Follow us on Twitter
twitter icon@FreshPatents


Authentication patents

      

This page is updated frequently with new Authentication-related patent applications.

Network edge based access network discovery and selection
An edge device comprising access network discovery and selection function (andsf) features is disclosed. An edge device can be a device located at a logical edge of a wireless network.
At&t Intellectual Property I, L.p.


System and secure cell redirection in wireless networks
A mobility management entity (mme) is configured to perform cell redirection or circuit-switched fallback with security protocols. The mme receives an initial connection message from user equipment (ue) in an idle mode with a service request for a voice call.
Alcatel-lucent Usa Inc.


System and session establishment by unauthenticated user equipment
An authentication server establishes a network connection to user equipment (ue) in a non-3gpp compliant access network. The authentication server obtains an identity for the ue and determines that the ue is unauthenticated and requesting establishment through a non-3gpp compliant access network.
Alcatel-lucent Usa Inc.


Method and device for identifying visited and home authentication servers
Authentication problems often occur when a user of a terminal visits a communications network while roaming. A method is therefore provided for authorizing an authenticated user of a communications terminal.
Orange


Mobile device to provide continuous authentication based on contextual awareness
Disclosed is a mobile device to authenticate a user. The mobile device may comprise: a first sensor; a second sensor to use more power than the first sensor; and a processor coupled to the first sensor and the second sensor.
Qualcomm Incorporated


Wearable data device with deactivation security feature
A wearable data device, for being worn by a user to facilitate access to transactions and actions that require authorization by the user. The data device contains a memory unit for storing user authentication credentials for external devices.

Interworking and integration of different radio access networks
The proposed technology generally relates to interworking and integration of different radio access networks, and more specifically to carrier aggregation between different radio access networks such as a cellular radio access network, e.g. A 3gpp network, on one hand and a wlan network such as wi-fi, on the other hand.
Telefonaktiebolaget Lm Ericsson (publ)


Method and system for tracking and authenticating articles
The present invention relates to a method and system for tracking, issuing, and authenticating gear or articles, such as uniforms, badges, equipment, weapons, etc, for use in law enforcement or other official capacity. An authentication system retrieves encoded information read by a reader from a plurality of different markers.
Martex Potosí, S.a. De C.v.


Terminal, retrieving authentication-related information, and program causing terminal to perform process of retrieving authentication-related information
According to one embodiment, there is provided a terminal that includes a memory and a processor. The memory stores authentication-related information indicating that a first cloud completes approval of authentication, which is acquired by a terminal from the first cloud that transmits an instruction to perform a job to a job-performing apparatus of which registration is completed based on an instruction from the terminal, if the registration of the job-performing apparatus is completed.
Toshiba Tec Kabushiki Kaisha


Remote control authority and authentication
The invention relates to systems and methods to enable a mobile device to be used as a remote control, in order to control one or more remotely controllable objects. In possible embodiments of the invention, proximity-based (or other) remote controls include control authorization to enable the transfer or sharing of control between different remote controls being implemented on different mobile devices, in order to permit different users to transfer or share control of a same remotely controllable object, for example.

Mobile device displaying real time sports statistics

A portable electronic device includes a memory and a processor. The processor is configured to display real time sports statistics received from an external entity.

Systems and methods to authenticate users and/or control access made by users on a computer network using identity services

A controller for user authentication and access control, configured to: store data representing a graph having: nodes representing data elements associated with accesses made using an access token; and links among the nodes representing connections between the data elements identified in details of the accesses. In response to receiving details of an access made using the access token, the controller updates the graph according to the details and identifies a new connection in the graph resulting from update.
Idm Global, Inc.

Methods and devices for identifying an authentication server

A method for connecting a terminal of a user to an anchoring gateway connected to a packet-switching network. The method is implemented by an access gateway to which the terminal is connected and includes: transmission of a user authorization request, including an identifier of the user, to a current authentication server; receipt of a user authorization response from the current authentication server, including a unique identifier of an authentication server that authenticated the user; transmission of a connection request to the anchoring gateway, intended to connect the terminal to the packet-switching network, including the unique identifier of the authentication server that had authenticated the user..
Orange

Authentication on thin clients using independent devices

Authentication can be performed on thin clients using independent mobile devices. Because many users have smart phones or other similar mobile devices that include biometric scanners, such mobile devices can be leveraged to perform authentication of users as part of logging in to a thin client desktop.
Wyse Technology L.l.c.

Securing a computing device accessory

Various embodiments are disclosed that relate to security of a computer accessory device. For example, one non-limiting embodiment provides a host computing device configured to conduct an initial portion of a mutual authentication session with an accessory device, and send information regarding the host computing device and the accessory device to a remote pairing service via a computer network.
Microsoft Technology Licensing, Llc

Dtcp certificate authentication over tls protocol

Authenticating devices utilizing transport layer security (tls) protocol to facilitate exchange of authentication information or other data to permit or otherwise enable access to services requiring authentication credentials, certificates, tokens or other information. The authentication may utilize digital transmission content protection (dtcp) certificates, diffie-hellman (dh) parameters or other information available to the authenticating devices, optionally without requiring device requesting authentication to obtain an x.509 certificate..
Cable Television Laboratories, Inc.

Web ticket based upon a symmetric key usable for user authentication

Described herein are various aspects pertaining to generating web tickets for use with authenticating computing devices to a computing system. Symmetric keys are used when generating the web tickets, wherein a symmetric key is valid for use when generating web tickets for a first period of time, and a web ticket generated based upon the symmetric key is valid for use when authenticating a computing device for a second period of time that is longer than the first period of time.
Microsoft Technology Licensing, Llc

System and identity authentication

A system, comprising includes an orchestration server including a processor, the orchestration server to receive authentication factors. A rules engine connects with the orchestration server, the orchestration to send the authentication factors to the rules engine and to request a decision on authentication from the rules engine.
Genesys Telecommunications Laboratories, Inc.

Authentication device and computer-readable recording medium

An authentication device includes a first login module and a second login module. Upon a login request to a first account among predetermined accounts which is accompanied by an entry of authentication information from a user, the first login module compares the entered authentication information with the authentication information associated with each of the predetermined accounts and approves the login request if the entered authentication information matches the authentication information on the first account.
Casio Computer Co., Ltd.

Authentication through multiple pathways based on device capabilities and user requests

There are provided systems and methods for authentication through multiple pathways depending on device capabilities and user requests. A user may wish to utilize some device process, such as unlocking and accessing the device to utilize the device's operating system or access and use of a device application or other module (e.g., a camera).
Paypal, Inc.

Communication apparatus, communication method, and communication program product

A communication apparatus includes a counter, a reception portion, an update portion, a code generation portion, a determination portion, and a transmission portion. The reception portion receives a communication data from a different one of the communication apparatus.
Denso Corporation

Techniques for securely communicating a data packet via at least one relay user equipment

Techniques are described for wireless communication. A method of wireless communication at a transmitting wireless device includes generating a first message authentication code (mac) for a data packet based at least in part on a first security key used to communicate with a receiving wireless device; generating a second mac for the data packet based at least in part on a second security key used to communicate with a relay user equipment (ue), in which the relay ue is included in a data routing path between the transmitting wireless device and the receiving wireless device; and transmitting the data packet to the relay ue with at least the first mac and the second mac..
Qualcomm Incorporated

Virtualized host id key sharing

In virtualized environments a method of determining authorization to a resource cannot use a hardware specific identifier, such as a mac address. As a result upgrading a virtual host may cause licenses associated with that host to be invalid, even though the upgraded virtual host should be authorized.
Extreme Network, Inc.

Method for communication between devices and devices thereof

Disclosed is a method of performing, by a first device, short-range wireless communication with a second device, the method including receiving, from the second device, second authentication information encrypted using first authentication information of the first device, decrypting the encrypted second authentication information by using the first authentication information, determining a secret key based on the decrypted second authentication information, and performing communication between the first device and the second device by using the determined secret key.. .
Samsung Electronics Co., Ltd.

Communication of messages over networks

A method is provided for communicating messages between sender and receiver computers, connectable via a network to a system of servers, based on authentication of receiver passwords, associated with respective receiver ids, by the system. A method is also provided for receiving a message from a sender based on authentication of a receiver password, associated with a receiver id, by a system of servers, in a network, wherein each server stores for the id a ciphertext produced by encrypting the receiver password under a public key via a homomorphic threshold encryption scheme having a threshold, and a key-share of a secret key corresponding to that public key, and stores an encrypted message from the sender encrypted under the public key.
International Business Machines Corporation

Method and authentication and identity management of communicating devices

Aspects of the subject disclosure may include, for example, a network device that accesses internet protocol addresses associated with a group of end point devices where the network device is a closest network device to the group of end point devices, and transmitting data to another network device responsive to a determination that an internet protocol address associated with the data from an end point device is one of the internet protocol addresses associated with the group of end point devices. Other embodiments are disclosed..
At&t Intellectual Property I, L.p.

System and providing network support services and premises gateway support infrastructure

A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely manages delivery of application services, which can be voice controlled, by a gateway, e.g.
Kip Prod P1 Lp

Secure device registration for multi-factor authentication

Provided is a process including: receiving a request from a first computing device to register another computing device; sending to the first computing device a registration code; receiving the registration code from a second computing device; sending an instruction to the designated application to send a value indicative of access to a cryptographic key; receiving from the designated application the value indicative of access to the cryptographic key; determining, based on the received value, that the received registration code was sent by the designated application and not another untrusted application.. .
Ca, Inc.

Multi-use long string anti-tampering authentication system

This disclosure describes systems and methods for implementing techniques that use multi-use long string authentication keys to protect the transfer of data resources from a sending device to a recipient device. More specifically, an anti-tampering authentication application is described that may reside on client devices that send and receive data resources.
Atf Cyber, Inc.

Authenticator, authenticatee and authentication method

According to one embodiment, an authenticator which authenticates an authenticatee, which stores first key information (nkey) that is hidden, includes a memory configured to store second key information (hkey) which is hidden, a random number generation module configured to generate random number information, and a data generation module configured to generate a session key (skey) by using the second key information (hkey) and the random number information. The authenticator is configured such that the second key information (hkey) is generated from the first key information (nkey) but the first key information (nkey) is not generated from the second key information (hkey)..
Toshiba Memory Corporation

Wireless charging apparatus and method

A wireless charging method and apparatus are provided. Identification information is transmitted, through a near field communication antenna, to a wireless power transmitter for an authentication process of the electronic device, if the electronic device is put on the wireless power transmitter for wireless charging and a near field communication controller is in an initial or idle state.
Samsung Electronics Co., Ltd.

Multiclass logical document recycler management

A document handling apparatus for recycling documents includes an authentication unit, a first recycling storage unit, a document cassette, and a controller. The authentication unit is for receiving an input document and classifying the input document as having a class that is one of a plurality of classes.
Crane Payment Innovations, Inc.

Electronic access control system

A system includes one or more memory devices storing instructions, and one or more processors configured to execute the instructions to perform steps of a method. The system may receive an authentication request from a computing device and determine whether the authentication request corresponds with stored authentication data.
Capital One Services, Llc

Secure delivery via unmanned vehicles

Systems and methods are provided for on-demand delivery of a payload by an unmanned vehicle. An unmanned vehicle may comprise a chamber configured to house a payload and adjust a payload state.
Capital One Services, Llc

Systems and methods for database management of transaction information and data for verification of transaction information

A system for storing data related to a transaction and for facilitating the transaction, the system comprises a database; an application server coupled with the database and configured to store information associated with a plurality of transactions, the information including a transaction identifier, a notary identifier, and a buyer identifier, the application server further configured to receive geographical location data related to a buyer associated with the transaction, generate and send a notification to a device associated with the notary identifier to cause a notary agent identified, by the application server, based on the notary identifier to be dispatched to the geographical location of the buyer, and receive authentication credentials from the notary device based on the transaction identifier and buyer identifier.. .

Method and facilitating performing payment option aggregation utilizing an automated authentication engine

A method, apparatus and computer program products are provided for performing payment option aggregation. One example method includes receiving, for example, from an e-commerce platform, a request to complete a transaction, the request comprising identifying information, authenticating a user utilizing the identifying information, accessing one or more payment entities using the authenticated user identifying information to identify payment options, each payment option having an associated payment method, providing, for display, a descriptor associated with each of a portion of the identified payment options, and receiving an indication of a selection of at least one payment option..
Averon Us, Inc.

Financial transaction relay system having multi-safety lock function of processing user authentication by scanning both finger pulse and fingerprint, and processing method therefore

A financial transaction relay system includes a financial transaction relay server for relaying, through an authentication-free access, a financial transaction to be performed among a customer terminal, an electronic financial transaction system, and electronic commerce systems. The financial transaction relay server includes: a multi-safety lock module for processing authentication of a user who uses finger pulse authentication, fingerprint authentication, password authentication, and telephone number authentication of the customer terminal; and a middleware firewall..
All It Top Co., Ltd.

Consortium blockchain network with verified blockchain and consensus protocols

The disclosed technology is generally directed to blockchain and other authentication technology. In one example of the technology, a pre-determined type of blockchain or other authentication protocol code and a pre-determined type of consensus code are stored in a trusted execution environment (tee) of a processor.
Microsoft Technology Licensing, Llc

Biometric authentication of mobile financial transactions by trusted service managers

In one embodiment, a method comprises storing a biometric trait of a user in a data communication device of the user, comparing a biometric trait input into the device with the biometric trait stored in the device, generating a certificate authenticating the user within the device if the biometric trait input into the device matches the biometric trait stored in the device, and facilitating a financial transaction of the user using the certificate.. .
Paypal, Inc.

Terminal for conducting electronic transactions

The present disclosure is drawn to, among other things, a method of providing a payment terminal application on an electronic device, the electronic device comprising a volatile storage module, a user input module and a network interface module. In some aspects the method includes receiving user credentials from the user input module, transmitting an authentication request message to a remote data center via the network interface module, the authentication request message including the user credentials, receiving an authentication response message from the remote data center, the authentication response message including an indication as to whether authentication was successful, and if the authentication was successful, receiving at least one encryption key from the remote data center; and storing the at least one encryption key in the volatile storage module..
Worldpay Limited

Method for authenticating a finger of a user of an electronic device

The present invention generally relates to a method for authenticating a finger of a user of an electronic device comprising a fingerprint sensor for sensing a fingerprint pattern, the method comprising the steps of: acquiring a candidate fingerprint image; determining, based on the candidate fingerprint image, a humidity level indication indicative of the humidity level of the finger; performing an authentication pre-process based on the humidity level indication; performing a fingerprint authentication process based on the pre-process to authenticate the user.. .
Fingerprint Cards Ab

Source authentication of a software product

Embodiments of the present invention provide systems and methods for authenticating the source code of a software end product. The method includes generating a compound key, which is composed of a set of unique keys generated from a source file.
International Business Machines Corporation

Method and protecting digital content using device authentication

A user device may strengthen the protection level of a digital content by dividing the security and normal modes and performing an operation. In order to further strengthen the protection level of the digital content, the user device may determine whether the main operating system is hacked or not, and blocks the operation in the secure mode.
Samsung Electronics Co., Ltd.

Enhancing security of a mobile device based on location or proximity to another device

A mobile device detects its location and other devices in proximity to the mobile device. When the device is in an untrusted location, or is in physical proximity to an untrusted device, the mobile device ensures existing security and authentication mechanisms are in place, and may additionally require enhanced security measures on the device.
International Business Machines Corporation

Enhancing security of a mobile device based on location or proximity to another device

A mobile device detects its location and other devices in proximity to the mobile device. When the device is in an untrusted location, or is in physical proximity to an untrusted device, the mobile device ensures existing security and authentication mechanisms are in place, and may additionally require enhanced security measures on the device.
International Business Machines Corporation

Automated password authentication

A system connected to an existing computer includes a unit for monitoring the screen and provides input, a storage unit that stores data that pairs screen buffer regions with authentication details, wherein the system learns new pairs via user training and presents stored authentication details when the screen buffer regions match a related stored region which is paired with a region of the screen, and a unit that determines which of stored passwords need to be presented to the system by a pattern matching of regions of screen pixels.. .
International Business Machines Corporation

Systems and methods for authenticating a user based on a computing device

A system and/or method may be provided to silently authenticate a user. An example method of silently authenticating a user includes receiving a set of device characteristics from a user device and identifying, based on the set of device characteristics, the user device.
Paypal, Inc.

Computer keyboard with secure authentication features

A keyboard is disclosed. The keyboard may comprise a biometric sensor configured for authenticating a user; a docking station configured for receiving a security device; and a processor configured for facilitating communication between the biometric sensor and the security device docked in the docking station with a computing device coupled to the keyboard..
Bloomberg Finance L.p.

Allowing access to applications based on user handling measurements

Authenticating users comprises a computing device that receives a manual authentication input of a user and initiates a first user session between the user and the user computing device. The device communicates a request for a first user authorization data from an authentication technology associated with the one or more computing devices and receives the first user authentication data.
Google Llc

Biometric authentication apparatus, biometric authentication method, and non-transitory computer-readable storage medium for storing program for biometric authentication

A biometric authentication apparatus includes: a biometric sensor configured to capture an image of a hand of a user; a touch panel configured to output a contact signal indicating contact positions of fingers of the user in response to the reception of an operation by the fingers of the user; and control circuitry configured to display, on the touch panel, a plurality of marks each of which indicates position at which any of the fingers of the user is intended to come into contact with the touch panel, acquire the contact signal output from the touch panel, and reduce in size one or more marks among the plurality of marks during acquiring biometric information from the image captured by the biometric sensor when the control circuitry detects, in accordance with the contact signal, that the fingers of the user are in contact with the plurality of marks.. .
Fujitsu Limited

Electronic device for authenticating biometric data and system

The present disclosure provides an electronic device and system that include an electrode interface that can be brought in contact with the body of a user, a memory, and a processor operably coupled to the electrode interface and the memory, in which the processor is set to obtain user information through user authentication, generate a user authentication signal on the basis of the user information, and transmit the user authentication signal or a signal including at least a portion of the user authentication signal through the body of a user being in contact with the electrode interface.. .
Samsung Electronics Co., Ltd

Wearable electronic devices

Wearable electronic device technology is disclosed. In an example, a wearable electronic device can include a handling portion that facilitates donning the wearable electronic device on a user.
Intel Corporation

Multi-factor user authentication framework using asymmetric key

A multi-factor user authentication framework using asymmetric key includes a host device, a user agent, a gesture system, and an authentication system. The multiple factors include a user credential as well as a user gesture that indicates that the user is present.
Microsoft Technology Licensing, Llc

User authentication

A method, computer system, and computer program product for authenticating a user is provided. The method includes the steps of receiving a user input via a pressure-sensitive input interface, the user input being indicative of a possible component part of an authentication code or pattern, determining a pressure applied to the pressure-sensitive input interface by the user when providing the user input, determining whether to ignore the user input as a component part of the authentication code or pattern based on the pressure applied and irrespective of the whether the user input is determined to be ignored, providing an input acknowledgement signal to an output interface for indicating the user input was received.
International Business Machines Corporation

Authentication of quantum dot security inks

A method is provided for verifying the authenticity of an article which bears a security mark. The method includes irradiating the security mark with a time-varying light source, ascertaining at least one portion of the emissions spectrum of the irradiated security mark with at least one photodetector, determining the photoluminescence lifetime of the security mark by monitoring the time or frequency response of the photodetector, and verifying the authenticity of the article only if the security mark exhibits a photoluminescence which has a lifetime that falls within the range of appropriate values for each portion of the photoluminescence spectrum for which the photoluminescence lifetime of said security mark was ascertained..
Ubiqd, Inc.

Method and syncing an embedded system with plurality of devices

An approach is provided for synchronizing a function among an embedded system and/or one or more devices. The approach involves causing, at least in part, an authentication of at least one user at an embedded system.
Here Global B.v.

Vehicle control system

Provided is a vehicle control system that performs detection and authentication of an electronic key being present in a detection range on a periphery of a vehicle, on the basis of polling performed by an on-vehicle apparatus. Any one of the on-vehicle apparatus and a first electronic key includes: a determination section configured to determine whether or not communication, between the on-vehicle apparatus and the first electronic key, in which the first electronic key returns a signal in response to a signal transmitted from the on-vehicle apparatus is continuously performed for not less than a predetermined time period; and a first processing section configured to restrict a response, by the first electronic key, to a first polling signal transmitted from the on-vehicle apparatus, when the determination section has determined that the communication is continuously performed for not less than the predetermined time period..
Toyota Jidosha Kabushiki Kaisha

Method and device for applying identification features to a packing strip in order to authenticate the process packing, processed packing and packing

In the method for applying identification features to a packing strip in order to authenticate the processed packing, the packing strip is fed in a packing line to an embossing station, where logos of all kinds and/or codes and/or a satin finish and/or fold lines are embossed at the cycle rate of the packing machine by means of embossing rollers by deforming the packing strip, identification: features and possibly other features are produced additionally on the packing strip on-line, in the same process step, and synchronously to the cycle rate by material removal by means of a feature setup comprising a laser installation, the packing strip having a thickness of 50 μm to 300 μm. The thus treated packing strip is subsequently further processed.
Boegli-gravures Sa

Mobile communication system and pre-authentication filters

A method and system is disclosed for providing applications and devices in a mobile part access to communications between the mobile part and a fixed part and such that prior to completion of authentication of the mobile part with the fixed part certain types of communications between the mobile part and the fixed part are supported by a service connection not requiring completion of authentication. The types of communications able to use the service connection are provided to the mobile part in the form of a pre-authentication filter..
Radio Ip Software Inc.

Methods and systems for connecting a wireless communications device to a deployable wireless communications network

Methods and systems for connecting a wireless communications device to a deployable wireless communications network. The method includes receiving, from the wireless communications device via a mobile management entity (mme) configured to operate as an extensible authentication protocol (eap) authenticator, an extensible authentication protocol packet.
Motorola Solutions, Inc.

User-defined coverage of media-player devices on online social networks

In one embodiment, a method includes detecting, by a media-player device including multiple antennas, a client system of a user is within a wireless communication range of the media-player device. In response to the detection, the media-player device broadcasts an authentication key for the user of the client system.
Facebook, Inc.

Mobile wireless device managed access system providing enhanced authentication features and related methods

A managed access system is for mobile wireless devices (mwds) in a facility, with the facility being geographically within a wireless communications network of a communications carrier. The system may include antennas arranged at the facility, radio equipment coupled to the antennas, a network interface device configured to provide communications with the communications carrier, and a management access controller.
Harris Corporation

Frictionless authentication over wifi

A system described herein may allow for the frictionless authentication of a user and/or user device (e.g., without requiring that the user provide login details, such as a user name and password). The frictionless authentication may occur via a licensed wireless network, even when the user device is actively engaged in communications with an unlicensed wireless network (and/or is not engaged in communications with the licensed wireless network)..
Verizon Patent And Licensing Inc.

Systems and methods for enhanced mobile data roaming and connectivity

System and methods are provided for provisioning mobile data services in mobile network systems. By taking advantage of a bifurcated authentication process, the systems and methods described herein provide data services to mobile devices without requiring a secure element such as a sim card.
Celitech Inc.

System that performs login using authentication based on face image included in login system

A system includes an electronic device and a login system. The electronic device ensures a login in response to login information for a login received from outside of the system.
Kyocera Document Solutions Inc.

Image forming private output using mobile terminal

An image forming method includes: receiving a print job and a print job ticket by at least one image forming apparatus; waiting for an access from a mobile terminal having user id data using a wireless communication; authenticating for accessing the print job ticket using the user id data by the image forming apparatus determined to be closest to the mobile terminal; transferring the print job ticket to the closest image forming apparatus in response to the access from the mobile terminal to the closest image forming apparatus; acquiring a facial image of a user in front of the closest image forming apparatus in response to the authentication; recognizing a face of an owner of the print job ticket in the acquired facial image to cause the closest image forming apparatus to print the image data; and printing the image data while the facial image is being recognized.. .
Kyocera Document Solutions Inc.

Image forming private output using mobile terminal

An image forming method includes: sending a print job and a print job ticket including user id data from a terminal to an image forming apparatus and sending the print job ticket to a mobile terminal; receiving the print job ticket by the image forming apparatus; waiting for an access from a mobile terminal having the user id data using a wireless communication in a specified range from the image forming apparatus; authenticating for accessing the print job ticket in the image forming apparatus using the user id data; acquiring a facial image of a user in front of the image forming apparatus in response to the authentication; recognizing a face of an owner of the print job ticket in the acquired facial image to cause the image forming apparatus to print the image data; and printing the image data while the facial image is being recognized.. .
Kyocera Document Solutions Inc.

Methods and premises content distribution

Apparatus and methods for transfer and management of protected content in a network. In one embodiment, the apparatus comprises server and renderer devices including, for example, consumer premise equipment (cpe) having a content handler application adapted to run thereon.
Time Warner Cable Enterprises Llc

Individualized cybersecurity risk detection using multiple attributes

A method for assessing and responding to potential cybersecurity risks includes: obtaining, by a computing device, a plurality of attributes relating to an authentication event; determining, by the computing device, based on a cybersecurity risk assessment model, whether the plurality of attributes relating to the authentication event indicate a potential cybersecurity risk, wherein the cybersecurity risk assessment model is individualized on a per-user or per-device basis; and causing, by the computing device, in response to determining that the determined plurality of attributes relating to the authentication event indicate a potential cybersecurity risk, a heightened security measure to be implemented.. .
Aetna Inc.

Communication system, count value synchronization method, and count value synchronization program product

A communication system includes multiple nodes connected with each other. Each of the multiple nodes generates a message authentication code using a count value of a counter.
Denso Corporation

Invocation path security in distributed systems

Systems, methods, and computer program products for an application to securely record and propagate an invocation context for invoking other applications are described. The applications being invoked not only receive a user's authentication token, but also authentication tokens of an entire invocation chain.
Pivotal Software, Inc.

Actively federated mobile authentication

To make a trusted web service call, a client application sends a series of messages to obtain tokens that allow service requests to pass through a service relay. The user obtains a first security token by providing the user's credentials.
Microsoft Technology Licensing, Llc

Single authentication to a multi-tenancy single-page cloud application

A system and method for single authentication to a multi-tenancy single-page application hosted in a plurality of different datacenters. The method comprises: receiving, from a client device, a login request to access the single-page application; receiving an access token in response to an authentication of a user of the client device, wherein the access token designates at least tenant identification data; determining a datacenter of the plurality of different datacenters executing an instance of the single-page application supporting a tenant of the authenticated user; retrieving, from the determined datacenter, a single web page of the single-page application, wherein the retrieved signal web page includes at least references to resources pointing to a location of the determined datacenter; and serving the web single page to the client device..
Microsoft Technology Licensing, Llc.

Authentication apparatus and authentication program

An authentication apparatus in a multifunction peripheral is configured to display, in a screen, an account field and a password field so as to allow an input, inhibit an input in the account field before an input is made in the password field, mask a letter inputted in the password field, and restrict a letter string including a same letter that has been inputted in the password field, from being inputted in the account field.. .
Seiko Epson Corporation

Method and system for authentication

An authentication system performing user-centered authentication may include: an authentication service component acting as an authentication procedure of an online service server; and a mobile authentication agent component acting as the authentication procedure of an access terminal which accesses the online service server. Herein, the authentication service component may confirm a mobile authentication agent component corresponding to user information input from the access terminal as basic authentication information, transmit an authentication password value to each of the confirmed mobile authentication agent component and the online service server which the access terminal intends to access, and transmit an authentication success message to the online service server when a password verification value or an authentication agreement value corresponding to the authentication password value is received from the mobile authentication agent component..
Estorm Co., Ltd

Connection system and connection method

A connection server is a connection system that is able to perform communication with a plurality of user side terminals and establishes a connection between the user side terminals, and includes a passcode generator that generates and transmits a passcode to the user side terminal, a passcode storage unit that stores a passcode in association with the user side terminal, a passcode receiving unit that receives a transmission passcode from the user side terminal, a passcode authentication unit that determines whether there is a stored combination of passcodes that matches a combination of a generated passcode and a received transmission passcode, and a connection unit that establishes a connection between the user side terminals in response to the determination.. .
Heart Forever Co., Ltd.

Messaging application hosting for message capture

Provided are methods, systems, and computer-program products for hosting a messaging application remote from a user to facilitate tracking messages sent to or received by a messaging application linked to the hosted messaging application. In some embodiments, hosting the messaging application remote from the user may require that a remote system obtain one or more authentication credentials so that the remote system may authenticate the hosted messaging application with a messaging application system.
Actiance, Inc.

Integrating sensitive data from a data provider into instances of third-party applications executed on user devices

Certain aspects involve facilitating the integration of sensitive data from a data provider into an instance of a web-based, third-party application. For example, a data provider service can receive an authentication api call from a third-party system.
Equifax, Inc.

Control method

A control method includes receiving, from a user through a screen displayed on a display unit by using a first program, an execution instruction to execute authentication processing for authenticating communication by a first wireless communication unit between a communication apparatus and an information processing apparatus, in a case where the execution instruction is received, displaying on the display unit by using a second program a setting screen for receiving from a user an input for selecting a target communication apparatus for the authentication processing from a plurality of communication apparatuses, and displaying on the display unit a notification region for notifying a user of information regarding an operation to be executed on the setting screen displayed on the display unit.. .
Canon Kabushiki Kaisha

Validating documents via blockchain

Authentication of electronic document is based on multiple digital signatures incorporated into a blockchain. Structured data, metadata, and instructions may be hashed to generate the multiple digital signatures for distribution via the blockchain.
Factom

Electronically signing and distributing identification data as a service that provides proof of identity, integrity, validity and origin of data for non-repudiation and id validation methods

The present solution is directed to methods and systems for storing personal identifiable information. In some implementations, the information is collected during the authentication of identification (id) documents.
Confirm, Inc.

Security management system for performing a secure transmission of data from a token to a service provider server by means of an identity provider server

The present invention relates to a security management system for performing a secure transmission of data from a token to a service provider server by means of an identity provider server, wherein said security management system comprises: —said identity provider server which is adapted to: —open with said token a secure messaging channel by means of a general authentication procedure using at least one certificate; —receive via said secure messaging channel from said token enciphered data; —transmit to said service provider server said enciphered data; —said service provider server which is adapted to: —receive from said identity provider server enciphered data of said token; —decipher said enciphered data to extract said data; —said token which is adapted to: —encipher data; and —transmit via said secure messaging channel to said identity provider server said enciphered data.. .
Gemalto Sa

An aircraft controlled by a secure integrated airspace management system

An aircraft, such as a drone, includes (i) an authentication module, such as a 3g sim card, and (ii) a communications module, such as a 3g module. The authentication module (a) stores an identity uniquely associated with or identifying a specific pilot or operator (“pilot id”) and (b) sends that pilot id, or data related to the pilot id, to the communications module.
Relmatech Limited

Entry control system

An integrated security system which seamlessly assimilates with current generation logical security systems. The integrated security system incorporates a security controller having standard network interface capabilities including ieee 802.x and takes advantage of the convenience and security offered by smart cards and related devices for both physical and logical security purposes.
Assa Abloy Ab

Image analysis for user authentication

A user can be authenticated to any of a number of computing devices using an authentication process that recognizes the user and verifies that an actual human being is attempting to be authenticated, in order to minimize the ability of another person to spoof the authentication process. A model of a user can be generated and stored in the cloud, enabling that model to be synchronized across various devices.
Amazon Technologies, Inc.

Trusted service manager (tsm) architectures and methods

A client device comprises a first secure element and a second secure element. The first secure element comprises a first computer-readable medium having a payment application comprising instructions for causing the client device to initiate a financial transaction.
Paypal, Inc.

Contacts for misdirected payments and user authentication

Disclosed herein are systems and methods for processing a payment request that use mobile devices to have money transferred. These mobile devices are capable of running a payment transfer application that facilitates a transfer of money.
Square, Inc.

Ad-hoc parcel delivery drop zone and hotspot

Aspects of the present invention provide an approach for delivering an item to a target recipient. A mobile guardian device at a first location comprises a wireless communication system.
International Business Machines Corporation

Electronic device, information processing method, and program

Provided is an electronic device including: a determination unit configured to determine, on a basis of information regarding an environment for acquiring biological information for use in biometric authentication regarding an eye, a method of realizing an environment for acquiring biological information suitable for the biometric authentication; and a control unit configured to perform control corresponding to the method. .
Sony Corporation

Operator system for a process control system

An operator system for a process control system, wherein the operator system includes an operator server and at least one operator client connected to the operator server, where operators authenticate with respective login data via the at least one operator client or via a plurality of operator clients of the operator system on an authentication server and the authentication server generates, for each of the authenticated operators one operator-specific data record, in which an access or functional right to at least one operator server application is stored such that during the operating and monitoring of a process to be controlled, access or functional rights can be temporarily transferred from one of the operators to the other operator in a secure manner with respect to the security aspects, without which end changes would need to be made in an access and functional rights list via an engineering system.. .
Siemens Aktiengesellschaft

Facial recognition authentication system including path parameters

Systems and methods for enrolling and authenticating a user in an authentication system via a user's camera of camera equipped mobile device include capturing and storing enrollment biometric information from at least one first image of the user taken via the camera of the mobile device, capturing authentication biometric information from at least one second image of the user, capturing, during imaging of the at least one second image, path parameters via at least one movement detecting sensor indicating an authentication movement of the mobile device, comparing the authentication biometric information to the stored enrollment biometric information, and comparing the authentication movement of the mobile device to an expected movement of the mobile device to determine whether the authentication movement sufficiently corresponds to the expected movement.. .
Facetec, Inc.

Card reader and card issuing device

A card reader may include a card-inserting opening at which the card is inserted; a biometric authentication sensor arranged proximate to the card-inserting opening and structured to acquire user biometric authentication data from a user; a contact structured to read the card biometric authentication data recorded on the card; a memory structured to store the user biometric authentication data acquired by the biometric authentication sensor; and a processor configured to compare the user biometric authentication data acquired by the sensor, which is stored in the storage unit, against the card biometric authentication data recorded on the card.. .
Nidec Sankyo Corporation

User authentication method and system using variable keypad and biometric identification

The present invention relates to a user authentication server which mixedly uses both a password and biometric information. The user authentication server comprise: a variable keypad generation unit for generating a variable keypad including encryption keys and a biometric authentication key, wherein the position of each encryption key and the position of the biometric authentication key are changed in each generation of the keypad; an authentication information storage unit for storing authentication information of portable terminal users; and an authentication unit for authenticating a user by remotely providing information of generated variable keypad to a portable terminal, and comparing biometric information and information of the positions of the encryption keys in accordance with the order of input by the user, received from the portable terminal, with the authentication information stored in the authentication information storage unit..
Harexinfotech Inc.

Electronic device and performing authentication

Disclosed is an electronic device and a method for processing authentication. The electronic device includes a communication circuit; a display; a memory; and at least one processor electrically connected to the communication circuit, the display, and the memory, wherein the memory stores instructions that cause the at least one processor to identify whether the electronic device is mounted on a first external electronic device, execute at least one application for an authentication based at least part of the identification, detect a second external electronic device, which can transmit authentication information related to the authentication, receive at least one piece of information related to the authentication from the second external electronic device based at least partially on the detection outcome, and perform authentication based on the received authentication information..
Samsung Electronics Co., Ltd.

Method and secure multi-cycle vehicle software updates

A system includes a processor controlling a vehicle module (vm) in communication with a telematics control unit (tcu) over a bus. In this embodiment, the processor is configured to receive an authentication request, including a counter value, from the tcu.
Ford Global Technologies, Llc

Charging control apparatus and control method therefor

The present invention relates to a charging control apparatus and a control method therefor. A charging control apparatus according to an embodiment of the present invention comprises: a communication unit which performs wireless communication with at least one communication device including a vehicle; a charging connector electrically connected to a charging inlet provided in the vehicle; a locking unit which is disposed in the charging connector, so as to perform or release locking between the charging connector and the charging inlet; a control unit which checks whether the id of the vehicle, received by the communication unit, is included in a pre-stored authentication information list, in response to an electrical connection between the charging connector and the charging inlet, and when the id of the vehicle is included in the pre-stored authentication information list, determines whether to release the locking between the charging connector and the charging inlet, depending on the location of a previously authenticated portable device, and controls the locking unit according to the determination..
Lg Electronics Inc.

Mitsubishi Electric Corporation

. .

. .

Apparatus and providing and managing security information in communication system

The present disclosure relates to a sensor network, machine type communication (mtc), machine-to-machine (m2m) communication, and technology for internet of things (iot). An apparatus and method are provided for providing and managing security information in a communication system.
Samsung Electronics Co., Ltd.

