Follow us on Twitter
twitter icon@FreshPatents


Authentication patents

      

This page is updated frequently with new Authentication-related patent applications.

Communication control method, terminal device, server device, and communication system
There is provided a communication system that performs a service based on prose under the management of a communication provider. A prose application code for discovering and detecting a proximity terminal is managed and a process based on a procedure associated with a prose service such as an announcement request, a monitoring request, or a match report request is performed based on the authentication of a server device operated by a communication provider.

Authentication with secondary approver
Techniques are provided for giving access to restricted content on a first device from a second device through a wireless network. In one embodiment, the first device transmits an authorization request signal to the second device or to a server in the wireless network.

Communication control apparatus, communication control method, and non-transitory computer readable medium storing communication control program
A communication control apparatus according to the present disclosure includes a database configured to store first table information associating first identification information with second identification information, the first identification information being identification information of a terminal according to a first authentication mode, second identification information being identification information of the terminal according to a second authentication mode, and a control unit configured to acquire the second identification information of a terminal requesting a communication request in the second authentication mode and determine whether or not to transmit statistical information with a communication status of the terminal recorded therein to a server based on whether or not the first identification information corresponding to the acquired second identification information is recorded in the database.. .

Backup vehicle entry and user authentication system
Systems are provided for a backup entry and user authentication system for a vehicle. In one example, the system includes a smart phone having a housing that defines at least one recess.

Call authentication blocking unwanted calls
A method for blocking unwanted calls has been provided. The includes intercepting a call being routed from a calling device to a receiving device.

Continuous authentication
Methods, devices, and systems are provided for providing continuous authentication to a user having a wearable device in an access control system. The wearable device allows the authentication of the user to be maintained until an authentication interruption signal is received.

Wireless authentication based on location data
Embodiments of the invention involve using location data to authenticate individuals wirelessly. In one embodiment, an access device may obtain, by one or more cameras, images of an area captured at different time points, the images including a first image at a first time and a second image at a second time, and where the first image shows the user at a first location and the second image shows the user at a second location.

Organizational sign-in across sovereign environments
A system of a primary cloud for signing in users is provided. The system receives a sign-in request for a user that includes a personal identifier (e.g., phone number).

Method for processing data request and system therefor, access device, and storage device
A method for processing a data request is performed by an access device, and includes receiving, from a user terminal, the data request including data information of target data, obtaining the data information from the data request, searching for a storage device identifier and first authentication information, based on the data information, and sending the first authentication information and the data information, to a storage device corresponding to the storage device identifier, to enable the storage device to perform authentication on the first authentication information, and to enable the storage device to, in response to the authentication succeeding, obtain the target data indicated by the data information. The method further includes receiving, from the storage device, the target data, and sending the target data to the user terminal, to respond to the data request..

Security information caching on authentication token
A method of operating a security token to authenticate a user in a multi-factor authentication system is disclosed. The method includes: monitoring user custody of the token, the token having an identifying characteristic representing a possession factor for use through possession factor authentication; during a period of continuous user custody of the token based on the monitoring, obtaining a knowledge factor from a user having the continuous user custody; caching the knowledge factor in a memory of the token; and in response to a second authentication request, retrieving the knowledge factor from the memory to demonstrate to an authentication system knowledge of the knowledge factor, during the period of continuous user custody..

Authentication server, authentication system and method

The present disclosure discloses an authentication server, an authentication system and an authentication method. The authentication server includes an information acquisition module and an identity authentication module.

Simulated sso functionality by means of multiple authentication procedures and out-of-band communications

A system and method for using a single-use password to add sso functionality to a service of a service provider belonging to an f-sso federation that does not support f-sso functionality for the service. In response to receiving notification from an identity provider that a user has requested access to the service, the service provider uses information provided by the identity provider to identify and authenticate the user, and then uses standard api calls to create and send a temporary password to the user.

Locking systems with multifactor authentication and changing passcodes

A computer-based locking system using changing passcodes includes an application server and an application in electronic communication with the application server. The application runs on a computing device.

Distributed single sign-on

Respective cryptographic shares of password data, dependent on a user password, are provided at n authentication servers. A number t1≤n of the password data shares determine if the user password matches a password attempt.

Application authentication wrapper

Disclosed are various approaches for implementing an application authentication wrapper. An authentication request, such as a kerberos request, is created for authenticating the computing device.

Non-sim access to cellular networks

A communication device including a non-sim based client is authenticated for accessing an ims network. An internet protocol identity is received from the communication device.

System and traversing a nat device with ipsec ah authentication

A method for routing ip packets with ipsec ah authentication is disclosed. The method includes locating overlay edge routers between private domains and their associated nat routers.

Dynamic url selection method, system and wireless access point for portal authentication

This disclosure provides a dynamic url selection method for portal authentication, comprising: sending a first http request message when a communication connection is established between a sta and the wireless ap; identifying whether a received http request message is the first http request message, if so, obtaining transmission parameters of the wireless ap, calculating a dynamic selection value according to the transmission parameters, determining urls for different category portal pages according to the dynamic selection value, a pre-stored first empirical value, and a second empirical value which is less than the first empirical value, sending an http response message encapsulated with the determined portal page url to sta via redirection mode, and pushing the corresponding portal page to the sta so that the corresponding portal page is displayed on a browser of the sta, and if not, performing a conventional process on the received http request message.. .

System and encoding data within a vehicle communication network

A vehicle communication system that provides data between various objects (i.e., devices) within a vehicle communication network is disclosed. In one or more implementations, the vehicle communication system includes an accessor interface module that receives data encoded in an automotive connectivity communication protocol from another accessor module.

Method for generating an electronic signature

A method for generating an electronic signature of a user for an electronic document including establishing a secure internet session between a telecommunication terminal of a user and a signature server computer system; receiving a code from the signature server computer system via a separate and/or separately secured side channel by the telecommunication terminal; transmitting a combination of code and authentication information of the user via the secure internet session to the signature server computer system; checking the validity of the combination of code and authentication information by the signature server computer system; and generating the electronic signature of the user by a high-security module of the signature server computer system, wherein the private key of the user for generating the electronic signature is stored in the high-security module.. .

System and facilitating multi-connection-based authentication

In certain embodiments, first and second challenge responses may be obtained at a computer system from a client device respectively via first and second connections between the computer system and the client device. The challenge responses may each be generated based on a same private key stored in a secure local storage at the client device.

Method, requester device, verifier device and server for proving at least one piece of user information

A requester device sends to a server a request for proving a piece of user information and data identifying a requester. The server generates requester authentication data and associated data identifying a transaction.

System and device registration and authentication

Systems and methods for device registration and authentication are disclosed. In one embodiment, a method for authentication of a device may include (1) receiving, at a mobile device, a first credential; (2) transmitting, over a network, the first credential to a server; (3) receiving, from the server, a first key and a first value, the first value comprising a receipt for the first credential; (4) receiving, at the mobile device, a data entry for a second credential; (5) generating, by a processor, a second key from the data entry; (6) retrieving, by the mobile device, a third credential using the first key and the second key; (7) signing, by the mobile device, the first value with the third credential; and (8) transmitting, over the network, the signed third value to the server..

Barcode security authentication method

A barcode security authentication method. The method comprises: when a barcode acquisition request from an application server is received by an authentication server, same generates barcode information and returns the barcode information to the application server, where the barcode information is used for displaying a barcode image; a mobile terminal token end acquires the barcode information on the basis of the barcode image, generates a user mobile terminal token response value on the basis of the barcode information and of user mobile terminal token information of self, and directly transmits the user mobile terminal token response value to the authentication server for authentication.

Password based key exchange from ring learning with errors

Use the same basic idea of ke based on ring lwe, this invention gives constructions of a new authenticated key exchanges system, where the authentication is achieved through a shared password between two parties. These new systems are efficient and have very strong security property including provable security and resistance to quantum computer attacks.

Methods and systems for signal processing

An object (e.g., a driver's license) is tested for authenticity using imagery captured by a consumer device (e.g., a mobile phone camera). Corresponding data is sent from the consumer device to a remote system, which has secret knowledge about features indicating object authenticity.

Integration of secure protocols into a fraud detection system

Embodiments of the present invention are directed to methods and systems for performing a secure authentication process by leveraging the historical transaction data associated with an issuer. The historical transaction data stored at a fraud detection system may include the types of frequency of past authentication processes performed by the issuer, allowing for a determination of the likelihood of an authentication challenge process being applied to a current transaction.

Centralized identity authentication for electronic communication networks

A method of centralized identity authentication for use in connection with a communications network includes registering users of the communications network such that each registered user's identity is uniquely defined and determinable, and registering a plurality of vendors having a presence on the communications network. The registered vendors selectively transact with registered users, wherein the transactions include: (i) the registered vendor selling goods and/or services to the registered user; (ii) the registered vendor granting the registered user access to personal records maintained by the registered vendor; and/or (iii) the registered vendor communicating to the registered user personal information maintained by the registered vendor.

Secure human fingerprint sensor

Devices, systems, and techniques are provided for performing human fingerprint detection and authentication for authenticating a request to access a locked mobile device equipped with a fingerprint detection module. In one aspect, responsive to detecting a contact from an object with the fingerprint detection module, described technique can be used to determines whether the contact from the object is from human skin.

Authentication system

The present invention is directed to an authenticating apparatus, system and a method for authentication of an object or product having a secure glyph thereon. The invention is also directed to the use of the object or product in a machine wherein the secure glyph has an intellectual property protected feature and a machine readable feature..

Personal computing devices with assisted form completion

A system and method for automatically completing one or a plurality of computer forms is disclosed using personal data from a local source. The form completion tool is initiated by a user to automatically complete in the one or multiple forms using personal data and code stored in user's personal computing devices.

Making unique passwords from the same string of characters, including any string of characters in a web address

Very strong, complex, unforgettable passwords unique to each web site are created for a user's web site authentication by altering all or part of the web site address using, in a preferred embodiment, a predetermined encoding dictionary with more a single code for each entry. The entries in this preferred embodiment are single characters including characters used for words, punctuation, symbols and numerals; each single entry character appears more than once in the dictionary.

Vehicle data rewrite control device and vehicle data rewrite authentication system

The purpose of the present invention is to provide a vehicle data rewrite control device and a data rewrite authentication system which prevent unauthorized rewriting of data due to password leakage and/or by spoofing of a connected device. The vehicle data rewrite control device outputs authentication information generated on the basis of data to be updated and a pre-stored vehicle number.

Systems and mechanism to control the lifetime of an access token dynamically based on access token use

A data management system manages secured data for a plurality of users. The data management system utilizes an access authorization system to authenticate users seeking access to the data management system.

Method and appapratus for controlling electronic device, and electrode device

The present disclosure provides a method and an apparatus for controlling an electronic device, and the electronic device. The electronic device includes a collection unit.

Shared templates in a collaborative work environment

Described herein are systems and methods for providing one or more shared templates to a tenant or to a team associated with a tenant. A shared template is a pre-defined data structure that includes one or more elements related to a particular task.

Image recognition-based dosage form dispensers

This invention provides a dosage form dispenser, comprising a casing comprising a first portion adapted for insertion within an oral cavity of a subject and a second portion adapted to encase a dosage form dispensing mechanism located therewithin; at least one camera positioned on said second portion of said casing, further positioned to capture a field of view of a portion of a face of a subject, wherein said field of view comprises at least a portion of a base view of the nose of said subject; a dosage form dispensing mechanism; a microprocessor and associated memory for processing and storing user authentication information, comparing images relayed from said at least one camera to at least one stored user standard and providing authentication when a match is established; and an interface connected to said dispensing mechanism, which promotes dispensing said dosage form when said authentication has been obtained. Methods for dispensing a dosage form directly within an oral cavity of a subject in need thereof, using the dispensers are also described..

Secure communication

A secure communication method comprising obtaining a secret code generated in response to a first communication device being paired with a second communication device, obtaining a prestored product key, generating a module key based on the secret code and the product key, randomly generating a session key, obtaining a key sequence number, auto-incrementing the key sequence number, setting a sending sequence number with an initial value of zero, generating a key frame by performing a computation on the session key and a verification authentication code of the session key using the module key, sending a data packet including the key frame, the key sequence number, the sending sequence number, and a data type to the second communication device. The data type indicates that the data packet is a key data packet..

Authentication in device to device discovery

There is provided a method for authentication in device to device discovery. A method performed by a discoverer device, comprises broadcasting a direct discovery request, receiving a direct discovery response from a discoveree device, the direct discovery response comprising a first token, and obtaining a determination of whether the first.

Method and facilitating persistent authentication

A method, apparatus and computer program products are provided for facilitating persistent authentication on a mobile device using one or more authentication techniques selected based on operating conditions, cost, and security requirements. One example method includes in an instance in which a data channel through which the target mobile device is connected is associated with a wireless carrier network, performing authentication via a carrier verification authentication process, in an instance in which the data channel through which the target mobile device is connected is wi-fi, performing authentication via a stored authentication history authentication process, and in an instance in which neither the carrier verification authentication process nor the stored authentication history authentication process can be performed, performing authentication via a process of sending a one-time passcode to a phone number associated with the target mobile device..

Authentication system using nfc tags

Exemplary embodiments provide an authentication system for granting access to an access point. The system includes a near-field-communication (nfc) tag, a nfc reader and writer, and an access point coupled to the nfc reader and writer.

Enabling a software application to be executed on a mobile station

The invention enables a software application to be executed on a mobile station in dependence of a sim. Challenge data originating from the software application is input to the sim to generate first response data using a security function of the sim.

Enforcing service policies in embedded uiccs

The embodiments set forth techniques for an embedded universal integrated circuit card (euicc) to conditionally require, when performing management operations in association with electronic subscriber identity modules (esims), human-based authentication. The euicc receives a request to perform a management operation in association with an esim.

User profile provisioning in wlan

The invention relates to a method for operating an entity of a wlan network. The method comprises the following steps.

System and network node authentication

A method of commissioning a sensor includes using a system having a control panel, a sensor, and a cloud server. Identification codes from respective nfc tags that identify the control panel and sensor are read and transmitted to the cloud server.

Representing unique device identifiers in hierarchical device certificates as fully qualified domain names (fqdn)

Methods and devices are provided for generating, delegating, and/or authenticating hierarchical globally unique identifier (hguid) certificates that are arranged in domain-name form to permit delegation and authentication as a fully qualified domain name (fqdn). A first hierarchical device certificate is obtained that includes at least part of a first unique device identifier for a first device and a base domain name, wherein the first hierarchical device certificate includes a fully qualified domain name and the first unique device identifier includes at least one of a type/model identifier or an origin/manufacturer of the first device.

Imaging apparatus

Imaging apparatus includes storage that records registration information, including face information, for personal authentication, setting unit that selects a security mode from a plurality of security modes, imaging unit that generates first image data from optical information, detector that detects a face of a subject within the first image data and detects the security-protection target according to a result from a comparison between the face detected and the face information recorded, image processor that executes the security-protection process on the security-protection target detected by detector to generate second image data, and controller that controls detector and image processor in accordance with the security mode selected. The plurality of security modes include a first security mode and a second security mode.

Techniques for dynamic authentication in connection within applications and sessions

An interceptor identifies requests to access a protected function or resource and dynamically invokes one or more additional authentication tests. The interceptor for example can be configured as a plug-in for an email client, or can be integrated with native application code (or web content).

System and provisioning a security token

The provisioning of a security token object to a user is disclosed. The security token object is used for accessing a computing resource through a mobile device.

Systems and methods for biometric authentication of certificate signing request processing

A biometric certification request authentication (bcra) computing device is provided for authenticating a requestor undergoing a certificate signing request process. The bcra computing device is communicatively coupled to a memory device.

Authentication workflow management

According to one embodiment, an authentication tool includes a memory, an interface, and a processor. The memory stores a workflow to authenticate a user to access an application.

On-demand serving network authentication

A method, an apparatus, and a computer program product for wireless communication are provided. A method includes transmitting a request to a serving network with a nonce and a signature request directed to a network function of the serving network, receiving a response to the request from the serving network, and authenticating the serving network based on the signature of the network function.

Distributed single sign-on

Respective cryptographic shares of password data, dependent on a user password, are provided at n authentication servers. A number t1≤n of the password data shares determine if the user password matches a password attempt.

Distributed single sign-on

Respective cryptographic shares of password data, dependent on a user password, are provided at n authentication servers. A number t1≤n of the password data shares determine if the user password matches a password attempt.

Secure element authentication

Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents.

Session-limited, manually-entered user authentication information

A method for granting access by a user to a computerized system includes first authenticating the user based on initial user authentication information and, every time upon a successful authentication: establishing a session, during which the user is granted the access to the computerized system; saving a resultant based on session-limited user authentication information; and using the saved resultant, during the established session, for authenticating the user for granting subsequent access by the user during the established session based on subsequent user authentication information that is manually entered. The subsequent access may include access following a period of inactivity by the user, or the subsequent access may include access to a sensitive area of the computerized system that is more secure than other areas of the computerized system to which access is granted upon the initial authentication..

Assigning an agent device from a first device registry to a second device registry

An agent device is registered in a first device registry maintained by a first registry apparatus for authenticating agent devices for communicating with application providing apparatuses. The agent device can be assigned to a second device registry maintained by second registry apparatus.

Management of and persistent storage for nodes in a secure cluster

Authentication information at a first portion of encrypted data may be identified. A cryptographic key may be derived based on a combination of an identification of the first portion of the received encrypted data and a master key.

Security network controller

A method includes using a direct memory access controller, transferring first data from a memory to an input/output control circuit via a first bus and transferring the first data from the input/output control circuit to an authentication processing circuit via a second bus, without using the first bus. The method includes using the authentication processing circuit, generating authentication data based on the first data and transferring the first data from the input/output control circuit to a cryptography processing circuit via a third bus, without using the first bus.

System and enhanced data protection

In one embodiment, a method of secure network transmission is performed by a computer system. The method includes encrypting a payload via a first symmetric key and encrypting the first symmetric key via a second symmetric key.

System for remotely controlling electronic device and operating the same

A system for remotely controlling an electronic device includes a first electronic device configured to read a frame buffer to compress a screen and transmit the compressed screen, a second electronic device connected to the first electronic device and configured to repeatedly receive the compressed screen, to receive a communication service related event generated in the first electronic device and output the communication service related event, and to receive an event of copying a file between the first electronic device and the second electronic device and pasting the file, and a network configured to form a communication channel between the first electronic device and the second electronic device according to an authentication result of authentication information input into at least one of the first electronic device and the second electronic device.. .

Telematics 5g and multimode 4g and 3g mobile modulation format selectable (mfs) communications

Telematics, telemetry, including medical telemetry and telematics, one or multiple remote control (rc) or universal remote control (urc) devices, multimode 5g, 4g and 3g mobile modulation format selectable (mfs) communications wireless and wired communication networks, cellular systems and devices with fingerprint signal authentication. Touchscreen and motion detectors are controlling mobile devices.

Management of secret data items used for server authentication

A security device (6) is provided for facilitating management of secret data items such as cryptographic keys which are used by a remote server (2) to authenticate operations of the server (2). The device (6) has a user interface (13), control logic (16) and a computer interface (11) for connecting the device (6) to a local user computer (5) for communication with the remote server (2) via a data communications network (3).

Authentication device, authentication system, authentication method, and program

An authentication device outputs a first challenge value corresponding to a random number along with a first authentication request. A second challenge value is input to the authentication device along with a second authentication request, and the authentication device outputs a second response value which is obtained by encrypting a value corresponding to the second challenge value by using a common key by a symmetric key cryptosystem.

Systems and methods for identifying certificates

A learning certificate authentication system comprising a certificate downloader configured to obtain a certificate, a feature extractor in communication with the certificate downloader that is configured to (i) parse information associated with the certificate and a pattern of use into actionable features and (ii) calculate a value associated with at least one of the actionable features, a classification extractor configured to process the vector with a learning model based on the pattern of use information, a processor, and a non-transitory memory having instructions that, in response to an execution by the processor, cause the processor to calculate a probability of authenticity based on the processed vector are disclosed. Methods of authenticating certificates are also disclosed..

Blockchain-based digital identity management method

A digital identity management method based on a blockchain-based technology is provided. In some exemplary embodiments, the method comprises: performing a first process for storing identity identification information of a subscription request in a first block of a blockchain in response to the subscription request from a service request device and then obtaining a block hash value of the first block as a result of performing the first process, performing a second process for storing the block hash value of the first block and data of authentication information of the subscription request in a second block of the blockchain and then obtaining a block hash value of the second block as a result of performing the second process, and inserting the block hash value of the second block into a digital identity data structure as a result of processing the subscription request..

Apparatus, method and computer program product for authentication

Methods, apparatus, computer program product and computer readable medium are disclosed for authentication. A method comprises: receiving an authentication request from a user apparatus (802); sending a verification code to the user apparatus, wherein the verification code comprises a combination of pattern codes and the pattern codes are associated with encrypted bio-patterns that the user has registered respectively (804); receiving first encrypted bio-information of the user corresponding to the verification code (806); and calculating a first encrypted deviation between the registered encrypted bio-patterns corresponding to the combination of pattern codes and the codes and the pattern codes are associated with encrypted first encrypted bio-information (808)..

Uav authentication method and system

An authentication method includes that an authentication apparatus of an unmanned aerial vehicle (uav) generates a session key, the authentication apparatus receives a device identification (id) of a device and a randomly generated random number from the device of the uav, the authentication apparatus obtains a device key of the device according to the device id of the device, the authentication apparatus encrypts the session key and the random number according to the device key of the device, and the authentication apparatus sends the encrypted session key and the encrypted random number to the device.. .

Residence-based digital identity and strong authentication system

A system and associated methods provide digital identity and strong authentication management services for internet users. The system includes a central, cloud-based, online service, referred to as a central service, which can manage user accounts.

Identity and content authentication for phone calls

Systems and methods for call authentication are provided. A method can include an enrollment protocol that ensures users control the number they claim to own, a handshake protocol that mutually authenticates the calling parties, and a call integrity protocol that ensures the security of the voice channel and the content it carries.

Systems and methods for data backup and authentication using blockchain

Exemplary embodiments of the present disclosure are related to a distributed blockchain storage system for data backup and authentication. Embodiments of the distributed blockchain storage system can include a computing system and at least one electronic system.

Method and device for processing voiceprint authentication

The present disclosure provides a method and a device for processing voiceprint authentication. The method includes: extracting a first feature vector for each first speech segment of a training set by a gender-mixed voiceprint baseline system based on deep neural network; training a gender classifier according to the first feature vector for each first speech segment and a pre-labeled first gender label of each first speech segment; training deep neural network models for different genders respectively according to speech data of different genders of the training set; and training uniform background models, feature vector extracting models and linear probability discriminant analysis models for different genders respectively according to the deep neural network models for different genders and the speech data of different genders of the training set.

Speech with context authenticator

A computer-implemented method for authenticating speech includes executing on a computer processor the step of receiving speech and context for the speech of a speaker, wherein the speech is received as electronic voice communication, wherein the context for the speech includes biometric information measured during the received speech. The speaker is authenticated according the received speech and the context by a speech with context model.

Terminal, unlocking method, and program

A terminal comprises: a speech receiving unit that receives speech in a locked state; a voiceprint authentication unit that performs voiceprint authentication based on the speech received in the locked state and determining whether or not a user is legitimate; a speech recognition unit that performs speech recognition of the speech received in the locked state; and an execution unit that executes an application using a result of the speech recognition.. .

Database game playing system based on pregenerated data

A database system is disclosed for accessing databases, updating hands information associated with users. The database system can include a server.

Authentication apparatus and method

An authentication apparatus is operative to determine the authenticity of a polymer film, the authentication apparatus comprises an optically-based birefringence measuring apparatus and may be used to determine the authenticity of a banknote comprising a polymer film.. .

Gifting system

A system for purchasing and delivering a specific gift, in which, at the time of the purchase, the buyer, instead of being provided with the gift, is provided with a gift proxy or special package which includes a gift token which includes an authentication device. The gift proxy can also include a highly portable replica (e.g., a picture or miniature) of the specific gift.

System and authenticating components using dual key authentication

A system and method for manufacturing and authenticating an additively manufactured component are provided. The method includes additively manufacturing the component including a first component identifier.

Fraud monitoring apparatus

A fraud monitoring apparatus for determining a fraud score representing a relative risk of fraudulent activity for a payment request, comprising one or more processors in communication with non-transitory data storage having instructions stored thereon which, when executed by the processor or processors, cause the apparatus to perform a fraud monitoring process comprising: receiving, from an authorization server, a fraud monitoring request including transaction-related data; identifying, from said transaction-related data, an associated mobile computer device; sending a request for authentication data to the mobile computer device; receiving requested authentication data from the mobile computer device; generating a fraud score, from the received requested authentication data and the transaction-related data, representing a relative risk of fraudulent activity; and sending data representing the fraud score to the authorization server.. .

Systems and methods for processing an access request

A system for controlling access to a physical asset and associated servers and methods are provided. The system includes an access control terminal coupled to the physical asset and operable to read a token from a user token device associated with a user, and generate control signals to allow access to the physical asset, an access control processing server operable to receive an access request from the access control terminal, the access request including the token, generate an authentication verification request including the token, send the authentication verification request to a network, receive an authentication response from the network, generate an access control response to cause the access control terminal to allow access to the asset in response to the authentication response, and send the access control response to the access control response..

Systems and methods for enhanced user authentication

A computer-implemented method for enhancing user authentication is provided. The method is implemented using an authentication computing device in communication with a memory.

Secure data storage device with security function implemented in a data security bridge

A storage device includes: a controller; a storage medium coupled to the controller; and a data security bridge comprising a security module and a key management module; wherein the security module is configured to perform data encryption and/or data decryption; and wherein the key management module is configured to obtain a first security key stored in the storage device, obtain a second security key received by the storage device, and perform a user authentication based on the first security key and the second security key.. .

Electronic signature framework with keystroke biometric authentication

An intended signatory receives an electronic signature request that includes instructions for accessing both an unsigned document and server functionality that enables the intended signatory to electronically sign the document. To gain such access, the intended signatory must pass username and password authentication, which serves as a first authentication factor.

Systems and methods for generating and validating certified electronic credentials

Systems and methods for generating and validating certified electronic credentials are disclosed. A publisher may receive a certified electronic credential order from a credentialer and prepare a plurality of certified electronic credentials.

Method and device for authenticating an object or a person using a security element with a modular structure

The present invention relates to a method and an authentication device for authenticating an object or a person by means of a security element, which is individually assigned to the object or to the person and has a plurality of security features. The security element is comprised of a plurality changeable modules with a plurality of surfaces, wherein at least some of the modules have specific security features and single or all modules are individually combined to form a new, changed security element.

Electronic device and storing fingerprint information

An electronic device is provided. The electronic device includes a memory storing first authenticated fingerprint information, and a processor configured to obtain first fingerprint information corresponding to a first input, compare the first fingerprint information with the first authenticated fingerprint information during a first user authentication, perform a designated function when the first authenticated fingerprint information belongs to a first reference, temporarily store the first fingerprint information when the first authenticated fingerprint information belongs to a second reference, obtain second fingerprint information corresponding to a second input during a second user authentication, compare the second fingerprint information with the first authenticated fingerprint information during the second user authentication when the second input satisfies a designated reference in relation to the first input, store the temporarily stored first fingerprint information as second authenticated fingerprint information when the second authenticated fingerprint information belongs to the first reference, and perform the designated function..

Multi-factor authentication via network-connected devices

Multi-factor authentication via network-connected devices is described, and techniques provide for generating and utilizing behavioral authentication factors for multi-factor authentication of user identities. Behavioral authentication factors are learned by training models, using machine learning techniques, from user behaviors sensed by network-connected devices and monitored by a service.

Allocation of wireless channels for preferred stations

Methods, systems, and computer readable media may be operable to facilitate an allocation of one or more channels to one or more preferred stations. An access point may be configured to allocate the use of one or more sub-bands of a frequency spectrum to one or more stations.

Access point connectivity optimization

This disclosure describes methods, apparatuses, and devices related to optimizing connectivity between devices. A device is disclosed that may determine first information received from a client device, wherein the first information comprises at least one of an authentication request, an association request, or pre-association discovery request, and wherein the first information includes an indication of a first device type.

Systems and methods of transmitting and switching embms service in a heterogeneous network

Systems and methods may provide transmitting and switching transmission of an evolved multimedia broadcast multicast service (embms) from a first radio access technology [120] to a second radio access technology [130]. Embodiments may provide a method encompassed by receiving the embms service and at least one control channel parameter through the first radio access technology [120]; detecting availability of the second radio access technology [130]; transmitting the at least one configuration parameter relating to the second radio access technology [130]; checking authentication of the second radio access technology [130] to receive the embms service; and switching the evolved multimedia broadcast multicast service from the first radio access technology [120] to the second radio access technology [130].

Transferable ownership tokens for discrete, identifiable devices

A mobile device that includes an ownership token application program receives user input indicative of a first authentication factor associated with an ownership token bound to an internet of things (iot) device. Responsive to detecting the iot device in close proximity, the mobile device may obtain a second authentication factor and an iot device identifier from the iot device.

Wifi protected access 2 (wpa2) pass-through virtualization partition

A service provider (sp) network device or system can operate to enable a wifi protected access 2 (wpa2) pass-through with a user equipment (ue) and further define various partitions between a physical access point (pap) and a virtual ap (vap) according to one or more virtual network functions (vnfs). The wpa2 pass-through can be an interface connection that passes through a computer premise equipment (cpe) or wireless residential gateway (gw) without the cpe or gw modifying or affecting the data traffic.

Authentication method, authentication system and authentication devices for authenticating an object

The invention relates to an authentication method, an authentication system and authentication means for authenticating an object which is fitted with an identifier, in particular with an rfid tag. In order to allow products to be protected cost-efficiently against counterfeiting, or at least to allow the existence of an unauthorized imitation to be detected, a method for authenticating an object is proposed, comprising the steps of: reading first authentication data from an identifier data store of an identifier, in particular of an rfid tag, which is attached to the object, by a read/write device designed to read data from the identifier data store and to write data into the identifier data store; providing comparative data in a comparative data store of a comparator; authenticating the identifier by comparing the first authentication data with the comparative data; generating second authentication data and storing second authentication data as new comparative data in the comparative data store and as new first authentication data in the identifier data store if the first authentication data match the comparative data..

Dispenser connectivity

Device authentication may be provided. A mobile computing device may read a device id from a dispensing device (e.g., a beverage dispenser, kiosk, atm, etc.) wirelessly when the mobile computing device is placed in close proximity to the dispensing device.

Shared terminal, display control method, and non-transitory computer-readable medium

A shared terminal includes circuitry. The circuitry controls a display to display an image to a plurality of users.

Service providing device and service providing system

A service providing device includes a storage unit configured to store driver management information including at least driver identification information, a reception unit configured to receive the driver identification information from the in-vehicle device, a determination unit configured to determine whether the driver management information including the driver identification information received by the reception unit is stored in the storage unit, an acquisition unit configured to acquire the driver management information from one or more other service providing devices connected to the service providing device over a network the determination unit determines that the driver management information is not stored in the storage unit, an authentication unit configured to authenticate the in-vehicle device based on the acquired driver management information, and a providing unit configured to provide the service to the in-vehicle device when the authentication has been successful.. .

Conference support system, conference support method, program for conference support apparatus, and program for terminal

A conference support system has a terminal used by participants in a conference and a conference support apparatus. The conference support apparatus includes an acquisition unit configured to acquire a speech content, a context authentication unit configured to, when a pronoun is included in text information of the speech content, estimate words corresponding to the pronoun, and a communication unit configured to transmit the text information and the estimated words corresponding to the pronoun to the terminal, in which the terminal includes a display unit configured to display the text information and words corresponding to the pronoun..

Enhanced authentication with dark web analytics

Objects in a website of a dark web, which is accessible over an anonymous network, are searched for information associated with an entity. A threat level is determined based, at least in part, on, and a transaction initiated in a system associated with the entity is detected.

Methods and apparatuses for improved network communication using a message integrity secure token

Embodiments are disclosed for limiting an attack surface of a server application by enforcing integrity of a message transmitted to the server application. An example method includes receiving, by communications circuitry of a receiving system hosting the server application, a message including specific message content and a token.

Consolidated multi-factor risk analysis

Provided is a process of authenticating a user, the process including: receiving an authentication request sent by a first computing device; receiving an observed profile of the second computing device; accessing a known profile of the second computing device; determining that the known profile corresponds to the observed profile; sending an authentication credential to either the second computing device or the first computing device; receiving the authentication credential from either the first computing device or the second computing device; and in response to receiving the authentication credential and the determination that the known profile corresponds to the observed profile, determining that the user is authenticated.. .

Bulk delivery of change of authorization data via aaa protocols

In general, techniques are described for supporting bulk delivery of change of authorization data in authentication, authorization, and accounting (aaa) protocols, where delivery is performed as a change of authorization after a subscriber has successfully authenticated and initially authorized. In one example, the techniques are directed to a method including determining, by a radius server for a service provider network, change of authorization data for services to which the subscriber of the service provider network has subscribed.

Systems and methods for authenticating an online user using a secure authorization server

A secure authorization server computer system for verifying an identity of an end-user is provided. The computer system is programmed to receive, from a computing client, an authentication request at an authorization component.

Enhanced authentication method using dynamic geographical location information

A system increases security for personal devices. An authenticating authority receives an authentication request from a personal device.

A biometric face recognition based continuous authentication and authorization system

A method and system for continuously authenticating a user working from a remote location is provided. The method includes providing user an interface to login through his login credentials to company domain.

Seamless authentication device

According to one embodiment, an authentication system includes an authentication device. The authentication device includes a biometric scanner, a processor, and an interface.

System and biometric authentication-based electronic notary public

Systems and methods for biometric authentication-based electronic notary public are disclosed. A method for biometric authentication-based electronic notary public using an electronic device may include (1) a server comprising at least one computer processor receiving, from an electronic device, biometric data from a user; (2) the server authenticating the user based on the biometric data; (3) the server receiving, from the electronic device, an identification of a document to notarize; (4) the server receiving, from the electronic device, a signature of the user; (5) the server processing the document to include the signature and a notary seal; and (6) the server providing the processed document to the user..

Method for operating a field device of automation technology and an operating unit for carrying out the method

The disclosure relates to a method for operating a field device of automation technology, comprising: establishing a wireless and/or wired communications link between the field device and an operating unit; establishing a communications link between an authentication card and the field device, using the operating unit, wherein at least the field device and the authentication card contain symmetric or asymmetric key information; and carrying out an at least unilateral authentication of the authentication card on the field device, as well as an operating unit for carrying out the method according to the invention.. .

Identity authentication using a barcode

In a method for identity authentication, a portable electronic device displays a barcode encoding verification information for verifying authorization of access to the portable electronic device, and identification information for authenticating an identity of a user of the portable electronic device. An identification device scans the barcode and generates an authentication command.

Device enrollment service system and method

Endpoints, such as session initial protocol enabled telephones, are capable of being public network (e.g., internet) devices and, as such, require security measures to protect the endpoints and components on a private network they may be attached to, such as a call center. By providing a self-signed certificate into an endpoint with hardcoded certificate authorities (cas) that enable the phone to call a trusted location, namely a device enrollment service (des) having a verifiable record of the endpoint that, on endpoint startup, authentication actions may be performed and, is successful, the endpoint is permitted to “point to” other services that may allow the endpoint to be redirected or otherwise use a particular private network, such as that of a customer..

Collection point anchored multi-property identity based application specific token origination

A secure identity framework has been designed that leverages a host device as a data collection point for four properties of a digital identity profile anchored to the collection point device, and uses the digital identity profile for multi-factor authentication. A public key infrastructure key exchange is conducted for secure identity framework members corresponding to collection and access of data of the digital identity profile.

Limited user authentication for controlling personal information privacy

The longstanding problem of providing efficient and rapid online user services while maintaining user privacy is addressed. Disclosed is a system and method for providing unverified users an ability to act upon private records known to them while protecting user privacy by not reflecting private information back to the unverified user.

Password state machine for accessing protected resources

A user authentication technique that allows a user to access a protected resource such as an account on a web site or secure files on a computing device such as a smartphone, personal computer, tablet computer, and the like, employs a shared secret that employs a state machine to sequentially transition between a series of states during which the user is requested to enter predefined information that is also a part of the shared secret. That is, the shared secret includes user-specific data that must be provided and the particular sequence or manner in which the user-specific data or credentials are to be provided.

Methods and apparatuses for utilizing a gateway integration server to enhance application security

Embodiments are disclosed for managing interactions between a server application and an external environment while limiting an attack surface of the server application. An example method includes receiving, by communications circuitry of a gateway integration server (gis) and from a source device in the external environment, a message including an application programming interface (api) call.

Email attachment security system and method using out-of-band authentication

The email attachment security system and method using out-of-band authentication allows a recipient to receive a secure digital file from a sender. The system server receives from the sender a send request, a digital file with a recipient's email address and phone number.

Passive sensor reader authentication protocol

According to various aspects, systems and methods are provided for secure communication between a passive sensor node and a reader. A passive sensor node may be used for monitoring in a variety of situations.

Methods and apparatus to establish a connection between a supplicant and a secured network

Methods, apparatus, systems and articles of manufacture to establish a connection between a supplicant and a secured network are disclosed. An example method includes relaying, by executing an instruction with a processor, a first request for access to a secured network received from a supplicant to an authentication server.

Systems and methods for managing a plurality of wind power plants

Systems and methods for managing wind power plants (wpps) having a plurality of wind turbines are provided. The system includes a central server in communication with one or more wpp servers through an external network, wherein each wpp server is associated with a corresponding wpp.

Enabling cross-realm authentication between tenant and cloud service provider

A first network adapter is inserted into a first resource server of each tenant of a plurality of tenants serviced by a cloud service provider. The first network adapter is configured to be controlled by the cloud service provider.

Key exchange and mutual authentication in low performance devices

Securely exchanging keys to establish secure connections to low powered connected devices (lpcds), such as smart devices and iot (internet of things) devices, and mutual authentication between these devices and third party controllers is accomplished via a higher performance machine configured with a dedicated remote service (drs). A known symmetric pre-shared key (psk) is used to establish a secure first connection between the lpcd and the drs using another symmetric key.

Authentication of a transferable value or rights token

A transferable value or rights system where the value or rights can be passed from entity to entity as required and is protected by a validation database that enables validation of the current state of both pockets and unspent tokens or coins.. .

Method and system for providing security for the first time a mobile device makes contact with a device

A method providing security the first time a mobile device makes contact with a device including a trusted entity introducing asymmetric key into a mobile device, performing a key exchange method on contact-making resulting in a shared key in the mobile device and in the device, generating a first signature with the symmetric key using the shared key in the mobile device, generating a second signature with the symmetric key using the shared key in the device, transmitting the first signature to the device and the second signature to the mobile device, authenticating the device by cryptographic verification of the second signature with the symmetric key in the mobile device, authenticating the mobile device by cryptographic verification of the first signature with the symmetric key in the device, and continuing contact-making in the event of mutual successful authentication or termination of contact-making if at least one authentication has failed.. .

Object authentication device and object authentication method

An object authentication device includes a speech recognition unit configured to obtain candidates for a speech recognition result for an input speech and a likelihood of the speech as a speech likelihood and an image model generation unit configured to obtain image models of a predetermined number of candidates for the speech recognition result in descending order of speech likelihoods, wherein the image model generation unit initially performs retrieval from an image model database storing the image models when the image models for the candidates for the speech recognition result are generated and generates an image model from information acquired from a network if the image model is not stored in the image model database.. .

Object authentication device and object authentication method

An object authentication device includes a speech recognition unit configured to obtain candidates for a speech recognition result for an input speech and a likelihood of the speech as a speech likelihood, an image model generation unit configured to obtain image models of a predetermined number of candidates for the speech recognition result in descending order of speech likelihoods, an image likelihood calculation unit configured to obtain an image likelihood based on an image model of an input image, and an object authentication unit configured to perform object authentication using the image likelihood, wherein vocabularies predicted through speech recognition are categorized and the image model is formed in association with a category.. .

Money handling machine, money handling system and money handling method

A money handling machine (for example, a money depositing/dispensing machine 100) includes: a coin-roll storage unit (for example, a coin-roll storage device 180) configured to store a coin roll; an authentication unit 107 configured to authenticate an authority of an operator; and a controlling unit 102 configured to control the coin-roll storage unit so as to dispense the coin roll to replenish a plurality of settlement places 20 at a time only when the authority of the operator authenticated by the authentication unit 107 is a predetermined authority.. .

Terminal device and gate management system

A terminal device executes a biometric authentication process. The terminal device includes: a memory; and a processor coupled to the memory and configured to: activate the biometric authentication process when the terminal device is detected to approach a predetermined entering/leaving management device; and output authentication information readable by the predetermined entering/leaving management device when the biometric authentication process is determined to be successful..

Cloud based authentication system

A cloud based authentication method for determining the authenticity of a plurality of a typically counterfeited product each held in a sealed product packaging and for sale to a consumer. A unique identifier is created for each package, attached to the package and stored in the cloud.

Social checkout widget generation and integration apparatuses, methods and systems

The social checkout widget generation and integration apparatuses, methods and systems (“cwi”) transforms developer credentials, codes and parameter inputs via the cwi component into buy widgets, payment acceptance and purchase transaction outputs. In one embodiment, the cwi may facilitate obtaining a plurality of authentication parameters and widget customization parameters.

Modules, systems, and methods for incentivizing green driving

An authentication and verification module for incentivizing green driving includes one or more processors, network interface hardware configured to communicate with a remote server, one or more auxiliary sensors for outputting a verification signal, and one or more memory modules. The one or more memory modules store logic that, cause the authentication and verification module to: receive a diagnostic signal from an onboard diagnostics module of a vehicle, receive the verification signal from the one or more auxiliary sensors, compare the diagnostic signal with the verification signal, and transmit a driving behavior communication with the network interface hardware to the remote server when the verification signal and the diagnostic signal are within a predetermined threshold from one another.

Device and performing payment using utterance

An electronic device includes a touch screen display, a biometric sensor, an audio interface, a wireless communication circuit, a processor, and a memory. The memory stores instructions causing the processor to receive a selection of a first authentication scheme for a payment in a default scheme, to set the first authentication scheme as the default scheme, to receive a user utterance indicating a payment action task using a second authentication scheme, to transmit data associated with the user utterance to an external server, to receive a response including a state sequence of the electronic device for performing the payment action task and a parameter associated with the second authentication scheme, to perform the payment action task depending on the state sequence in the second authentication scheme, and to provide a user interface for changing the default scheme to the second authentication scheme..

Biometric authentication for, and secure electronic tracking of, restricted over-the-counter drug sales

A mobile device is provided that includes biometric sensor(s), and a processor that causes the biometric sensor(s) to acquire a physiological marker of a user, and identify and authenticate the user. The processor sends a message to an authentication server that indicates the user is authenticated, and receives a response from the authentication server that includes a unique authentication code.

Authentication using transaction history

A method and system include receiving a request to initiate a purchase transaction with a payment card product; generating a message to verify an authenticity of a cardholder of the payment card product, wherein the message includes a request for data about a previous transaction executed with the payment card product; receiving, in response to the generated message, input from the cardholder; comparing the input from the cardholder to stored data associated with the previous transaction; and one of confirming the cardholder as a true owner of the payment card product or denying the cardholder as the true owner of the payment card product based on the comparison. Numerous other aspects are provided..

Transaction authentication platform

A method and system are disclosed in an electronic payment network, for associating a payment card of a cardholder with a personal computing device of the cardholder, then authenticating the payment card in electronic transactions processed in the network. The card and a device activation code are input to the cardholder device by the cardholder, then communicated sent to a remote server for obtaining a card token.

Systems and methods for communicating token attributes associated with a token vault

Systems and methods for interoperable network token processing are provided. A network token system provides a platform that can be leveraged by external entities (e.g., third party wallets, e-commerce merchants, payment enablers/payment service providers, etc.) or internal payment processing network systems that have the need to use the tokens to facilitate payment transactions.

Method for providing payment service having plug-in service, and electronic device therefor

An electronic device and method are disclosed herein. The electronic device includes a touch screen display, a wireless communication circuit, a processor and a memory.

System for proxy payment based on shared electronic commerce shopping cart, method thereof and non-transitory computer readable storage medium having computer program recorded thereon

Disclosed are a system for proxy payment based on a shared electronic commerce shopping cart, a method thereof and a non-transitory computer readable storage medium having computer program recorded thereon. That is, according to the present invention, the payment terminal performs the proxy payment function for one or more products selected by the proxy payment request terminal, thereby enabling proxy payment (alternatively, proxy purchase) without sharing the authentication information associated with the payment terminal with the purchase request terminal, protecting personal information of the payer because the authentication information is not shared, and providing a delivery state inquiry function to both the payment terminal and the purchase request terminal..

Product authentication method and system thereof

The disclosure is related to a product authentication method involving obtaining object information having a first object code and a second object code from a machine-readable graphic code of an object; authenticating a selling status in relation to the object according to the obtained information; and determining a fraud status in relation to the object according to the selling status in relation to the object.. .

Product authentication method and system thereof

The disclosure is related to a product authentication method including obtaining object information having a first object code and a second object code from a machine-readable graphic code of an object; generating an authentication code corresponding to the obtained object information; generating transaction information comprising the authentication code, and marking a flag in relation to the object in a database; generating a time stamp when the transaction information is generated; and authenticating the validity of the object according to the time stamp and the flag using the authentication code.. .

