access point using a medium-range wireless communication protocol, an indication corresponding to a transaction to execute.
International Business Machines Corporation

Secure anonymous transaction apparatuses, methods and systems

The secure anonymous transaction apparatuses, methods and systems (“sat”) transform hardware-verified user authentication requests via sat components into secure transaction notifications. In one implementation, the sat obtains a secure anonymous transaction user authentication request.

Techniques for fingerprint detection and user authentication

We present several unique techniques for using touch sensor arrays to detect fingerprints and authenticate a user.. .
Ami Research & Development, Llc

System and administering physical security access to components of a process control system

A system for restricting physical access to at least one component process control system component has a locking device that is integrated with process control system security administration data. The locking device accesses the process control system security data when authenticating a user.
Abb Schweiz Ag

Protecting personal information upon sharing a personal computing device

In particular embodiments, a computing device may receive authentication information provided by a temporary user and retrieve personal information associated with the temporary user from a server using the authentication information. The device may present a personalized user interface on a screen of the computing device for the temporary user, the personalized user interface being generated based on the personal information.
Facebook, Inc.

Security protecting a vehicle electronic system

Security system for protecting a vehicle electronic system by selectively intervening in the communications path in order to prevent the arrival of malicious messages at ecus, in particular at the safety critical ecus. The security system includes a filter which prevents illegal messages sent by any system or device communicating over a vehicle communications bus from reaching their destination.
Arilou Information Security Technologies Ltd.

Method and system for providing a brain computer interface

A method for providing a brain computer interface that includes detecting a neural signal of a user in response to a calibration session having a time-locked component and a spontaneous component; generating a user-specific calibration model based on the neural signal; prompting the user to undergo a verification session, the verification session having a time-locked component and a spontaneous component; detecting a neural signal contemporaneously with delivery of the verification session; generating an output of the user-specific calibration model from the neural signal; based upon a comparison operation between processed outputs, determining an authentication status of the user; and performing an authenticated action.. .
Arctop, Inc.

Iris authentication using display information

An electronic device for performing iris authentication, according to various examples of the present invention, can comprise: an image sensor for outputting an image obtained by photographing an eye part; a display for displaying an iris authentication screen image; and a control unit detecting at least a partial region from the captured eye part image so as to perform iris authentication by adjusting display characteristics of the display on the basis of a result obtained by comparing the size of the detected region with the size of a region required for the iris authentication, and various examples are possible.. .
Samsung Electronics Co., Ltd.

Pointing device biometrics continuous user authentication

There is provided, in accordance with some embodiments, a method comprising using one or more hardware processors for receiving a behavioral biometric model that characterizes a human user according to pointing device data of the human user, where the pointing device data comprises screen coordinate and time stamp pairs. The method comprises an action of monitoring an input data stream from a pointing device in real time, wherein the input data stream covers two or more spatial regions of a display screen, and an action of segregating the input data stream into one or more subset streams that is restricted to one of the plurality of spatial regions.
International Business Machines Corporation

User authetication implementing the same

There is proposed a user authentication method that uses a time-based password (tp) having a relatively long update cycle instead of a totp having a conventional short update cycle (e.g., 60 seconds). The present invention is a user authentication method executed by an authentication system that performs authentication of a user who performs access from an information communication terminal device in order to use a usage target system by using a reference terminal device that includes a security token capable of generating a tp.
Passlogy Co., Ltd.

An integrated mobile personal electronic device and a system to securely store, measure and manage users health data

A mobile device, methods and systems provide the invention mobile personal health records (phr) management platform solution. The platform enables secure phr data management, measuring user's medical parameters, managing phr secured depository containing user's health data on the user's invention combined phone & add-on sleeve device, while blocking none legitimate users access to the invention devices secured storage content.
Os - New Horizons Personal Computing Solutions Ltd.

Apparatus, vehicle access and function control utilizing a portable device

A system for providing dynamic access to a vehicle via a plurality of devices. A device and/or a server of an authentication network stored fob data relating to one or more key fobs linked to the vehicle, and device data that includes data relating to one or more devices linked to the key fob that are authorized to access the vehicle.
Audi Ag

Water dispenser system and method

Atmospheric water generators, systems and methods are presented involve user authentication, recording and tracking of water volumes dispensed by respective users over periods of various lengths, controlling component noise level and timing, and cleaning, heating and cooling the collected water more efficiently. The generators may be placed in network communication with other such generators to exchange water availability information therewith, or may communicate with a central server element by way of lan, internet, cell tower, peer-to-peer mesh or satellite.
Skywell, Llc

Medicament delivery device

A medicament delivery device is presented having a housing that is arranged to accommodate a medicament container; a drive unit operably arranged to act on the medicament container upon activation; an activation mechanism operably arranged to be operated by a user; an activation preventing mechanism operably arranged to prevent said activation mechanism to be activated; an identification module arranged to be operated by a user, which identification module is designed as an attachable unit to the medicament delivery device; mechanical keying elements arranged on said device and on said identification module designed to interact with each other when attaching said identification module; first electrical keying elements comprised in said identification module, wherein said electrical keying elements are capable of obtaining identification information, such that the identification information obtained is compared to stored data and authenticated by the identification module, and wherein the authentication causes a deactivation of the activation preventing mechanism to allow operation of the activation mechanism.. .
Carebay Europe Ltd