Sip control apparatus, mobile communication system and communication control method

A sip control apparatus is provided. The sip control apparatus is connected to a management apparatus controlling call processing policy in an ip network, and controls a voice call made by a user apparatus.
Ntt Docomo, Inc.

Method and interconnection between terminal device and gateway device

The present application discloses a method for interconnection between a terminal device and a gateway device. When the terminal device detects that the terminal device and the gateway device meet a first connection condition and that it is the first time the terminal device is to be connected to the gateway device, acquiring, from the gateway device, a first common ssid preset in the gateway device; and when authentication performed by the terminal device on the acquired first common ssid succeeds, sending a second common ssid preset in the terminal device to the gateway device, so that when authentication performed by the gateway device on the second common ssid succeeds, a common ssid-based connection is established between the terminal device and the gateway device.
Huawei Device Co., Ltd.

Method for requesting emergency service by roaming ue and processing same

An embodiment of the present description provides, in a situation in which, when a user equipment (ue) is roaming in a visited network, i.e. V-plmn, the roaming is processed by means of a home routed (hr) mode and is successfully registered to h-plmn ims and a service is received, a method for performing authentication/registration of a ue, which is to receive an emergency service, if ims-nni does not exist between h-plmn and v-plmn..
Lg Electronics Inc.

Method and authentication in passive optical network

A method and apparatus for authentication in a passive optical network are disclosed. In the disclosure, a first terminal serial number of an onu and a first logic registration code are transmitted from the onu to an olt; if the olt determines that the first terminal serial number does not match a second terminal serial number stored on the olt, the olt judges whether the first logic registration code received from the onu matches a second logic registration code stored on the olt; the olt stores the first terminal serial number received from the onu on the olt if the first logic registration code matches the second logic registration code..
Huawei Technologies Co., Ltd.

Telecommunication call management and monitoring system with voiceprint verification

Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification.
Global Tel*link Corporation

E-mail anti-phishing system and method

An anti-phishing email system and an anti-phishing email method are provided. The system includes an email address registration and authentication subsystem configured to register an email address of a user, an email signature registration subsystem configured to register a signature generated by the user for information on a to-be-sent email, and an email signature query subsystem configured for an email receiving user to query whether the email is registered after the email receiving user receives the email, to determine whether the email is an illegal phishing email..
China Internet Network Information Center

Geolocation-based authentication credentials

Provided is process including receiving a request to authenticate a user; sending instructions to present an authentication user interface including a geographic map; receiving geolocations on the geographic map selected by the user; comparing the geolocations to a sequence of geolocations in an authentication credential to determine whether to authenticate the user.. .
Ca, Inc.

Distributed authentication for internet-of-things resources

A network device receives, from a node in an internet-of-things (iot) network, an access request for a user authenticated via the node and identifies the access request as from either of a trusted node or an untrusted node in the iot network. When the access request is from an untrusted node, the network device identifies a hash key for the access request, wherein the hash key is derived from an access list for the iot network; broadcasts the hash key to other trusted nodes in the iot network; and validates the access request based on a solution consensus from the other trusted nodes.
Verizon Patent And Licensing Inc.

Computer readable storage media for tiered connection pooling and methods and systems for utilizing same

Systems and methods for tiered connection pooling are disclosed herein, which may be used in a method of fulfilling user requests in an enterprise computing system. The method involving generating, by a processing unit, a first connection pool comprising one or more previously used authenticated connections with a resource; generating, by the processing unit, a second connection pool comprising one or more unused authenticated connections with the resource; and generating, by the processing unit, a third connection pool comprising one or more unauthenticated connections with the resource; receiving, by the processing unit, a request from the user device to access the resource, the resource requiring authentication for access; and fulfilling, by the processing unit, the request based on a connection from the first, second, or third connection pool..
Document Storage Systems, Inc.

Enabling coordinated identity management between an operator-managed mobile-edge platform and an external network

Approaches may be used for enabling coordinated identity management between an operator-managed mobile edge platform (mep) and an external network. A token may be generated in the mep that may associate a mobile network identity and an external network identity.
Interdigital Patent Holdings, Inc.

System and method

A system includes an authentication server that executes authentication processing via one or more biometric authentication methods. The system detects, in response to a request for proxy work, authentication target data related to biometric information from data acquired at a location where the request for the proxy work is issued.
Canon Kabushiki Kaisha

Secure biometric authentication with client-side feature extraction

Provided is a process that includes: receiving, with a first device, a request to authenticate a user; obtaining, with the first device, an unstructured-data authentication input; extracting, with the first computing device, a plurality of features of the unstructured-data authentication input to form a structured-data representation; determining, with the first device, a first instance of a value that deterministically varies; and determining, with the first device, a first encrypted value based on both the structured-data representation and the first instance of the value that deterministically varies; and sending, with the first device, the first encrypted value to a second computing device. .
Ca, Inc.

Two factor authentication using sms

Authentication of a user and/or granting of access to secure data is made by way of an out of bounds authentication of the user by having the user use a different device, protocol, and/or network channel to communicate an answer to a challenge question posed to the user. The user request for data can be in a web browser on a first device.
Teltech Systems, Inc.

Apparatus and authentication, and computer program and recording medium applied to the same

Disclosed are an authentication device and method, and a computer program and a recording medium applied thereto. An authentication device according to the present invention comprises: a registration request unit for, when screen information displayed on a specific screen of a user device is changed by a user's input or changed by a factor other than the user's input, encrypting the changed screen information and requesting registration of the encrypted changed screen information as authentication information; an authentication confirmation unit for receiving an authentication confirmation request from a communication network connected with the user device; and an authentication performing unit for extracting the screen information displayed on the specific screen according to a determination on whether to grant authentication for the authentication confirmation request, encrypting the extracted screen information, and then transmitting the encrypted authentication screen information to the communication network as a response to the authentication confirmation request..

Anonymous token authentication

When a user attempts to log in to his account from within an unsecure environment, such as a public computer or a third party application, the user is shown an anonymous token instead of a typical log in prompt to prevent the user from entering sensitive information. The anonymous token is random and is not associated with user data.
Ca, Inc.

Information registration and authentication

The present application discloses methods and devices for information registration and authentication. The registration method may comprise: sending a request for registering standard information to an authentication server; receiving first authentication information fed back by the authentication server; generating a standard information acquisition request, sending the standard information acquisition request and the first authentication information to a first application, and acquiring signed standard information and an identity identifier of the standard information that are returned by the first application after the first application approves authentication of the first authentication information, wherein the signed standard information is signed by the first application using second authentication information; and sending the signed standard information, the identity identifier of the standard information, and the first authentication information to the authentication server..
Alibaba Group Holding Limited

Communication system and registration server

A communication system includes a registration server, a management server and a first target device. When receiving destination information from a communication device, the registration server transmits authentication information to the communication device, transmits screen relating information to a destination indicated by the destination information, receives user information from the communication device and registers the user information therein.
Brother Kogyo Kabushiki Kaisha

Establishing a secure channel with a human user

A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“pin”) is shared between a user and an application.
Intertrust Technologies Corporation

Information processing method, device, system and computer storage medium

Provided is an information processing method. The method comprises: acquiring login authentication information input on a login interface of a client, wherein the login authentication information is used for launching a first object (101); sending the login authentication information to a cloud server which then determines whether the login authentication information is correct and valid (102); and controlling the launch of the first object according to the determination result returned by the cloud server (103).
Zte Corporation

Methods for dynamic user identity authentication

Disclosed herein are methods for dynamic user identity authentication for authenticating the identity of a user of a login device. In some embodiments, the method includes the following steps: using a web server to receive an access request from the login device, generate a resource address information and a session identifier, and transmit the same to the login device; using the login device to generate an initiation signal and transmit the same to a signing device thereby initiating an air signature procedure to generate a target signature, wherein the signing device includes a motion sensor configured to sense movement features produced when the user moves the signing device; using a determination module to determine whether the target signature matches a reference signature and generate a authentication information based on the determination; and using the web server to determine whether the access request is granted based on the authentication information..
Airsig Inc.

Embedded universal integrated circuit card supporting two-factor authentication

A module with an embedded universal integrated circuit card (euicc) can include a profile for the euicc. The profile can include a first and second shared secret key k for authenticating with a wireless network.
Network-1 Technologies, Inc.

Authenticator plugin interface

Authenticator plugin interface for an enterprise virtualization portal is provided. An example method for evaluating a portal access request may comprise: receiving, by a virtualization management platform, a request initiated by a requestor for access to an enterprise virtualization portal associated with the virtualization management platform, the request comprising a login credential; transmitting, to a first authentication system, a first authentication query comprising an identifier of a first data type, and a first value of the first data type, wherein the first value is derived from the login credential; receiving a first response message comprising an identifier of a second data type, and an authentication response of the second data type; and responsive to evaluating the authentication response, granting the requestor access to the enterprise virtualization portal..
Red Hat Israel, Ltd.

Addressing a trusted execution environment using encryption key

Methods, systems, and devices are described herein for delivering protected data to a nested trusted execution environment (tree), including a trustlet running on top of secure kernel, associated with a potentially untrusted requestor. In one aspect, a targeting protocol head, or other intermediary between a requestor and a key management system or other store of protected data, may receive a request for protected data from a potentially untrusted requestor, and an attestation statement of the secure kernel.
Microsoft Technology Licensing, Llc

Circuit device, oscillation device, physical quantity measuring device, electronic apparatus, and vehicle

A circuit device includes an oscillation circuit that generates an oscillation signal by using an oscillator, a processing unit that controls the oscillation circuit, and an interface unit that outputs authentication information to an external device. The authentication information being information based on specific information of the circuit device and is used to authenticate the circuit device..
Seiko Epson Corporation

Secure remote user authentication leveraging public key cryptography and key splitting

An id service on an app server interacts with a corresponding identity app installed on a user device such as a smart phone. At setup, the id service receives the user's public key and only a segment of the corresponding private key.
Salesforce.com, Inc.

Methods for digitally signing an electronic file and authentication method

Associating the digital signature with the electronic file (48), thereby generating a digitally signed electronic file. The invention is further an authentication method..

Secured daisy chain communication

An intermediate servant device connected in a daisy chain configuration with a set of devices is described. The intermediate servant device may be configured to receive, from a previous servant device of the set of servant devices, a request for data, a first response to the request for data, and authentication information for the first response to the request for data.
Infineon Technologies Ag

Control interface for autonomous vehicle

A system includes a control computer that is programmed to perform an authentication based on an encryption key, upon being connected to a vehicle communication network. The computer is programmed to control vehicle operation including at least one of propulsion, braking, and steering, upon authentication by a vehicle computer that is physically attached to the communication network..
Ford Global Technologies, Llc

Generating pseudo random numbers for quantum computing secure authentication

A generator device being configured for generating pseudo random numbers, the generator device comprising a computing device operable for (i) calculating a first hash chain from an initial hash value (h_0), the first hash chain comprising a first sequence of m hash values (ha_1, ha_2, . .
International Business Machines Corporation

Align session security for connected systems

Granting an aligned secured access to a resource for a client system. A first authentication token and a first validity time period value are received from a first server.
International Business Machines Corporation

Secure internal user authencation leveraging public key cryptography and key splitting

In a computing system, methods for secure os level login authentication for internal users to access servers. Some or all servers in a group each utilize a local id service for generating and validating a challenge responsive to an os login request.
Salesforce.com, Inc.

Keyword voice authentication

A method of authenticating a user based on voice recognition of a keyword includes generating, at a processor, clean speech statistics. The clean speech statistics are generated from an audio recording of the keyword spoken by the user during an enrollment phase.
Qualcomm Incorporated

Access control system with facial recognition and unlocking method thereof

An access control system with facial recognition comprising a casing, a door handle, an interaction unit, a locking unit, a triggering unit controlling an unlock/lock state of the locking unit and a facial recognition unit. The interaction unit has an operation panel arranged above the door handle and protruded from the casing at an inclined acute angle relative to a vertical surface of the casing.
Beijing Jialan Technology Co., Ltd.

Systems and methods for location-based automated authentication

Systems and methods for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform.
Uscontracting, Inc.

Method for managing vehicle and customer related information between a dealership, a motor vehicle department, and a buyer

In an approach to verifying the requirements for a vehicle purchase, evaluating the requirements for authorizing the registration of a vehicle and the authentication of an owner, collecting content associated with the registration of the vehicle and content associated with the authentication of the owner, processing the content with a governing body's regulations, wherein it is determined if errors exist between the regulations and the content, translating errors from the statutory requirement to a plain english format, generating a report presenting the processed new content and the processed content, receiving content, wherein the content corrects the errors discovered in the content, and processing the content with the new content with the governing body's regulations, to determine if the errors are corrected.. .

Authentication generating flight regulations

Systems and methods for uav safety are provided. An authentication system may be used to confirm uav and/or user identity and provide secured communications between users and uavs.
Sz Dji Technology Co., Ltd.

Enabling authentication shifting based on mobile wallet characteristics

Embodiments are directed to enabling authentication shifting based on mobile wallet characteristics such as presence and/or content of a payment credential or pre-generated token. Embodiments receive a request for access to a function or feature by a user of the mobile device; receive first user authentication credentials from the user; access a mobile wallet storing at least one payment credential associated with an owner of the mobile device, the at least one payment credential comprising owner identity information; compare the first user authentication credentials with the owner identity information; confirm the first user authentication credentials match the owner identity information; and enable access to the requested function or feature.
Bank Of America Corporation

Expedited setup of digital wallet using contactless credential

Embodiments are directed to expedited setup of digital wallet using contactless credentials. Embodiments receive user authentication credentials; validate the user authentication credentials; in response to validation, enable access to one or more features or functions of a mobile application; receive, from the contactless reader, contactless credential information comprising owner identification, credential number, expiration date and cryptogram; load the contactless credential information into a digital wallet stored in the memory; and enable use of a payment token corresponding to the contactless credential information in a digital wallet transaction..
Bank Of America Corporation

Establishing dedicated connection for token replacement

Embodiments are directed to establishing dedicated connection for token replacement. Embodiments receive user authentication credentials; validate the user authentication credentials; in response to validation, enable access to one or more features or functions of a mobile application; in some cases, determine that circumstances match a predetermined trigger including potential compromise of the current token, and in response present, on the mobile device, a list of digital wallets with which a current token is associated; receive input indicating which of the digital wallets in the list to provision a new token; receive transfer, over an established dedicated communication channel between a server and the mobile device, the new token; and automatically associate the new token with the indicated digital wallets..
Bank Of America Corporation

Method and system for authentication via a trusted execution environment

A method for authentication facilitated via a trusted execution environment includes: reading payment credentials in a first application program stored in a first memory area of a computing device; transmitting an authentication request to a second application program stored in a trusted execution environment of the computing device separate from the first memory area; displaying a prompt for authentication data based on an instruction supplied by the second application program; receiving authentication data; transmitting the received authentication data to an external computing device; receiving, by the second application program of the computing device, an authentication result from the external computing device; and transmitting, by the second application program of the computing device, the authentication result to the first application program in response to the authentication request.. .
Mastercard International Incorporated

Facial authentication device

A facial authentication device (100) includes an image corrector (107) that estimates an orientation of a face based on a center position of the face and a position of imaging unit (101) to correct an image distortion including optical axis deviation with respect to visible light image data such that the orientation of the face coincides with an optical axis direction of imaging unit (101), and a feature amount calculator (105) that extracts a face portion from the image data captured by the imaging unit (101) and calculates a feature amount of the face to output to the image corrector (107), and calculates the feature amount of the face from the image data corrected by the image corrector (107) to output to a face collator (109).. .
Panasonic Intellectual Property Management Co., Ltd.

Method and device for acquiring feature image, and user authentication method

False authentication that is obtained by using a photographic image to impersonate a real human being when being photographed for authentication is prevented by photographing a user's face while illuminated by two different patterns on a display screen to obtain two different images, determining a difference between the two different images to obtain a difference image, and then comparing the difference image to previous images to determine if a real human being is attempting authentication.. .
Alibaba Group Holding Limited

Systems and methods for biometrically authenticating a user using authentication data and liveness data

Systems and methods for biometrically authenticating a user are disclosed. In one implementation, a biometric authentication system may include a finger scanner for capturing biometric data from a plurality of sections of a finger of a user.

Authentication method and authentication apparatus using synthesized code for iris

An authentication method and corresponding apparatus includes obtaining iris images, and constituting an enroll set including iris codes and mask codes corresponding to the iris images. The authentication method and corresponding apparatus also include generating a synthesized code including a synthesized iris code and a synthesized mask code based on correlations between the iris codes included in the enroll set in block units..
Samsung Electronics Co., Ltd.

Trust based access to records via encrypted protocol communications with authentication system

Systems and techniques are disclosed for trust based access to records via encrypted protocol communications with an authentication system. One of the methods includes maintaining, in one or more databases, health records associated with patients.
Health2047, Inc.

Trust based access to records via encrypted protocol communications with authentication system

Systems and techniques are disclosed for trust based access to records via encrypted protocol communications with an authentication system. An example system is configured to authorize and provide selective and secured access to sensitive medical information according to one or more trusted relationships.
Health2047 Switchco, Inc.

Method and a computing device for providing privacy control in a surveillance video

Method and a computing device for providing privacy control in a surveillance video is disclosed. The computing device receives a surveillance video from a video capturing.
Wipro Limited

Terminal apparatus and control terminal apparatus

A terminal apparatus and a control method are disclosed. The terminal apparatus comprises: an input part for receiving a fingerprint; a control part for performing an authentication procedure with respect to the input fingerprint; and a display part for outputting a notification message if fingerprint authentication with respect to the input fingerprint is completed, wherein the control part sets a fingerprint authentication cancellation mode if contact of the fingerprint lasts for a first predetermined time or more after the fingerprint authentication was completed and can cancel authentication of the fingerprint if a predetermined condition is met..
Lg Electronics Inc.

Interacting with a computing device via identity-bearing peripheral devices

A technique is described herein by which a user may gain access to a target resource via one or more particular peripheral devices that have been associated with the user. The technique performs this task by detecting when a user communicatively couples an identity-bearing component to a hub device.
Microsoft Technology Licensing, Llc

System and conducting transactions using biometric verification

A biometric verification system is disclosed. The system includes a portable device which stores a biometric reference template and authentication preferences.
Visa International Service Association

Authentication device, authentication system, and authentication method

The authentication device includes a secret information storage unit to store secret information; a verification unit to verify validity of input data including input information of a user; an information extraction unit to extract the input information from the input data the validity of which has been verified by the verification unit; an authentication information generation unit to generate authentication information with the input information extracted by the information extraction unit and the secret information stored in the secret information storage unit; and a display unit to display the authentication information generated by the authentication information generation unit.. .

Authentication device, authentication system, authentication method, and program

An authentication device includes: a wearing position determination unit that determines a wearing position, the wearing position being a position at which a wearable article comprising a sensor is being worn on a body; and an authentication unit that performs authentication by using biometric information of the body, the biometric information being detected by the sensor at the wearing position.. .
Nec Corporation

Media client device authentication using hardware root of trust

A client device for media playback includes a user-installable media client application which implements the client-side of a digital rights management (drm) system. The client device employs secure boot and verifies the user-installed application.
Ericsson Ab

Display device

A display device includes: a display panel including a display area including at least a partially curved surface area; a touch sensor overlapping the display area to acquire touch information on a touch of a user; a pressure sensor to sense a pressure of the touch; and a controller configured to perform user authentication by controlling the display panel, the touch sensor, and the pressure sensor, wherein the touch sensor includes a plurality of sensor pixels that senses a change in capacitance corresponding to the touch, wherein the pressure sensor includes: a first electrode; a second electrode spaced apart from the first electrode; and a pressure sensing element provided between the first electrode and the second electrode.. .
Samsung Display Co., Ltd.

Authentication, authorization, and/or accounting of power-consuming devices

Systems and methods for authenticating, authorizing, and/or accounting for a power-consuming device to access a power source are described. A power access controller may manage the power source and authenticate and/or authorize the power-consuming device to access the power source based on, for example, a power profile of the power-consuming device.
Comcast Cable Communications, Llc

Authentication handover in interworking of long term evolution and wi-fi

The present invention provides methods and apparatus for reducing wi-fi authentication process time in interworking of long term evolution (lte) and wi-fi. The method comprises: activating a wi-fi authentication process; monitoring a wi-fi signal quality; determining whether to stop the wi-fi authentication process according to the wi-fi signal quality; and stopping the wi-fi authentication process when the wi-fi signal quality does not satisfy a first specific condition.
Mediatek Singapore Pte. Ltd.

Providing wireless network authentication data to climate control system devices

Disclosed are exemplary embodiments of apparatus and methods for provisioning a wireless-capable climate control system device for a wireless network. In an exemplary embodiment, a method of provisioning a wireless-capable target device for a wireless network includes providing, to the target device, wireless network authentication data for joining the wireless network.
Emerson Electric Co.

Access through non-3gpp access networks

A user equipment receives an extensible authentication protocol authentication and key agreement prime (eap aka′) message, from an authentication server related to the user equipment, in an authentication procedure being part of setting up a connection from the user equipment through an access network. The user equipment sets up an ip security tunnel between the user equipment and an evolved packet data gateway responsive to the eap aka′ message indicating that the access network is untrusted..
Telefonaktiebolaget Lm Ericsson (publ)

Method for obtaining initial access to a network, and related wireless devices and network nodes

This disclosure provides a method, performed in a wireless device, for obtaining initial access to a network in order to establish a connection to a server connected to the network. The wireless device stores a device public key and a device private key.
Telefonaktiebolaget Lm Ericsson (publ)

Wireless network authentication control

In some examples, a method includes assigning, with an access point (ap) in a wireless network, a value for an authentication control threshold (act) field in an advertisement packet that allows devices having a predetermined access control role to immediately attempt to associate with the ap. The method can further include transmitting, with the ap, the advertisement packet including the value for the act field for devices having the predetermined access control role..
Aruba Networks, Inc.

Terminal device and controlling the same

A terminal device is provided. The terminal device includes a communication interface unit configured to receive image data of an application installed in another terminal device that is streamed from the another terminal device, a display unit configured to display the image data, a control unit configured to receive an installation file associated with the application through the communication interface unit while the image data is being displayed, and to execute the received installation file when authentication of the installation file is completed, and a storage unit configured to allow the application to be installed therein according to execution of the installation file..
Samsung Electronics Co., Ltd.

Information processor and storage medium storing conversion method setting program

An information processor includes a read information obtaining unit, a conversion unit, an authentication information obtaining unit, and a conversion method setting unit. The read information obtaining unit obtains read information read from an authentication medium by a reading device.
Seiko Epson Corporation

Authentication using dtmf tones

A method of obtaining and automatically providing secure authentication information includes registering a client device over a data line, storing information and a changeable value for authentication in subsequent telephone-only transactions. In the subsequent transactions, a telephone call placed from the client device to an interactive voice response server is intercepted and modified to include dialing of a delay and at least a passcode, the passcode being based on the unique information and the changeable value, where the changeable value is updated for every call session.
Pindrop Security, Inc.

System, method and computer program product for access authentication

A method and technique for access authentication includes: responsive to receiving an access request from a user for a secure resource, generating a token; combining the token with a character string to form a uniform resource locator (url); transmitting the url to the user; and responsive to receiving a request for the url, providing access to the secure resource.. .
Webcetera, L.p.

Electronic interaction authentication and verification, and related systems, devices, and methods

Systems, devices, and methods are disclosed for exchanging electronic information over a communication network and, more specifically, to authenticating and verifying data integrity between two or more interacting users exchanging information. A client computing device generates a split secret that is transmitted to a server via two distinct communication channels.
Uledger, Inc.

Reduced user authentication input requirements

Techniques disclosed herein enable a system to reduce user authentication requirements during a user's travels by analyzing transportation data and/or event data sent to the user via a communication service, e.g. Email.
Microsoft Technology Licensing, Llc

Parameter based key derivation

A delegation request is submitted to a session-based authentication service, fulfilment of which involves granting an entity an access privilege to a computing resource. A session key is received from the session-based authentication service.
Amazon Technologies, Inc.

Authentication and access to a device of a fixed line communication device

A method is provided accessing a device of a fixed line system comprising: (i) determining at least one measurement result by a measurement function of the device; (ii) comparing the at least one measurement result with at least one predefined value; (iii) conducting a predefined operation if the comparison indicates that the at least one measurement result corresponds to the at least one predefined value; (iv) determining the at least one measurement result by the measurement function, wherein the measurement function is connected or connectable via a connection to a signature function of an access system; (v) wherein the signature function comprises a circuitry that affects parameters measured by the measurement function of the device. Also, a method for access the device via an access system, the device, the access system and a computer program product as well as a computer-readable medium are suggested..
Adtran Gmbh

Hostless mdns-sd responder with authenticated host wake service

Conventional wireless interface (wifi) controllers cannot resolve authentication for trusted client devices without calculation from a host processor. Leaving the host processor on or awaking it from a sleep state each time a non-authenticated trusted client device attempts to connect wastes power.
Gopro, Inc.

Method and encryption, decryption and authentication

A method, apparatus and system for encryption, decryption and/or authentication are provided. The method includes: generating vehicle data based on information detected at a vehicle component; generating a dynamic secret key based on a symmetric secret key stored at a first device and at least one from among information about a vehicle and information about a driver of a vehicle; and generating a message authentication code to authenticate the vehicle data by using the generated dynamic secret key.
Gm Global Technology Operations Llc

Dynamic knowledge-based authentication

A computer-implemented method includes receiving user data from a plurality of data sources, where the user data describes a user. A plurality of events are determined within the user data by applying anomaly detection to the user data.
International Business Machines Corporation

Cognitive intelligence based voice authentication

Mechanisms are provided to detect a potentially fraudulent voice conversation. The mechanisms process a corpus of electronic information to extract a fraud feature representative of at least one fraudulent activity, receive a first voice input from a user, and convert the first voice input into a textual representation of the first voice input and a set of behavioral speech characteristics associated with the user.
International Business Machines Corporation

Monitoring device, control method, and recording medium

A monitoring device manages information regarding a first reception port and information regarding a second reception port in regard to an ip address of a self-device. The monitoring device issues a route certificate corresponding to a first server certificate and a route certificate corresponding to a second server certificate for realizing communication of relatively lower security strength than the first server certificate, and associates the first server certificate with the first reception port and associates the second server certificate with the second reception port.
Canon Kabushiki Kaisha

System and providing identity verification services

A system and method of validating an upgrade of authentication credentials includes authenticating a first user being associated with a first entity, receiving input identifying a customer name for the online account, receiving input indicating a type of identification to be presented at the validation event, receiving input indicating a transaction code associated with the validation event, and receiving input indicating a location of the validation event, and further includes authenticating a second user being associated with a second entity, providing to the second user a list of validation events for a location, receiving input selecting a validation event in the list of validation events, presenting one or more of the customer name, transaction code, and type of identification associated with the selected validation event, and receiving input indicating a result of the validation event, where a credential or token is created and assigned based on the validation event.. .
United States Postal Service

Split authentication network systems and methods

Disclosed is a system comprising: an authentication datastore; a device presence engine; a traffic monitor engine; an authentication presence monitor engine; an authentication server selection engine; and a traffic routing engine. In operation: the device presence engine is configured to detect presence of a user device on a trusted network; the traffic monitor engine is configured to monitor, in response to the detection, traffic on the trusted network from the device; the authentication presence monitor engine is configured to evaluate onboarding characteristics of the user device in response to the monitoring; the authentication server selection engine is configured to select one of a plurality of authentication servers to authenticate the user device to the trusted network, the selecting based on the onboarding characteristics; and the traffic routing engine is configured to route traffic from the user device to the selected authentication server..
Aerohive Networks, Inc.

Authentication online services

An authentication system comprises a client device system associated with a session user, a data provider server system that stores user data, including user identification data, associated with the session user, a data provider interface system for displaying a data provider user interface on the client device system, an authentication server system that stores authentication data associated with the session user, and an authentication interface system for displaying an authentication user interface on the client device system.. .
Payeazy, Inc.

Method and system for digital rights management of documents

A method and system for transmission of digital content via e-mail with point of use digital rights management is disclosed. The secured access rights to the digital content may be customized for individual recipients by the sender, and may evolve over time.
Encryptics, Llc

Method for network voice communication

The disclosure relates to a method for network voice communication, the method comprising: a user in the global world applying for and obtaining a network voice communication number through a network voice communication client, the network voice communication number entirely consisting of multiple digits; using the network voice communication number as the network address of network voice communication of the user; performing voice communication between users that have obtained network voice communication numbers through the internet; wherein there is no need for the users to go through an invitation, acceptance or authentication process with each other during the network voice communication. The present disclosure utilizes the sharing property of the internet to extend the scope of free call applications to support mobile phones, tablets, ip landline phones (internet phones) and internet mobile phones, and realizes a free call function..
Freefly881 Communications Inc.

Traffic on-boarding for acceleration through out-of-band security authenticators

A traffic on-boarding method is operative at an acceleration server of an overlay network. It begins at the acceleration server when that server receives an assertion generated by an identity provider (idp), the idp having generated the assertion upon receiving an authentication request from a service provider (sp), the sp having generated the authentication request upon receiving from a client a request for a protected resource.
Akamai Technologies, Inc.

Gateway device and control the same

A gateway device that relays a message between two or more domains receives a first message including a first message authentication code corresponding to a first domain among the two or more domains and first data from the first domain and transmits a second message including a second message authentication code corresponding to a second domain among the two or more domains and the first data to the second domain.. .
Hitachi Automotive Systems, Ltd.

Mutual authentication of confidential communication

Embodiments of the invention relate to systems and methods for confidential mutual authentication. A first computer may blind its public key using a blinding factor.
Visa International Service Association

Per-device authentication

Systems and techniques are provided for per-device authentication. A hardware serial number associated with a hardware component of a computing device may be received.
Google Llc

Identity authentication using a wearable device

A wearable device transmits a service request generated by the wearable device to a server, where the service request is associated to a service application type. The wearable device receives an identity authentication request message associated to the service application type from the server using a preset standard interface.
Alibaba Group Holding Limited

Anti-counterfeit method

An anti-counterfeit method includes: obtaining raw data to be encoded; collecting fingerprint data by analogue acquisition to obtain initial fingerprint feature information and encrypting the initial fingerprint feature information to obtain a random feature secret key, the random feature secret key comprising a first sub secret key and a second sub secret key and the first sub secret key is encoded into a micro-texture image while the second sub secret key is embedded in an encryption program; encrypting, through the random feature secret key, the raw data to be encoded to generate an information code image, the information code image comprising the micro-texture image; passing an anti-counterfeit authentication when an image sensor succeeds in integrating the first sub secret key and the second sub secret key to generate the random feature secret key; and succeeding in decrypting, by the image sensor, the information code image through the random feature secret key.. .
Shenzhen Qianhai Quantum Cloud Technology Co., Ltd.

Token based authentication

According to an example aspect of the present invention, there is provided an apparatus comprising a memory configured to store a first token and a second token, and at least one processing core configured to obtain a first value based at least in part on the first token and the second token, and to cause the apparatus to participate in a security procedure, based at least in part on the first hash, with a second apparatus.. .
Nokia Technologies Oy

Resource management in a cellular network

Method, system and apparatus for provisioning a subscription of a service to a device comprising: receiving a message from a device, the message protected by first provisioning data installed on the device. Authenticating the message using data corresponding to the first provisioning data.
Vodafone Ip Licensing Limited

Authentication of digital broadcast data

A broadcast receiving system is disclosed that verifies a current digital certificate extracted from a digital broadcast signal using a previous digital certificate previously stored as trusted. The current and previous digital certificates are associated with digital signatures with which data received with the broadcast signal has been signed.
Nagravision S.a.

Devices and methods for identification, authentication and signing purposes

It is presented a method, performed in a one time password, otp, generating device. The otp device comprises an nfc/rfid, near field communication/radio frequency identification, interface.
Yubico Inc.

Secured vehicle for user use only

Systems of an electrical vehicle and the operations thereof are provided. Within an autonomous vehicle fleet that can be optionally primarily used for ridesharing, how does an owner or first user of one of the vehicles prevent another customer or second user from approaching a vehicle and using it for their own purposes/trips? how does the first customer lock down the vehicle for their use exclusively? how does a user secure any personal data that they may have stored in the vehicle? as one example, software locking, portable device authentication, human identification, biometric, rolling code and/or a physical identification card can be utilized to secure and/or reserve the vehicle for the first user..
Nextev Usa, Inc.

Detecting electronic intruders via updatable data structures

A data structure provides reliable data allowing a security application to detect potential instances of fraudulent use of a payment account. The data structure can be generated using data elements associated with transactions from new authentication requests in a transaction.

Systems and methods for transaction authentication using dynamic wireless beacon devices

Systems, methods, and computer-readable media are provided for authenticating transactions. An example first method includes steps performed by a server, comprising generating and storing a first identifier and sending the first identifier to a wireless beacon device associated with a transaction device over a network, receiving a transaction request comprising a proposed identifier and information related to a transaction, determining whether there is a match between the first identifier and the proposed identifier, and, based on a determination that there is a match, authorizing the transaction.
Capital One Services, Llc

Systems and methods for collecting device data from digital wallet authentications

A computer-based method for collecting digital wallet data from a digital wallet transaction initiated by a user is provided. The method includes receiving registration data for a user in response to the user registering into a digital wallet application, wherein the registration data includes demographic data and device registration data including a device identifier used for identifying the user device when in communication with another computing device.
Mastercard International Incorporated

System and location-based transaction

A system and method for using at least location information to facilitate a transaction is provided. In one embodiment of the present invention, a mobile application operating on a mobile device is used to determine a location of the mobile device.
Key 2 Mobile Llc

Hybrid mobile payment architecture and mobile pos module thereof

A hybrid mobile payment architecture includes a wired network, a wireless network and a mobile point-of-sale module. The wired network is in communication with a point-of-sale system and a payment system.
Flytech Technology Co., Ltd

Secure digital data operations

Method and system for transferring digital currency from a payer to recipient comprising receiving an identifier of data describing the first entity. Retrieving an entry from a block chain based on the received identifier.
Barclays Bank Plc

Secure automated parcel delivery

A mechanism is provided for secure automated parcel delivery. A first device owned and controlled by a recipient entity to whom a physical item is being delivered receives a delivery communication code.
International Business Machines Corporation

Electronic device for iris recognition and operating method thereof

An electronic device for iris recognition and an operating method thereof are provided. The electronic device includes a housing including a first surface, a display exposed through a first region of the first surface, a light emitting unit comprising light emitting circuitry disposed in a second region of the first surface, an image device comprising image acquiring circuitry disposed in a third region of the first surface, at least one processor disposed within the housing and electrically connected with the display, the light emitting unit and the image device, and a memory disposed within the housing and electrically connected with the at least one processor.
Samsung Electronics Co., Ltd.

Manual signature authentication system and method

Provided is a handwritten signature authentication system and method in which handwritten signature authentication is performed by conducting at least one of the following comparisons: a comparison between a pre-enrolled handwritten signature image and a tracked handwritten signature image traced during the signing process, a comparison between a pre-enrolled handwritten signature behavioral characteristics and a handwritten signature behavioral characteristics collected during the signing process, and a comparison between a pre-enrolled handwritten signature image and a reconstructed handwritten signature image regenerated by the handwritten signature behavioral characteristics collected during the signing process.. .
Secuve Co., Ltd.

Non-intrusive data authentication systems and methods

Systems and methods are disclosed that create a separate digital and cryptographically secure signal “branch” to a secondary observer from a primary signal path of an information system. The information system may be a measurement system.
National Technology & Engineering Solutions Of Sandia, Llc

Fast authentication of code in a low-power system

The invention relates to a system comprising a non-volatile memory device configured to contain executable code; and a logic device comprising an internal memory and a processor configured to execute the code contained in the non-volatile memory device, the internal memory being located in a first always-on power domain of the logic device, wherein the system is configured to check whether the internal memory contains a code digest hc, obtain the executable code from the non-volatile memory device, compute a code digest hc″ of the executable code, and, if the code digest hc and the code digest hc″ are identical, execute the executable code. The invention also relates to a corresponding method..
Qualcomm Technologies International, Ltd.