Electronic atm cash withdrawals

The present disclosure generally relates to an electronic system and method for cash withdrawals from automated teller machines (atms). The system comprises a server operative within a financial network, the server configured for performing steps of the method, comprising: receiving, by a first financial institution which the user is a customer of and from the electronic device, a user request comprising details of a selected atm and a cash amount to be withdrawn therefrom; generating, by the first financial institution, transaction data based on details of the user request, the transaction data including authentication data; communicating the authentication data from the first financial institution to the electronic device; communicating the transaction data from the first financial institution to a second financial institution operating the selected atm; and reserving, by the second financial institution, the cash amount in the selected atm for a predefined time period, wherein the reserved cash amount is withdrawable from the selected atm in response to user input of the authentication data at the selected atm within the predefined time period..

Self-service kiosk devices and systems and operation therewith

Various embodiments herein each include at least one of systems, devices, methods, and software for self-service kiosk devices and systems and for the operation therewith. One embodiment, in the form of a method, includes receiving input defining a transaction with regard to an account to be conducted at a self-service kiosk device and staging the transaction defined by the received input.

Dynamic authentication use with legacy terminals

In one embodiment, the present invention provides a method and communication device with an emulated mag stripe capability. Information is transmitted in the mag stripe data indicating that the communication device has chip capability as well.

Finger guide device with switch

A finger guide device that positions a finger (or minutiae containing digit) of a human subject on a fingerprint sensor in a manner optimal for the data capture operation of authentication of identification of said subject, wherein a relevant portion of the finger is in alignment with a sensor or scanner. The finger guide device may also be used for enrollment of the initial fingerprint data into the system.

Methods and systems for providing secured access to big data

In one embodiment, a method for providing access to big data is disclosed. The method includes receiving biometric data of a user to provide access to columns of a table storing the big data, wherein one or more columns of the table are masked based on one or more data parameters and authenticating the user by comparing the biometric data of the user with pre-stored biometric data, wherein the pre-stored biometric data is retrieved from a biometric database.

Method and secure computing device start up

The present invention provides methods and devices for secure computing device start up. The method includes generating a public/private key pair and signing a software image and obtaining a first time stamp and a second time stamp.

Device and password generation in a user device

A device (100) and a method for password generation. When password generation is triggered (s20), a processor (110) of the device (100) applies (s21) a function to constant and non-constant parameters in or around the device (100) to obtain a value from which the password is generated (s22).

Method and system for securing user access, data at rest and sensitive transactions using biometrics for mobile devices with protected, local templates

Biometric data are obtained from biometric sensors on a stand-alone computing device, which may contain an asic, connected to or incorporated within it. The computing device and asic, in combination or individually, capture biometric samples, extract biometric features and match them to one or more locally stored, encrypted templates.

Authentication method, device and system

The present invention provides methods, devices, and systems for device identity authentication. A method for identity authentication comprises: obtaining, by one or more processors associated with an authenticatee terminal, a device encryption key, obtaining, by one or more processors associated with the authenticatee terminal, second data based at least in part on the device encryption key and first data, wherein obtaining the second data comprises at least one of signing or encrypting the first data, and the first data comprises a random number, generating, by one or more processors associated with the authenticatee terminal, an authentication code based at least in part on the second data and an identifier (id) of the authenticatee terminal, and communicating, by one or more processors associated with the authenticatee terminal, the authentication code to an authenticator equipment..

System and integrating two-factor authentication in a device

A system and method for providing secondary-factor authentication with a third party application that can include enrolling a device application instance of an account into a secondary-factor authentication service on behalf of a service provider that includes at the secondary-factor authentication service, receiving a secondary factor of authentication enrollment request of an account, the request received from the service provider, transmitting an activation code, and pairing the device application instance with the account through the activation code; receiving an authentication request identifying the account; transmitting an authentication request to the device application instance paired with the account; validating a response to the application request; and transmitting an assessment to the service provider.. .

Authentication a computing device using interactive game board and game piece images

An authentication method and system includes a computing device, such as a smart phone, which includes a display for presenting a graphical and interactive game board that is used for entering a user's passcode. During the authentication process, the user selects a game board (e.g.

Shoulder-surfing resistant authentication methods and systems

A shoulder-surfing resistant authentication method and system includes a computing device, such as a smart phone, which includes a display for presenting an interactive virtual environment. During the authentication process, the user enters a passcode by modifying one or more attributes of one or more icons that are presented relative to the interactive environment.

Utilization of biometric data

A method of capturing and storing a plurality of biometric data by a user on a device for a future authentication request is presented. The method includes receiving a first input from a user, through a user input mechanism of the device.

Method for adaptive authentication and electronic device supporting the same

An electronic device and method are disclosed herein. An electronic device includes one or more biometric sensors, a memory configured to store an authentication setting table associated with one or more authentication methods associated with one or more authentication levels, and a processor operatively connected to the memory and the one or more biometric sensors.

Robot system having biometric authentication function

A robot system includes a robot, and an rf tag, the rf tag including a detection device for detecting biometric authentication information of an individual, a memory for storing unique biometric authentication information of an authorized person which is authorized to perform operations related to a task of the robot, a first processor for obtaining a biometric authentication result by comparing the biometric authentication information detected by the detection device with the unique biometric authentication information stored in the memory, and a first antenna for transmitting the biometric authentication result obtained by the first processor. The robot system further includes a control device including a second antenna for receiving the biometric authentication result transmitted from the rf tag, wherein the control device advances a process of the operation when the biometric authentication result indicates that the individual is the authorized person..

Electroencephalography (eeg) based authentication

An authentication method, system, and computer program product for decoding brain activity into a brain pattern sequence, applying brain dialogue to interact with a user while the user is entering the brain pattern sequence, and matching the brain pattern sequence with a predetermined password to allow access to a system.. .

Multifactor strong authentication

Techniques are disclosed relating to multi-factor authentication of a user. In one embodiment, a computing device presents a one-time password to a user that has a sequence of characters.

Authentication methods and systems using interactive three-dimensional environments

An authentication method and system, includes a display to present interactive three-dimensional (3d) virtual environments. The manner or sequence in which a user interacts with objects in the interactive 3d environment is used to form their passcode.

Approach for displaying information on interactive whiteboard (iwb) appliances

An iwb appliance includes a tracking board application that causes first data to be displayed on a display of the iwb appliance in a display-only manner, and second data to be displayed on the display of the iwb appliance in an editable manner. The first data and the second data are displayed on one or more other iwb appliances that are different than the iwb appliance, and at least a portion of the second data was edited at an iwb appliance from the one or more other iwb appliances.

Communication terminal, communication system, communication control method, and non-transitory computer-readable medium

A shared terminal includes circuitry. The circuity controls a display to display an image to a plurality of users, and obtains, from a first terminal of a first user, first terminal identification information.

Information processing apparatus, control method, and storage medium

In a case where a specified printing apparatus includes an operation screen on which authentication information used for authentication processing is displayed, a message for prompting an input of the authentication information displayed on the operation screen is displayed on a display unit of an information processing apparatus. On the other hand, in a case where the specified printing apparatus does not include the operation screen on which the authentication information used for the authentication processing is displayed, a message for prompting printing is displayed on the display unit of the information processing apparatus..

Nanostructured phosphorescent pigment and uses thereof

The present invention relates to a nanostructured phosphorescent pigment comprising an al2o3 substrate; mal2o4:x nanocrystals, where m is a cation selected from ca2+, sr2+, ba2+, mg2+, zn2+ and combinations thereof and where x is a cation selected from eu2+, dy3+, nd3+, er3+, la3+, lu3+, ce3+, y3+, sm3+, gd3+, tb3+, tm3+, yb3+ and combinations thereof, disposed on the al2o3 substrate; and nanocrystals of molten salt disposed on the mal2o4:x nanocrystals. Additionally, the invention relates to a method for preparing the nanostructured phosphorescent pigment of the invention comprising the steps of i) mixing starting materials comprising a cation m precursor, a cation x precursor, al2o3 and a molten salt; ii) heating the mixture resulting from step (i) in reducing atmosphere.

Authorizing drone access to fulfillment centers

Systems and methods for authorizing drones with access to airborne fulfillment centers (afcs) and other warehouse facilities are described. For example, the systems and methods perform multiple authentication processes, including a physical authentication process and a virtual or electronic authentication process, when determining whether a drone is authorized to access an afc.

Charging rescue all-electric vehicles

A charging rescue system and method for all-electric vehicles comprises: a rescue vehicle app, a charging rescue vehicle, a rescued vehicle app, and a rescue platform. The rescue vehicle app comprises a user module, an order module, a monitoring module, and a communication module.

Interactive recruitment game

Disclosed is an automated recruitment game for identifying candidates having desired traits. The game can include some or all of the following computer implemented steps: creating a user identity for each candidate, associating the user identity with a specific electronic device, creating a game tailored to identify a plurality of desired traits in candidates, presenting the tailored game to the candidate on the specific electronic device associated with the candidate's user identity, wherein the manner in which the tailored game is presented is selected based on a degree of desired authentication of the candidate, scoring the candidates game play of the tailored game and comparing the score to a set of limits, and automatically informing the candidate of at least one next step in a recruitment process based on the comparison of the candidates score to the set of limits..

Authentication reader and a dispenser comprising the authentication reader

An authentication reader and a dispenser comprising the authentication reader for authenticating a product having a taggant ink disposed on the product's surface.. .

Position authentication

A method performed under control of an electronic device may include receiving at least one signal from at least one anchor point; calculating a location of the electronic device based at least in part on the at least one received signal; generating a position proof based at least in part on the at least one received signal; and in response to receiving a position proof request from a server, transmitting the position proof to the server, when the position proof corresponds to the position proof request.. .
Industry-academic Cooperation Foundation, Korea National University Of Transportation

Requesting system information

Systems and methods to request system information are provided. In some aspect, a user equipment (ue) transmits a request for on-demand system information.
Blackberry Limited

Enabling secured wireless access at hotspot by providing user-specific access credential for secure ssid during sign-up process conducted over open wireless network

A hotspot provides an open wireless network and a secure wireless network. The open wireless network has no network-level encryption and allows open association therewith.
Guest Tek Interactive Entertainment Ltd.

Method, device and system for authenticating to a mobile network and a server for authenticating devices to a mobile network

The invention relates to a method for authenticating to a mobile network. According to the invention, the method comprises the following steps.
Gemalto Sa

Method to authenticate a subscriber in a local network

The present invention relates to a method to authenticate a subscriber (imsii) within a local network (lnj) comprising preliminary step of deriving a subscriber key (smki) in local keys (lki), one local key (lkilnj) for each local network (lnj) the subscriber (imsii) is authorized to access, provisioning each local network (lnj) the subscriber (imsii) is authorized to access with its own local key (lkilnj). When an authentication is required in a given local network (lnj), an uicc application derives a local key (lkilnj) in the uicc application of the subscriber (imsii) using the network identifier (lnj), the key derivation function (kdf) and the subscriber key (smki) and use the derived local key (lkilnj) in the algorithm to perform local authentication in the local network (lnj)..
Gemalto Sa

Terminal authentication

Embodiments provide a terminal authentication method and device. The method includes that: a service provider (sp) device receives a first authentication request sent by a first terminal, the first authentication request including a first identity credential of a user; the sp device determines an identifier (id) of the user and a priority of the first identity credential according to the first authentication request; the sp device sends context data of the user to the first terminal through a cloud service; and the sp device enables a first service for the first terminal according to the priority of the first identity credential.
Guangdong Oppo Mobile Telecommunications Corp. Ltd.

System, method, and secure telematics communication

A method includes receiving registration information regarding a telematics unit and a control system for each equipment piece in a plurality of equipment pieces; receiving a seed from a control system via a telematics unit for a particular equipment piece in the plurality of equipment pieces responsive to reception of a telematics session request by the control system for the particular equipment piece of the plurality of equipment pieces; authenticating the telematics unit and the control system for the particular equipment piece based on information included with the seed and the registration information; generating an encrypted key responsive to the authentication; and providing the encrypted key to the control system via the telematics unit to establish a proprietary data communication channel from the control system to the processing circuit via the telematics unit for the particular equipment piece.. .
Cummins, Inc.

Pinning encryption metadata to segment uris

In one embodiment, a method, comprising obtaining a first uniform resource identifier for a segment of a content item, obtaining encryption metadata indicative of encryption information to be used for encrypting the segment when the segment is requested by a client device or a content delivery network, generating a data combination based on the first uniform resource identifier and the encryption metadata, generating an authentication code or a signature by applying a secret to the data combination, the secret being unknown to the client device or the content delivery network, generating a second uniform resource identifier for the segment based on the authentication code or the signature, the encryption metadata and the first uniform resource identifier, inserting the second uniform resource identifier in an adaptive bitrate media playlist for the content item, and sending the adaptive bitrate media playlist to the client device or the content delivery network.. .
Cisco Technology, Inc.

Information processing apparatus, non-transitory computer readable medium, and information processing system

An information processing apparatus includes plural communication units, first and second authentication units, a selection unit, and a transmission unit. The plural communication units are connected to one or more communication lines.
Fuji Xerox Co., Ltd.

Providing printed confidential documents

Examples of providing printed confidential documents are described herein. In an example, a printing system includes at least two protected trays to store printed confidential documents.
Hewlett-packard Development Company, L.p.

Network access speech recognition service based on artificial intelligence

The present disclosure discloses a network access method and a network access apparatus for speech recognition service based on artificial intelligence. The network access method includes: judging whether there is available ip address information in an ip buffer module when a speech recognition request is received, in which the ip buffer module is configured to buffer ip address information used for a speech recognition performed successfully last time; performing an identity authentication on the available ip address information when there is the available ip address information in the ip buffer module; and accessing to the speech recognition service via the available ip address information passing the identity authentication, in which the speech recognition service is configured to recognize a speech in the speech recognition request..
Baidu Online Network Technology (beijing) Co., Ltd.

Exchanging message authentication codes for additional security in a communication system

In an aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. The apparatus may establish a communication link based on the 1905.1 protocol with at least one second ap.
Qualcomm Incorporated

Method and device for examining message integrity check

The method includes: an m-ue home domain prose function entity receives a monitoring authentication request response message sent by an a-ue home domain prose function entity and acquires first information from the monitoring authentication request response message, in which the first information is used for generating a first mic; the m-ue home domain prose function entity receives a match report sent by an m-ue and acquires second information from the match report, in which the match report carries a second mic and the second information, and the second information is used for generating the first mic; and the m-ue home domain prose function entity generates the first mic according to the first information and the second information and examines the first mic and the second mic.. .
Zte Corporation

Techniques for implementing a data storage device as a security device for managing access to resources

Techniques are disclosed for implementation of a data storage device as a security device for managing access to resources. These techniques can be implemented for multi-factor authentication (mfa) to provide multiple layers of security for managing access to resources in an enterprise and/or a cloud computing environments.
Oracle International Corporation

Optimizing data replication across multiple data centers

Aspects of the disclosure relate to optimizing data replication across multiple data centers. A computing platform may receive, from an authentication hub computing platform, an event message corresponding to an event associated with the authentication hub computing platform.
Bank Of America Corporation

Terminal management apparatus, terminal management system, and non-transitory computer readable medium

A terminal management apparatus includes a connection unit that connects, through a network, to a terminal apparatus to be managed, an authentication unit that authenticates the terminal apparatus using predetermined authentication information, a specific state determination unit that determines whether a predetermined specific state, in which a normal connection is not established, has occurred in relation to the terminal apparatus, and a connection controller that controls data communication with the terminal apparatus on a basis of a result of the authentication performed by the authentication unit and a result of the determination made by the specific state determination unit.. .
Fuji Xerox Co., Ltd.

Device credentials management

A technology is described for resolving device credentials for a device. An example method may include receiving device credentials for management by a service provider.
Amazon Technologies, Inc.

Biometric authentication of individuals utilizing characteristics of bone and blood vessel structures

Biometric authentication of a subject utilizing bone and/or blood vessel (vein or artery) structures is provided. A vertice profile is generated from a non-invasive, multi-dimensional image scan of a subject or a portion thereof.
Youaretheid, Llc

Methods and establishing a secure communication channel

A method for establishing a secure communication channel between an off-card entity and an embedded universal integrated circuit card (euicc) is provided. The method involves establishing symmetric keys that are ephemeral in scope.
Apple Inc.

Control authentication/authorization server, resource server, and authentication/authorization system

A server is provided that, according to an access token issuance request from a client, issues a first access token to be verified by a resource server, or a second access token to be verified by an authorization server based on a predetermined parameter for the issuance request.. .
Canon Kabushiki Kaisha

Desktop application fulfillment platform with multiple authentication mechanisms

A service provider system may include an application fulfillment platform that delivers desktop applications to desktops on physical computing devices or virtual desktop instances. A computing resource instance may be registered with the platform, which generates a unique identifier and a security token for the computing resource instance using multiple authentication mechanisms.
Amazon Technologies, Inc.

Multi-factor masked access control system

A multi-factor authentication system supports a variety of password entry mechanisms (e.g., alphanumeric, visual, voice, etc.) that can be used to authenticate a user to access multiple application/website destinations. Example methods and systems include a real-time password generator that creates unique and complex passwords independent of internet connectivity for multiple different service providers (e.g., third party applications, cloud services, websites, etc.
Regwez, Inc.

Using an ip multimedia subsystem for http session authentication

Disclosed is a method and system for utilizing an internet protocol multimedia subsystem (ims) to authenticate an http session between a communication device and an online application program. The method includes registering a communication device on an ims, and generating an authorization token which is sent to the communication device.
T-mobile Usa, Inc.

Secure domain name system

A method and system for authenticating answers to domain name system (dns) queries originating from recursive dns servers provided. A verification component provides a versification that a dns query originated from the recursive dns server.
Neustar, Inc.

Downloadable security and protection methods and apparatus

Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional access (ca), digital rights management (drm), and trusted domain (td) security policies are delivered, configured and enforced with respect to consumer premises equipment (cpe) within a cable television network.
Time Warner Cable Enterprises Llc

Distributed authentication

Examples associated with distributed authentication are described. One example includes generating a paired public key and private key associated with a user.
Hewlett-packard Development Company, L.p.

Secure and noise-tolerant digital authentication or identification

Secure data processing is described. Particular systems and methods involve enrollment units and methods, where the method includes obtaining an input data representing a raw data associated with a user, generating a template for the input data, and storing the template in an enrollment database, optionally with an identifier for the user.
Zebrapet Llc

Encrypted data sharing with a hierarchical key structure

A data set shared by multiple nodes is encrypted. The data set can be split into independent records.
Avast Software S.r.o.

Method and transmitting data from several respirators

An apparatus and a method for the transmission of data from several respirators, each having at least one interface to a relay station and a data channel to the relay station. The data channel is unidirectional from the respirator to the relay station and supports at least two redundant technologies for the data transfer.
Loewenstein Medical Technology S.a.

Artificial intelligence-based for voiceprint authentication

Disclosed are an artificial intelligence-based method and device for voiceprint authentication. The method comprises receiving a registration request of a user and providing a registration string to the user; receiving voice information of the user reading the registration string and producing n segments of voice on the basis of the voice information, where n is a positive integer; determining a gender tag of the user on the basis of a gender classification model and the n segments of voice; and producing a registration voiceprint model for the user on the basis of the gender tag and the n segments of voice..
Baidu Online Network Technology (beijing) Co., Ltd.

System and authorizing financial transactions with online merchants

A system for authorizing a financial transaction of a financial presentation device such as a credit or debit card being presented from a customer to an online merchant. The system includes a peripheral device having a processor configured to generate a dynamic verification value for the card which changes for each financial transaction, and to transmit the dynamic verification value to a user computer via an i/o interface during an online transaction.

Method for automated authentication of a security label

A method for automated authentication of a security label comprises capturing a first image of the security label under a first lighting condition and capturing at least a second image of the security label under a second lighting condition. Further, the first image and the second image are verified to check whether the first image and the second image meet pre-defined expectation under the first lighting condition and the second lighting condition respectively.
Selfdot Technologies (opc) Pvt Ltd

Information processing apparatus, information processing method, program, and information processing system

An information processing apparatus provides an enhanced capability of authentication safety when unlocking. The information processing apparatus includes communication circuitry configured to receive an unlocking request and first information generated based on a first secret key, from a first communication terminal and control circuitry configured to determine whether or not to cause a locking circuit to unlock, based on a first public key corresponding to the first secret key and the generated first information..
Sony Corporation

Duplicate image evidence management system for verifying authenticity and integrity

The present disclosure relates to a duplicate image evidence management system for verifying authentication and integrity, the duplicate image evidence management system being capable of verifying that a duplicate image has authentication and integrity when an original image generated by an image storage device is copied by an image collecting device. The duplicate image evidence management system according to the present disclosure includes: an image generating unit for generating an original image; a hash generating unit for generating an original hash value for the original image; a hash checking unit for checking whether the original hash value is changed; and a duplicate image generating unit for copying the original image so as to generate a first duplicate image and generating a first hash value for the first duplicate image, when it is checked by the hash checking unit that the original hash value is not changed..
Hanwha Techwin Co., Ltd.

Optically visible carbon nanotube with nanocrystals decoration as unique id

A unique id using optically visible carbon nanotubes with nanocrystal decoration is provided. In one aspect, a method for creating a unique id includes: providing a substrate having an array of trenches; randomly placing carbon nanotubes throughout the array such that each trench either contains a carbon nanotube or does not, wherein the random placement of the carbon nanotubes throughout the array of trenches includes code information that forms the unique id; and coating the carbon nanotubes with optically visible nanocrystals.
International Business Machines Corporation

Authentication system for controlling access and use based on heartbeat shape

Authentication system for enabling access or use includes a housing, a database of fingerprint and heartbeat data, a fingerprint sensor having a surface on an exterior of the housing onto which a person places their finger, and a heartbeat monitor that obtains data about presence of any heartbeat from a person whose fingers are placed onto the surface of the fingerprint sensor. A processor coupled to the fingerprint sensor, heartbeat monitor and database operatively compares the obtained fingerprint and heartbeat shape derived from heartbeat data to corresponding fingerprint and heartbeat shape data to determine whether the fingerprint and heartbeat shape data are indicative of a person authorized for access or use.
Intelligent Technologies International, Inc.

Key download pos terminal

A key download method for a pos terminal, comprising: setting a device authentication key pair and a device encryption key pair in the pos terminal during a production or maintenance phase of the pos terminal; according to a remote authentication key pair set by a remote key server and the device authentication key pair of the pos terminal, the pos terminal and the remote key server authenticating each other; after the authentication succeeds, bounding a certificate of the remote key server to the pos terminal device; according to the device encryption key pair and a temporary transmission key, the pos terminal downloading the master key from the remote key server. The above method can download the master key through a network outside a security center, the security is high, the transportation cost can be saved, and the efficiency is high..
Pax Computer Technology (shenzhen) Co.,ltd.

Secure remote transaction framework

Embodiments of the invention are directed to systems and methods of providing secure remote transaction (srt) transactions. In some embodiments, upon selection of a checkout element, a user may be identified with respect to a transaction to be completed.

Pull and push system for x-pay digital wallets

Provided are systems and methods for extending qr and person-to-person based digital wallet payments to non-issuer digital wallets. In one example, the method may include receiving a send request to send payment from a sending account of a digital wallet to a receiving account, executing an authentication protocol between the mobile device and an issuer of the sending account, pulling the requested payment from the issuer of the sending account to the sponsor system, where the pulling shifts a liability of a chargeback to the issuer of the sending account, and pushing the requested payment from the sponsor system to an issuer of the receiving account.
Mastercard International Incorporated

System and conducting secure credit, debit, and retail card transactions

The system includes a transaction card having a card identifier number, a telecommunications network through which a user and service provider are capable of communicating a service provider database for storing at least the card identifier number against a corresponding authentication pin number, a ussd protocol through which the user is capable of securely communicating with the service provider through a ussd gateway and a mobile telecommunications device for enabling the user communications. The mobile device comprises means for enabling the user to dial a ussd string for initiating communication between the user and the service provider through the ussd protocol via the telecommunications network; enabling the user to input the authentication pin number, wherein the service provider database is in use interrogated with the inputted authentication pin number to authenticate the user and on authentication, enabling the user to send a command to switch the card and/or a card account linked between passive, active, or stopped states..
U-lock (pty) Ltd.

Digital media distribution computer system

The invention claimed is a digital media distribution system involving administration of digital copyright ownership registration and license purchase transactions of digital media under copyright licensure. Important aspects of the claimed invention presented include aspects such as user authentication methods, transaction administration methods and server features, and copyright protection mechanisms.

Resource processing

Resource processing methods and devices are disclosed. The method comprises: receiving authentication information and business resource quantity information sent by a terminal, wherein the authentication information has an association relationship with a first account and the terminal is bundled with a second account; determining, according to the association relationship between the authentication information and the first account, the first account corresponding to the authentication information; acquiring, according to the business resource quantity information and from business resources of the first account, business resources corresponding to the business resource quantity information and forwarding the acquired business resources to the second account..
Alibaba Group Holding Limited

Authentication of a bottle and of its content

An electronic device for authentication of a bottle whose neck is closed by a stopper covered by a cap is positioned between the bottle and the cap, with an electronic circuit including: a flexible insulating support with at least one conducting wire forming circuit traces; an electronic chip storing identification datum for the bottle, an antenna to transmit the identification datum to an external reader when the antenna is in the area of coverage of the reader; a unit for detecting piercing of stopper at least partially covering the neck when the device is positioned between the bottle and the cap, and which are linked electrically to the electronic chip by the tracks of the circuit, the electronic chip being configured in such a way as to determine that the stopper is removed and/or pierced when the electrical link with the unit of detecting piercing of stopper is broken.. .

Sensor array system selectively configurable as a fingerprint sensor or data entry device

Devices, systems, and methods facilitate enrollment of authenticating biometric data for authenticating an authorized user via a biometric sensor. Included devices transmit power to a sensor-enabled device that does not have an independent power source without transmitting data to or from the device.
Idex Asa

Sensor array system selectively configurable as a fingerprint sensor or data entry device

Devices, systems, and methods facilitate enrollment of authenticating biometric data for authenticating an authorized user via a biometric sensor. Included devices transmit power to a sensor-enabled device that does not have an independent power source without transmitting data to or from the device.
Idex Asa

Electronic device and authenticating biometric data through plural cameras

An electronic device and method of recognizing biometric data are provided. The electronic device includes a first camera configured to acquire an image through visible light; a second camera configured to acquire an image through infrared rays; a display; a memory; and a processor configured to receive a request associated with biometric authentication for a user, in response to the request, identify context information associated with the electronic device; when context information corresponds to a first condition, provide to the display a first image corresponding to the biometric authentication and acquired by the first camera, and perform the biometric authentication using biometric data acquired from the second camera; and when the context information corresponds to a second condition, provide to the display a second image corresponding to the biometric authentication and acquired by the second camera, and perform the biometric authentication using biometric data acquired from the second camera..
Samsung Electronics Co., Ltd.

Method of recognition based on iris recognition and electronic device supporting the same

An iris-based authentication method is provided. The method includes emitting light of an infrared wavelength band and obtaining an image based on the light of the infrared wavelength band, determining whether a specified condition is satisfied, if the specified condition is satisfied, performing user authentication (e.g., complex authentication) based on at least part of a face image and an iris image of the image that a biometric sensor obtains, or, if the specified condition is not satisfied, performing the user authentication (e.g., iris-only authentication) based on the iris image in the image that the biometric sensor obtains..
Samsung Electronics Co., Ltd.

Face authentication device having database with small storage capacity

Face authentication can easily be performed based on an input image including a mirror region reflected by a mirror without increasing a storage capacity of a database. With the database, for each face of a person to be authenticated, only one real front image is to be registered as a reference face image.
Nec Corporation

Composite fingerprint authenticator

A computer-implemented method for authenticating a composite fingerprint includes executing on a computer processor the step of receiving the composite fingerprint, wherein the composite fingerprint is a thermal image of a reference finger with a thermal impression of another finger from a thermal scanner. The composite fingerprint is authenticated according to a known fingerprint of the reference finger and a known fingerprint of the other finger.
International Business Machines Corporation

Systems and methods for secure, message-based delivery of mobile application requests

The disclosed invention comprises systems and methods for delivery of mobile applications' requests for services to network devices or apparatus in a secure environment. The invention features web-based configuration services allowing for the definition of delivery systems' components, including mobile devices, delivery channels, machine handlers, endpoints and pre-authentications.

Authentication management

Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset.
International Business Machines Corporation

Method and system for authenticating identity using variable keypad

The present invention relates to a system for authenticating a financial transaction, and a combination password and signature information identity authentication server, according to one embodiment of the present invention, comprises: a variable keypad generating unit for generating a variable keypad including encryption keys and a signature input part which receives an input of the signature of a user, wherein the position of each of the encryption keys is changed every time the encryption keys are generated; an authentication information saving unit for saving authentication information of a user of a mobile terminal; and an authentication unit for receiving, from the mobile terminal, position information of the encryption keys according to the order inputted by the user, and signature information inputted by the user on the signature input part, and using same to authenticate identity.. .
Harex Infotech Inc.

Securing credentials with optical security features formed by quasi-random optical characteristics of credential substrates

Systems and methods are described for securing credentials with optical security features formed by quasi-random optical characteristics (qrocs) of credential substrates. A qroc can be a pattern of substrate element locations (sels) on the substrate that includes some sels that differ in optical response from surrounding sels.
Hid Global Corporation

Trusted device

A trusted device, such as a wristwatch, is provided with authentication circuitry, used to perform an authentication operation to switch the trusted device into an authenticated state. Retention monitoring circuitry monitors the physical possession of the trusted device by the user following the authentication operation and switches the trusted device out of an authenticated state if the trusted device does not remain in the physical possession of the user.
Arm Ip Limited

Ic card and controlling ic card

An integrated circuit (ic) card of an embodiment includes a communicator, a storage storing a plurality of pieces of biometric authentication information, an acquirer, and a processor. The communicator communicates with a terminal device.
Toshiba Infrastructure Systems & Solutions Corporation

Ic card and controlling ic card

An integrated circuit (ic) card of an embodiment includes a communicator, a storage storing biometric authentication information, an acquirer, and a processor. The communicator communicates with a terminal device.
Toshiba Infrastructure Systems & Solutions Corporation

Terminal device and performing user authentication by means of biometric data

The present invention provides an authentication which is performed by means of simultaneously inputting biometric data such as fingerprint, iris and the like when inputting an authentication number, wherein input area provided to a user varies such that biometric data can be input and recognized accurately and easily. Therefore, the present invention enhances convenience for a user and increases security and reliability of authentication..
Lg Electronics Inc.

Image processing apparatus and method, including user authentication, and storage medium

An image processing apparatus which is capable of realizing security improvements without degrading the usability. A user is authenticated, and an operation screen accepting an operation input from the user is displayed.
Canon Kabushiki Kaisha

Application management platform

An integrated application management platform manages applications, such as mobile apps, during various stages in their lifecycle, such as development, testing, deployment, usage by end-users, maintenance, and/or retirement of the applications. The platform integrates the management of various aspects and elements of the lifecycle of multiple applications.
Accenture Global Solutions Limited

Storage apparatus including nonvolatile memory

A storage apparatus includes a first memory, which is nonvolatile, a first controller that controls the first memory, a wireless antenna, a second memory, which is operable based on power supplied from the wireless antenna, and a second controller that is operable based on the power supplied from the wireless antenna, and performs communication using the wireless antenna. When performing communication with an external apparatus using the wireless antenna, the second controller performs authentication of the external apparatus, and stores in the second memory an authentication result indicating whether the authentication succeeded or failed.
Toshiba Memory Corporation

Touch type distinguishing method and touch input device performing the same

A touch type distinguishing method in a touch input device including a touch screen may be provided that includes an authentication touch determination step of determining whether or not a time period for which a touch on the touch screen maintains the satisfaction of a predetermined condition is equal to or greater than a predetermined reference time period; and a touch type determination step of determining a touch type in accordance with whether or not the touch satisfies a predetermined condition, and a time period for which the touch is maintained.. .
Hideep Inc.

Account management services for load balancers

A configurable load balancer can be utilized in a multi-tenant environment, where the load balancer can incorporate, or utilize, an account management service operable to perform security tasks such as authentication, authorization, and session management. Customers can utilize the load balancer to control access that users have to resources associated with those customers, without having to build and maintain a dedicated user management system.
Amazon Technologies, Inc.

Electronic key system

Provided is an electronic key system capable of providing an instruction to an automobile through a portable device having biometric authentication of a user. When biometric information of a wearer is detected by a biometric recognition sensor, a portable device worn on a user determines with a biometric authentication unit whether or not the detected biometric information is matched with biometric information of a previously-registered user.
Image Co., Ltd.

Medical system with improved security during an interaction of a medical measuring system with a ventilator or anesthesia device via a data network

With the interaction of a medical measuring system (3) with a ventilator or anesthesia device (5) via a data network (60), data transmission security and mutual authentication between the medical measuring system (3) and the ventilator or anesthesia device (5) is improved in a medical system (1) by the use of asymmetric encryption pairs. A classification of the measuring systems (3) is possible on the basis of an identification/authentication provided by the asymmetric encryption pairs.
Drägerwerk Ag & Co. Kgaa

Information processing device and information processing method

The present technology relates to an information processing device and an information processing method that enable the convenience of a sensor unit to improve. The information processing device according to the present technology includes: an authentication unit configured to perform authentication processing with a different information processing device; and a power supply unit configured to supply power to the different information processing device with which the authentication processing has been performed, in a case where authentication of the authentication unit succeeds.
Sony Corporation

Methods and devices for cartridge authentication

A device comprises a sensor and processing circuitry coupled to the sensor. The sensor is configured to obtain authentication information from an identification label of a cartridge of an electronic vaping device.
Altria Client Services Llc

System and internet of things (iot) device authentication and security

One or more iot devices are coupled to a gateway server. The gateway server preferably includes enhanced administrative features for restricting access to iot devices, and for monitoring iot device communications.

Sim provisioning of a mobile device

There is provided a device comprising a key request module and a key receive module. The key request module is configured to transmit a key request to a provisioning server, and the key receive module is configured to receive a device root key associated with the device from the provisioning server.
Microsoft Technology Licensing ,llc

Wireless communication system

According to one embodiment, a wireless access point includes a wireless communication unit to receive an authentication frame that includes attribute information of a wireless communication terminal and to transmit a response frame in response to the authentication frame. A retransmission limit setting unit sets a limit for transmissions of the response frame based on the attribute information included in the authentication frame.
Kabushiki Kaisha Toshiba

Method and passpoint eap session tracking

Systems and methods of tracking authentication sessions performed between wi-fi-enabled devices and authentication servers via wireless access points in wi-fi networks that allow authentication messages to be easily correlated to determine the authentication sessions to which the authentication messages belong. The systems and methods employ a tracking tag that an authentication server can insert into each authentication message that it sends to a wi-fi-enabled device via a wireless access point in an authentication session.
Time Warner Cable Enterprises Llc

Apparatus, method and article for authentication, security and control of portable charging devices and power storage devices, such as batteries

A network of collection, charging and distribution machines collect, charge and distribute portable electrical energy storage devices (e.g., batteries, supercapacitors or ultracapacitors). To charge, the machines employ electrical current from an external source, such as the electrical grid or an electrical service of an installation location.
Gogoro Inc.

Method and system for peer-to-peer enforcement

Methods and systems are provided for establishing dynamic and secure peer-to-peer communications channels between terminals. A network device may intercept a connection request transmitted from a first terminal to a second terminal, over a secure network, with the connection request including a first parameter that identifies the first terminal and a second parameter that identifies the second terminal, with the first parameter and the second parameter relating to a network interface that operates according to a security protocol.
Swisscom Ag

User identity authentication

A user identity authentication method is provided, which includes that: a service provider (sp) device receives a user request sent by a terminal, the user request including an identity credential of a user; the sp device determines an identifier (id) of the user and a priority of the identity credential according to the user request; and the sp device enables corresponding service for the terminal according to the priority. In the embodiment, the sp device provides the corresponding service according to the identity credential of the user.
Guangdong Oppo Mobile Telecommunications Corp., Ltd.

Authentication of users for securing remote controlled devices

In one embodiment, a system includes a processing circuit and logic integrated with the processing circuit, executable by the processing circuit, or integrated with and executable by the processing circuit. The logic is configured to cause the processing circuit to limit functionality of a remote controlled device during periods of time that a user of the remote controlled device is not authenticated, and to receive identity information of the user of the remote controlled device via an authentication process, with the identity information establishing an identity of the user.
International Business Machines Corporation

Wireless device detection, tracking, and authentication platform and techniques

Methods, systems, and techniques for wireless device detection, information, tracking, and authentication within a platform are provided. Example embodiments provide a wireless device detection, tracking, and authentication system and methods, which enables users to detect wireless devices, obtain stored information about wireless devices, and authenticate wireless devices for a variety of purposes including determining similarity of devices based upon prior network connections, pinpointing the location of the device, verifying the cryptographic signature of the device, obtaining metadata associated with the device, and controlling the device to perform a particular action such as alerts and notifications.
Scrrd, Inc.

Wireless device detection, tracking, and authentication platform and techniques

Methods, systems, and techniques for wireless device detection, information, tracking, and authentication within a platform are provided. Example embodiments provide a wireless device detection, tracking, and authentication system and methods, which enables users to detect wireless devices, obtain stored information about wireless devices, and authenticate wireless devices for a variety of purposes including determining similarity of devices based upon prior network connections, pinpointing the location of the device, verifying the cryptographic signature of the device, obtaining metadata associated with the device, and controlling the device to perform a particular action such as alerts and notifications.
Scrrd, Inc.

Information processing device, image reading apparatus, information processing system, and non-transitory computer readable medium

An information processing device includes an accepting unit, a first transmitting unit, a receiving unit, an acquiring unit, and a second transmitting unit. The accepting unit receives identification information used by a cloud service for identifying a user and authentication information used for authenticating the user.
Fuji Xerox Co., Ltd.

Information processing system, apparatus, and information processing method

An information processing system includes an apparatus and an information processing apparatus coupled to an external device via a network. The information processing apparatus includes a first transmitting unit configured to perform authentication using authentication information provided by the apparatus, and to transmit first data denoting a completion of the authentication to the apparatus.
Ricoh Company, Ltd.

Method for website authentication and for securing access to a website

A step (220) of providing the user with the message decrypted by the second user terminal.. .

Systems and methods for endpoint management classification

A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.. .
Duo Security, Inc.

Information terminal, information processing apparatus, information processing system, and information processing method

An information terminal includes circuitry to: obtain authentication data from a first information processing apparatus; receive a discovery request broadcast from a second information processing apparatus and to transmit the obtained authentication data to the second information processing apparatus, the second information processing apparatus residing on a network different from a network where the first information processing apparatus resides; and perform a setting operation for the information terminal in accordance with a setting change request received from the second information processing apparatus via the first information processing apparatus, the second information processing apparatus being authenticated by the first information processing apparatus using the authentication data.. .

Information terminal, information processing apparatus, information processing system, and information processing method

Example embodiments of the present invention include an information terminal comprising circuitry to: read, from a medium possessed by a user, first authentication information of the user; transmit an authentication request including the read first authentication information of the user to a first information processing apparatus that manages information regarding the user; receive, from the first information processing apparatus in response to the authentication request, second authentication information associated with the first authentication information, the second authentication information to be used for allowing the user to log in to a second information processing apparatus that resides on a network different from a network where the first information processing apparatus resides; and transmit the received second authentication information to the second information processing apparatus to request the second information processing apparatus for a service corresponding to the user.. .

Electronic crowd-based authentication

Methods and systems for electronic crowd-based authentication. An example embodiment includes operations or steps for selecting authentication criteria with corresponding validity criteria through a key ring application, pairing the key ring application with authentication data, and transmitting the authentication data for verification by a security server, thereby allowing a trusted user to endorse an unregistered user to provide the unregistered user with access to a secured resource by the selecting of the authentication criteria, the pairing of the key ring application, and the transmitting of the authentication data for verification by the security server..
Conduent Business Services, Llc

System and one time password authentication

A method for authenticating an online service site in an authentication system includes: receiving, by the authentication server, from the service server, a service otp generation request including user identification information related to a user who intends to access the online service site; acquiring, by the authentication server, a user seed value related to each user identification information from the seed server in response to the service otp generation request; generating, by the authentication server, a service otp, and transmitting the generated service otp to the service server; and displaying, by the service server, the service otp in an online service site which the user accesses, wherein the user compares a service otp generated by a mobile terminal.. .
Estorm Co., Ltd

System and centralized authentication and authorization for cloud platform with multiple deployments

Techniques described herein may be used to centralize authentication and authorization for accessing cloud services provided by different cloud platform deployments. A user equipment (ue) may provide user information to a cloud admin server.
Verizon Patent And Licensing Inc.

Electronic device system, communication method and recording medium

An electronic device system includes a terminal device and an electronic device. The terminal device includes a memory and a sender.
Ricoh Company, Ltd.

Authentication apparatus, authentication method, and non-transitory computer-readable recording medium

An authentication apparatus according to the present application includes an acquiring unit, a first specifying unit, a second specifying unit, and an authentication unit. The acquiring unit acquires context information on a target user who becomes a target for authentication.
Yahoo Japan Corporation

Key distribution method, key receiving method, first key management system, and first network element

An embodiment method includes: obtaining, by a first key management system, a shared key of a first network element, where the shared key of the first network element is generated according to a key parameter obtained after the first network element performs authentication or a root key of the first network element; obtaining a service key, where the service key is used to perform encryption and/or integrity protection on communication data in a first service between the first network element and a second network element; performing encryption and/or integrity protection on the service key by using the shared key of the first network element, to generate a first security protection parameter; and sending the first security protection parameter to the first network element.. .
Huawei Technologies Co., Ltd.

Clientless connection setup for cloud-based virtual private access systems and methods

Virtual private access systems and methods implemented in a clientless manner on a user device include receiving a request to access resources from a web browser on the user device at an exporter in a cloud system, wherein the resources are located in one of a public cloud and an enterprise network and the user device is remote therefrom on the internet; performing a series of connections between the exporter and i) the web browser and ii) centralized components including a crypto service, database, cookie store, and security assertion markup language (saml) service provider (sp) component to authenticate a user of the user device for the resources; and, subsequent to authentication, exchanging data between the web browser and the resources through the exporter, wherein the exporter has a first secure tunnel to the web browser and a second secure tunnel to the resources.. .
Zscaler, Inc.

Equipment for offering domain-name resolution services

In order to offer domain name resolution services vis-a-vis resources of various security domains of a communication network, an item of equipment, on reception of a domain name resolution request coming from a client device, performs: authentication operations checking whether the client device that sent the request was previously registered; authorisation operations checking whether the client device actually has right of access to the resources of said domain name; and domain name resolution operations by means of a cache storing associations of ip addresses and domain names. The cache is populated by means of the results of domain name resolutions performed by external name servers to which said equipment resort to via respective secure tunnels, independently of said security domains, when the cache does not include data allowing to effect the domain name resolution required..
Airbus Defence And Space Sas

Authentication method and system

Provided is a computer implemented method for performing mutual authentication between an online service server and a service user, including: (a) generating, by an authentication server, a server inspection otp; (b) generating, by an otp generator, a verification otp having the same condition as the server inspection otp and using the same generation key as an otp generation key and a calculation condition different from a calculation condition is applied or a generation key different from the otp generation key is used and the same calculation condition as the calculation condition used for generating the server inspection otp is applied to generate a user otp; and (c) generating, by the authentication server, a corresponding otp having the same condition as the user otp and comparing whether the generated corresponding otp and the user otp match each other to authenticate the service user.. .
Estorm Co., Ltd

Methods and systems for universal storage and access to user-owned credentials for trans-institutional digital authentication

Described is an approach for an improved method, system, and computer program product that performs zero-knowledge proof of knowledge of user identification and/or authentication for a decentralized, trustless storage and management of user identification and/or authentication using one or more distributed ledger systems.. .
Nuid, Inc.

Authenticated network

An authenticated network having a plurality of nodes is disclosed. Each node includes a transaction unit and an identification core.

Multiple authority key derivation

Systems and methods for authentication generate keys from secret credentials shared between authenticating parties and authenticators. Generation of the keys may involve utilizing specialized information in the form of parameters that are used to specialize keys.
Amazon Technologies, Inc.

Techniques for preventing abuse of bootstrapping information in an authentication protocol

Aspects of the present disclosure implement techniques that allow an enrollee (e.g., dpp-ap or other dpp devices) to be informed of the bootstrapping method selected by a device (e.g., sta) when initiating onboarding. As such, in one example, authentication requests from the device may additionally carry information that inform the network of the bootstrapping method (e.g., qr-code, nfc, wi-fi aware, wi-fi direct) selected by the device.
Qualcomm Incorporated

System, device, and secure entry and handling of passwords

Devices, system, and methods of secure entry and handling of passwords and personal identification numbers (pins), as well as for secure local storage, secure user authentication, and secure payment via mobile devices and via payment terminals. A computing device includes: a secure storage unit to securely store a confidential data item; a non-secure execution environment to execute program code, the program code to transport to a remote server a message; a secure execution environment (see) to securely execute code, the see including: a rewriter module to securely obtain the confidential data item from the secure storage, and to securely write the confidential data item into one or more fields in said message prior to its encrypted transport to the remote server..
Arm Limited

Feed system, feed unit, and electronic unit

A feed system has a first electronic unit, a second electronic unit, and a feed unit. The first electronic unit and the feed unit are separated.
Sony Corporation

Light-emitting element, light-emitting device, light source, authentication device, and electronic apparatus

A light-emitting element according to the invention includes an anode, a cathode, a light-emitting layer which is provided between the anode and the cathode, contains a light-emitting material and a first tetracene-based compound having a tetracene skeleton functioning as a host material that holds the light-emitting material, and emits light in a wavelength region of 600 nm or more by applying a current between the anode and the cathode, and an electron transport layer which is provided between the light-emitting layer and the cathode, and includes a first electron transport layer located on the cathode side and a second electron transport layer located on the light-emitting layer side and containing a second tetracene-based compound having a tetracene skeleton.. .
Seiko Epson Corporation

Systems and methods for secure authentication for access control, home control, and alarm systems

Systems and methods for secure authentication for access control, home control, and alarm systems are provided. Some methods can include receiving first user input at a mobile device, determining whether the first user input matches preconfigured user input, when the first user input matches the preconfigured user input, transmitting an access signal to an access control system, a home control system, or an alarm system to trigger access thereto..
Honeywell International Inc.