Method and device for fingerprint authentication

A fingerprint authentication method includes a first step of acquiring partial fingerprint measurement data for a part of a fingerprint, and a second step of calculating a matching rate by comparing the partial fingerprint measurement data with reference comparison data selected among a plurality of partial fingerprint registration data, each partial fingerprint registration data corresponding to a part of a fingerprint. The method further includes a third step of determining whether the matching rate is equal to or greater than an authentication threshold and a fourth step of determining, based on a result in the third step, a success of the authentication, or repeating the second and third steps by selecting new reference comparison data based on whether or not the matching rate is equal to or greater than a preset threshold smaller than the authentication threshold..
Suprema Inc.

Method and system for determining usage and authentication of a paper product in a dispenser

A system and control method for determining an amount of paper product dispensed from a dispenser or remaining in the dispenser is provided. The paper product is initially loaded in the dispenser as a paper product formation, such as a roll or stack of the product.
Kimberly-clark Worldwide, Inc.

Smart mailbox device

A smart mailbox system capable of electronically communicating the receipt of mail and the collection of mail to an end user. User authentication allows the mailbox to communicate the identity of the user who collects the mail.

Core network connectionless small data transfer

Connectionless data transfer is disclosed. Authentication of a device and network node may be performed when data is sent from the device to an application server of an application service provider via a selected network.
Qualcomm Incorporated

System and implicit authentication

A system for implicit authentication for a mobile device associated with a user, wherein the implicit authentication is behavioural, biometric and task-based and includes at least one authentication task selected so as to leverage the user's muscle memory. The mobile device comprises a touchscreen; a transaction authentication information unit; one or more sensors coupled to the transaction authentication information unit; and an anomaly detector coupled to the transaction authentication information unit.
Zighra Inc.

Method and device for managing security according to service in wireless communication system

The present disclosure relates to a communication method and system for converging a 5th-generation (5g) communication system for supporting higher data rates beyond a 4th-generation (4g) system with a technology for internet of things (iot). The present disclosure may be applied to intelligent services based on the 5g communication technology and the iot-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services.
Samsung Electronics Co., Ltd.

Wireless access authentication

Examples relate to a method and a device for wireless access authentication. The method is applied to an intelligent gateway which is previously associated with account information of a user.
Hangzhou H3c Technologies Co., Ltd.

Compartmentalized multi-factor authentication for mobile devices

Techniques for obtaining compartmentalized authenticated access to a feature on an electronic mobile device comprising a camera are presented. The techniques may include obtaining data representing a printable authentication pattern, wherein the printable authentication pattern encodes access information, storing in electronic persistent memory the access information in association with data representing the feature, receiving, at the mobile telephone, a user request to access the feature, capturing, using a camera of the mobile device, an image of an input pattern printed on to a substrate, decoding the input pattern to obtain captured information, determining, by retrieving the access information, that the captured information matches the access information, and providing access to the feature on the mobile device as a consequence of at least the determining..
Xerox Corporation

Method and device for authenticating a mobile station on an alternative communications network

A method of authenticating a mobile station on an alternate communications network is disclosed, the mobile station being associated with a default communications network. The mobile station comprises a baseband processor to manage the antenna-related functions and a sim card to accommodate a default sim associated with the default communications network for receiving network credentials from the baseband processor.
Knowroaming Ltd

Image processing system and image processing sending image data

An image processing system receives an input of authentication information from a user, and authenticates the user based on the received authentication information. The image processing system further selects a folder setting method in a case where an operation key for setting a folder of the user as a destination of image data is operated, sets the folder according to the selected folder setting method in response to the operation of the operation key, and sends the image data to the set folder as the destination..
Canon Kabushiki Kaisha

Authentication and control of incoming communication

An incoming communication processing system and method is disclosed for providing communication and data services to residents of a controlled facility. Specifically, the incoming communication processing system allows outside parties to initiate communications to residents of a controlled facility.
Global Tel*link Corporation

System and detection and prevention of attacks on in-vehicle networks

Systems and methods for detection of attacks on a communication authentication layer of an in-vehicle network, including determining, by at least one network node, at least one attack attempt on the communication authentication layer of the in-vehicle network, wherein the determination is carried out by identifying anomalies in at least one of messages, data and metadata directed to the communication authentication layer, and selecting, by the at least one network node, a response corresponding to the determined attack attempt from at least one of modification of parameter values corresponding to a security protocol, a failsafe response, and rejection of messages identified as anomalies.. .
Argus Cyber Security Ltd.

Method for effecting an authentication procedure associated with a service provider or an application

A computer device for effecting an authentication procedure associated with a service provider or an application, including a plurality of sensors; and one or more processors in communication with the sensors and non-transitory data storage including, stored thereon, a plurality of instructions which, when executed, cause the one or more processors to perform the steps of (a) receiving an authentication procedure request; (b) determining a hierarchy of authentication processes for the authentication procedure; (c) selecting an authentication process from the hierarchy of authentication processes; and (d) executing the authenti