Authentication reinforced software

Disclosed are an authentication method and an authentication apparatus for reinforced software. The method includes: obtaining, after verification of a shell procedure of a reinforced software performed by a server succeeds, key data sent from the server, the key data including hidden data in a plain-text software code of the reinforced software and an entry address corresponding to the hidden data; and replacing, according to the hidden data and the entry address, corresponding data hidden in the plain-text software code of the reinforced software stored in a memory, and loading the plain-text software code..
Zte Corporation

Medical devices with intelligent accessories

A medical device and associated systems with host devices and one or more accessories are disclosed that are capable of authenticating the host device with intelligent one of more of the intelligent accessories. Each of the host device and the one or more accessories can share a secret or other unique code.
Physio-control, Inc

Information processing system, information processing method, and computer readable medium

A database (7) stores a first identifier and visiting destination authentication information in association with each other, the first identifier being generated from visitor authentication information which is one of an encrypted face photograph image and key data used for generating the encrypted face photograph image, the visiting destination authentication information being the other of the encrypted face photograph image and the key data. An authentication terminal apparatus (9) receives authentication data from a mobile terminal device (2) used by a visitor (1) who intends to enter a facility and generates a second identifier from the authentication data in the same generation procedure as that of the first identifier.
Mitsubishi Electric Corporation

Secured computerized system for children and/or pre-literate/illiterate users

A secured computerized system comprising a computerized environment secured to prevent access thereto, other than by end-users who have passed a what-you-know authentication test: what-you-know testing functionality for administering a what-you-know user authentication test to end-user/s, including presenting image/s to end-user, and approving end-user to enter the computerized environment if end-user correctly selects predetermined location/s within the image; and a graphic what-you-know test-configuring functionality for displaying system-selected location/s within the image; providing a graphic interface operative for accepting, from, end-user/s, a user-selected modification of system-selected location/s; and storing, for each individual end-user, the user-selected modification as the individual end-user's predetermined location/s; or if no user-selected modification exists for an individual end-user, storing the system-selected location as the individual end-user's predetermined location.. .
Googale (2009) Ltd.

System and multiple sequential factor authentication for display devices

An information handling system includes a display device and a processor configured to display a plurality of icons in a first display area, divide a second display area into a plurality of sectors, designate an authentication sector of the plurality of sectors, designate an authentication icon of the plurality of icons, receive a user input including selecting one of the icons and dragging the selected icon to a selected one of the sectors, determine if the selected sector is the authentication sector and if the selected icon is the authentication icon, and display a prompt to the user to provide an authentication factor to log on to the information handling system in response to the selected sector being the authentication sector and to the selected icon being the authentication icon.. .
Dell Products, Lp

Fingerprint recognition method and apparatus, and touchscreen terminal

A fingerprint recognition method and apparatus, and a touchscreen terminal with a fingerprint recognition module includes, when a fingerprint authentication module is in a disabled state, a touch operation used to trigger an application program is received, if fingerprint authentication is not required for execution of the application program, the fingerprint recognition module is kept in a disabled state, and after the application program has been executed for specific duration, the fingerprint authentication module is enabled again, to perform the fingerprint authentication.. .
Huawei Technologies Co., Ltd.

Providing access with separate authentication to secure content in repositories

A request from a user to access a report associated with one or more content items maintained by an electronic content management system can be received. A query, associated with the request and including one or more attributes of the request to access the report can be executed.
Alfresco Software, Inc.

Using parity data for concurrent data authentication, correction, compression, and encryption

A system for software error-correcting code (ecc) protection or compression of original data using ecc data in a first memory is provided. The system includes a processing core for executing computer instructions and accessing data from a main memory, and a non-volatile storage medium for storing the computer instructions.
Streamscale, Inc.

Customizable firmware based on access attributes

Embodiments include validating a user for performing a service procedure for a system and customizing the system for the user for the service procedure. An example computer-implemented method includes validating authorization of the user based on authentication data from a tag uniquely identifying the user.
International Business Machines Corporation

Method for capturing, storing, accessing, and outputting digital content

A method for capturing and outputting digital content is herein disclosed and enabled, the output system includes an information apparatus, a server, and a client device. The information apparatus includes at least a digital camera and a wireless communication module (e.g., ieee 802.11 or bluetooth).
Flexiworld Technologies, Inc.

System for capturing and outputting digital content over a network that includes the internet

An output system for capturing and outputting digital content is herein disclosed and enabled. The output system includes an information apparatus (e.g., a digital capturing device or an internet appliance) for capturing digital content, a server application at a server over the internet, and a client application at a client device for accessing the captured digital content.
Flexiworld Technologies, Inc.

Simultaneous authentication system for multi-user collaboration

A computing device includes a touch-sensitive user interface configured to present a unified collaborative session for two or more users, and an authentication module configured to simultaneously identify and authenticate multiple users physically co-located within a collaborative environment, allowing each of the multiple users to interact with the touch-sensitive user interface. A content module is configured to simultaneously provide one or more content portals within the unified collaborative session for each authenticated user.
Microsoft Technology Licensing, Llc

Systems and methods for authentication code entry in touch-sensitive screen enabled devices

Systems and methods for authentication code entry in touch-sensitive screen enabled devices are disclosed. In one embodiment, a method for entering data to a data entry device comprising at least one computer processor, a memory, and a touch-sensitive screen may include the touch-sensitive screen providing an input interface comprising a plurality of virtual keys; the touch-sensitive screen sensing a first touch on the touch-sensitive screen; the touch-sensitive screen sensing a release of the first touch and a location of the first touch at the time of release; the computer processor determining a corresponding virtual key based on the location of the first touch at the time of release; the computer processor receiving an entry gesture at an entry gesture interface; and the computer processor identifying the corresponding virtual key as a value in an authentication code following the receipt of the entry gesture..
Verifone, Inc.

Managing autonomous vehicles

In some embodiments, a method for an autonomous vehicle obtaining services can include: detecting, by the autonomous vehicle, a need for service; sending, over a network interface of the autonomous vehicle, a request for service; determining a rendezvous location at which service will be received; maneuvering, by the autonomous vehicle, to the rendezvous location; receiving, by the autonomous vehicle over a network, an authentication code; in response to receiving the authentication code, enabling, by the autonomous vehicle, access to components of the autonomous vehicle; determining, by the autonomous vehicle, that the service is complete; and transmitting, by the autonomous vehicle, an indication that the service is complete.. .

Method for authorizing a driver to activate at least one system of a vehicle, based on a biometric authentication process

A method for authorizing a driver to activate at least one system of a vehicle, includes a preliminary phase that includes an initialization step, an enrollment step scanning enrollment biometric data of the driver, an access step for the driver to enter the vehicle, and a storage step registering enrollment biometric data in memory. The method also includes a subsequent phase that includes an authentication step scanning authentication biometric data of the driver and comparing said authentication biometric data with the enrollment biometric data in the memory, then an activation step wherein, if the authentication biometric data match with the enrollment biometric data, in authorizing the driver to activate the at least one system of the vehicle, or a refusal step wherein, if the authentication biometric data does not match with the enrollment biometric data, in forbidding the driver to activate the at least one system of the vehicle..
Dura Automotive Holdings U.k., Ltd

Authentication using electromagnet signal detection

Systems of an electrical vehicle and the operations thereof are provided. In particular, a towing cable and methods for utilizing the same in a towing scenario are described.
Nextev Usa, Inc.

Network-initiated detach procedures in a neutral host network

A neutral host network is configured to provide services supported by any one or more of multiple participating service providers (psps) to user equipment in an unlicensed frequency band. The neutral host network includes a neutral host gateway configured for communication with at least one external network, a mobility management entity (mme), and a local authentication, authorization, and accounting (aaa) server configured to determine that a session involving the user equipment is to be detached from the neutral host network.
Alcatel-lucent Usa Inc.

Terminal device, device provided with prose function, communication terminal device, and communication device provided with prose function

Provided is a communication system or the like in which a service based on prose is implemented under the management of a network operator. Processing based on a discovery request procedure for discovering a proximity terminal or being discovered is performed based on authentication of a server device operated by the network operator.
Sharp Kabushiki Kaisha

Wireless network connection method and apparatus, and storage medium

Embodiments of this application relate to the field of network security, and disclose a wireless network connection method, apparatus, and system. A method for establishing wireless network connection includes receiving, by an authorization server, an access request sent by a radio access point.
Tencent Technology (shenzhen) Company Limited

Location-based authentication

An electronic device includes a location detector configured to determine a current device location and a location-based access controller configured to determine whether the current device location satisfies at least one predefined secure location criteria and to selectively preserve or disable a current user authentication session based on the determination.. .
Microsoft Technology Licensing, Llc

Identity authentication

Briefly, in accordance with one embodiment, a method and/or system for mobile identity authentication is disclosed. For example, mobile identity authentication may be employed in a variety of situations, including purchases, financial transactions, granted access to accounts, granting access to content, etc..
Payfone, Inc.

Automatic authentication of a mobile device using stored authentication credentials

Systems and methods are disclosed which may allow a user having a mobile device to automatically authenticate to a server using a device identifier associated with the mobile device. An access point may be configured to send the device identifier as well as additional identifying information to the server so that the device identifier can be accurately matched to the mobile device.
Paypal, Inc.

Apparatuses and methods for wireless communication

One feature pertains to a method operational at a device. The method includes performing key agreement with a core network device, and generating an authentication session key based in part on a secret key shared with a home subscriber server (hss), where the authentication session key is known to the core network device.
Qualcomm Incorporated

Geographic position information-based community interconnection method and system

A geographic position information-based community interconnection method may comprise creating a community network using geographic position information and identity information as network nodes; when a user terminal logs onto the community network for the first time, registration and authentication may need to be completed. The method may include receiving information and/or services for interaction, and uploading the received information and/or services to the community network server.
Huizhou Tcl Mobile Communication Co., Ltd

Sound distribution apparatus, sound reproduction terminal, authentication device, sound distribution system, and sound distribution method

[object] to enable simply viewing of a performance even at a location away from a hall where the performance takes place. [solution] a sound distribution apparatus is connected to a sound reproduction terminal that detachably holds an authentication device storing decoding information, the sound distribution apparatus including: a sound distribution unit configured to streaming-distribute sound information, which has been encrypted with a decodable code on the basis of the decoding information, to the sound reproduction terminal..
Sony Corporation

Mobile virtual communication and entertainment service

Aspects of the subject disclosure may include, for example, a method including providing, by a processor in a dongle coupled to a display device, a graphical user interface at the display device, and transmitting a message to an authentication server in accordance with authentication information stored in a storage device of the dongle and an input via the graphical user interface. The method also includes obtaining an authentication confirmation; obtaining content from a content server; and recording the content in accordance with a second input via the graphical user interface.
At&t Intellectual Property I, L.p.

Client device, system, information processing method, and recording medium

There provided is a client device including a first change unit for changing authentication information from individual authentication information to common authentication information, which is authentication information commonly used by each client device, in a case where a transmission of first operation information is failed due to an authentication error, and a second transmission unit for transmitting second operation information to the server device by using the common authentication information changed by the first change unit.. .
Canon Kabushiki Kaisha

Image output system having a customized user interface

An authentication processing portion of an mfp requests user authentication to a server based on user information including at least a user id input from a mobile terminal apparatus or an operation panel. The server has a user authentication portion which performs the user authentication and a ui instruction portion which specifies, when the user authentication succeeds, a ui image displayed on a display panel of the apparatus for operating the mfp depending on the user id, and instructs the mfp to display the ui image on the apparatus.
Sharp Kabushiki Kaisha

Systems and methods for interworking with over the top applications in communications network

Systems and methods are provided for facilitating communications with an operating system suspended ott application on a user device. The methods include sending, from a p-cscf or a webrtc gateway, to a push notification framework, a notification configured to cause the push notification framework to send a push notification to the suspended ott application (ims ott application or webrtc ott application).
Mavenir Systems, Inc.

Identity-based internet protocol networking

Disclosed herein are system, method, and computer program product embodiments for identity-based internet protocol networking. An embodiment operates by receiving a packet from a device of a secured network.
The Mitre Corporation

Method of managing profiles in a secure element

Method of managing profiles in a secure element, the secure element including a first profile associated with a first communication network and a second profile associated with a second communication network, the first profile being active. The method includes steps of deactivation of the first profile and activation of the second profile.
Oberthur Technologies

Cross-enterprise workflow

Example systems, methods and storage media to provide a cross-enterprise workflow among clinical systems are disclosed. An example cross-enterprise enabled clinical information system includes a workflow manager to coordinate user workflows with respect to the system and associated content.
General Electric Company

Method and system for executing a transaction request using a communication channel

A method and system for executing a transaction request using a communication channel such as sms or email has been described. The disclosure provides a proactive/reactive smart response processing system/framework for providing capability to a user to take action from any channel other than desktop.
Tata Consultancy Services Limited

Associating layer 2 and layer 3 sessions for access control

A network access control (nac) device enforces one or more policies for accessing one or more remote network devices. The nac device includes a processor configured to receive authentication credentials from the user device over an l2 connection including first identification information of the user device, authenticate the user device using the authentication credentials, receive compliance information from the user device over an l3 connection including second identification information of the user device, associate the l2 connection with the l3 connection using the first identification information and the second identification information, and in response to determining that the compliance information satisfies the one or more policies, authorize the user device to access the one or more remote network devices..
Pulse Secure, Llc

Method of instant sharing invoked from wearable devices

Techniques are disclosed herein for establishing a file transfer connection via wearable devices (e.g., head-mounted wearable devices). A service executing on a cloud platform receives a connection authentication request including authentication data from wearable devices, each associated with a mobile device.
International Business Machines Corporation

Two-user authentication

According to an example aspect of the present invention, there is provided an apparatus comprising at least one processing core, at least one memory including computer program code, the at least one memory and the computer program code being configured to, with the at least one processing core, cause the apparatus at least to receive from a first device a digital key, receive from a second device an encrypted data item, decrypt the encrypted data item using the digital key to obtain a decrypted data item, and verify the decrypted data item matches a reference data item, and responsive to the decrypted data item matching the reference data item, grant access to at least one of the first device and the second device.. .
Nokia Technologies Oy

Digital frame authentication through crowdsourcing

A method, computer program product, and system for authenticating one or more frames includes a processor obtaining the frame(s) from a first client with data indicating a location at which the frame(s) was captured, and data indicating a time at which the frame(s) was captured. The processor identifies a clients of third parties within a pre-defined proximity of the location and at a time within a pre-defined proximity to the time at which the frame(s) was captured.
International Business Machines Corporation

System and issuing otp application in face-to-face confirmation manner

The present invention relates to a system and method for issuing an otp application in a face-to-face confirmation manner, and the system includes at least one or more service provider devices for transmitting otp application issuance request information, including information on recognition of a terminal device tagged on a reader provided for each service provider or entering a previously set service area, to an integrated service device; and the integrated service device for registering secure storage medium identification information as medium identification information for otp authentication and transmitting an otp installation guide to the terminal device if the recognition information is the secure storage medium identification information, and transmitting the otp installation guide to the terminal device if the recognition information is terminal device identification information, in which the terminal device can be a terminal device of a user seeing a service provider face-to-face.. .
Sk Planet Co., Ltd.

Collaborative sign-on

An authentication approval request can be received by a first system from a second system. The first system can determine whether the user is required to be logged into at least a second online account hosted by at least a third system unrelated to the second system in order to approve the authentication request.
International Business Machines Corporation

Authentication system and authentication method

Provided is an authentication system that achieves simple single sign-on used by an mfp. A management application includes a first authentication-request unit that transmits an authentication request to a management server and delivers a token to an execution platform.
Kyocera Document Solutions Inc.

Systems and methods for automated detection of login sequence for web form-based authentication

A system for automating login can determine if a web artifact, such as a web page, includes a login form, by identifying a password field, a user id field, and a submit button or another element providing the functionality to submit credentials for authorization. Submission of user credentials may be emulated, and access to password protected areas can be ascertained, e.g., by identifying any element that permits signing out from the password protected area..
Veracode, Inc.

Distribution of secure data with entitlement enforcement

An example method for distributing content includes receiving a first encrypted request for content over a first encrypted connection from a client. The method also includes obtaining an unencrypted version of the first encrypted request.
Red Hat, Inc.

Multi-services application gateway and system employing the same

An intelligent gateway device provided at a premise (home or business) for providing and managing application services associated with use and support of a plurality of digital endpoint devices associated with the premises. The device includes a communications and processing infrastructure integrated with a peer and presence messaging based communications protocol for enabling communications between the device and an external support network and between the device and connected digital endpoint devices.
Kip Prod P1 Lp

Facilitating secure communication between a client device and an application server

It is presented a method for facilitating secure communication between a client device and an application server. The method comprises the steps of: receiving a client request from the client device, the client request comprising a first fully qualified domain name, fqdn, for the application server, and at least a portion being bound for the application server; forwarding the client request to the application server; receiving an application server response from the application server, the application server response indicating a need to provide authentication; obtaining an original context identifier from an authentication server; generating a modified context identifier based on the original context identifier and a client identifier, being an identifier of the client device; generating a client specific shared key based on the first fqdn, the client identifier and a shared key which is not specific to the client device; and providing the modified context identifier, the client specific shared key to the client device to use for authentication with the application server..
Telefonaktiebolaget Lm Ericsson (publ)

Blockchain-supported, fail-safe synchronization in a data authentication infrastructure

A distributed hash tree-based authentication system for digital input records has more than one upper-level core node, each of which receives at least one uppermost value from aggregators. Communicating with each other about which aggregator values they have received, the nodes try to reach agreement as to which of these values should be included in duplicated current intra-node hash tree evaluations so as to form a consistent top-level value used as the basis for digital signatures associated with the digital input records.
Guardtime Ip Holdings Limited

Method and authentication system for automatic re-authentication

A method for automatic re-authentication is provided. The method includes: transmitting, by a client device, a challenge to a key device; signing, by the key device, the challenge with a digital signature generated by using a private key and transmitting the digital signature of the challenge to the service server when the key device is connected to the client device; receiving, by the service server, the digital signature of the challenge and authenticating the digital signature with a public key stored in the service server; establishing, by the service server, a service connection between the client device and a service provided by the service server to allow the client device to access the service when the digital signature is verified; and performing, by the service server, a re-authentication operation with the client device and the key device according to a connection between the client device and the key device..
I.x Innovation Co., Ltd.

Short-distance network electronic authentication

Methods of short-distance network electronic authentication are described. In one embodiment, a method includes storing encrypted authentication data for a user and a corresponding encryption key on a mobile device; establishing electronic communication between the mobile device and a computer via a short distance network; detecting a request for user-specific authentication data from a third-party application running on the computer; requesting, via an authentication client on the computer, authentication credentials from an authentication service running on the mobile device; accessing, via the authentication service, in response to the requesting step, the encrypted authentication data and encryption key; decrypting the authentication data using the encryption key via the authentication service; transmitting the decrypted authentication data to the authentication client on the client computer; passing the decrypted authentication data from the authentication client to the third-party application; and authenticating the user in the third-party application..

Apparatus and providing secure execution environment for mobile cloud

Disclosed herein are an apparatus and method for providing a secure execution environment for a mobile cloud. The apparatus for providing a secure execution environment includes a general execution unit for, when a request for service execution is received, generating authentication information, transmitting the authentication information to a cloud server, and receiving a security key required for secure communication from the cloud server, and a secure execution unit for verifying the security key received from the general execution unit and performing secure communication with the cloud server by running a service execution monitor when verification succeeds, wherein the general execution unit is configured to transmit the authentication information, including general authentication information corresponding to the general execution unit and secure authentication information received from the secure execution unit, to the cloud server, thus allowing the cloud server to verify the general execution unit and the secure execution unit..
Electronics And Telecommunications Research Institute

Host-storage authentication

Example implementations may relate to a host and a storage system that communicate by a block storage protocol. For example, the host may embed host credentials in a data packet of the block storage protocol, and the data packet of host credentials may be cryptographically signed by a certificate authority trusted by a user of the host to generate a signed credential packet.
Hewlett Packard Enterprise Development Lp

Method of authenticating communication of an authentication device and at least one authentication server using local factor

A method of authenticating the communication of an authentication device and at least one authentication server using a local factor with creation of secret information shared by the authentication device and the authentication server; the reference information is derived from the secret information shared by the authentication device and the authentication server, where the manner of derivation is the same on the authentication device and on the authentication server; furthermore, the authentication device creates transformed reference information by means of cryptographic transformation from the reference information, where the local factor chosen and entered by the user or obtained from a medium or from the surrounding environment is used as an input in this cryptographic transformation, and where only the transformed reference information is stored on the authentication device and only the reference information is stored on the authentication server.. .
Aducid S.r.o.

Method for mapping at least two authentication devices to a user account using an authentication server

The invention provides a method for mapping at least two authentication devices to a user account using an authentication server, where each authentication device connects to the authentication server using a secured communication channel; their mapping to the user account is recorded on the authentication server, and, when a transfer of data between the authentication devices mapped to the user account occurs, the data is passed over from the first authentication device to the authentication server using a secured communication channel and from the authentication server to another authentication device mapped to the account of said user using a secured communication channel, where the aforesaid secured communication channel is created by the second authentication device. This procedure allows the use of a single personal local authentication factor for multiple authentication devices and increases the security of authentication of devices with authentication servers..
Aducid S.r.o.

Lighting based authentication of a mobile electronic device

A light emitting diode (led) based illumination device authenticates a mobile electronics device on a lighting communications network. The mobile electronic device may request a communications link on the lighting communications network and detect modulated illumination light emitted from the led based illumination device.
Xicato, Inc.

Component authentication utilizing multi-level arbiter

A method for component authentication includes delaying an input signal along a first propagation path and a second propagation path, each propagation path including a same number of delay stages. A plurality of control inputs alters the first propagation path to include at least one delay stage from the second propagation path, and alters the second propagation path to include at least one delay stage from the first propagation path.
Semiconductor Components Industries, Llc

Irradiation system, irradiation method, and program storage medium

Provided is an irradiation system for reliably detecting a desired detection target and precisely irradiating marking light on the detected detection target. The irradiation system includes: a server device detecting, by authentication processing, a detection target from image data capturing a monitored area, generating, from each piece of a plurality of pieces of image data captured in a time span including a capture time of image data in which the detection target is detected, lightweight data obtained by lightening an amount of data in the plurality of pieces of image data, and transmitting tracking data obtained by aggregating a plurality of pieces of generated lightweight data; and a terminal device capturing the monitored area and outputting image data, transmitting the captured image data to the server device and also receiving the tracking data from the server device, and irradiating light on the detection target, based on the received tracking data..
Nec Corporation

Inspection device and inspection method

The present invention is adapted to the technical field of commodity anti-counterfeiting, and provides an inspection device and an inspection method, comprising: an input device communicatively connected to a verification report server and a verification server, respectively; the input device for activating security data of a quality inspector of the commodity, transmitting the security data to the verification report server for verification, reading an anti-counterfeiting code of the commodity after the security data pass verification, and transmitting the anti-counterfeiting code to the verification server; the verification report server for receiving the security data and verifying the security data; and the verification server for receiving the anti-counterfeiting code of the commodity to verify the anti-counterfeiting code. Thus, the present invention realizes authentication of personnel who is responsible for inspecting the commodity, and ensures qualified professional to inspect the commodity..

Marker code generation for resource distribution authority flagging

Embodiments of the invention are directed to systems, methods and computer program products for generating unique marker codes for security implementation and deployment during authentication required resource disbursement. In this way, marker codes may be generated and associated with one or more resource disbursement mechanisms.
Bank Of America Corporation

Security for electronic transactions and user authentication

System and method for generating, disseminating, controlling, and processing limited-life security codes used to authenticate users, particularly for electronic financial transactions, such as payment transactions. Providing a user with a single security code usable across multiple accounts or other secured systems is contemplated, each security code having a limited lifetime.
Tender Armor, Llc

Portable network interfaces for authentication and license enforcement

Methods and apparatus for portable network interfaces to manage authentication and license enforcement. A system may include a plurality of resource instances including a producer instance configured to implement a network-accessible service, and an authentication coordinator.
Amazon Technologies, Inc.

Anti-counterfeit label having increased security

The invention relates to a near field magnetically coupled contactless tag, comprising a substrate comprising a rupture zone; a master microcircuit arranged on the substrate on one side of the rupture zone, and configured to be interrogated by a near-field reader; a slave microcircuit arranged on the substrate on the other side of the rupture zone; and a sacrificial link connecting the two microcircuits, wherein the two microcircuits are configured to negotiate mutual authentication through the sacrificial link.. .
Wisekey Semiconductors

Two dimensional barcode and authentication of such barcode

A method is disclosed for creating a 2d barcode. In an embodiment, the method includes: embedding primary information that can be read by a 2d-barcode-reader in a primary information pattern, and embedding secondary information that is made difficult to reproduce without alteration in a visible pattern.
Scantrust Sa

Physical marker coding for resource distribution adjustment

Embodiments of the invention are directed to systems, methods and computer program products for providing physical marker coding for resource distribution adjustment or duress signaling when using paper resource distribution documents. Paper resource distribution documents have limited amount of multi-factor authentication.
Bank Of America Corporation

Enhanced user authentication

A method and system for authenticating a user. A first digital representation of an iris of an eye of at least one authentic user is obtained.
International Business Machines Corporation

Authentication process for post-1942 norman rockwell paintings

This authentication process reveals the hidden initials nr and upon subsequent magnification, the syllables comprising the names, norman and rockwell and the year of the painting's completion in mr. Rockwell's printed handwriting styles.

Security device and display device including the same

A security device includes a biometric sensor which senses biometric information of a user, a pressure sensor which senses a contact surface caused by the user and to obtain force distribution information of the contact surface, and a user authenticator which performs user authentication with reference to the biometric information and the force distribution information.. .
Samsung Display Co., Ltd.

Method and authenticating fingerprints using reflected wave

The present disclosure relates to fingerprint sensing technology of a fingerprint sensor to be used, and more particularly to an apparatus for authenticating whether a fingerprint of a subject is forged or falsified by using a waveform reflected from the subject, such as an ultrasonic wave. The fingerprint authentication apparatus includes a fingerprint sensor configured to apply a wave signal to a subject and receive a wave signal reflected from the subject, a local waveform detector configured to detect local waveforms by dividing the received wave signal by a reception time, and a forgery detection unit configured to count the number of local waveforms and detect whether a fingerprint provided from the subject is forged or not based on the counted number of local waveforms..
Shin Sung C&t Co., Ltd.

Contemporaneous gesture and keyboard for different levels of entry authentication

A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device.
International Business Machines Corporation

Keyboard entry as an abbreviation to a contemporaneous gesture authentication

A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device.
International Business Machines Corporation

Contextual contemporaneous gesture and keyboard entry authentication

A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device.
International Business Machines Corporation

Contemporaneous facial gesture and keyboard entry authentication

A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device.
International Business Machines Corporation

System, method and computer program product for controlling and altering biological, biometric, and idiosyncratic authentications

An authentication control method, system, and computer program product, includes performing an initial calibration to login to a registered device by detecting a plurality of biological signals, biometric signals, and idiosyncratic signals of a user and selecting a combination of the plurality of biological signals, biometric signals, and idiosyncratic signals to use in an initial calibration-authentication score, computing a login-authentication score at a time of the login based on a user input of signals corresponding to the signals of the initial calibration-authentication score, and allowing the login to the registered device if the login-authentication score is within a predetermined threshold of the initial calibration-authentication score.. .
International Business Machines Corporation

Receiving apparatus, transmitting apparatus, and data processing method

There is provided an arrangement for executing an application on the condition that the application has been confirmed as authorized. A transmitting apparatus sends an application and signaling data in which authentication information capable of confirming the application as authorized is recorded.
Sony Corporation

System and unlocking devices associated with a carrying bag

A system and method for unlocking devices associated with a carrying bag are provided. In example embodiments, biometric information of a user from a biometric reader is received by an authentication system.
Ebay Inc.

Method and authenticating user using electrocardiogram signal

A method and apparatus to authenticate a registered user are described. The method and apparatus include a processor configured to identify a first electrocardiogram (ecg) signal measured from the user, and determine a similarity between the first ecg signal and a second ecg signal based on the identified first ecg signal and the second ecg signal included in a reference ecg signal set.
Samsung Electronics Co., Ltd.

Print output management system and the operation thereof

A print output management system includes a management server, an output server and a large format equipment. The management server receives an original document file and converts the original document file to an output processing file, generates an authentication code corresponding to the output processing file, and stores the output processing file and the authentication code.
Color123, Ltd.

Method of instant sharing invoked from wearable devices

Techniques are disclosed herein for establishing a file transfer connection via wearable devices (e.g., head-mounted wearable devices). A first wearable device generates a gesture-based connection request to connect with a second wearable device.
International Business Machines Corporation

Method to operate a motor vehicle with a portable control device

The disclosure relates to a method for operation of a motor vehicle with a portable control device. The portable control device is designed to generate control signals to control the motor vehicle.
Ford Global Technologies, Llc

Keyless entry system security enhancement

The keyless entry system (kes) controls access to a vehicle's doors, trunk, hood, etc., through a keyless entry device (e.g., a key fob) using wireless communication with the vehicle. The technology described here mitigates vulnerabilities in the kes implementation by employing a device configured to suppress a keyless entry command until an additional means of authentication is verified, at which point the keyless entry command is unsuppressed..
The Mitre Corporation

System for charging an electric vehicle (ev)

A method of charging an electric vehicle (ev) includes receiving a user's authentication code in an electric vehicle service equipment (evse) from a user's mobile device, comparing in the evse the user's authentication code to a whitelist having a plurality of authorized user authentication codes, and enabling an electric vehicle (ev) charging transaction serviced by the evse in response to the comparing of the user's authentication code to the whitelist so that a user's authentication code is authenticated to enable the ev charging transaction without concurrent access to an evse-related remote server.. .
Aerovironment, Inc.

Charging authorization approach for objects to be recharged and automatic authorization approach and system for charging apparatuses

The present application relates to the field of charging electrical apparatuses, and more particularly, to a charging authorization approach for objects to be recharged, an automatic authorization approach and system for charging apparatuses. The present application intends to solve the problem of complicate authentication procedure and poor user experience when a charging apparatus authenticates an electric vehicle in the prior art.
Nio Co., Ltd.

E-mail message authentication extending standards complaint techniques

A system and method for e-mail authentication. The method includes aggregating a plurality of headers associated with an e-mail message and transmitting the aggregated plurality of headers to a validation service.
Iconix, Inc.

Dynamic utilization of services by a temporary device

A system for dynamically providing or utilizing services and applications on a temporary or new device is provided. A user can send a message with a secure code that is forwarded to a home network associated with the user.
At&t Mobility Ii Llc

Terminal device, device provided with prose function, communication terminal device, and communication device provided with prose function

Processing based on a discovery request procedure for discovering a proximity terminal or being discovered is carried out based on authentication of a server device operated by the network operator. In addition, the network operator updates the processing based on the discovery request procedure in accordance with a policy of the network operator.
Sharp Kabushiki Kaisha

Function execution device and communication terminal

A system and method for providing an authentication state of a function execution device to a communication terminal is described. In some examples, the authentication state indicates whether authentication information is needed from the communication terminal before the communication terminal can request performance of one or more functions performable by the function execution device.
Brother Kogyo Kabushiki Kaisha

Authentication server, user terminal, content server, control these, and computer program

An authentication server that authenticates a user of a user terminal that plays a content stream provided by a content server, the authentication server authenticating the user. The authentication server includes storage means that stores registration information, authentication means that, when receiving an authentication request for content designated by a first user from a user terminal that the first user is using, compares information included in the authentication request with the registration information and authenticates the first user, generation means that, if the authentication succeeds, generates a first token indicating that the first user is an authenticated user, and communications means that transmits the generated first token to the user terminal.
Rakuten, Inc.

Server storing authentication information in association with device information in storage

A server receives a correlation instruction from an information processing apparatus when the storage stores first device information uniquely assigned to an image processing apparatus. The correlation instruction is for correlating first device information with a service that a service-providing apparatus provides.
Brother Kogyo Kabushiki Kaisha

Image transmission apparatus

When an address is inputted through input means for inputting an address of a receiving end, an image transmission apparatus carries out an authentication process that determines whether or not the inputting person is a right authorized person. When it is determined that the corresponding operation is right through the authentication process, the image transmission apparatus transmits image data to the address of the receiving end thus inputted..
Sharp Kabushiki Kaisha

Systems and methods for controlling a locking mechanism using a portable electronic device

Systems and methods are provided for operating a remotely operable lock. In an example embodiment, a method comprises receiving credentials at a web service from a portable electronic device, authenticating the credentials, and based on a successful authentication, issuing a command for receipt by the lock from the web service or the portable electronic device..
The Chamberlain Group, Inc.

User and iot (internet of things) apparatus tracking in a log management system

Network identity to user identity and location mapping information can be found in various logs (such as active directory logs, dhcp logs, vpn logs, and wlan authentication logs) and certain files such as router layer 2 or 3 forwarding tables. For a large organization, this mapping can be dynamic.
Fortinet, Inc.

Selectively enabling and disabling biometric authentication based on mobile device state information

Methods, systems, and computer-readable media for selectively enabling and disabling biometric authentication are presented. In some embodiments, a computing platform may receive, from a device monitoring and management computer system, a device state indicator message comprising device state information associated with a mobile computing device.
Bank Of America Corporation

System for providing health information having authentication data and operating method thereof

Provided are a system for providing health information with authentication data and an operation method thereof. The system for providing health information includes a storage device, a data combination device, and a data authentication device.
Electronics And Telecommunications Research Institute

Method, authentication server, and electronic device for configuring a sharing target device for sharing data usage of the electronic device

Methods and electronic devices are provided for configuring a sharing target device. A method includes transmitting, to an authentication server associated with a mobile network operator for managing data usage, a device configuration request message for configuring the sharing target device to share a data usage amount assigned to the electronic device; receiving, from the authentication server, in response to the device configuration request message, an access code permitting access to the authentication server; and transmitting the received access code to the sharing target device, wherein the sharing target device receives, using the access code, a subscriber profile from the authentication server for sharing the data usage amount assigned to the electronic device..
Samsung Electronics Co., Ltd.

Internet-of-things reading device, secure access, and control center apparatus

An internet-of-things (iot) reading device, a method of secure access using the same, and a control center apparatus are provided. The internet-of-things reading device includes a network interface and a processor.
Wistron Corporation

Authentication of packetized audio signals

The present disclosure is generally directed a data processing system for authenticating packetized audio signals in a voice activated computer network environment. The data processing system can improve the efficiency and effectiveness of auditory data packet transmission over one or more computer networks by, for example, disabling malicious transmissions prior to their transmission across the network.
Google Llc

Authentication of packetized audio signals

The present disclosure is generally directed a data processing system for authenticating packetized audio signals in a voice activated computer network environment. The data processing system can improve the efficiency and effectiveness of auditory data packet transmission over one or more computer networks by, for example, disabling malicious transmissions prior to their transmission across the network.
Google Inc.

Management and authentication in hosted directory service

A user, group, and device management and authentication system allows administrators to manage one or more directories with devices that are not associated with a domain of the one or more directories via a set of apis. The system also allows applications and services that do not have direct access to a list of directory users to access the one or more directories.
Amazon Technologies, Inc.

System and directory service authentication on a service processor

An information handling system includes host processor hardware and service processor hardware. The host processor hardware includes a network interface device that has an external network interface coupled to a domain controller and an internal network interface.
Dell Products, Lp

User-to-user information (uui) carrying security token in pre-call authentication

In one embodiment, a telecommunication apparatus includes a processor to generate a telephone call set-up message including a user-to-user information (uui) field, and include a security token in the uui field of the telephone call set-up message, and a network interface to send the telephone call set-up message to a telephone network. Related apparatus and methods are also described..
Cisco Technology, Inc.

Multiple field authentication

Techniques are disclosed relating to authenticating a user via a login screen. In one embodiment, a computer system displays a login screen having an arrangement of input fields where each input field is operable to receive a character.
Ca, Inc.

Authenticated session management across multiple electronic devices using a virtual session manager

A virtual session manager of an electronic device maintains a web session for a user across multiple electronic devices. The virtual session manager will receive an authentication request from a first electronic device that is in a communication range of the virtual session manager's device.
Google Inc.

Two-token based authenticated session management

A system maintains a web session across multiple web resources and/or devices using a two-token model. A user agent transmits an authentication request to a login endpoint.
Google Inc.

Multi-party authentication in a zero-trust distributed system

A zero-trust network and methods of using same are disclosed. The network includes a plurality of nodes, some of which are user devices, such as mobile phones, some of which are computer servers.
Entefy Inc.

System and authenticating and enabling an electronic device in an electronic system

A system and method for authenticating and enabling an electronic device in an electronic system are disclosed. A particular embodiment includes: an electronic system comprising: a protected device; a requesting device node, executing on a computing system, the requesting device node including: a device query data packet generator to generate a device query packet including data representing one or more identifiers of the protected device and a particular paired system; and an authentication key retriever to obtain an authentication key based on the device query data packet from an authentication provisioning node using an external data communication; and an obfuscation state machine of the particular paired system configured with a pre-defined quantity of state elements, a pre-defined quantity of the state elements being functional state elements, the obfuscation state machine being programmed with the authentication key to cause the obfuscation state machine to transition the protected device from an initial obfuscation state to a functional state..
Anvaya Solutions, Inc.