Method and facilitating multi-element bidding for influencing a position on a payment list generated by an automated authentication engine

A method, apparatus and computer program products are provided for enabling multi-element bidding. One example method includes generating a request for a payment option and a bid, identifying one or more payment entities from which to receive a bid, transmitting the request to the one or more payment entities, and receiving one or bids from each of the one or more payment entities, each of the one or more bids indicative of a bid amount each of the one or more payment entities would be willing to pay for placement of an associated payment option..
Averon Us, Inc.

Biometric information personal identity authenticating system and method using financial card information stored in mobile communication terminal

The present invention relates to a login system and method and, more particularly, to a biometric information personal identity authenticating system and method using financial card information stored in a mobile communication terminal, wherein the system and method: carry out biometric information registration in which login information, for each service system that is to be logged into, is mapped to biometric information of a user and stored, through a security module that is configured in the mobile communication terminal and operates independently; carry out personal identity authentication by using the biometric information of the user when logging into a registered service system so as to enable a convenient login without the input of login information, and by using digital financial card information stored in the security module when registering the biometric information; and carry out biometric information registration when the personal identity authentication is successful.. .
Hankooknfc Co., Ltd.

Apparatus and payment authorization and authentication based tokenization

A method and system for providing secure card-based discrete or repeating transactions. A client having a credit/debit card, e-wallet or other financial account generates unique tokenized payment credentials for the card transaction using a local computer process.
Tokenid, Inc.

Apparatus and payment authorization and authentication based tokenization

A method and system for providing secure card-based discrete or repeating transactions. A client having a credit/debit card, e-wallet or other financial account generates unique tokenized payment credentials for the card transaction using a local computer process.
Tokenid, Inc.

Remote variable authentication processing

A remote variable authentication processing system is disclosed. A sending entity initiates a remote payment using an alias over an initiation channel.

Dynamically passing authentication information across devices

Various embodiments dynamically transfer authentication information between devices. A first computing device establishes a first communication link with a second computing device, and a second communication link with a remote computing device.
Motorola Mobility Llc

Electronic device and operation method therefor

An electronic device and an operation method therefor according to various embodiments may be configured to perform user authentication in response to an electronic card; detect access to an external device; and perform, by means of the electronic card, account transactions via the external device.. .
Samsung Electronics Co., Ltd.

System and electronic deposit and authentication of original electronic information objects

A system and method for securely and reliably depositing with a trusted repository system an authoritative information object executed, using a third, party electronic signing system, or maintained in an intermediary third party storage system having received the original information object from a third, party electronic signing system, such that the trs may subsequently facilitate electronic transmission, storage, and retrieval of verifiable copies of the stored authenticated authoritative information object without the trs relinquishing control of the authenticated authoritative information object.. .
Eoriginal, Inc.

Power optimisation

A method of power optimisation in an rfid device includes harvesting power from a radio-frequency excitation field using an antenna, powering a biometric authentication unit and an rfid communication module using the harvested power from the antenna; monitoring the voltage of the power supplied to the biometric authentication unit, and controlling a clock speed of a processing unit of the biometric authentication unit based on the monitored voltage by operating the processing unit at a higher clock speed when a high voltage level is detected and at a lower clock speed when a low voltage level is detected.. .
Zwipe As

Method of host-directed illumination and system for conducting host-directed illumination

A method of host-directed illumination for verifying the validity of biometric data of a user is provided that includes capturing biometric data from a user with an authentication device during authentication and directing illumination of the biometric data from a host authentication system during the capturing operation. Moreover, the method includes comparing illumination characteristics of the captured biometric data against illumination characteristics expected to result from the directing operation, and determining that the user is a live user when the illumination characteristics of the captured biometric data match the illumination characteristics expected to result from the directing operation..
Daon Holdings Limited

Electronic device and identifying falsification of biometric information

Provided are an electronic device and operation method thereof. The electronic device may include: a display having a biometric sensing region; a biometric sensor disposed in the biometric sensing region; and a processor.
Samsung Electronics Co., Ltd.

Method and system for replaying a voice message and displaying a signed digital photograph contemporaneously

Systems and methods for generating authentic digital memorabilia are described. A signor may be provided a digital photograph.
Autography Llc

Method and authentication of a 3d structure

New authentication features are proposed that are visible, can be authenticated with a mobile equipment and yet are challenging to counterfeit. In a possible embodiment, the surface of the authentication feature may have three-dimensional characteristics, which can be recognized by a handheld camera, such as a smartphone camera, while it cannot be easily reproduced by a simple scan and print procedure.
Alpvision S.a

System and identity proofing and knowledge based authentication

Illustrative methods, processes, and software remotely prove the identity of individuals fully compliant with identity proofing policies. The embodiments receive a request to verify an identity from an applicant device.
Michigan Health Information Network - Mihin

Vehicle display system and controlling vehicle display system

A vehicle display system includes a display device, an authentication device, and a display controller. The display device is mounted on a vehicle.
Subaru Corporation

Electronic device authentication system

A method for determining an authenticity of a configurable electronic device includes configuring the configurable electronic device according to stimulus data, measuring one or more side-effects of operation of the configurable electronic device after configuration of the electronic device to generate representations of the one or more side-effects, processing the representations of the side-effects using a feature extraction module to determine one or more features characterizing the representations of the side-effects, and processing the one or more features characterizing the representations of the side-effects using an authentication module to determine a degree of authenticity of the configurable electronic device.. .
Massachusetts Institute Of Technology

Authentication using optically sensed relative position

Systems and methods to safeguard data and hardware may include a memory configured to store a first image and sensitive data, and an optical sensor configured to capture a second image. A sensor signal comprising the captured second image may be generated.
International Business Machines Corporation

System and method to enforce the secure boot policy of a platform on a virtual machine

A method to enforce secure boot policy in an ihs configured with a plurality of virtual machines. The method includes detecting a request for a virtual machine to access a service processor.
Dell Products, L.p.

Continued runtime authentication of information handling system (ihs) applications

Systems and methods for continued runtime authentication of information handling system (ihs) applications. In an illustrative, non-limiting embodiment, an ihs may include one or more processors and a memory coupled to the one or more processors, the memory including program instructions stored thereon that, upon execution by the one or more processors, cause the ihs to: receive a command to execute an application; initially verify a plurality of tokens, where a first token is provided by the application, a second token is provided by an application manager, and a third token is provided by a hardware component within the ihs; and execute the application in response the initial verification being successful..
Dell Products, L.p.

Web-based electronic document service apparatus capable of authenticating document editing and operating method thereof

The present invention provides a web-based electronic document service apparatus, which is capable of authenticating the edit of a document, and an operating method thereof, in which when a predetermined authentication token is randomly issued and transmitted to a client terminal accessing for editing an electronic document based on a web, and then an editing command and an authentication token corresponding to the editing command are received from the client terminal, it is determined whether the received authentication token corresponds to the previously issued authentication token, so that it is possible to confirm whether the editing command received from the client terminal is the editing command generated by the true user, thereby providing a security mechanism.. .
Hancom Inc.

Character input device, character input method, and character input program

A character input device is provided with an operation unit that accepts key input and displays and accepts selection of a prediction candidate according to the result of the key input, and a character input determining unit that determines an input character, using the result of the key input or the selection result of the prediction candidate. Also, the character input determining unit executes fingerprint authentication at the time of accepting the key input or the time of selecting the prediction candidate..
Omron Corporation

Shared memory controller, shared memory module, and memory sharing system

According to an embodiment, upon receiving a use request including an identifier of a program and authentication information, a use request processing unit makes a determination on validity of the use request based on an id management information and access authority management information, generates an access key when the use request is valid, registers the access key in access key management information in correlation with a usable address range, and returns the access key to a transmission source of the use request. Upon receiving a read/write request including an address where reading-out or writing of data is performed and an access key, a read/write request processing unit makes a determination on validity of the read/write request based on the access key management information, and executes reading-out or writing of data with respect to a shared memory in response to the read/write request when the read/write request is valid..
Toshiba Memory Corporation

Suspension work platform hoist system

A suspension work platform hoist system for raising and lowering a work platform is provided. The system incorporates at least one hoist attached to the work platform and in electrical communication with a hoist control system having a monitoring and diagnostic system to monitor and record at least one of a plurality of operating characteristics of the hoist.
Sky Climber, Llc

Method for controlling the operation of at least one functional component of a motor vehicle and motor vehicle

After authenticating at least one functional component which is safety-relevant and/or emission-relevant to the driving mode of the motor vehicle with regard to whether the functional component is an original component of the motor vehicle or a functional component which has been replaced without authorization and/or has been manipulated without authorization, the operation of at least one other functional component of the motor vehicle is controlled in such a manner that the functionality or at least one functionality of the at least one other functional component is selectively restricted if the authentication which has been carried out reveals that the at least one functional component which is safety-relevant and/or emission-relevant to the driving mode of the motor vehicle has been replaced without authorization and/or has been manipulated without authorization.. .
Volkswagen Ag

Determining identity of individuals using authenticators

Systems are provided that allow users to access resources in a manner that addresses inherent deficiencies in existing authentication systems. During a typical authentication process, the system may connect the user to one or more authenticators in real time through a variety of communications channels so that the authenticators may verify that the user is who he/she purports to be.

Authentication system and method using flash of smart mobile

It is capable of authentication by transmitting through light emitted from a flash of a smart mobile according to foregoing solution of the problem, security and stability can be improved in comparison with other authentication systems such as an id, a password and a public authentication which are necessary to a bank task, a personal authentication, an identity authentication and a transaction remittance. And, even if the smart mobile is lost or a stranger acquiring this are misappropriating, cryptography such as patterns cannot be solved thereby it is not available.

Location based authentication verification for internet of things

A mobile device is used to access internet connected devices such as iot devices. The mobile device's location tracking features are used to supplement traditional authentication methods with geolocation metadata to allow access of the mobile device to the internet connected devices..

Electronic access control systems and methods using near-field communications, mobile devices and cloud computing

Systems and methods for electronic access control for secured assets including locked facilities, lockers, shared vehicles and vending machines, which do not have internet connectivity. A mobile device communicates with a server to perform the authentication and access control steps, limiting the asset's interactions with outside devices to exchanging and updating access codes via short-range communications, such as near-field communications.

System for delivering messages securely via third-party account

Privacy and restricted access are provided for functions, applications, and services available on a computing device. An area accessible to a user interface is provided.

Systems and methods for challengeless coauthentication

A system and method of authentication that avoids authentication challenges is described. In operation, an authenticator receives a first request to access a resource generated by a requestor and a participation message generated by a collaborator.

User-generated session passcode for re-authentication

A user generates a single session passcode after a normal authentication has been used to access a system. This single session passcode thereafter is used to re-authenticate the user during the session without requiring the repeated use of the normal authentication.

Multi-variable composition at channel for multi-faceted authentication

Embodiments of the present invention provide a system for providing real-time multi-faceted authentication of a user before or during the user's interaction with a channel. The system uses authentication devices to acquire large amounts of authentication level information data, then makes a determination that at least a portion of the acquired authentication level information data cannot be efficiently processed by a conventional computer apparatus due to the complexity of a required analysis process and/or the quantity of data that must be processed.

Authentication in a multi-tenant environment

Techniques are described for enabling a kerberos-based authentication system to provide a client with access to a plurality of unmodifiable components that require plain text passwords. Such an approach enables a user to sign into a distributed computer system using a single password, and access multiple components that require different passwords without the need to enter a second password.

Controlling access to personal data

Disclosed are various embodiments for controlling access to personal data of a user. Content can be requested from a network site using an authentication token.

Non-transitory computer-readable medium having instructions, communication system, and server

A server includes: a processor; and a memory storing instructions therein, the instructions, when executed by the processor, causing the server to: transmit, in a case where the first function information is received from the specific device, the first authentication information to the specific device; receive, in a case where the first authentication information is input to a first function execution device after the first authentication information is transmitted to the specific device, the first authentication information from the first function execution device; and execute, in a case where the first authentication information is received from the first function execution device, a first enabling process for enabling the first function in the first function execution device, wherein the first function is identified by the first function information in the memory associated with the first authentication information.. .

Identity verification and authentication method and system

A system for developing user identification credentials that do not contain any pre-existing or static information. The user is identified through the user's computer, tablet computer, mobile computing device, or other computing device by means of single-use, time sensitive, system-generated identification credentials.

Registrant defined prerequisites for registering a tertiary domain

Systems and methods of the present invention provide for one or more server computers communicatively coupled to a network and configured to: receive, from a sub domain registration settings control panel displayed on a client computer, rule or prerequisites required for a sub domain registrant to register a sub domain, and store these rules or prerequisites in a database. The server(s) may then receive: a sub domain registration request, an ip address directing http requests to the sub domain; and an authentication verifying that the prerequisite has been fulfilled.

Secure authentication of remote equipment

An authentication server may use secure messaging with a remote device prior to authorizing non-secure communications between the remote device and a content server, thereby preventing unauthorized access to the content server. The secure messaging uses such security features as encryption, signatures with authentication certificates, a realm, and/or a nonce.

Locking and unlocking system and key unit

A locking and unlocking system includes: a mobile terminal; and a key unit, wherein the mobile terminal includes a terminal transmission unit configured to transmit first authentication information and a first request signal to the key unit, the key unit includes: a key unit reception unit configured to receive the first authentication information and the first request signal from the mobile terminal; a first authentication unit configured to perform authentication; and a locking and unlocking processing unit configured to perform a process of unlocking or locking the door, and the first authentication unit is configured to prohibit the authentication of the mobile terminal in a case where the first authentication unit has once performed the authentication.. .

Non-contact power transmission apparatus and non-contact power supply device

A non-contact power transmission apparatus includes a non-contact power reception device, and a non-contact power supply device. The non-contact power supply device includes a power transmission coil, a power transmission circuit configured to transmit electric power by the power transmission coil, and a first control circuit configured to drive the power transmission circuit by using electric power of either a first voltage or a second voltage lower than the first voltage.

Light-emitting element, light-emitting device, light source, authentication device, and electronic apparatus

A light-emitting element according to the invention includes an anode, a cathode, and a light-emitting layer which is provided between the anode and the cathode, contains a light-emitting material and a host material that holds the light-emitting material, and emits light having a peak wavelength in a near-infrared region by applying a current between the anode and the cathode, wherein the content of the light-emitting material in the light-emitting layer is 30 wt % or more and 70 wt % or less. Further, it is preferred that the light-emitting layer emits light having the peak wavelength of 700 nm or more and 960 nm or less..

Fdsoi with on-chip physically unclonable function

An integrated circuit includes an array of devices with a logic pattern to implement a physically unclonable function (puf) for chip authentication. The logic pattern is determined in accordance with processing variations during the manufacturing.

Safety features for medical devices requiring assistance and supervision

An automatic locking system for a medical treatment device helps to ensure that an assistant is present during treatment of a patient. Among the features disclosed biometric authentication to verify that a trained assistant is present, a presence detector to ensure the assistant is continuously present during treatment, and warning and recovery processes that allow intermittent lapses in the continuous presence of the assistant..

Device and generating inherent information of integrated circuits for authentication purpose

An inherent information generating device adapted to an integrated circuit includes a plurality of pairs of source memory cells and a comparison circuit. One of the pairs of source memory cells includes a first source memory cell with a first electrical parameter value and a second source memory cell with a second electrical parameter value.

System and automated handoff between unmanned aerial vehicles and autonomous ground vehicles

A system and method for facilitating a package exchange between a agv and an uav is disclosed, wherein the system and method includes authenticating the package exchange between the agv and the uav, wherein the agv and the uav each transmit authentication information to each other; determining a first set of positioning information, wherein the agv utilizes mission information and information obtained from one or more sensors; determining a second set of positioning information, wherein the uav utilizes mission information and information obtained from one or more sensors; transmitting the first set of positioning information from the agv to the uav; transmitting the second set of positioning information from the uav to the agv; exchanging the package between the agv and the uav in response to the transmitted first and second sets of positioning information; and transmitting a confirmation signal to a central server.. .

Locking and unlocking system, key unit, and server

A locking and unlocking system includes: a server; a mobile terminal; and a key unit, wherein the server includes a server transmission unit configured to transmit cancel information, wherein the mobile terminal includes a terminal transmission unit configured to transmit first authentication information and a first request signal, wherein the key unit includes: a key-unit first reception unit configured to receive the cancel information; a key-unit second reception unit configured to receive the first authentication information and the first request signal; a first authentication unit configured to authenticate the mobile terminal; and a locking and unlocking processing unit configured to perform a process of unlocking or locking the door of the vehicle or facility, and wherein the locking and unlocking processing unit is configured to prohibit unlocking of the door of the vehicle or facility.. .

Locking and unlocking system and key unit

A mobile terminal includes a transmission unit that transmits authentication information including a start time and an end time of a reservation and a request signal for requesting locking and unlocking of a door to the key unit. The key unit includes a reception unit that receives the authentication information and the request signal, an authentication unit that authenticates the mobile terminal when the authentication information is received, a determination unit that determines whether a current time is within a reservation time, and a locking and unlocking processing unit that prohibits unlocking of the door when it is determined that the current time is not within the reservation time on the premise that the door is unlocked/locked when the authentication succeeds and the request signal is received..

Security and public safety application for a mobile device with audio/video analytics and access control authentication

An access control system utilizes authorized users' mobile electronic devices for transmitting biometric identifiers in combination with using an access card, for authenticating the user's access privileges tor unlocking a secure door. The system may further verify proximity of the user's device to the access control reader, which verifies correspondence of the access card with the transmitted biometric characteristics.

Remote machine operation through distributed permissioning

A distributed journal comprises a smart contract defining access and write permissions by stakeholders that access the distributed journal. The smart contract also defines triggering rules which must be satisfied to trigger an event.

Validating mortgage documents

Authentication of mortgage documents is based on one or more digital signatures incorporated into a blockchain. Structured data, metadata, and instructions may be hashed to generate the multiple digital signatures for distribution via the blockchain.

Payment authentication mobile terminal and mobile terminal

The present invention discloses a payment authentication method and apparatus for a mobile terminal, and a mobile terminal. The method includes: obtaining, by a mobile terminal, first biometric feature information entered by a user; comparing, by the mobile terminal, the first biometric feature information with second biometric feature information, where the second biometric feature information is prestored biometric feature information used for user identity authentication; comparing, by the mobile terminal, the first biometric feature information with third biometric feature information if the first biometric feature information matches the second biometric feature information, where the third biometric feature information is prestored biometric feature information used for payment authentication; and determining, by the mobile terminal, that payment authentication is complete when the first biometric feature information matches the third biometric feature information.

Apparatus for enabling figurine for effecting a transaction

An apparatus for enabling a figurine for effecting a transaction is provided. The apparatus includes at least one processor, and at least one memory including computer program code.

Mobile terminal and control method therefor

The present invention relates to a mobile terminal having a touch screen configured to perform fingerprint recognition and a control method therefor. A mobile terminal according to an embodiment of the present invention comprises: a wireless communication unit; a touch screen including a fingerprint recognition sensor; and a controller configured to cause the touch screen to display a virtual home button at one area of the touch screen based on a touch received at the one area; perform fingerprint authentication on a fingerprint of a finger used to apply the touch to the virtual home button via the fingerprint recognition sensor when the touch is maintained at the one area after the virtual home button is displayed..

Bale identification assembly for binding an identification tag to a bale of agricultural crop material

A bale identification assembly has a binding material with identification tags at spaced intervals is used by a knotter system to bind a formed bale. A read module with an antenna transmits interrogator signals and also receives authentication replies from identification tags.

System and manufacturing and inspecting identification documents

A document authentication system is configured to support enhanced services with advanced security features within a document and by linking information embedded in the document with a secure infrastructure.. .

Information authentication method, apparatus, storage medium and virtual reality device based on virtual reality scenario

An information authentication method, an apparatus, a storage medium and a virtual reality device are provided. The method includes obtaining to-be-authenticated information in the virtual reality scenario.

System and authorizing access to access-controlled environments

Systems and methods are provided for authorizing a user to access an access-controlled environment. The system includes a system server platform that communicates with fixed pc's, servers and mobile devices (e.g., smartphones) operated by users.

Electronic device for performing authentication using multiple authentication means and operating the same

According to an embodiment of the present disclosure, an electronic device may comprise a first sensor configured to obtain first biometric information of a first authentication level from a user, a second sensor configured to obtain the first biometric information and/or second biometric information of a second authentication level higher than the first authentication level from the user, a memory configured to store at least one piece of biometric information authenticated in relation with the user, and a processor configured to compare the at least one piece of biometric information with the first biometric information obtained through the first sensor while the electronic device operates in a locked state, to activate a timer to stop input to the first sensor for a designated time when authentication based on the first biometric information fails a designated number of times based on the comparison of the first biometric information, to obtain the second biometric information through the second sensor while the timer is active, and to deactivate the timer when the second biometric information is authenticated based on the at least one piece of biometric information.. .

Biometric data processing apparatus, biometric data processing system, biometric data processing method, biometric data processing program, storage medium storing biometric data processing program

A biometric data processing apparatus (500) includes a control unit (50) that displays, on a display unit, a message requesting the user to perform a predetermined action, and an authentication unit (52), wherein in a case where a first score calculated by collating biometric data of the user with previously-registered biometric data is equal to or more than a predetermined threshold value and a detection unit continuously detects a predetermined action from when the detection unit first detects the predetermined action after the message is displayed until an authentication process in the biometric data processing apparatus is ended, the authentication unit (52) determines that authentication of the user is successful.. .

Enabling single finger tap user authentication and application launch and login using fingerprint scanning on a display screen

Single tap launch and login to a secure application is provided. User authentication information is verified based on fingerprint data in response to the data processing system receiving an input via a finger of a user on a display screen to execute the secure application.

Automated user profile generation and authentication

Systems and methods for automatic user profile generation and authentication. One system includes a database storing user profile data for a plurality of users and an electronic processor communicatively coupled to the database.

Source-based authentication for a license of a license data structure

Technology is disclosed herein for source-based authentication for a license of a license data structure. In at least one implementation, program instructions stored on one or more computer readable storage media, when executed by a processing system, direct the processing system to at least, responsive to a launch of an application, obtain a license file for the application, the license file comprising a user license.

At-launch configuration of software applications

Systems, methods, and software are disclosed herein to perform at-launch software configuration based on software license. In an implementation, a software installation package, including a software application and a set of license files, is downloaded onto a computing system.

Usage record compiling system and usage record compiling method

A usage record compiling system including an image forming apparatus is provided. The usage record compiling system includes a first processor configured to perform authentication for enabling a user to use the image forming apparatus and transmit history information relating to usage of the image forming apparatus by the user during a period in which the authentication is valid, a second processor configured to receive the history information from the first processor and calculate a usage record value based on the received history information, store the calculated usage record value in a first storage unit, update the calculated usage record value stored in the first storage unit, and store update information indicating that the calculated usage record value has been updated in a second storage unit..

Portable terminal for printing with a printer

According to an embodiment, a portable device includes a reading device that reads an identification information image that is output from the printer. A communication interface wirelessly communicates with the printer.

Internet based digital content services that provide content upload, content storage, content sharing, and content playlist selection; and smart devices with access to the internet based digital content services

Internet based digital content services as well as mobile client devices for accessing the internet are herein disclosed and enabled. In one example, user digital content, such as documents, audio, or video content, may be uploaded to a content server for storing.

Systems and methods for authentication code entry in touch-sensitive screen enabled devices

Systems and methods for authentication code entry in touch-sensitive screen enabled devices are disclosed. In one embodiment, a method for entering data to a data entry device comprising at least one computer processor and a touch-sensitive screen may include (1) the touch-sensitive screen displaying an input interface; (2) the touch-sensitive screen sensing a first input comprising at least one finger touch; (3) the touch-sensitive screen sensing a release of the first input; (4) the at least one computer processor determining a number of finger touches in the first input; and (5) the at least one computer processor using the number of finger touches in the first input to identify at least a first portion of a digit in an authentication code..

Access and driving authorization system with increased security against relay attacks on the transponding interface

An authentication element, specifically a keyless go device for a vehicle. The authentication element has a transponding interface for transmitting an authentication signal and receiving power and data.

Monitoring system for monitoring head mounted device wearer

A monitoring system for monitoring the visual behavior of a wearer of a head-mounted device, the monitoring system includes:—a least one wearer's visual behavior sensor configured to sense at least one wearer's visual behavior data relating to the visual behavior of the wearer of the head-mounted device,—a communication unit associated with the at least one wearer's visual behavior sensor and configured to communicate the visual behavior data to a wearer information data generating unit,—a wearer information data generating unit configured to:—receive the wearer's visual behavior data,—store the wearer's visual behavior data, and—generate an wearer information data indicative of at least one of: wearer's vision or general health condition of the wearer or wearer's activity or wearer's authentication based, at least, on the evolution over time of the wearer's visual behavior data.. .

. .

Method and system for pairing authentication between a vehicle and a mobile device

A method for pairing authentication between a vehicle and a mobile device is proposed. After a host computer of the vehicle is operated to send out a vehicle identification code for pairing and the mobile device is operated to select the vehicle identification code, the host computer enables both of a host display of the vehicle and the mobile device to display a pairing code at the same time.
Kwang Yang Motor Co., Ltd.

System and a computer-implemented machine-to-machine authentication of an apparatus

A system and a method of authentication to improve security communication between machines are disclosed. The system includes a retrieving unit (120) that identifies a critical component (102) of an apparatus (110) in response to an authentication request for the apparatus (110) and retrieves authentication information for the critical component (102) comprising expected physical and digital signatures for the critical component (102) and one or more associated additional components (104).
The Boeing Company

Secure network authentication at a gateway for non-internet protocol enabled devices

A method for network authentication of wireless devices at a gateway is provided that includes scanning a wireless network by the gateway to discover unjoined wireless devices, joining a discovered wireless device to the gateway using a non-internet protocol implemented by the wireless device, wherein the joining results in an encrypted connection between the gateway and the wireless device, and authenticating the discovered wireless device to the gateway via the encrypted connection, wherein authentication is performed according to an authentication protocol of a network protocol management layer of the gateway.. .
Texas Instruments Incorporated

Cognitive roaming support

Methods and systems are described for generating and utilizing a pattern of association. The pattern of association can comprise information that indicates to which of a plurality of network devices one or more mobile devices are likely to connect.
Comcast Cable Communications, Llc

Smart connectors and associated communications links

“smart” connectors with embedded processors, measurement circuits and control circuits are disclosed for establishing a “contactless” radio frequency (rf) electromagnetic (em) extremely high frequency (ehf) communications link between two electronic devices having host systems. The connectors are capable of monitoring, controlling, and directing (managing) link operation to dynamically adapt to conditions, as well as monitoring and altering (or modifying) data passing through the connector, and selecting a protocol suitable for a communications session.
Keyssa, Inc.

Techniques for device discovery and configuration

Systems and methods are provided herein for configuring a device. In some embodiments, a device identifier associated with a target device is received from a service provider computer.
Amazon Technologies, Inc.

Non-transitory computer-readable recording medium storing computer-readable instructions for terminal device

A terminal device may send a registration request, which requests the server to register virtual printer relation information related to a virtual printer, to a server, and communicate a wireless profile with an existent printer using a first terminal interface. The wireless profile may be used in a wireless network, which is established by using a second terminal interface, and is a wireless network to which both the terminal device and the existent printer are to belong.
Brother Kogyo Kabushiki Kaisha

Methods and systems for managing authentication devices coupled to multi-function devices

The disclosure discloses methods and systems for managing an authentication device such as a card reader coupled to a multi-function device. The multi-function device includes a memory for storing information related to one or more users, one or more pre-authorized users and alert setting instructions.
Xerox Corporation

Information pushing method and apparatus, and terminal and server

An information processing apparatus including processing circuitry is provided. The processing circuitry is configured to perform security authentication on the first terminal when receiving a call setting request of a first terminal.
Tencent Technology (shenzhen) Company Limited

Metadata supporting cyber content sharing and governance and application method thereof

A method for identifying metadata for cyber content sharing and governance (abbreviated as an mdccsg method) and application method thereof. The mdccsg method is proposed based on the requirements of big data sharing and governance under a big data and pan media environment, and is applicable for generating unified identifications on various categories of content resources; and the application method matched with the mdccsg method can effectively support high-efficient sharing and governance of the big data, wherein the mdccsg method comprises a unified description framework of metadata, a unified specification method of metadata, and a definition of the core mdccsg identification element; and the mdccsg method not only can describe rich semantics of contents in detail, but also has a built-in content trust authentication and security assurance ability..
Southeast University

Determining security vulnerabilities in application programming interfaces

A security system scans application programming interfaces (apis) to detect security vulnerabilities by receiving api documentation from a third-party system associated with the api and organizing it in an api specification that describes the hostname of the api and one or more endpoints of the api. For each of the endpoints, the api specification includes a uniform resource identifier, a method term, an input content type, an output content type (if applicable), authorization details, and any associated parameters or arguments.
Tinfoil Security, Inc.

Enhanced authentication security

Systems, methods, and apparatus, including computer-readable storage media storing executable instructions, for enhanced authentication security. In some implementations, an authentication request associated with a first communication session is received.
Microstrategy Incorporated

System and providing a decision engine with data from a query server

A system and method for method for providing data to decision engines. The method includes: providing an alternate login frame to a user device accessing a website; receiving, from a host server, an authentication token for accessing data stored in an electronic mail server, when login credentials are successfully provided via the alternate login frame; sending the received authentication token to the electronic mail server; upon being granted access to at least a portion of the data stored in the electronic mail server, determining, based on the at least a portion of the data, a vector of variables, the vector including at least one set of variables; and sending, to a decision engine in real-time, the determined vector..
Verum View Ltd.

System for authentication center

This invention provides a system for authentication center, so that a user can manage centrally at the authentication center the statuses of the logins or the sessions by which the different terminals used by the user enter the user's accounts at different service parties.. .

Partial one-time password

Techniques are disclosed relating to authenticating a user based on a partial password. In one embodiment, a computer system stores masking criteria defining how a mask is to be applied to generated passwords.
Ca, Inc.

Preventing unauthorized access to secured information systems using authentication tokens

Aspects of the disclosure relate to providing information security and preventing unauthorized access to secured resources by implementing token-based authentication techniques. A computing platform may receive, from a client computing device, a request to authenticate a user to a user account associated with a client portal provided by a client portal server.
Bank Of America Corporation

Zero sign-on authentication

A method of facilitating zero sign-on access to media services depending on trust credentials. The trust credentials may be cookies, certificates, and other data sets operable to be stored on a device used to access the media services such that information included therein may be used to control the zero sign-on capabilities of the user device..
Cable Television Laboratories, Inc.

Strong authentication with feeder robot in a federated identity web environment

Method, system, and programs for performing two-factor authentication for a controlled access application via one or more third-party host verification servers. An example method includes receiving a request to a controlled access application after a user has successfully logged into an enterprise system with a first identifier (id) factor, the controlled access application requiring additional authentication with a second id factor, obtaining first information to complete the second id factor, at least some of the first information being obtained from the user, and generating a first web form using the first information.
Drfirst.com, Inc.

Comprehensive authentication and identity system and method

A comprehensive authentication and identity system and method are disclosed. A central profile is created for a user which includes user information that can be passed back or otherwise utilized by websites (e.g.
Telesign Corporation

Method and an identity assurance score with ties to an id-less and password-less authentication system

A technique is provided by which a user goes to a site and instead of the authentication system of the site going to their own databases to match an id and password given by the user, because doing so is not secure, the site companies makes a call to an identity assurance score server (with ties to the id-less and password-less system) and send a parameter such as a number. Then, based on that parameter (e.g., number or score), the identity assurance score server (with ties to the id-less and password-less system, such as described hereinabove) sends a corresponding login protocol or factors to be satisfied to authenticate the user..

Method and a social network score system communicably connected to an id-less and password-less authentication system

A technique is provided in which entities, such as companies, connect to a universal social network score server in the cloud, to request therefrom a social network score about an entity. The social network score depicts how many social network sites were visited by the entity, if the entity is visible on the internet or social network sites, if the entity is active on the social network sites, and, if so, how active.

Mobile device enabled desktop tethered and tetherless authentication

A technique is provided that integrates authentication from a mobile device (e.g., using biometrics, social informational data, questions and answers, and more) to allow login to laptops and desktops while they are disconnected from the internet using a usb cable connection, bluetooth or local wifi or any other similar protocol and/or connected to internet without usb. The technique provides a cloud clearinghouse that ties a person's or entity's mobile device(s) to an identity that's used to authenticate a person (could be the same person) on a laptop, desktop, or similar computer system..

System and utilizing behavioral characteristics in authentication and fraud prevention

A behavioral characteristics authentication system and method (“bca system”) that facilitates authentication of the identity of a user, registrant, or applicant of a website, application, or other accessible computer resource using a verification process that incorporates behavioral characteristics. In operation, the bca system compares a single user's behavior with their previous behavior, a user's behavior with behavior generally attributed to non-fraudulent behavior, or a user's behavior with behavior generally attributed to fraudulent behavior.
Telesign Corporation

Methods of bidirectional packet exchange over nodal pathways

A node system implements a method for node relay communication. A description of a flow entry including an address in a flow and a private key is received.
Network Next, Inc.

Wireless information passing and authentication

A secure server detects a login from a user originating from a first device. A second user-registered device is sent a message.
Netiq Corporation

Methods and systems of data security in browser storage

Mechanisms and methods are provided for managing oauth access in a database network system, and extending the oauth flow of authentication to securely store the oauth encrypted refresh token in the storage available with current browsers or any other non-secure storage on user system.. .
Salesforce.com, Inc.

Secure authentication and data transfer for cloud systems

A method is provided for a user to access resources within a secure network. Pursuant to the method, an agent stored on a first computing device within the secure network opens an outbound secure channel through a firewall of the secure network, the agent opening the outbound secure channel to a request collector stored on a second computing device outside the secure network.
Authmein, Llc

Production of cryptographic signatures

A method and system configured to produce a cryptographic signature on a message, under a key, at a user computer wherein the key is shared between the user computer, which stores a first key-share, and an authentication computer, which stores a second key-share and a first authentication value. The user computer encodes the message to produce a blinded message, produces the first authentication value from a user password and a secret value, and produces a second authentication value by encoding the first authentication value and a nonce.
International Business Machines Corporation

Iot-based things management system and method using block-chain authentication

An internet of things (iot)-based thing management system using block chain authentication wherein unit nodes connect to each other through a wire and/or wireless communication network, things connect to each other in each of the unit nodes, and control instructions for causing the things to operate are mutually authenticated by the unit nodes to confirm the validity of the instructions; each of the unit nodes includes: a plurality of things which connect to the wire and/or wireless communication network, each of the things performing individual functions separately; and a core which includes n block chain having n blocks recording operation histories of the things thereon, the blocks being linked one after another in the form of a chain, and the core generating public keys and private keys based on the n block chain and providing the generated keys to each of the things, wherein one of the things includes a controller which has a list of public keys provided by the core, each of the public keys is unique to each of the things, the controller sends a control instruction with the controller's private key combined thereto, to a thing of which a public key is selected by the controller from the list of the public keys, so as to control operations of the thing based on the sent control instruction, and the thing sends the controller a response signal with the thing's private key combined thereto in response to the control instruction and performs an operation according to the control instruction.. .

Integrated authentication system for authentication using single-use random numbers

In an integrated authentication system for authentication using single-use random numbers, a single-use random number generator extracts the random numbers of locations corresponding to a seed value received by a user terminal and a user password from random numbers constituting a first random number set by using the seed value and the user password as location information, and then generates and displays a first single-use random number, and an authentication server extracts the random numbers of locations corresponding to the seed value and a user password stored in a password database from random numbers constituting a second random number set by using the seed value and the user password as location information, generates a second single-use random number, and then authenticates the user based on whether the second single-use random number matches the first single-use random number received from the user terminal.. .
Korea Framing Institute

Device enrollment protocol

A device enrollment method and system comprising trusted application code that is executed in isolation from the primary os of a hosting device and an access control mechanism that manages access to this code. The trusted application code provides hardware-backed cryptographic and authentication services to multiple third party applications.
Rivetz Corp.

Using public keys provided by an authentication server to verify digital signatures

Provided are a computer program product, system, and method for using public keys provided by an authentication server to verify digital signatures. A plurality of public keys from a plurality of public-private key pairs and stored in a local key store.
International Business Machines Corporation

Wireless access tag duplication system and method

A wireless access tag duplication device, system and method is provided. The wireless access tag duplication system comprises: a wireless access tag reader; a wireless access tag writer; a processor, coupled to the wireless access card reader and the wireless access card writer; and a memory.
Info Wise Limited

System and the automated processing of physical objects

Methods and systems for verifying authenticity of a physical object and/or for verifying possession of the object by an individual are described. In one embodiment, the object is registered with a remote processing system.
1997 Irrevocable Trust For Gregory P. Benson

Two-level authentication for secure transactions

A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications. A personal digital key stores one or more profiles (e.g., a biometric profile) in a tamper-proof memory that is acquired in a secure trusted process.
Proxense, Llc

Systems and methods for implementing automatic payer authentication

A system or method may be provided to facilitate automatic user authentication for electronic transactions. In particular, the system or method may automatically authenticate a customer such that the customer may make complete hands free payments without the intervention of the customer or the merchant.
Paypal, Inc.

Authentication and payment system and method using mobile communication terminal

Disclosed herein are an authentication and payment system and method. The authentication and payment system of the present invention includes an issuer server, an issuer information management intermediate server, an acquirer server and a payment server.
Sk Planet Co., Ltd.

Security protected passive rfid device

An rfid device includes an antenna, a passive rfid communication module and a passive biometric authentication module. The passive rfid communication module is configured to transmit data to an rfid reader without the use of encryption where, the rfid device is configured such that initially power is supplied only to the passive biometric authentication module until the biometric authentication module 120 has verified the identity of a user, whereupon power is supplied to the passive rfid communication module 110 to permit communication, thus the rfid device is thus less vulnerable to sniffing attacks than conventional unencrypted rfid tags because the device will hold its data securely until an authorized biometric identifier is presented to it..
Zwipe As

Methods for categorizing input images for use e.g. as a gateway to authentication systems

A scanned image authentication system employing at least one image authentication station which is unable to process scanned images which do not belong to at least one individual scanned image category, the system comprising a gateway image processor operative for on-line filtering of an incoming scanned image to determine whether or not the incoming scanned image belongs to the scanned image category, and a computer-implemented interface operative to transmit each individual scanned image to the at least one image authentication station only if the gateway image processor has determined that the individual scanned image belongs to the at least one individual scanned image category.. .
Au10tix Limited

Systems and methods for utilizing magnetic fingerprints obtained using magnetic stripe card readers to derive transaction tokens

Systems and methods for utilizing magnetic fingerprints obtained using magnetic stripe card readers to generate digital transaction tokens in accordance with embodiments of the invention are disclosed. In one embodiment, a method for authenticating a user using a digital token includes collecting user information and card information from an identification card containing an electronically readable component using a user authentication terminal, where the user information describes identifying information about a user and the card information describes information to uniquely identify the identification card, collecting session information using the user authentication terminal, wherein the session information describes information regarding a request for an authenticated communications session, generating a digital token based on the collected user information, the collected card information, and the collected session information using the user authentication terminal, and sending the digital token to a host access processor for authorization of an authentication request..
Magtek, Inc.

Selective restoration and authentication of a secure image

Techniques for operating a computing device in one or more power modes are provided. An example method for operating a computing device according to these techniques includes determining whether a threshold condition for exiting a first power mode has been satisfied, identifying one or more segments of a volatile memory that were powered down while the computing device was operating in the first power mode responsive to the threshold condition being satisfied, identifying one or more segments of software that were stored in the one or more segments of the volatile memory that were powered down, restoring, from a non-volatile memory, the one or more segments of the software to the one or more segments of the volatile memory that were powered down, and authenticating the one or more segments of the software..
Qualcomm Incorporated

Distractional variable identification for authentication of resource distribution

A system for capturing communication variables associated with a communication between two or more parties and implementing a quantum optimizer to analyze the communication variables to determine the actual context of a communication held by one or more parties to the communication. Once the actual context is determined, a further determination is made as to whether the actual context poses or potentially poses a security threat to one or more parties to the communication or a third-party and, if so, notifies the party of the security threat.
Bank Of America Corporation

File authentication method and apparatus

A file authentication method and apparatus are provided in the embodiments of this application. File digest data is extracted from a file that includes an installation package of an application.
Tencent Technology (shenzhen) Company Limited

Authentication device and computer-readable recording medium

An authentication device includes a first login module and a second login module. Upon a login request accompanied by entry of correct authentication information on any one of accounts, the first login module approves a request for first login using the account in account information, the account information comprising the registered accounts distinguished between one or more first accounts and one or more second accounts, the second accounts being allowed for proxy login using the first accounts.
Casio Computer Co., Ltd.

System for visual password input and accepting a visual password input

A system for visual password input. The system for visual password input includes an electronic device having a display, wherein the electronic device further includes a camera.

Transaction system

A method in a system comprising at least one portable data carrier, an authentication server, and several service providers systems. The service provider systems have reading devices and a service provider unit.
Giesecke+devrient Mobile Security Gmbh

System and user enrollment in a secure biometric verification system

A computer-implemented method and system for verifying the identity of a user in an identity authentication and biometric verification system which includes collecting information from the user regarding the user's identity, which is then electronically authenticated. Upon authentication, personal information regarding the verified identity of the user is retrieved from a source database which is used to verify the identity of the user, via user interaction.
Alclear Llc

Robust system and authenticating a client in non-face-to-face online interactions based on a combination of live biometrics, biographical data, blockchain transactions and signed digital certificates.

Client data is collected from various authoritative sources and processed by a data analytics authentication processor (daap) to generate the client's service access authentication tag (saat) score and a client-specific profile that determines the client's precise eligibility and entitlement to services offered by a plurality of online services providers.. .

Digital content services or stores over the internet that transmit or stream protected digital content to mobile devices and applications

Digital content services provided over the internet for transmitting or streaming protected digital content to client or output devices are herein disclosed and enabled. The protected digital content is encrypted and device dependent or specific for rendering or playing at a limited number of devices including smart phones, information pads, audio players, media controllers, televisions, printers, etc.
Flexiworld Technologies, Inc.

Systems and methods for increased security in authentication code entry for touch-sensitive screen enabled devices

Systems and methods for increased security in authentication code entry for touch-sensitive screen enabled devices are disclosed. According to one embodiment, a method for enhanced security in entering data to a data entry device comprising at least one computer processor and a touch-sensitive screen may include (1) the touch-sensitive screen displaying a virtual scrolling interface comprising a plurality of spaces for receiving an authentication code; (2) the touch-sensitive screen displaying an initial value in each of the plurality of spaces; (3) the touch-sensitive screen sensing a touch near one of the spaces; and (4) the at least one computer processor changing the value for the space in response to the touch..
Verifone, Inc.

Systems and methods for increased security in authentication code entry for touch-sensitive screen enabled devices

Systems and methods for increased security in authentication code entry for touch-sensitive screen enabled devices are disclosed. According to one embodiment, a method for enhanced security in entering data to a data entry device comprising at least one computer processor and a touch-sensitive screen may include (1) the touch-sensitive screen displaying a touch instruction, the instruction indicating a touch location where a user touch is to be made on the touch-sensitive screen; (2) the touch-sensitive screen sensing a first touch; and (3) the at least one computer processor determining that the first touch is within a predetermined threshold of the touch location indicated by the touch instruction..
Verifone, Inc.

Secure control of unmanned vehicles

The present invention provides a method, system and devices to establish safe mechanisms for controlling aerial navigation of unmanned vehicles (for example. Unmanned aerial vehicles, uavs).
Tecteco Security Systems, S.l.

Biometric authentication using wideband uhf/vhf radar

A wideband radar system and method is provided for biometric identification and authentication of a human subject. The system includes a source of wideband radar signals, an amplifier, and a splitter in electrical communication with the source of wideband radar signals and configures to split a generated signal into a transmit signal and a reference transmit signal.
Government Of The United States, As Represented By The Secretary Of The Air Force

Coded polymer substrates for banknote authentication

A method and system for authenticating an item includes irradiating the item, the item including a polymer substrate including a polymer material and a doping material and configured to emit a radiation spectrum having a spectral signature in response to the irradiating, the doping material capable of absorbing or scattering radiation at a specific wavelength to generate the spectral signature, detecting the spectral signature, and determining a code associated with the spectral signature.. .
Spectra Systems Corporation

Driver authentication monitoring and controlling vehicle usage

A driver authentication and safety system and method for monitoring and controlling vehicle usage by high-risk drivers. A centralized database comprising a software application can be accessed by an authorized user via a data communications network utilizing a remote computer in order to configure a desired operating profile that matches requirements of the high-risk driver.

