Images List Premium Download Classic

Authentication

Authentication-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Secure communication
October 11, 2018 - N°20180295516

A secure communication method comprising obtaining a secret code generated in response to a first communication device being paired with a second communication device, obtaining a prestored product key, generating a module key based on the secret code and the product key, randomly generating a session key, obtaining a key sequence number, auto-incrementing the key sequence number, setting a sending ...
Authentication in device to device discovery
October 11, 2018 - N°20180295515

There is provided a method for authentication in device to device discovery. A method performed by a discoverer device, comprises broadcasting a direct discovery request, receiving a direct discovery response from a discoveree device, the direct discovery response comprising a first token, and obtaining a determination of whether the first.
Method and apparatus for facilitating persistent authentication
October 11, 2018 - N°20180295514

A method, apparatus and computer program products are provided for facilitating persistent authentication on a mobile device using one or more authentication techniques selected based on operating conditions, cost, and security requirements. One example method includes in an instance in which a data channel through which the target mobile device is connected is associated with a wireless carrier network, performing ...
Authentication Patent Pack
Download 2562+ patent application PDFs
Authentication Patent Applications
Download 2562+ Authentication-related PDFs
For professional research & prior art discovery
inventor
  • 2562+ full patent PDF documents of Authentication-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Enabling a software application to be executed on a mobile station
October 11, 2018 - N°20180295512

The invention enables a software application to be executed on a mobile station in dependence of a sim. Challenge data originating from the software application is input to the sim to generate first response data using a security function of the sim.
Enforcing service policies in embedded uiccs
October 11, 2018 - N°20180295511

The embodiments set forth techniques for an embedded universal integrated circuit card (euicc) to conditionally require, when performing management operations in association with electronic subscriber identity modules (esims), human-based authentication. The euicc receives a request to perform a management operation in association with an esim.
User profile provisioning in wlan
October 11, 2018 - N°20180295510

The invention relates to a method for operating an entity of a wlan network. The method comprises the following steps.
Authentication Patent Pack
Download 2562+ patent application PDFs
Authentication Patent Applications
Download 2562+ Authentication-related PDFs
For professional research & prior art discovery
inventor
  • 2562+ full patent PDF documents of Authentication-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Representing unique device identifiers in hierarchical device certificates as fully qualified domain names (fqdn)
October 11, 2018 - N°20180295506

Methods and devices are provided for generating, delegating, and/or authenticating hierarchical globally unique identifier (hguid) certificates that are arranged in domain-name form to permit delegation and authentication as a fully qualified domain name (fqdn). A first hierarchical device certificate is obtained that includes at least part of a first unique device identifier for a first device and a base ...
Imaging apparatus
October 11, 2018 - N°20180295280

Imaging apparatus includes storage that records registration information, including face information, for personal authentication, setting unit that selects a security mode from a plurality of security modes, imaging unit that generates first image data from optical information, detector that detects a face of a subject within the first image data and detects the security-protection target according to a result from ...
Techniques for dynamic authentication in connection within applications and sessions
October 11, 2018 - N°20180295137

An interceptor identifies requests to access a protected function or resource and dynamically invokes one or more additional authentication tests. The interceptor for example can be configured as a plug-in for an email client, or can be integrated with native application code (or web content).
System and method for provisioning a security token
October 11, 2018 - N°20180295136

The provisioning of a security token object to a user is disclosed. The security token object is used for accessing a computing resource through a mobile device.
Systems and methods for biometric authentication of certificate signing request processing
October 11, 2018 - N°20180295129

A biometric certification request authentication (bcra) computing device is provided for authenticating a requestor undergoing a certificate signing request process. The bcra computing device is communicatively coupled to a memory device.
Authentication workflow management
October 11, 2018 - N°20180295128

According to one embodiment, an authentication tool includes a memory, an interface, and a processor. The memory stores a workflow to authenticate a user to access an application.
On-demand serving network authentication
October 11, 2018 - N°20180295125

A method, an apparatus, and a computer program product for wireless communication are provided. A method includes transmitting a request to a serving network with a nonce and a signature request directed to a network function of the serving network, receiving a response to the request from the serving network, and authenticating the serving network based on the signature of ...
Authentication Patent Pack
Download 2562+ patent application PDFs
Authentication Patent Applications
Download 2562+ Authentication-related PDFs
For professional research & prior art discovery
inventor
  • 2562+ full patent PDF documents of Authentication-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Distributed single sign-on
October 11, 2018 - N°20180295122

Respective cryptographic shares of password data, dependent on a user password, are provided at n authentication servers. A number t1≤n of the password data shares determine if the user password matches a password attempt.
Secure element authentication
October 11, 2018 - N°20180295121

Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents.
Session-limited, manually-entered user authentication information
October 11, 2018 - N°20180295120

A method for granting access by a user to a computerized system includes first authenticating the user based on initial user authentication information and, every time upon a successful authentication: establishing a session, during which the user is granted the access to the computerized system; saving a resultant based on session-limited user authentication information; and using the saved resultant, during ...
Assigning an agent device from a first device registry to a second device registry
October 11, 2018 - N°20180295119

An agent device is registered in a first device registry maintained by a first registry apparatus for authenticating agent devices for communicating with application providing apparatuses. The agent device can be assigned to a second device registry maintained by second registry apparatus.
Management of and persistent storage for nodes in a secure cluster
October 11, 2018 - N°20180295115

Authentication information at a first portion of encrypted data may be identified. A cryptographic key may be derived based on a combination of an identification of the first portion of the received encrypted data and a master key.
Security network controller
October 11, 2018 - N°20180295111

A method includes using a direct memory access controller, transferring first data from a memory to an input/output control circuit via a first bus and transferring the first data from the input/output control circuit to an authentication processing circuit via a second bus, without using the first bus. The method includes using the authentication processing circuit, generating authentication ...
System and method for enhanced data protection
October 11, 2018 - N°20180295108

In one embodiment, a method of secure network transmission is performed by a computer system. The method includes encrypting a payload via a first symmetric key and encrypting the first symmetric key via a second symmetric key.
System for remotely controlling electronic device and method of operating the same
October 11, 2018 - N°20180295100

A system for remotely controlling an electronic device includes a first electronic device configured to read a frame buffer to compress a screen and transmit the compressed screen, a second electronic device connected to the first electronic device and configured to repeatedly receive the compressed screen, to receive a communication service related event generated in the first electronic device and ...
Loading