Method and system for providing a communication device access to a wireless local area network

A method and system for providing a communication device access to a wireless local area network (wlan) is disclosed. The method includes receiving, by a communication device, an encrypted network access information (enai) file from a network administration device, wherein the enai file comprises the network access information for the wireless local area network and user authentication requirement criteria.
Wipro Limited

Method and system for authentication

An authentication method is performed between a first party and a second party. The method includes: i) determining a challenge; ii) sending the challenge to the second party; receiving a response from the second party including a second cryptogram; computing a first cryptogram using the challenge and the key of the first party; determining if the first cryptogram matches the second cryptogram received from the second party.
Oberthur Technologies

System and sharing keys across authenticators

A system, apparatus, method, and machine readable medium are described for sharing authentication data. For example, one embodiment of a method comprises: generating and storing a persistent group identification code (group-id) for a group of authenticators sharing a common set of authorization (uauth) keys, an initial group-id to be generated on a first use of a first authenticator and/or following a factory reset of the first authenticator generating and storing an individual asymmetric wrapping key encryption key (wkek) on a first use of the first authenticator and/or following each factory reset of the first authenticator; generating and storing a symmetric wrapping key (wk), the wrapping key to be generated on a first use of the first authenticator and/or following each factory reset of the first authenticator; generating a join-block using an authenticator identification code for the first authenticator and the wkek, the join-block usable to join an existing authenticator group, the join block to be sent to a second authenticator; verifying the join-block at the second authenticator and generating a join response block responsive to user approval, the join response block generated by encrypting the wk and group-id using the wkek, the join response block to be transmitted to the first authenticator; and decrypting the join response block and storing the wk and group-id..
Nok Nok Labs, Inc.

E-mail message authentication and marking extending standards complaint techniques

A system and method for e-mail authentication. The method includes aggregating a plurality of headers associated with an e-mail message and transmitting the aggregated plurality of headers to a validation service.
Iconix, Inc.

Secondary short-range wireless assist for wireless-based access control

Concepts and technologies disclosed herein are directed to secondary short-range wireless assist for wireless-based access control. According to one aspect, a method can include receiving, at an access control system, a first identifier via a near-field communications (“nfc”) reader associated with an entryway to an area.
At&t Intellectual Property I, L.p.

Server and home appliance having power demand management function and managing power usage thereof

A power demand management system includes a plurality of power-prepaid appliances and a power demand management server. Each of the power-prepaid appliances includes an authenticator configured to manage an authentication key, a control setting unit configured to receive a power consumption control signal containing a power reduction amount from the power demand management server and to set control information according to the power reduction amount, and an operation control signal generator configured to generate an operation control signal based on the control information selected by the control setting unit.
Encored Technologies, Inc.

Wireless charging receiver group authentication

The present invention provides a mobile apparatus with wireless charging function and an accessory apparatus with wireless charging function capable of allowing a wireless power receiver (prx) to communicate with a cpu of a mobile device, so as to solve the problem mentioned above. The mobile apparatus comprises: a processing circuit and a wireless power receiver (prx).
Htc Corporation

Method and smart wearable device for children's security

The present disclosure discloses a method and smart wearable device for children's security. The method includes: determining whether the smart wearable device receives the security authentication information; determining whether the smart wearable device is removed when the smart wearable device does not receive the security authentication information; sending location information and alarm information to a specified system when the smart wearable device is removed.
Jrd Communication Inc.

Bluetooth sensing unlocking a door

A bluetooth sensing method for unlocking a door, applied to a system including an electronic device, an electronic door lock, and an authenticator connected to the electronic door lock. The method includes: the electronic device detecting that the distance between the electronic device and the authenticator is smaller than a pre-defined value, the electronic device setting up a bluetooth communication connection to the authenticator; the processor initiates a mutual authentication process to the controller when the distance is smaller than a pre-defined value; the electronic device automatically transmitting an unlocking instruction to the authenticator; and the authenticator unlocking the electronic door lock according to the unlocking instruction..
Orzdar Tech Inc.

Dealer and gaming apparatus control system for gaming establishments

Embodiments disclosed herein concern dealer control for gaming establishments, such as casinos. Using an electronic management system, authentication and authorization of dealers can be provided in a controlled manner that complies with predetermined rules.

Systems and methods for pre-authenticating a user of a payment card over a network

The present disclosure provides for systems and methods for pre-authenticating a user over a network, the system including an authentication computing device configured to receive, over a first computer network, a pre-authentication signal from a client device, determine an account number associated with a payment card of the user, verify i) that the user has satisfied at least one security measure, and ii) that the account number is associated with the client device, store the account number in association with a timer, initiate the timer, monitor, until the timer expires, a second computer network to detect an authorization request message for a transaction having the account number, and embed a digital authentication flag in the authorization request message when the authorization request message is detected before the timer expires, the digital authentication flag indicating that the transaction has been pre-authenticated.. .
Mastercard International Incorporated

System and price matching through receipt capture

A system and method for generating a notification of a price change for a transaction and facilitating an associated price adjustment based on electronic image capture of a paper receipt. An image capture system captures an electronic image of a paper transaction receipt, which is transmitted to a data extraction processor that extracts transaction receipt data from the captured electronic image.
Capital One Services, Llc

Multifunction card including biometric data, card payment terminal, and card payment system

A multifunction card includes an integrated circuit. The integrated circuit includes a memory, a processor, and a communicator.
Brainy Inc.

Electronic identification and authentication system

A system includes a service provider device and a point of sale (pos) device. A session between a user device and the pos device is established.
Paypal, Inc.

Systems and methods for utilizing payment card information with a secure biometric processor on a mobile device

Systems and methods for utilizing payment card information stored on a secure biometric processor on a mobile device in accordance with various embodiments of the invention are disclosed. In one embodiment, a process for securely providing payment card information from a portable device to a payment terminal includes receiving a request for payment using a payment interface, triggering a user authentication by capturing a set of biometric information from one or more biometric sensors, calculating, using the captured set of biometric information, a match with a set of stored biometric information that is stored on a secure biometric processor in order to determine a user identifier of an authenticated user, determining a payment card out of a set of payment cards associated with the user identifier, retrieving payment card information for the determined payment card from the secure biometric processor, and transmitting the payment card information to a payment terminal..
Fotonation Limited

System and user interfaces for preference based micropayment processing

A micropayment processing system and method of processing micropayments for media content are described. In one embodiment, the system includes a drop-down widget that is displayed on the display device of a data processing system, wherein the widget is immune to ad blocking.
Mitoc Group Inc.

Object identification for improved ux using iot network

In some embodiments, the disclosed subject matter involves a system and method to identify objects in an environment or scene to assist in locating objects and individuals. In at least one embodiment, users register with a service to help locate and/or track objects and individuals.

Methods and systems for detecting head motion during an authentication transaction

A method for detecting user head motion during an authentication transaction is provided that includes generating, by a processor, a motion type feature vector and a user head motion type prediction based on data generated for a sequence of frames. The frames are included in biometric data captured from a user.
Daon Holdings Limited

Facial signature methods, systems and software

Methods, systems and computer program products (“software”) enable a virtual three-dimensional visual experience (referred to herein as “v3d”) in videoconferencing and other applications; the capturing, processing and displaying of images and image streams; and generation of a facial signature based on images of a given human user's or subject's face, or lace and head, for accurate, reliable identification or authentication of a human user or subject, in a secure, difficult to forge manner.. .
Mine One Gmbh

Feature extraction and matching for biometric authentication

In a feature extraction and pattern matching system, image sharpening can enable vascular point detection (vpd) for detecting points of interest from visible vasculature of the eye. Pattern histograms of extended multi-radii local binary patterns and/or pattern histograms of extended multi-radii center symmetric local binary patterns can provide description of portions of images surrounding a point of interest, and enrollment and verification templates can be generated using points detected via vpd and the corresponding descriptors.
Eyeverify Inc.

Medium containing identifier

The objective of the present invention is to effectively prevent fraud, theft, and the like occurring with respect to a medium manufactured from a source material. This medium is a medium that is cut into a prescribed shape from a source material on which an identifier capable of specifying a location and capable of being read by a reading device is attached at a corresponding location.
Sigma P.i. Co., Ltd.

Remote identity authentication method and system and remote account opening method and system

Provided in the present application are a remote authentication method and system and a remote account opening method and system. The remote authentication method includes: by an electronic cipher device, acquiring information to be validated, generating and displaying a graphic identification code on the basis of the information to be validated; by a terminal, acquiring a picture including a facial image of a user and the graphic identification code displayed on the electronic cipher device and transmitting the picture to a background server; and by the background server, receiving the picture and validating the graphic identification code and the facial image of the user provided on the picture..
Tendyron Corporation

Intergrated wearable security and authentication apparatus and use

Embodiments shown provide a wearable device capable of acquiring images association with an unknown person facial features of the user gesture commands using an integrated wearable security system. The system enables a user to discreetly capture images of individual or environment using an integrated camera, video, and audio component.

Verifying wet ink signatures via digital pen technology

Systems, apparatuses and methods may provide for technology that includes a writing implement with an ink subsystem to print a message, a sensor subsystem to digitize the message and an authorization subsystem coupled to the sensor subsystem, wherein the authorization subsystem generates a notification of whether the digitized message is authentic. In one example, a remote server obtains the digitized message originating from a writing implement, wherein the digitized message includes an image of a handwritten signature and additional sensor information.

User authenticating

Provided is an authentication method including receiving an authentication request; obtaining authentication data for authenticating a user from at least one of a plurality of external devices as when the authentication request is received; obtaining an authentication score based on the obtained authentication data and reliability information assigned to a type of the authentication data in advance; and determining whether additional authentication is necessary based on the obtained authentication score.. .
Samsung Electronics Co., Ltd.

Device authentication based on behavior classification using convolution neural network

A method of authenticating a user on a mobile device includes gathering samples of behavioral data of the user from multiple sensors of the mobile device, each sensor generating a different number of samples. The method also includes normalizing the samples to have a same number of samples for each sensor.
Qualcomm Incorporated

Content reading reading out copyright-protected content from non-transitory recording medium, content reading apparatus, and non-transitory recording medium

A method is provided that includes receiving a command for reading out content from a non-transitory recording medium, and identifying first version information indicating a version of a content copyright protection method. The method includes identifying second version information indicating a version of a protocol used in authentication of the host apparatus, and determining whether the authentication is to be approved or not.
Panasonic Intellectual Property Corporation Of America

Random number generation in ferroelectric random access memory (fram)

Disclosed embodiments relate to generating random numbers using two transistor, two capacitor (2t-2c) ferroelectric memory cells. In accordance with one disclosed embodiment, an n-bit random number can be generated by writing to a uniform data pattern to a set of n 2t-2c ferroelectric memory cells in a 1t-1c mode so that all ferroelectric capacitors of the n 2t-2c cells have a polarization state corresponding to the same data value (e.g., all 0's or all 1's).
Texas Instruments Incorporated

Bluetooth low energy (ble) passive vehicle access control system for defending the system against relay attacks and method thereof

A bluetooth low-energy (ble) passive vehicle access control system integrated into a vehicle and an external device to defend the system against relay attacks is provided. The system includes at least one of a motion detector, a microprocessor, or a barometric pressure sensor.
Robert Bosch Gmbh

. .

Pre-roaming security key distribution for faster roaming transitions over cloud-managed wi-fi networks of heterogeneous ip subnets

A cloud control element distributes security keys prior to roaming to facilitate fast transition roaming across different ip subnets. The cloud control element distributes security keys to access points identified as neighboring and sharing a common ssid (service set identifier), but over different ip subnets.
Cloudmondo, Inc.

Gateway, gateway setup method, and iot device setup method in iot system

A gateway, a gateway setup method, and an iot device setup method are provided. The gateway setup method includes to detect received signal strength indicator (rssi) between a user device and a gateway to determine whether a distance between the two devices is less than a distance threshold.
Lite-on Technology Corporation

Unified authentication for integrated small cell and wi-fi networks

Multi-rat ues currently have 2 independent paths to authenticate with hss (either via the mme or the 3gpp aaa server causing repeated authentication messages to hss. The use of one unified authentication path between the ue and hss for small cell and wi-fi authentication is described.
Convida Wireless, Llc

Authentication connecting a companion device when same is disconnected from a subscriber device

Authentication device and method for a system that includes a subscriber device and a companion device. The authentication method includes the subscriber device delivering to the companion device a temporary profile and an authentication response signed by the subscriber device for sending to a server, installing the temporary profile to configure a second wireless communication interface of the companion device, and requesting a second authentication from the server via the second interface by using the delivered authentication response so as to authorize the second interface when the companion device and the subscriber device are not in communication with each other via the first communication interface.
Idemia France

Wireless system access control

A wireless access control method and device are provided. A method applied to a sender terminal includes: generating, by a terminal, an authentication code according to a protocol negotiated with a receiver when sending control-type data, combining, by the terminal, control-type data, the authentication code and a corresponding crc check code to generate a message, and sending, by the terminal, the message to the receiver, such that the receiver can perform a crc check on the received message, generates an authentication code according to the negotiated protocol if the crc check is successful, determines whether the generated authentication code is the same as the received authentication code, if so, analyzes the received control-type data, and if not, discards the received control-type data..
Hytera Communications Corporation Limited

Embedded certificate strong authentication and ease of use for wireless iot systems

An internet-of-things (iot) device and secure communication and authentication protocol is described for identifying an iot device and counter party and ensuring that communication between the iot device and the counter party is authenticated before transmission and receipt of data over the trusted communication pathway.. .
Cypress Semiconductor Corporation

Facilitation of user authentication using mobile devices

A connection hub connects a plurality of service providers and a plurality of mobile operators, and facilitates authentication of service consumers on behalf of the plurality of service providers. The connection hub may use authentication information of the plurality of mobile operators, to thereby enable provision of network resources from the plurality of service providers to the service consumers.
Sap Se

Systems and methods to determine safe zones and safe routes of a device

Systems and methods to generate safe zones and safe routes associated with a device are disclosed. These safe zones and safe routes can be used to map complicated location behavior into location behavior scores that can be applied systematically to tracking and authentication applications..
Athentek Innovations, Inc.

Real time location system

A method includes receiving a beacon identifier and a location of a beacon associated with the beacon identifier from an individual location monitoring system operated by a first entity. The method further includes, with a data hosting system operated by a second entity, determining an identity of a monitored individual associated with the beacon identifier, associating the location of the beacon with the identity of the monitored individual, and receiving a request for the location of the monitored individual including authentication credentials.
Weeguardians Llc

Systems and methods to determine safe zones and safe routes of a device

Systems and methods to generate safe zones and safe routes associated with a device are disclosed. These safe zones and safe routes can be used to map complicated location behavior into location behavior scores that can be applied systematically to tracking and authentication applications..
Athentek Innovations, Inc.

Validating mobile applications for accessing regulated content

Allowing access to regulated content (e.g., fda regulated) via mobile devices can increase operational efficiency of companies that have this type of content, and allow users to quickly interact with this content even when outside of the company office. Yet, mobile devices present security issues in ensuring that the integrity of the regulated content is maintained.
Medidata Solutions, Inc.

Strong authentication of client set-top boxes

Described herein are systems and methods for securing transmission of content from a smart card in a host television receiver to a client television receiver. The smart card can receive the encrypted content stream from the television service provider, decrypt the content stream with the global network key, identify the client television receiver as the destination of the content stream, generate a unique key specific to the content stream, encrypt the unique key with a local key known to the client television receiver, encrypt the content stream with the unique key, and transmit the encrypted content stream along with the encrypted unique key to the client television receiver.
Echostar Technologies L.l.c.

Authentication setting system and image forming apparatus

An image forming apparatus (a) causes the image scanning device to scan an image of: (a1) the mobile terminal apparatus before model changing that displays the subscriber id, (a2) the mobile terminal apparatus after model changing that displays the subscriber id, and (a3) a fill-in form in which the authentication setting information was written on a platen glass as one-time scanning and generate a scanned image, (b) extracts the subscriber ids of the mobile terminal apparatuses and the authentication setting information, (c) causes the wireless communication device to transmit the authentication setting information to the mobile terminal apparatus after model changing if the subscriber id of the mobile terminal apparatus before model changing and the subscriber id of the mobile terminal apparatus after model changing are same as each other.. .
Kyocera Document Solutions Inc.

Image forming apparatus, control method therefor, and program

An image forming apparatus connected to a charging apparatus that collects a fee includes an authentication unit that authenticates users and a display that displays a screen enabling users to select between logging into the image forming apparatus based on being authenticated or by paying a fee using the charging apparatus.. .
Canon Kabushiki Kaisha

Mobile device user validation method and system

A system including a mobile device, a user of the mobile device, a computer system having a telecommunication module for telephonically communicating with the mobile device, a user of the computer system, and a security server is provided. Also provided is a method, at a mobile device, of authenticating a user of the mobile device during a telephone call having the steps of obtaining a user authentication input, obtaining validation of the user authentication input, initiating a telephone call with, or receiving a telephone call from, the computer system, and if the user authentication input is successfully validated, sending a token generated for the telephone call with the computer system via data-over-voice frequency signaling during the telephone call thereby providing an indication that the user authentication input has been successfully validated to the computer system..
Mastercard International Incorporated

Non-intrusive user authentication system

A system for secure user authentication of a mobile electronic device includes a touch-based user interface of the mobile electronic device, a processor, and a computer-readable storage medium. The system presents a graphical user interface comprising a target location represented by a graphical indication, and receives an authentication code comprising a sequence of taps.
Google Inc.

Forward one-time-use physical access verification apparatus, system, and operation

A wireless apparatus controls physical access through a portal by forward verification of one-time-use codes submitted by a mobile application device. A system forward verifies a single physical access control code upon each successful physical access request.

Security routing system for use in iot apparatus

A routing system for use in an iot apparatus is proposed to include a router device. A control module of the router device determines whether to execute a routing process relating to an input message based on environment information, status information and a conflict management mechanism that relate to the router device.

Universal login authentication service

A system and method enables secure login at linked sites with a universal id (uid) and possibly different or same password to linked identities. In such logins, a user stays at the linked login page, and the login name and password are sent to a uid provider for authentication.
Badu Networks, Inc.

Resource-driven dynamic authorization framework

Embodiments concern a dynamic authorization framework. Security classification process (scp) is the process of classifying raw data, information extracted from raw data, content or code from security-value perspective.
Convida Wireless, Llc

Providing authentication information from an online system to a client device to allow the client device to execute an application associated with the online system

A client device including an application associated with an online system transmits information identifying the client device to the online system when the application is launched. For example, the client device communicates a phone number of the client device to the online system.
Venuenext, Inc.

Expanded ios® device capability

A method includes receiving a request from a host device to authenticate a device. The method further includes transmitting authenticating data to the host device.
Seagate Technology Llc

Remote communication system, remote communication method, and recording medium

A remote communication system authenticates each of a plurality of first communication terminals by using first authentication information of each of the plurality of first communication terminals, to establish a session between the plurality of first communication terminals; authenticates a second communication terminal by using second authentication information of the second communication terminal; transmits, to the second communication terminal, candidate pairing terminal information that indicates at least one candidate first communication terminal being capable of performing a pairing operation with the second communication terminal; accepts selection of a first communication terminal being selected as a target of the pairing operation; and performs the pairing operation between the selected first communication terminal and the second communication terminal, to enable the second communication terminal to join the session using resources of the selected first communication terminal.. .

Fabric assisted identity and authentication

Context-based authentication in a secure network comprised of multiple interconnected programmable devices is described. One technique includes receiving, from a programmable device, identity data and contextual data associated with a current authentication of a user attempting to access a secure network.
Mcafee, Inc.

Electronic apparatus, control authority authentication method thereof and user terminal apparatus

An electronic apparatus is provided. The electronic apparatus includes a communicator configured to communicate with a guest terminal apparatus requesting control authority for the electronic apparatus and an owner terminal apparatus having approval authority for a control of the electronic apparatus, a storage, and a processor configured to transmit an approval request for the control authority request to the owner terminal apparatus when the control authority request is received from the guest terminal apparatus, generate authentication information for control authority authentication of the guest terminal apparatus to store the generated authentication information in the storage and to transmit the generated authentication information to the guest terminal apparatus, when an approval for the approval request is received from the owner terminal apparatus, and match received authentication information and the stored authentication information to each other and to determine whether a control command is performed, when the authentication information and the control command for the electronic apparatus are received from the guest terminal apparatus..
Samsung Electronics Co., Ltd.

Dual authentication using a password card

A method and apparatus for providing and processing two-factor authentication using a password card. There is a need to increase security during the authentication process.

Relay apparatus, communication apparatus and relay method

A relay apparatus is connected to a communication apparatus, a service providing apparatus and a browser-equipped apparatus. The relay apparatus includes: a registering unit registering provisional registration information, the provisional registration information being used in an authentication procedure performed between the service providing apparatus and the browser-equipped apparatus; an acquiring unit acquiring permission information representing that use of the service is permitted, the permission information being issued by the service providing apparatus in the authentication procedure; a communication unit transmitting the provisional registration information to the browser-equipped apparatus; a receiving unit receiving input information transmitted from the communication apparatus, the input information being generated in response to the provisional registration information; and a communication unit transmitting the permission information to the communication apparatus which has transmitted the input information if the receiving unit receives the input information..
Brother Kogyo Kabushiki Kaisha

Method for establishing protected electronic communication, secure transfer and processing of information among three or more subjects

A method of establishing protected electronic communication, secure transfer and processing of information among three or more subjects in which, at first, a first secure authenticated channel is created using an authentication system between a first subject and a second subject, and this channel is used by the first subject, in co-operation with the second subject, to create an authentication object stored on the second subject and provided with authentication object methods, whereas the first subject configures methods of authentication object by assigning to each method of the authentication object a rights control information for at least one other subject and optionally also a rights control information for the first subject to use at least one method of the authentication object, and then the first secure authenticated channel is closed.. .
Aducid S.r.o.

Multi-level user device authentication system for internet of things (iot)

The connected devices represent individual targets, for the cyber-criminals who 20 would hack the devices to retrieve the secure information of the users. Such insecurities about the iot, devices and the system are eliminated by using the multiple level user authentication system which is described in the present invention..

Methods and systems for user authentication

Methods and systems for passwordless authenticating of a user are provided. A first request to access a first content is received from a first user of a first device.
Dashlane, Inc.

Method and system for providing a pre-launched virtual desktop session

The present disclosure relates to a method and system for providing a pre-launched virtual desktop session by a smart scheduling server. The smart scheduling server predicts a pre-launch time to launch a virtual desktop session for a user based on a login pattern of the user monitored for a pre-defined duration, initiates a pre-launch session for the user based on the predicted pre-launch time, where the initiation comprises performing a plurality of actions for launching the virtual desktop session for the user.
Wipro Limited.

Detecting and mitigating forged authentication object attacks using an advanced cyber decision platform

A system for detecting and mitigating forged authentication object attacks is provided, comprising an authentication object inspector configured to observe a new authentication object generated by an identity provider, and retrieve the new authentication object; and a hashing engine configured to retrieve the new authentication object from the authentication object inspector, calculate a cryptographic hash for the new authentication object, and store the cryptographic hash for the new authentication object in a data store; wherein subsequent access requests accompanied by authentication objects are validated by comparing hashes for each authentication object to previous generated hashes.. .
Fractal Industries, Inc.

Method of securing authentication in electronic communication

A method of securing authentication in electronic communication between at least one user authentication mechanism and at least one server authentication mechanism, wherein primary authentication is performed in the first step, and during the primary authentication a secondary authentication secret is created and shared between the user authentication and the server authentication mechanisms and is valid only for the given authentication transaction, and the secondary authentication secret is subsequently used as an input for a cryptographic transformation performed by the user authentication mechanism separately on each authentication vector element while creating the first authentication vector product, wherein authentication vector (av) is an ordered set of authentication vector elements (ave)(i)), wherein the first authentication vector product is transferred from the user authentication mechanism to the server authentication mechanism and is evaluated by the server authentication mechanism using the secondary authentication secret.. .
Aducid S.r.o.

Secure plug and play configuration of wireless distribution system (wds) wi-fi range extenders

A cloud-based onboarding server detects a network change and facilitates an onboarding process for a new access point. An ssid and authentication credentials for an existing wi-fi channel are sent over a temporary wi-fi channel using a preconfigured ssid and passphrase generated by both the new access point and the master access point.
Cloudmondo, Inc.

Authentication target apparatus, communication system, communication method, and program

An authentication target apparatus is an authentication target apparatus that obtains authentication from an authentication apparatus on the basis of a response code generated on the basis of a received challenge code and includes a control unit configured to perform a limiting process limiting the authentication performed with the authentication apparatus when a number of times the authentication is performed with the authentication apparatus exceeds a predetermined number of times within a predetermined period beginning with a period after transmission of a response code.. .
Honda Motor Co., Ltd.

Cloud authentication of layer 2-connected member devices via an ip-connected active device

Techniques for enabling cloud authentication of layer 2-connected member devices via an ip-connected active device are provided. In one set of embodiments, the member device can transmit, to the active device, a request to authenticate the member device with a cloud management platform.
Brocade Communications Systems, Inc.

Token security on a communication device

Techniques for enhancing the security of storing sensitive information or a token on a communication device may include sending a request for the sensitive information or token. The communication device may receive a session key encrypted with a hash value derived from user authentication data that authenticates the user of the communication device, and the sensitive information or token encrypted with the session key.

Systems and methods for detecting data insertions in biometric authentication systems using encryption

Systems and methods of detecting an unauthorized data insertion into a stream of data segments extending between electronic modules or between electronic components within a module, wherein a data stream is encrypted with a secure encryption key for transmission, then decrypted upon receipt using a corresponding secure decryption key to confirm data transmission integrity.. .
Fotonation Limited

Blockchain-assisted public key infrastructure for internet of things applications

An approach is disclosed for registering and authenticating internet of things (iot) devices. In one embodiment, an installation device receives, from an iot device, an identifier (id) and a hash of a public key, where the iot device itself generates the id, the public key, and a private key.
Vmware, Inc.

Assigning user identity awareness to a cryptographic key

Various systems and methods for performing cryptographic operations based on an authentication policy are discussed. In an example, an authentication policy for implementing a user authentication factor (or multiple factors) may be deployed at a client computing device to control generation and use of a cryptographic key.
Intel Corporation

Quantum tokens

Secure, semi-classical authentication schemes are presented. An authentication token is generated by applying a pre-determined measurement to a plurality of random quantum states to obtain a sequence of classical measurement outcomes.
Cambridge Quantum Computing Limited

Techniques for secure message authentication with unified hardware acceleration

Techniques and computing devices for secure message authentication and, more specifically, but not exclusively, to techniques for unified hardware acceleration of hashing functions, such as sha-1 and sha-256 are described. In one embodiment, for example, an apparatus for hardware accelerated hashing in a computer system mat include at least one memory and at least one processor.
Intel Corporation

Efficient cryptographically secure control flow integrity protection

Embodiments include a computing processor control flow enforcement system including a processor, a block cipher encryption circuit, and an exclusive-or (xor) circuit. The control flow enforcement system uses a block cipher encryption to authenticate a return address when returning from a call or interrupt.
Intel Corporation

Priority actuation system

A system and method for priority actuation is provided. The system and method comprise a priority button.

Systems and methods for detecting data insertions in biometric authentication systems utilizing a secret

Systems and methods of detecting an unauthorized data insertion into a stream of data segments extending between electronic modules or between electronic components within a module, wherein a secret embedded into the data stream is compared to a replica secret upon receipt to confirm data transmission integrity.. .
Fotonation Limited

Management server that communicates with terminal device and purchase server

A management server receives, from a terminal device, authentication information of a target user and first relationship information related to a target printer. In response to transmission of the authentication information to a purchase server, the management server receives, from the purchase server, m number of pieces of color-material identification information identifying m number of types of color material that have been previously purchased by the target user.
Brother Kogyo Kabushiki Kaisha

Method and system for purchase precheck

Methods, apparatus and systems, the method including receiving, by a processor of a consumer mobile device, a request from a user for a purchase pre-authorization; receiving, by a biometric input component of the consumer mobile device, biometric data that uniquely identifies the user; sending a representation of the biometric data to a pre-purchase authentication server; receiving, by the mobile device processor from the pre-purchase server, a message including a unique code, the unique code being associated with a payment card account of the user and valid to use to authorize future purchase transactions using the payment card account for a finite period of time and a specific amount of funds of the payment card account; and displaying, on a display screen component of the consumer mobile device in response to the request, the unique code.. .
Mastercard International Incorporated

Smart card multi-factor authentication device

A dynamic transaction card may be paired with a user application executed on a user device card to facilitate multi-factor authentication of a user by utilizing the dynamic transaction card as a physical token. Various communication technologies may be utilized to create a connection between the dynamic transaction card and the user device application which may include wireless connections and physical connections.
Capital One Services, Llc

Smart card secure online checkout

Wireless communication technologies, a dynamic transaction card, and a mobile application may be utilized to facilitate multi-factor authentication and secure electronic checkout of any website. A wireless connection between a dynamic transaction card and a user device may be utilized to authenticate a user.
Capital One Services, Llc

Rf payment via a mobile device

A nontraditional transaction device, for example a mobile device, may be employed to complete a transaction. The mobile device may utilize radio frequency (rf) communication and/or authentication to facilitate completion of a transaction.
Liberty Peak Ventures, Llc

Systems and methods for detecting data insertions in biometric authentication systems using pseudo data segments

Systems and methods of detecting an unauthorized data insertion into a stream of data segments extending between electronic modules or between electronic components within a module, wherein a pseudo data segment included in the data stream upon transmission is detected upon receipt to confirm data transmission integrity.. .
Fotonation Limited

Communicating information between applications executing on a client device via authentication information generated by an application

An application associated with an online system executing on a client device identifies an additional application on the client device with which the application may exchange information. To exchange information between the application and additional application, the online system receives a request for authentication information from the application that identifies the additional application and a user of the application.
Venuenext, Inc.

Method and system for interoperable identity and interoperable credentials

Method, system, and programs for interoperable identity and interoperable credentials. In one example, an authentication request is received that originated from an online user in connection with an application having a first loa.
Drfirst.com, Inc.

System for device authentication

Communication bus enables devices to communicate and exchange information and control signals. There is a growing concern over the security of such types of buses.
Sital Technology And Hardware Engineering (1997) Ltd.

Identity authentication using biometrics

A service request is received by a terminal device. First biometric authentication information of a user associated with the service request is collected.
Alibaba Group Holding Limited

Facial recognition authentication system including path parameters

Systems and methods for enrolling and authenticating a user in an authentication system via a user's camera of camera equipped mobile device include capturing and storing enrollment biometric information from at least one first image of the user taken via the camera of the mobile device, capturing authentication biometric information from at least one second image of the user, capturing, during imaging of the at least one second image, path parameters via at least one movement detecting sensor indicating an authentication movement of the mobile device, comparing the authentication biometric information to the stored enrollment biometric information, and comparing the authentication movement of the mobile device to an expected movement of the mobile device to determine whether the authentication movement sufficiently corresponds to the expected movement.. .
Facetec, Inc.

System and supplying security information

A wearable device having one or more processors configured to receive one or more signals representative of biometric parameter(s) and sensed presence of a user. The one or more processors configured to compare the biometric parameter to a stored user parameter for authentication of the user.
Tokenize, Inc.

Method and electronic device for determining whether to allow user access

The disclosure relates to biometric authentication of a user, in particular, to a method for determining whether to allow user access based on a user input at electronic device, the method comprising: detecting a touch by an object on a touch-sensitive area of an electronic device, in which a plurality of electrode pairs are mounted, the plurality of electrode pairs including a first set of electrode pairs and a second set of electrode pairs; determining a subset of the first set of electrode pairs that are in contact with a part of the object; receiving electrical signals from each pair of the determined subset; calculating impedance values of respective parts of the object on the basis of the received electrical signals; determining a ratio of the calculated impedance values for each pair of electrode pairs disposed on mutually perpendicular lines from said the determined subset, and, if a first impedance value for one electrode pair included in electrode pairs disposed on the mutually perpendicular lines is greater than a second impedance value for the other electrode pair in the electrode pairs, the ratio of the calculated impedance values is a ratio of the first impedance to the second impedance; selecting two pairs of electrode pairs disposed on the mutually perpendicular lines with the maximum ratio of the calculated impedance values; and if the maximum ratio exceeds a predetermined threshold, identifying the object as a living tissue object, and allow access on the electronic device.. .
Samsung Electronics Co., Ltd.

Smart watch and controlling same

Disclosed are a smart watch comprising a fingerprint sensor for user authentication, and a method for controlling the same. The present invention provides a smart watch and a method for controlling the same, the smart watch comprising: a case; a display unit which is positioned on the case and is configured to display the current time and a variety of information; a bezel which is provided on the case and is configured to surround the display unit; a fingerprint sensor which is provided on the bezel and is configured to simultaneously recognize a plurality of fingerprints which are different from each other; and a control device which is configured to control the operation on the basis of the fingerprints recognized by the fingerprint sensor..
Lg Electronics Inc.

Method and system for preventing unauthorized computer processing

The invention relates to a system and method for preventing a protected computing device from executing unauthorized processor commands. A data entry database of the system stores encoded data entered by a human user as data entry events.

Logical port authentication for virtual machines

A computer system authenticates a logical port for a virtual machine. A logical network maintains logical network data for a logical switch having the logical port.
Nicira, Inc.

Authentication system and method thereof

A haptic-based identification, authentication, authorization, and context aware authorization system usable with a touch-enabled device having a touch screen haptic interface, touch-enabled device receiving a plurality of inputs during interaction with a user which includes a storage space to store a first plurality of inputs corresponding to an authenticated user and a central processing unit (cpu) in communication with the storage space and the touch-enabled device to compare the first plurality of inputs with a second plurality of inputs inputted by the user, wherein the cpu authenticates the user to the touch-enabled device when the inputted second plurality of inputs is determined to be similar to the first plurality of inputs.. .

Systems and methods to determine safe zones and safe routes of a device

Systems and methods to generate safe zones and safe routes associated with a device are disclosed. These safe zones and safe routes can be used to map complicated location behavior into location behavior scores that can be applied systematically to tracking and authentication applications..
Athentek Innovations, Inc.

Wireless authentication device for saddle-type vehicle

A wireless authentication device includes a first operating input device, a locking mechanism, and a controller. The first operating input device receives an operation of a power engine to a startable state by being shifted from a first position to a second position.
Kawasaki Jukogyo Kabushiki Kaisha

Vehicle based electronic authentication and device management

Systems and methods for an authentication system include determining that a first user device is located within a vehicle, where the first user device is associated with a first user. Vehicle authentication information is received from the vehicle.
Paypal, Inc.

System, method and computer readable medium for message authentication to subscribers of an internet service provider

An internet service provider (isp) is configured to provide notification messages such as service updates to subscribers via redirected web pages. In order for the web pages to be treated as originating from the isp, the isp provides a shared secret in the browser message.
Sunglory Beheer B.v.

Method and device for managing wireless access point

The present application aims to provide a method and device for managing a wireless access point (ap), so as to address the problem of the difficulty in identifying the actual owner of the wireless ap when multiple users share the password of the wireless ap. In particular, in the technical solution provided by the present application, wireless ap-related first authentication information of a first user is acquired, and then owner information of a wireless ap can be automatically determined according to ownership related information of the wireless ap and the first authentication information, thereby conveniently and efficiently determining an owner of the wireless ap.
Shanghai Lianshang Network Technology Co., Ltd.

Method for network traffic routing

A method for network traffic routing for a user equipment of a wireless communication system comprises connecting to a small cell of the wireless communication system, transmitting an user identity information to the small cell, receiving an authentication result from the small cell, and obtaining a local service via the small cell and a local network connecting to the small cell without going through a core network connecting to the small cell if the authentication result indicates that the user equipment is qualified for so.. .
Sercomm Corporation

Method of replacing at least one authentication parameter for authenticating a security element and corresponding security element

A method of replacing an authentication parameter for authenticating a security element co-operating with a terminal includes storing in the security element a first authentication parameter; transmitting to a mobile network operator the first authentication parameter for the operator to record it in its authentication system; on occurrence of an event, having a remote platform transmit to the security element an indicator informing the security element that it is authorized to replace the first authentication parameter with a second authentication parameter if its authentication fails; on occurrence of the event, having the entity transmit to the operator a second authentication parameter to replace the first authentication parameter; and in the event of subsequent failure of the security element to connect to the mobile network and if the indicator is present at the security element, replacing the first authentication parameter with the second authentication parameter at the security element.. .
Gemalto Sa

Systems and methods for initial authentication of wireless communication

Systems and methods are provided that may be implemented to use angle of arrival (aoa) of a signal transmitted between two bluetooth low energy (ble) wireless devices to initially authenticate a connection between the two ble devices. In one example, bonding or pairing with a first ble device may be restricted to only those other ble devices having an antenna currently positioned to transmit a signal to the first ble device from an allowed direction and within a predefined permitted range of aoa relative to the first ble device..
Silicon Laboratories Inc.