Network apparatus and user terminal

A network apparatus according to an embodiment performs communication with a user terminal comprising a first communication unit configured to perform communication using a first radio access technology and a second communication unit configured to perform communication using a second radio access technology, by using the first access technology. The network apparatus comprises: a receiver configured to receive, from the user terminal, authentication related information on a country where the user terminal is legally authenticated for transmission by the second communication unit; and a controller configured to determine, based on the authentication related information, whether or not communication by the second communication unit can be configured to the user terminal..
Kyocera Corporation

Method and authenticating users in internet of things environment

The present disclosure relates to a sensor network, machine type communication (mtc), machine-to-machine (m2m) communication, and technology for internet of things (iot). The present disclosure may be applied to intelligent services based on the above technologies, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services.
Samsung Electronics Co., Ltd.

Method and system for providing security from a radio access network

The disclosure relates to a security method and system in a telecommunications network comprising a radio access network system and a core network system. The radio access network system is configured to provide a wireless radio interface for at least one user device, wherein a shared secret key is stored in both the user device and the core network system.
Nederlandse Organisatie Voor Toegepast- Natuurwetenschappelijk Onderzoek Tno

Mobile device and automatic connectivity, data offloading and roaming between networks

Embodiments of a mobile device and methods automatically connecting to a wi-fi hotspot 2.0 are generally described herein. In some embodiments, subscription information for one or more service providers (sp) that operate wi-fi networks is stored in a subscription data object of the mobile device.
Intel Corporation

Method and obtaining recorded media content

Aspects of the subject disclosure may include, for example, a method comprising: sending by an end user device, to a digital video recorder, a first request to receive a requested media content item; receiving by the end user device, responsive to the sending of the first request, a metadata file, wherein the metadata file comprises authentication information and a network address of a media content server where the requested media content item is located; sending to the media content server by the end user device, responsive to the receiving of the metadata file, a second request to receive the requested media content item, wherein the second request is sent to the network address, wherein the second request comprises the authentication information contained in the metadata file, and wherein the second request comprises an identification of the requested media content item; and receiving by the end user device, responsive to the authentication information and the identification of the requested media content item that are sent in the second request, the requested media content item from the media content server. Other embodiments are disclosed..
At&t Intellectual Property I, L.p.

Interactive voice response (ivr) call authentication

A device can receive, from an interactive voice response (ivr) system, a set of instructions to initiate an application session of an application and to provide an authentication interface for display. The device can receive, via the authentication interface and during the application session, a first credential from a user of the device.
Verizon Patent And Licensing Inc.

System and monitoring communications and/or identifying imposters and/or confirming authenticity of an organizational affiliation claim/assertion

System and method operative for monitoring communications and identifying imposter tx communicants who are pretending to contact an rx end user, from a telephone line associated with an organization which the imposter tx is not really calling from. Also, system and method for confirming authenticity of an organizational affiliation claim (claimed organizational affiliation), comprising providing a database of organizations, using a server/processor to access the database; and, via a channel of communication to end-users allowing end-users to receive from the processor an authentication of the claimed organizational affiliation..

Systems and methods for data distribution using a publication subscriber model with a federation of trusted data distribution networks

Federation of trusted data distribution systems is accomplished by treating an entire data distribution network as either a publisher or subscriber to a feed in another data distribution network. A first data feed is created in a first data feed management subsystem associated with a first data distribution network.
At&t Intellectual Property I, L.p.

Query system and method to determine authentication capabilities

A system, apparatus, method, and machine-readable medium are described for determining the authentication capabilities. For example, one embodiment of a method comprises: receiving a policy identifying a set of acceptable authentication capabilities; determining a set of client authentication capabilities; and filtering the set of acceptable authentication capabilities based on the determined set of client authentication capabilities to arrive at a filtered set of one or more authentication capabilities for authenticating a user of the client..
Nok Nok Labs, Inc.

Systems and methods for utilizing client side authentication to select services available at a given port number

Typically, clients request a service from a computer hosting multiple services by specifying a destination port number associated with the desired service. In embodiments, the functionality of such a host computer is enhanced by having it condition client access to services available at a particular port number based on client authentication and/or authorization.
Akamai Technologies, Inc.

Behavior-based authentication

In one embodiment, a method includes receiving an access request for a video service from a client device, authorizing the client device to access the video service when the client device is initiating connection to the video service via a home internet access point in a home associated with an authorized account for the video service, determining a time restriction for access to at least part of the video service when the client device is initiating connection to the video service via a non-home internet access point located outside the home, a duration of the time restriction being dependent upon a usage behavior of the client device, and authorizing the client device to access the at least part of the video service subject to the time restriction when the client device is initiating connection to the video service via the non-home internet access point.. .
Cisco Technology, Inc.

Automated system identification, authentication, and provisioning

A device may authenticate a user for access to a plurality of target systems. The device may provide information identifying the plurality of target systems.
Accenture Global Solutions Limited

Authentication using credentials submitted via a user premises device

An authentication system can be operable to receive from a user premises device credentials associated with a user identity, wherein the user premises device can also be operable to monitor and control a premise of the user identity. The authentication system can process the credentials and transmit an authentication verification to an on-line system to enable access to the on-line system by a user equipment of the user identity.
At&t Intellectual Property I, L.p.

Authentication server, authentication method, and program

If a plurality of services in the same domain is provided as a plurality of subdomains when a cookie is used in web service, the cookie with a domain scope for a subdomain may not be shared by the services. Meanwhile, if the domain scope is equivalent to the overall domain, a cookie may be obtained for service unavailable for a user, which may disadvantageously reduce security.
Canon Kabushiki Kaisha

Information processing apparatus, authentication method, and recording medium for recording computer program

An information processing apparatus that authenticates sets of distributed authentication information without collecting, the sets of distributed authentication information, to be collected at any one of apparatuses included in a system. The apparatus includes: a secure computation unit that determines whether master authentication information, which is stored in advance and is one information to be compared for authentication, matches authentication information, which is received from a first information processing apparatus and is the other information to be compared for authentication, by executing secure computation with a second information processing apparatus based on one set of distributed master authentication information obtained by distributing the master authentication information by using a secret distribution method and based on one set of distributed authentication information obtained by distributing the authentication information by the secret distribution method; and a process execution unit that executes a predetermined process based on the determination result..
Nec Corporation

Integrated second factor authentication

Techniques and apparatuses are described that enable integrated second factor authentication. These techniques and apparatuses enable the improved security of something you have without the accompanying inconvenience or chance of loss.
Google Inc.

Controller, communication method, and communication system

A new controller (supporting device authentication) is a controller which performs encrypted communication with a device which has succeeded in mutual authentication using an electronic certificate, and the controller includes: a determining unit that determines whether or not a communication target device with which communication is to be performed is an authentication support device that supports the mutual authentication; a functional restriction unit that, when the communication target device is determined not to be the authentication support device by the determining unit, imposes a functional restriction on one or more functions of the communication target device which are operable by the new controller (supporting device authentication); and a communication unit which performs communication in plain text with the communication target device with the functional restriction imposed by the functional restriction unit.. .
Panasonic Intellectual Property Management Co., Ltd.

Synchronizing authentication sessions between applications

Disclosed are various embodiments for synchronizing authentication sessions between applications. A token exchange service receives a first authentication token from a client computing device.
Amazon Technologies, Inc.

Electronic device, server, electronic device controlling method, information processing method and recording medium

An information processing device includes an interface configured to receive authentication information from an electronic device. The device also includes circuitry configured to identify an execution range of an association operation program executed by the electronic device, the execution range being indicative of an authentication of an association between the electronic device and another electronic device..
Sony Corporation

Secure data storage system

A computer program product for secure data storage. The present invention may include completing a registration process by sending, by the client device, a connection request to the server.
International Business Machines Corporation

Interconnection device, management device, resource-disaggregated computer system, method, and medium

An interconnection device included in a module together with a resource, the interconnection device includes: a processor; and a transceiver, wherein the processor is configured to: a manager that stores configuration information about a computer in a resource-disaggregated computer system including a fabric switch and a plurality of the modules coupled to the fabric switch and configuring the computer by a combination of the modules, and reads and writes the configuration information based on management data being received; a protector that performs authentication or encryption and decryption of the management data; and the transceiver is coupled to the fabric switch, the protector and a resource used by the module, and transfers the management data between the fabric switch and the protector and data other than the management data between the fabric switch and the resource.. .
Nec Corporation

System and method to facilitate an information-centric networking socket and fast in-network authentication

A method is provided in one example embodiment and may include generating a first interest message for a consumer application of a first node, wherein the first interest message comprises a content name within an internet protocol identifying content to be received by the first node; opening an information-centric networking (icn) socket for the first node, wherein the icn socket is associated with the content name and the consumer application; and transmitting the first interest message to an ip network, wherein the ip network comprises at least one hybrid icn-enabled routing node that is capable of performing packet forwarding using both ip networking constructs and icn constructs.. .
Cisco Technology, Inc.

Healthcheck access point

A method for enabling configuration at a base station may be provided by reading configuration information for a configuration wireless network at a cellular base station with wi-fi capability, where the configuration information may include a known wi-fi service set identifier (ssid). The method may further require synchronizing the configuration information with a coordination server and periodically scanning for the known wi-fi ssid in a non-access point (ap) mode.
Parallel Wireless, Inc.

Photon-based ca authentication method and system

The present application provides a photon-based ca authentication method, including: receiving, by a photon-based ca authentication terminal, an optical signal from a photon terminal, where the optical signal includes a user id; verifying the user id included in the optical signal; and providing, in response to successful user id verification, a user certificate to a client to perform ca certificate authentication.. .
Kuang-chi Intelligent Photonic Technology Ltd.

Mobile message source authentication

A control circuit receives from a mobile receiver a request for a certificate for a particular sourcing entity and responsively transmits to that mobile receiver a corresponding certificate. The certificate includes an entity logo that corresponds to a particular message sourcing entity and decryption information.
Ctia - The Wireless Association

Techniques for remote sgx enclave authentication

Techniques for remote sgx enclave authentication are described. An attestation service may be used to attest that an enclave was successfully established on a software guard extensions (sgx) enabled platform.
Intel Corporation

Security authentication method, configuration method, and related device

The present invention provides a security authentication method, a configuration method, and a related device. A first terminal receives a public key for signature of a configuration device sent by the configuration device.
Huawei Technologies Co.,ltd.

1:n biometric authentication, encryption, signature system

A biometric authentication system has a terminal which extracts and encodes feature data for authentication from acquired biometric information, and which transmits the encoded feature data for authentication. The system has a db for storing encrypted authentication information, a search unit which searches for encrypted authentication information included in the db, and a decryption unit which decrypts the encrypted authentication information searched for using encoded feature data for authentication as a decryption key.
Hitachi, Ltd.

Collaborative computation of hmac

In one embodiment, a first apparatus includes a processor and an interface, wherein the interface is operative to receive a request from a second apparatus to commence a keyed-hash message authentication code (hmac) computation, the processor is operative to perform a first computation computing a first part of the hmac computation using a secret key k as input yielding a first value, the interface is operative to send the first value to the second apparatus, the interface is operative to receive a second value from the second apparatus, the second value resulting from the second apparatus processing the first value with at least part of a message m, the processor is operative to perform a second computation based on the second value and the secret key k yielding an hmac value, and the interface is operative to send the hmac value to the second apparatus.. .
Cisco Technology, Inc.

Enhanced voiceprint authentication

The invention relates to a method for enhanced voiceprint authentication. The method includes receiving an utterance from a user, and determining that a portion of the utterance matches a pre-determined keyword.
Plantronics, Inc.

Systems and methods for database management of transaction information and authentication data

A system for storing data related to a transaction and for authenticating parties involved therewith, the system comprises a database; an application server coupled with the database and configured to store information associated with a plurality of transactions, the information including one or more credentials associated with a plurality of users, a transaction identifier, a source user identifier, a recipient user identifier, and account information related to an recipient account for the recipient user maintained with a financial institution, the application server further configured to receive at least one credential associated with a first user from a first user device and authenticate the first user based on a comparison of the at least one credential against one or more credentials stored at the application server to permit the first user to transmit transaction data related to the transaction and associated with the source user to the financial institution to cause a deposit into the recipient account based on receiving the source user identifier and transaction identifier from the first user device, wherein the first user is not the source user or the recipient user.. .

User enhanced authentication system for online purchases

Embodiments of the invention are directed to methods, systems, devices and computer-readable media. In embodiments of the invention, a user is authenticated using an authentication process that is capable of authenticating a user using an inline authentication form that can authenticate a consumer without transferring a session maintained by a merchant.

Authentication of packaged products

Methods are provided for producing an authenticated packaged product. A digital signature, dependent on unique message data for the product, is generated via a digital signature scheme using a secret signing key.
International Business Machines Corporation

Authentication of packaged products

Methods are provided for producing an authenticated packaged product. A digital signature, dependent on unique message data for the product, is generated via a digital signature scheme using a secret signing key.
International Business Machines Corporation

A transaction authorization basd on a parallel autonomous channel multi-user and multi-factor authentication

A system for authorizing electronic transactions using a form of a physical token possessing credentials of an account holder, wherein the system transmits a verification message to a terminal where this terminal is different from the one the electronic transaction is conducted on, and through this combination the system shall verify that the transaction is being conducted by the authorized owner of the token used.. .
Id Global Solutions Corporation

Systems and methods for use in providing enhanced authentication of consumers

Systems and methods are provided for use in enhancing security associated with services related to payment or banking accounts, in connection with communication between consumers and consumer service call centers associated with the accounts. One exemplary method includes receiving, at a computing device, a request to authenticate a consumer to a payment or banking account from a call center associated with consumer services for the account, and soliciting a biometric from the consumer.
Mastercard International Incorporated

Bridge for communicating data outside of a mobile application

In certain computing environments, such as certain applications for mobile devices, popup browser windows may not be supported. This can cause functionality issues, as an existing website may use a popup window to perform a service (such as authentication).
Paypal, Inc.

Methods and systems for payments assurance

A remote payments assurance system includes a proxy service manager server, an authentication service manager server computer, an acquirer financial institution (fi) server computer, a payment network, and an issuer financial institution server computer. A storage device of the proxy service manager server computer stores instructions which causes a processor to receive a consumer authentication request from a merchant device obtained during a card not present (cnp) transaction, transmit the consumer authentication request to the authentication service manager server computer, establish a secure communications channel between the proxy service manager server computer and the authentication service manager server computer, and transmit the consumer authentication request via the secure communications channel to the authentication service manager server computer.
Mastercard International Incorporated

Determining legitimate conditions at a computing device

A method of determining legitimate use of a computing device for an action to be approved by a remote system is described. The following steps are carried out at the computing device.
Mastercard International Incorporated

Transaction cryptogram

A method for generating transaction credentials for a user in a transaction, comprising: storing in a mobile device, an encrypted session key, and an encrypted user authentication credential; receiving an authorisation request; initiating a user authorisation process wherein in the event that the user is an authenticated user, the method comprises: decrypting the encrypted session key and encrypted user authentication credential; generating a transaction cryptogram in dependence on the user authentication credential and the session key; transmitting the transaction cryptogram and a user authentication status to a transaction processing entity for use in a transaction. .
Mastercard International Incorporated

Systems and methods for personal identification and verification

A personal/client identification and verification process, pseudonymous system and transaction network for monitoring and restricting transactions of cryptography-based electronic money. In one embodiment, there is a legal identity-linked credential authentication protocol for providing a practical solution for issues related to cryptocurrency theft, kyc and aml, while maintaining user privacy.
Black Gold Coin, Inc.

Management, authentication and activation of a data carrier

A method in a system comprising at least one portable data carrier, an authentication server and at least one reading device of at least one service provider which is couplable to the authentication server. The data carrier is adapted to communicate contactlessly with the reading device and comprises a security marking which can be read contactlessly by the reading device and on the basis of which the data carrier can be authenticated by the authentication server.
Giesecke+devrient Mobile Security Gmbh

Method for securing a transaction from a non-secure terminal

In a general aspect, a method can include: transmitting, to a terminal of the user via the server, an impenetrable program that can configure the terminal to display, on a display screen of the terminal, an image of a keypad having a randomly defined key distribution, the image including frames that are separately unintelligible for the user and are consecutively displayed at a rate suitable for using the persistence of the visual system of the user; executing the program via the terminal; gathering, via the terminal, positions of the display screen, designated by the user in relation to the displayed image of the keypad; transmitting, to the server via the terminal, the positions designated by the user, and verifying, via the server, the designated positions, the user being authenticated if the designated positions in the displayed image correspond to a secret authentication code of the user.. .
Skeyecode

Imaging processing system and method and management apparatus

An imaging processing system includes one or more image capturing apparatuses, a reading unit configured to read biometric information from an authentication object person, a similarity calculation unit configured to calculate similarity based on a result of comparing biometric information read by the reading unit with true biometric information of the authentication object person, an authentication unit configured to perform authentication based on a comparison between the similarity calculated by the similarity calculation unit and a preliminarily set threshold, and a control unit configured to control, if the authentication performed by the authentication unit is successful, imaging processing, which is performed by the image capturing apparatus, based on the similarity calculated by the similarity calculation unit.. .
Canon Kabushiki Kaisha

System, providing contextual data in a biometric authentication system

In one embodiment, an apparatus includes: a bioimpedance sensor to generate bioimpedance information based on bioimpedance sample information from at least some of a plurality of electrodes to be adapted about a portion of a person; at least one biometric sensor to generate biometric information based on biometric sample information from at least some of the plurality of electrodes; at least one environmental sensor to generate environmental context data; and an integration circuit to receive the bioimpedance information, the biometric information and the environmental context data and to adjust the bioimpedance information based at least in part on a value of one or more of the biometric information and the environmental context data. Other embodiments are described and claimed..
Intel Corporation

Smart-security digital system, method and program

Provided is a smart-security digital system that enables, when there is a habitual shoplifter or suspicious behavior person, an employee or the like close to the habitual shoplifter or suspicious behavior person to quickly rush to the scene and prevent an act of shoplifting. The smart-security digital system (1000) comprises a face authentication function unit (111) that collates with facial images of habitual shoplifters or suspicious behavior persons accumulated in a face information db (160), a control unit (110) that determines, when a result of collation by the face authentication function unit (111) is a match, a position of a mobile terminal device (30) closest to the habitual shoplifter or suspicious behavior person the collation result with whom is a match based on positional information acquired from a position determination unit (113), and transmits information on the habitual shoplifter or suspicious behavior person to the mobile terminal device (30), and an image processing unit (170) that synthesizes videos shot by monitor cameras (11) into a display screen consisting of a plurality of split screens, and performs a zoom-in processing to zoom in one of the split screens..
Technomirai Co., Ltd.

Device, method, and non-transitory computer-readable storage medium for biometric authentication

A method performed by a computer for biometric authentication includes: obtaining, by a processor of the computer, a first image group including a plurality of images that are sequentially captured by a biometric sensor configured to capture at least a part of a region of a body of a user; obtaining, by the processor of the computer, a movement amount of the body and a distance between the body and the biometric sensor; and selecting, by the processor of the computer, a second image group from the first image group in accordance with the movement amount and the distance, the second image group including images to be used in authentication processing with respect to the body, wherein the size of a common region between images to be included in the second image group is adjusted according to the distance.. .
Fujitsu Limited

In-band peripheral authentication

This document describes techniques (300, 400) and apparatuses (100, 500, 600, 700) for in-band peripheral authentication. These techniques (300, 400) and apparatuses (100, 500, 600, 700) may communicate via a non-media channel allowing host device (102) to authenticate peripheral (106), enable an enhanced operational mode of the host device (102), and/or provide content configured for the peripheral (106) without the use of out-of-band signaling..
Google Technology Holdings Llc

Authenticating internet user identities in electronic transactions

A method and system for authenticating an internet user identity by cross-referencing and comparing at least two independent sources of information. A first geographical location of a computer signature of an internet user is identified, and the geographical location of a communication voice device of said internet user is identified to determine a second location.

User equipment with smart biometric unlock

The apparatus of the disclosure provides a solution to the inconvenience currently faced while accessing the most frequently used applications by opening the most common application(s) using biometric authentication. For example, the apparatus may associate at least one biometric to a set of applications.
Qualcomm Incorporated

Detection system, fingerprint sensor, and finger touch authentication thereof

The present invention discloses a method of finger touch authentication through a fingerprint sensor. The method includes obtaining a plurality of touch operations through the fingerprint sensor, detecting a pattern of the plurality of touch operations; comparing the pattern with a registered pattern to generate a comparison result, and authenticating the plurality of touch operations on the basis of the comparison result, wherein the pattern indicates at least one feature, and the fingerprint sensor is capable of authenticating a fingerprint of a user after or before the finger touch authentication..
Novatek Microelectronics Corp.

Authentication session extension using ephemeral behavior detection

Hardware on a device, including sensors that may be embedded in or accessible to the device, extend the validity session of an authentication event by identifying behavior of the user periodically during the session. By detecting behavior that may be directly or indirectly unrelated to the application—but is necessarily present if the user remains the same—the session is extended for as long as that behavior is within some defined parameters.
Twosesnse, Inc.

Nucleic acid coated submicron particles for authentication

A composition comprising submicron particles covered by a monolayer of nucleic acid wherein the nucleic acid may be recovered from the submicron particles is claimed. Methods of attaching a nucleic acid to an object for authentication and methods of authenticating an object are also claimed..
Apdn (b.v.i.) Inc.

Two step smart key start system

A ignition start system in which authentication of a key is carried out twice, first to activate the ignition switch to allow starting the engine and second at the time when the brake pedal is depressed to put the car in a drive gear. The two step authentication prevents driving off in a car that has been started without having the key for security purposes and also to avoid inconvenient situations that can otherwise occur..

System and wifi authentication and selection

A method embodiment for network authentication includes selecting, by a user equipment (ue), an access network for establishing a network connection and receiving one or more network authentication status indications for a network associated with the access network. The method further includes implementing a network authentication and selection policy in accordance with the one or more network authentication status indications..
Futurewei Technologies, Inc.

Context-related arrangements

In one arrangement, a first device presents a display that is based on context data, derived from one or more of its sensors. This display is imaged by a camera in a second device.
Digimarc Corporation

Method and device for authenticating a mobile station on an alternative communications network

A method of authenticating a mobile station on an alternate communications network is disclosed, the mobile station being associated with a default communications network. The mobile station comprises a baseband processor to manage the antenna-related functions and a sim card to accommodate a default sim associated with the default communications network for receiving network credentials from the baseband processor.
Knowroaming Ltd

Mobile terminal and sharing sim card

The present invention provides methods for sharing a sim card and mobile terminals. The method comprises: utilizing a first mobile terminal to receive a sim card access request signal from at least a second mobile terminal which does not have the sim card, wherein the first mobile terminal has the sim card and operates as a server having no fixed ip; transmitting a security authentication information request signal to the second mobile terminal according to the sim card access request signal; and determining whether to transmit a sim card elementary files data to the second mobile terminal according to the security authentication information, wherein the sim card elementary files data is utilized by the second mobile terminal to use communication function of the sim card.
Mediatek Singapore Pte. Ltd.

Authentication method and recording medium

An authentication method includes requesting for user authentication based on first authentication information input via a reading device according to a user's operation; displaying a first screen for inputting second authentication information including user identification information, in response to the user authentication being unsuccessful based on the first authentication information; requesting for user authentication based on the second authentication information input via the first screen; allowing the user to log in, in response to the user authentication being successful based on the second authentication information; displaying a second screen for inputting an instruction as to whether to register the first authentication information, in response to the user being allowed to log in; and controlling the first authentication information and the user identification information included in the second authentication information to be registered in association with each other, in response to the first authentication information being instructed to be registered.. .
Ricoh Company, Ltd.

Information processing apparatus, information terminal, controlling the same, print system, and storage medium

Provided is an information processing apparatus and a control method thereof. The apparatus includes a user interface unit that accepts an operation made by a user and a wireless communication unit that communicates wirelessly with an information terminal.
Canon Kabushiki Kaisha

Brokered authentication with risk sharing

Embodiments described herein are implemented in authentication brokering systems where an authentication broker issues security tokens that represent its authentications of users. Client devices operated by the users store the security tokens and send them to resource providers.
Microsoft Technology Licensing, Llc

System, method, and device for delivering communications and storing and delivering data

A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is verified, optionally through a downloaded authentication driver.

Method and facilitating access to publish or post utilizing frictionless two-factor authentication

A method, apparatus and computer program products are provided for facilitating access to an internet of things (iot) device, platform or account associated therewith by performing frictionless two-factor authentication. One example method includes receiving a request, from a user device, to access the iot device, the request comprising first device identification information or the request comprising identification information enabling access to the first identification information, requesting, from a network entity, a network address configured to be sent to the user device and to capture second device identification information upon selection or navigation to the network address, providing the network address to the user device, receiving, from the network entity, second device identification information, the second device identification information determined upon the device accessing to the network address, performing a real-time comparison between the first device identification information and second device identification information, in an instance of a match between the first device identification information and second device identification information, granting the user device access to the iot device, and in an instance of no match between the first device identification information and second device identification information, denying the user device access to the iot device..
Averon Us, Inc.

Local verification of code authentication

Embodiments are directed to a computing device having execution hardware including at least one processor core, and non-volatile memory that stores verification module and a private symmetric key unique to the computing device. The verification module, when executed on the execution hardware, causes the execution hardware to perform pre-execution local authenticity verification of externally-supplied code in response to a command to launch that code.
Intel Corporation

Polymorphic configuration management for shared authorization or authentication protocols

Provided is a process including: receiving, from a first service-provider computer system, via a network, with an identity-provider computer system, a request to authenticate a user computing device; forming, with the identity-provider computer system, a first reply-configuration specification from a first plurality of configuration components; determining, with the identity-provider computer system, whether to provide authentication; forming, with the identity-provider computer system, based on the first reply-configuration specification, a reply to the request, the reply including a result of the authentication determination; and sending, with the identity-provider computer system, the reply.. .
Ca, Inc.

Mount, authentication device, authentication method, and program

A wearable article includes: an annular casing that surrounds a space into which a body of a user is to be inserted; a light-emitting element that is provided in the casing, the light-emitting element emitting light towards the space; an imaging element that is provided in the casing, the imaging element capturing and obtaining an image of the space when the light-emitting element emits light; and an authentication circuit that authenticates the user based on a vein pattern obtained in advance and the image.. .
Nec Corporation

Multifactor authentication device

An authentication device has internal circuitry operable to execute specific digital processing, a digital token, an image-capturing mechanism and circuitry, and an output interface. The image-capturing mechanism captures an image providing biometric identity of a user, the internal circuitry executing a first specific digital process creates a first digital string unique to the image providing biometric identity, the internal circuitry executing a second specific digital process combines the first digital string with the digital token, creating a combined digital string, and the combined digital string is provided to the output interface..

Online authentication method based on smart card, smart card and authentication server

Disclosed are an online authentication method based on a smart card, smart card and authentication server, the method comprising: running a first application located in a user identification and authentication card; receiving, via a first channel, authentication request information directly transmitted by a current terminal user to the user identification and authentication card, or receiving authentication request information transmitted to the user identification and authentication card by the current terminal user through the forwarding of an authentication server; generating, by the first application, an authentication code according to the authentication request information, the authentication code being used to identify whether the current terminal user is a valid user; transmitting, via the first channel, the authentication code to the authentication server for authentication; and receiving, via the first channel, an authentication result fed back by the authentication server after the authentication, and determining whether the current terminal user is a valid user.. .
Zte Corporation

Enhanced security authentication system

A method, computer system and computer program product for authenticating a transaction is provided. A service provider receives a transaction between a user and a website displayed on a first device.
Adp, Llc

Apparatus and implementing composite authenticators

A system, apparatus, method, and machine readable medium are described for implementing a composite authenticator. For example, an apparatus in accordance with one embodiment comprises: an authenticator for authenticating a user of the apparatus with a relying party, the authenticator comprising a plurality of authentication components; and component authentication logic to attest to the model and/or integrity of at least one authentication component to one or more of the other authentication components prior to allowing the authentication components to form the authenticator..
Nok Nok Labs, Inc.

Identity authentication using credentials

A method and system may allow for authenticating a computing device. A computing device may send an authentication request over a network to an authentication computing device.
Comcast Cable Communications, Llc

Method for securely exchanging link discovery information

A network system is provided to coordinate nodes in a network topology to exchange neighbor information. The network system includes a plurality of processing nodes, where each processing node includes a processing node manager configured to receive a key via a secured connection, wherein the key comprises an instruction to forward advertised discovery packets to each of the plurality of processing nodes; send advertised discovery packets advertising network port information to each of the other plurality of processing nodes; and receive and examine advertised discovery packets from each of the other plurality of processing nodes, the advertised discovery packets comprising an authentication code, wherein examining the advertised discovery packets comprises verifying the authentication code is compliant with the received key..
Quanta Computer Inc.

Trust status of a communication session

Techniques for trust status of a communication session are described. According to various embodiments, different networks cooperate to facilitate routing of communication sessions between different devices.
Microsoft Technology Licensing, Llc

Method for distributed trust authentication

A method for distributed trust authentication of one or more users attempting to access one or more service providers operating on a network includes performing primary authentication of a user using a first authentication factor, generating a first partial digital signature for a first authentication response to the primary authentication, performing secondary authentication of the user using a second authentication factor, generating a second partial digital signature for the second authentication response to the secondary authentication, combining the first and second partial digital signatures to form a composite digital signature, and validating the composite digital signature.. .
Duo Security, Inc.

Password management

Methods, apparatus, and computer-readable media are described herein related to biometric authentication. A first computing device can detect a machine-readable code displayed by a second computing device, where the machine-readable code can identify protected information viewable via the second computing device.
Google Llc

Method for authentication using an electronic device

Method for authenticating a user to a central server (130) and using an electronic device (120,122) with a screen display (121,123). The method comprises the following steps: a) associating each of the devices or users, with a unique set of codes (132), and each code with a piece of information; b) providing a software function, accessible from the selected electronic device; c) providing, on the screen display, a user interface activatable in several different ways, corresponding to different codes; d) specifying pieces of information and determining the corresponding codes; e) calculating a one-way function; f) communicating the calculated value to the central server; g) calculating a comparison output value; and h) authenticating the user if the values are equal.
Tokon Security Ab

Blockchain user authentication

Computer-implemented methods and systems are provided for blockchain-mediated user authentication. Consistent with disclosed embodiments, authentication may comprise operations including receiving, from a user system, an authentication request for a user.
Capital One Services, Llc

Self-identifying one-way authentication method using optical signals

In one aspect, the present disclosure relates to a self-identifying optical transmitter for broadcasting a one-way authentication code using light-based communication. The transmitter may include a memory for storing an identifier of the transmitter, a processor for generating a data signal including an identifier of the transmitter, a modulator for receiving the data signal and generating an electrical signal, the modular generating the electrical signal by modulating the data signal.
Abl Ip Holding Llc

Dual orientation electronic connector

An electronic device that includes a plug connector having a tab adapted to be inserted into a receptacle connector of a second device during a mating event, the tab including first and second opposing surfaces and a contact region formed at the first surface of the tab, the contact region including a plurality of contacts spaced apart along a first row, the plurality of contacts including a first contact, a power contact and a ground contact; a computer-readable memory having identification, configuration and authentication information relevant to the electronic device that can be communicated to the second device during a mating event stored therein; circuitry coupled to the first contact and configured to, after a mating event in which the plug connector is inserted into the receptacle connector, participate in a handshaking algorithm that includes receiving a command over the first contact from the second device and sending a response to the command that includes contact configuration information for the electronic device over the first contact to the second device; and power circuitry, coupled to the power contact, configured to deliver power to charge a device coupled to the electronic device via the plug connectors.. .
Apple Inc.

Semiconductor device and authentication system

In order to realize a silicon puf of lower power consumption, a semiconductor device includes first and second mis transistors of the same conductive type in off-state coupled in series, as a puf element. The puf element outputs a signal of high level or low level depending on the potential of a connection node of the first and the second mis transistors.
Renesas Electronics Corporation

Voice signature for user authentication to electronic device

An authentication application receives an audio input, detects whether the audio input matches a known passphrase, and processes the audio input to determine whether the audio input is consistent with a known voice signature. Upon determining that the audio input is consistent with the known voice signature, the application will identify a user who is associated with the voice signature.
Google Llc

Systems and methods for authenticating a cartridge

System and methods for authenticating a cartridge comprising reading a unique identifier (uid) and a unique authentication string (uas) stored on a data storage medium associated with a cartridge; generating, based on the uid or the uas read from the data storage medium, a test unique authentication string (tuas) or a test unique identifier (tuid), respectively, according to a methodology used to generate the uas stored on the data storage medium; and comparing the tuas or the tuid to the uas or the uid read from the data storage medium, respectively, to determine if the cartridge is authentic. A method in which the uas is generated and stored on the data storage medium at a first location, and subsequently authenticated at a second location..
Multipure International

Systems and methods for managing access to a vehicle or other object using environmental data

Systems and methods for controlling access to a vehicle or other object are provided. A vehicle-based authentication unit and mobile access device, e.g., a key fob, that wirelessly communicates with the vehicle-based authentication unit may each include environmental sensor(s) that collect respective environmental data local to the respective device/unit, e.g., gps data, local temperature data, local barometric pressure data, etc.
Microchip Technology Incorporated

System and implementing virtual reality

Techniques are disclosed for improving virtual reality experience by optimizing spatial mapping coordination and device setup while maintaining up-to-date content and managing security. An augmented reality unit can map virtual reality content and assets related to a physical space in a virtual environment.

Talent donation bank service provision method and system

A system for providing a talent donation bank service comprises: a transmission and reception unit which receives a fund investment request of a customer from the user terminal; an authentication unit which has a talent qualification degree, competence qualification degree or talent and competence qualification degree of the customer authenticated by a corresponding school server; a value evaluation unit which evaluates the talent qualification degree, the competence qualification degree or the talent and competence qualification degree authenticated through the authentication unit as a property value based on a predetermined criterion; and an investment unit which transmits investment funds to the customer based on evaluation results of the value evaluation unit.. .

Method and facilitating payment option aggregation and without additional user input, payment option selection, utilizing an automated authentication engine

A method, apparatus and computer program products are provided for payment option aggregation, and without additional user input, payment option selection. One example method includes receiving a request to complete a transaction, the request comprising identifying information, authenticating a user utilizing the identifying information, accessing one or more payment entities, using authenticated user identifying information, to identify payment options, each payment option having an associated payment method, accessing user-set, pre-defined preference data, the user-set, pre-defined preference data indicative of at least one specific parameter on which to base a selection, selecting, without additional user input, a particular payment option from the payment options that provides a maximal value of the specific parameter, and completing the transaction utilizing the selected particular payment option..
Averon Us, Inc.

Secure and efficient payment processing system

A method is provided for facilitating session-based authentication for a plurality of e-commerce transactions for an account holder. The method includes registering a plurality of account holders, receiving, from an account holder of the plurality of account holders, user input setting the account privilege information for an account corresponding to the account holder, and receiving a transaction request for an e-commerce transaction between the account holder and a merchant, the transaction request comprising transaction details including a transaction value and a transaction time, and, in response to the transaction request, performing, with at least one computer system, an authentication process.
Cardinalcommerce Corporation

Transaction process

A method for anonymously carrying out a transaction, wherein one-time passwords encrypted by means of a one-way function are sent by an authentication server to a service device. The non-encrypted one-time passwords are sent by the authentication server to a secure element of a mobile device.
Giesecke & Devrient Gmbh

Electronic system and automatic website login and security payment method using near-field communication

An automatic website login and security payment method is provided. The method includes the steps of: utilizing a mobile device to transmit transaction authentication program information to a computer device via near-field communication, wherein the transaction authentication program information includes a database file and a transaction authentication program; detecting at least one website that is being visited by the computer device via the transaction authentication program; when the database file includes user information corresponding to the at least one website, inputting the user information in the database file into the at least one website; and when the database file does not include the user information corresponding to the at least one website, capturing the user information that is input on the at least one website via the transaction authentication program..
Wistron Corp.

Method and facilitating payment option aggregation to complete a transaction initiated at a third party payment apparatus, utilizing an automated authentication engine

A method, apparatus and computer program products are provided for performing payment option aggregation to complete a transaction initiated at a third party payment apparatus. One example method includes receiving, from the third party payment apparatus, a request to complete a transaction, the request initiated via input of identifying information to the third party payment apparatus or initiating a short-range wireless communication connection with the third party payment apparatus to transmit the identifying information, authenticating a user utilizing the identifying information, authentication comprising sending a request to a mobile device associated with the identifying information for location information; and confirming a match between the location information and a location associated with the third party payment apparatus, accessing one or more payment entities, using authenticated user identifying information to identify payment options, each payment option having an associated payment method, and completing the transaction utilizing a selected payment option..
Averon Us, Inc.

Personalized automatic teller machine

Computer implemented systems and methods are provided for an automatic teller machine. In some embodiments, an automatic teller machine may comprise a touch-sensitive display, one or more memory devices storing instructions, and one or more processors.
Capital One Services, Llc

Generating authentication image to verify a two-dimensional code offline

The present disclosure describes technologies related to generating authentication image to verify a two-dimensional (2d) code offline. In some implementations, a 2d code is parsed to identify a plurality of black pixels and a plurality of white pixels.
Alibaba Group Holding Limited

Dynamic face and voice signature authentication for enhanced security

Techniques and apparatuses for a dynamic face and voice signature authentication for enhanced authentication techniques are described herein. In one or more implementations, an authentication system is configured to authenticate a user using a combination of voice and facial recognition techniques.
Microsoft Technology Licensing, Llc

Device for measuring biometric information and internet of things system including the same

A device for measuring biometric information includes an impedance measurement circuit, a storage circuit, and a control circuit. The impedance measurement circuit receives an electrical signal from a plurality of electrodes when the plurality of electrodes are in contact with a body of a user and measures a bioelectrical impedance using the electrical signal.
Samsung Electronics Co., Ltd.

Authentication based on client access limitation

Systems, computer program products and methods implementing access control on a distributed file system are described. A file system enforcement point protects an hdfs from unauthorized access by authenticating a declared identity of a task submitting a request from a client.
Bluetalon, Inc.

Methods and systems for secure and reliable identity-based computing

The embodiments herein provide a secure computing resource set identification, evaluation, and management arrangement, employing in various embodiments some or all of the following highly reliable identity related means to establish, register, publish and securely employ user computing arrangement resources in satisfaction of user set target contextual purposes. Systems and methods may include, as applicable, software and hardware implementations for identity firewalls; awareness managers; contextual purpose firewall frameworks for situationally germane resource usage related security, provisioning, isolation, constraining, and operational management; liveness biometric, and assiduous environmental, evaluation and authentication techniques; repute systems and methods assertion and fact ecosphere; standardized and interoperable contextual purpose related expression systems and methods; purpose related computing arrangement resource and related information management systems and methods, including situational contextual identity management systems and methods; and/or the like..
Advanced Elemental Technologies, Inc.

System of device authentication

There is disclosed a method of authenticating a user with respect to more than one digital device; said user having an account on a server; said method comprising: a. The user effecting a login sequence and an authenticating sequence on a first digital device as referenced and recorded on the server thereby to authenticate the user with respect to the first digital device; b.
Haventec Pty Ltd

Method and facilitating access to a device utilizing frictionless two-factor authentication

A method, apparatus and computer program products are provided for facilitating access to an internet of things (iot) device, platform or account associated therewith by performing frictionless two-factor authentication. One example method includes receiving a request, from a user device, to access the iot device, the request comprising first device identification information or the request comprising identification information enabling access to the first identification information, requesting, from a network entity, a network address configured to be sent to the user device and to capture second device identification information upon selection or navigation to the network address, providing the network address to the user device, receiving, from the network entity, second device identification information, the second device identification information determined upon the device accessing to the network address, performing a real-time comparison between the first device identification information and second device identification information, in an instance of a match between the first device identification information and second device identification information, granting the user device access to the iot device, and in an instance of no match between the first device identification information and second device identification information, denying the user device access to the iot device..
Averon Us, Inc.

Facilitating resolution of a human authentication test

An approach is described of facilitating resolution of a human authentication test. The approach may facilitate user completion of a human authentication test having at least one image while preserving security against bots.
International Business Machines Corporation

Biometric interface system and method

A system includes a wearable device having at least one sensor configured to determine a user's fingerprint data, at least one data storage device containing authentication data, and at least one processor configured to compare the user's fingerprint data with the authentication data to authenticate a user. A method of authenticating a wearable device includes producing a fingerprint, determining fingerprint data derived from the fingerprint with one or more sensors, comparing the fingerprint data with authentication data on one or more data storage devices, and authenticating the user if the fingerprint data and the authentication data match..
Bragi Gmbh

System, device, and voice-based user authentication utilizing a challenge

Device, system, and method of voice-based user authentication utilizing a challenge. A system includes a voice-based user-authentication unit, to authenticate a user based on a voice sample uttered by the user.
Vocalzoom Systems Ltd.

Learning engines for authentication and autonomous applications

Disclosed are methods, systems, devices, apparatus, media, and other implementations, including a method that includes obtaining user-related data from a plurality of input sources, deriving multiple time-dependent authentication metrics based on the user-related data from the plurality of input sources, applying at least one of the derived multiple time-dependent authentication metrics to a learning authentication engine configured to authenticate an authorized user based on multiple inputs and correlations between at least some of the multiple inputs, and generating an authentication signal in response to a determination, by the learning authentication engine, that the derived multiple time dependent authentication metrics correspond to the authorized user.. .
The Trustees Of Columbia University In The City Of New York

Unique patterns extracted from involuntary eye motions to identify individuals

A method for user authentication is disclosed including capturing involuntary eye movement of an eyeball of a user; generating a unique pattern to identify the user in response to the involuntary eye movement; storing the unique pattern into a secured non-volatile memory device; and authenticating the user with an electronic device in response to the stored unique pattern.. .
Aerendir Mobile Inc.

Supplemental hand gesture authentication

Providing supplemental authentication of a user based on hand gesture activity of a user with an application of a device after a user has completed a successful authentication challenge to initially access the device. Hand gesture activity of the user with the device is recorded during current use of an application of the device.
International Business Machines Corporation

Supplemental hand gesture authentication

Providing supplemental authentication of a user based on hand gesture activity of a user with an application of a device after a user has completed a successful authentication challenge to initially access the device. Hand gesture activity of the user with the device is recorded during current use of an application of the device.
International Business Machines Corporation

Gestural swipe user input

Authentication of a computing device involves displaying an authentication code display area and an authentication code input area on a touchscreen display of a computing device, detecting a touch contact at a first touch point in the authentication code input area, presenting a first character associated with the first touch point on the display, detecting a first swipe gesture from the first touch point to a second touch point, presenting a second character associated with the second touch point, detecting a confirmation gesture associated with the second touch point, and authenticating the computing device based at least in part on the second character.. .
Fitbit, Inc.

User input using touchscreen display subareas

Authentication of a computing device involves displaying a plurality of subareas on a touchscreen display of a computing device, detecting a touch contact in a first subarea of the plurality of subareas, detecting a first swipe gesture from the first subarea to a second subarea of the plurality of subareas, detecting a first confirmation gesture associated with the first swipe gesture, and authenticating the computing device based at least in part on the first swipe gesture.. .
Fitbit, Inc.

Method and facilitating access to an automobile utilizing frictionless two-factor authentication

A method, apparatus and computer program products are provided for facilitating access to a vehicle or an account or platform related thereto by performing frictionless two-factor authentication. One example method includes receiving a request, from a user device, to access the vehicle, the request comprising first device identification information or the request comprising identification information enabling access to the first identification information, requesting, from a network entity, a network address configured to be sent to the user device and to capture second device identification information upon selection or navigation to the network address, providing the network address to the user device, receiving, from the network entity, second device identification information, the second device identification information determined upon the device accessing to the network address, performing a real-time comparison between the first device identification information and second device identification information, in an instance of a match between the first device identification information and second device identification information, granting the user device access to the vehicle, and in an instance of no match between the first device identification information and second device identification information, denying the user device access to the vehicle..
Averon Us, Inc.

Network edge based access network discovery and selection

An edge device comprising access network discovery and selection function (andsf) features is disclosed. An edge device can be a device located at a logical edge of a wireless network.
At&t Intellectual Property I, L.p.

System and secure cell redirection in wireless networks

A mobility management entity (mme) is configured to perform cell redirection or circuit-switched fallback with security protocols. The mme receives an initial connection message from user equipment (ue) in an idle mode with a service request for a voice call.
Alcatel-lucent Usa Inc.

System and session establishment by unauthenticated user equipment

An authentication server establishes a network connection to user equipment (ue) in a non-3gpp compliant access network. The authentication server obtains an identity for the ue and determines that the ue is unauthenticated and requesting establishment through a non-3gpp compliant access network.
Alcatel-lucent Usa Inc.

Method and device for identifying visited and home authentication servers

Authentication problems often occur when a user of a terminal visits a communications network while roaming. A method is therefore provided for authorizing an authenticated user of a communications terminal.
Orange

Mobile device to provide continuous authentication based on contextual awareness

Disclosed is a mobile device to authenticate a user. The mobile device may comprise: a first sensor; a second sensor to use more power than the first sensor; and a processor coupled to the first sensor and the second sensor.
Qualcomm Incorporated

Wearable data device with deactivation security feature

A wearable data device, for being worn by a user to facilitate access to transactions and actions that require authorization by the user. The data device contains a memory unit for storing user authentication credentials for external devices.

Interworking and integration of different radio access networks

The proposed technology generally relates to interworking and integration of different radio access networks, and more specifically to carrier aggregation between different radio access networks such as a cellular radio access network, e.g. A 3gpp network, on one hand and a wlan network such as wi-fi, on the other hand.
Telefonaktiebolaget Lm Ericsson (publ)

Method and system for tracking and authenticating articles

The present invention relates to a method and system for tracking, issuing, and authenticating gear or articles, such as uniforms, badges, equipment, weapons, etc, for use in law enforcement or other official capacity. An authentication system retrieves encoded information read by a reader from a plurality of different markers.
Martex Potosí, S.a. De C.v.

Terminal, retrieving authentication-related information, and program causing terminal to perform process of retrieving authentication-related information

According to one embodiment, there is provided a terminal that includes a memory and a processor. The memory stores authentication-related information indicating that a first cloud completes approval of authentication, which is acquired by a terminal from the first cloud that transmits an instruction to perform a job to a job-performing apparatus of which registration is completed based on an instruction from the terminal, if the registration of the job-performing apparatus is completed.
Toshiba Tec Kabushiki Kaisha

Remote control authority and authentication

The invention relates to systems and methods to enable a mobile device to be used as a remote control, in order to control one or more remotely controllable objects. In possible embodiments of the invention, proximity-based (or other) remote controls include control authorization to enable the transfer or sharing of control between different remote controls being implemented on different mobile devices, in order to permit different users to transfer or share control of a same remotely controllable object, for example.

Mobile device displaying real time sports statistics

A portable electronic device includes a memory and a processor. The processor is configured to display real time sports statistics received from an external entity.

Systems and methods to authenticate users and/or control access made by users on a computer network using identity services

A controller for user authentication and access control, configured to: store data representing a graph having: nodes representing data elements associated with accesses made using an access token; and links among the nodes representing connections between the data elements identified in details of the accesses. In response to receiving details of an access made using the access token, the controller updates the graph according to the details and identifies a new connection in the graph resulting from update.
Idm Global, Inc.

Methods and devices for identifying an authentication server

A method for connecting a terminal of a user to an anchoring gateway connected to a packet-switching network. The method is implemented by an access gateway to which the terminal is connected and includes: transmission of a user authorization request, including an identifier of the user, to a current authentication server; receipt of a user authorization response from the current authentication server, including a unique identifier of an authentication server that authenticated the user; transmission of a connection request to the anchoring gateway, intended to connect the terminal to the packet-switching network, including the unique identifier of the authentication server that had authenticated the user..
Orange

Authentication on thin clients using independent devices

Authentication can be performed on thin clients using independent mobile devices. Because many users have smart phones or other similar mobile devices that include biometric scanners, such mobile devices can be leveraged to perform authentication of users as part of logging in to a thin client desktop.
Wyse Technology L.l.c.

Securing a computing device accessory

Various embodiments are disclosed that relate to security of a computer accessory device. For example, one non-limiting embodiment provides a host computing device configured to conduct an initial portion of a mutual authentication session with an accessory device, and send information regarding the host computing device and the accessory device to a remote pairing service via a computer network.
Microsoft Technology Licensing, Llc

Dtcp certificate authentication over tls protocol

Authenticating devices utilizing transport layer security (tls) protocol to facilitate exchange of authentication information or other data to permit or otherwise enable access to services requiring authentication credentials, certificates, tokens or other information. The authentication may utilize digital transmission content protection (dtcp) certificates, diffie-hellman (dh) parameters or other information available to the authenticating devices, optionally without requiring device requesting authentication to obtain an x.509 certificate..
Cable Television Laboratories, Inc.

Web ticket based upon a symmetric key usable for user authentication

Described herein are various aspects pertaining to generating web tickets for use with authenticating computing devices to a computing system. Symmetric keys are used when generating the web tickets, wherein a symmetric key is valid for use when generating web tickets for a first period of time, and a web ticket generated based upon the symmetric key is valid for use when authenticating a computing device for a second period of time that is longer than the first period of time.
Microsoft Technology Licensing, Llc

System and identity authentication

A system, comprising includes an orchestration server including a processor, the orchestration server to receive authentication factors. A rules engine connects with the orchestration server, the orchestration to send the authentication factors to the rules engine and to request a decision on authentication from the rules engine.
Genesys Telecommunications Laboratories, Inc.

Authentication device and computer-readable recording medium

An authentication device includes a first login module and a second login module. Upon a login request to a first account among predetermined accounts which is accompanied by an entry of authentication information from a user, the first login module compares the entered authentication information with the authentication information associated with each of the predetermined accounts and approves the login request if the entered authentication information matches the authentication information on the first account.
Casio Computer Co., Ltd.

Authentication through multiple pathways based on device capabilities and user requests

There are provided systems and methods for authentication through multiple pathways depending on device capabilities and user requests. A user may wish to utilize some device process, such as unlocking and accessing the device to utilize the device's operating system or access and use of a device application or other module (e.g., a camera).
Paypal, Inc.

Communication apparatus, communication method, and communication program product

A communication apparatus includes a counter, a reception portion, an update portion, a code generation portion, a determination portion, and a transmission portion. The reception portion receives a communication data from a different one of the communication apparatus.
Denso Corporation

Techniques for securely communicating a data packet via at least one relay user equipment

Techniques are described for wireless communication. A method of wireless communication at a transmitting wireless device includes generating a first message authentication code (mac) for a data packet based at least in part on a first security key used to communicate with a receiving wireless device; generating a second mac for the data packet based at least in part on a second security key used to communicate with a relay user equipment (ue), in which the relay ue is included in a data routing path between the transmitting wireless device and the receiving wireless device; and transmitting the data packet to the relay ue with at least the first mac and the second mac..
Qualcomm Incorporated

Virtualized host id key sharing

In virtualized environments a method of determining authorization to a resource cannot use a hardware specific identifier, such as a mac address. As a result upgrading a virtual host may cause licenses associated with that host to be invalid, even though the upgraded virtual host should be authorized.
Extreme Network, Inc.

Method for communication between devices and devices thereof

Disclosed is a method of performing, by a first device, short-range wireless communication with a second device, the method including receiving, from the second device, second authentication information encrypted using first authentication information of the first device, decrypting the encrypted second authentication information by using the first authentication information, determining a secret key based on the decrypted second authentication information, and performing communication between the first device and the second device by using the determined secret key.. .
Samsung Electronics Co., Ltd.

Communication of messages over networks

A method is provided for communicating messages between sender and receiver computers, connectable via a network to a system of servers, based on authentication of receiver passwords, associated with respective receiver ids, by the system. A method is also provided for receiving a message from a sender based on authentication of a receiver password, associated with a receiver id, by a system of servers, in a network, wherein each server stores for the id a ciphertext produced by encrypting the receiver password under a public key via a homomorphic threshold encryption scheme having a threshold, and a key-share of a secret key corresponding to that public key, and stores an encrypted message from the sender encrypted under the public key.
International Business Machines Corporation

Method and authentication and identity management of communicating devices

Aspects of the subject disclosure may include, for example, a network device that accesses internet protocol addresses associated with a group of end point devices where the network device is a closest network device to the group of end point devices, and transmitting data to another network device responsive to a determination that an internet protocol address associated with the data from an end point device is one of the internet protocol addresses associated with the group of end point devices. Other embodiments are disclosed..
At&t Intellectual Property I, L.p.

System and providing network support services and premises gateway support infrastructure

A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely manages delivery of application services, which can be voice controlled, by a gateway, e.g.
Kip Prod P1 Lp

Secure device registration for multi-factor authentication

Provided is a process including: receiving a request from a first computing device to register another computing device; sending to the first computing device a registration code; receiving the registration code from a second computing device; sending an instruction to the designated application to send a value indicative of access to a cryptographic key; receiving from the designated application the value indicative of access to the cryptographic key; determining, based on the received value, that the received registration code was sent by the designated application and not another untrusted application.. .
Ca, Inc.

Multi-use long string anti-tampering authentication system

This disclosure describes systems and methods for implementing techniques that use multi-use long string authentication keys to protect the transfer of data resources from a sending device to a recipient device. More specifically, an anti-tampering authentication application is described that may reside on client devices that send and receive data resources.
Atf Cyber, Inc.

Authenticator, authenticatee and authentication method

According to one embodiment, an authenticator which authenticates an authenticatee, which stores first key information (nkey) that is hidden, includes a memory configured to store second key information (hkey) which is hidden, a random number generation module configured to generate random number information, and a data generation module configured to generate a session key (skey) by using the second key information (hkey) and the random number information. The authenticator is configured such that the second key information (hkey) is generated from the first key information (nkey) but the first key information (nkey) is not generated from the second key information (hkey)..
Toshiba Memory Corporation

Wireless charging apparatus and method

A wireless charging method and apparatus are provided. Identification information is transmitted, through a near field communication antenna, to a wireless power transmitter for an authentication process of the electronic device, if the electronic device is put on the wireless power transmitter for wireless charging and a near field communication controller is in an initial or idle state.
Samsung Electronics Co., Ltd.

Multiclass logical document recycler management

A document handling apparatus for recycling documents includes an authentication unit, a first recycling storage unit, a document cassette, and a controller. The authentication unit is for receiving an input document and classifying the input document as having a class that is one of a plurality of classes.
Crane Payment Innovations, Inc.

Electronic access control system

A system includes one or more memory devices storing instructions, and one or more processors configured to execute the instructions to perform steps of a method. The system may receive an authentication request from a computing device and determine whether the authentication request corresponds with stored authentication data.
Capital One Services, Llc

Secure delivery via unmanned vehicles

Systems and methods are provided for on-demand delivery of a payload by an unmanned vehicle. An unmanned vehicle may comprise a chamber configured to house a payload and adjust a payload state.
Capital One Services, Llc

Systems and methods for database management of transaction information and data for verification of transaction information

A system for storing data related to a transaction and for facilitating the transaction, the system comprises a database; an application server coupled with the database and configured to store information associated with a plurality of transactions, the information including a transaction identifier, a notary identifier, and a buyer identifier, the application server further configured to receive geographical location data related to a buyer associated with the transaction, generate and send a notification to a device associated with the notary identifier to cause a notary agent identified, by the application server, based on the notary identifier to be dispatched to the geographical location of the buyer, and receive authentication credentials from the notary device based on the transaction identifier and buyer identifier.. .

Method and facilitating performing payment option aggregation utilizing an automated authentication engine

A method, apparatus and computer program products are provided for performing payment option aggregation. One example method includes receiving, for example, from an e-commerce platform, a request to complete a transaction, the request comprising identifying information, authenticating a user utilizing the identifying information, accessing one or more payment entities using the authenticated user identifying information to identify payment options, each payment option having an associated payment method, providing, for display, a descriptor associated with each of a portion of the identified payment options, and receiving an indication of a selection of at least one payment option..
Averon Us, Inc.

Financial transaction relay system having multi-safety lock function of processing user authentication by scanning both finger pulse and fingerprint, and processing method therefore

A financial transaction relay system includes a financial transaction relay server for relaying, through an authentication-free access, a financial transaction to be performed among a customer terminal, an electronic financial transaction system, and electronic commerce systems. The financial transaction relay server includes: a multi-safety lock module for processing authentication of a user who uses finger pulse authentication, fingerprint authentication, password authentication, and telephone number authentication of the customer terminal; and a middleware firewall..
All It Top Co., Ltd.

Consortium blockchain network with verified blockchain and consensus protocols

The disclosed technology is generally directed to blockchain and other authentication technology. In one example of the technology, a pre-determined type of blockchain or other authentication protocol code and a pre-determined type of consensus code are stored in a trusted execution environment (tee) of a processor.
Microsoft Technology Licensing, Llc

Biometric authentication of mobile financial transactions by trusted service managers

In one embodiment, a method comprises storing a biometric trait of a user in a data communication device of the user, comparing a biometric trait input into the device with the biometric trait stored in the device, generating a certificate authenticating the user within the device if the biometric trait input into the device matches the biometric trait stored in the device, and facilitating a financial transaction of the user using the certificate.. .
Paypal, Inc.

Terminal for conducting electronic transactions

The present disclosure is drawn to, among other things, a method of providing a payment terminal application on an electronic device, the electronic device comprising a volatile storage module, a user input module and a network interface module. In some aspects the method includes receiving user credentials from the user input module, transmitting an authentication request message to a remote data center via the network interface module, the authentication request message including the user credentials, receiving an authentication response message from the remote data center, the authentication response message including an indication as to whether authentication was successful, and if the authentication was successful, receiving at least one encryption key from the remote data center; and storing the at least one encryption key in the volatile storage module..
Worldpay Limited

Method for authenticating a finger of a user of an electronic device

The present invention generally relates to a method for authenticating a finger of a user of an electronic device comprising a fingerprint sensor for sensing a fingerprint pattern, the method comprising the steps of: acquiring a candidate fingerprint image; determining, based on the candidate fingerprint image, a humidity level indication indicative of the humidity level of the finger; performing an authentication pre-process based on the humidity level indication; performing a fingerprint authentication process based on the pre-process to authenticate the user.. .
Fingerprint Cards Ab

Source authentication of a software product

Embodiments of the present invention provide systems and methods for authenticating the source code of a software end product. The method includes generating a compound key, which is composed of a set of unique keys generated from a source file.
International Business Machines Corporation

Method and protecting digital content using device authentication

A user device may strengthen the protection level of a digital content by dividing the security and normal modes and performing an operation. In order to further strengthen the protection level of the digital content, the user device may determine whether the main operating system is hacked or not, and blocks the operation in the secure mode.
Samsung Electronics Co., Ltd.

Enhancing security of a mobile device based on location or proximity to another device

A mobile device detects its location and other devices in proximity to the mobile device. When the device is in an untrusted location, or is in physical proximity to an untrusted device, the mobile device ensures existing security and authentication mechanisms are in place, and may additionally require enhanced security measures on the device.
International Business Machines Corporation

Enhancing security of a mobile device based on location or proximity to another device

A mobile device detects its location and other devices in proximity to the mobile device. When the device is in an untrusted location, or is in physical proximity to an untrusted device, the mobile device ensures existing security and authentication mechanisms are in place, and may additionally require enhanced security measures on the device.
International Business Machines Corporation

Automated password authentication

A system connected to an existing computer includes a unit for monitoring the screen and provides input, a storage unit that stores data that pairs screen buffer regions with authentication details, wherein the system learns new pairs via user training and presents stored authentication details when the screen buffer regions match a related stored region which is paired with a region of the screen, and a unit that determines which of stored passwords need to be presented to the system by a pattern matching of regions of screen pixels.. .
International Business Machines Corporation

Systems and methods for authenticating a user based on a computing device

A system and/or method may be provided to silently authenticate a user. An example method of silently authenticating a user includes receiving a set of device characteristics from a user device and identifying, based on the set of device characteristics, the user device.
Paypal, Inc.

Computer keyboard with secure authentication features

A keyboard is disclosed. The keyboard may comprise a biometric sensor configured for authenticating a user; a docking station configured for receiving a security device; and a processor configured for facilitating communication between the biometric sensor and the security device docked in the docking station with a computing device coupled to the keyboard..
Bloomberg Finance L.p.

Allowing access to applications based on user handling measurements

Authenticating users comprises a computing device that receives a manual authentication input of a user and initiates a first user session between the user and the user computing device. The device communicates a request for a first user authorization data from an authentication technology associated with the one or more computing devices and receives the first user authentication data.
Google Llc

Biometric authentication apparatus, biometric authentication method, and non-transitory computer-readable storage medium for storing program for biometric authentication

A biometric authentication apparatus includes: a biometric sensor configured to capture an image of a hand of a user; a touch panel configured to output a contact signal indicating contact positions of fingers of the user in response to the reception of an operation by the fingers of the user; and control circuitry configured to display, on the touch panel, a plurality of marks each of which indicates position at which any of the fingers of the user is intended to come into contact with the touch panel, acquire the contact signal output from the touch panel, and reduce in size one or more marks among the plurality of marks during acquiring biometric information from the image captured by the biometric sensor when the control circuitry detects, in accordance with the contact signal, that the fingers of the user are in contact with the plurality of marks.. .
Fujitsu Limited

Electronic device for authenticating biometric data and system

The present disclosure provides an electronic device and system that include an electrode interface that can be brought in contact with the body of a user, a memory, and a processor operably coupled to the electrode interface and the memory, in which the processor is set to obtain user information through user authentication, generate a user authentication signal on the basis of the user information, and transmit the user authentication signal or a signal including at least a portion of the user authentication signal through the body of a user being in contact with the electrode interface.. .
Samsung Electronics Co., Ltd

Wearable electronic devices

Wearable electronic device technology is disclosed. In an example, a wearable electronic device can include a handling portion that facilitates donning the wearable electronic device on a user.
Intel Corporation

Multi-factor user authentication framework using asymmetric key

A multi-factor user authentication framework using asymmetric key includes a host device, a user agent, a gesture system, and an authentication system. The multiple factors include a user credential as well as a user gesture that indicates that the user is present.
Microsoft Technology Licensing, Llc

User authentication

A method, computer system, and computer program product for authenticating a user is provided. The method includes the steps of receiving a user input via a pressure-sensitive input interface, the user input being indicative of a possible component part of an authentication code or pattern, determining a pressure applied to the pressure-sensitive input interface by the user when providing the user input, determining whether to ignore the user input as a component part of the authentication code or pattern based on the pressure applied and irrespective of the whether the user input is determined to be ignored, providing an input acknowledgement signal to an output interface for indicating the user input was received.
International Business Machines Corporation

Authentication of quantum dot security inks

A method is provided for verifying the authenticity of an article which bears a security mark. The method includes irradiating the security mark with a time-varying light source, ascertaining at least one portion of the emissions spectrum of the irradiated security mark with at least one photodetector, determining the photoluminescence lifetime of the security mark by monitoring the time or frequency response of the photodetector, and verifying the authenticity of the article only if the security mark exhibits a photoluminescence which has a lifetime that falls within the range of appropriate values for each portion of the photoluminescence spectrum for which the photoluminescence lifetime of said security mark was ascertained..
Ubiqd, Inc.

Method and syncing an embedded system with plurality of devices

An approach is provided for synchronizing a function among an embedded system and/or one or more devices. The approach involves causing, at least in part, an authentication of at least one user at an embedded system.
Here Global B.v.

Vehicle control system

Provided is a vehicle control system that performs detection and authentication of an electronic key being present in a detection range on a periphery of a vehicle, on the basis of polling performed by an on-vehicle apparatus. Any one of the on-vehicle apparatus and a first electronic key includes: a determination section configured to determine whether or not communication, between the on-vehicle apparatus and the first electronic key, in which the first electronic key returns a signal in response to a signal transmitted from the on-vehicle apparatus is continuously performed for not less than a predetermined time period; and a first processing section configured to restrict a response, by the first electronic key, to a first polling signal transmitted from the on-vehicle apparatus, when the determination section has determined that the communication is continuously performed for not less than the predetermined time period..
Toyota Jidosha Kabushiki Kaisha

Method and device for applying identification features to a packing strip in order to authenticate the process packing, processed packing and packing

In the method for applying identification features to a packing strip in order to authenticate the processed packing, the packing strip is fed in a packing line to an embossing station, where logos of all kinds and/or codes and/or a satin finish and/or fold lines are embossed at the cycle rate of the packing machine by means of embossing rollers by deforming the packing strip, identification: features and possibly other features are produced additionally on the packing strip on-line, in the same process step, and synchronously to the cycle rate by material removal by means of a feature setup comprising a laser installation, the packing strip having a thickness of 50 μm to 300 μm. The thus treated packing strip is subsequently further processed.
Boegli-gravures Sa

Mobile communication system and pre-authentication filters

A method and system is disclosed for providing applications and devices in a mobile part access to communications between the mobile part and a fixed part and such that prior to completion of authentication of the mobile part with the fixed part certain types of communications between the mobile part and the fixed part are supported by a service connection not requiring completion of authentication. The types of communications able to use the service connection are provided to the mobile part in the form of a pre-authentication filter..
Radio Ip Software Inc.

Methods and systems for connecting a wireless communications device to a deployable wireless communications network

Methods and systems for connecting a wireless communications device to a deployable wireless communications network. The method includes receiving, from the wireless communications device via a mobile management entity (mme) configured to operate as an extensible authentication protocol (eap) authenticator, an extensible authentication protocol packet.
Motorola Solutions, Inc.

User-defined coverage of media-player devices on online social networks

In one embodiment, a method includes detecting, by a media-player device including multiple antennas, a client system of a user is within a wireless communication range of the media-player device. In response to the detection, the media-player device broadcasts an authentication key for the user of the client system.
Facebook, Inc.

Mobile wireless device managed access system providing enhanced authentication features and related methods

A managed access system is for mobile wireless devices (mwds) in a facility, with the facility being geographically within a wireless communications network of a communications carrier. The system may include antennas arranged at the facility, radio equipment coupled to the antennas, a network interface device configured to provide communications with the communications carrier, and a management access controller.
Harris Corporation

Frictionless authentication over wifi

A system described herein may allow for the frictionless authentication of a user and/or user device (e.g., without requiring that the user provide login details, such as a user name and password). The frictionless authentication may occur via a licensed wireless network, even when the user device is actively engaged in communications with an unlicensed wireless network (and/or is not engaged in communications with the licensed wireless network)..
Verizon Patent And Licensing Inc.

Systems and methods for enhanced mobile data roaming and connectivity

System and methods are provided for provisioning mobile data services in mobile network systems. By taking advantage of a bifurcated authentication process, the systems and methods described herein provide data services to mobile devices without requiring a secure element such as a sim card.
Celitech Inc.

System that performs login using authentication based on face image included in login system

A system includes an electronic device and a login system. The electronic device ensures a login in response to login information for a login received from outside of the system.
Kyocera Document Solutions Inc.

Image forming private output using mobile terminal

An image forming method includes: receiving a print job and a print job ticket by at least one image forming apparatus; waiting for an access from a mobile terminal having user id data using a wireless communication; authenticating for accessing the print job ticket using the user id data by the image forming apparatus determined to be closest to the mobile terminal; transferring the print job ticket to the closest image forming apparatus in response to the access from the mobile terminal to the closest image forming apparatus; acquiring a facial image of a user in front of the closest image forming apparatus in response to the authentication; recognizing a face of an owner of the print job ticket in the acquired facial image to cause the closest image forming apparatus to print the image data; and printing the image data while the facial image is being recognized.. .
Kyocera Document Solutions Inc.

Image forming private output using mobile terminal

An image forming method includes: sending a print job and a print job ticket including user id data from a terminal to an image forming apparatus and sending the print job ticket to a mobile terminal; receiving the print job ticket by the image forming apparatus; waiting for an access from a mobile terminal having the user id data using a wireless communication in a specified range from the image forming apparatus; authenticating for accessing the print job ticket in the image forming apparatus using the user id data; acquiring a facial image of a user in front of the image forming apparatus in response to the authentication; recognizing a face of an owner of the print job ticket in the acquired facial image to cause the image forming apparatus to print the image data; and printing the image data while the facial image is being recognized.. .
Kyocera Document Solutions Inc.

Methods and premises content distribution

Apparatus and methods for transfer and management of protected content in a network. In one embodiment, the apparatus comprises server and renderer devices including, for example, consumer premise equipment (cpe) having a content handler application adapted to run thereon.
Time Warner Cable Enterprises Llc

Individualized cybersecurity risk detection using multiple attributes

A method for assessing and responding to potential cybersecurity risks includes: obtaining, by a computing device, a plurality of attributes relating to an authentication event; determining, by the computing device, based on a cybersecurity risk assessment model, whether the plurality of attributes relating to the authentication event indicate a potential cybersecurity risk, wherein the cybersecurity risk assessment model is individualized on a per-user or per-device basis; and causing, by the computing device, in response to determining that the determined plurality of attributes relating to the authentication event indicate a potential cybersecurity risk, a heightened security measure to be implemented.. .
Aetna Inc.

Communication system, count value synchronization method, and count value synchronization program product

A communication system includes multiple nodes connected with each other. Each of the multiple nodes generates a message authentication code using a count value of a counter.
Denso Corporation

Invocation path security in distributed systems

Systems, methods, and computer program products for an application to securely record and propagate an invocation context for invoking other applications are described. The applications being invoked not only receive a user's authentication token, but also authentication tokens of an entire invocation chain.
Pivotal Software, Inc.

Actively federated mobile authentication

To make a trusted web service call, a client application sends a series of messages to obtain tokens that allow service requests to pass through a service relay. The user obtains a first security token by providing the user's credentials.
Microsoft Technology Licensing, Llc

Single authentication to a multi-tenancy single-page cloud application

A system and method for single authentication to a multi-tenancy single-page application hosted in a plurality of different datacenters. The method comprises: receiving, from a client device, a login request to access the single-page application; receiving an access token in response to an authentication of a user of the client device, wherein the access token designates at least tenant identification data; determining a datacenter of the plurality of different datacenters executing an instance of the single-page application supporting a tenant of the authenticated user; retrieving, from the determined datacenter, a single web page of the single-page application, wherein the retrieved signal web page includes at least references to resources pointing to a location of the determined datacenter; and serving the web single page to the client device..
Microsoft Technology Licensing, Llc.

Authentication apparatus and authentication program

An authentication apparatus in a multifunction peripheral is configured to display, in a screen, an account field and a password field so as to allow an input, inhibit an input in the account field before an input is made in the password field, mask a letter inputted in the password field, and restrict a letter string including a same letter that has been inputted in the password field, from being inputted in the account field.. .
Seiko Epson Corporation

Method and system for authentication

An authentication system performing user-centered authentication may include: an authentication service component acting as an authentication procedure of an online service server; and a mobile authentication agent component acting as the authentication procedure of an access terminal which accesses the online service server. Herein, the authentication service component may confirm a mobile authentication agent component corresponding to user information input from the access terminal as basic authentication information, transmit an authentication password value to each of the confirmed mobile authentication agent component and the online service server which the access terminal intends to access, and transmit an authentication success message to the online service server when a password verification value or an authentication agreement value corresponding to the authentication password value is received from the mobile authentication agent component..
Estorm Co., Ltd

Connection system and connection method

A connection server is a connection system that is able to perform communication with a plurality of user side terminals and establishes a connection between the user side terminals, and includes a passcode generator that generates and transmits a passcode to the user side terminal, a passcode storage unit that stores a passcode in association with the user side terminal, a passcode receiving unit that receives a transmission passcode from the user side terminal, a passcode authentication unit that determines whether there is a stored combination of passcodes that matches a combination of a generated passcode and a received transmission passcode, and a connection unit that establishes a connection between the user side terminals in response to the determination.. .
Heart Forever Co., Ltd.

Messaging application hosting for message capture

Provided are methods, systems, and computer-program products for hosting a messaging application remote from a user to facilitate tracking messages sent to or received by a messaging application linked to the hosted messaging application. In some embodiments, hosting the messaging application remote from the user may require that a remote system obtain one or more authentication credentials so that the remote system may authenticate the hosted messaging application with a messaging application system.
Actiance, Inc.

Integrating sensitive data from a data provider into instances of third-party applications executed on user devices

Certain aspects involve facilitating the integration of sensitive data from a data provider into an instance of a web-based, third-party application. For example, a data provider service can receive an authentication api call from a third-party system.
Equifax, Inc.

Control method

A control method includes receiving, from a user through a screen displayed on a display unit by using a first program, an execution instruction to execute authentication processing for authenticating communication by a first wireless communication unit between a communication apparatus and an information processing apparatus, in a case where the execution instruction is received, displaying on the display unit by using a second program a setting screen for receiving from a user an input for selecting a target communication apparatus for the authentication processing from a plurality of communication apparatuses, and displaying on the display unit a notification region for notifying a user of information regarding an operation to be executed on the setting screen displayed on the display unit.. .
Canon Kabushiki Kaisha

Validating documents via blockchain

Authentication of electronic document is based on multiple digital signatures incorporated into a blockchain. Structured data, metadata, and instructions may be hashed to generate the multiple digital signatures for distribution via the blockchain.
Factom

Electronically signing and distributing identification data as a service that provides proof of identity, integrity, validity and origin of data for non-repudiation and id validation methods

The present solution is directed to methods and systems for storing personal identifiable information. In some implementations, the information is collected during the authentication of identification (id) documents.
Confirm, Inc.

Security management system for performing a secure transmission of data from a token to a service provider server by means of an identity provider server

The present invention relates to a security management system for performing a secure transmission of data from a token to a service provider server by means of an identity provider server, wherein said security management system comprises: —said identity provider server which is adapted to: —open with said token a secure messaging channel by means of a general authentication procedure using at least one certificate; —receive via said secure messaging channel from said token enciphered data; —transmit to said service provider server said enciphered data; —said service provider server which is adapted to: —receive from said identity provider server enciphered data of said token; —decipher said enciphered data to extract said data; —said token which is adapted to: —encipher data; and —transmit via said secure messaging channel to said identity provider server said enciphered data.. .
Gemalto Sa

An aircraft controlled by a secure integrated airspace management system

An aircraft, such as a drone, includes (i) an authentication module, such as a 3g sim card, and (ii) a communications module, such as a 3g module. The authentication module (a) stores an identity uniquely associated with or identifying a specific pilot or operator (“pilot id”) and (b) sends that pilot id, or data related to the pilot id, to the communications module.
Relmatech Limited

Entry control system

An integrated security system which seamlessly assimilates with current generation logical security systems. The integrated security system incorporates a security controller having standard network interface capabilities including ieee 802.x and takes advantage of the convenience and security offered by smart cards and related devices for both physical and logical security purposes.
Assa Abloy Ab

Image analysis for user authentication

A user can be authenticated to any of a number of computing devices using an authentication process that recognizes the user and verifies that an actual human being is attempting to be authenticated, in order to minimize the ability of another person to spoof the authentication process. A model of a user can be generated and stored in the cloud, enabling that model to be synchronized across various devices.
Amazon Technologies, Inc.

Trusted service manager (tsm) architectures and methods

A client device comprises a first secure element and a second secure element. The first secure element comprises a first computer-readable medium having a payment application comprising instructions for causing the client device to initiate a financial transaction.
Paypal, Inc.

Contacts for misdirected payments and user authentication

Disclosed herein are systems and methods for processing a payment request that use mobile devices to have money transferred. These mobile devices are capable of running a payment transfer application that facilitates a transfer of money.
Square, Inc.

Ad-hoc parcel delivery drop zone and hotspot

Aspects of the present invention provide an approach for delivering an item to a target recipient. A mobile guardian device at a first location comprises a wireless communication system.
International Business Machines Corporation

Electronic device, information processing method, and program

Provided is an electronic device including: a determination unit configured to determine, on a basis of information regarding an environment for acquiring biological information for use in biometric authentication regarding an eye, a method of realizing an environment for acquiring biological information suitable for the biometric authentication; and a control unit configured to perform control corresponding to the method. .
Sony Corporation

Operator system for a process control system

An operator system for a process control system, wherein the operator system includes an operator server and at least one operator client connected to the operator server, where operators authenticate with respective login data via the at least one operator client or via a plurality of operator clients of the operator system on an authentication server and the authentication server generates, for each of the authenticated operators one operator-specific data record, in which an access or functional right to at least one operator server application is stored such that during the operating and monitoring of a process to be controlled, access or functional rights can be temporarily transferred from one of the operators to the other operator in a secure manner with respect to the security aspects, without which end changes would need to be made in an access and functional rights list via an engineering system.. .
Siemens Aktiengesellschaft

Facial recognition authentication system including path parameters

Systems and methods for enrolling and authenticating a user in an authentication system via a user's camera of camera equipped mobile device include capturing and storing enrollment biometric information from at least one first image of the user taken via the camera of the mobile device, capturing authentication biometric information from at least one second image of the user, capturing, during imaging of the at least one second image, path parameters via at least one movement detecting sensor indicating an authentication movement of the mobile device, comparing the authentication biometric information to the stored enrollment biometric information, and comparing the authentication movement of the mobile device to an expected movement of the mobile device to determine whether the authentication movement sufficiently corresponds to the expected movement.. .
Facetec, Inc.

Card reader and card issuing device

A card reader may include a card-inserting opening at which the card is inserted; a biometric authentication sensor arranged proximate to the card-inserting opening and structured to acquire user biometric authentication data from a user; a contact structured to read the card biometric authentication data recorded on the card; a memory structured to store the user biometric authentication data acquired by the biometric authentication sensor; and a processor configured to compare the user biometric authentication data acquired by the sensor, which is stored in the storage unit, against the card biometric authentication data recorded on the card.. .
Nidec Sankyo Corporation

User authentication method and system using variable keypad and biometric identification

The present invention relates to a user authentication server which mixedly uses both a password and biometric information. The user authentication server comprise: a variable keypad generation unit for generating a variable keypad including encryption keys and a biometric authentication key, wherein the position of each encryption key and the position of the biometric authentication key are changed in each generation of the keypad; an authentication information storage unit for storing authentication information of portable terminal users; and an authentication unit for authenticating a user by remotely providing information of generated variable keypad to a portable terminal, and comparing biometric information and information of the positions of the encryption keys in accordance with the order of input by the user, received from the portable terminal, with the authentication information stored in the authentication information storage unit..
Harexinfotech Inc.

Electronic device and performing authentication

Disclosed is an electronic device and a method for processing authentication. The electronic device includes a communication circuit; a display; a memory; and at least one processor electrically connected to the communication circuit, the display, and the memory, wherein the memory stores instructions that cause the at least one processor to identify whether the electronic device is mounted on a first external electronic device, execute at least one application for an authentication based at least part of the identification, detect a second external electronic device, which can transmit authentication information related to the authentication, receive at least one piece of information related to the authentication from the second external electronic device based at least partially on the detection outcome, and perform authentication based on the received authentication information..
Samsung Electronics Co., Ltd.

Method and secure multi-cycle vehicle software updates

A system includes a processor controlling a vehicle module (vm) in communication with a telematics control unit (tcu) over a bus. In this embodiment, the processor is configured to receive an authentication request, including a counter value, from the tcu.
Ford Global Technologies, Llc

Charging control apparatus and control method therefor

The present invention relates to a charging control apparatus and a control method therefor. A charging control apparatus according to an embodiment of the present invention comprises: a communication unit which performs wireless communication with at least one communication device including a vehicle; a charging connector electrically connected to a charging inlet provided in the vehicle; a locking unit which is disposed in the charging connector, so as to perform or release locking between the charging connector and the charging inlet; a control unit which checks whether the id of the vehicle, received by the communication unit, is included in a pre-stored authentication information list, in response to an electrical connection between the charging connector and the charging inlet, and when the id of the vehicle is included in the pre-stored authentication information list, determines whether to release the locking between the charging connector and the charging inlet, depending on the location of a previously authenticated portable device, and controls the locking unit according to the determination..
Lg Electronics Inc.

Mitsubishi Electric Corporation

. .

. .

Apparatus and providing and managing security information in communication system

The present disclosure relates to a sensor network, machine type communication (mtc), machine-to-machine (m2m) communication, and technology for internet of things (iot). An apparatus and method are provided for providing and managing security information in a communication system.
Samsung Electronics Co., Ltd.

Sip control apparatus, mobile communication system and communication control method

A sip control apparatus is provided. The sip control apparatus is connected to a management apparatus controlling call processing policy in an ip network, and controls a voice call made by a user apparatus.
Ntt Docomo, Inc.

Method and interconnection between terminal device and gateway device

The present application discloses a method for interconnection between a terminal device and a gateway device. When the terminal device detects that the terminal device and the gateway device meet a first connection condition and that it is the first time the terminal device is to be connected to the gateway device, acquiring, from the gateway device, a first common ssid preset in the gateway device; and when authentication performed by the terminal device on the acquired first common ssid succeeds, sending a second common ssid preset in the terminal device to the gateway device, so that when authentication performed by the gateway device on the second common ssid succeeds, a common ssid-based connection is established between the terminal device and the gateway device.
Huawei Device Co., Ltd.

Method for requesting emergency service by roaming ue and processing same

An embodiment of the present description provides, in a situation in which, when a user equipment (ue) is roaming in a visited network, i.e. V-plmn, the roaming is processed by means of a home routed (hr) mode and is successfully registered to h-plmn ims and a service is received, a method for performing authentication/registration of a ue, which is to receive an emergency service, if ims-nni does not exist between h-plmn and v-plmn..
Lg Electronics Inc.

Method and authentication in passive optical network

A method and apparatus for authentication in a passive optical network are disclosed. In the disclosure, a first terminal serial number of an onu and a first logic registration code are transmitted from the onu to an olt; if the olt determines that the first terminal serial number does not match a second terminal serial number stored on the olt, the olt judges whether the first logic registration code received from the onu matches a second logic registration code stored on the olt; the olt stores the first terminal serial number received from the onu on the olt if the first logic registration code matches the second logic registration code..
Huawei Technologies Co., Ltd.

Telecommunication call management and monitoring system with voiceprint verification

Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification.
Global Tel*link Corporation

E-mail anti-phishing system and method

An anti-phishing email system and an anti-phishing email method are provided. The system includes an email address registration and authentication subsystem configured to register an email address of a user, an email signature registration subsystem configured to register a signature generated by the user for information on a to-be-sent email, and an email signature query subsystem configured for an email receiving user to query whether the email is registered after the email receiving user receives the email, to determine whether the email is an illegal phishing email..
China Internet Network Information Center

Geolocation-based authentication credentials

Provided is process including receiving a request to authenticate a user; sending instructions to present an authentication user interface including a geographic map; receiving geolocations on the geographic map selected by the user; comparing the geolocations to a sequence of geolocations in an authentication credential to determine whether to authenticate the user.. .
Ca, Inc.

Distributed authentication for internet-of-things resources

A network device receives, from a node in an internet-of-things (iot) network, an access request for a user authenticated via the node and identifies the access request as from either of a trusted node or an untrusted node in the iot network. When the access request is from an untrusted node, the network device identifies a hash key for the access request, wherein the hash key is derived from an access list for the iot network; broadcasts the hash key to other trusted nodes in the iot network; and validates the access request based on a solution consensus from the other trusted nodes.
Verizon Patent And Licensing Inc.

Computer readable storage media for tiered connection pooling and methods and systems for utilizing same

Systems and methods for tiered connection pooling are disclosed herein, which may be used in a method of fulfilling user requests in an enterprise computing system. The method involving generating, by a processing unit, a first connection pool comprising one or more previously used authenticated connections with a resource; generating, by the processing unit, a second connection pool comprising one or more unused authenticated connections with the resource; and generating, by the processing unit, a third connection pool comprising one or more unauthenticated connections with the resource; receiving, by the processing unit, a request from the user device to access the resource, the resource requiring authentication for access; and fulfilling, by the processing unit, the request based on a connection from the first, second, or third connection pool..
Document Storage Systems, Inc.

Enabling coordinated identity management between an operator-managed mobile-edge platform and an external network

Approaches may be used for enabling coordinated identity management between an operator-managed mobile edge platform (mep) and an external network. A token may be generated in the mep that may associate a mobile network identity and an external network identity.
Interdigital Patent Holdings, Inc.

System and method

A system includes an authentication server that executes authentication processing via one or more biometric authentication methods. The system detects, in response to a request for proxy work, authentication target data related to biometric information from data acquired at a location where the request for the proxy work is issued.
Canon Kabushiki Kaisha

Secure biometric authentication with client-side feature extraction

Provided is a process that includes: receiving, with a first device, a request to authenticate a user; obtaining, with the first device, an unstructured-data authentication input; extracting, with the first computing device, a plurality of features of the unstructured-data authentication input to form a structured-data representation; determining, with the first device, a first instance of a value that deterministically varies; and determining, with the first device, a first encrypted value based on both the structured-data representation and the first instance of the value that deterministically varies; and sending, with the first device, the first encrypted value to a second computing device. .
Ca, Inc.

Two factor authentication using sms

Authentication of a user and/or granting of access to secure data is made by way of an out of bounds authentication of the user by having the user use a different device, protocol, and/or network channel to communicate an answer to a challenge question posed to the user. The user request for data can be in a web browser on a first device.
Teltech Systems, Inc.

Apparatus and authentication, and computer program and recording medium applied to the same

Disclosed are an authentication device and method, and a computer program and a recording medium applied thereto. An authentication device according to the present invention comprises: a registration request unit for, when screen information displayed on a specific screen of a user device is changed by a user's input or changed by a factor other than the user's input, encrypting the changed screen information and requesting registration of the encrypted changed screen information as authentication information; an authentication confirmation unit for receiving an authentication confirmation request from a communication network connected with the user device; and an authentication performing unit for extracting the screen information displayed on the specific screen according to a determination on whether to grant authentication for the authentication confirmation request, encrypting the extracted screen information, and then transmitting the encrypted authentication screen information to the communication network as a response to the authentication confirmation request..

Anonymous token authentication

When a user attempts to log in to his account from within an unsecure environment, such as a public computer or a third party application, the user is shown an anonymous token instead of a typical log in prompt to prevent the user from entering sensitive information. The anonymous token is random and is not associated with user data.
Ca, Inc.

Information registration and authentication

The present application discloses methods and devices for information registration and authentication. The registration method may comprise: sending a request for registering standard information to an authentication server; receiving first authentication information fed back by the authentication server; generating a standard information acquisition request, sending the standard information acquisition request and the first authentication information to a first application, and acquiring signed standard information and an identity identifier of the standard information that are returned by the first application after the first application approves authentication of the first authentication information, wherein the signed standard information is signed by the first application using second authentication information; and sending the signed standard information, the identity identifier of the standard information, and the first authentication information to the authentication server..
Alibaba Group Holding Limited

Communication system and registration server

A communication system includes a registration server, a management server and a first target device. When receiving destination information from a communication device, the registration server transmits authentication information to the communication device, transmits screen relating information to a destination indicated by the destination information, receives user information from the communication device and registers the user information therein.
Brother Kogyo Kabushiki Kaisha

Establishing a secure channel with a human user

A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“pin”) is shared between a user and an application.
Intertrust Technologies Corporation

Information processing method, device, system and computer storage medium

Provided is an information processing method. The method comprises: acquiring login authentication information input on a login interface of a client, wherein the login authentication information is used for launching a first object (101); sending the login authentication information to a cloud server which then determines whether the login authentication information is correct and valid (102); and controlling the launch of the first object according to the determination result returned by the cloud server (103).
Zte Corporation

Methods for dynamic user identity authentication

Disclosed herein are methods for dynamic user identity authentication for authenticating the identity of a user of a login device. In some embodiments, the method includes the following steps: using a web server to receive an access request from the login device, generate a resource address information and a session identifier, and transmit the same to the login device; using the login device to generate an initiation signal and transmit the same to a signing device thereby initiating an air signature procedure to generate a target signature, wherein the signing device includes a motion sensor configured to sense movement features produced when the user moves the signing device; using a determination module to determine whether the target signature matches a reference signature and generate a authentication information based on the determination; and using the web server to determine whether the access request is granted based on the authentication information..
Airsig Inc.

Embedded universal integrated circuit card supporting two-factor authentication

A module with an embedded universal integrated circuit card (euicc) can include a profile for the euicc. The profile can include a first and second shared secret key k for authenticating with a wireless network.
Network-1 Technologies, Inc.

Authenticator plugin interface

Authenticator plugin interface for an enterprise virtualization portal is provided. An example method for evaluating a portal access request may comprise: receiving, by a virtualization management platform, a request initiated by a requestor for access to an enterprise virtualization portal associated with the virtualization management platform, the request comprising a login credential; transmitting, to a first authentication system, a first authentication query comprising an identifier of a first data type, and a first value of the first data type, wherein the first value is derived from the login credential; receiving a first response message comprising an identifier of a second data type, and an authentication response of the second data type; and responsive to evaluating the authentication response, granting the requestor access to the enterprise virtualization portal..
Red Hat Israel, Ltd.

Addressing a trusted execution environment using encryption key

Methods, systems, and devices are described herein for delivering protected data to a nested trusted execution environment (tree), including a trustlet running on top of secure kernel, associated with a potentially untrusted requestor. In one aspect, a targeting protocol head, or other intermediary between a requestor and a key management system or other store of protected data, may receive a request for protected data from a potentially untrusted requestor, and an attestation statement of the secure kernel.
Microsoft Technology Licensing, Llc

Circuit device, oscillation device, physical quantity measuring device, electronic apparatus, and vehicle

A circuit device includes an oscillation circuit that generates an oscillation signal by using an oscillator, a processing unit that controls the oscillation circuit, and an interface unit that outputs authentication information to an external device. The authentication information being information based on specific information of the circuit device and is used to authenticate the circuit device..
Seiko Epson Corporation

Secure remote user authentication leveraging public key cryptography and key splitting

An id service on an app server interacts with a corresponding identity app installed on a user device such as a smart phone. At setup, the id service receives the user's public key and only a segment of the corresponding private key.
Salesforce.com, Inc.

Methods for digitally signing an electronic file and authentication method

Associating the digital signature with the electronic file (48), thereby generating a digitally signed electronic file. The invention is further an authentication method..

Secured daisy chain communication

An intermediate servant device connected in a daisy chain configuration with a set of devices is described. The intermediate servant device may be configured to receive, from a previous servant device of the set of servant devices, a request for data, a first response to the request for data, and authentication information for the first response to the request for data.
Infineon Technologies Ag

Control interface for autonomous vehicle

A system includes a control computer that is programmed to perform an authentication based on an encryption key, upon being connected to a vehicle communication network. The computer is programmed to control vehicle operation including at least one of propulsion, braking, and steering, upon authentication by a vehicle computer that is physically attached to the communication network..
Ford Global Technologies, Llc

Generating pseudo random numbers for quantum computing secure authentication

A generator device being configured for generating pseudo random numbers, the generator device comprising a computing device operable for (i) calculating a first hash chain from an initial hash value (h_0), the first hash chain comprising a first sequence of m hash values (ha_1, ha_2, . .
International Business Machines Corporation

Align session security for connected systems

Granting an aligned secured access to a resource for a client system. A first authentication token and a first validity time period value are received from a first server.
International Business Machines Corporation

Secure internal user authencation leveraging public key cryptography and key splitting

In a computing system, methods for secure os level login authentication for internal users to access servers. Some or all servers in a group each utilize a local id service for generating and validating a challenge responsive to an os login request.
Salesforce.com, Inc.