Processing apparatus, mobile device, and non-transitory computer readable medium storing authentication request program

A processing apparatus includes: a process execution unit that executes a process according to a user instruction; a first communication unit that performs wireless communication with a mobile device moved in a predetermined communication area; a recognition unit that recognizes existence/non-existence of use intention; an authentication processing unit that executes a user authentication process in cases where the first communication unit receives a user id maintained in the mobile device and the recognition unit recognizes that the user who possesses the user id attempts to cause the process execution unit to execute the process; and a process execution permission unit that permits the process execution unit to execute the necessary authentication process in a case where the reception user id is recognized as the user id possessed by the user who has the authority to cause the process execution unit to execute the necessary authentication process.. .
Fuji Xerox Co., Ltd.

Systems and methods for device specific security policy control

A device specific security policy system and method is described. Certain embodiments provide for differentiated levels of authentication, security, monitoring, and/or protection for iot devices using device and/or class specific security policies.
University Of North Texas

Detection system, detection apparatus, detection method, and detection program

A detection apparatus extracts an account and a source address of the account from authentication information obtained from an authentication apparatus configured to perform user authentication, groups accounts for each of time slots at predetermined time intervals and each of source addresses in accordance with a timestamp and the source address of the account, and extracts an account group from which duplication of an identical account in an identical group has been excluded. Subsequently, the detection apparatus calculates the number of duplicate accounts among the extracted account groups.
Nippon Telegraph And Telephone Corporation

Data packet transmission method, apparatus, and system, and node device

Embodiments of the present disclosure disclose a data packet transmission method and apparatus. The data packet transmission method includes: obtaining data type information and data packet identification information of a data packet; calculating the data type information and the data packet identification information by using a preset mac algorithm, to obtain a first message authentication code; and sending the data packet that includes the data type information and the first message authentication code to a node device, so that the node device checks the data type information according to the first message authentication code.
Huawei Technologies Co., Ltd.

Use of personal device for convenient and secure authentication

The present invention relates to a method to authenticate a user using an authenticator at an access device using another registered device named personal device, said authenticator being stored by the access device after registration of the personal device comprising a double encryption using an access device's secret key and a personal device's public key to be retrieved at each request of authentication received from the personal device, encrypted using a session key and sent with the session key encrypted using the personal device's public key to the personal device for partial decryption using the decrypted session key and the personal device's private key, re-encryption using the session key and sending back to the access device for total decryption of the authenticator, using the session key and the access device's secret key, and use of the thus decrypted authenticator to authenticate at the access device.. .
Gemalto Inc.

User friendly two factor authentication

A user friendly two factor authentication method and system for a user is disclosed. In an embodiment the system includes a user device, an authentication server, a network interconnecting the user device and authentication server and software on the user device and authentication server that cooperates to first register the user by storing first key share k1 of an authentication key k on the user device and storing a second key share k2 of k blinded by a user chosen password on the authentication server, and then authenticate the user by implementing a protocol where the user's knowledge of the password and the possession of the user device is used to derive the key k for authentication.

Network authorization in web-based or single sign-on authentication environments

Systems and methods for network authorization are described herein. An example method can include receiving a user credential from a host device connected to a network, authenticating the user credential, and in response to authenticating the user credential, determining an authorization policy associated with the host device.
Cisco Technology, Inc.

Authenticating for an enterprise service

Systems, methods, and software can be used to provide authentication for an enterprise service. In some aspects, an identity server receives an authentication request.
Blackberry Limited

System and biometric protocol standards

Secure communications are provided between a user computing device and a server computing device. An enrollment request is received from a user computing device that is configured via a distributed client software application, and is processed.
Veridium Ip Limited

Companion out-of-band authentication

Methods and apparatuses for user authentication are described. In one example, authenticating a user includes establishing a first wireless communication link between a headset and a first computing device and a second wireless communication link concurrent with the first wireless communication link between the headset and a second computing device.
Plantronics, Inc.

Secure managing the multi-factor authentication data of a user

A system for managing multi-factor authentication of a user includes: one or more source components for obtaining multi-factor authentication data by one or more of: receiving multi-factor authentication data via a network; generating multi-factor authentication data using an algorithm, and a user providing multi-factor authentication data; a routing component for associating the multi-factor authentication codes from the one or more source components with an appropriate user account; a database comprising multi-factor authentication data wherein components of the multi-factor authentication data are stored in association with a particular user account; and one or more delivery components for providing the multi-factor authentication data to a user on a user device.. .

Post-connection client certificate authentication

A network access control (nac) device detects a connection of an endpoint device at a network switch coupled to a network and restricts access of the endpoint device to prevent the endpoint device from accessing resources of the network. The nac device establishes a connection with the endpoint device, validates a client certificate corresponding to the endpoint device to authenticate the endpoint device as a corporate device and grants the endpoint device access to the resources of the network..
Forescout Technologies, Inc.

System and methods for weak authentication data reinforcement

Systems and methods for weak authentication data reinforcement are described. In some embodiments, authentication data is received in a request to authenticate a user.
Ebay Inc.

Approach for accessing third-party content collaboration services on interactive whiteboard appliances using cross-license authentication

An approach for managing collaboration on iwbs allows users of different third-party collaboration services to participate in collaboration meetings on iwbs. The approach allows the users to use collaboration functionality provided by iwbs, such as annotation, and to communicate with each other, even though the users are using different third party collaboration services.
Ricoh Company, Ltd.

Dynamic data protection system

A dynamic data protection system may include a data management server includes a processor and a non-transitory memory device storing instructions that cause the data management server to receive, via a network connection from a user device, a request for access to data stored on an organization's network. The data management server may then communicate user authentication information associated with the received request.
Bank Of America Corporation

Techniques for providing authentication information to external and embedded web browsers

Representative embodiments set forth herein disclose techniques for enabling a client application to supplement its features by utilizing the functionalities provided by a web browser in a secure manner. According to some embodiments, the client application can authenticate with an authentication server to establish a trusted connection between the client application and the authentication server.
Apple Inc.

Dynamic data protection system

A dynamic data protection system may include a data management server includes a processor and a non-transitory memory device storing instructions that cause the data management server to receive, via a network connection from a user device, a request for access to data stored on an organization's network. The data management server may then communicate user authentication information associated with the received request.
Bank Of America Corporation

Challenge response authentication for self encrypting drives

Various embodiments are directed to a system for accessing a self-encrypting drive (sed) based on a blind challenge authentication response mechanism (bcram). An sed may be authenticated within a system, for example, upon resuming from a sleep state, based on a challenge generated within the sed, signed using a private key by a trusted execution environment (tee) and authenticated using a corresponding public key within the sed..
Intel Corporation

Range constrained device configuration

Disclosed in some examples are methods, systems, and machine readable mediums for secure, low end-user effort computing device configuration. In some examples the iot device is configured via a user's computing device over a short range wireless link of a first type.

Hardened voip system

A hardened voip system is presented that includes secure push-to-talk voice functionality. Through the addition of encryption, authentication, user filtering, and integration with new and existing lmr systems, a secure voice platform ensures malicious software, unauthorized access, and brute force security attacks will not compromise the voice communications of the system.
Clever Devices Ltd.

Optimized code table signaling for authentication to a network and information system

In various embodiments, a system comprising a network interface, a processor, and a non-transient memory medium operatively coupled to the processor is disclosed. The memory medium is configured to store a plurality of instructions configured to program the processor to receive a digital bit stream, transform the digital bit stream to an encoded digital bit stream.
Agilepq, Inc.

Synthesized voice authentication engine

A system for creating a synthetic voice identifier may include a plurality of synthesized voice authorization (sva) devices and a biometric combinatory device (bcd). The svas may be communicatively coupled to the bcd via a network and may communicate utilizing a markup language.
Bank Of America Corporation

Synthesized voice authentication engine

A system for creating a synthetic voice identifier may include a plurality of synthesized voice authorization (sva) devices and a biometric combinatory device (bcd). The svas may be communicatively coupled to the bcd via a network and may communicate utilizing a markup language.
Bank Of America Corporation

Gateway-based anti-theft security system and method

Improved systems and techniques are disclosed for controlling the security states of anti-theft security systems such as product display assemblies using security fobs. The tasks relating to fob authentication are offloaded to a computer system, and these authentications can be based on identifiers for the different security fobs.
Mobile Tech, Inc.

Ultraviolet fluorescent authentication

A solution for authenticating an article using a fluorescence signature emitted by the article in response to ultraviolet light is described. The article can include a light activated region that includes particles that can emit fluorescent radiation in response to being radiated with ultraviolet light.
Sensor Electronic Technology, Inc.

Time-limit door access control management system with guest authentication, and method thereof

The present disclosure illustrates a time-limit door access control management system with guest authentication and a method thereof. In the system, guest information is created in a management server through a client.
Inventec Corporation

Composite security marking

The present disclosure relates to the field of anti-counterfeit protection of products. Specifically, the disclosure is directed to a composite security marking for a physical object, in particular to an anti-counterfeit product marking.
Merck Patent Gmbh

Composite security marking

The present invention relates to the field of anti-counterfeit protection of products. Specifically, the invention is directed to a composite security marking for a physical object, in particular to an anti-counterfeit product marking.
Merck Patent Gmbh

Payment facilitation method and system

There is provided a client device, method and system for facilitating a payment from a customer to a merchant. Payment is carried out upon use of voice data for authentication of a user and subsequent transmission of a payment authorization message..
Mastercard Asia/pacific Pte. Ltd.

Method and system for leveraging active authentication for third party communications

A method for supplying payment credentials in a secondary payment opportunity includes: receiving a first data signal from a first computing device superimposed with at least payment credentials associated with a transaction account; electronically transmitting a second data signal to a second computing device superimposed with a payment opportunity request; receiving a third data signal from the second computing device superimposed with at least one payment opportunity; electronically transmitting a fourth data signal superimposed with the at least one payment opportunity; receiving a fifth data signal superimposed with an indication of one of the at least one payment opportunity; and electronically transmitting a sixth data signal to the second computing device superimposed with at least the indicated payment opportunity and the payment credentials.. .
Mastercard International Incorporated

Method, system, and mobile recruitment of on-demand temp workers

An application system comprises a client computing device, a temporary worker computing device, an online system connecting the computing devices, and a mobile recruitment vehicle. The vehicle is configured to facilitate conducting mass face-to-face recruiting of temporary workers, making the temporary workers readily available to clients for on-demand booking.

Smart card including fingerprint detection device and driving method thereof

A smart card including a fingerprint detection device, the smart card including: a central processing unit; a microcontroller unit selectively connected to the central processing unit to perform fingerprint authentication on the basis of a fingerprint sensing signal received from the fingerprint detection device; and an auxiliary chip connected to the central processing unit to be activated if a result of the fingerprint authentication is successful.. .
Crucialtec Co., Ltd.

Light source modulation for iris size adjustment

Use of pupillary response to visible light for iris authentication is disclosed. One example involves (a) capturing an initial image of an eye including an inner circular boundary between a pupil region and an iris region and an outer circular boundary between the iris region and a sclera region, (b) determining a first size measurement indicative of the inner circular boundary, (c) responsive to at least the first size measurement, modulating one or more visible light sources to output visible light toward the eye of the user, (d) capturing a subsequent image of the eye of the user during a period of pupillary response, (e) obtaining an iris data record of the user, and (f) comparing the iris data record of the user to one or more registered iris data records to authenticate the user..
Qualcomm Incorporated

Iris verification method

An iris verification method is provided. According to the iris verification method, it is possible to determine whether the iris to be authenticated is a real human iris during an iris authentication process.
3e Co., Ltd

Biometric authentication apparatus, biometric authentication system and biometric authentication method

A processor obtains characteristics information of a biometric image captured while casting first or second illumination light onto an authentication target. The first illumination light includes light of a first wavelength, and the second illumination light includes light of the first wavelength and light of a second wavelength.
Fujitsu Limited

Low power data generation for iris-related detection and authentication

Sensing of scene-based occurrences is disclosed. In one example, a vision sensor system comprises (1) dedicated computer vision (cv) computation hardware configured to receive sensor data from at least one sensor array and capable of computing cv features using readings from multiple neighboring sensor pixels and (2) a first processing unit communicatively coupled with the dedicated cv computation hardware.
Qualcomm Incorporated

Light irradiation method and light irradiation apparatus

An apparatus is for irradiating light for obtaining a face image of an authentication target. The apparatus includes a first light source unit having a first glancing angle, a second light source unit having a second glancing angle greater than the first glancing angle, and an external light information acquisition unit configured to acquire environment information on an external light other than the first light source unit and the second light source unit for the authentication target.
Suprema Inc.

Biometric identity authentication system

A system for authenticating the identity of a user at a transaction terminal including a fingerprint scanner and a keypad, both operably connected to a microcontroller. The microcontroller is integrated with a transaction terminal and is adapted to allow a user to access the transaction terminal upon authentication of the identity of the user.

User authentication using iris sector

Sector-based iris authentication is disclosed. One example involves (a) capturing an image of an eye of the user, the image including an iris region, (b) identifying a plurality of sectors of the iris region within the image, (c) determining a measure of distinctiveness for each sector of the iris region, (d) selecting one or more sectors from the plurality of sectors of the iris region based on the determined measure of distinctiveness for the each sector of the iris region, the selected one or more sectors being fewer in number than the plurality of sectors of the iris region, and (e) comparing the selected one or more sectors to one or more registered iris data records..
Qualcomm Incorporated

Reader device for reading a marking comprising a physical unclonable function

The present disclosure relates to the field of anti-counterfeit protection of products. Specifically, the disclosure is directed to a method of reading with a reader device a marking comprising a physical unclonable function, puf, and a corresponding reader device.
Merck Patent Gmbh

Reader device for reading a marking comprising a physical unclonable function

The present invention relates to the field of anti-counterfeit protection of products. Specifically, the invention is directed to a method of reading with a reader device a marking comprising a physical unclonable function, puf, and a corresponding reader device.
Merck Patent Gmbh

Hardware-based device authentication

A domain identifier of a first domain of a plurality of domains is identified, the domain identifier included in a domain certificate received from the first domain. A first permanent hardware identifier set as a fuse key value embedded in hardware of the device during fabrication is identified.
Mcafee, Llc

Background enrollment and authentication of a user

An electronic device can include a processing device operatively connected to a biometric sensing device. The biometric sensing device may capture a biometric image each time a user interacts with the electronic device.
Apple Inc.

Biometric authentication of a user

The present invention relates to an electronic device. In particular, the present invention relates to an electronic device comprising a first and a second biometric sensor and processing circuitry arranged to authenticate the user of the electronic device.
Fingerprint Cards Ab

Multimode image and spectral reader

A system associated with authentication of an object related to a multi-mode marker using a processing device. The processing device performs operations that include detecting a signal associated with a multi-mode marker related with the object; assigning a digital code based on the detected signal associated with the multi-mode marker; and identifying the object based on the digital code related to authentication of the object.
Apdn (b.v.i.) Inc.

Portfolio creation system

Provided is a portfolio creation system capable of accumulating activity records, summarizing the accumulated activity records as a portfolio, and preventing pretension of a third party. The portfolio creation system includes an approval storage table (group user table 211) that stores an approval determined by an adviser who determines approval or disapproval of registration of a user, for each user, an authentication unit that prohibits use of the user who is not given the approval and allows use of an approved user who is given the approval, a user table (205) that stores information relating to the approved user, an activity table (206) that stores the activity record which is a record of an activity of the approved user, an activity record display unit that displays the activity record in a selectable form, and a portfolio creation unit that creates the portfolio based on the information relating to the approved user and the selected activity record..
Samadhi Co., Ltd

Integrated services for forms generation and maintenance on cloud

Various embodiments of systems and methods for integrated services for form generation and maintenance on cloud are described herein. The method includes receiving a request for a form-related service from a client.
Sap Se

Non-volatile storage device with physical authentication

A non-volatile memory device uses physical authentication to enable the secure programming of a boot partition, when the boot partition is write protected. This physical authentication can also be used to enable other features/functions..
Western Digital Technologies, Inc.

Liquid containing polymer marker, use of a polymer marker as authentication tool, and for detecting a polymer marker dissolved in a liquid

Iv. Observing the electromagnetic radiation emitted in response to the exciting irradiation of step iii..

Wireless authentication device for saddle-type vehicle

A wireless authentication device for a saddle-type vehicle performs authentication through wireless communication with a mobile terminal carried by a user. The wireless authentication device for a saddle-type vehicle includes a first operating input device, a light-emitting and notification part, and a controller.
Kawasaki Jukogyo Kabushiki Kaisha

Systems for activating and/or authenticating electronic devices for operation with footwear and other uses

Articles of footwear and footwear systems include modules, e.g., for sensing physical and/or physiological characteristics associated with use of the footwear or for performing other functions. Such systems and methods may use physical or other interaction(s) between the module and the article of footwear for activating and/or deactivating the module and/or sensing devices included with the module, for confirming whether the module and footwear are authorized for use with one another, and/or for automatic data algorithm selection methods.
Nike, Inc.

Methods and systems of establishing communication between devices

A representative electronic device comprises an audio/visual device, a wireless device, a processing device, and memory. The audio/visual device transmits either audio or visual signals, or both.
American Megatrends, Inc.

Communication method and related apparatus

A communication method and a related apparatus are disclosed. The method is performed by an mme, including: receiving an attach request message from an enb, where the attach request message is used to request to attach to a network, and the attach request message includes an identity of the ue; sending, to an hss according to the attach request message, an authentication data request message including the identity of the ue; receiving an authentication data response message including an av from the hss, where the authentication data response message is used to indicate that the authorization on the ue succeeds; and determining, according to the authentication data response message, that the ue is allowed to perform a v2x service, and performing authentication on the ue according to the av.
Huawei Technologies Co., Ltd.

System and authentication of a communication device

A system and method for authentication of a communication device is disclosed. A system that incorporates teachings of the present disclosure may include, for example, an authentication system can have a controller element that receives from a communication device by way of a packet-switched network an authentication request comprising a first identification (id) of a virtual gateway and a second id of the communication device.
At&t Intellectual Property I, L.p.

Regulating operation of 60 ghz devices

Embodiments of a wireless station and method for controlling use of the 60 ghz band are described. The station (sta) can include memory and processing circuitry.
Intel Ip Corporation

Communication method, base station and user terminal

A communication method according to an embodiment comprises: generating, by a base station, authentication information to be used for authentication processing between a wlan apparatus and a radio terminal; transmitting, by the base station, a wt addition request to the wlan apparatus on the xw interface, wherein the wt addition request includes the authentication information and a wlan media access control (mac) address of the radio terminal; receiving, by the wlan apparatus, the wt addition request from the base station on the xw interface; transmitting, by the base station, an radio resource control (rrc) message including information for deriving the authentication information, to the radio terminal; receiving, by the radio terminal, the rrc message from the base station; deriving, by the radio terminal, the authentication information based on the information included in the rrc message; and performing, by the radio terminal, the authentication processing by using the authentication information.. .
Kyocera Corporation

Processing terminal access to 3gpp network and apparatus

A processing method for terminal access to a 3gpp network is provided. A ue sends an access request message to a core network device on the 3gpp network, and the core network device sends an unauthorized access message to the ue after determining that the ue has no permission to access the 3gpp network.
Huawei Technologies Co., Ltd.

Access authentication method and apparatus

The present disclosure provides an access authentication method and apparatus, so as to resolve prior art problems of a relatively long authentication time and high signaling overheads. The method includes: determining, by a cellular network access device, a key identifier; and sending, by the cellular network access device, the determined key identifier to ue and a non-cellular network access device, where the key identifier is used to instruct the user equipment ue to perform security authentication with the non-cellular network access device based on a key corresponding to the key identifier..
Huawei Technologies Co., Ltd.

Hearing device system, devices and creating a trusted bond between a hearing device and a user application

Methods and devices are disclosed. A method, performed in a user application, of creating a trusted bond between a hearing device and the user application is disclosed, wherein the method comprises obtaining first authentication material; transmitting a first authentication request comprising a first authentication type identifier and first authentication data to the hearing device; receiving an authentication response comprising an authentication key identifier; storing an authentication key and the authentication key identifier, wherein the authentication key is based on the first authentication material; and connecting the user application to the hearing device using the authentication key and the authentication key identifier..
Gn Hearing A/s

Message protection method, and related device, and system

The present application discloses, among others, a message protection method performed by user equipment (ue). In one method an authentication and key agreement request message sent by an sgsn is received using a gmm/sm protocol layer of the ue.
Huawei Technologies Co., Ltd.

Hearing devices, user accessory devices and updating a hearing device configuration

This disclosure provides a method, performed at a hearing device, for updating a hearing device configuration at the hearing device of a hearing system. The hearing system comprises the hearing device, a fitting device configured to be controlled by a dispenser and a server device.
Gn Hearing A/s

Control of internet browsing in a secure environment

A system and method are disclosed for providing internet access to residents of a controlled-environment facility. There are significant dangers associated with provide such residents with internet access due to their criminal history.
Global Tel*link Corp.

System and automatic wireless network authentication

A system and method are described for connecting an iot device to a wireless router and/or access point. For example, one embodiment of a system comprises: an internet of things (iot) hub to collect network credentials required to connect with a wireless access point or router; the iot hub to securely store the network credentials in a local or remote credentials database along with identification data identifying a user account and/or the wireless access point or router; a new iot device to establish a connection with the iot hub, another iot device, and/or a user data processing device; the new iot device to transmit a request for network credentials to establish a connection with the wireless access point or router; the iot hub, iot device and/or user data processing device to provide connectivity to the credentials database on behalf of the new iot device, to receive the network credentials from the credentials database and to provide the network credentials to the new iot device; and the new iot device to automatically use the network credentials to establish a connection with the wireless access point or router..
Afero, Inc.

Multicomputer processing of an event authentication request with centralized event orchestration

Aspects of the disclosure relate to multicomputer processing of an event authentication request with centralized event orchestration. A computing platform may receive a request to authenticate an event.
Bank Of America Corporation

Distributed storage of authentication data

A biometric server receives, a transmission of a biometric sample and an encrypted enrollment template of the user from a client device, wherein the encrypted enrollment template comprises an encrypted mathematical representation of historical biometric data of the user, and wherein the biometric sample comprises a current snapshot of the biometric data. The biometric server decrypts the encrypted enrollment template to an enrollment template using an enrollment template key.
International Business Machines Corporation

Systems and methods for biometric authentication using existing databases

Systems, methods, and non-transitory computer readable medium use external databases for biometric authentication. A server receives a request for authentication of a user from a requestor.
Mastercard International Incorporated

Systems and methods for decentralized biometric enrollment

Systems, methods, and non-transitory computer readable media decentralizes biometric enrollment. A server receives a request to enroll a user for biometric authentication in association with a unique id, generates an activation code corresponding to the unique id, and sends the activation code to the user.
Mastercard International Incorporated

Integration of password-less authentication systems with legacy identity federation

Authentication techniques are provided that integrate platform-specific authentication and federated identity authentication. An example method for authenticating a user according to these techniques includes authenticating the user of a user device with a relying party and an authentication entity.
Qualcomm Incorporated

Method for providing a personal identification code of a security module

A method for providing a personal identification code of a security module, includes a personal identification code assigned to the security module and a server is provided which a user of the security module can access after an authentication. In the method, triggered by a request from the user at the server, an authentication code is transmitted to a terminal of the user by means of a first message.
Giesecke+devrient Mobile Security Gmbh

System and multi-tenant sso with dynamic attribute retrieval

A system and method for multi-tenant single sign-on (sso) identity management with dynamic attribute retrieval, the system includes at least one service provider, at least one service provider plug-in, and a service automation platform. A method for multi-tenant sso identity management with dynamic attribute retrieval, includes the steps of receiving a link to a service provider at an sso dispatcher, the sso dispatcher identifying a service, requesting at the sso dispatcher, user attributes for the at least one service provider, assembling at a service provider handler implementation, a response query, retrieving identity provider credentials from the service automation platform, signing at the sso dispatcher, a package for a user's authentication, and redirecting the package to the service provider..
Ingram Micro, Inc.

Shared terminal, communication system, and display control method, and recording medium

A shared terminal for displaying an image to be viewed by a plurality of users on a display is provided. The shared terminal includes circuitry to receive an instruction to turn on the shared terminal according to operation of a power switch, and determine whether login authentication and redisplay of a previously-displayed image are individually set.

Location service for user authentication

A method and apparatus for location authentication of the user are disclosed. In the method and apparatus, the location of the user is authenticated if one or more conditions for geographic proximity associated with two or more devices of the user are satisfied.
Amazon Technologies, Inc.

Distributed validation of credentials

Systems, methods, and computer program products for distributed validation of credentials are described. Upon receiving a request to perform an action by a user, a system performs a multi-part authentication where in each part, only a portion of authentication information is passed.
Pivotal Software, Inc.

Network message authentication and verification

The present application relates to an apparatus and method of authenticating and verifying a message frame on a multi-master access bus with message broadcasting. Logic bus identifier, lid, are associated with each one of a several logical groups of nodes out of a plurality of nodes connected to the multi-master access bus.
Nxp B.v.

Confidential authentication and provisioning

Some embodiments provide systems and methods for confidentially and securely provisioning data to an authenticated user device. A user device may register an authentication public key with an authentication server.
Visa International Service Association

System and methods for sharing and trading user data and preferences between computer programs and other entities while preserving user privacy

Systems and methods are provided which allow computer programs or other entities to share user data and information so that users may be authenticated and their preferences shared among entities in networked environments and machines. Cryptographic credentials are generated for these purposes.
Sensoriant, Inc.

Power feeding device, power feeding system, and control power feeding device

A power feeding device coupled to a power receiving device via a usb cable having an authentication chip includes: a communication circuit communicating with the power receiving device; an authentication circuit executing an authentication process with the authentication chip; a power supply circuit supplying power to a power supply line in the usb cable; and a control circuit controlling the power supply circuit based on the authentication process and power supply information of the power feeding device from the communication circuit. When the authentication process between the authentication chip and the authentication circuit succeeds, the control circuit instructs to supply requested voltage and current to the power supply line.
Renesas Electronics Corporation

System and method providing enhanced security ballot image records

The system and method providing enhanced security ballot image records of the present invention includes an enhanced security ballot image tabulator and an enhanced security ballot image audit station. The tabulator processes each ballot of a plurality of ballots to be tabulated to provide an enhanced security ballot image record having diachronically and synchronically coordinated enhanced security ballot image files, each for another ballot of the plurality of ballots to be tabulated.

Intelligent authentication system and electronic key thereof

An intelligent authentication system including an electronic lock and an electronic key is provided. The electronic key includes an electronic paper display apparatus.
E Ink Holdings Inc.

Systems and methods for identity verification

Systems and methods are disclosed for identity authentication using credit card information supplied by a subject with independently determined address information. According to an example implementation, a method is provided that can include receiving, from a client, personally identifying information (pii) related to a subject, where the pii includes at least a subject-supplied name and subject-supplied credit card information.
Lexisnexis Risk Solutions Inc.

Processing electronic payments on a mobile computer device

A device for processing electronic payments for the purchase of goods or services is provided. The device includes one or more computer processors in communication with non-transitory computer readable data storage and a display.
Mastercard International Incorporated

Method and system for transaction authentication

Provided are a computer-implemented method and system for determining the level of authentication required for a transaction, the method comprising operating a processor to: receive a transaction request associated with a payment card; compare geolocation data of the transaction request with geolocation data of a mobile device associated with a cardholder of the payment card; and based on the comparison, determine the level of authentication required for the transaction.. .
Mastercard International Incorporated

Systems and methods for smartcard biometric enrollment

Systems, methods, and non-transitory computer readable media relate to smartcard biometric enrollment. In an embodiment that does not require a user to visit a central location to provide fingerprint images, an activation code corresponding to a unique id that uniquely identifies a user of a service is generated and sent to the user.
Mastercard International Incorporated

Nfc-enabled devices for performing secure contactless transactions and using hce

In a device that is both nfc-enabled and trusted execution environment (tee)-enabled, and has a secure element (se), a host card emulation (hce) based software application acts as a front-end/proxy and processes non-sensitive security functions, while a trusted application in the tee and an applet on the se cooperate to process security-sensitive functions. An end-to-end security relationship may be established between a subscriber identity module (sim), the tee and a sam (secure authentication module) provided for a second nfc-enabled device (e.g.
Orange

Systems and methods for pre-staging atm transactions

Methods and systems for performing a pre-staged transaction, such as a cash withdrawal by a user or a user's surrogate, employ a host server that receives pre-staged atm transaction data via a first communication channel from a user's mobile device and sends a first unique authentication token via a second communication channel to the user's mobile device processor. An atm processor receives entry of a pre-staged atm transaction request and the first unique authentication token and sends the entered pre-staged atm transaction request and first unique authentication token to the host server for validation, which validates the received pre-staged atm transaction input data and the entered first unique authentication token..
Citibank, N.a.

Customized financial processing system using sub-authentication, and method therefor

The present invention relates to a customized financial processing system using sub-authentication and a method therefore, and to a customized financial processing system and a method using sub-authentication, in which authentication information for a recipient is pre-registered, remittance is performed after verifying authenticity of the recipient when requesting remittance, and if an acquaintance of a remitter is additionally registered as a sub-authenticator, the remittance is performed when approval by the acquaintance is granted and at the same time, the recipient authentication is performed, in addition, a grade based on account establishment information and use information of a recipient is assigned in advance, such that authentication is performed through different authentication items for each grade, thereby making complex additional authentication to be performed for an account with a low grade that is probably a fake deposit.. .

System and delivering packages to customers

In some embodiments, system, apparatuses and methods are provided useful for delivering packages. One such configuration may include storage lockers and a control circuit that detects proximity of delivery agents to a locker, and in response, sends a code to an agent that verifies the agent upon receipt of the code therefrom.
Wal-mart Stores, Inc.

System and delivering packages to customers

In some embodiments, system, apparatuses and methods are provided useful for delivering packages. One such configuration may include storage lockers and a control circuit that detects proximity of delivery agents to a locker, and in response, sends a code to an agent that verifies the agent upon receipt of the code therefrom.
Wal-mart Stores, Inc.

System and delivering packages to customers

In some embodiments, system, apparatuses and methods are provided useful for delivering packages. One such configuration may include storage lockers and a control circuit that detects proximity of delivery agents to a locker, and in response, sends a code to an agent that verifies the agent upon receipt of the code therefrom.
Wal-mart Stores, Inc.

System and delivering packages to customers

In some embodiments, system, apparatuses and methods are provided useful for delivering packages. One such configuration may include storage lockers and a control circuit that detects proximity of delivery agents to a locker, and in response, sends a code to an agent that verifies the agent upon receipt of the code therefrom.
Wal-mart Stores, Inc.

Miniaturized electronic systems with wireless power and near-field communication capabilities

The invention provides systems and methods for tissue-mounted electronics and photonics. Devices of some embodiments of the invention implement high performance, and optionally flexible, device components having miniaturized formats in device architectures that minimize adverse physical effects to tissue and/or reduce interfacial stresses when mounted on tissue surfaces.
The Board Of Trustees Of The University Of Illinois

Systems and methods for performing fingerprint based user authentication using imagery captured using mobile devices

Technologies are presented herein in support of a system and method for performing fingerprint recognition. Embodiments of the present invention concern a system and method for capturing a user's biometric features and generating an identifier characterizing the user's biometric features using a mobile device such as a smartphone.
Veridium Ip Limited

System and preventing unfair evaluation of applications by users

Disclosed are systems and methods for blocking access to interface elements of a page of an application in an applications store. The computing device executes executing a restrictive application that restricts use of the computing device.
Ao Kaspersky Lab

System and methods for tamper proof interaction recording and timestamping

A system and method for securely recording voice communications, comprising an authentication server, further comprising at least a software components operating on a network-capable computing device, and a database, wherein an authentication server verifies the validity of voice communications and a database stores voice communication recordings.. .
Newvoicemedia, Ltd.

Authentication management

Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset.
International Business Machines Corporation

Authentication management

Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset.
International Business Machines Corporation

Systems and methods for multifactor authentication

The invention provides an authentication system and method. In particular, the invention provides a method for performing a financial authentication utilizing a token associated with a user, the method comprising the token generating a set of display characters that are viewable by the user, the token generating the display characters using logic; the user transforming a portion of the set of display characters using a transformation process, based on knowledge of the user, so as to form a display character sequence; the user outputting the display character sequence to an authentication entity; and the authentication entity authenticating the display character sequence using the logic and knowledge of the transformation..

Systems and methods for authenticating a biometric device using a trusted coordinating smart device

Systems and methods for authenticating a biometric device using a trusted coordinating smart device in accordance with embodiments of the invention are disclosed. In one embodiment, a process for enrolling a configurable biometric device with a network service includes obtaining a device identifier (id) of the configurable biometric device using a coordinating smart device, communicating the device id from the coordinating smart device to a network service, communicating a first challenge based on a challenge-response authentication protocol from the network service to the coordinating smart device, communicating the first challenge and a response uniform resource locator (url) from the coordinating smart device to the configurable biometric device, generating a first response to the first challenge and communicating the first response to the network service utilizing the response url, receiving a secure channel key by the coordinating smart device from the network service, communicating the secure channel key from the coordinating smart device to the configurable biometric device, performing a biometric enrollment process using the configurable biometric device including capturing biometric information from a user, and creating a secure communication link between the configurable biometric device and the network service using the secure channel key when the first response satisfies the challenge-response authentication protocol..
Fotonation Limited

Operator identification system

The operator identification system is capable of managing the information required for authentication of operators centrally with high operation rate. The operator identification system includes a manufacturing cell including a manufacturing machine and a cell controller that can communicate with the manufacturing machine.
Fanuc Corporation

Login mechanism for operating system

A login mechanism for an operating system, including: a computer device, loaded with a computer operating system; and a mobile device, capable of sending a login password for the computer operating system, and capable of authenticating a human biometric feature. In the login mechanism of the present invention, the login password for the computer operating system is stored on the mobile device.
Gotrust Technology Inc.

Image forming apparatus

An image forming apparatus including a communication circuit configured to establish proximity communication with a biometric authentication apparatus, a display, and a processor configured to perform authentication processing with biological information detected by the biometric authentication apparatus is provided. The processor is configured to carry out control for reducing a quantity of light output from the display and incident on the biometric authentication apparatus during detection of the biological information by the biometric authentication apparatus when the processor receives information representing optical detection of the biological information by the biometric authentication apparatus from the biometric authentication apparatus through the communication circuit..
Konica Minolta, Inc.

User authentication system and user authentication application program

The user (10) uses an information terminal (200) having a user authentication application program according to the present invention installed thereon and also uses a user authentication system according to the present invention via the user authentication application program, so that it is authenticated that the user who has registered, in advance, his/her biological information (700) in at least one of the information terminal (200) and an authentication server (300) is/was present at the authentication location during the authentication reception time. Specifically, the user who has registered, in advance, his/her biological information (700) in at least one of the information terminal (200) and an authentication server (300) inputs the biological information (700) to the information terminal (200) at the authentication location during the authentication reception time, so that it is authenticated the user (10) who has registered the biological information (700) in advance is/was present at the authentication location during the authentication reception time..
Asuha Co., Ltd.

Flexible security level for device interaction

A system and method for accommodating various device and application security levels collects authentication data such as voice and fingerprint in advance of opening an application or process potentially requiring different security than the device itself requires. The device is then able to execute a user's voiced command, request or query without further user actions if the command, request or query is related to an application or process for which the already-gathered authentication data is sufficient..
Motorola Mobility Llc

Systems and methods for runtime authorization within virtual environments using multi-factor authentication systems and virtual machine introspection

Systems and methods for runtime authorization within virtual environments using multi-factor authentication (“mfa”) and virtual machine introspection (“vmi”) are provided. The systems and methods utilize mfa to authorize access to branches of system execution during virtual machine introspection..
Zentific Llc

Order receiving system and printer

An order receiving system includes a server that provides a terminal device owned by a customer with an ordering application, and a printer that prints details of an order entered via the ordering application. The server includes a memory unit that has an area for storing the ordering application, a first receiver that receives entry of the order from the customer via the ordering application, and a first transmitter that transmits to the terminal device an email form addressed to the printer.
Seiko Epson Corporation

Method and system for remotely monitoring intoxication

A method and system for remotely monitoring intoxication of a user, comprising: prompting the user to provide a breath sample at a time point; at a breath sample acquisition device, generating a breath sample signal upon reception of the breath sample from the user, and broadcasting a unique signature proximal in time to the time point; using a sensor of a mobile computing device, generating an authentication signal derived from detection of the unique signature; at a processing system in communication with the mobile computing device and the sample acquisition device, receiving the breath sample signal and the authentication signal; generating a verification assessment that validates provision of the breath sample by the user; determining a value of an intoxication metric for the user based upon the breath sample signal; and transforming the verification assessment and the value of the intoxication metric into an analysis of intoxication of the user.. .
Khn Solutions, Inc.

Method and system for remotely monitoring intoxication

A method and system for remotely monitoring intoxication of a user, comprising: prompting the user to provide a breath sample at a time point; at a breath sample acquisition device, generating a breath sample signal upon reception of the breath sample from the user, and broadcasting a unique signature proximal in time to the time point; using a sensor of a mobile computing device, generating an authentication signal derived from detection of the unique signature; at a processing system in communication with the mobile computing device and the sample acquisition device, receiving the breath sample signal and the authentication signal; generating a verification assessment that validates provision of the breath sample by the user; determining a value of an intoxication metric for the user based upon the breath sample signal; and transforming the verification assessment and the value of the intoxication metric into an analysis of intoxication of the user.. .
Khn Solutions, Inc.

Hybrid sensor with enhanced infrared detection capabilities

A hybrid sensor is described herein that includes a plurality of photoreceptive element domains. Each domain includes: a first subset of infrared (ir) photoreceptive elements that are selectively receptive to infrared radiation; and a second subset of visible-spectrum photoreceptive elements that are selectively receptive to visible spectrum light.
Microsoft Technology Licensing, Llc

User authentication activation systems and methods

A vehicle occupant identification system includes a detection system configured to detect that an individual is proximate a vehicle. The detection system is configured to detect the proximity of an individual by detecting at least one of a door unlock, a key fob, a door opening, a door closing, a seated passenger, and an individual proximate the vehicle.
Gentex Corporation

Systems and methods of controlling media content in a multi-room environment using a wireless communication device

This disclosure relates to systems and methods for controlling media content with a wireless device in a wireless communication network via a media content streaming device communicatively coupled to an access point in a multi-room environment. Users associated with client computing platforms may obtain authentication to the wireless communication network via the access point.
Vtv Technologies, Inc.

Securing a wireless mesh network via a chain of trust

A master beacon device emits a data packet that is received and retransmitted by servant beacon devices in a wireless mesh network that enables the beacon devices to detect the received signal strength indicator (“rssi”) of beacon devices in proximity. Each servant beacon device transmits survey data packets comprising the rssis and hardware identifiers of proximate beacon devices to the master beacon device, which constructs a first virtual map of the mesh network.
Google Llc

Methods and systems for validating mobile devices of customers via third parties

A method for authenticating a mobile device in real-time. The method includes detecting the mobile device, sending a text message containing a unique uniform resource locator (“url”) to the mobile device, and detecting an access of the unique url by the mobile device through a first communication path.
The Western Union Company

Waveguide system with device-based authentication and methods for use therewith

Aspects of the subject disclosure may include, for example, a method for use in a waveguide system that includes: receiving a wireless authentication request from a communication device, the wireless authentication request including a fiber authentication key; comparing, by the waveguide system, the fiber authentication key to fiber authentication data of the waveguide system to determine when the fiber authentication key is authenticated, wherein the fiber authentication data corresponds to a microwave fiber of the waveguide system; and when the fiber authentication key is authenticated, enabling communications with the communication device, wherein the communications include generating, by the waveguide system and in response to first wireless signals received from the communication device, first electromagnetic waves on a surface of a transmission medium, and wherein the first electromagnetic waves have a frequency within a microwave frequency range.. .
At&t Intellectual Property I, L.p.

Ear device for fixing earphone

The present invention relates to an ear device for fixing an earphone, comprising: a fixing body which is formed in the shape of a c-shaped ring so as to be worn on and fixed to an auricle while surrounding the rear part of the auricle; an earphone module, positioned in a groove in the front part of the auricle, for transferring sound to an ear hole; and a support connector which extends in the shape of a ring that traverses a user's auricle from one portion of the fixing body to the earphone module, the support connector being formed of an elastic body or flexible metal so as to, according to deformation of the support connector, enable the fixing body and the earphone module to be separated from each other or to approach each other so that the fixing body and the earphone module are engaged with and fixed to each other on the auricle. The fixing body has a first coupling member on one side thereof, the earphone module has a second coupling member on one side thereof, and both ends of the support connector are detachably configured so as to be separated from and coupled to the first coupling member and the second coupling member so that it is possible to use the fixing body and the earphone module by integrally coupling the fixing body and the earphone module, or it is possible to use the earphone module alone according to a user's need.

System and dynamic call diversion

A system includes a contact center to provide an interaction between a customer and an agent workstation of the contact center. A contact center network connects a call from a mobile device to an interactive voice response application.
Genesys Telecommunications Laboratories, Inc.

User interface for low-touch security policy provisioning

In one embodiment, a system includes a processor, and a memory to store data used by the processor, the processor being operative to prepare a first user interface including a security policy selection section, interpret user input data to include performing at least one security policy selection action in the security policy selection section yielding selection of a first security policy for a first device, and update the first user interface yielding an updated first user interface including the first security policy, and a first security policy activation key for inputting into a second user interface to be generated when the first device is installed, the first security policy activation key being associated with providing authentication for downloading the first security policy to the first device.. .
Cisco Technology, Inc.

Method and registering device in cloud server

An apparatus and a method for registering a device in a cloud server are provided. The apparatus includes detecting the device by using short-range communication, requesting an authentication code used for registering the device in the cloud server from an account server in response to the device being detected, receiving the authentication code from the account server, and transmitting the received authentication code and connection address information of the cloud server to the device..
Samsung Electronics Co., Ltd.

Home network system using z-wave network and home automation device connection method using same

A home network system using a z-wave network according to the present invention includes: at least one home automation device connected to the z-wave network configuring a wireless network such that the device's state is remotely controlled by a portable terminal or a notification is provided to the portable terminal; a wired/wireless z-wave bridge including a z-wave communication unit and an ethernet communication unit, having a unique mac address, and connecting the portable terminal that is given access to the wired/wireless z-wave bridge by a main server through authentication of the unique mac address, to the z-wave network through the internet; and the main server connected to the wired/wireless z-wave bridge or the portable terminal through the internet, providing an application for a remote control when requested by the portable terminal, and performing authentication for giving access to the wired/wireless z-wave bridge. According to the present invention, anyone can easily control a home automation device through a portable terminal by configuring a z-wave network system and inputting a unique mac address..
Kyung Dong One Corporation

Contextual and risk-based multi-factor authentication

A system for contextual and risk-based multi-factor authentication having a multi-dimensional time series data server configured to monitor and record a network's traffic data and to serve the traffic data to other modules and a directed computation graph module configured to receive network traffic data from the multi-dimensional time series data server, determine a network traffic baseline from the network traffic data, and determine a verification score needed before granting access based at least in part by the network traffic baseline. A plurality of verification methods build up a user's verification score to required level to gain access..
Fractal Industries, Inc.

Systems and methods for using imaging to authenticate online users

Systems and methods are disclosed for authenticating an identity of an online user. One method includes receiving from the user, through a first device, a request to access a web page associated with the user's online account; transmitting to the user an image that contains a unique id and a url of an authentication server; and receiving from the user, through the first device, an authentication request containing the unique id.
Oath Inc.

Apparatus for supporting authentication between devices in resource-constrained environment and the same

Disclosed herein is an apparatus for supporting authentication between devices, which includes a certificate information storage unit for storing certificate data of a first terminal for managing a certificate; a communication unit for receiving a request for a certificate of the first terminal, which uses a signature value and certificate-related information corresponding to the first terminal, from a second terminal and returning information corresponding to a valid certificate of the first terminal to the second terminal in order to enable the second terminal to authenticate the first terminal; and a certificate verification unit for verifying whether a certificate of the first terminal is valid.. .
Electronics And Telecommunications Research Institute

Systems and methods to facilitate certificate and trust management across a distributed environment

Methods and apparatus to facilitate certificate and trust management across a distributed environment are disclosed. An example apparatus includes a first virtual appliance including a first management endpoint and a first authentication provider including a first certificate validator, the first certificate validator to validate that a first certificate received by the first authentication provider is authentic, virtual appliance to communicate the first certificate via the first management endpoint; and a first component server including a first management agent and a first certificate evaluator, the first management agent to communicate with the first virtual appliance via the first management endpoint, the first management agent to receive the first certificate via the first management endpoint, the first certificate evaluator to evaluate the first certificate to determine a signing authority, the first management agent to restart the first component server and notify the first virtual appliance of acceptance of the first certificate..
Vmware, Inc.

User authentication in communication systems

Methods and systems are provided for user authentication in communication systems. An identification token may be generated in response to a request from a user terminal to load a web page.
Swisscom Ag

Mobile credential redemption card

Disclosed herein are systems and methods for redeeming credential credits. A portable token that contains at least two identifiers may be provided.
Nortek Security & Control Llc

Information processing apparatus, information processing method, program, information processing system, and communication apparatus

There is provided an information processing apparatus, an information processing method, a program, an information processing system, and a communication apparatus that are capable of enhancing authentication safety, the information processing apparatus including: a communication section configured to receive authentication information and a processing request from a first communication apparatus; an authentication information generation section configured to generate authentication information on the basis of first key information associated with a second communication apparatus; and a processing control section configured to control execution of a process corresponding to the processing request on the basis of the authentication information received by the communication section and the authentication information generated by the authentication information generation section.. .
Sony Corporation

Pairwise temporal key creation for secure networks

A system and method for establishing a pairwise temporal key (ptk) between two devices based on a shared master key and using a single message authentication codes (mac) algorithm is disclosed. The devices use the shared master key to independently compute four macs representing the desired ptk, a kck, and a first and a second kmac.
Texas Instruments Incorporated

Intelligent sensor and controller framework for the power grid

Disclosed below are representative embodiments of methods, apparatus, and systems for monitoring and using data in an electric power grid. For example, one disclosed embodiment comprises a sensor for measuring an electrical characteristic of a power line, electrical generator, or electrical device; a network interface; a processor; and one or more computer-readable storage media storing computer-executable instructions.
Battelle Memorial Institute

Multiple identity management system and managing multiple identities using the same

A system and method of managing multiple identities using a multiple identity management system includes receiving a user authentication signal from a user terminal, transmitting the user authentication signal to a first service server, the first service server matching the user authentication signal with a particular user id associated with the first service server, receiving an authorization signal corresponding to the user authentication signal from the first service server, transmitting the authorization signal to the user terminal, receiving a request for validation of a user identification number corresponding to the authorization signal from a second service server, the second service server receiving the authorization signal transmitted via a user input from the user terminal, and transmitting the user identification number corresponding to the authorization signal to the second service server.. .
Nhn Entertainment Corporation

Method and a system for generating a multi-factor authentication code

The present invention provides a method and a system for generating a multi-factor authentication code. The method comprises steps of generating a plurality of random numbers that are completely random; arranging the plurality of random numbers into a combination in a time-series or a random way; dividing the combination into a plurality of sub-combinations; transmitting each of the plurality of sub-combinations to one of corresponding plurality of interfaces respectively via one path according to a distributing rule; combining the plurality of sub-combinations received by the plurality of interfaces to form the multi-factor authentication code according to a combining rule.

Rfid part authentication and tracking of processing components

Embodiments provided herein provide for methods and apparatus for detecting, authenticating, and tracking processing components including consumable components or non-consumable components used on substrate processing systems for electronic device manufacturing, such as semiconductor chip manufacturing. The semiconductor processing systems and/or its processing components herein include a remote communication device, such as a wireless communication apparatus, for example radio frequency identification (rfid) devices or other devices embedded in, disposed in, disposed on, located on, or otherwise coupled to one or more processing components or processing component assemblies and/or integrated within the semiconductor processing system itself.
Applied Materials, Inc.

Secure automated payment system

The present invention is directed to a system and method for automated identification and authentication of individuals, delivery of goods and/or services to individuals, and payment for automated payment of said goods. .

Transaction authentication based on metadata

In some examples, a system for authenticating transactions can include a processor to detect metadata corresponding to a user of a mobile device, wherein the metadata comprises a call history from the mobile device. The processor can also detect transaction information corresponding to the user of the mobile device from a remote server, wherein the transaction information corresponds to a transaction initiated at a remote service provider and wherein the transaction information indicates a transaction type and transaction initiator information.
International Business Machines Corporation

Augmented reality dynamic authentication for electronic transactions

A system for authorizing an electronic transaction in an augmented reality environment comprises an augmented reality user device and an authentication server. The augmented reality user device includes a display that overlays virtual objects onto a field of view of the user.
Bank Of America Corporation

Apparatus and method to prevent execution of an unauthorized transaction via a distributed database

An apparatus determines whether public key information on a public key used by a transaction made between nodes coupled to each other via a network is stored in a distributed database, and determines whether challenge response authentication using the public key is successful between the nodes between which the transaction is made. When the public key information is stored in the distributed database and the challenge response authentication is successful, the apparatus stores information on the transaction using the public key in the distributed database..
Fujitsu Limited

Method and system for fraud mitigation via account security

A method for customized authentication of a subaccount includes: storing an account profile, wherein the account profile includes a structured data set related to a transaction account including a plurality of subaccounts, each subaccount including an associated account number, authentication rules, and authentication values; receiving a transaction message related to a payment transaction, wherein the transaction message includes a transaction account number and authentication data; identifying a specific subaccount in the account profile where the included associated account number corresponds to the transaction account number; and authenticating the authentication data based on the authentication rules and the authentication values included in the identified specific subaccount.. .
Mastercard International Incorporated

Augmented reality dynamic authentication

A system for performing authorization of a user in an augmented reality environment comprises an augmented reality user device, an automatic teller machine, and an authentication server. The automatic teller machine has a keypad with unmarked buttons.
Bank Of America Corporation

Asynchronous cryptogram-based authentication processes

The disclosed embodiments include computer-implemented devices and processes that asynchronously authenticate data. For example, a network-connected device may obtain data identifying a product, and obtain cryptographic data from an executed application through a programmatic interface.
The Toronto-dominion Bank

Method and selecting a wireless reader action as a result of an output data received from a wireless identification device

A method and apparatus for selecting a wireless reader action comprising the steps of a wireless communication identification device which is a wireless identification device transmitting output data; the wireless reader thereafter receives the output data, wherein the output data comprises an instruction set how to process the output data; and the wireless reader processing the output data and performing a suitable action in compliance with said output data instructions. The wireless identification device comprises at least one of a unique data address and a unique variable encryption key, which is transmitted as part of the instruction set.

Electronic device and operating method thereof

An apparatus and method for setting a fingerprint recognition region in an electronic device are provided. An electronic device includes a display, a finger scan sensor overlapped with at least a partial region of the display, and a processor.
Samsung Electronics Co., Ltd.

Automated manufacturing system with adapter security mechanism and manufacture thereof

A method of operation of an automated assembly system includes: detecting a socket adapter having an adapter identifier and an adapter cryptographic chip; calculating a primary key hash based on a primary key in a programming cryptographic chip; calculating an adapter hash based on the adapter identifier using the adapter cryptographic chip; matching the primary key hash to the adapter hash to update an authentication token with the adapter identifier for authenticating the socket adapter on the device programming system; and programming programmable devices in the socket adapter based on the authentication token.. .
Data I/o Corporation

Secure start system for an autonomous vehicle

A secure start system for an autonomous vehicle (av) can transmit credentials to an authentication system based on detecting startup of the autonomous vehicle. When the credentials are authenticated the system can receive a tunnel key from the authentication system, and establish, using the tunnel key, a private communications session with a backend vault of the authentication system.
Uber Technologies, Inc.

Systems and methods for authentication of access based on multi-data source information

An authentication method includes receiving a single electronic file of member data elements from multiple member data sources. The method can include extracting the member data elements from the single electronic file, populating an authentication database with the member data elements, and periodically receiving an update of the member data elements.
Early Warning Services, Llc

Anti-theft in firmware

Methods, systems and storage media are disclosed for enhanced system boot processing that authenticates boot code based on biometric information of the user before loading the boot code to system memory. For at least some embodiments, the bio -metric authentication augments authentication of boot code based on a unique platform identifier.
Intel Corporation

System and secure boot of engine management system

The present invention relates to a system and a method for secure boot of an engine management system, in which the system for secure boot of an engine management system, comprises a memory in which a boot code and at least one application are stored, a host cpu for sending a start-up command to a hardware security module hsm when a start-on or reset event occurs, and transmitting a remaining memory area authentication command to the hsm after executing the boot code when boot code authentication success is received from the hsm, and the hsm for starting up and performing authentication of the boot code stored in the memory as the start-up command is received, sending a boot code authentication result to the host cpu, and performing authentication of the rest of the memory excluding the boot code when the remaining memory area authentication command is received.. .
Hyundai Autron Co., Ltd.

Method and device for authenticating application that requests access to memory

The present application provides a method for authenticating an application that requests access to a memory, comprising: acquiring an authentication request provided by the application; acquiring a characteristic instruction provided by the application in response to the authentication request; acquiring an instruction pointer corresponding to the characteristic instruction; acquiring from the memory characteristic information of the application which is pre-stored in the memory based on the instruction pointer; and comparing the acquired characteristic information with authentication information corresponding to the application, so as to determine whether the authentication of the application is successful.. .
Montage Technology (shanghai) Co., Ltd.

Authentication method and authentication system

An authentication method includes sending out a first authentication request; receiving first authentication information of a first authentication item; determining whether the first authentication information is correct; determining whether a first weighting value is equal to or is larger than a threshold value; sending out a second authentication request when the first authentication information is correct and the first weighting value is smaller than the threshold value; receiving second authentication information of a second authentication item; determining whether the second authentication information is correct; determining whether a first sum value of the first weighting value and a second weighting value is equal to or is larger than the threshold value; and permitting a web system to be logged in when the second authentication information is correct and the first sum value is equal to or is larger than the threshold value.. .
Institute For Information Industry

Virtual reality dynamic authentication

A system for performing authorization of a user in a virtual reality environment includes a virtual reality user device. The virtual reality user device includes a display configured to display a virtual environment.
Bank Of America Corporation

Processing apparatus, mobile device, and non-transitory computer readable medium storing authentication request program

A processing apparatus includes a process execution unit that executes a process according to a user instruction; a first communication unit that performs wireless communication with a mobile device which is moved to a predetermined communication area; an authentication processing unit that executes a user authentication process in a case where the first communication unit receives both information that the mobile device is in a process request mode and a user id maintained by the mobile device through communication with the mobile device; and a process execution permission unit that permits the process execution unit to execute the necessary authentication process in a case where the reception user id is recognized as a user id possessed by the user who has the authority to cause the authentication processing unit to execute the necessary authentication process.. .
Fuji Xerox Co., Ltd.

Techniques for biometric authentication of user of mobile device

A method for biometric authentication of a user of a mobile device, and a case for performing the method is provided. The method includes, by the case, coupling the mobile device to the case, receiving from the mobile device biometric data of the user of the mobile device that was captured by the mobile device, storing the biometric data, receiving a request from the mobile device for authenticating the user of the mobile device, the request including biometric data captured by the mobile device, comparing the biometric data stored in the case and the biometric data included in the request, and sending to the mobile device a response to the request for authenticating the user of the mobile device based on a result of the comparison, wherein the response to the request is for use by the mobile device to perform an operation based on the authentication of the user..
Ncap Licensing, Llc

Systems and methods for authenticating user identity based on user defined image data

The disclosed embodiments include computerized methods and systems that facilitate two-factor authentication of a user based on a user-defined image and information identifying portions of the image sequentially selected by the user. In one aspect, a communications device presents a first digital image of a first user on a touchscreen display.
The Toronto-dominion Bank

Personal authentication method and apparatus based on recognition of fingertip gesture and identification of fake pattern

Disclosed herein are a method and apparatus for authenticating a user based on a fingertip gesture. The authentication apparatus may display a pattern generated based on geometric information about a hand geometry or size of a user, and may recognize a fingertip gesture via interaction with the user with respect to the pattern.
Electronics And Telecommunications Research Institute

Implicit coordination of deployment and regression testing across data centers and system clusters

The disclosed methods and systems for coordinating deployment and regression testing across data centers and system clusters in multiple service clouds include accessing test suites via a versioning platform that maintains a metadata notation of an applicable-version to which a version of a test suite applies. They include receiving a request-to-test to run a selected test suite against a selected system; making a machine-to-machine query about the selected system and receiving back a response that specifies a version-to-be-tested; automatically selecting from the versioning platform a test suite version with the applicable-version that supports the version-to-be-tested consistent with the metadata notation of the applicable-version of the selected test suite; and reporting results of running the selected test suite.
Salesforce.com, Inc.

Image processing device and non-transitory computer readable medium

An image processing device includes a reception unit that receives an image forming instruction from a user, a reservation unit that reserves the image forming instruction in association with the user, an acceptance unit that accepts a user's log-in operation, an authentication unit that authenticates the user, and an image forming unit that executes the image forming instruction, which is reserved in the reservation unit and is associated with the authenticated user, without accepting the log-in operation by the acceptance unit in a case where the authentication by the authentication unit has been completed.. .
Fuji Xerox Co., Ltd.

Hands-free gestures for account authentication

Systems and methods are provided for authenticating an account via a hands-free gesture, such as a tap, pattern of taps, or other physical gesture not requiring a user to hold a computing device. A user can initiate a transaction to purchase an item by interacting with a first computing device (e.g., electronic kiosk, point-of-sale terminal, automated checkout device, etc.).
Ebay Inc.

Thermoluminescent and superparamagnetic composite particle and marking comprising same

Disclosed is a composite particle for use in a marking that is suitable for identification/authentication purposes. The particle comprises at least one superparamagnetic portion and at least one thermoluminescent portion coated with an thermoisolating portion.
Sicpa Holding Sa

Authentication of mobile devices for vehicle communication

Methods and apparatus are disclosed for authentication of mobile devices for vehicle communication. An example mobile device for vehicle communication authentication a communication module to receive a signal from a vehicle, memory including an application for accessing digital keys, and key accessor.
Ford Global Technologies, Llc

Wireless session configuration persistence

A wireless access point employs a wireless configuration database for retrieving a stored wireless profile corresponding to a subscriber device from a remote location that enables the user to establish an internet connection using their subscriber device with the same network identifiers and settings employed from the home wireless profile. The network identifier is typically an ssid (service set identification), and labels the wireless configuration using a mnemonic name familiar to the user.
Time Warner Cable Enterprises Llc

Automatic login to social-network from executable

In one embodiment, a server computer may receive, from a client device, a request to download an application, wherein the client device is logged-in to a session associated with a user account in a communications system. In response to the request, a downloader module executable file may be appended with the login information and the authentication information.
Facebook, Inc.

Method and accessing authentication credentials within a credential vault

A method at a computing device, the method including detecting, at the computing device, a trigger that authentication is pending for an application or service; indicating a state of a credential vault via a user interface of the computing device; and when the credential vault is in a locked state, activating an authentication mechanism for the credential vault without changing focus on the user interface for the application or service.. .
Blackberry Limited

System and delegated authentication and authorization

The present invention provides a method for providing services to a presentation device. The method comprises detecting a service delivery module in a communication system using a communication device and performing an authentication and authorization session between the service delivery module and the communication device, wherein user authentication and authorization is created.
Tele2 Sverige Ab

Image output system, information processing device, and authentication device

An image output method includes capturing an image of code pattern including device information specifying an image output device, obtaining the device information from the image of code pattern, obtaining user information specifying a user, and outputting the device information and the user information to an external device, by an information processing device; authenticating the user based on the user information, by a processor; executing image output processing instructed by the user authenticated based on the user information, by the image output device specified based on the device information; transmitting a result of the image output processing by the image output device to the information processing device, by the image output device; and displaying the result of the image output processing by the information processing device.. .
Sharp Kabushiki Kaisha

Image processor and image processing system

An image processor includes: an information acquiring circuitry causing a first communicator to perform communication with a mobile terminal and acquires status information and identification information; an authentication circuitry performing a first authentication process on a basis of the identification information; a second communicator performing communication of image data with the mobile terminal; a display displaying an authentication waiting screen receiving an input of authentication information and a first post-authentication screen corresponding to first authentication information; and a controller selecting, on a basis of the status information, one of first and second operations on a condition that the first authentication process is successful when the display displays the authentication waiting screen. The first operation causes the display to display the first post-authentication screen.
Oki Data Corporation

Electronic apparatus that performs user authentication

An electronic apparatus is obtained that suppresses a decrease in convenience to a legitimate user while reducing the possibility of unauthorized login. In the electronic apparatus, a user-interface unit displays a user-authentication screen, and detects operation for confirming a character string that is inputted in an input field.
Kyocera Document Solutions Inc.

Method for storing data in a cloud and network for carrying out the method

A method for storing data in a cloud includes providing at least one data file to be stored together with a predefined number t of replicas of the at least one data file within the cloud, at least one authentication tag corresponding to the at least one data file and t functions that are configurable to take at least a predefined time to compute. The at least one data file, the at least one authentication tag and the t functions are transmitted to the cloud.
Nec Europe Ltd.

Method and system for compiling map data

In one embodiment, a method of compiling map data is disclosed. The method includes a server receiving an authorization request from a remote programmable device, the authorization request including user authentication information.

Providing access with separate authentication to secure content in repositories

A request from a user to access a report associated with one or more content items maintained by an electronic content management system can be received. A query, associated with the request and including one or more attributes of the request to access the report can be executed.

Remote authentication in a database system

A computer system is configured to provide a database system. The computer system comprises one or more processors, a primary database system implemented by the one or more processors, and a secondary database system implemented by the one or more processors.
Sap Se

Network device and accessing a data network from a network component

A network device, two interfaces for connecting to an access-protected access point of a data network and to a network component which is to be allowed access to the data network via the access point. The network device is designed to be authenticated at the access point using authentication data when the access point is connected and the network component is connected and to allow the connected network component to access the data network via the access point in the event of a successful authentication at least for network components which satisfy one or more specified criteria..
Siemens Aktiengesellschaft

System and speaker recognition on mobile devices

A speaker recognition system for authenticating a mobile device user includes an enrollment and learning software module, a voice biometric authentication software module, and a secure software application. Upon request by a user of the mobile device, the enrollment and learning software module displays text prompts to the user, receives speech utterances from the user, and produces a voice biometric print.
Cirrus Logic International Semiconductor Ltd.

Method and authenticating user

The present disclosure discloses a method and an apparatus for authenticating a user. A specific embodiment of the method comprises: receiving an authentication request sent by a user terminal, wherein the authentication request comprises a user identification of a user of the user terminal and operation information related to user operation; determining whether the user operation matches a preset to-be-authenticated operation according to the user identification and the operation information; sending voicing material to the user terminal for reading by the user in response to determining that the user operation matches the preset to-be-authenticated operation, so that the user terminal acquires corresponding authentication voice of the user; receiving the authentication voice sent by the user terminal; and authenticating the user according to the user identification and the authentication voice..
Baidu Online Network Technology (beijing) Co., Ltd.

Method for verifying authenticity, configuring network credentials and cryptographic keys for internet of things (iot) devices using near field communication (nfc)

A method to securely send, to the device the cryptographic key and the local wireless network credentials with an authenticity verification to ensure that the device is safe to be added to the local network. Those credentials are sent using a nfc enabled device to the internal eeprom with nfc interface embedded on the target connected device.
Samsung EletrÔnica Da AmazÔnia Ltda.

Communication terminal, communication method, program, and communication system

There is provided a communication terminal including a transmission controller configured to allow transmission of, to a verification target device, authentication information for authenticating the verification target device based on first information acquired from an information processing device, and a verification unit configured to verify validity of the verification target device based on a response to the authentication information and second information acquired from the information processing device, the second information being associated with the first information.. .
Felica Networks, Inc.

Virtual content repository

Disclosed are various examples for facilitating access to files in a virtual content repository. In one example, a request to access a file is transmitted to a management service.
Airwatch Llc

Information processing system, information processing terminal, and information processing method

An information processing system is provided that includes a cloud server and an information processing terminal. The cloud server includes a storage device storing a program for using a cloud service and account information of a cloud account registered with the cloud service, and a first processor that manages execution of an authentication process for controlling access to the cloud service.
Ricoh Company, Ltd.

Single key authentication method

Systems, methods, and computer-readable media are disclosed for obtaining authenticated access to a service provider system, or more specifically, to a user account maintained on the service provider system, using a single key authentication mechanism. This mechanism includes generating an authentication image that includes user-generated content, user application-generated content, and service provider-generated content; sending the authentication image to the service provider system, which is configured to authenticate access to the user account based at least in part on the authentication image; and receiving an indication as to whether access to the user account has been authenticated..
International Business Machines Corporation

Authentication of users in a computer network

Apparatuses and methods for authenticating a user to a host by an agent are disclosed. In the method the agent receives a connection request to the host from the user.
Ssh Communications Security Oyj

Neighbor establishment method and system, and device

A method for establishing a neighbor relationship, where corresponding authentication information is added to packets that are sent from a first network device and a second network device to each other. The first network device sends a hello packet to the second network device.
Huawei Technologies Co., Ltd.

System and providing network support services and premises gateway support infrastructure

A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely manages delivery of application services, which can be voice controlled, by a gateway, e.g.
Kip Prod P1 Lp

System and providing network support services and premises gateway support infrastructure

A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely manages delivery of application services, which can be voice controlled, by a gateway, e.g.
Kip Prod P1 Lp

Dispersed sub-key credentials

A method for execution by one or more processing modules of one or more computing devices of a dispersed storage network (dsn), the method begins by receiving from a requesting entity, at a first user device of at least a first and second user device, a request to authenticate item m, the request including at least a request for a key n. The method continues by obtaining a first password, retrieving a first portion x of the key n based on the first password, obtaining a factor my of a second portion y of the key n based on a factor request including m, generating a signature utilizing the first portion x of the key n and the factor my of the second portion y of the key n, generating an authentication response that includes the signature and sending the authentication response to the requesting entity..
International Business Machines Corporation

Rram-based authentication circuit

A memory device includes a memory array comprising a plurality of bits, wherein each bit comprises two memory cells each having a variable resistance; a formation circuit, coupled to the plurality of bits, and configured to cause a first memory cell of a first bit to be at a low resistance state; and an authentication circuit, coupled to the plurality of bits, configured to designate a logical state to the first memory cell of the first bit and use the logical state of the first memory cell of the first bit to generate a physically unclonable function (puf) signature.. .
Taiwan Semiconductor Manufacturing Co., Ltd.

Audio encoder and decoder with program loudness and boundary metadata

Apparatus and methods for generating an encoded audio bitstream, including by including program loudness metadata and audio data in the bitstream, and optionally also program boundary metadata in at least one segment (e.g., frame) of the bitstream. Other aspects are apparatus and methods for decoding such a bitstream, e.g., including by performing adaptive loudness processing of the audio data of an audio program indicated by the bitstream, or authentication and/or validation of metadata and/or audio data of such an audio program.
Dolby Laboratories Licensing Corporation

System and multi-factor authentication using voice biometric verification

A system and method are presented for multi-factor authentication using voice biometric verification. When a user requests access to a system or application, voice identification may be triggered.
Interactive Intelligence Group, Inc.

Vehicle diagnostic device and managing certificate thereof

A method of performing diagnostic communication with a vehicle using a diagnostic device includes: acquiring a certificate revocation list (crl) corresponding to a certificate of the diagnostic device from an external device, verifying a validity of the certificate using the acquired crl, performing authentication with the vehicle when the validity of the certificate is verified, and starting diagnostic communication between the diagnostic device and the vehicle when the authentication is performed.. .
Hyundai Autoever Corporation

Trust circle through machine learning

Various embodiments of systems and methods for trust circle through machine learning are described herein. The method includes identifying a website subscribed with the trust circle for aggregating data based upon a query.
Sap Se

Method and system for authentication of coupons via blockchain

A method for authentication of coupons using a blockchain includes: storing transaction data for a payment transaction, wherein the transaction data includes at least a transaction amount; receiving an identification value; receiving a block included in a blockchain, wherein the block includes at least a block header and a plurality of transaction values, each transaction value including at least a coupon identifier and coupon data; executing a query on the received block to identify a specific transaction value of the plurality of transaction values where the included coupon identifier corresponds to the received identification value; and executing a query on the memory to update at least the transaction amount included in the stored transaction data based on the coupon data included in the identified specific transaction value.. .
Mastercard International Incorporated

Systems and methods for tokenless authentication of consumers during payment transactions

A computer-implemented method for tokenless authentication of a paying consumer during a payment transaction uses a computing device having a processor and a memory. The method includes receiving a plurality of biometric data sets for a plurality of consumers.
Mastercard International Incorporated

User authentication and authorization for electronic transaction

An electronic transaction terminal system includes a camera that captures an image of a person participating in an electronic transaction; a microphone that captures an audio signal of the person; and a database that includes records associating user accounts with an image and/or a voice print of the associated account holder. The electronic transaction terminal system includes processors connected to the camera, microphone, and database to perform authentication and/or authorization.
Bank Of America Corporation

Online financial transaction identity authentication system using real card, and method thereof

Disclosed are an online identity authentication system using a real card, and a method thereof. The present invention enables identity authentication to be conducted by using a user's real bank card at the time of a mobile financial transaction using a smart phone such that a financial transaction can be conducted as if the financial transaction is conducted at an atm of an offline bank, without an authentication certificate being saved separately.
Malsaeng Co., Ltd.

Identity verification systems and methods

Various embodiments herein each include at least one of systems, methods, and software for identity verification. Some such embodiments identify a user based on analysis of their handwriting.
Ncr Corporation

Generating tokens dynamically using payment keys

Techniques are disclosed relating to generating tokens dynamically using payment keys. In some embodiments, a computer system may receive a transaction authorization request including a transaction token.
Ca, Inc.

Terminal and mobile payment with trusted execution environment

A mobile terminal is adapted for mobile payment through payment in accordance with transaction data from the customer to a merchant via a payment service provider, and is adapted for a clearing of the payment between bank servers. The terminal is characterized in that a) in the secure runtime environment access data are stored for an authentication between the payment trust application and the payment service provider; and b) the agent is further adapted b1) upon an authentication between the payment trust application and the payment service provider, to transmit access data, or authentication data generated employing access data, between the secure runtime environment and the payment service provider, and b2) to accept from the payment trust application a transaction instruction for a payment in accordance with the transaction data and to send it to the payment service provider.
Giesecke+devrient Mobile Security Gmbh

Computer terminal having a detachable item transfer mechanism for dispensing and collecting items

A computer terminal typically includes a detachable item transfer mechanism and a docking station for receiving the detachable item transfer mechanism. The item transfer mechanism typically includes a housing defining a cavity and an opening to the cavity.
Bank Of America Corporation

Electronic device and displaying image for iris recognition in electronic device

Disclosed are various embodiments related to iris authentication technology for electronic devices. According to an embodiment of the present disclosure, an electronic device may include a camera, a display, and a processor configured to display a first image on the display when a distance between the electronic device and an object included in an image captured by the camera is a first distance and to display a second image associated with the first image on the display when the distance between the electronic device and the object included in the image captured by the camera is a second distance different from the first distance.
Samsung Electronics Co., Ltd.

Service control and user identity authentication based on virtual reality

In an implementation, one or more user interactions from a virtual reality (vr) device user for initiating a service in a vr scenario of a vr application are detected. One or more eye physiological characteristics of the vr device user are obtained for user identity authentication.
Alibaba Group Holding Limited

Virtual reality device using eye physiological characteristics for user identity authentication

In an implementation, a virtual reality (vr) device includes a housing that has two openings. Each of the two openings hosts a camera lens and a nose groove.
Alibaba Group Holding Limited

Biometric authentication apparatus, biometric authentication method, and computer-readable storage medium

A biometric authentication apparatus acquires biometric information of a user, extracts a boundary candidate where a state of the biometric information changes, to extract a region in a vicinity of the boundary candidate and having a threshold area or greater, extracts a state feature quantity having a value that changes according to a change in the state of the biometric information, from the extracted region, and judges the state of the biometric information using the state feature quantity of the extracted region.. .
Fujitsu Limited

Systems and methods for event delivery in a cloud storage system

Cloud storage systems and methods are described for providing event-based user state synchronization among the various cloud elements. A global user directory is maintained on a remote cloud storage system.
Egnyte, Inc.

Authentication methods and systems

The invention provides a solution for secure authentication of an individual. The invention comprises methods and apparatus for secure input of a user's identifier e.g.
Mypinpad Limited

Authentication methods and systems

The invention provides a solution for secure authentication of an individual. The invention comprises methods and apparatus for secure input of a user's identifier e.g.
Mypinpad Limited

Authentication using multi-component swipe pattern and color, sound or symbol series unlocking patterns and or codes

Authentication using multi-component swipe pattern and color, sound or symbol series unlocking patterns and or codes. .