Keyword voice authentication

A method of authenticating a user based on voice recognition of a keyword includes generating, at a processor, clean speech statistics. The clean speech statistics are generated from an audio recording of the keyword spoken by the user during an enrollment phase.
Qualcomm Incorporated

Access control system with facial recognition and unlocking method thereof

An access control system with facial recognition comprising a casing, a door handle, an interaction unit, a locking unit, a triggering unit controlling an unlock/lock state of the locking unit and a facial recognition unit. The interaction unit has an operation panel arranged above the door handle and protruded from the casing at an inclined acute angle relative to a vertical surface of the casing.
Beijing Jialan Technology Co., Ltd.

Systems and methods for location-based automated authentication

Systems and methods for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform.
Uscontracting, Inc.

Method for managing vehicle and customer related information between a dealership, a motor vehicle department, and a buyer

In an approach to verifying the requirements for a vehicle purchase, evaluating the requirements for authorizing the registration of a vehicle and the authentication of an owner, collecting content associated with the registration of the vehicle and content associated with the authentication of the owner, processing the content with a governing body's regulations, wherein it is determined if errors exist between the regulations and the content, translating errors from the statutory requirement to a plain english format, generating a report presenting the processed new content and the processed content, receiving content, wherein the content corrects the errors discovered in the content, and processing the content with the new content with the governing body's regulations, to determine if the errors are corrected.. .

Authentication generating flight regulations

Systems and methods for uav safety are provided. An authentication system may be used to confirm uav and/or user identity and provide secured communications between users and uavs.
Sz Dji Technology Co., Ltd.

Enabling authentication shifting based on mobile wallet characteristics

Embodiments are directed to enabling authentication shifting based on mobile wallet characteristics such as presence and/or content of a payment credential or pre-generated token. Embodiments receive a request for access to a function or feature by a user of the mobile device; receive first user authentication credentials from the user; access a mobile wallet storing at least one payment credential associated with an owner of the mobile device, the at least one payment credential comprising owner identity information; compare the first user authentication credentials with the owner identity information; confirm the first user authentication credentials match the owner identity information; and enable access to the requested function or feature.
Bank Of America Corporation

Expedited setup of digital wallet using contactless credential

Embodiments are directed to expedited setup of digital wallet using contactless credentials. Embodiments receive user authentication credentials; validate the user authentication credentials; in response to validation, enable access to one or more features or functions of a mobile application; receive, from the contactless reader, contactless credential information comprising owner identification, credential number, expiration date and cryptogram; load the contactless credential information into a digital wallet stored in the memory; and enable use of a payment token corresponding to the contactless credential information in a digital wallet transaction..
Bank Of America Corporation

Establishing dedicated connection for token replacement

Embodiments are directed to establishing dedicated connection for token replacement. Embodiments receive user authentication credentials; validate the user authentication credentials; in response to validation, enable access to one or more features or functions of a mobile application; in some cases, determine that circumstances match a predetermined trigger including potential compromise of the current token, and in response present, on the mobile device, a list of digital wallets with which a current token is associated; receive input indicating which of the digital wallets in the list to provision a new token; receive transfer, over an established dedicated communication channel between a server and the mobile device, the new token; and automatically associate the new token with the indicated digital wallets..
Bank Of America Corporation

Method and system for authentication via a trusted execution environment

A method for authentication facilitated via a trusted execution environment includes: reading payment credentials in a first application program stored in a first memory area of a computing device; transmitting an authentication request to a second application program stored in a trusted execution environment of the computing device separate from the first memory area; displaying a prompt for authentication data based on an instruction supplied by the second application program; receiving authentication data; transmitting the received authentication data to an external computing device; receiving, by the second application program of the computing device, an authentication result from the external computing device; and transmitting, by the second application program of the computing device, the authentication result to the first application program in response to the authentication request.. .
Mastercard International Incorporated

Facial authentication device

A facial authentication device (100) includes an image corrector (107) that estimates an orientation of a face based on a center position of the face and a position of imaging unit (101) to correct an image distortion including optical axis deviation with respect to visible light image data such that the orientation of the face coincides with an optical axis direction of imaging unit (101), and a feature amount calculator (105) that extracts a face portion from the image data captured by the imaging unit (101) and calculates a feature amount of the face to output to the image corrector (107), and calculates the feature amount of the face from the image data corrected by the image corrector (107) to output to a face collator (109).. .
Panasonic Intellectual Property Management Co., Ltd.

Method and device for acquiring feature image, and user authentication method

False authentication that is obtained by using a photographic image to impersonate a real human being when being photographed for authentication is prevented by photographing a user's face while illuminated by two different patterns on a display screen to obtain two different images, determining a difference between the two different images to obtain a difference image, and then comparing the difference image to previous images to determine if a real human being is attempting authentication.. .
Alibaba Group Holding Limited

Systems and methods for biometrically authenticating a user using authentication data and liveness data

Systems and methods for biometrically authenticating a user are disclosed. In one implementation, a biometric authentication system may include a finger scanner for capturing biometric data from a plurality of sections of a finger of a user.

Authentication method and authentication apparatus using synthesized code for iris

An authentication method and corresponding apparatus includes obtaining iris images, and constituting an enroll set including iris codes and mask codes corresponding to the iris images. The authentication method and corresponding apparatus also include generating a synthesized code including a synthesized iris code and a synthesized mask code based on correlations between the iris codes included in the enroll set in block units..
Samsung Electronics Co., Ltd.

Trust based access to records via encrypted protocol communications with authentication system

Systems and techniques are disclosed for trust based access to records via encrypted protocol communications with an authentication system. One of the methods includes maintaining, in one or more databases, health records associated with patients.
Health2047, Inc.

Trust based access to records via encrypted protocol communications with authentication system

Systems and techniques are disclosed for trust based access to records via encrypted protocol communications with an authentication system. An example system is configured to authorize and provide selective and secured access to sensitive medical information according to one or more trusted relationships.
Health2047 Switchco, Inc.

Method and a computing device for providing privacy control in a surveillance video

Method and a computing device for providing privacy control in a surveillance video is disclosed. The computing device receives a surveillance video from a video capturing.
Wipro Limited

Terminal apparatus and control terminal apparatus

A terminal apparatus and a control method are disclosed. The terminal apparatus comprises: an input part for receiving a fingerprint; a control part for performing an authentication procedure with respect to the input fingerprint; and a display part for outputting a notification message if fingerprint authentication with respect to the input fingerprint is completed, wherein the control part sets a fingerprint authentication cancellation mode if contact of the fingerprint lasts for a first predetermined time or more after the fingerprint authentication was completed and can cancel authentication of the fingerprint if a predetermined condition is met..
Lg Electronics Inc.

Interacting with a computing device via identity-bearing peripheral devices

A technique is described herein by which a user may gain access to a target resource via one or more particular peripheral devices that have been associated with the user. The technique performs this task by detecting when a user communicatively couples an identity-bearing component to a hub device.
Microsoft Technology Licensing, Llc

System and conducting transactions using biometric verification

A biometric verification system is disclosed. The system includes a portable device which stores a biometric reference template and authentication preferences.
Visa International Service Association

Authentication device, authentication system, and authentication method

The authentication device includes a secret information storage unit to store secret information; a verification unit to verify validity of input data including input information of a user; an information extraction unit to extract the input information from the input data the validity of which has been verified by the verification unit; an authentication information generation unit to generate authentication information with the input information extracted by the information extraction unit and the secret information stored in the secret information storage unit; and a display unit to display the authentication information generated by the authentication information generation unit.. .

Authentication device, authentication system, authentication method, and program

An authentication device includes: a wearing position determination unit that determines a wearing position, the wearing position being a position at which a wearable article comprising a sensor is being worn on a body; and an authentication unit that performs authentication by using biometric information of the body, the biometric information being detected by the sensor at the wearing position.. .
Nec Corporation

Media client device authentication using hardware root of trust

A client device for media playback includes a user-installable media client application which implements the client-side of a digital rights management (drm) system. The client device employs secure boot and verifies the user-installed application.
Ericsson Ab

Display device

A display device includes: a display panel including a display area including at least a partially curved surface area; a touch sensor overlapping the display area to acquire touch information on a touch of a user; a pressure sensor to sense a pressure of the touch; and a controller configured to perform user authentication by controlling the display panel, the touch sensor, and the pressure sensor, wherein the touch sensor includes a plurality of sensor pixels that senses a change in capacitance corresponding to the touch, wherein the pressure sensor includes: a first electrode; a second electrode spaced apart from the first electrode; and a pressure sensing element provided between the first electrode and the second electrode.. .
Samsung Display Co., Ltd.

Authentication, authorization, and/or accounting of power-consuming devices

Systems and methods for authenticating, authorizing, and/or accounting for a power-consuming device to access a power source are described. A power access controller may manage the power source and authenticate and/or authorize the power-consuming device to access the power source based on, for example, a power profile of the power-consuming device.
Comcast Cable Communications, Llc

Authentication handover in interworking of long term evolution and wi-fi

The present invention provides methods and apparatus for reducing wi-fi authentication process time in interworking of long term evolution (lte) and wi-fi. The method comprises: activating a wi-fi authentication process; monitoring a wi-fi signal quality; determining whether to stop the wi-fi authentication process according to the wi-fi signal quality; and stopping the wi-fi authentication process when the wi-fi signal quality does not satisfy a first specific condition.
Mediatek Singapore Pte. Ltd.

Providing wireless network authentication data to climate control system devices

Disclosed are exemplary embodiments of apparatus and methods for provisioning a wireless-capable climate control system device for a wireless network. In an exemplary embodiment, a method of provisioning a wireless-capable target device for a wireless network includes providing, to the target device, wireless network authentication data for joining the wireless network.
Emerson Electric Co.

Access through non-3gpp access networks

A user equipment receives an extensible authentication protocol authentication and key agreement prime (eap aka′) message, from an authentication server related to the user equipment, in an authentication procedure being part of setting up a connection from the user equipment through an access network. The user equipment sets up an ip security tunnel between the user equipment and an evolved packet data gateway responsive to the eap aka′ message indicating that the access network is untrusted..
Telefonaktiebolaget Lm Ericsson (publ)

Method for obtaining initial access to a network, and related wireless devices and network nodes

This disclosure provides a method, performed in a wireless device, for obtaining initial access to a network in order to establish a connection to a server connected to the network. The wireless device stores a device public key and a device private key.
Telefonaktiebolaget Lm Ericsson (publ)

Wireless network authentication control

In some examples, a method includes assigning, with an access point (ap) in a wireless network, a value for an authentication control threshold (act) field in an advertisement packet that allows devices having a predetermined access control role to immediately attempt to associate with the ap. The method can further include transmitting, with the ap, the advertisement packet including the value for the act field for devices having the predetermined access control role..
Aruba Networks, Inc.

Terminal device and controlling the same

A terminal device is provided. The terminal device includes a communication interface unit configured to receive image data of an application installed in another terminal device that is streamed from the another terminal device, a display unit configured to display the image data, a control unit configured to receive an installation file associated with the application through the communication interface unit while the image data is being displayed, and to execute the received installation file when authentication of the installation file is completed, and a storage unit configured to allow the application to be installed therein according to execution of the installation file..
Samsung Electronics Co., Ltd.

Information processor and storage medium storing conversion method setting program

An information processor includes a read information obtaining unit, a conversion unit, an authentication information obtaining unit, and a conversion method setting unit. The read information obtaining unit obtains read information read from an authentication medium by a reading device.
Seiko Epson Corporation

Authentication using dtmf tones

A method of obtaining and automatically providing secure authentication information includes registering a client device over a data line, storing information and a changeable value for authentication in subsequent telephone-only transactions. In the subsequent transactions, a telephone call placed from the client device to an interactive voice response server is intercepted and modified to include dialing of a delay and at least a passcode, the passcode being based on the unique information and the changeable value, where the changeable value is updated for every call session.
Pindrop Security, Inc.

System, method and computer program product for access authentication

A method and technique for access authentication includes: responsive to receiving an access request from a user for a secure resource, generating a token; combining the token with a character string to form a uniform resource locator (url); transmitting the url to the user; and responsive to receiving a request for the url, providing access to the secure resource.. .
Webcetera, L.p.

Electronic interaction authentication and verification, and related systems, devices, and methods

Systems, devices, and methods are disclosed for exchanging electronic information over a communication network and, more specifically, to authenticating and verifying data integrity between two or more interacting users exchanging information. A client computing device generates a split secret that is transmitted to a server via two distinct communication channels.
Uledger, Inc.

Reduced user authentication input requirements

Techniques disclosed herein enable a system to reduce user authentication requirements during a user's travels by analyzing transportation data and/or event data sent to the user via a communication service, e.g. Email.
Microsoft Technology Licensing, Llc

Parameter based key derivation

A delegation request is submitted to a session-based authentication service, fulfilment of which involves granting an entity an access privilege to a computing resource. A session key is received from the session-based authentication service.
Amazon Technologies, Inc.

Authentication and access to a device of a fixed line communication device

A method is provided accessing a device of a fixed line system comprising: (i) determining at least one measurement result by a measurement function of the device; (ii) comparing the at least one measurement result with at least one predefined value; (iii) conducting a predefined operation if the comparison indicates that the at least one measurement result corresponds to the at least one predefined value; (iv) determining the at least one measurement result by the measurement function, wherein the measurement function is connected or connectable via a connection to a signature function of an access system; (v) wherein the signature function comprises a circuitry that affects parameters measured by the measurement function of the device. Also, a method for access the device via an access system, the device, the access system and a computer program product as well as a computer-readable medium are suggested..
Adtran Gmbh

Hostless mdns-sd responder with authenticated host wake service

Conventional wireless interface (wifi) controllers cannot resolve authentication for trusted client devices without calculation from a host processor. Leaving the host processor on or awaking it from a sleep state each time a non-authenticated trusted client device attempts to connect wastes power.
Gopro, Inc.

Method and encryption, decryption and authentication

A method, apparatus and system for encryption, decryption and/or authentication are provided. The method includes: generating vehicle data based on information detected at a vehicle component; generating a dynamic secret key based on a symmetric secret key stored at a first device and at least one from among information about a vehicle and information about a driver of a vehicle; and generating a message authentication code to authenticate the vehicle data by using the generated dynamic secret key.
Gm Global Technology Operations Llc

Dynamic knowledge-based authentication

A computer-implemented method includes receiving user data from a plurality of data sources, where the user data describes a user. A plurality of events are determined within the user data by applying anomaly detection to the user data.
International Business Machines Corporation

Cognitive intelligence based voice authentication

Mechanisms are provided to detect a potentially fraudulent voice conversation. The mechanisms process a corpus of electronic information to extract a fraud feature representative of at least one fraudulent activity, receive a first voice input from a user, and convert the first voice input into a textual representation of the first voice input and a set of behavioral speech characteristics associated with the user.
International Business Machines Corporation

Monitoring device, control method, and recording medium

A monitoring device manages information regarding a first reception port and information regarding a second reception port in regard to an ip address of a self-device. The monitoring device issues a route certificate corresponding to a first server certificate and a route certificate corresponding to a second server certificate for realizing communication of relatively lower security strength than the first server certificate, and associates the first server certificate with the first reception port and associates the second server certificate with the second reception port.
Canon Kabushiki Kaisha

System and providing identity verification services

A system and method of validating an upgrade of authentication credentials includes authenticating a first user being associated with a first entity, receiving input identifying a customer name for the online account, receiving input indicating a type of identification to be presented at the validation event, receiving input indicating a transaction code associated with the validation event, and receiving input indicating a location of the validation event, and further includes authenticating a second user being associated with a second entity, providing to the second user a list of validation events for a location, receiving input selecting a validation event in the list of validation events, presenting one or more of the customer name, transaction code, and type of identification associated with the selected validation event, and receiving input indicating a result of the validation event, where a credential or token is created and assigned based on the validation event.. .
United States Postal Service

Split authentication network systems and methods

Disclosed is a system comprising: an authentication datastore; a device presence engine; a traffic monitor engine; an authentication presence monitor engine; an authentication server selection engine; and a traffic routing engine. In operation: the device presence engine is configured to detect presence of a user device on a trusted network; the traffic monitor engine is configured to monitor, in response to the detection, traffic on the trusted network from the device; the authentication presence monitor engine is configured to evaluate onboarding characteristics of the user device in response to the monitoring; the authentication server selection engine is configured to select one of a plurality of authentication servers to authenticate the user device to the trusted network, the selecting based on the onboarding characteristics; and the traffic routing engine is configured to route traffic from the user device to the selected authentication server..
Aerohive Networks, Inc.

Authentication online services

An authentication system comprises a client device system associated with a session user, a data provider server system that stores user data, including user identification data, associated with the session user, a data provider interface system for displaying a data provider user interface on the client device system, an authentication server system that stores authentication data associated with the session user, and an authentication interface system for displaying an authentication user interface on the client device system.. .
Payeazy, Inc.

Method and system for digital rights management of documents

A method and system for transmission of digital content via e-mail with point of use digital rights management is disclosed. The secured access rights to the digital content may be customized for individual recipients by the sender, and may evolve over time.
Encryptics, Llc

Method for network voice communication

The disclosure relates to a method for network voice communication, the method comprising: a user in the global world applying for and obtaining a network voice communication number through a network voice communication client, the network voice communication number entirely consisting of multiple digits; using the network voice communication number as the network address of network voice communication of the user; performing voice communication between users that have obtained network voice communication numbers through the internet; wherein there is no need for the users to go through an invitation, acceptance or authentication process with each other during the network voice communication. The present disclosure utilizes the sharing property of the internet to extend the scope of free call applications to support mobile phones, tablets, ip landline phones (internet phones) and internet mobile phones, and realizes a free call function..
Freefly881 Communications Inc.

Traffic on-boarding for acceleration through out-of-band security authenticators

A traffic on-boarding method is operative at an acceleration server of an overlay network. It begins at the acceleration server when that server receives an assertion generated by an identity provider (idp), the idp having generated the assertion upon receiving an authentication request from a service provider (sp), the sp having generated the authentication request upon receiving from a client a request for a protected resource.
Akamai Technologies, Inc.

Gateway device and control the same

A gateway device that relays a message between two or more domains receives a first message including a first message authentication code corresponding to a first domain among the two or more domains and first data from the first domain and transmits a second message including a second message authentication code corresponding to a second domain among the two or more domains and the first data to the second domain.. .
Hitachi Automotive Systems, Ltd.

Mutual authentication of confidential communication

Embodiments of the invention relate to systems and methods for confidential mutual authentication. A first computer may blind its public key using a blinding factor.
Visa International Service Association

Per-device authentication

Systems and techniques are provided for per-device authentication. A hardware serial number associated with a hardware component of a computing device may be received.
Google Llc

Identity authentication using a wearable device

A wearable device transmits a service request generated by the wearable device to a server, where the service request is associated to a service application type. The wearable device receives an identity authentication request message associated to the service application type from the server using a preset standard interface.
Alibaba Group Holding Limited

Anti-counterfeit method

An anti-counterfeit method includes: obtaining raw data to be encoded; collecting fingerprint data by analogue acquisition to obtain initial fingerprint feature information and encrypting the initial fingerprint feature information to obtain a random feature secret key, the random feature secret key comprising a first sub secret key and a second sub secret key and the first sub secret key is encoded into a micro-texture image while the second sub secret key is embedded in an encryption program; encrypting, through the random feature secret key, the raw data to be encoded to generate an information code image, the information code image comprising the micro-texture image; passing an anti-counterfeit authentication when an image sensor succeeds in integrating the first sub secret key and the second sub secret key to generate the random feature secret key; and succeeding in decrypting, by the image sensor, the information code image through the random feature secret key.. .
Shenzhen Qianhai Quantum Cloud Technology Co., Ltd.

Token based authentication

According to an example aspect of the present invention, there is provided an apparatus comprising a memory configured to store a first token and a second token, and at least one processing core configured to obtain a first value based at least in part on the first token and the second token, and to cause the apparatus to participate in a security procedure, based at least in part on the first hash, with a second apparatus.. .
Nokia Technologies Oy

Resource management in a cellular network

Method, system and apparatus for provisioning a subscription of a service to a device comprising: receiving a message from a device, the message protected by first provisioning data installed on the device. Authenticating the message using data corresponding to the first provisioning data.
Vodafone Ip Licensing Limited

Authentication of digital broadcast data

A broadcast receiving system is disclosed that verifies a current digital certificate extracted from a digital broadcast signal using a previous digital certificate previously stored as trusted. The current and previous digital certificates are associated with digital signatures with which data received with the broadcast signal has been signed.
Nagravision S.a.

Devices and methods for identification, authentication and signing purposes

It is presented a method, performed in a one time password, otp, generating device. The otp device comprises an nfc/rfid, near field communication/radio frequency identification, interface.
Yubico Inc.

Secured vehicle for user use only

Systems of an electrical vehicle and the operations thereof are provided. Within an autonomous vehicle fleet that can be optionally primarily used for ridesharing, how does an owner or first user of one of the vehicles prevent another customer or second user from approaching a vehicle and using it for their own purposes/trips? how does the first customer lock down the vehicle for their use exclusively? how does a user secure any personal data that they may have stored in the vehicle? as one example, software locking, portable device authentication, human identification, biometric, rolling code and/or a physical identification card can be utilized to secure and/or reserve the vehicle for the first user..
Nextev Usa, Inc.

Detecting electronic intruders via updatable data structures

A data structure provides reliable data allowing a security application to detect potential instances of fraudulent use of a payment account. The data structure can be generated using data elements associated with transactions from new authentication requests in a transaction.

Systems and methods for transaction authentication using dynamic wireless beacon devices

Systems, methods, and computer-readable media are provided for authenticating transactions. An example first method includes steps performed by a server, comprising generating and storing a first identifier and sending the first identifier to a wireless beacon device associated with a transaction device over a network, receiving a transaction request comprising a proposed identifier and information related to a transaction, determining whether there is a match between the first identifier and the proposed identifier, and, based on a determination that there is a match, authorizing the transaction.
Capital One Services, Llc

Systems and methods for collecting device data from digital wallet authentications

A computer-based method for collecting digital wallet data from a digital wallet transaction initiated by a user is provided. The method includes receiving registration data for a user in response to the user registering into a digital wallet application, wherein the registration data includes demographic data and device registration data including a device identifier used for identifying the user device when in communication with another computing device.
Mastercard International Incorporated

System and location-based transaction

A system and method for using at least location information to facilitate a transaction is provided. In one embodiment of the present invention, a mobile application operating on a mobile device is used to determine a location of the mobile device.
Key 2 Mobile Llc

Hybrid mobile payment architecture and mobile pos module thereof

A hybrid mobile payment architecture includes a wired network, a wireless network and a mobile point-of-sale module. The wired network is in communication with a point-of-sale system and a payment system.
Flytech Technology Co., Ltd

Secure digital data operations

Method and system for transferring digital currency from a payer to recipient comprising receiving an identifier of data describing the first entity. Retrieving an entry from a block chain based on the received identifier.
Barclays Bank Plc

Secure automated parcel delivery

A mechanism is provided for secure automated parcel delivery. A first device owned and controlled by a recipient entity to whom a physical item is being delivered receives a delivery communication code.
International Business Machines Corporation

Electronic device for iris recognition and operating method thereof

An electronic device for iris recognition and an operating method thereof are provided. The electronic device includes a housing including a first surface, a display exposed through a first region of the first surface, a light emitting unit comprising light emitting circuitry disposed in a second region of the first surface, an image device comprising image acquiring circuitry disposed in a third region of the first surface, at least one processor disposed within the housing and electrically connected with the display, the light emitting unit and the image device, and a memory disposed within the housing and electrically connected with the at least one processor.
Samsung Electronics Co., Ltd.

Manual signature authentication system and method

Provided is a handwritten signature authentication system and method in which handwritten signature authentication is performed by conducting at least one of the following comparisons: a comparison between a pre-enrolled handwritten signature image and a tracked handwritten signature image traced during the signing process, a comparison between a pre-enrolled handwritten signature behavioral characteristics and a handwritten signature behavioral characteristics collected during the signing process, and a comparison between a pre-enrolled handwritten signature image and a reconstructed handwritten signature image regenerated by the handwritten signature behavioral characteristics collected during the signing process.. .
Secuve Co., Ltd.

Non-intrusive data authentication systems and methods

Systems and methods are disclosed that create a separate digital and cryptographically secure signal “branch” to a secondary observer from a primary signal path of an information system. The information system may be a measurement system.
National Technology & Engineering Solutions Of Sandia, Llc

Fast authentication of code in a low-power system

The invention relates to a system comprising a non-volatile memory device configured to contain executable code; and a logic device comprising an internal memory and a processor configured to execute the code contained in the non-volatile memory device, the internal memory being located in a first always-on power domain of the logic device, wherein the system is configured to check whether the internal memory contains a code digest hc, obtain the executable code from the non-volatile memory device, compute a code digest hc″ of the executable code, and, if the code digest hc and the code digest hc″ are identical, execute the executable code. The invention also relates to a corresponding method..
Qualcomm Technologies International, Ltd.

Authentication reinforced software

Disclosed are an authentication method and an authentication apparatus for reinforced software. The method includes: obtaining, after verification of a shell procedure of a reinforced software performed by a server succeeds, key data sent from the server, the key data including hidden data in a plain-text software code of the reinforced software and an entry address corresponding to the hidden data; and replacing, according to the hidden data and the entry address, corresponding data hidden in the plain-text software code of the reinforced software stored in a memory, and loading the plain-text software code..
Zte Corporation

Medical devices with intelligent accessories

A medical device and associated systems with host devices and one or more accessories are disclosed that are capable of authenticating the host device with intelligent one of more of the intelligent accessories. Each of the host device and the one or more accessories can share a secret or other unique code.
Physio-control, Inc

Information processing system, information processing method, and computer readable medium

A database (7) stores a first identifier and visiting destination authentication information in association with each other, the first identifier being generated from visitor authentication information which is one of an encrypted face photograph image and key data used for generating the encrypted face photograph image, the visiting destination authentication information being the other of the encrypted face photograph image and the key data. An authentication terminal apparatus (9) receives authentication data from a mobile terminal device (2) used by a visitor (1) who intends to enter a facility and generates a second identifier from the authentication data in the same generation procedure as that of the first identifier.
Mitsubishi Electric Corporation

Secured computerized system for children and/or pre-literate/illiterate users

A secured computerized system comprising a computerized environment secured to prevent access thereto, other than by end-users who have passed a what-you-know authentication test: what-you-know testing functionality for administering a what-you-know user authentication test to end-user/s, including presenting image/s to end-user, and approving end-user to enter the computerized environment if end-user correctly selects predetermined location/s within the image; and a graphic what-you-know test-configuring functionality for displaying system-selected location/s within the image; providing a graphic interface operative for accepting, from, end-user/s, a user-selected modification of system-selected location/s; and storing, for each individual end-user, the user-selected modification as the individual end-user's predetermined location/s; or if no user-selected modification exists for an individual end-user, storing the system-selected location as the individual end-user's predetermined location.. .
Googale (2009) Ltd.

System and multiple sequential factor authentication for display devices

An information handling system includes a display device and a processor configured to display a plurality of icons in a first display area, divide a second display area into a plurality of sectors, designate an authentication sector of the plurality of sectors, designate an authentication icon of the plurality of icons, receive a user input including selecting one of the icons and dragging the selected icon to a selected one of the sectors, determine if the selected sector is the authentication sector and if the selected icon is the authentication icon, and display a prompt to the user to provide an authentication factor to log on to the information handling system in response to the selected sector being the authentication sector and to the selected icon being the authentication icon.. .
Dell Products, Lp

Fingerprint recognition method and apparatus, and touchscreen terminal

A fingerprint recognition method and apparatus, and a touchscreen terminal with a fingerprint recognition module includes, when a fingerprint authentication module is in a disabled state, a touch operation used to trigger an application program is received, if fingerprint authentication is not required for execution of the application program, the fingerprint recognition module is kept in a disabled state, and after the application program has been executed for specific duration, the fingerprint authentication module is enabled again, to perform the fingerprint authentication.. .
Huawei Technologies Co., Ltd.

Providing access with separate authentication to secure content in repositories

A request from a user to access a report associated with one or more content items maintained by an electronic content management system can be received. A query, associated with the request and including one or more attributes of the request to access the report can be executed.
Alfresco Software, Inc.

Using parity data for concurrent data authentication, correction, compression, and encryption

A system for software error-correcting code (ecc) protection or compression of original data using ecc data in a first memory is provided. The system includes a processing core for executing computer instructions and accessing data from a main memory, and a non-volatile storage medium for storing the computer instructions.
Streamscale, Inc.

Customizable firmware based on access attributes

Embodiments include validating a user for performing a service procedure for a system and customizing the system for the user for the service procedure. An example computer-implemented method includes validating authorization of the user based on authentication data from a tag uniquely identifying the user.
International Business Machines Corporation

Method for capturing, storing, accessing, and outputting digital content

A method for capturing and outputting digital content is herein disclosed and enabled, the output system includes an information apparatus, a server, and a client device. The information apparatus includes at least a digital camera and a wireless communication module (e.g., ieee 802.11 or bluetooth).
Flexiworld Technologies, Inc.

System for capturing and outputting digital content over a network that includes the internet

An output system for capturing and outputting digital content is herein disclosed and enabled. The output system includes an information apparatus (e.g., a digital capturing device or an internet appliance) for capturing digital content, a server application at a server over the internet, and a client application at a client device for accessing the captured digital content.
Flexiworld Technologies, Inc.

Simultaneous authentication system for multi-user collaboration

A computing device includes a touch-sensitive user interface configured to present a unified collaborative session for two or more users, and an authentication module configured to simultaneously identify and authenticate multiple users physically co-located within a collaborative environment, allowing each of the multiple users to interact with the touch-sensitive user interface. A content module is configured to simultaneously provide one or more content portals within the unified collaborative session for each authenticated user.
Microsoft Technology Licensing, Llc

Systems and methods for authentication code entry in touch-sensitive screen enabled devices

Systems and methods for authentication code entry in touch-sensitive screen enabled devices are disclosed. In one embodiment, a method for entering data to a data entry device comprising at least one computer processor, a memory, and a touch-sensitive screen may include the touch-sensitive screen providing an input interface comprising a plurality of virtual keys; the touch-sensitive screen sensing a first touch on the touch-sensitive screen; the touch-sensitive screen sensing a release of the first touch and a location of the first touch at the time of release; the computer processor determining a corresponding virtual key based on the location of the first touch at the time of release; the computer processor receiving an entry gesture at an entry gesture interface; and the computer processor identifying the corresponding virtual key as a value in an authentication code following the receipt of the entry gesture..
Verifone, Inc.

Managing autonomous vehicles

In some embodiments, a method for an autonomous vehicle obtaining services can include: detecting, by the autonomous vehicle, a need for service; sending, over a network interface of the autonomous vehicle, a request for service; determining a rendezvous location at which service will be received; maneuvering, by the autonomous vehicle, to the rendezvous location; receiving, by the autonomous vehicle over a network, an authentication code; in response to receiving the authentication code, enabling, by the autonomous vehicle, access to components of the autonomous vehicle; determining, by the autonomous vehicle, that the service is complete; and transmitting, by the autonomous vehicle, an indication that the service is complete.. .

Method for authorizing a driver to activate at least one system of a vehicle, based on a biometric authentication process

A method for authorizing a driver to activate at least one system of a vehicle, includes a preliminary phase that includes an initialization step, an enrollment step scanning enrollment biometric data of the driver, an access step for the driver to enter the vehicle, and a storage step registering enrollment biometric data in memory. The method also includes a subsequent phase that includes an authentication step scanning authentication biometric data of the driver and comparing said authentication biometric data with the enrollment biometric data in the memory, then an activation step wherein, if the authentication biometric data match with the enrollment biometric data, in authorizing the driver to activate the at least one system of the vehicle, or a refusal step wherein, if the authentication biometric data does not match with the enrollment biometric data, in forbidding the driver to activate the at least one system of the vehicle..
Dura Automotive Holdings U.k., Ltd

Authentication using electromagnet signal detection

Systems of an electrical vehicle and the operations thereof are provided. In particular, a towing cable and methods for utilizing the same in a towing scenario are described.
Nextev Usa, Inc.

Network-initiated detach procedures in a neutral host network

A neutral host network is configured to provide services supported by any one or more of multiple participating service providers (psps) to user equipment in an unlicensed frequency band. The neutral host network includes a neutral host gateway configured for communication with at least one external network, a mobility management entity (mme), and a local authentication, authorization, and accounting (aaa) server configured to determine that a session involving the user equipment is to be detached from the neutral host network.
Alcatel-lucent Usa Inc.

Terminal device, device provided with prose function, communication terminal device, and communication device provided with prose function

Provided is a communication system or the like in which a service based on prose is implemented under the management of a network operator. Processing based on a discovery request procedure for discovering a proximity terminal or being discovered is performed based on authentication of a server device operated by the network operator.
Sharp Kabushiki Kaisha

Wireless network connection method and apparatus, and storage medium

Embodiments of this application relate to the field of network security, and disclose a wireless network connection method, apparatus, and system. A method for establishing wireless network connection includes receiving, by an authorization server, an access request sent by a radio access point.
Tencent Technology (shenzhen) Company Limited

Location-based authentication

An electronic device includes a location detector configured to determine a current device location and a location-based access controller configured to determine whether the current device location satisfies at least one predefined secure location criteria and to selectively preserve or disable a current user authentication session based on the determination.. .
Microsoft Technology Licensing, Llc

Identity authentication

Briefly, in accordance with one embodiment, a method and/or system for mobile identity authentication is disclosed. For example, mobile identity authentication may be employed in a variety of situations, including purchases, financial transactions, granted access to accounts, granting access to content, etc..
Payfone, Inc.

Automatic authentication of a mobile device using stored authentication credentials

Systems and methods are disclosed which may allow a user having a mobile device to automatically authenticate to a server using a device identifier associated with the mobile device. An access point may be configured to send the device identifier as well as additional identifying information to the server so that the device identifier can be accurately matched to the mobile device.
Paypal, Inc.

Apparatuses and methods for wireless communication

One feature pertains to a method operational at a device. The method includes performing key agreement with a core network device, and generating an authentication session key based in part on a secret key shared with a home subscriber server (hss), where the authentication session key is known to the core network device.
Qualcomm Incorporated

Geographic position information-based community interconnection method and system

A geographic position information-based community interconnection method may comprise creating a community network using geographic position information and identity information as network nodes; when a user terminal logs onto the community network for the first time, registration and authentication may need to be completed. The method may include receiving information and/or services for interaction, and uploading the received information and/or services to the community network server.
Huizhou Tcl Mobile Communication Co., Ltd

Sound distribution apparatus, sound reproduction terminal, authentication device, sound distribution system, and sound distribution method

[object] to enable simply viewing of a performance even at a location away from a hall where the performance takes place. [solution] a sound distribution apparatus is connected to a sound reproduction terminal that detachably holds an authentication device storing decoding information, the sound distribution apparatus including: a sound distribution unit configured to streaming-distribute sound information, which has been encrypted with a decodable code on the basis of the decoding information, to the sound reproduction terminal..
Sony Corporation

Mobile virtual communication and entertainment service

Aspects of the subject disclosure may include, for example, a method including providing, by a processor in a dongle coupled to a display device, a graphical user interface at the display device, and transmitting a message to an authentication server in accordance with authentication information stored in a storage device of the dongle and an input via the graphical user interface. The method also includes obtaining an authentication confirmation; obtaining content from a content server; and recording the content in accordance with a second input via the graphical user interface.
At&t Intellectual Property I, L.p.

Client device, system, information processing method, and recording medium

There provided is a client device including a first change unit for changing authentication information from individual authentication information to common authentication information, which is authentication information commonly used by each client device, in a case where a transmission of first operation information is failed due to an authentication error, and a second transmission unit for transmitting second operation information to the server device by using the common authentication information changed by the first change unit.. .
Canon Kabushiki Kaisha

Image output system having a customized user interface

An authentication processing portion of an mfp requests user authentication to a server based on user information including at least a user id input from a mobile terminal apparatus or an operation panel. The server has a user authentication portion which performs the user authentication and a ui instruction portion which specifies, when the user authentication succeeds, a ui image displayed on a display panel of the apparatus for operating the mfp depending on the user id, and instructs the mfp to display the ui image on the apparatus.
Sharp Kabushiki Kaisha

Systems and methods for interworking with over the top applications in communications network

Systems and methods are provided for facilitating communications with an operating system suspended ott application on a user device. The methods include sending, from a p-cscf or a webrtc gateway, to a push notification framework, a notification configured to cause the push notification framework to send a push notification to the suspended ott application (ims ott application or webrtc ott application).
Mavenir Systems, Inc.

Identity-based internet protocol networking

Disclosed herein are system, method, and computer program product embodiments for identity-based internet protocol networking. An embodiment operates by receiving a packet from a device of a secured network.
The Mitre Corporation

Method of managing profiles in a secure element

Method of managing profiles in a secure element, the secure element including a first profile associated with a first communication network and a second profile associated with a second communication network, the first profile being active. The method includes steps of deactivation of the first profile and activation of the second profile.
Oberthur Technologies

Cross-enterprise workflow

Example systems, methods and storage media to provide a cross-enterprise workflow among clinical systems are disclosed. An example cross-enterprise enabled clinical information system includes a workflow manager to coordinate user workflows with respect to the system and associated content.
General Electric Company

Method and system for executing a transaction request using a communication channel

A method and system for executing a transaction request using a communication channel such as sms or email has been described. The disclosure provides a proactive/reactive smart response processing system/framework for providing capability to a user to take action from any channel other than desktop.
Tata Consultancy Services Limited

Associating layer 2 and layer 3 sessions for access control

A network access control (nac) device enforces one or more policies for accessing one or more remote network devices. The nac device includes a processor configured to receive authentication credentials from the user device over an l2 connection including first identification information of the user device, authenticate the user device using the authentication credentials, receive compliance information from the user device over an l3 connection including second identification information of the user device, associate the l2 connection with the l3 connection using the first identification information and the second identification information, and in response to determining that the compliance information satisfies the one or more policies, authorize the user device to access the one or more remote network devices..
Pulse Secure, Llc

Method of instant sharing invoked from wearable devices

Techniques are disclosed herein for establishing a file transfer connection via wearable devices (e.g., head-mounted wearable devices). A service executing on a cloud platform receives a connection authentication request including authentication data from wearable devices, each associated with a mobile device.
International Business Machines Corporation

Two-user authentication

According to an example aspect of the present invention, there is provided an apparatus comprising at least one processing core, at least one memory including computer program code, the at least one memory and the computer program code being configured to, with the at least one processing core, cause the apparatus at least to receive from a first device a digital key, receive from a second device an encrypted data item, decrypt the encrypted data item using the digital key to obtain a decrypted data item, and verify the decrypted data item matches a reference data item, and responsive to the decrypted data item matching the reference data item, grant access to at least one of the first device and the second device.. .
Nokia Technologies Oy

Digital frame authentication through crowdsourcing

A method, computer program product, and system for authenticating one or more frames includes a processor obtaining the frame(s) from a first client with data indicating a location at which the frame(s) was captured, and data indicating a time at which the frame(s) was captured. The processor identifies a clients of third parties within a pre-defined proximity of the location and at a time within a pre-defined proximity to the time at which the frame(s) was captured.
International Business Machines Corporation

System and issuing otp application in face-to-face confirmation manner

The present invention relates to a system and method for issuing an otp application in a face-to-face confirmation manner, and the system includes at least one or more service provider devices for transmitting otp application issuance request information, including information on recognition of a terminal device tagged on a reader provided for each service provider or entering a previously set service area, to an integrated service device; and the integrated service device for registering secure storage medium identification information as medium identification information for otp authentication and transmitting an otp installation guide to the terminal device if the recognition information is the secure storage medium identification information, and transmitting the otp installation guide to the terminal device if the recognition information is terminal device identification information, in which the terminal device can be a terminal device of a user seeing a service provider face-to-face.. .
Sk Planet Co., Ltd.

Collaborative sign-on

An authentication approval request can be received by a first system from a second system. The first system can determine whether the user is required to be logged into at least a second online account hosted by at least a third system unrelated to the second system in order to approve the authentication request.
International Business Machines Corporation

Authentication system and authentication method

Provided is an authentication system that achieves simple single sign-on used by an mfp. A management application includes a first authentication-request unit that transmits an authentication request to a management server and delivers a token to an execution platform.
Kyocera Document Solutions Inc.

Systems and methods for automated detection of login sequence for web form-based authentication

A system for automating login can determine if a web artifact, such as a web page, includes a login form, by identifying a password field, a user id field, and a submit button or another element providing the functionality to submit credentials for authorization. Submission of user credentials may be emulated, and access to password protected areas can be ascertained, e.g., by identifying any element that permits signing out from the password protected area..
Veracode, Inc.

Distribution of secure data with entitlement enforcement

An example method for distributing content includes receiving a first encrypted request for content over a first encrypted connection from a client. The method also includes obtaining an unencrypted version of the first encrypted request.
Red Hat, Inc.

Multi-services application gateway and system employing the same

An intelligent gateway device provided at a premise (home or business) for providing and managing application services associated with use and support of a plurality of digital endpoint devices associated with the premises. The device includes a communications and processing infrastructure integrated with a peer and presence messaging based communications protocol for enabling communications between the device and an external support network and between the device and connected digital endpoint devices.
Kip Prod P1 Lp

Facilitating secure communication between a client device and an application server

It is presented a method for facilitating secure communication between a client device and an application server. The method comprises the steps of: receiving a client request from the client device, the client request comprising a first fully qualified domain name, fqdn, for the application server, and at least a portion being bound for the application server; forwarding the client request to the application server; receiving an application server response from the application server, the application server response indicating a need to provide authentication; obtaining an original context identifier from an authentication server; generating a modified context identifier based on the original context identifier and a client identifier, being an identifier of the client device; generating a client specific shared key based on the first fqdn, the client identifier and a shared key which is not specific to the client device; and providing the modified context identifier, the client specific shared key to the client device to use for authentication with the application server..
Telefonaktiebolaget Lm Ericsson (publ)

Blockchain-supported, fail-safe synchronization in a data authentication infrastructure

A distributed hash tree-based authentication system for digital input records has more than one upper-level core node, each of which receives at least one uppermost value from aggregators. Communicating with each other about which aggregator values they have received, the nodes try to reach agreement as to which of these values should be included in duplicated current intra-node hash tree evaluations so as to form a consistent top-level value used as the basis for digital signatures associated with the digital input records.
Guardtime Ip Holdings Limited

Method and authentication system for automatic re-authentication

A method for automatic re-authentication is provided. The method includes: transmitting, by a client device, a challenge to a key device; signing, by the key device, the challenge with a digital signature generated by using a private key and transmitting the digital signature of the challenge to the service server when the key device is connected to the client device; receiving, by the service server, the digital signature of the challenge and authenticating the digital signature with a public key stored in the service server; establishing, by the service server, a service connection between the client device and a service provided by the service server to allow the client device to access the service when the digital signature is verified; and performing, by the service server, a re-authentication operation with the client device and the key device according to a connection between the client device and the key device..
I.x Innovation Co., Ltd.

Short-distance network electronic authentication

Methods of short-distance network electronic authentication are described. In one embodiment, a method includes storing encrypted authentication data for a user and a corresponding encryption key on a mobile device; establishing electronic communication between the mobile device and a computer via a short distance network; detecting a request for user-specific authentication data from a third-party application running on the computer; requesting, via an authentication client on the computer, authentication credentials from an authentication service running on the mobile device; accessing, via the authentication service, in response to the requesting step, the encrypted authentication data and encryption key; decrypting the authentication data using the encryption key via the authentication service; transmitting the decrypted authentication data to the authentication client on the client computer; passing the decrypted authentication data from the authentication client to the third-party application; and authenticating the user in the third-party application..

Apparatus and providing secure execution environment for mobile cloud

Disclosed herein are an apparatus and method for providing a secure execution environment for a mobile cloud. The apparatus for providing a secure execution environment includes a general execution unit for, when a request for service execution is received, generating authentication information, transmitting the authentication information to a cloud server, and receiving a security key required for secure communication from the cloud server, and a secure execution unit for verifying the security key received from the general execution unit and performing secure communication with the cloud server by running a service execution monitor when verification succeeds, wherein the general execution unit is configured to transmit the authentication information, including general authentication information corresponding to the general execution unit and secure authentication information received from the secure execution unit, to the cloud server, thus allowing the cloud server to verify the general execution unit and the secure execution unit..
Electronics And Telecommunications Research Institute

Host-storage authentication

Example implementations may relate to a host and a storage system that communicate by a block storage protocol. For example, the host may embed host credentials in a data packet of the block storage protocol, and the data packet of host credentials may be cryptographically signed by a certificate authority trusted by a user of the host to generate a signed credential packet.
Hewlett Packard Enterprise Development Lp

Method of authenticating communication of an authentication device and at least one authentication server using local factor

A method of authenticating the communication of an authentication device and at least one authentication server using a local factor with creation of secret information shared by the authentication device and the authentication server; the reference information is derived from the secret information shared by the authentication device and the authentication server, where the manner of derivation is the same on the authentication device and on the authentication server; furthermore, the authentication device creates transformed reference information by means of cryptographic transformation from the reference information, where the local factor chosen and entered by the user or obtained from a medium or from the surrounding environment is used as an input in this cryptographic transformation, and where only the transformed reference information is stored on the authentication device and only the reference information is stored on the authentication server.. .
Aducid S.r.o.