Single key authentication method

Systems, methods, and computer-readable media are disclosed for authenticating access to a service provider system, or more specifically, to a user account maintained on the service provider system, using a single key authentication mechanism. The service provider system may receive an authentication image from a user application executing on a user device.
International Business Machines Corporation

Authentication methods and systems

The invention provides an authentication method and system. It is particularly suited for verifying the identity of an individual prior to permitting access to a controlled resource.
Mypinpad Limited

Authentication session management

One embodiment provides a method, including: performing, at an electronic device, an initial authentication of a user using a first mechanism; entering, using a processor, an authentication session responsive to a successful result of the initial authentication of the user; thereafter detecting, using the processor, presence of the user by a second mechanism; and maintaining, using the processor, the authentication session in response to detecting the presence of the user. Other aspects are described and claimed..
Lenovo (singapore) Pte. Ltd.

Lens manufacturing system, lens manufacturing method, computer program, lens design data use management system, lens design data use management device, lens processing management device, lens processing management method, lens processing management system, lens design data use management program, and lens processing management program

A processing device that processes a lens, comprising a design data receiver that receives design data of the lens from an external section. Also included are a memory that stores the received design data, an input section that inputs authentication information which is embedded in or attached to the lens and is used in use permission of design data, and a controller that performs an authentication process whether or not the authentication information corresponds to the design data and controls whether or not a processing of the lens by using the design data is started..
Nikon Corporation

Re-sealable container for a controlled substance having a child resistant lid

Provided is a re-sealable container for storing, preserving, identifying, tracking and transporting a federally controlled substance having a child resistant and senior friendly lid, and a process for identifying and tracking federally controlled substances within the re-sealable containers. The re-sealable federally controlled substance containers include a two-piece child resistant and senior friendly lid and a 2-factor authentication identification tag, as well as a microchip for identifying the container controlled substance contents and tracking the container.
N2 Packaging Systems, Llc

Access and drive authorization system with increased safety against relay station attacks by verification of location

An authorization system for vehicles, comprising at least one authentication element, at least one device for the location of the authentication element, and at least one compare unit. The authentication element, comprises: at least one wireless interface for the sending and/or receiving of at least one location data signal generated on the vehicle; at least one inertial sensor element for the detection of inertial data; at least one inertial data interface for the sending and/or receiving of inertial data; and at least one location data signal exchange interface for the exchange of location data signals with the compare unit.
Hella Kgaa Hueck & Co.

Method for realizing network access, terminal and computer storage medium

A method for implementing network access, a terminal and a computer storage medium are provided. The method includes that: when detecting that a terminal is located in a non-local network, a network identifier corresponding to the non-local network is acquired, wherein the non-local network is different from a network to which a subscriber identity module (sim) card of a terminal belongs; a data connection is established according to the network identifier, and authentication information of a virtual sim card for accessing the non-local network is acquired; and the terminal accesses the non-local network by using the authentication information of the virtual sim card..
Zte Corporation

Method and establishing network connection

A method and an apparatus are provided for establishing a network connection. According to an example method, in case that a predetermined condition is satisfied, an open authorization first ap established on a router may be searched for.
Beijing Xiaomi Mobile Software Co., Ltd.

System and data offloading in a hetnet

Embodiments of the present disclosure relate to systems and methods for offloading data of a subscriber from the rat type to a second rat type. Embodiments may relate to a method comprising: receiving an access request from an access point [120] based on a connection request received from a user equipment [110], transmitting an authentication request to the user equipment [110] for authenticating a subscriber; receiving an apn name and packet gateway [144] identifier from the home subscriber server [146]; altering the apn name received from the home subscriber server [146]; transmitting the connection request to a packet gateway [144] for authorizing the subscriber for offloading, updating the apn name and the packet gateway [144] identifier at the home subscriber server [146]; and offloading the data from the first rat type to the second rat type, wherein the data is identified based on the subscriber profile..
Reliance Jio Infocomm Limited

System, methods and software for user authentication

A system and method for authenticated-user access, the system including an optical device proximal to an entrance adapted to capture a biometric credential of an individual user, a communication network adapted to receive from and send signals to the optical device, a portable communication device associated with the individual user, the portable communication device in connection with the network and a processor adapted to receive the biometric credential of the user and to match the biometric credential with a previous pre-authorized biometric credential, of the user and to send an authorization key to the portable communication device responsive to the match to provide the individual user with a time-limited access key to the entrance.. .

Method and secured authentication using voice biometrics and watermarking

An apparatus including a computer processor, and a computer memory. The computer processor may be programmed to receive a voice input of a first person and a request for authorization by the first person to access an account from an authorized computer software application; to perform audio watermark recognition technology on the voice input to determine if the voice input satisfies expected audio watermark data stored in the computer memory for a first authorized person; to perform voice biometric technology on the voice input to determine if the voice input satisfies expected voice biometric data stored in the computer memory for the first authorized person; and to produce an output to the authorized computer software application to indicate that the voice input is from the first authorized person, based at least in part on the voice input satisfying expected audio watermark data and expected voice biometric data..

Secure access authorization method

Credentialing systems, methods, and mediums. A method includes sending, by a mobile device and over a network to an installed device, a request for access to the installed device.
Siemens Industry, Inc.

System and controlling authentication of a physiological acquistion device by a patient monitor

A patient monitor includes a data connector configured to connect to a corresponding data connector of an approved physiological data acquisition device to provide data transmission to and from the approved physiological data acquisition device, and a power connector configured to connect to a corresponding power connector of the approved physiological data acquisition device to provide power to the approved physiological data acquisition device. The patient monitor further includes a control module configured to detect connection of a corresponding power connector of an unidentified device at the power connection port and/or a corresponding data connector of the unidentified device to the data connector, and provide a limited power amount to the unidentified device through the power connector.
General Electric Company

Image forming apparatus, controlling the same, and storage medium

An image forming apparatus that performs authentication of a user by a login program that operates on firmware and that, upon detection an abnormality of the login program, restricts execution of a job without causing the login program to terminate, and, while execution of the job is being restricted, controls to enable reception of an operation for disabling the login program via a reception unit for receiving an operation by a user via an operation unit, and, in accordance with the operation for disabling, causes the restricted job to be executed.. .
Canon Kabushiki Kaisha

Computer terminals biometrically enabled for network functions and voice communication

The invention provides a handset that includes a finger-image sensor that provides finger-image-related signals or data for authentication purposes and functions as a telephone handset for use with a computer terminal. A system, including handsets and computer terminals, enables the terminal and/or the handset to access or otherwise participate in at least one network-related function and voice communication in response to authentication of finger-image data provided by the handset..
Bloomberg Finance L.p.

Data verification method

Method for verifying data generated by an electronic device included in equipment, the electronic device including a computing unit, a one-time programmable memory and a volatile memory, the equipment including a rewritable non-volatile memory and a communication bus enabling the electronic device to store data in the rewritable non-volatile memory. The method includes: creating a secured channel by encryption between the equipment and a server; obtaining an authentication key from the server; loading data and a message authentication code from the rewritable non-volatile memory to the volatile memory, the message authentication code obtained by the electronic device from the authentication key and said data prior to the storage of said data and message authentication code in the rewritable non-volatile memory, the electronic device not having kept the authentication key following the obtaining of the message authentication code; verifying said data using the secret key and the message authentication code..
Starchip

Multi-factor authentication using positioning data

Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity.
Microsoft Technology Licensing, Llc

System and providing security solutions to protect enterprise critical assets

Exemplary embodiments of the present disclosure are directed towards a system and method for providing security solutions to protect enterprise critical assets. The system comprise a plurality of service requesting host devices enrolled with at least one authentication and authorization unit for accessing a plurality of enterprise applications by a plurality of users, wherein the plurality of enterprise applications provided by a plurality of service providing host devices.

Distributed data storage system using a common manifest for storing and accessing versions of an object

The present disclosure provides a system and method to perform access control authentication using a cryptographic hash of the encoding of access control rules. The compact cryptographic hash identifier of the access control rules is suitable for inclusion in a name indexing entry, whereas inclusion of the full encoding would result in a large name indexing entry, resulting in disadvantageously large storage requirements and bandwidth usage.
Nexenta Systems, Inc.

In-vehicle authentication system

An in-vehicle authentication system is disclosed. The in-vehicle authentication system includes a first authentication object apparatus; and a second authentication object apparatus configured to perform communication with the first authentication object apparatus.
Toyota Jidosha Kabushiki Kaisha

Network authentication of a geo-fenced volume

Provided is a method for managing a software defined network using a software control layer to regulate a geo-fenced volume. The software control layer can use a global positioning system (gps) including a range of latitudes, a range of longitudes and a range of altitudes.
International Business Machines Corporation

Systems and methods for authenticating a user based on a biometric model associated with the user

Systems and methods as provided herein may create a biometric model associated with a user. The created biometric model may be used to generate challenges that are presented to the user for authentication purposes.
Paypal, Inc.

Server and/or client device authentication

Embodiments of systems and methods for client and/or server authentication are provided. In one embodiment, a method includes sending information from a mobile network device to a server, wherein the information comprises a seed that is used by both the mobile network device and the server to compute a series of one time passwords.
Paypal, Inc.

Communication system, communication method, and computer program

A communication system includes: a first communication unit configured to communicate with a terminal apparatus; an authentication unit configured to transmit an authentication screen for inputting authentication information, in response to access from the terminal apparatus; a connection guiding unit configured to connect communication made from the terminal apparatus via the first communication unit and addressed to any destination, to the authentication unit; a display unit configured to display the authentication information input to the authentication screen and output by the terminal apparatus that has been connected to the authentication unit by the connection guiding unit and to which the authentication screen has been transmitted; and a connection control unit configured to permit connection of the terminal apparatus to a network via a second communication unit in accordance with the user input received by the input unit according to display by the display unit.. .

Information processing device, information management method, and information processing system

An information processing device that is connected to another information processing device includes a memory storing a program, a first authentication information for each user to access the information processing device and a second authentication information in association with the first authentication information for the each user to access the another information processing device; and a processor that performs the program so as to execute a method including the steps of receiving an acquisition request that is sent from a client device according to the first authentication information, transmitting a list including files that are accessible according to the second authentication information in association with the first authentication information of the received acquisition request, receiving an execution request to execute at least one of the files and the folders that are included in the list, and executing a process according to the execution request by using the second authentication information.. .
Ricoh Company, Ltd.

Apparatus control method, device and system

Provided are an apparatus control method, device and system. The method is applied to a controller of a system.
Suzhou Teknect Engineering Co., Ltd

Using biometric features for user authentication

An authentication request is sent to a server. An authentication request reply message is received from the server.
Alibaba Group Holding Limited

Detection of authorized user presence and handling of unauthenticated monitoring system commands

Techniques are described for detecting and handling unauthenticated commands in a property monitoring system. In some implementations, a monitoring system may include sensors located throughout a property, a monitoring control unit, and an input device.
Alarm.com Incorporated

Vehicle remote control system and vehicle-mounted apparatus incorporated in the same

A vehicle remote control system including an electronic key pre-registered as a device via which a vehicle can be remote-operated, and a mobile communication device pre-registered as a device that belongs to a user of the vehicle. In the system, a vehicle-mounted authentication unit is configured to determine whether or not authentication of the electronic key and the mobile communication device has succeeded, and a vehicle-mounted allowance determination unit is configured to, if it is determined by the vehicle-mounted authentication unit that the authentication of the electronic key and the mobile communication device has succeeded, allow operation of a predetermined vehicle-mounted activation unit..
Denso Corporation

Moving object tracking device, display device, and moving object tracking method

According to an embodiment, a moving object tracking device includes a memory having computer executable components stored therein; and a processor communicatively coupled to the memory. The processor is configured to perform acquiring a plurality of images; generating a plurality of pieces of tracking information indicating information obtained by tracking a moving object included in the images; generating first associated tracking information obtained by first association targeting the plurality of pieces of tracking information having a mutual time difference equal to or smaller than a threshold; generating second associated tracking information obtained by second association targeting the first associated tracking information and the tracking information, not associated by the first association, based on authentication information for identifying the moving object; and outputting the second associated tracking information..
Kabushiki Kaisha Toshiba

Method of handling weight data in a data processing system

A method of handling weight data in a data processing system involves acquiring and storing weight data of an item. A verification information is generated for the item based on the weight data, where the verification information is associated to the determined weight, the generation of the verification information including one of the following steps: a) encrypting the weight data where the verification information corresponds to the encrypted weight data, or b) determining a first message authentication code where the verification information corresponds to the first message authentication code, wherein when using the weight data the validity of the weight data for the item is verified by use of the verification information and if the weight data is verified as being valid weight data, a graphic representation of the weight data is generated..
Marel Iceland Ehf

Component for provisioning security data and product including the same

A security component according to an example embodiment includes: a user authentication processor configured to authenticate the input data by determining whether the input data is provided by an authorized user of the security component based on component user data of the input data; a master key generator configured to generate a master key based on the component user data of the input data in response to the user authentication processor authenticating the input data; a decryption processor configured to generate security data by decrypting encrypted data of the input data based on the master key; and a security storage configured to store the security data.. .
Samsung Electronics Co., Ltd.

Securing a transaction between a transponder and a reader

A transponder-reader payment system includes a fob including a transponder, and a rfid reader for interrogating the transponder. The system may further include a personalization system for populating onto the fob and rfid reader identifying information and security and authentication keys which may be used during mutual authentication of the fob and the reader and for completing a transaction.
Chartoleaux Kg Limited Liability Company

Information processing apparatus and information processing method

According to an embodiment, an information processing apparatus includes a communication interface, a memory device, and a controller. The controller inputs an authentication request from an information processing terminal via the communication interface.
Toshiba Tec Kabushiki Kaisha

Secure real-time transactions

A method including performing, at a mobile device being used by a consumer, an identity authentication of the consumer. The method also can include receiving, at the mobile device, first information from a point-of-sale terminal at a store of a merchant.
Early Warning Services, Llc

Incremental login and authentication to user portal without username/password

A first set of records is identified as being associated with a first asset. A second set of records is obtained, with the second set of records being associated with a second asset.
Klarna Ab

System and securely sending and receiving packages via drones

An autonomous vehicle comprising a transport body configured to travel to an identified location, a package retention device for securing one or more packages to the transport body; one or more processors integral to the transport body, wherein the processors are configured by code executing therein to: access shipper and recipient profile data; wherein the shipper and recipient profile data includes location data for shipper and recipient; navigate the autonomous vehicle to a shipping destination and a delivery destination; provide access to the package retention device upon authentication of a shipper presenting a package at a shipping destination, and provide access to the package retention device upon authentication of a recipient retrieving a package at the delivery destination.. .
International Business Machines Corporation

Run efficiency measuring system, a vehicle and a certificate

A run efficiency measuring system measures both investment into a vehicle for run and actual run performance by the vehicle. The investment means cost of energy, toll, and budgeted time, while the actual run performance means travel distance and saved time.
Nl Giken Incorporated

Ticket authentication method and ticket authentication device

A ticket authentication method and a ticket authentication device are provided. The ticket authentication method includes the following steps.
Industrial Technology Research Institute

System and method enabling location, identification, authentication and ranging with social networking features

An extensible system for intercommunication between smartphones and intelligent digital cameras that permits acquisition, identification, authentication and communication outside the cellular and networked interfaces. This concept provides a means for smartphones to intercommunicate securely and directly without network, or radio based wireless connection and to provide private visual and motion-image data communication at reasonable rates between parties outside of the cellular network.
The Quantum Group Inc.

Path-based access control for message-based operating systems

A system and method enforce file system path-based access controls in a message-based operating system. The system and method enforce a list of rules that provide a grant and an access restriction to file system paths to server applications.
2236008 Ontario Inc.

Service channel authentication token

A computer system receives an authentication request from a user device and determines a determined device identification from a set of received device attributes. When the device is properly authenticated, the computer system generates an authentication token that is signed by the determined device identification and returns the authentication token to the user device.
Bank Of America Corporation

Methods, systems, and products for authentication of users

Methods, systems, and products authenticate users for access to devices, applications, and services. Skills of a user are learned over time, such that an electronic model of random subject matter may be generated.
At&t Intellectual Property I, L.p.

Systems and methods for coordinating applications with a user interface

Systems and methods are disclosed for coordinating applications by detecting a touch input and a related touch input a device locations associated with the applications, one of which is a user authentication application. A parameter may be established with the user authentication application so that the other application runs with the at least one parameter..
Invensense, Inc.

Multi-input user interaction and behavioral based authentication system for context aware applications

A mobile device which can identify a change in possession of the device and based on a change in possession of the device implement different types of security protocols to follow based on a scoring system regarding threat of the user to the data on the mobile device.. .
International Business Machines Corporation

Information processing system that authenticates license of application program installed in information processing apparatus, and information processing method

An information processing system includes: one or more information processing apparatuses; and a management server, in which the management server includes a license key table management unit that receives inputs of a serial number, an application id, and a license key from an administrator and registers them in a license key table, and a license key authentication unit that extracts the corresponding license key from the license key table by using the application id and the serial number received from the information processing apparatus in which the application program is installed, and performs license key authentication of the application program by using the extracted license key, and the one or more information processing apparatuses each include an application installation unit that installs the application program, and an authentication requesting unit that transmits the application id and the serial number to the management server to request for license key authentication.. .
Kyocera Document Solutions Inc.

Apparatus and methods for rights-managed content and data delivery

Methods and apparatus for providing access to content across a plurality of devices and environments. In one embodiment, a downloadable rights profile is utilized in order for a user device to determine whether to provide content to a subscriber.
Time Warner Cable Enterprises Llc

System and intelligently coupling and connecting mobile terminals to a coordinate-measuring device

A coordinate-measuring system and related method for securely and intelligently coupling and connecting a mobile terminal device to a stationary coordinate-measuring device. A mobile terminal is arranged to be physically separate from and movable in relation to the coordinate-measuring device and is designed for the operation of the coordinate-measuring device.
Carl Zeiss Industrielle Messtechnik Gmbh

Safety management system for aircraft

The safety management system for a flying object performing flight control by changing, at a motor controller, a power feeding amount to each drive unit based on an instruction from a main control unit includes an authentication information storage unit which records registered identification information for performing operator authentication, authentication accepting means which accepts an input of input identification information, operator authentication means which performs operator authentication of an operator of the flying object based on the input identification information and the registered identification information, and a safety managing unit connected between a power source of the flying object and the motor controller of the flying object, wherein the safety managing unit includes switching means which switches an electrical connection state between the motor controller and the power source based on the result of the operator authentication.. .

System and enabling multi-modal communication

Systems and methods for a multi-tenant communication platform. At a multi-tenant communication platform, and responsive to authentication of a communication request provided by an external system, a routing address record of the communication platform is determined that matches a communication destination of the communication request.
Twilio, Inc.

Signal fingerprinting for authentication of communicating devices

Aspects of the subject disclosure may include, for example, receiving electromagnetic waves at a physical interface of a transmission medium that propagate along the transmission medium without requiring an electrical return path, wherein the electromagnetic waves are guided by the transmission medium, and wherein the electromagnetic waves have a non-optical frequency range. A determination is made as to whether the electromagnetic waves are being received from a second network device according to a comparison of a fingerprint of the electromagnetic waves and an expected fingerprint of expected parameters for the electromagnetic waves transmitted by the second network device.
At&t Intellectual Property I, L.p.

Authentication using application authentication element

Systems, apparatuses, and methods for performing transactions through mobile communication devices using either telecommunications networks or proximity near-field communications systems are disclosed. A mobile communication device may display an application authentication element.

Multi-tiered user authentication methods

Aspects of the present invention provide an approach for user authentication during a user session which potentially requires multiple user authentications. A library of authentication methods is provided for preforming the user authentications.
International Business Machines Corporation

Wireless guest engagement system

A guest engagement system and associated methods provide seamless engagement with guests of facilities through the use of wireless sensing technologies. The system makes use of individual guest devices which are carried by guests and used to automatically identify and authenticate the guests throughout the facility.
Carnival Corporation

Device, device coordination system, and device coordination method

A device communicably connected to one or more storage servers via a network includes circuitry. The circuitry acquires storage setting information including a setting relating to at least one storage server to be used by a user who is identified through a user authentication process.
Ricoh Company, Ltd.

Systems, methods and apparatuses for prevention of relay attacks

The systems, methods and apparatuses described herein provide an apparatus configured for preventing relay attacks on a communication link between the apparatus and a communication partner. The apparatus may comprise a communication port, a timer and a processor.
Ologn Technologies Ag

Mobile caller authentication for contact centers

A call request is received, from a mobile device, to establish a communication with a contact center. For example, the call request may be to establish a voice call with the contact center.
Avaya Inc.

System and transparent multi-factor authentication and security posture checking

A method for creating a secure connection between a remote client computing device and an enterprise asset platform includes a server receiving from a client computing device (ccd) a request being either a registration request or to access the asset platform, including a ccd unique identifier, determining if the ccd is previously blocked from accessing the asset platform, if so then terminating the method. If the request is a registration request, then generating a disambiguation query in accordance with predefined policy, receiving a response to the disambiguation inquiry from the ccd, verifying the contents of the disambiguation query response in relation to a predefined criteria.
General Electric Company

Centralized authentication and reporting tool

A system includes a retrieval engine, an authentication engine, an extraction engine, a determination engine, and an export engine. The retrieval engine receives a request for a data report from a user via a user device.
Bank Of America Corporation

Selective authentication system

A method and authentication mechanism is provided. A request is sent to authenticate a user of the application from a mobile device to an authentication server.
Adp, Llc

Seamless authentication for an application development platform

Various embodiments concern mechanisms for facilitating communication between network-accessible platforms for developing, hosting, or running hybrid applications that utilize resources hosted across multiple platforms. Hybrid applications cause messages or “calls” to be passed between the platforms that must be authenticated.
Financialforce.com, Inc.

Communication apparatus, communication system, communication method, and program

A communication apparatus that transmits a challenge code on the basis of a received request signal and performs authentication of an authentication target apparatus transmitting the request signal on the basis of the challenge code and a response code generated on the basis of the challenge code includes a control unit configured to perform a predetermined fail-safe process when a request signal is received a set number of times or more from the authentication target apparatus before completion of the authentication after the transmission of the challenge code.. .
Honda Motor Co., Ltd

Adaptive token cache management

Embodiments perform token cache management by renewing tokens heuristically. A token renewal request interval is defined based on a configurable lifetime of a token and an acquisition duration.
Vmware, Inc.

Technologies for ccm encryption with 64-bit block ciphers

Technologies for counter with cbc-mac (ccm) mode encryption include a computing device that performs a cbc-mac authentication operation on a message with an encryption key, using a 64-bit block cipher to generate a message authentication code. The computing device generates a first 64-bit authentication block including an 8-bit flag field and a length field of between 11 and 32 bits.
Intel Corporation

Wireless identification device, system, and interactive product authentication for smart advertisement enabled anti-counterfeit package

The present disclosure relates, according to some embodiments, to product authentication systems comprising a wireless identification device including a memory, a tamper evident detection circuit, and an electrically conductive circuit. The product authentication system may be configured to provide marketing information to the authentic wireless identification device.
Silicon Craft Technology Co., Ltd.

A method, a computer program product and a qkey server

The invention relates to a method for tightly coupling context to a secure pin and securely storing an asset in hardware. The method comprises a step of sending the context to a secure element, a step of ensuring that the context is shown to a user, and a step of acquiring user consent by performing an authentication check.
Ubiqu B.v.

Devices and accessories for use in wireless guest engagement systems

A guest engagement system and associated methods provide seamless engagement with guests of facilities through the use of wireless sensing technologies. The system makes use of individual guest devices which are carried by guests and used to automatically identify and authenticate the guests throughout the facility.
Carnival Corporation

Portable wireless devices for use in wireless guest engagement systems

A guest engagement system and associated methods provide seamless engagement with guests of facilities through the use of wireless sensing technologies. The system makes use of individual guest devices which are carried by guests and used to automatically identify and authenticate the guests throughout the facility.
Carnival Corporation

Devices and accessories for use in wireless guest engagement systems

A guest engagement system and associated methods provide seamless engagement with guests of facilities through the use of wireless sensing technologies. The system makes use of individual guest devices which are carried by guests and used to automatically identify and authenticate the guests throughout the facility.
Carnival Corporation

Door locks and assemblies for use in wireless guest engagement systems

A guest engagement system and associated methods provide seamless engagement with guests of facilities through the use of wireless sensing technologies. The system makes use of individual guest devices which are carried by guests and used to automatically identify and authenticate the guests throughout the facility.
Carnival Corporation

Door locks and assemblies for use wireless guest engagement systems

A guest engagement system and associated methods provide seamless engagement with guests of facilities through the use of wireless sensing technologies. The system makes use of individual guest devices which are carried by guests and used to automatically identify and authenticate the guests throughout the facility.
Carnival Corporation

Systems and methods for risk based decisioning

A method and system for creating an assurance level based on authentication data attributes using a computer device coupled to a database are provided. The method includes receiving an authorization request associated with the financial transaction from the sender, the authorization request including a fraud risk assessment of the financial transaction determined by the sender using an authentication response received from the computer device by the sender, the authorization request including one or more reason codes associated with the sender fraud risk assessment.
Mastercard International Incorporated

Network node authentication

An authentication technique is disclosed that uses a distributed secure listing of transactions that includes encrypted data that can be used to authenticate a principal to a verifier.. .
Priv8pay, Inc.

System for authenticating an electronic device by means of an authentication server

A system for authenticating an electronic device by means of an authentication server in order to authenticate a user of said electronic device. The system is adapted to perform an authentication based on a fictive payment transaction and includes the authentication server which is adapted to execute a fictive payment transaction with a predetermined transaction amount with said electronic device and during said execution to receive a first cryptogram from said electronic device; send said first cryptogram to a banking server; and receive from said banking server an acknowledgment if said first cryptogram is valid; when said fictive payment transaction has been executed, compute an authentication identification based on said electronic device's data; said electronic device which is a payment electronic device and which is adapted to execute said fictive payment transaction with said authentication server and during said execution to send said first cryptogram to said authentication server..
Gemalto Sa

System, method, and computer program product for issuing and using debit cards

A system, method, and computer program product are used to issue and track debit cards. A system comprises an enrolling system that verifies an enrollee, associates an enrollee's main and overdraft account, and issues a debit card, an authentication system that receives information regarding a requested transaction of a debit card and that receives information regarding the main and overdraft account associated with the debit card and accepts or rejects the requested transaction based thereon, and a settlement system that generates a periodic report of at least one of the transactions, the main account, and the overdraft account.
Iii Holdings 1, Llc

Systems and methods for expedited processing of authenticated computer messages

A transaction message processing server is configured to receive an authorization request message from a sender computing device, the authorization request message associated with a transaction. The server is also configured to detect a decision data element in an authentication outcome data field of the authorization request message, and interpret the decision data element as an indicator that the transaction is highly authenticated.
Mastercard International Incorporated

Intelligent authentication process

A method for authentication includes receiving consumer information associated with a consumer transmitted over a first data network in a processor operated by an account issuer; determining available account authentication options based on the received consumer information and a database of potential authentication options stored in a memory in the processor; selecting a set of available authentication options from the available account authentication options based on a database of attributes for the potential authentication options stored in the memory in the processor; transmitting consumer information to an authentication provider associated with a selected authentication option over a second data network; receiving an authentication confirmation over the second data network in the processor; and updating the database of attributes for the potential authentication options to include information regarding a successful authentication and the authentication provider associated with the selected authentication option.. .
Buy It Mobility Networks Inc.

User authentication method using fingerprint image and generating coded model for user authentication

A user authentication method using a fingerprint image, the user authentication method includes receiving at least a portion of a fingerprint image of a user; actuating a processor to divide the fingerprint image into a plurality of first sub-blocks; generate a set of input codes by encoding the first sub-blocks based on a coded model; measure a similarity between the set of the input codes and a set of registered codes included in a pre-registered binary codebook; and authenticate the user based on the similarity.. .
Samsung Electronics Co., Ltd.

Authentication screen

Techniques are disclosed relating to authenticating a user via a lock screen. In one embodiment, a computer device presents a two-dimensional matrix of elements on a display of the computing device and detects a continuous gesture performed by a user on the display over the two-dimensional matrix of elements.
Ca, Inc.

Authentication of audio-based input signals

The present disclosure is generally directed a data processing system for authenticating packetized audio signals in a voice activated computer network environment. The data processing system can improve the efficiency and effectiveness of auditory data packet transmission over one or more computer networks by, for example, disabling malicious transmissions prior to their transmission across the network.
Google Llc

Terminal device and computer program

A terminal device (10) comprises a group of sensors (11, 14 to 17) acquiring multiple different pieces of authentication information such as a password, fingerprint information, voiceprint information, and a face image. For each piece of the acquired authentication information, a controller (110) executes a separate authentication procedure based on each piece of authentication information on the basis of a reference level at which the authentication cannot be determined to be successful in authentication by a single piece of authentication information, determines whether the authentication is successful or failed from a combination of results of multiple separate authentication procedures, and unlock the device when determined that the authentication is successful..

Multimode mobile electronic medical record system and working method thereof

The present invention discloses a multimode mobile electronic medical record system and a working method thereof. The multimode mobile electronic medical record system comprises a plurality of mobile terminals, service server, push server, authentication server and cloud server.
Hefei University Of Technology

Targeted collection and storage of online social network data in evidence domains

Techniques and systems are provided for selecting, collecting, and storing online social network (osn) data pertinent to an evidence context. A collection request with content filter parameters, an authentication mode, and a targeted osn identity is received.
Social Evidence, Llc

User authentication in a removable media storage system

An authentication mechanism for dynamic self-provisioning of a magnetic tape cartridge library by a plurality of users for community accessed data storage. Authenticating a host computer and/or users of the host computer for accessing and processing data on a magnetic tape cartridge..
International Business Machines Corporation

User authentication in a removable media storage system

An authentication mechanism for dynamic self-provisioning of a magnetic tape cartridge library by a plurality of users for community accessed data storage. Authenticating a host computer and/or users of the host computer for accessing and processing data on a magnetic tape cartridge..
International Business Machines Corporation

Remote keyless entry message authentication

Method and apparatus are disclosed for remote keyless entry authentication. An example remote keyless entry system includes a key fob and a vehicle.
Ford Global Technologies, Llc

Two-wire authentication system for an aerosol delivery device

An aerosol delivery device is provided that includes a cartridge coupled with a control body. The cartridge is equipped with a heating element, an authentication device and a second switching circuit.
Rai Strategic Holdings, Inc.

Semiconductor Energy Laboratory Co., Ltd.

. .

Idefend Ltd.

. .

. .

. .

. .

. .

Method, apparatus, and system for reestablishing radio communication links due to radio link failure

One feature pertains to a method that includes establishing a radio communication connection with a first radio access node (ran) that uses control plane signaling connections to carry user plane data. The method also includes determining that the wireless communication device is experiencing radio link failure (rlf) with the first ran and that the radio communication connection should be reestablished with a second ran.
Qualcomm Incorporated

Scanning system, management device, computer-readable recording medium, and reading device

Provided is technology that improves user convenience. A scanning system includes a scanner that generates scanning data by scanning a document, and a management device that connects to the scanner, and processes the scanning data based on settings corresponding to a user authenticated by a first user authentication when the scanner executes a first user authentication process.
Seiko Epson Corporation

Security enhancement tool

A method comprises receiving a notification of a new system violation and determining whether the new system violation in combination with one or more of a plurality of existing system violations presents a threat to the system. The method further comprises increasing the security of the system in response to determining that the new system violation in combination with one or more of the plurality of existing system violations presents a threat to the system, wherein increasing the security of the system comprises one or more of increasing an authorization level and increasing an authentication level..
Bank Of America Corporation

Provision of access to a network

Disclosed is a method for granting access for a device to a private local network with a gateway device. The method includes: establishing a connection over the gateway device, wherein a request for accessing the private local network is transmitted; transmitting information on the device; receiving a request for preparing a setup of an authentication procedure; generating a pair of authentication keys; providing one of the generated authentication keys to the device requesting the access to the private local network; initiating the authentication procedure; granting access to the private local network for the device in response to a successful authentication procedure.
Telia Company Ab

System and a applying dynamically configurable means of user authentication

O. Dynamically changing authentication assessment based on determined sensitivity authentication parameter..

Framework for executing operations on systems

Methods and system are disclosed that execute an operation associated with a system. In one aspect, upon receiving a request to execute an operation, a connectivity model establishes a connection with a framework.
Sap Se

Iot device authentication

The disclosed technology is generally directed to device authentication in an iot environment. For example, such technology is usable in authenticating iot devices to an iot hub.
Microsoft Technology Licensing, Llc

Selectively enabling multi-factor authentication for managed devices

Disclosed are various examples of selectively enabling multi-factor authentication for applications on managed devices. An identity provider receives an authentication request for a first client application executed in a managed client device.
Airwatch Llc

Non-intrusive security enforcement for federated single sign-on (sso)

The technology disclosed relates to non-intrusively enforcing security during federated single sign-on (sso) authentication without modifying a trust relationship between a service provider (sp) and an identity provider (idp). In particular, it relates to configuring the idp to use a proxy-url for forwarding an assertion generated when a user logs into the sp, in place of an assertion consumer service (acs)-url of the sp.
Netskope, Inc.

User to user content authentication

Devices, systems and methods for authenticating a user to access electronic content include use of a processor configured to identify a technical condition for the content, access distributor logic providing a first release of the technical condition, receive a request from a subscriber to transfer the first release to an identified user, determine whether to approve or deny the request, and when approved, provide a device associated with the identified user with an authentication that permits the identified user to activate the first release and access the electronic content, and a database that stores the technical condition.. .
Dish Network L.l.c.

System and providing network support services and premises gateway support infrastructure

A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely manages delivery of application services, which can be voice controlled, by a gateway, e.g.
Kip Prod P1 Lp

System and providing network support services and premises gateway support infrastructure

A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely manages delivery of application services, which can be voice controlled, by a gateway, e.g.
Kip Prod P1 Lp

Systems and methods for device authentication

Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a medication delivery device may obtain a transitory identity and may send the transitory identity to a second computing device and a third computing device.
Infosci, Llc

Securing information exchanged between internal and external entities of connected vehicles

Data in vehicle networks has been treated as proprietary assets, due to car makers' concern of potential ip infringement via extraction of confidential vehicular data. To address this concern, an intermediate gateway in between internal and external networks translates proprietary in-vehicle data to rich type data, thus preventing the exposure of raw in-vehicle data.
The Regents Of The University Of Michigan

Controller area network message authentication

Method and apparatus are disclosed for controller area network message authentication. An example disclosed vehicle includes a data bus and a first control unit communicatively coupled to the data bus.
Ford Global Technologies, Llc

Devices and methods for client device authentication

An access point receives from a client a first nonce and a first cryptographic hash for the first nonce, the first cryptographic hash calculated using a first key derived from a second key, the second key input on the client or derived from a passphrase input on the client, derives first keys from each of a stored primary input and at least one stored secondary input valid at the deriving, the stored primary input and the at least one stored secondary input each being one of a second key and a passphrase, verifies the cryptographic hash using each derived first key to find a derived first key that checks the first cryptographic hash, generates a third key and a second cryptographic hash using the derived first key that checks the first cryptographic hash, and sends the third key and the second cryptographic hash to the client.. .
Thomson Licensing

Identity management for computer based testing system

A method and system for identity management and authentication of examination candidates by, for example, capturing biometric data and identification information from an examination candidate and storing the data and information in a database. The method and system includes, for example, capturing biometric data from an individual at a later time for comparison with data stored in the database, and which allows authentication of the individual after determining that the biometric data matches the previously stored data and the individual matches the previously stored information..
Prometric, Inc.

Online identification and authentication

Systems and methods may provide for online identification and authentication. In one example, the method may include generating a credential to represent a relationship based on a common ground of authenticated communication between a first user and a second user, identifying the second user to the first user, authenticating the relationship of the second user to the first user, and initiating, upon authentication, a communication between the first user and the second user..
Intel Corporation

Method of and operating a device by members of a group

A method of operating a device by controlling the device based on input received from group members, uses a sensor unit for monitoring each group member for detecting an instruction provided by a group member. The instruction includes a visual or audible instruction.
Koninklijke Philips N.v.