Method for mapping at least two authentication devices to a user account using an authentication server

The invention provides a method for mapping at least two authentication devices to a user account using an authentication server, where each authentication device connects to the authentication server using a secured communication channel; their mapping to the user account is recorded on the authentication server, and, when a transfer of data between the authentication devices mapped to the user account occurs, the data is passed over from the first authentication device to the authentication server using a secured communication channel and from the authentication server to another authentication device mapped to the account of said user using a secured communication channel, where the aforesaid secured communication channel is created by the second authentication device. This procedure allows the use of a single personal local authentication factor for multiple authentication devices and increases the security of authentication of devices with authentication servers..
Aducid S.r.o.

Lighting based authentication of a mobile electronic device

A light emitting diode (led) based illumination device authenticates a mobile electronics device on a lighting communications network. The mobile electronic device may request a communications link on the lighting communications network and detect modulated illumination light emitted from the led based illumination device.
Xicato, Inc.

Component authentication utilizing multi-level arbiter

A method for component authentication includes delaying an input signal along a first propagation path and a second propagation path, each propagation path including a same number of delay stages. A plurality of control inputs alters the first propagation path to include at least one delay stage from the second propagation path, and alters the second propagation path to include at least one delay stage from the first propagation path.
Semiconductor Components Industries, Llc

Irradiation system, irradiation method, and program storage medium

Provided is an irradiation system for reliably detecting a desired detection target and precisely irradiating marking light on the detected detection target. The irradiation system includes: a server device detecting, by authentication processing, a detection target from image data capturing a monitored area, generating, from each piece of a plurality of pieces of image data captured in a time span including a capture time of image data in which the detection target is detected, lightweight data obtained by lightening an amount of data in the plurality of pieces of image data, and transmitting tracking data obtained by aggregating a plurality of pieces of generated lightweight data; and a terminal device capturing the monitored area and outputting image data, transmitting the captured image data to the server device and also receiving the tracking data from the server device, and irradiating light on the detection target, based on the received tracking data..
Nec Corporation

Inspection device and inspection method

The present invention is adapted to the technical field of commodity anti-counterfeiting, and provides an inspection device and an inspection method, comprising: an input device communicatively connected to a verification report server and a verification server, respectively; the input device for activating security data of a quality inspector of the commodity, transmitting the security data to the verification report server for verification, reading an anti-counterfeiting code of the commodity after the security data pass verification, and transmitting the anti-counterfeiting code to the verification server; the verification report server for receiving the security data and verifying the security data; and the verification server for receiving the anti-counterfeiting code of the commodity to verify the anti-counterfeiting code. Thus, the present invention realizes authentication of personnel who is responsible for inspecting the commodity, and ensures qualified professional to inspect the commodity..

Marker code generation for resource distribution authority flagging

Embodiments of the invention are directed to systems, methods and computer program products for generating unique marker codes for security implementation and deployment during authentication required resource disbursement. In this way, marker codes may be generated and associated with one or more resource disbursement mechanisms.
Bank Of America Corporation

Security for electronic transactions and user authentication

System and method for generating, disseminating, controlling, and processing limited-life security codes used to authenticate users, particularly for electronic financial transactions, such as payment transactions. Providing a user with a single security code usable across multiple accounts or other secured systems is contemplated, each security code having a limited lifetime.
Tender Armor, Llc

Portable network interfaces for authentication and license enforcement

Methods and apparatus for portable network interfaces to manage authentication and license enforcement. A system may include a plurality of resource instances including a producer instance configured to implement a network-accessible service, and an authentication coordinator.
Amazon Technologies, Inc.

Anti-counterfeit label having increased security

The invention relates to a near field magnetically coupled contactless tag, comprising a substrate comprising a rupture zone; a master microcircuit arranged on the substrate on one side of the rupture zone, and configured to be interrogated by a near-field reader; a slave microcircuit arranged on the substrate on the other side of the rupture zone; and a sacrificial link connecting the two microcircuits, wherein the two microcircuits are configured to negotiate mutual authentication through the sacrificial link.. .
Wisekey Semiconductors

Two dimensional barcode and authentication of such barcode

A method is disclosed for creating a 2d barcode. In an embodiment, the method includes: embedding primary information that can be read by a 2d-barcode-reader in a primary information pattern, and embedding secondary information that is made difficult to reproduce without alteration in a visible pattern.
Scantrust Sa

Physical marker coding for resource distribution adjustment

Embodiments of the invention are directed to systems, methods and computer program products for providing physical marker coding for resource distribution adjustment or duress signaling when using paper resource distribution documents. Paper resource distribution documents have limited amount of multi-factor authentication.
Bank Of America Corporation

Enhanced user authentication

A method and system for authenticating a user. A first digital representation of an iris of an eye of at least one authentic user is obtained.
International Business Machines Corporation

Authentication process for post-1942 norman rockwell paintings

This authentication process reveals the hidden initials nr and upon subsequent magnification, the syllables comprising the names, norman and rockwell and the year of the painting's completion in mr. Rockwell's printed handwriting styles.

Security device and display device including the same

A security device includes a biometric sensor which senses biometric information of a user, a pressure sensor which senses a contact surface caused by the user and to obtain force distribution information of the contact surface, and a user authenticator which performs user authentication with reference to the biometric information and the force distribution information.. .
Samsung Display Co., Ltd.

Method and authenticating fingerprints using reflected wave

The present disclosure relates to fingerprint sensing technology of a fingerprint sensor to be used, and more particularly to an apparatus for authenticating whether a fingerprint of a subject is forged or falsified by using a waveform reflected from the subject, such as an ultrasonic wave. The fingerprint authentication apparatus includes a fingerprint sensor configured to apply a wave signal to a subject and receive a wave signal reflected from the subject, a local waveform detector configured to detect local waveforms by dividing the received wave signal by a reception time, and a forgery detection unit configured to count the number of local waveforms and detect whether a fingerprint provided from the subject is forged or not based on the counted number of local waveforms..
Shin Sung C&t Co., Ltd.

Contemporaneous gesture and keyboard for different levels of entry authentication

A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device.
International Business Machines Corporation

Keyboard entry as an abbreviation to a contemporaneous gesture authentication

A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device.
International Business Machines Corporation

Contextual contemporaneous gesture and keyboard entry authentication

A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device.
International Business Machines Corporation

Contemporaneous facial gesture and keyboard entry authentication

A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device.
International Business Machines Corporation

System, method and computer program product for controlling and altering biological, biometric, and idiosyncratic authentications

An authentication control method, system, and computer program product, includes performing an initial calibration to login to a registered device by detecting a plurality of biological signals, biometric signals, and idiosyncratic signals of a user and selecting a combination of the plurality of biological signals, biometric signals, and idiosyncratic signals to use in an initial calibration-authentication score, computing a login-authentication score at a time of the login based on a user input of signals corresponding to the signals of the initial calibration-authentication score, and allowing the login to the registered device if the login-authentication score is within a predetermined threshold of the initial calibration-authentication score.. .
International Business Machines Corporation

Receiving apparatus, transmitting apparatus, and data processing method

There is provided an arrangement for executing an application on the condition that the application has been confirmed as authorized. A transmitting apparatus sends an application and signaling data in which authentication information capable of confirming the application as authorized is recorded.
Sony Corporation

System and unlocking devices associated with a carrying bag

A system and method for unlocking devices associated with a carrying bag are provided. In example embodiments, biometric information of a user from a biometric reader is received by an authentication system.
Ebay Inc.

Method and authenticating user using electrocardiogram signal

A method and apparatus to authenticate a registered user are described. The method and apparatus include a processor configured to identify a first electrocardiogram (ecg) signal measured from the user, and determine a similarity between the first ecg signal and a second ecg signal based on the identified first ecg signal and the second ecg signal included in a reference ecg signal set.
Samsung Electronics Co., Ltd.

Print output management system and the operation thereof

A print output management system includes a management server, an output server and a large format equipment. The management server receives an original document file and converts the original document file to an output processing file, generates an authentication code corresponding to the output processing file, and stores the output processing file and the authentication code.
Color123, Ltd.

Method of instant sharing invoked from wearable devices

Techniques are disclosed herein for establishing a file transfer connection via wearable devices (e.g., head-mounted wearable devices). A first wearable device generates a gesture-based connection request to connect with a second wearable device.
International Business Machines Corporation

Method to operate a motor vehicle with a portable control device

The disclosure relates to a method for operation of a motor vehicle with a portable control device. The portable control device is designed to generate control signals to control the motor vehicle.
Ford Global Technologies, Llc

Keyless entry system security enhancement

The keyless entry system (kes) controls access to a vehicle's doors, trunk, hood, etc., through a keyless entry device (e.g., a key fob) using wireless communication with the vehicle. The technology described here mitigates vulnerabilities in the kes implementation by employing a device configured to suppress a keyless entry command until an additional means of authentication is verified, at which point the keyless entry command is unsuppressed..
The Mitre Corporation

System for charging an electric vehicle (ev)

A method of charging an electric vehicle (ev) includes receiving a user's authentication code in an electric vehicle service equipment (evse) from a user's mobile device, comparing in the evse the user's authentication code to a whitelist having a plurality of authorized user authentication codes, and enabling an electric vehicle (ev) charging transaction serviced by the evse in response to the comparing of the user's authentication code to the whitelist so that a user's authentication code is authenticated to enable the ev charging transaction without concurrent access to an evse-related remote server.. .
Aerovironment, Inc.

Charging authorization approach for objects to be recharged and automatic authorization approach and system for charging apparatuses

The present application relates to the field of charging electrical apparatuses, and more particularly, to a charging authorization approach for objects to be recharged, an automatic authorization approach and system for charging apparatuses. The present application intends to solve the problem of complicate authentication procedure and poor user experience when a charging apparatus authenticates an electric vehicle in the prior art.
Nio Co., Ltd.

E-mail message authentication extending standards complaint techniques

A system and method for e-mail authentication. The method includes aggregating a plurality of headers associated with an e-mail message and transmitting the aggregated plurality of headers to a validation service.
Iconix, Inc.

Dynamic utilization of services by a temporary device

A system for dynamically providing or utilizing services and applications on a temporary or new device is provided. A user can send a message with a secure code that is forwarded to a home network associated with the user.
At&t Mobility Ii Llc

Terminal device, device provided with prose function, communication terminal device, and communication device provided with prose function

Processing based on a discovery request procedure for discovering a proximity terminal or being discovered is carried out based on authentication of a server device operated by the network operator. In addition, the network operator updates the processing based on the discovery request procedure in accordance with a policy of the network operator.
Sharp Kabushiki Kaisha

Function execution device and communication terminal

A system and method for providing an authentication state of a function execution device to a communication terminal is described. In some examples, the authentication state indicates whether authentication information is needed from the communication terminal before the communication terminal can request performance of one or more functions performable by the function execution device.
Brother Kogyo Kabushiki Kaisha

Authentication server, user terminal, content server, control these, and computer program

An authentication server that authenticates a user of a user terminal that plays a content stream provided by a content server, the authentication server authenticating the user. The authentication server includes storage means that stores registration information, authentication means that, when receiving an authentication request for content designated by a first user from a user terminal that the first user is using, compares information included in the authentication request with the registration information and authenticates the first user, generation means that, if the authentication succeeds, generates a first token indicating that the first user is an authenticated user, and communications means that transmits the generated first token to the user terminal.
Rakuten, Inc.

Server storing authentication information in association with device information in storage

A server receives a correlation instruction from an information processing apparatus when the storage stores first device information uniquely assigned to an image processing apparatus. The correlation instruction is for correlating first device information with a service that a service-providing apparatus provides.
Brother Kogyo Kabushiki Kaisha

Image transmission apparatus

When an address is inputted through input means for inputting an address of a receiving end, an image transmission apparatus carries out an authentication process that determines whether or not the inputting person is a right authorized person. When it is determined that the corresponding operation is right through the authentication process, the image transmission apparatus transmits image data to the address of the receiving end thus inputted..
Sharp Kabushiki Kaisha

Systems and methods for controlling a locking mechanism using a portable electronic device

Systems and methods are provided for operating a remotely operable lock. In an example embodiment, a method comprises receiving credentials at a web service from a portable electronic device, authenticating the credentials, and based on a successful authentication, issuing a command for receipt by the lock from the web service or the portable electronic device..
The Chamberlain Group, Inc.

User and iot (internet of things) apparatus tracking in a log management system

Network identity to user identity and location mapping information can be found in various logs (such as active directory logs, dhcp logs, vpn logs, and wlan authentication logs) and certain files such as router layer 2 or 3 forwarding tables. For a large organization, this mapping can be dynamic.
Fortinet, Inc.

Selectively enabling and disabling biometric authentication based on mobile device state information

Methods, systems, and computer-readable media for selectively enabling and disabling biometric authentication are presented. In some embodiments, a computing platform may receive, from a device monitoring and management computer system, a device state indicator message comprising device state information associated with a mobile computing device.
Bank Of America Corporation

System for providing health information having authentication data and operating method thereof

Provided are a system for providing health information with authentication data and an operation method thereof. The system for providing health information includes a storage device, a data combination device, and a data authentication device.
Electronics And Telecommunications Research Institute

Method, authentication server, and electronic device for configuring a sharing target device for sharing data usage of the electronic device

Methods and electronic devices are provided for configuring a sharing target device. A method includes transmitting, to an authentication server associated with a mobile network operator for managing data usage, a device configuration request message for configuring the sharing target device to share a data usage amount assigned to the electronic device; receiving, from the authentication server, in response to the device configuration request message, an access code permitting access to the authentication server; and transmitting the received access code to the sharing target device, wherein the sharing target device receives, using the access code, a subscriber profile from the authentication server for sharing the data usage amount assigned to the electronic device..
Samsung Electronics Co., Ltd.

Internet-of-things reading device, secure access, and control center apparatus

An internet-of-things (iot) reading device, a method of secure access using the same, and a control center apparatus are provided. The internet-of-things reading device includes a network interface and a processor.
Wistron Corporation

Authentication of packetized audio signals

The present disclosure is generally directed a data processing system for authenticating packetized audio signals in a voice activated computer network environment. The data processing system can improve the efficiency and effectiveness of auditory data packet transmission over one or more computer networks by, for example, disabling malicious transmissions prior to their transmission across the network.
Google Llc

Authentication of packetized audio signals

The present disclosure is generally directed a data processing system for authenticating packetized audio signals in a voice activated computer network environment. The data processing system can improve the efficiency and effectiveness of auditory data packet transmission over one or more computer networks by, for example, disabling malicious transmissions prior to their transmission across the network.
Google Inc.

Management and authentication in hosted directory service

A user, group, and device management and authentication system allows administrators to manage one or more directories with devices that are not associated with a domain of the one or more directories via a set of apis. The system also allows applications and services that do not have direct access to a list of directory users to access the one or more directories.
Amazon Technologies, Inc.

System and directory service authentication on a service processor

An information handling system includes host processor hardware and service processor hardware. The host processor hardware includes a network interface device that has an external network interface coupled to a domain controller and an internal network interface.
Dell Products, Lp

User-to-user information (uui) carrying security token in pre-call authentication

In one embodiment, a telecommunication apparatus includes a processor to generate a telephone call set-up message including a user-to-user information (uui) field, and include a security token in the uui field of the telephone call set-up message, and a network interface to send the telephone call set-up message to a telephone network. Related apparatus and methods are also described..
Cisco Technology, Inc.

Multiple field authentication

Techniques are disclosed relating to authenticating a user via a login screen. In one embodiment, a computer system displays a login screen having an arrangement of input fields where each input field is operable to receive a character.
Ca, Inc.

Authenticated session management across multiple electronic devices using a virtual session manager

A virtual session manager of an electronic device maintains a web session for a user across multiple electronic devices. The virtual session manager will receive an authentication request from a first electronic device that is in a communication range of the virtual session manager's device.
Google Inc.

Two-token based authenticated session management

A system maintains a web session across multiple web resources and/or devices using a two-token model. A user agent transmits an authentication request to a login endpoint.
Google Inc.

Multi-party authentication in a zero-trust distributed system

A zero-trust network and methods of using same are disclosed. The network includes a plurality of nodes, some of which are user devices, such as mobile phones, some of which are computer servers.
Entefy Inc.

System and authenticating and enabling an electronic device in an electronic system

A system and method for authenticating and enabling an electronic device in an electronic system are disclosed. A particular embodiment includes: an electronic system comprising: a protected device; a requesting device node, executing on a computing system, the requesting device node including: a device query data packet generator to generate a device query packet including data representing one or more identifiers of the protected device and a particular paired system; and an authentication key retriever to obtain an authentication key based on the device query data packet from an authentication provisioning node using an external data communication; and an obfuscation state machine of the particular paired system configured with a pre-defined quantity of state elements, a pre-defined quantity of the state elements being functional state elements, the obfuscation state machine being programmed with the authentication key to cause the obfuscation state machine to transition the protected device from an initial obfuscation state to a functional state..
Anvaya Solutions, Inc.

Method and system for providing a communication device access to a wireless local area network

A method and system for providing a communication device access to a wireless local area network (wlan) is disclosed. The method includes receiving, by a communication device, an encrypted network access information (enai) file from a network administration device, wherein the enai file comprises the network access information for the wireless local area network and user authentication requirement criteria.
Wipro Limited

Method and system for authentication

An authentication method is performed between a first party and a second party. The method includes: i) determining a challenge; ii) sending the challenge to the second party; receiving a response from the second party including a second cryptogram; computing a first cryptogram using the challenge and the key of the first party; determining if the first cryptogram matches the second cryptogram received from the second party.
Oberthur Technologies

System and sharing keys across authenticators

A system, apparatus, method, and machine readable medium are described for sharing authentication data. For example, one embodiment of a method comprises: generating and storing a persistent group identification code (group-id) for a group of authenticators sharing a common set of authorization (uauth) keys, an initial group-id to be generated on a first use of a first authenticator and/or following a factory reset of the first authenticator generating and storing an individual asymmetric wrapping key encryption key (wkek) on a first use of the first authenticator and/or following each factory reset of the first authenticator; generating and storing a symmetric wrapping key (wk), the wrapping key to be generated on a first use of the first authenticator and/or following each factory reset of the first authenticator; generating a join-block using an authenticator identification code for the first authenticator and the wkek, the join-block usable to join an existing authenticator group, the join block to be sent to a second authenticator; verifying the join-block at the second authenticator and generating a join response block responsive to user approval, the join response block generated by encrypting the wk and group-id using the wkek, the join response block to be transmitted to the first authenticator; and decrypting the join response block and storing the wk and group-id..
Nok Nok Labs, Inc.

E-mail message authentication and marking extending standards complaint techniques

A system and method for e-mail authentication. The method includes aggregating a plurality of headers associated with an e-mail message and transmitting the aggregated plurality of headers to a validation service.
Iconix, Inc.

Secondary short-range wireless assist for wireless-based access control

Concepts and technologies disclosed herein are directed to secondary short-range wireless assist for wireless-based access control. According to one aspect, a method can include receiving, at an access control system, a first identifier via a near-field communications (“nfc”) reader associated with an entryway to an area.
At&t Intellectual Property I, L.p.

Server and home appliance having power demand management function and managing power usage thereof

A power demand management system includes a plurality of power-prepaid appliances and a power demand management server. Each of the power-prepaid appliances includes an authenticator configured to manage an authentication key, a control setting unit configured to receive a power consumption control signal containing a power reduction amount from the power demand management server and to set control information according to the power reduction amount, and an operation control signal generator configured to generate an operation control signal based on the control information selected by the control setting unit.
Encored Technologies, Inc.

Wireless charging receiver group authentication

The present invention provides a mobile apparatus with wireless charging function and an accessory apparatus with wireless charging function capable of allowing a wireless power receiver (prx) to communicate with a cpu of a mobile device, so as to solve the problem mentioned above. The mobile apparatus comprises: a processing circuit and a wireless power receiver (prx).
Htc Corporation

Method and smart wearable device for children's security

The present disclosure discloses a method and smart wearable device for children's security. The method includes: determining whether the smart wearable device receives the security authentication information; determining whether the smart wearable device is removed when the smart wearable device does not receive the security authentication information; sending location information and alarm information to a specified system when the smart wearable device is removed.
Jrd Communication Inc.

Bluetooth sensing unlocking a door

A bluetooth sensing method for unlocking a door, applied to a system including an electronic device, an electronic door lock, and an authenticator connected to the electronic door lock. The method includes: the electronic device detecting that the distance between the electronic device and the authenticator is smaller than a pre-defined value, the electronic device setting up a bluetooth communication connection to the authenticator; the processor initiates a mutual authentication process to the controller when the distance is smaller than a pre-defined value; the electronic device automatically transmitting an unlocking instruction to the authenticator; and the authenticator unlocking the electronic door lock according to the unlocking instruction..
Orzdar Tech Inc.

Dealer and gaming apparatus control system for gaming establishments

Embodiments disclosed herein concern dealer control for gaming establishments, such as casinos. Using an electronic management system, authentication and authorization of dealers can be provided in a controlled manner that complies with predetermined rules.

Systems and methods for pre-authenticating a user of a payment card over a network

The present disclosure provides for systems and methods for pre-authenticating a user over a network, the system including an authentication computing device configured to receive, over a first computer network, a pre-authentication signal from a client device, determine an account number associated with a payment card of the user, verify i) that the user has satisfied at least one security measure, and ii) that the account number is associated with the client device, store the account number in association with a timer, initiate the timer, monitor, until the timer expires, a second computer network to detect an authorization request message for a transaction having the account number, and embed a digital authentication flag in the authorization request message when the authorization request message is detected before the timer expires, the digital authentication flag indicating that the transaction has been pre-authenticated.. .
Mastercard International Incorporated

System and price matching through receipt capture

A system and method for generating a notification of a price change for a transaction and facilitating an associated price adjustment based on electronic image capture of a paper receipt. An image capture system captures an electronic image of a paper transaction receipt, which is transmitted to a data extraction processor that extracts transaction receipt data from the captured electronic image.
Capital One Services, Llc

Multifunction card including biometric data, card payment terminal, and card payment system

A multifunction card includes an integrated circuit. The integrated circuit includes a memory, a processor, and a communicator.
Brainy Inc.

Electronic identification and authentication system

A system includes a service provider device and a point of sale (pos) device. A session between a user device and the pos device is established.
Paypal, Inc.

Systems and methods for utilizing payment card information with a secure biometric processor on a mobile device

Systems and methods for utilizing payment card information stored on a secure biometric processor on a mobile device in accordance with various embodiments of the invention are disclosed. In one embodiment, a process for securely providing payment card information from a portable device to a payment terminal includes receiving a request for payment using a payment interface, triggering a user authentication by capturing a set of biometric information from one or more biometric sensors, calculating, using the captured set of biometric information, a match with a set of stored biometric information that is stored on a secure biometric processor in order to determine a user identifier of an authenticated user, determining a payment card out of a set of payment cards associated with the user identifier, retrieving payment card information for the determined payment card from the secure biometric processor, and transmitting the payment card information to a payment terminal..
Fotonation Limited

System and user interfaces for preference based micropayment processing

A micropayment processing system and method of processing micropayments for media content are described. In one embodiment, the system includes a drop-down widget that is displayed on the display device of a data processing system, wherein the widget is immune to ad blocking.
Mitoc Group Inc.

Object identification for improved ux using iot network

In some embodiments, the disclosed subject matter involves a system and method to identify objects in an environment or scene to assist in locating objects and individuals. In at least one embodiment, users register with a service to help locate and/or track objects and individuals.

Methods and systems for detecting head motion during an authentication transaction

A method for detecting user head motion during an authentication transaction is provided that includes generating, by a processor, a motion type feature vector and a user head motion type prediction based on data generated for a sequence of frames. The frames are included in biometric data captured from a user.
Daon Holdings Limited

Facial signature methods, systems and software

Methods, systems and computer program products (“software”) enable a virtual three-dimensional visual experience (referred to herein as “v3d”) in videoconferencing and other applications; the capturing, processing and displaying of images and image streams; and generation of a facial signature based on images of a given human user's or subject's face, or lace and head, for accurate, reliable identification or authentication of a human user or subject, in a secure, difficult to forge manner.. .
Mine One Gmbh

Feature extraction and matching for biometric authentication

In a feature extraction and pattern matching system, image sharpening can enable vascular point detection (vpd) for detecting points of interest from visible vasculature of the eye. Pattern histograms of extended multi-radii local binary patterns and/or pattern histograms of extended multi-radii center symmetric local binary patterns can provide description of portions of images surrounding a point of interest, and enrollment and verification templates can be generated using points detected via vpd and the corresponding descriptors.
Eyeverify Inc.

Medium containing identifier

The objective of the present invention is to effectively prevent fraud, theft, and the like occurring with respect to a medium manufactured from a source material. This medium is a medium that is cut into a prescribed shape from a source material on which an identifier capable of specifying a location and capable of being read by a reading device is attached at a corresponding location.
Sigma P.i. Co., Ltd.

Remote identity authentication method and system and remote account opening method and system

Provided in the present application are a remote authentication method and system and a remote account opening method and system. The remote authentication method includes: by an electronic cipher device, acquiring information to be validated, generating and displaying a graphic identification code on the basis of the information to be validated; by a terminal, acquiring a picture including a facial image of a user and the graphic identification code displayed on the electronic cipher device and transmitting the picture to a background server; and by the background server, receiving the picture and validating the graphic identification code and the facial image of the user provided on the picture..
Tendyron Corporation

Intergrated wearable security and authentication apparatus and use

Embodiments shown provide a wearable device capable of acquiring images association with an unknown person facial features of the user gesture commands using an integrated wearable security system. The system enables a user to discreetly capture images of individual or environment using an integrated camera, video, and audio component.

Verifying wet ink signatures via digital pen technology

Systems, apparatuses and methods may provide for technology that includes a writing implement with an ink subsystem to print a message, a sensor subsystem to digitize the message and an authorization subsystem coupled to the sensor subsystem, wherein the authorization subsystem generates a notification of whether the digitized message is authentic. In one example, a remote server obtains the digitized message originating from a writing implement, wherein the digitized message includes an image of a handwritten signature and additional sensor information.

User authenticating

Provided is an authentication method including receiving an authentication request; obtaining authentication data for authenticating a user from at least one of a plurality of external devices as when the authentication request is received; obtaining an authentication score based on the obtained authentication data and reliability information assigned to a type of the authentication data in advance; and determining whether additional authentication is necessary based on the obtained authentication score.. .
Samsung Electronics Co., Ltd.

Device authentication based on behavior classification using convolution neural network

A method of authenticating a user on a mobile device includes gathering samples of behavioral data of the user from multiple sensors of the mobile device, each sensor generating a different number of samples. The method also includes normalizing the samples to have a same number of samples for each sensor.
Qualcomm Incorporated

Content reading reading out copyright-protected content from non-transitory recording medium, content reading apparatus, and non-transitory recording medium

A method is provided that includes receiving a command for reading out content from a non-transitory recording medium, and identifying first version information indicating a version of a content copyright protection method. The method includes identifying second version information indicating a version of a protocol used in authentication of the host apparatus, and determining whether the authentication is to be approved or not.
Panasonic Intellectual Property Corporation Of America

Random number generation in ferroelectric random access memory (fram)

Disclosed embodiments relate to generating random numbers using two transistor, two capacitor (2t-2c) ferroelectric memory cells. In accordance with one disclosed embodiment, an n-bit random number can be generated by writing to a uniform data pattern to a set of n 2t-2c ferroelectric memory cells in a 1t-1c mode so that all ferroelectric capacitors of the n 2t-2c cells have a polarization state corresponding to the same data value (e.g., all 0's or all 1's).
Texas Instruments Incorporated

Bluetooth low energy (ble) passive vehicle access control system for defending the system against relay attacks and method thereof

A bluetooth low-energy (ble) passive vehicle access control system integrated into a vehicle and an external device to defend the system against relay attacks is provided. The system includes at least one of a motion detector, a microprocessor, or a barometric pressure sensor.
Robert Bosch Gmbh

. .

Pre-roaming security key distribution for faster roaming transitions over cloud-managed wi-fi networks of heterogeneous ip subnets

A cloud control element distributes security keys prior to roaming to facilitate fast transition roaming across different ip subnets. The cloud control element distributes security keys to access points identified as neighboring and sharing a common ssid (service set identifier), but over different ip subnets.
Cloudmondo, Inc.

Gateway, gateway setup method, and iot device setup method in iot system

A gateway, a gateway setup method, and an iot device setup method are provided. The gateway setup method includes to detect received signal strength indicator (rssi) between a user device and a gateway to determine whether a distance between the two devices is less than a distance threshold.
Lite-on Technology Corporation

Unified authentication for integrated small cell and wi-fi networks

Multi-rat ues currently have 2 independent paths to authenticate with hss (either via the mme or the 3gpp aaa server causing repeated authentication messages to hss. The use of one unified authentication path between the ue and hss for small cell and wi-fi authentication is described.
Convida Wireless, Llc

Authentication connecting a companion device when same is disconnected from a subscriber device

Authentication device and method for a system that includes a subscriber device and a companion device. The authentication method includes the subscriber device delivering to the companion device a temporary profile and an authentication response signed by the subscriber device for sending to a server, installing the temporary profile to configure a second wireless communication interface of the companion device, and requesting a second authentication from the server via the second interface by using the delivered authentication response so as to authorize the second interface when the companion device and the subscriber device are not in communication with each other via the first communication interface.
Idemia France

Wireless system access control

A wireless access control method and device are provided. A method applied to a sender terminal includes: generating, by a terminal, an authentication code according to a protocol negotiated with a receiver when sending control-type data, combining, by the terminal, control-type data, the authentication code and a corresponding crc check code to generate a message, and sending, by the terminal, the message to the receiver, such that the receiver can perform a crc check on the received message, generates an authentication code according to the negotiated protocol if the crc check is successful, determines whether the generated authentication code is the same as the received authentication code, if so, analyzes the received control-type data, and if not, discards the received control-type data..
Hytera Communications Corporation Limited

Embedded certificate strong authentication and ease of use for wireless iot systems

An internet-of-things (iot) device and secure communication and authentication protocol is described for identifying an iot device and counter party and ensuring that communication between the iot device and the counter party is authenticated before transmission and receipt of data over the trusted communication pathway.. .
Cypress Semiconductor Corporation

Facilitation of user authentication using mobile devices

A connection hub connects a plurality of service providers and a plurality of mobile operators, and facilitates authentication of service consumers on behalf of the plurality of service providers. The connection hub may use authentication information of the plurality of mobile operators, to thereby enable provision of network resources from the plurality of service providers to the service consumers.
Sap Se

Systems and methods to determine safe zones and safe routes of a device

Systems and methods to generate safe zones and safe routes associated with a device are disclosed. These safe zones and safe routes can be used to map complicated location behavior into location behavior scores that can be applied systematically to tracking and authentication applications..
Athentek Innovations, Inc.

Real time location system

A method includes receiving a beacon identifier and a location of a beacon associated with the beacon identifier from an individual location monitoring system operated by a first entity. The method further includes, with a data hosting system operated by a second entity, determining an identity of a monitored individual associated with the beacon identifier, associating the location of the beacon with the identity of the monitored individual, and receiving a request for the location of the monitored individual including authentication credentials.
Weeguardians Llc

Systems and methods to determine safe zones and safe routes of a device

Systems and methods to generate safe zones and safe routes associated with a device are disclosed. These safe zones and safe routes can be used to map complicated location behavior into location behavior scores that can be applied systematically to tracking and authentication applications..
Athentek Innovations, Inc.

Validating mobile applications for accessing regulated content

Allowing access to regulated content (e.g., fda regulated) via mobile devices can increase operational efficiency of companies that have this type of content, and allow users to quickly interact with this content even when outside of the company office. Yet, mobile devices present security issues in ensuring that the integrity of the regulated content is maintained.
Medidata Solutions, Inc.

Strong authentication of client set-top boxes

Described herein are systems and methods for securing transmission of content from a smart card in a host television receiver to a client television receiver. The smart card can receive the encrypted content stream from the television service provider, decrypt the content stream with the global network key, identify the client television receiver as the destination of the content stream, generate a unique key specific to the content stream, encrypt the unique key with a local key known to the client television receiver, encrypt the content stream with the unique key, and transmit the encrypted content stream along with the encrypted unique key to the client television receiver.
Echostar Technologies L.l.c.

Authentication setting system and image forming apparatus

An image forming apparatus (a) causes the image scanning device to scan an image of: (a1) the mobile terminal apparatus before model changing that displays the subscriber id, (a2) the mobile terminal apparatus after model changing that displays the subscriber id, and (a3) a fill-in form in which the authentication setting information was written on a platen glass as one-time scanning and generate a scanned image, (b) extracts the subscriber ids of the mobile terminal apparatuses and the authentication setting information, (c) causes the wireless communication device to transmit the authentication setting information to the mobile terminal apparatus after model changing if the subscriber id of the mobile terminal apparatus before model changing and the subscriber id of the mobile terminal apparatus after model changing are same as each other.. .
Kyocera Document Solutions Inc.

Image forming apparatus, control method therefor, and program

An image forming apparatus connected to a charging apparatus that collects a fee includes an authentication unit that authenticates users and a display that displays a screen enabling users to select between logging into the image forming apparatus based on being authenticated or by paying a fee using the charging apparatus.. .
Canon Kabushiki Kaisha

Mobile device user validation method and system

A system including a mobile device, a user of the mobile device, a computer system having a telecommunication module for telephonically communicating with the mobile device, a user of the computer system, and a security server is provided. Also provided is a method, at a mobile device, of authenticating a user of the mobile device during a telephone call having the steps of obtaining a user authentication input, obtaining validation of the user authentication input, initiating a telephone call with, or receiving a telephone call from, the computer system, and if the user authentication input is successfully validated, sending a token generated for the telephone call with the computer system via data-over-voice frequency signaling during the telephone call thereby providing an indication that the user authentication input has been successfully validated to the computer system..
Mastercard International Incorporated

Non-intrusive user authentication system

A system for secure user authentication of a mobile electronic device includes a touch-based user interface of the mobile electronic device, a processor, and a computer-readable storage medium. The system presents a graphical user interface comprising a target location represented by a graphical indication, and receives an authentication code comprising a sequence of taps.
Google Inc.

Forward one-time-use physical access verification apparatus, system, and operation

A wireless apparatus controls physical access through a portal by forward verification of one-time-use codes submitted by a mobile application device. A system forward verifies a single physical access control code upon each successful physical access request.

Security routing system for use in iot apparatus

A routing system for use in an iot apparatus is proposed to include a router device. A control module of the router device determines whether to execute a routing process relating to an input message based on environment information, status information and a conflict management mechanism that relate to the router device.

Universal login authentication service

A system and method enables secure login at linked sites with a universal id (uid) and possibly different or same password to linked identities. In such logins, a user stays at the linked login page, and the login name and password are sent to a uid provider for authentication.
Badu Networks, Inc.

Resource-driven dynamic authorization framework

Embodiments concern a dynamic authorization framework. Security classification process (scp) is the process of classifying raw data, information extracted from raw data, content or code from security-value perspective.
Convida Wireless, Llc

Providing authentication information from an online system to a client device to allow the client device to execute an application associated with the online system

A client device including an application associated with an online system transmits information identifying the client device to the online system when the application is launched. For example, the client device communicates a phone number of the client device to the online system.
Venuenext, Inc.

Expanded ios® device capability

A method includes receiving a request from a host device to authenticate a device. The method further includes transmitting authenticating data to the host device.
Seagate Technology Llc

Remote communication system, remote communication method, and recording medium

A remote communication system authenticates each of a plurality of first communication terminals by using first authentication information of each of the plurality of first communication terminals, to establish a session between the plurality of first communication terminals; authenticates a second communication terminal by using second authentication information of the second communication terminal; transmits, to the second communication terminal, candidate pairing terminal information that indicates at least one candidate first communication terminal being capable of performing a pairing operation with the second communication terminal; accepts selection of a first communication terminal being selected as a target of the pairing operation; and performs the pairing operation between the selected first communication terminal and the second communication terminal, to enable the second communication terminal to join the session using resources of the selected first communication terminal.. .

Fabric assisted identity and authentication

Context-based authentication in a secure network comprised of multiple interconnected programmable devices is described. One technique includes receiving, from a programmable device, identity data and contextual data associated with a current authentication of a user attempting to access a secure network.
Mcafee, Inc.

Electronic apparatus, control authority authentication method thereof and user terminal apparatus

An electronic apparatus is provided. The electronic apparatus includes a communicator configured to communicate with a guest terminal apparatus requesting control authority for the electronic apparatus and an owner terminal apparatus having approval authority for a control of the electronic apparatus, a storage, and a processor configured to transmit an approval request for the control authority request to the owner terminal apparatus when the control authority request is received from the guest terminal apparatus, generate authentication information for control authority authentication of the guest terminal apparatus to store the generated authentication information in the storage and to transmit the generated authentication information to the guest terminal apparatus, when an approval for the approval request is received from the owner terminal apparatus, and match received authentication information and the stored authentication information to each other and to determine whether a control command is performed, when the authentication information and the control command for the electronic apparatus are received from the guest terminal apparatus..
Samsung Electronics Co., Ltd.

Dual authentication using a password card

A method and apparatus for providing and processing two-factor authentication using a password card. There is a need to increase security during the authentication process.

Relay apparatus, communication apparatus and relay method

A relay apparatus is connected to a communication apparatus, a service providing apparatus and a browser-equipped apparatus. The relay apparatus includes: a registering unit registering provisional registration information, the provisional registration information being used in an authentication procedure performed between the service providing apparatus and the browser-equipped apparatus; an acquiring unit acquiring permission information representing that use of the service is permitted, the permission information being issued by the service providing apparatus in the authentication procedure; a communication unit transmitting the provisional registration information to the browser-equipped apparatus; a receiving unit receiving input information transmitted from the communication apparatus, the input information being generated in response to the provisional registration information; and a communication unit transmitting the permission information to the communication apparatus which has transmitted the input information if the receiving unit receives the input information..
Brother Kogyo Kabushiki Kaisha

Method for establishing protected electronic communication, secure transfer and processing of information among three or more subjects

A method of establishing protected electronic communication, secure transfer and processing of information among three or more subjects in which, at first, a first secure authenticated channel is created using an authentication system between a first subject and a second subject, and this channel is used by the first subject, in co-operation with the second subject, to create an authentication object stored on the second subject and provided with authentication object methods, whereas the first subject configures methods of authentication object by assigning to each method of the authentication object a rights control information for at least one other subject and optionally also a rights control information for the first subject to use at least one method of the authentication object, and then the first secure authenticated channel is closed.. .
Aducid S.r.o.

Multi-level user device authentication system for internet of things (iot)

The connected devices represent individual targets, for the cyber-criminals who 20 would hack the devices to retrieve the secure information of the users. Such insecurities about the iot, devices and the system are eliminated by using the multiple level user authentication system which is described in the present invention..

Methods and systems for user authentication

Methods and systems for passwordless authenticating of a user are provided. A first request to access a first content is received from a first user of a first device.
Dashlane, Inc.

Method and system for providing a pre-launched virtual desktop session

The present disclosure relates to a method and system for providing a pre-launched virtual desktop session by a smart scheduling server. The smart scheduling server predicts a pre-launch time to launch a virtual desktop session for a user based on a login pattern of the user monitored for a pre-defined duration, initiates a pre-launch session for the user based on the predicted pre-launch time, where the initiation comprises performing a plurality of actions for launching the virtual desktop session for the user.
Wipro Limited.

Detecting and mitigating forged authentication object attacks using an advanced cyber decision platform

A system for detecting and mitigating forged authentication object attacks is provided, comprising an authentication object inspector configured to observe a new authentication object generated by an identity provider, and retrieve the new authentication object; and a hashing engine configured to retrieve the new authentication object from the authentication object inspector, calculate a cryptographic hash for the new authentication object, and store the cryptographic hash for the new authentication object in a data store; wherein subsequent access requests accompanied by authentication objects are validated by comparing hashes for each authentication object to previous generated hashes.. .
Fractal Industries, Inc.

Method of securing authentication in electronic communication

A method of securing authentication in electronic communication between at least one user authentication mechanism and at least one server authentication mechanism, wherein primary authentication is performed in the first step, and during the primary authentication a secondary authentication secret is created and shared between the user authentication and the server authentication mechanisms and is valid only for the given authentication transaction, and the secondary authentication secret is subsequently used as an input for a cryptographic transformation performed by the user authentication mechanism separately on each authentication vector element while creating the first authentication vector product, wherein authentication vector (av) is an ordered set of authentication vector elements (ave)(i)), wherein the first authentication vector product is transferred from the user authentication mechanism to the server authentication mechanism and is evaluated by the server authentication mechanism using the secondary authentication secret.. .
Aducid S.r.o.

Secure plug and play configuration of wireless distribution system (wds) wi-fi range extenders

A cloud-based onboarding server detects a network change and facilitates an onboarding process for a new access point. An ssid and authentication credentials for an existing wi-fi channel are sent over a temporary wi-fi channel using a preconfigured ssid and passphrase generated by both the new access point and the master access point.
Cloudmondo, Inc.

Authentication target apparatus, communication system, communication method, and program

An authentication target apparatus is an authentication target apparatus that obtains authentication from an authentication apparatus on the basis of a response code generated on the basis of a received challenge code and includes a control unit configured to perform a limiting process limiting the authentication performed with the authentication apparatus when a number of times the authentication is performed with the authentication apparatus exceeds a predetermined number of times within a predetermined period beginning with a period after transmission of a response code.. .
Honda Motor Co., Ltd.

Cloud authentication of layer 2-connected member devices via an ip-connected active device

Techniques for enabling cloud authentication of layer 2-connected member devices via an ip-connected active device are provided. In one set of embodiments, the member device can transmit, to the active device, a request to authenticate the member device with a cloud management platform.
Brocade Communications Systems, Inc.

Token security on a communication device

Techniques for enhancing the security of storing sensitive information or a token on a communication device may include sending a request for the sensitive information or token. The communication device may receive a session key encrypted with a hash value derived from user authentication data that authenticates the user of the communication device, and the sensitive information or token encrypted with the session key.

Systems and methods for detecting data insertions in biometric authentication systems using encryption

Systems and methods of detecting an unauthorized data insertion into a stream of data segments extending between electronic modules or between electronic components within a module, wherein a data stream is encrypted with a secure encryption key for transmission, then decrypted upon receipt using a corresponding secure decryption key to confirm data transmission integrity.. .
Fotonation Limited

Blockchain-assisted public key infrastructure for internet of things applications

An approach is disclosed for registering and authenticating internet of things (iot) devices. In one embodiment, an installation device receives, from an iot device, an identifier (id) and a hash of a public key, where the iot device itself generates the id, the public key, and a private key.
Vmware, Inc.

Assigning user identity awareness to a cryptographic key

Various systems and methods for performing cryptographic operations based on an authentication policy are discussed. In an example, an authentication policy for implementing a user authentication factor (or multiple factors) may be deployed at a client computing device to control generation and use of a cryptographic key.
Intel Corporation

Quantum tokens

Secure, semi-classical authentication schemes are presented. An authentication token is generated by applying a pre-determined measurement to a plurality of random quantum states to obtain a sequence of classical measurement outcomes.
Cambridge Quantum Computing Limited

Techniques for secure message authentication with unified hardware acceleration

Techniques and computing devices for secure message authentication and, more specifically, but not exclusively, to techniques for unified hardware acceleration of hashing functions, such as sha-1 and sha-256 are described. In one embodiment, for example, an apparatus for hardware accelerated hashing in a computer system mat include at least one memory and at least one processor.
Intel Corporation

Efficient cryptographically secure control flow integrity protection

Embodiments include a computing processor control flow enforcement system including a processor, a block cipher encryption circuit, and an exclusive-or (xor) circuit. The control flow enforcement system uses a block cipher encryption to authenticate a return address when returning from a call or interrupt.
Intel Corporation

Priority actuation system

A system and method for priority actuation is provided. The system and method comprise a priority button.

Systems and methods for detecting data insertions in biometric authentication systems utilizing a secret

Systems and methods of detecting an unauthorized data insertion into a stream of data segments extending between electronic modules or between electronic components within a module, wherein a secret embedded into the data stream is compared to a replica secret upon receipt to confirm data transmission integrity.. .
Fotonation Limited

Management server that communicates with terminal device and purchase server

A management server receives, from a terminal device, authentication information of a target user and first relationship information related to a target printer. In response to transmission of the authentication information to a purchase server, the management server receives, from the purchase server, m number of pieces of color-material identification information identifying m number of types of color material that have been previously purchased by the target user.
Brother Kogyo Kabushiki Kaisha

Method and system for purchase precheck

Methods, apparatus and systems, the method including receiving, by a processor of a consumer mobile device, a request from a user for a purchase pre-authorization; receiving, by a biometric input component of the consumer mobile device, biometric data that uniquely identifies the user; sending a representation of the biometric data to a pre-purchase authentication server; receiving, by the mobile device processor from the pre-purchase server, a message including a unique code, the unique code being associated with a payment card account of the user and valid to use to authorize future purchase transactions using the payment card account for a finite period of time and a specific amount of funds of the payment card account; and displaying, on a display screen component of the consumer mobile device in response to the request, the unique code.. .
Mastercard International Incorporated

Smart card multi-factor authentication device

A dynamic transaction card may be paired with a user application executed on a user device card to facilitate multi-factor authentication of a user by utilizing the dynamic transaction card as a physical token. Various communication technologies may be utilized to create a connection between the dynamic transaction card and the user device application which may include wireless connections and physical connections.
Capital One Services, Llc

Smart card secure online checkout

Wireless communication technologies, a dynamic transaction card, and a mobile application may be utilized to facilitate multi-factor authentication and secure electronic checkout of any website. A wireless connection between a dynamic transaction card and a user device may be utilized to authenticate a user.
Capital One Services, Llc

Rf payment via a mobile device

A nontraditional transaction device, for example a mobile device, may be employed to complete a transaction. The mobile device may utilize radio frequency (rf) communication and/or authentication to facilitate completion of a transaction.
Liberty Peak Ventures, Llc

Systems and methods for detecting data insertions in biometric authentication systems using pseudo data segments

Systems and methods of detecting an unauthorized data insertion into a stream of data segments extending between electronic modules or between electronic components within a module, wherein a pseudo data segment included in the data stream upon transmission is detected upon receipt to confirm data transmission integrity.. .
Fotonation Limited

Communicating information between applications executing on a client device via authentication information generated by an application

An application associated with an online system executing on a client device identifies an additional application on the client device with which the application may exchange information. To exchange information between the application and additional application, the online system receives a request for authentication information from the application that identifies the additional application and a user of the application.
Venuenext, Inc.

Method and system for interoperable identity and interoperable credentials

Method, system, and programs for interoperable identity and interoperable credentials. In one example, an authentication request is received that originated from an online user in connection with an application having a first loa.
Drfirst.com, Inc.

System for device authentication

Communication bus enables devices to communicate and exchange information and control signals. There is a growing concern over the security of such types of buses.
Sital Technology And Hardware Engineering (1997) Ltd.

Identity authentication using biometrics

A service request is received by a terminal device. First biometric authentication information of a user associated with the service request is collected.
Alibaba Group Holding Limited

Facial recognition authentication system including path parameters

Systems and methods for enrolling and authenticating a user in an authentication system via a user's camera of camera equipped mobile device include capturing and storing enrollment biometric information from at least one first image of the user taken via the camera of the mobile device, capturing authentication biometric information from at least one second image of the user, capturing, during imaging of the at least one second image, path parameters via at least one movement detecting sensor indicating an authentication movement of the mobile device, comparing the authentication biometric information to the stored enrollment biometric information, and comparing the authentication movement of the mobile device to an expected movement of the mobile device to determine whether the authentication movement sufficiently corresponds to the expected movement.. .
Facetec, Inc.

System and supplying security information

A wearable device having one or more processors configured to receive one or more signals representative of biometric parameter(s) and sensed presence of a user. The one or more processors configured to compare the biometric parameter to a stored user parameter for authentication of the user.
Tokenize, Inc.

Method and electronic device for determining whether to allow user access

The disclosure relates to biometric authentication of a user, in particular, to a method for determining whether to allow user access based on a user input at electronic device, the method comprising: detecting a touch by an object on a touch-sensitive area of an electronic device, in which a plurality of electrode pairs are mounted, the plurality of electrode pairs including a first set of electrode pairs and a second set of electrode pairs; determining a subset of the first set of electrode pairs that are in contact with a part of the object; receiving electrical signals from each pair of the determined subset; calculating impedance values of respective parts of the object on the basis of the received electrical signals; determining a ratio of the calculated impedance values for each pair of electrode pairs disposed on mutually perpendicular lines from said the determined subset, and, if a first impedance value for one electrode pair included in electrode pairs disposed on the mutually perpendicular lines is greater than a second impedance value for the other electrode pair in the electrode pairs, the ratio of the calculated impedance values is a ratio of the first impedance to the second impedance; selecting two pairs of electrode pairs disposed on the mutually perpendicular lines with the maximum ratio of the calculated impedance values; and if the maximum ratio exceeds a predetermined threshold, identifying the object as a living tissue object, and allow access on the electronic device.. .
Samsung Electronics Co., Ltd.

Smart watch and controlling same

Disclosed are a smart watch comprising a fingerprint sensor for user authentication, and a method for controlling the same. The present invention provides a smart watch and a method for controlling the same, the smart watch comprising: a case; a display unit which is positioned on the case and is configured to display the current time and a variety of information; a bezel which is provided on the case and is configured to surround the display unit; a fingerprint sensor which is provided on the bezel and is configured to simultaneously recognize a plurality of fingerprints which are different from each other; and a control device which is configured to control the operation on the basis of the fingerprints recognized by the fingerprint sensor..
Lg Electronics Inc.

Method and system for preventing unauthorized computer processing

The invention relates to a system and method for preventing a protected computing device from executing unauthorized processor commands. A data entry database of the system stores encoded data entered by a human user as data entry events.

Logical port authentication for virtual machines

A computer system authenticates a logical port for a virtual machine. A logical network maintains logical network data for a logical switch having the logical port.
Nicira, Inc.

Authentication system and method thereof

A haptic-based identification, authentication, authorization, and context aware authorization system usable with a touch-enabled device having a touch screen haptic interface, touch-enabled device receiving a plurality of inputs during interaction with a user which includes a storage space to store a first plurality of inputs corresponding to an authenticated user and a central processing unit (cpu) in communication with the storage space and the touch-enabled device to compare the first plurality of inputs with a second plurality of inputs inputted by the user, wherein the cpu authenticates the user to the touch-enabled device when the inputted second plurality of inputs is determined to be similar to the first plurality of inputs.. .

Systems and methods to determine safe zones and safe routes of a device

Systems and methods to generate safe zones and safe routes associated with a device are disclosed. These safe zones and safe routes can be used to map complicated location behavior into location behavior scores that can be applied systematically to tracking and authentication applications..
Athentek Innovations, Inc.

Wireless authentication device for saddle-type vehicle

A wireless authentication device includes a first operating input device, a locking mechanism, and a controller. The first operating input device receives an operation of a power engine to a startable state by being shifted from a first position to a second position.
Kawasaki Jukogyo Kabushiki Kaisha

Vehicle based electronic authentication and device management

Systems and methods for an authentication system include determining that a first user device is located within a vehicle, where the first user device is associated with a first user. Vehicle authentication information is received from the vehicle.
Paypal, Inc.

System, method and computer readable medium for message authentication to subscribers of an internet service provider

An internet service provider (isp) is configured to provide notification messages such as service updates to subscribers via redirected web pages. In order for the web pages to be treated as originating from the isp, the isp provides a shared secret in the browser message.
Sunglory Beheer B.v.

Method and device for managing wireless access point

The present application aims to provide a method and device for managing a wireless access point (ap), so as to address the problem of the difficulty in identifying the actual owner of the wireless ap when multiple users share the password of the wireless ap. In particular, in the technical solution provided by the present application, wireless ap-related first authentication information of a first user is acquired, and then owner information of a wireless ap can be automatically determined according to ownership related information of the wireless ap and the first authentication information, thereby conveniently and efficiently determining an owner of the wireless ap.
Shanghai Lianshang Network Technology Co., Ltd.

Method for network traffic routing

A method for network traffic routing for a user equipment of a wireless communication system comprises connecting to a small cell of the wireless communication system, transmitting an user identity information to the small cell, receiving an authentication result from the small cell, and obtaining a local service via the small cell and a local network connecting to the small cell without going through a core network connecting to the small cell if the authentication result indicates that the user equipment is qualified for so.. .
Sercomm Corporation

Method of replacing at least one authentication parameter for authenticating a security element and corresponding security element

A method of replacing an authentication parameter for authenticating a security element co-operating with a terminal includes storing in the security element a first authentication parameter; transmitting to a mobile network operator the first authentication parameter for the operator to record it in its authentication system; on occurrence of an event, having a remote platform transmit to the security element an indicator informing the security element that it is authorized to replace the first authentication parameter with a second authentication parameter if its authentication fails; on occurrence of the event, having the entity transmit to the operator a second authentication parameter to replace the first authentication parameter; and in the event of subsequent failure of the security element to connect to the mobile network and if the indicator is present at the security element, replacing the first authentication parameter with the second authentication parameter at the security element.. .
Gemalto Sa

Systems and methods for initial authentication of wireless communication

Systems and methods are provided that may be implemented to use angle of arrival (aoa) of a signal transmitted between two bluetooth low energy (ble) wireless devices to initially authenticate a connection between the two ble devices. In one example, bonding or pairing with a first ble device may be restricted to only those other ble devices having an antenna currently positioned to transmit a signal to the first ble device from an allowed direction and within a predefined permitted range of aoa relative to the first ble device..
Silicon Laboratories Inc.

Processing apparatus, mobile device, and non-transitory computer readable medium storing authentication request program

A processing apparatus includes: a process execution unit that executes a process according to a user instruction; a first communication unit that performs wireless communication with a mobile device moved in a predetermined communication area; a recognition unit that recognizes existence/non-existence of use intention; an authentication processing unit that executes a user authentication process in cases where the first communication unit receives a user id maintained in the mobile device and the recognition unit recognizes that the user who possesses the user id attempts to cause the process execution unit to execute the process; and a process execution permission unit that permits the process execution unit to execute the necessary authentication process in a case where the reception user id is recognized as the user id possessed by the user who has the authority to cause the process execution unit to execute the necessary authentication process.. .
Fuji Xerox Co., Ltd.

Systems and methods for device specific security policy control

A device specific security policy system and method is described. Certain embodiments provide for differentiated levels of authentication, security, monitoring, and/or protection for iot devices using device and/or class specific security policies.
University Of North Texas

Detection system, detection apparatus, detection method, and detection program

A detection apparatus extracts an account and a source address of the account from authentication information obtained from an authentication apparatus configured to perform user authentication, groups accounts for each of time slots at predetermined time intervals and each of source addresses in accordance with a timestamp and the source address of the account, and extracts an account group from which duplication of an identical account in an identical group has been excluded. Subsequently, the detection apparatus calculates the number of duplicate accounts among the extracted account groups.
Nippon Telegraph And Telephone Corporation

Data packet transmission method, apparatus, and system, and node device

Embodiments of the present disclosure disclose a data packet transmission method and apparatus. The data packet transmission method includes: obtaining data type information and data packet identification information of a data packet; calculating the data type information and the data packet identification information by using a preset mac algorithm, to obtain a first message authentication code; and sending the data packet that includes the data type information and the first message authentication code to a node device, so that the node device checks the data type information according to the first message authentication code.
Huawei Technologies Co., Ltd.

Use of personal device for convenient and secure authentication

The present invention relates to a method to authenticate a user using an authenticator at an access device using another registered device named personal device, said authenticator being stored by the access device after registration of the personal device comprising a double encryption using an access device's secret key and a personal device's public key to be retrieved at each request of authentication received from the personal device, encrypted using a session key and sent with the session key encrypted using the personal device's public key to the personal device for partial decryption using the decrypted session key and the personal device's private key, re-encryption using the session key and sending back to the access device for total decryption of the authenticator, using the session key and the access device's secret key, and use of the thus decrypted authenticator to authenticate at the access device.. .
Gemalto Inc.

User friendly two factor authentication

A user friendly two factor authentication method and system for a user is disclosed. In an embodiment the system includes a user device, an authentication server, a network interconnecting the user device and authentication server and software on the user device and authentication server that cooperates to first register the user by storing first key share k1 of an authentication key k on the user device and storing a second key share k2 of k blinded by a user chosen password on the authentication server, and then authenticate the user by implementing a protocol where the user's knowledge of the password and the possession of the user device is used to derive the key k for authentication.

Network authorization in web-based or single sign-on authentication environments

Systems and methods for network authorization are described herein. An example method can include receiving a user credential from a host device connected to a network, authenticating the user credential, and in response to authenticating the user credential, determining an authorization policy associated with the host device.
Cisco Technology, Inc.

Authenticating for an enterprise service

Systems, methods, and software can be used to provide authentication for an enterprise service. In some aspects, an identity server receives an authentication request.
Blackberry Limited

System and biometric protocol standards

Secure communications are provided between a user computing device and a server computing device. An enrollment request is received from a user computing device that is configured via a distributed client software application, and is processed.
Veridium Ip Limited

Companion out-of-band authentication

Methods and apparatuses for user authentication are described. In one example, authenticating a user includes establishing a first wireless communication link between a headset and a first computing device and a second wireless communication link concurrent with the first wireless communication link between the headset and a second computing device.
Plantronics, Inc.

Secure managing the multi-factor authentication data of a user

A system for managing multi-factor authentication of a user includes: one or more source components for obtaining multi-factor authentication data by one or more of: receiving multi-factor authentication data via a network; generating multi-factor authentication data using an algorithm, and a user providing multi-factor authentication data; a routing component for associating the multi-factor authentication codes from the one or more source components with an appropriate user account; a database comprising multi-factor authentication data wherein components of the multi-factor authentication data are stored in association with a particular user account; and one or more delivery components for providing the multi-factor authentication data to a user on a user device.. .

Post-connection client certificate authentication

A network access control (nac) device detects a connection of an endpoint device at a network switch coupled to a network and restricts access of the endpoint device to prevent the endpoint device from accessing resources of the network. The nac device establishes a connection with the endpoint device, validates a client certificate corresponding to the endpoint device to authenticate the endpoint device as a corporate device and grants the endpoint device access to the resources of the network..
Forescout Technologies, Inc.

System and methods for weak authentication data reinforcement

Systems and methods for weak authentication data reinforcement are described. In some embodiments, authentication data is received in a request to authenticate a user.
Ebay Inc.

Approach for accessing third-party content collaboration services on interactive whiteboard appliances using cross-license authentication

An approach for managing collaboration on iwbs allows users of different third-party collaboration services to participate in collaboration meetings on iwbs. The approach allows the users to use collaboration functionality provided by iwbs, such as annotation, and to communicate with each other, even though the users are using different third party collaboration services.
Ricoh Company, Ltd.

Dynamic data protection system

A dynamic data protection system may include a data management server includes a processor and a non-transitory memory device storing instructions that cause the data management server to receive, via a network connection from a user device, a request for access to data stored on an organization's network. The data management server may then communicate user authentication information associated with the received request.
Bank Of America Corporation

Techniques for providing authentication information to external and embedded web browsers

Representative embodiments set forth herein disclose techniques for enabling a client application to supplement its features by utilizing the functionalities provided by a web browser in a secure manner. According to some embodiments, the client application can authenticate with an authentication server to establish a trusted connection between the client application and the authentication server.
Apple Inc.

Dynamic data protection system

A dynamic data protection system may include a data management server includes a processor and a non-transitory memory device storing instructions that cause the data management server to receive, via a network connection from a user device, a request for access to data stored on an organization's network. The data management server may then communicate user authentication information associated with the received request.
Bank Of America Corporation

Challenge response authentication for self encrypting drives

Various embodiments are directed to a system for accessing a self-encrypting drive (sed) based on a blind challenge authentication response mechanism (bcram). An sed may be authenticated within a system, for example, upon resuming from a sleep state, based on a challenge generated within the sed, signed using a private key by a trusted execution environment (tee) and authenticated using a corresponding public key within the sed..
Intel Corporation

Range constrained device configuration

Disclosed in some examples are methods, systems, and machine readable mediums for secure, low end-user effort computing device configuration. In some examples the iot device is configured via a user's computing device over a short range wireless link of a first type.

Hardened voip system

A hardened voip system is presented that includes secure push-to-talk voice functionality. Through the addition of encryption, authentication, user filtering, and integration with new and existing lmr systems, a secure voice platform ensures malicious software, unauthorized access, and brute force security attacks will not compromise the voice communications of the system.
Clever Devices Ltd.

Optimized code table signaling for authentication to a network and information system

In various embodiments, a system comprising a network interface, a processor, and a non-transient memory medium operatively coupled to the processor is disclosed. The memory medium is configured to store a plurality of instructions configured to program the processor to receive a digital bit stream, transform the digital bit stream to an encoded digital bit stream.
Agilepq, Inc.

Synthesized voice authentication engine

A system for creating a synthetic voice identifier may include a plurality of synthesized voice authorization (sva) devices and a biometric combinatory device (bcd). The svas may be communicatively coupled to the bcd via a network and may communicate utilizing a markup language.
Bank Of America Corporation

Synthesized voice authentication engine

A system for creating a synthetic voice identifier may include a plurality of synthesized voice authorization (sva) devices and a biometric combinatory device (bcd). The svas may be communicatively coupled to the bcd via a network and may communicate utilizing a markup language.
Bank Of America Corporation

Gateway-based anti-theft security system and method

Improved systems and techniques are disclosed for controlling the security states of anti-theft security systems such as product display assemblies using security fobs. The tasks relating to fob authentication are offloaded to a computer system, and these authentications can be based on identifiers for the different security fobs.
Mobile Tech, Inc.

Ultraviolet fluorescent authentication

A solution for authenticating an article using a fluorescence signature emitted by the article in response to ultraviolet light is described. The article can include a light activated region that includes particles that can emit fluorescent radiation in response to being radiated with ultraviolet light.
Sensor Electronic Technology, Inc.

Time-limit door access control management system with guest authentication, and method thereof

The present disclosure illustrates a time-limit door access control management system with guest authentication and a method thereof. In the system, guest information is created in a management server through a client.
Inventec Corporation

Composite security marking

The present disclosure relates to the field of anti-counterfeit protection of products. Specifically, the disclosure is directed to a composite security marking for a physical object, in particular to an anti-counterfeit product marking.
Merck Patent Gmbh

Composite security marking

The present invention relates to the field of anti-counterfeit protection of products. Specifically, the invention is directed to a composite security marking for a physical object, in particular to an anti-counterfeit product marking.
Merck Patent Gmbh

Payment facilitation method and system

There is provided a client device, method and system for facilitating a payment from a customer to a merchant. Payment is carried out upon use of voice data for authentication of a user and subsequent transmission of a payment authorization message..
Mastercard Asia/pacific Pte. Ltd.

Method and system for leveraging active authentication for third party communications

A method for supplying payment credentials in a secondary payment opportunity includes: receiving a first data signal from a first computing device superimposed with at least payment credentials associated with a transaction account; electronically transmitting a second data signal to a second computing device superimposed with a payment opportunity request; receiving a third data signal from the second computing device superimposed with at least one payment opportunity; electronically transmitting a fourth data signal superimposed with the at least one payment opportunity; receiving a fifth data signal superimposed with an indication of one of the at least one payment opportunity; and electronically transmitting a sixth data signal to the second computing device superimposed with at least the indicated payment opportunity and the payment credentials.. .
Mastercard International Incorporated

Method, system, and mobile recruitment of on-demand temp workers

An application system comprises a client computing device, a temporary worker computing device, an online system connecting the computing devices, and a mobile recruitment vehicle. The vehicle is configured to facilitate conducting mass face-to-face recruiting of temporary workers, making the temporary workers readily available to clients for on-demand booking.

Smart card including fingerprint detection device and driving method thereof

A smart card including a fingerprint detection device, the smart card including: a central processing unit; a microcontroller unit selectively connected to the central processing unit to perform fingerprint authentication on the basis of a fingerprint sensing signal received from the fingerprint detection device; and an auxiliary chip connected to the central processing unit to be activated if a result of the fingerprint authentication is successful.. .
Crucialtec Co., Ltd.

Light source modulation for iris size adjustment

Use of pupillary response to visible light for iris authentication is disclosed. One example involves (a) capturing an initial image of an eye including an inner circular boundary between a pupil region and an iris region and an outer circular boundary between the iris region and a sclera region, (b) determining a first size measurement indicative of the inner circular boundary, (c) responsive to at least the first size measurement, modulating one or more visible light sources to output visible light toward the eye of the user, (d) capturing a subsequent image of the eye of the user during a period of pupillary response, (e) obtaining an iris data record of the user, and (f) comparing the iris data record of the user to one or more registered iris data records to authenticate the user..
Qualcomm Incorporated

Iris verification method

An iris verification method is provided. According to the iris verification method, it is possible to determine whether the iris to be authenticated is a real human iris during an iris authentication process.
3e Co., Ltd

Biometric authentication apparatus, biometric authentication system and biometric authentication method

A processor obtains characteristics information of a biometric image captured while casting first or second illumination light onto an authentication target. The first illumination light includes light of a first wavelength, and the second illumination light includes light of the first wavelength and light of a second wavelength.
Fujitsu Limited

Low power data generation for iris-related detection and authentication

Sensing of scene-based occurrences is disclosed. In one example, a vision sensor system comprises (1) dedicated computer vision (cv) computation hardware configured to receive sensor data from at least one sensor array and capable of computing cv features using readings from multiple neighboring sensor pixels and (2) a first processing unit communicatively coupled with the dedicated cv computation hardware.
Qualcomm Incorporated

Light irradiation method and light irradiation apparatus

An apparatus is for irradiating light for obtaining a face image of an authentication target. The apparatus includes a first light source unit having a first glancing angle, a second light source unit having a second glancing angle greater than the first glancing angle, and an external light information acquisition unit configured to acquire environment information on an external light other than the first light source unit and the second light source unit for the authentication target.
Suprema Inc.

Biometric identity authentication system

A system for authenticating the identity of a user at a transaction terminal including a fingerprint scanner and a keypad, both operably connected to a microcontroller. The microcontroller is integrated with a transaction terminal and is adapted to allow a user to access the transaction terminal upon authentication of the identity of the user.

User authentication using iris sector

Sector-based iris authentication is disclosed. One example involves (a) capturing an image of an eye of the user, the image including an iris region, (b) identifying a plurality of sectors of the iris region within the image, (c) determining a measure of distinctiveness for each sector of the iris region, (d) selecting one or more sectors from the plurality of sectors of the iris region based on the determined measure of distinctiveness for the each sector of the iris region, the selected one or more sectors being fewer in number than the plurality of sectors of the iris region, and (e) comparing the selected one or more sectors to one or more registered iris data records..
Qualcomm Incorporated

Reader device for reading a marking comprising a physical unclonable function

The present disclosure relates to the field of anti-counterfeit protection of products. Specifically, the disclosure is directed to a method of reading with a reader device a marking comprising a physical unclonable function, puf, and a corresponding reader device.
Merck Patent Gmbh

Reader device for reading a marking comprising a physical unclonable function

The present invention relates to the field of anti-counterfeit protection of products. Specifically, the invention is directed to a method of reading with a reader device a marking comprising a physical unclonable function, puf, and a corresponding reader device.
Merck Patent Gmbh

Hardware-based device authentication

A domain identifier of a first domain of a plurality of domains is identified, the domain identifier included in a domain certificate received from the first domain. A first permanent hardware identifier set as a fuse key value embedded in hardware of the device during fabrication is identified.
Mcafee, Llc

Background enrollment and authentication of a user

An electronic device can include a processing device operatively connected to a biometric sensing device. The biometric sensing device may capture a biometric image each time a user interacts with the electronic device.
Apple Inc.

Biometric authentication of a user

The present invention relates to an electronic device. In particular, the present invention relates to an electronic device comprising a first and a second biometric sensor and processing circuitry arranged to authenticate the user of the electronic device.
Fingerprint Cards Ab

Multimode image and spectral reader

A system associated with authentication of an object related to a multi-mode marker using a processing device. The processing device performs operations that include detecting a signal associated with a multi-mode marker related with the object; assigning a digital code based on the detected signal associated with the multi-mode marker; and identifying the object based on the digital code related to authentication of the object.
Apdn (b.v.i.) Inc.

Portfolio creation system

Provided is a portfolio creation system capable of accumulating activity records, summarizing the accumulated activity records as a portfolio, and preventing pretension of a third party. The portfolio creation system includes an approval storage table (group user table 211) that stores an approval determined by an adviser who determines approval or disapproval of registration of a user, for each user, an authentication unit that prohibits use of the user who is not given the approval and allows use of an approved user who is given the approval, a user table (205) that stores information relating to the approved user, an activity table (206) that stores the activity record which is a record of an activity of the approved user, an activity record display unit that displays the activity record in a selectable form, and a portfolio creation unit that creates the portfolio based on the information relating to the approved user and the selected activity record..
Samadhi Co., Ltd

Integrated services for forms generation and maintenance on cloud

Various embodiments of systems and methods for integrated services for form generation and maintenance on cloud are described herein. The method includes receiving a request for a form-related service from a client.
Sap Se

Non-volatile storage device with physical authentication

A non-volatile memory device uses physical authentication to enable the secure programming of a boot partition, when the boot partition is write protected. This physical authentication can also be used to enable other features/functions..
Western Digital Technologies, Inc.

Liquid containing polymer marker, use of a polymer marker as authentication tool, and for detecting a polymer marker dissolved in a liquid

Iv. Observing the electromagnetic radiation emitted in response to the exciting irradiation of step iii..

Wireless authentication device for saddle-type vehicle

A wireless authentication device for a saddle-type vehicle performs authentication through wireless communication with a mobile terminal carried by a user. The wireless authentication device for a saddle-type vehicle includes a first operating input device, a light-emitting and notification part, and a controller.
Kawasaki Jukogyo Kabushiki Kaisha

Systems for activating and/or authenticating electronic devices for operation with footwear and other uses

Articles of footwear and footwear systems include modules, e.g., for sensing physical and/or physiological characteristics associated with use of the footwear or for performing other functions. Such systems and methods may use physical or other interaction(s) between the module and the article of footwear for activating and/or deactivating the module and/or sensing devices included with the module, for confirming whether the module and footwear are authorized for use with one another, and/or for automatic data algorithm selection methods.
Nike, Inc.

Methods and systems of establishing communication between devices

A representative electronic device comprises an audio/visual device, a wireless device, a processing device, and memory. The audio/visual device transmits either audio or visual signals, or both.
American Megatrends, Inc.

Communication method and related apparatus

A communication method and a related apparatus are disclosed. The method is performed by an mme, including: receiving an attach request message from an enb, where the attach request message is used to request to attach to a network, and the attach request message includes an identity of the ue; sending, to an hss according to the attach request message, an authentication data request message including the identity of the ue; receiving an authentication data response message including an av from the hss, where the authentication data response message is used to indicate that the authorization on the ue succeeds; and determining, according to the authentication data response message, that the ue is allowed to perform a v2x service, and performing authentication on the ue according to the av.
Huawei Technologies Co., Ltd.

System and authentication of a communication device

A system and method for authentication of a communication device is disclosed. A system that incorporates teachings of the present disclosure may include, for example, an authentication system can have a controller element that receives from a communication device by way of a packet-switched network an authentication request comprising a first identification (id) of a virtual gateway and a second id of the communication device.
At&t Intellectual Property I, L.p.

Regulating operation of 60 ghz devices

Embodiments of a wireless station and method for controlling use of the 60 ghz band are described. The station (sta) can include memory and processing circuitry.
Intel Ip Corporation

Communication method, base station and user terminal

A communication method according to an embodiment comprises: generating, by a base station, authentication information to be used for authentication processing between a wlan apparatus and a radio terminal; transmitting, by the base station, a wt addition request to the wlan apparatus on the xw interface, wherein the wt addition request includes the authentication information and a wlan media access control (mac) address of the radio terminal; receiving, by the wlan apparatus, the wt addition request from the base station on the xw interface; transmitting, by the base station, an radio resource control (rrc) message including information for deriving the authentication information, to the radio terminal; receiving, by the radio terminal, the rrc message from the base station; deriving, by the radio terminal, the authentication information based on the information included in the rrc message; and performing, by the radio terminal, the authentication processing by using the authentication information.. .
Kyocera Corporation

Processing terminal access to 3gpp network and apparatus

A processing method for terminal access to a 3gpp network is provided. A ue sends an access request message to a core network device on the 3gpp network, and the core network device sends an unauthorized access message to the ue after determining that the ue has no permission to access the 3gpp network.
Huawei Technologies Co., Ltd.

Access authentication method and apparatus

The present disclosure provides an access authentication method and apparatus, so as to resolve prior art problems of a relatively long authentication time and high signaling overheads. The method includes: determining, by a cellular network access device, a key identifier; and sending, by the cellular network access device, the determined key identifier to ue and a non-cellular network access device, where the key identifier is used to instruct the user equipment ue to perform security authentication with the non-cellular network access device based on a key corresponding to the key identifier..
Huawei Technologies Co., Ltd.

Hearing device system, devices and creating a trusted bond between a hearing device and a user application

Methods and devices are disclosed. A method, performed in a user application, of creating a trusted bond between a hearing device and the user application is disclosed, wherein the method comprises obtaining first authentication material; transmitting a first authentication request comprising a first authentication type identifier and first authentication data to the hearing device; receiving an authentication response comprising an authentication key identifier; storing an authentication key and the authentication key identifier, wherein the authentication key is based on the first authentication material; and connecting the user application to the hearing device using the authentication key and the authentication key identifier..
Gn Hearing A/s

Message protection method, and related device, and system

The present application discloses, among others, a message protection method performed by user equipment (ue). In one method an authentication and key agreement request message sent by an sgsn is received using a gmm/sm protocol layer of the ue.
Huawei Technologies Co., Ltd.

Hearing devices, user accessory devices and updating a hearing device configuration

This disclosure provides a method, performed at a hearing device, for updating a hearing device configuration at the hearing device of a hearing system. The hearing system comprises the hearing device, a fitting device configured to be controlled by a dispenser and a server device.
Gn Hearing A/s

Control of internet browsing in a secure environment

A system and method are disclosed for providing internet access to residents of a controlled-environment facility. There are significant dangers associated with provide such residents with internet access due to their criminal history.
Global Tel*link Corp.

System and automatic wireless network authentication

A system and method are described for connecting an iot device to a wireless router and/or access point. For example, one embodiment of a system comprises: an internet of things (iot) hub to collect network credentials required to connect with a wireless access point or router; the iot hub to securely store the network credentials in a local or remote credentials database along with identification data identifying a user account and/or the wireless access point or router; a new iot device to establish a connection with the iot hub, another iot device, and/or a user data processing device; the new iot device to transmit a request for network credentials to establish a connection with the wireless access point or router; the iot hub, iot device and/or user data processing device to provide connectivity to the credentials database on behalf of the new iot device, to receive the network credentials from the credentials database and to provide the network credentials to the new iot device; and the new iot device to automatically use the network credentials to establish a connection with the wireless access point or router..
Afero, Inc.

Multicomputer processing of an event authentication request with centralized event orchestration

Aspects of the disclosure relate to multicomputer processing of an event authentication request with centralized event orchestration. A computing platform may receive a request to authenticate an event.
Bank Of America Corporation

Distributed storage of authentication data

A biometric server receives, a transmission of a biometric sample and an encrypted enrollment template of the user from a client device, wherein the encrypted enrollment template comprises an encrypted mathematical representation of historical biometric data of the user, and wherein the biometric sample comprises a current snapshot of the biometric data. The biometric server decrypts the encrypted enrollment template to an enrollment template using an enrollment template key.
International Business Machines Corporation

Systems and methods for biometric authentication using existing databases

Systems, methods, and non-transitory computer readable medium use external databases for biometric authentication. A server receives a request for authentication of a user from a requestor.
Mastercard International Incorporated

Systems and methods for decentralized biometric enrollment

Systems, methods, and non-transitory computer readable media decentralizes biometric enrollment. A server receives a request to enroll a user for biometric authentication in association with a unique id, generates an activation code corresponding to the unique id, and sends the activation code to the user.
Mastercard International Incorporated

Integration of password-less authentication systems with legacy identity federation

Authentication techniques are provided that integrate platform-specific authentication and federated identity authentication. An example method for authenticating a user according to these techniques includes authenticating the user of a user device with a relying party and an authentication entity.
Qualcomm Incorporated

Method for providing a personal identification code of a security module

A method for providing a personal identification code of a security module, includes a personal identification code assigned to the security module and a server is provided which a user of the security module can access after an authentication. In the method, triggered by a request from the user at the server, an authentication code is transmitted to a terminal of the user by means of a first message.
Giesecke+devrient Mobile Security Gmbh

System and multi-tenant sso with dynamic attribute retrieval

A system and method for multi-tenant single sign-on (sso) identity management with dynamic attribute retrieval, the system includes at least one service provider, at least one service provider plug-in, and a service automation platform. A method for multi-tenant sso identity management with dynamic attribute retrieval, includes the steps of receiving a link to a service provider at an sso dispatcher, the sso dispatcher identifying a service, requesting at the sso dispatcher, user attributes for the at least one service provider, assembling at a service provider handler implementation, a response query, retrieving identity provider credentials from the service automation platform, signing at the sso dispatcher, a package for a user's authentication, and redirecting the package to the service provider..
Ingram Micro, Inc.

Shared terminal, communication system, and display control method, and recording medium

A shared terminal for displaying an image to be viewed by a plurality of users on a display is provided. The shared terminal includes circuitry to receive an instruction to turn on the shared terminal according to operation of a power switch, and determine whether login authentication and redisplay of a previously-displayed image are individually set.

Location service for user authentication

A method and apparatus for location authentication of the user are disclosed. In the method and apparatus, the location of the user is authenticated if one or more conditions for geographic proximity associated with two or more devices of the user are satisfied.
Amazon Technologies, Inc.

Distributed validation of credentials

Systems, methods, and computer program products for distributed validation of credentials are described. Upon receiving a request to perform an action by a user, a system performs a multi-part authentication where in each part, only a portion of authentication information is passed.
Pivotal Software, Inc.

Network message authentication and verification

The present application relates to an apparatus and method of authenticating and verifying a message frame on a multi-master access bus with message broadcasting. Logic bus identifier, lid, are associated with each one of a several logical groups of nodes out of a plurality of nodes connected to the multi-master access bus.
Nxp B.v.

Confidential authentication and provisioning

Some embodiments provide systems and methods for confidentially and securely provisioning data to an authenticated user device. A user device may register an authentication public key with an authentication server.
Visa International Service Association

System and methods for sharing and trading user data and preferences between computer programs and other entities while preserving user privacy

Systems and methods are provided which allow computer programs or other entities to share user data and information so that users may be authenticated and their preferences shared among entities in networked environments and machines. Cryptographic credentials are generated for these purposes.
Sensoriant, Inc.

Power feeding device, power feeding system, and control power feeding device

A power feeding device coupled to a power receiving device via a usb cable having an authentication chip includes: a communication circuit communicating with the power receiving device; an authentication circuit executing an authentication process with the authentication chip; a power supply circuit supplying power to a power supply line in the usb cable; and a control circuit controlling the power supply circuit based on the authentication process and power supply information of the power feeding device from the communication circuit. When the authentication process between the authentication chip and the authentication circuit succeeds, the control circuit instructs to supply requested voltage and current to the power supply line.
Renesas Electronics Corporation

System and method providing enhanced security ballot image records

The system and method providing enhanced security ballot image records of the present invention includes an enhanced security ballot image tabulator and an enhanced security ballot image audit station. The tabulator processes each ballot of a plurality of ballots to be tabulated to provide an enhanced security ballot image record having diachronically and synchronically coordinated enhanced security ballot image files, each for another ballot of the plurality of ballots to be tabulated.

Intelligent authentication system and electronic key thereof

An intelligent authentication system including an electronic lock and an electronic key is provided. The electronic key includes an electronic paper display apparatus.
E Ink Holdings Inc.

Systems and methods for identity verification

Systems and methods are disclosed for identity authentication using credit card information supplied by a subject with independently determined address information. According to an example implementation, a method is provided that can include receiving, from a client, personally identifying information (pii) related to a subject, where the pii includes at least a subject-supplied name and subject-supplied credit card information.
Lexisnexis Risk Solutions Inc.

Processing electronic payments on a mobile computer device

A device for processing electronic payments for the purchase of goods or services is provided. The device includes one or more computer processors in communication with non-transitory computer readable data storage and a display.
Mastercard International Incorporated

Method and system for transaction authentication

Provided are a computer-implemented method and system for determining the level of authentication required for a transaction, the method comprising operating a processor to: receive a transaction request associated with a payment card; compare geolocation data of the transaction request with geolocation data of a mobile device associated with a cardholder of the payment card; and based on the comparison, determine the level of authentication required for the transaction.. .
Mastercard International Incorporated

Systems and methods for smartcard biometric enrollment

Systems, methods, and non-transitory computer readable media relate to smartcard biometric enrollment. In an embodiment that does not require a user to visit a central location to provide fingerprint images, an activation code corresponding to a unique id that uniquely identifies a user of a service is generated and sent to the user.
Mastercard International Incorporated

Nfc-enabled devices for performing secure contactless transactions and using hce

In a device that is both nfc-enabled and trusted execution environment (tee)-enabled, and has a secure element (se), a host card emulation (hce) based software application acts as a front-end/proxy and processes non-sensitive security functions, while a trusted application in the tee and an applet on the se cooperate to process security-sensitive functions. An end-to-end security relationship may be established between a subscriber identity module (sim), the tee and a sam (secure authentication module) provided for a second nfc-enabled device (e.g.
Orange

Systems and methods for pre-staging atm transactions

Methods and systems for performing a pre-staged transaction, such as a cash withdrawal by a user or a user's surrogate, employ a host server that receives pre-staged atm transaction data via a first communication channel from a user's mobile device and sends a first unique authentication token via a second communication channel to the user's mobile device processor. An atm processor receives entry of a pre-staged atm transaction request and the first unique authentication token and sends the entered pre-staged atm transaction request and first unique authentication token to the host server for validation, which validates the received pre-staged atm transaction input data and the entered first unique authentication token..
Citibank, N.a.

Customized financial processing system using sub-authentication, and method therefor

The present invention relates to a customized financial processing system using sub-authentication and a method therefore, and to a customized financial processing system and a method using sub-authentication, in which authentication information for a recipient is pre-registered, remittance is performed after verifying authenticity of the recipient when requesting remittance, and if an acquaintance of a remitter is additionally registered as a sub-authenticator, the remittance is performed when approval by the acquaintance is granted and at the same time, the recipient authentication is performed, in addition, a grade based on account establishment information and use information of a recipient is assigned in advance, such that authentication is performed through different authentication items for each grade, thereby making complex additional authentication to be performed for an account with a low grade that is probably a fake deposit.. .

System and delivering packages to customers

In some embodiments, system, apparatuses and methods are provided useful for delivering packages. One such configuration may include storage lockers and a control circuit that detects proximity of delivery agents to a locker, and in response, sends a code to an agent that verifies the agent upon receipt of the code therefrom.
Wal-mart Stores, Inc.

System and delivering packages to customers

In some embodiments, system, apparatuses and methods are provided useful for delivering packages. One such configuration may include storage lockers and a control circuit that detects proximity of delivery agents to a locker, and in response, sends a code to an agent that verifies the agent upon receipt of the code therefrom.
Wal-mart Stores, Inc.

System and delivering packages to customers

In some embodiments, system, apparatuses and methods are provided useful for delivering packages. One such configuration may include storage lockers and a control circuit that detects proximity of delivery agents to a locker, and in response, sends a code to an agent that verifies the agent upon receipt of the code therefrom.
Wal-mart Stores, Inc.

System and delivering packages to customers

In some embodiments, system, apparatuses and methods are provided useful for delivering packages. One such configuration may include storage lockers and a control circuit that detects proximity of delivery agents to a locker, and in response, sends a code to an agent that verifies the agent upon receipt of the code therefrom.
Wal-mart Stores, Inc.

Miniaturized electronic systems with wireless power and near-field communication capabilities

The invention provides systems and methods for tissue-mounted electronics and photonics. Devices of some embodiments of the invention implement high performance, and optionally flexible, device components having miniaturized formats in device architectures that minimize adverse physical effects to tissue and/or reduce interfacial stresses when mounted on tissue surfaces.
The Board Of Trustees Of The University Of Illinois

Systems and methods for performing fingerprint based user authentication using imagery captured using mobile devices

Technologies are presented herein in support of a system and method for performing fingerprint recognition. Embodiments of the present invention concern a system and method for capturing a user's biometric features and generating an identifier characterizing the user's biometric features using a mobile device such as a smartphone.
Veridium Ip Limited

System and preventing unfair evaluation of applications by users

Disclosed are systems and methods for blocking access to interface elements of a page of an application in an applications store. The computing device executes executing a restrictive application that restricts use of the computing device.
Ao Kaspersky Lab

System and methods for tamper proof interaction recording and timestamping

A system and method for securely recording voice communications, comprising an authentication server, further comprising at least a software components operating on a network-capable computing device, and a database, wherein an authentication server verifies the validity of voice communications and a database stores voice communication recordings.. .
Newvoicemedia, Ltd.

Authentication management

Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset.
International Business Machines Corporation

Authentication management

Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset.
International Business Machines Corporation

Systems and methods for multifactor authentication

The invention provides an authentication system and method. In particular, the invention provides a method for performing a financial authentication utilizing a token associated with a user, the method comprising the token generating a set of display characters that are viewable by the user, the token generating the display characters using logic; the user transforming a portion of the set of display characters using a transformation process, based on knowledge of the user, so as to form a display character sequence; the user outputting the display character sequence to an authentication entity; and the authentication entity authenticating the display character sequence using the logic and knowledge of the transformation..

Systems and methods for authenticating a biometric device using a trusted coordinating smart device

Systems and methods for authenticating a biometric device using a trusted coordinating smart device in accordance with embodiments of the invention are disclosed. In one embodiment, a process for enrolling a configurable biometric device with a network service includes obtaining a device identifier (id) of the configurable biometric device using a coordinating smart device, communicating the device id from the coordinating smart device to a network service, communicating a first challenge based on a challenge-response authentication protocol from the network service to the coordinating smart device, communicating the first challenge and a response uniform resource locator (url) from the coordinating smart device to the configurable biometric device, generating a first response to the first challenge and communicating the first response to the network service utilizing the response url, receiving a secure channel key by the coordinating smart device from the network service, communicating the secure channel key from the coordinating smart device to the configurable biometric device, performing a biometric enrollment process using the configurable biometric device including capturing biometric information from a user, and creating a secure communication link between the configurable biometric device and the network service using the secure channel key when the first response satisfies the challenge-response authentication protocol..
Fotonation Limited

Operator identification system

The operator identification system is capable of managing the information required for authentication of operators centrally with high operation rate. The operator identification system includes a manufacturing cell including a manufacturing machine and a cell controller that can communicate with the manufacturing machine.
Fanuc Corporation

Login mechanism for operating system

A login mechanism for an operating system, including: a computer device, loaded with a computer operating system; and a mobile device, capable of sending a login password for the computer operating system, and capable of authenticating a human biometric feature. In the login mechanism of the present invention, the login password for the computer operating system is stored on the mobile device.
Gotrust Technology Inc.

Image forming apparatus

An image forming apparatus including a communication circuit configured to establish proximity communication with a biometric authentication apparatus, a display, and a processor configured to perform authentication processing with biological information detected by the biometric authentication apparatus is provided. The processor is configured to carry out control for reducing a quantity of light output from the display and incident on the biometric authentication apparatus during detection of the biological information by the biometric authentication apparatus when the processor receives information representing optical detection of the biological information by the biometric authentication apparatus from the biometric authentication apparatus through the communication circuit..
Konica Minolta, Inc.

User authentication system and user authentication application program

The user (10) uses an information terminal (200) having a user authentication application program according to the present invention installed thereon and also uses a user authentication system according to the present invention via the user authentication application program, so that it is authenticated that the user who has registered, in advance, his/her biological information (700) in at least one of the information terminal (200) and an authentication server (300) is/was present at the authentication location during the authentication reception time. Specifically, the user who has registered, in advance, his/her biological information (700) in at least one of the information terminal (200) and an authentication server (300) inputs the biological information (700) to the information terminal (200) at the authentication location during the authentication reception time, so that it is authenticated the user (10) who has registered the biological information (700) in advance is/was present at the authentication location during the authentication reception time..
Asuha Co., Ltd.

Flexible security level for device interaction

A system and method for accommodating various device and application security levels collects authentication data such as voice and fingerprint in advance of opening an application or process potentially requiring different security than the device itself requires. The device is then able to execute a user's voiced command, request or query without further user actions if the command, request or query is related to an application or process for which the already-gathered authentication data is sufficient..
Motorola Mobility Llc

Systems and methods for runtime authorization within virtual environments using multi-factor authentication systems and virtual machine introspection

Systems and methods for runtime authorization within virtual environments using multi-factor authentication (“mfa”) and virtual machine introspection (“vmi”) are provided. The systems and methods utilize mfa to authorize access to branches of system execution during virtual machine introspection..
Zentific Llc

Order receiving system and printer

An order receiving system includes a server that provides a terminal device owned by a customer with an ordering application, and a printer that prints details of an order entered via the ordering application. The server includes a memory unit that has an area for storing the ordering application, a first receiver that receives entry of the order from the customer via the ordering application, and a first transmitter that transmits to the terminal device an email form addressed to the printer.
Seiko Epson Corporation

Method and system for remotely monitoring intoxication

A method and system for remotely monitoring intoxication of a user, comprising: prompting the user to provide a breath sample at a time point; at a breath sample acquisition device, generating a breath sample signal upon reception of the breath sample from the user, and broadcasting a unique signature proximal in time to the time point; using a sensor of a mobile computing device, generating an authentication signal derived from detection of the unique signature; at a processing system in communication with the mobile computing device and the sample acquisition device, receiving the breath sample signal and the authentication signal; generating a verification assessment that validates provision of the breath sample by the user; determining a value of an intoxication metric for the user based upon the breath sample signal; and transforming the verification assessment and the value of the intoxication metric into an analysis of intoxication of the user.. .
Khn Solutions, Inc.

Method and system for remotely monitoring intoxication

A method and system for remotely monitoring intoxication of a user, comprising: prompting the user to provide a breath sample at a time point; at a breath sample acquisition device, generating a breath sample signal upon reception of the breath sample from the user, and broadcasting a unique signature proximal in time to the time point; using a sensor of a mobile co