Method and system for user authentication by voice biometrics

Disclosed is a method including a prior phase for referencing an authorized user, during which this user pronounces a reference phrase at least once, the phrase being converted into a series of reference symbols by a statistical conversion mutual to all of the users to be referenced, and an authentication test phase, including a first step during which a candidate user pronounces the reference phrase at least once, and this pronounced phrase is converted in the same manner as the reference phrase during the prior phase, by using the same conversion, into a sequence of candidate symbols, and a second step during which the series of candidate symbols is compared to the series of reference symbols to determine a comparison result, which is compared to at least one predetermined threshold, determining whether the candidate user who pronounced the phrase during the test phase is indeed the authorized user, providing authentication.. .
Pw Group

Methods and biometric authentication in an electronic device

Embodiments of the disclosure provide methods and apparatus in which a biometric authentication score generated as the result of a biometric authentication algorithm is compared to a threshold value that can be dynamically varied as required to provide a variable level of security. For example, the threshold value may be varied in dependence on the semantic content of a voice signal, and/or the context in which the voice signal was acquired.
Cirrus Logic International Semiconductor Ltd.

Optical feedback for visual recognition authentication

Providing optical watermark signals for a visual authentication session by performing at least the following: receive, at an anti-spoof engine, an instruction to perform visual authentication operations for a visual authentication session, generate, with the anti-spoof engine, an optical watermark signal based on receiving the instruction, wherein the optical watermark signal includes at least one optical identifier to authenticate images captured during the visual authentication session, obtain, with the anti-spoof engine, an image source that includes captured images of the visual authentication session, determine, with the anti-spoof engine, whether the image source includes a reflected optical watermark signal, and compare, with the anti-spoof engine, whether the reflected optical watermark signal matches the generated optical watermark signal based on the determination that the image source includes the reflected optical watermark signal.. .
Mcafee, Inc.

Methods and systems for authenticating users for authorization rule relaxation

A method of authenticating an accountholder for relaxing payment transaction authorization rules is provided. The method is implemented using an authentication computing device in communication with a memory device.
Mastercard International Incorporated

Systems and methods for performing card authentication reads

A request may be received to perform a card authentication read. A card reader may be used to collect data from a card that is read by the card reader.
Trusona, Inc.

Authenticating online transactions using separate computing device

A method for authenticating an online transaction on a first computing device using a second computing device including detecting a request to process sensitive payment information input on the first computing device to complete a transaction, determining that a condition is present associated with the transaction, disabling a payment processing function of the website to prevent a payment from being processed and completed, generating a unique identifier to be displayed on the first computing device, wherein the user scans the unique identifier with a second computing device to initiate an authentication function, authenticating the user operating the first computing device, and enabling, by the processor, the payment processing function of the website to allow the payment to process.. .
Wal-mart Stores, Inc.

Mutual mobile authentication using a key management center

A system, method, and server computer configured to authenticate a consumer device. The consumer device is authenticated via a mobile gateway using challenge-response authentication.

Electronic commerce transaction authentication based on a vehicle travel route data

A device and method in a vehicle control unit for providing electronic commerce transaction authentication are provided. Upon receiving an electronic commerce transaction request relating to a transaction source, the vehicle control unit authenticates the transaction source against a vehicle travel route parameter by comparing the source location data with the vehicle travel route parameter.
Toyota Motor Engineering & Manufacturing North America, Inc.

Method of displaying user interface related to user authentication and electronic device for implementing same

A method and an apparatus are provided. The method and apparatus include a display, a fingerprint sensor formed in at least a part of a display area of the display, and a processor, wherein the processor is configured to identify content including at least one object to be displayed on the display, when the content is not associated with acquisition of fingerprint information, display the at least one object at a predetermined position, and when the content is associated with the acquisition of the fingerprint information, display the at least one object in at least the part of the display area in which the fingerprint sensor is formed.
Samsung Electronics Co., Ltd.

Ultrasonic biometric system with harmonic detection

A system may include a fingerprint sensor system and a control system. The system may be configured to transmit an ultrasonic wave including a first frequency.
Qualcomm Incorporated

Sensor management system

Provided is a system including, as components: a sensor node that includes a sensor unit including power supply means, an rfid tag, authentication means that performs authentication of a telegram written in the rfid tag, and stop instruction means that sends a stop command to the power supply means when the authentication fails, and that is enclosed in a weather-resistant case; and a user terminal that includes storage means in which the telegram is stored, and an rfid reader/writer.. .

Techniques for leveraging multiple cryptographic algorithms for authenticating data

Techniques for authenticating data on a computing device are provided. An example method according to these techniques includes generating a first cryptographic output by applying a first cryptographic algorithm to each block of a first subset of the plurality of blocks of data to be authenticated, combining a last block of the first cryptographic output with a second subset of the plurality of blocks of data to generate an intermediate result, and generating an authentication output by applying a second cryptographic algorithm to the intermediate result, the second cryptographic algorithm being different than the first cryptographic algorithm..
Qualcomm Incorporated

Secure management of user addresses in network service

Methods, systems, and programs are presented for securing user-address information. A first memory is configured according to a first table that does not include information about user identifiers.
Ebay Inc.

Semiconductor memory system and operating method thereof

A semiconductor memory system and an operating method thereof includes: a one-time-programmable memory device storing at least a customer identification (id) identifying a customer; a memory device; and a memory controller including a processor, and coupled to the memory device, containing instructions executed by the processor, and suitable for authenticating whether a program is authorized by a controller provider for the customer in a first-level signature authentication, in accordance with a customer image format, authenticating whether the program is authorized by the customer in a second-level signature authentication, in accordance with a program image format, after the first-level signature authentication is passed, when the customer image indicates the second-level signature authentication, wherein the program image format is different than the customer image format, storing the program into the memory device after the first-level signature authentication and second-level signature authentication are passed, and executing the program after the program is authenticated.. .
Sk Hynix Memory Solutions Inc.

Methods and authentication in an electronic device

Embodiments of the invention provide methods and apparatus for monitoring the routing configuration within an electronic device such that a biometric authentication process can be carried out without interference from other components of the device, such as may occur when the device has become infected with malware for example. The invention may provide a codec or speaker recognition processor, coupled to receive biometric input data, comprising a security module that determines whether a routing configuration complies with one or more rules.
Cirrus Logic International Semiconductor Ltd.

System and a applying dynamically configurable means of user authentication

F. Assigning a authentication score based on compatibility degree of matching user's phonetic information matched to the authenticated phonetic information..

Methods, systems, apparatuses, and techniques for employing augmented reality and virtual reality

Techniques for employing augmented reality or virtual reality information are presented. An information management component (imc) of an augmented reality device (ard) can monitor and detect user activities and conditions in area in proximity to ard.
Rockwell Automation Technologies, Inc.

Authentication using electromagnet signal detection

Systems of an electrical vehicle and the operations thereof are provided. In particular, a motor controller is described.
Nio Usa, Inc.

Method for handling transmission of fraudulent frames within in-vehicle network

An anti-fraud method for use in an in-vehicle network system including a plurality of electronic control units that exchange, in an in-vehicle network, data frames, each having added thereto a message authentication code (mac). The method includes generating a first mac by using a mac key and a value of a counter that counts a number of times a data frame having added thereto a mac is transmitted to the in-vehicle network.
Panasonic Intellectual Property Corporation Of America

Method and system for authentication in autonomous vehicles

Systems of an electrical vehicle and the operations thereof are provided that provide authentication mechanisms of external individuals or computing devices while the vehicle is operating autonomously.. .
Nio Usa, Inc.

Facilitating multigame currencies in multiple online games

A system and method for facilitating multigame currencies in multiple online games and security therewith is disclosed. The multigame currencies may be “spent” and/or “earned” by the players in the individual ones of the multiple online games.
Aftershock Services, Inc.

Verification of cell authenticity in a wireless network using an extended time stamp

We disclose various embodiments that enable a mobile terminal to confirm authenticity of a base station before the mobile terminal proceeds to camp on the corresponding cell, e.g., during an idle mode. In an example embodiment, the authentication processing includes the mobile terminal validating a digital signature included in an information block received from a candidate base station, the digital signature having been generated by the base station using an extended time stamp that indicates the calendar year, month, and/or day in addition to the utc time-counter value.
Alcatel-lucent Usa Inc.

Verification of cell authenticity in a wireless network through traffic monitoring

We disclose various embodiments that enable a mobile terminal to confirm authenticity of a base station before the mobile terminal proceeds to camp on the corresponding cell. In an example embodiment, the authentication processing includes the mobile terminal tuning to a selected control channel of the base station to monitor rf signals transmitted thereon.
Alcatel-lucent Usa Inc.

Communication apparatus, communication system, notification method, and program product

There is provided a communication apparatus including: a first communication unit having a first communication range; a second communication unit having a second communication range wider than the first communication range; a control unit which transmits a request signal for starting communication via the second communication unit from the first communication unit to another communication apparatus, and transmits authentication information from the second communication unit to the another communication apparatus in the case where it is determined that communication with the another communication apparatus via the second communication unit is possible based on a response signal after the first communication unit receives the response signal in response to the request signal; and a notification unit which notifies a user after the second communication unit receives a result of authentication based on the authentication information.. .
Sony Corporation

Method, apparatus, and system for authenticating wifi network

A method, an apparatus, and a system for authenticating a wi-fi network, where a terminal sends, to an associated authentication center when the wi-fi network exists in an area in which the terminal is located, a request message that carries a user identifier, receives access verification information allocated to a user represented by the first user identifier from the associated authentication center, sends, to a wi-fi authentication center, a login request that carries the access verification information, receives authentication information obtained and fed back by the wi-fi authentication center carrying a user identifier corresponding to the access verification information, and determines that the wi-fi network is a secure network when the user identifier carried in the authentication information is the same as the user identifier carried in the request message.. .
Huawei Technologies Co., Ltd.

System and using a symbol as instruction for a target system to request identity information and authentication from a mobile identity

Some implementations may provide a method to have a user authenticated at a point of service. The method includes: accessing, by a target system, a multi-dimensional symbol rendered on a display of a mobile computing device of the user, the multi-dimensional symbol encoding endpoints and actions for the target system to perform in order to request and authenticate an identity of a user; decoding data in the multi-dimensional symbol to retrieve an identity token plus information about the authentication actions and the user's identity system; requesting the corresponding authentication actions of the user's identity system to include specific authentication measures for the user to perform as well as data for the user to release; and performing the authentication actions as requested and encoded in the multi-dimensional symbol such that the physical identity of the user of the mobile computing device is verified and the user consents to release the requested identity information at the point of service..
Morphotrust Usa, Llc

Method for performing multiple authentications within service registration procedure

Embodiments herein provide a method for performing multiple authentications within a service registration procedure. The method includes sending, by a user equipment (ue) a register request message to an ip multimedia subsystem (ims) server.
Samsung Electronics Co., Ltd.

Communication method, authentication method, terminal apparatus, communication system, and authentication apparatus

There are provided a communication method, an authentication method, a terminal apparatus, a communication system, and an authentication apparatus for improving communication quality and a communication opportunity capture rate under an environment in which terminal apparatuses cluster within a two-dimensionally narrow range. The communication method of this invention is a communication method for providing a communication service associated with a principal service to a terminal apparatus, including a step of providing the communication service on the basis of information on the principal service provided to the terminal apparatus.
Sharp Kabushiki Kaisha

Verification of cell authenticity in a wireless network using a system query

We disclose various embodiments that enable a mobile terminal to authenticate a base station before the mobile terminal proceeds to attach to the corresponding network and/or camp on the corresponding cell, e.g., during the initial network selection and attachment or during an idle mode. In an example embodiment, the authentication processing includes the mobile terminal generating and sending to a candidate base station a system query with a nonce.
Alcatel-lucent Usa Inc.

Requesting system information

Systems and methods to request system information are provided. In some aspect, a user equipment (ue) transmits a request for on-demand system information.
Blackberry Limited

Anonymity authentication wireless sensor networks

An anonymity authentication method for wireless sensor networks is provided. A smart card carried by a user is used to provide two-factor verification protection.
National Chin-yi University Of Technology

Authentication for a limited data entry device

An lde authentication system is provided for granting to an lde device access to a resource of a resource provider. In accordance with the lde authentication system, an lde device sends to the resource provider a request to access the resource.
Microsoft Technology Licensing, Llc

Protection of the ue identity during 802.1x carrier hotspot and wi-fi calling authentication

This disclosure relates to techniques for performing wi-fi authentication in a wireless communication system. Public key cryptography may be used to enhance the confidentiality of the user's permanent identity in transit.
Apple Inc.

Method and system for authenticating users in public wireless networks

A method for authenticating a user of a user equipment provided with a mobile cellular network card module in a public wireless network. The method includes, during an authentication procedure following an attempt by the user to access the public wireless network with the user equipment for availing of services provided by the public wireless network: retrieving from the mobile cellular network card module a code that uniquely identifies such mobile cellular network card module; retrieving from a database wireless credentials of the user associated with said retrieved code that uniquely identifies such mobile cellular network card module; providing said retrieved wireless credentials of the user to the public wireless network; and granting the user access to the public wireless network conditioned to the correctness of the provided wireless credentials..
Telecom Italia S.p.a.

Image forming apparatus having circuitry for providing a user authentication input screen and providing a function selection screen displaying authenticated functions

An image forming apparatus is provided, in which the image forming apparatus includes a user database in which user identification information for identifying an user of the image forming apparatus is registered, an operation panel for receiving a key operation input, a secure program used for determining whether a user service can be provided on the basis of the user identification information in the user database and another user identification information input by the user.. .
Ricoh Company, Ltd.

Replaceable item authentication

A replaceable item for a host device, such as a print substance cartridge for a printing device, stores multiple identities. For each identity, the replaceable item stores multiple authentication values, or passwords.
Hewlett-packard Development Company, L.p.

Information processing device and information processing method

There is provided an information processing device, including: an acquisition unit that acquires authentication information and operation information; and a display control unit that controls a display on a basis of the authentication information or the operation information acquired by the acquisition unit. The display control unit causes a lock screen to be displayed in a case in which certain operation information is acquired while an initial screen is being displayed, causes an unlocked return screen to be displayed in a case in which an authentication process based on the authentication information is successful, and controls, on a basis of the operation information, a transition from the lock screen to the return screen conducted in accordance with the authentication process..
Sony Mobile Communications Inc.

Control of internet browsing in a secure environment

A system and method are disclosed for providing internet access to residents of a controlled-environment facility. There are significant dangers associated with provide such residents with internet access due to their criminal history.
Global Tel*link Corp.

System and providing network support services and premises gateway support infrastructure

A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely manages delivery of application services, which can be voice controlled, by a gateway, e.g.
Kip Prod P1 Lp

System and network entity assisted honeypot access point detection

Embodiments of the present invention relate to system and method for one of authenticating an authorized ap [106a] and barring a honeypot ap [106c]. More particularly, the embodiments may disclose a method for authenticating the access point based on a request from a user equipment [104a]; the method comprising steps of: comparing an ap identifier with a pre-configured list of ap identifiers to generate one of a positive response and a negative response; transmitting one of a denial response and a verification request; receiving one of a positive verification response and a negative verification response from the authorized ap [106a]; transmitting one of a positive authentication response to maintain the connection with the authorized ap [106a] in response to the positive verification response and a negative authentication response to release the connection with the honeypot ap [106c] in response to the negative verification response received from the authorized ap [106a]..
Reliance Jio Inforcomm Limited

Device authentication of aircrew mobile devices on board aircraft

Configurations of security settings of an access point arranged on board an aircraft. An exemplary embodiment of a method for configuring security settings of an access point arranged on board an aircraft for the authentication of mobile terminals comprises: receipt of flight-related security data from a mobile terminal via a configuration interface of the access point; and configuring of security settings of the access point in a configuration mode based on the flight-related security data so that automatic authentication of preconfigured mobile terminals for access to the access point is possible..
Airbus Defence And Space Gmbh

Authenticated access to cacheable sensor information in information centric data network

In one embodiment, a method comprises: receiving, by a requestor device in a data network, authentication request parameters for generating a secured request for a data object, the authentication request parameters comprising a shared encryption key and a prescribed update time interval value; generating, by the requestor device, the secured request based on generating a reduced-resolution time value by dividing a current device timestamp value of the requestor device by the prescribed update time interval value, and encrypting the reduced-resolution time value using the shared encryption key; and outputting, by the requestor device, the secured request specifying an object name identifying the data object and the encrypted reduced-resolution time value, enabling a content supplier device to authenticate the secured request based on determining whether the reduced-resolution time value, multiplied by the prescribed update time interval, substantially matches a corresponding timestamp value of the content supplier device.. .
Cisco Technology, Inc.

Response method and system in virtual network computing authentication, and proxy server

A response method and system in virtual network computing authentication, and a proxy server, where the method includes receiving, by a proxy server, a password from a controller, receiving challenge information from a serving end, where the challenge information is generated by the serving end based on the virtual network computing authentication, determining a first response value according to the password and the challenge information, and sending the first response value to the serving end in order to resolve a problem that sensitive data of a user is leaked or decrypted by brute force because a response process in the virtual network computing authentication is completed by a client, thereby improving security in the virtual network computing authentication process.. .
Huawei Technologies Co., Ltd.

Method and device for authenticating based on authenticating device

An authenticating method based on an authenticating device includes: a client obtains an application id according to an uri; requests a server for an authentication using the application id and a user identification; receives current authenticating data from the server; obtains client data object using a challenge value in the current authenticating data; hashes the client data object and the application id in the current authenticating data; obtains a key identification in the current authenticating data; sends current authentication request information including the client parameter, the key identification and key identification length to the authenticating device; receives authentication response information from the authenticating device; requests the server for a signature verification using the authentication response information, the client data object and a session id in the current authenticating data; and the authentication is successful if information returned from the server indicates verification pass, or is failed if otherwise.. .
Feitian Technologies Co., Ltd.

Data transmission method, authentication method, and server

Disclosed are a data transmission method, an authentication method, and a server. The data transmission method performed by a node among a plurality of nodes connected in a hierarchical structure includes generating a node identity (id) comprising at least one from among a virtual address for identifying the node and a group key for identifying a group to which the node belongs, generating a signature of the node by using at least one from among the node id and information about a previous node adjacent to the node, and transmitting a data packet to a server using a node chain formed based on signatures of the nodes..
Samsung Sds Co., Ltd.

Methods providing authentication during a session using image data and related devices and computer program products

A method providing use of an application may include providing a session for a user of the application, wherein the session is provided based on a credential for the user. While providing the session, image data for the session may be obtained, and responsive to the image data for the session, authentication may be performed based on a determination whether the image data for the session includes a facial image that matches the user credential.
Ca, Inc.

Device registration, authentication, and authorization system and method

A system includes one or more processors to receive a registration request, the registration request comprising a representation of a username and a password, verify the username and the password and transmit a one-time-use password, receive the one-time-use password and first device identifier information from a mobile computing device, receive an access request from the mobile computing device comprising the representation of the username and the password, second device identifier information, and application key information, verify the username, the password, the second device identifier information, and the application key information, and transmit a token to the mobile computing device, and receive a resource request from the mobile computing device comprising the token and third device identifier information.. .
Level 3 Communications, Llc

System and authenticating the legitimacy of a request for a resource by a user

A method of authenticating the legitimacy of a request for a resource from a resource provider by a user, including providing an authentication process in which a resource provider message is received and de-assembled, the integrity of the user request message is confirmed, a result indicator as to the legitimacy of the resource provider message is created by performing two or more authenticity checks, and an authentication result is sent.. .
Robojar Pty Ltd

Device fingerprint based authentication

A device fingerprinting system provides an additional factor of authentication. A user device may be redirected, along with user id parameters, to authentication system.
Secureauth Corporation

System and method to share a resource or a capability of a device

A method includes transmitting, from a first device, a message indicating that the first device is available to share a resource. The method includes receiving, at the first device, a request to use the resource, the request received from a second device, where the request includes identification information.
At&t Mobility Ii Llc

Facilitating users to obfuscate user credentials in credential responses for user authentication

A system and method for facilitating users to obfuscate user credentials in credential responses for user authentication are disclosed. A string sequence may be presented to a user for prompting the user to input credential characters sequentially but not continuously.
Aftershock Services, Inc.

Image based method, system and computer program product to authenticate user identity

An authentication process is disclosed which authenticates a user identity with a password that includes at least one portion based on an image that is saved on the user's local device. The password generated may be based on the user selected image and the process may use the image in calculating a hash function for the password.

Authenticating identity for password changes

In an embodiment, a password risk evaluator may receive a request including a user identifier (id) and a password. The password risk evaluator may retrieve a password preference model associated with the user id, and may determine a risk score indicating a likelihood that the password is associated with the user id.
Ca, Inc.

Method for authenticating internet users

A method and system for authenticating an internet user identity by cross-referencing and comparing at least two independent sources of information. A first geographical location of a computer signature of an internet user is identified, and the geographical location of a communication voice device of said internet user is identified to determine a second location.

Need based controller area network bus authentication

Systems and methods are provided and include a control module that receives a communication packet from a communication node that includes at least one of a vehicle sensor and a vehicle system via a controller area network bus. The control module determines whether the communication packet from the communication node indicates that the vehicle sensor or the vehicle system associated with the communication node is operating outside of a predetermined acceptable operating range.
Denso International America, Inc.

Apparatus authentication system, management device, and apparatus authentication method

A management device includes a counter that counts the first number of times authentication of a first communication device has been successful, a generating unit that generates a first password based on the first number of times, and a sending unit that sends a registration request that requests registration of the first password. The first communication device includes a counter that counts the second number of times authentication of the first communication device has been successful, a generating unit that generates a second password based on the second number of times, and a sending unit that sends a connection request that includes the second password.
Fujitsu Limited

System and providing network support services and premises gateway support infrastructure

A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely manages delivery of application services, which can be voice controlled, by a gateway, e.g.
Kip Prod P1 Lp

Method for processing user information detected by at least one detection device of a system

A method for processing user information detected by at least one detection device of a device, in which information concerning at least one user detected by the at least one detection device is transmitted to a number of databases, and in which the information detected by the at least one detection device is at least partially associated with a user profile, and in which all information stored on the number of databases which has been detected by the at least one detection device and associated with the user profile is retrieved from the number of databases, and as a function of a result of an authentication of the user is output to the user on at least one output unit for processing.. .
Robert Bosch Gmbh

Technique for managing profile in communication system

Disclosed are: a communication technique and a system therefor for fusing, with iot technology, a 5g communication system for supporting a data transmission rate higher than that of a 4g system. Provided is a method for installing a profile of a terminal having an embed universal integrated circuit card (euicc) in a mobile communication system, the method comprising: requesting for an euicc authentication certificate to an euicc and receiving the euicc authentication certificate; and transferring a profile package to the euicc so as to install a profile, wherein the received euicc authentication certificate further comprises an euicc manufacturer (eum) authentication certificate..
Samsung Electronics Co., Ltd.

Authentication-based message display method and communication terminal thereof

The present disclosure discloses an authentication-based message display method and a communication terminal thereof. The method includes: a communication terminal determines whether a received message contains a setting content; marking the message as an encrypted message if contains; determining whether an authentication data which is inputted by a user and matches the encrypted message is obtained, when a display request for the encrypted message is received; displaying the encrypted message if obtained, and not displaying the encrypted message if not obtained.
Huizhou Tcl Mobile Communication Co., Ltd

Secure container platform for resource access and placement on unmanaged and unsecured devices

A first computing device receives a service access request to access a service provided by another computing device, the request including user authentication characteristics of a user. The first computing device forwards the service access request to the other computing device.
Appbus, Inc.

A first entity, a second entity, an intermediate node, methods for setting up a secure session between a first and second entity, and computer program products

The invention relates to a method for setting up a secure session between a first entity and a second entity. In an embodiment, the first entity is a user authentication device and the second entity is an application running on a platform.
Ubiqu B.v.

Initial provisioning through shared proofs of knowledge and crowdsourced identification

Systems and methods for initial provisioning through shared proofs of knowledge (poks) and crowdsourced identification are provided. In some embodiments, a method of sharing a pok between a first relying party (rp) server and a second rp server includes receiving, by the first rp server, a request from a client device by a user for sharing the pok.
Antique Books, Inc.

Apparatus and encryption

Disclosed are an encryption apparatus and method. The encryption apparatus includes a storage configured to store a static key table, and at least one processor configured to implement an authenticator configured to perform authentication with an external apparatus and acquire authentication information and a key table generator configured to generate a dynamic key table using authentication information acquired through the authentication..
Samsung Sds Co., Ltd.

Distribution and verification of transaction integrity keys

The present disclosure relates to generating an identifier, an encrypted value that is an original value encrypted, and a message authentication code (mac) at a server device, and to generating a message including a message header and a message body, said message header including the identifier and the mac, and said message body including the encrypted value, and said that the mac key used to compute the message authentication code is included in the original value to be encrypted, and further relates to transmitting the message to a client device.. .
Hewlett Packard Enterprise Developmet Lp

Nfc tag recognition device and nfc tag recognition system including the same

An nfc tag recognition device includes an antenna responsive to signals transmitted by an nfc tag, a radio frequency (rf) signal processor measuring power of the signal received by the antenna from the nfc tag and converting the signal into digital data, an nfc controller extracting an authentication key from the digital data, an authentication signal processor generating an authentication pattern from the nfc tag, and an authentication signal storage storing an authentication key and an authentication pattern of a registered user. The authentication signal processor generates an authorization grant signal if the extracted authentication key matches the stored authentication key and the generated authentication pattern matches the stored authentication pattern..
Samsung Electronics Co., Ltd.

Methods, systems and devices for access control

Methods, systems and devices for access control are provided. The present disclosure provides a communication device of a user communicating access details associated with the facility, to a client system within the vicinity of which the communication device is located, and the client system verifying the access details and transmitting an electronic request to a host server.
Mastercard International Incorporated

Pre-authenticated online ordering system

A computerized method and system for presenting a user interface is provided. A set of user authentication credentials are received from a first user device, the set of user authentication credentials sufficient to uniquely identify a user of the user device as being registered with a network-based publication system.
Ebay Inc.

Method and system for authenticating iot device using mobile device

Provided is an authentication system including: a device authentication agent installed in an internet of things (iot) device with a communication module and generating first device authentication information for authenticating the corresponding iot device; an authentication server connected with the iot device through wired or wireless communication and generating second device authentication information for authenticating the iot device; and a mobile agent installed in a mobile device of a user, connected with the iot device and the authentication server through the wireless communication, and verifying whether the iot device or a message determined to be received from the iot device is authentic according to whether the first device authentication information transmitted from the iot device and the second device authentication information transmitted from the authentication server coincide with each other.. .
Estorm Co., Ltd.

Methods of authenticating a user for data exchange

A method of facilitating the exchange of data between a user having a computing device, and a remote entity, where a first connection has been established between the user and the remote entity, and where the user has associated data exchange information with an application on the computing device, the data exchange information defining properties of the data to be exchanged between the user and the remote entity. The method comprises establishing, at a server, a second connection to the computing device; enabling retrieval of a user authentication attribute associated with the data exchange information; enabling retrieval of a device authentication attribute associated with the data exchange information; enabling authentication of the user using the user authentication attribute; and enabling authentication of the computing device using the device authentication attribute, where data may be exchanged between the computing device and the remote entity in accordance with the data exchange information following authentication of the user and the computing device..
Eckoh Uk Limited

Systems and methods for enhanced verification of new users to a network based service

A computer-based method for verifying a new user during enrollment to a digital wallet application is provided. The method is implemented using a digital wallet computing device including one or more processors in communication with one or more memory devices.
Mastercard International Incorporated

Multi-point authentication for payment transactions

Authentication includes receiving an indication of physical possession of a payment card by a merchant and receiving a purchase request for an authorization of an exchange from the payment account of the cardholder to the merchant. Authentication includes assigning a randomized transaction identifier to the request for the authorization of the exchange.
International Business Machines Corporation

System and object authenticity detection

System for determining authenticity of an object in which a light-source directs collimated or telecentric light toward an authentication-region on the object, which impinges on the authentication-region at a predetermined angle relative to the normal of a plane defined by the object, a portion of the light is reflected from the authentication-region and another portion of the light is scattered from the authentication-region, an imager, focused on the authentication-region, acquires a focused-image of the scattered-light, the image includes image-features related to surface-features-scattering-phenomena of the authentication region, the processor determines correspondence between part of the acquired image and a corresponding part of a stored-image corresponding to the authentication-region, the processor identifies the object as authentic when the acquired-image corresponds to the stored image, the processor identifies the object as non-authentic when the acquired-image does not corresponds the stored-image.. .
Elbit Systems Land And C4i Ltd.

Authentication apparatus and authentication method

The present invention is an authentication apparatus comprising: a prism of an approximately quadrangle-frustum shape, the prism of the approximately quadrangle-frustum shape is arranged so that a bottom side, out of two parallel surfaces of the prism of approximately quadrangle-frustum shape, is a placing surface side for a finger; a first imaging means is arranged below a top surface parallel to the bottom surface, the first imaging means that images an image of the finger transmitted through the top surface; a light source that radiates light to at least one side surface of a first set of side surfaces, out of two sets of side surfaces of the approximately quadrangle-frustum shape that face each other; and a second imaging means that images the image of the finger transmitted through a second set of side surfaces, out of the two sets of side surfaces.. .
Nec Corporation

Physical token based secured charge management of a user equipment

Embodiments for physical token based secured charge management of a user equipment (ue) by a processor. A power charging session is authorized by firmware of the ue for charging the ue upon detecting one or more physical authentication tokens within a selected area of a power charging source or on the power charging source itself, or combination thereof..
International Business Machines Corporation

Mobile, portable authenticating a security article and operating the portable authentication apparatus

A mobile, portable apparatus for authenticating, verification and certification of a security article, the apparatus comprising an enclosure securely housing components of the apparatus; an authentication device operable to authenticate the security article; a power source, preferably of solar type, different type of batteries, uninterruptable power supply, different type of charging facilities and/or any source of energy; an imaging device for simultaneously imaging in opposing and/or multiple directions; a programmable and configurable control panel; an information processing unit; and a printing device for printing and/or special marking on the security article, wherein the imaging device is portably coupled to the authentication device; and wherein the control panel is arranged as an interface command and control center connected to the information processing unit and the other components of the apparatus. The method involves determining whether a registered operator of the portable authentication apparatus is verified; and permitting access to an authentication device of the portable authentication apparatus if the registered operator is verified.
Sicpa Holding Sa

Voice authentication via secondary device

A user initiates a voice request to perform an operation with an external service and provides a voice credential for the operation. A determination is made as to whether the user has used a separate device from that which is associated with the voice request to log into the external service within a preceding amount of time before the voice request and/or within a succeeding amount of time following the voice request.
Ncr Corporation

Biometric identification device with removable card capabilities

A removable card-enabled bpid security device integrates a removable card reader with a biometric authentication component to provide secured access to electronic systems. The device allows for an individual to insert a removable card into an aperture in the physical enclosure of the bpid security device, allowing the removable card and the bpid security device to electronically communicate with each other.
1perfectid, Inc.

System, device, and secure utilization of fingerprints for user authentication

System, device, and method of secure utilization of fingerprints for user authentication. A method includes: capturing a fingerprint that a particular user provides to an electronic device; generating a raw fingerprint signature that corresponds to bodily features of the fingerprint of the particular user; monitoring user interactions of the particular user, during the capturing of the raw fingerprint, via one or more input units of the electronic device; extracting from the monitored user interactions a user-specific characteristic that is user-specific to the interactions of the particular user; generating a user-specific reference fused data-item, by utilizing both: (i) the raw fingerprint signature that was generated, and (ii) the user-specific characteristic that was extracted; subsequently, utilizing the reference fused data-item as a reference for user-authentication..
Biocatch Ltd.

Multi-biometric authentication

A method (100) of authenticating a subject (21) using a plurality of biometric traits, comprising: determining (110) a first data set representative of a first biometric trait that is based on at least one of iris pattern or iris colour of the subject; determining (120) a second data set representative of a second biometric trait that is based on a corneal surface of the subject; comparing (130) the first data set representative of the first biometric trait with a first reference and the second data set representative of the second biometric trait with a second reference; and authenticating (140) an identity of the subject based on the comparison.. .
Wavefront Biometric Technologies Pty Limited

Sensor-based authentication

Embodiments of the present disclosure relate to a new approach for sensor-based authentication to enhance mobile security. In the computer-implemented method, motion related sensor data is obtained.
International Business Machines Corporation

Security device, methods, and systems for continuous authentication

Methods, systems, and computer programs are presented for securing a computing device. One security device includes a processor, memory and a connector.
Nss Lab Works Llc

Authentication system

A system and method for authentication are described herein. An authentication request is received at a combiner proxy (350).
Hewlett-packard Development Company, L.p.

Image forming apparatus and communication system

A login management portion performs user authentication on the basis of a user id and allows login of a user. A transfer control portion transmits, to a predetermined call transfer control device, a transfer setting request for causing a voice communication device to change an incoming call destination of a telephone number that corresponds to the user id of the user whose login has been allowed.
Kyocera Document Solutions Inc.

Unmanned aircraft systems (uas) robotic-platform (drone) management

An unmanned aircraft systems (uas), automated management method is invented for civilian unmanned aerial vehicle (uav) safe, controlled and accountable deployments. The method includes an attachable electronic module, use of a computerized networked enterprise (cloud), biometric operator authentication, all of which provides automated identification, gps tracking location data and recording of all relevant information.

Nanoparticle-serialized oligonucleotide methods, compositions, and articles

The disclosure relates to the use of nanoparticles that are coated with unique oligonucleotide (e.g., dna) sequences of various base lengths (“nano-dna”) that act as barcodes for product authentication, product serialization, brand protection, track-and-trace, intelligent supply chain, and law enforcement. The nano-dna can be incorporated into inks, dyes, resins, labels, and other markings at all manufacturing levels, including the product (unit) level, to encode company and product-specific information.
Board Of Trustees Of Michigan State University

Method, apparatus and computer program product for providing sensor data collection and sensor configuration

A method, apparatus and computer program product provide data collection via a plurality of sensors, user authentication, data storage, and sensor replacement and configuration. The sensors may be integrated in or on various types of devices and/or household objects and may provide a wide range of data regarding users, use of the respective items, and/or their environments.
Nokia Technologies Oy

Building automation systems for online, offline, and hybrid licensing of distributed edge devices

A heating ventilation and air conditioning (hvac) system for a building space includes an hvac device including a processing circuit. The processing circuit is configured to generate an encrypted dynamic key based on a manifest stored on the device.
Johnson Controls Technology Company

Ground station and tether for unmanned aerial vehicles

An unmanned aerial vehicle system includes a ground station including a case, a power supply housed in the case, and a tether having a first end and a second end opposite to the first end. The first end of the tether is coupled to the case.
Stabilis Inc.

Replaceable item authentication

A replaceable item for a host device includes a non-volatile memory and logic. The non-volatile memory stores passwords or authentication values, and/or a cryptographic key.
Hewlett-packard Development Company, L.p.

Method for starting inter-frequency measurement and related device

A method for starting inter-frequency measurement is provided. The method is applied to an inter-frequency network, the inter-frequency network includes a first base station and a second base station, there is an overlapping area between a signal coverage area of the first base station and a signal coverage area of the second base station, and an access priority of the second base station is higher than an access priority of the first base station; user equipment accesses the first base station; a distance between the second base station and an ap is less than a first distance threshold, and the ap is controlled by an ac.
Huawei Technologies Co., Ltd.

Method and securing timing packets over untrusted packet transport network

Methods, devices, systems, techniques, and computer program products are provided to secure timing synchronization to network nodes connected over an inherently insecure best effort public network with mechanisms to improve accuracy of timing protocols such as a statistically estimated edge timestamp offset encoded into the timing message to account for network jitter and processing latency variances incurred due to the security packet processing and encryption; to ensure slave network nodes shall only accept timing messages from trusted timing sources; to establish a secure tunnel with a trusted timing source for exchange of timing packets; to provide authentication and security for timing packets over the insecure public network; and to enhance message anonymity with variable payload padding.. .
Nokia Solutions And Networks Oy

Systems, apparatuses, and methods for secure beacon authentication via mobile devices

Systems, apparatuses, and methods for secure beacon authentication via mobile devices are disclosed. In some example embodiments, a verification element comprises: a memory storing a plurality of non-repeated verification codes; a wireless broadcast element; and a processing circuit electronically coupled to the memory and the wireless broadcast element, the processing circuit being configured to retrieve one of the non-repeated verification codes from the memory and to transfer the non-repeated verification code to the wireless broadcast element, the wireless broadcast element being configured to wirelessly broadcast the non-repeated verification code to a plurality of mobile devices for individual verification of the plurality of mobile devices, the non-repeated verification code being different than any other non-repeated verification code previously retrieved from the memory and used for individual verification of the plurality of mobile devices..
Inmarket Media Llc

Systems, apparatuses, and methods for secure beacon authentication via mobile devices

Systems, apparatuses, and methods for secure beacon authentication via mobile devices are disclosed. In some example embodiments, a verification element comprises: a memory storing a plurality of non-repeated verification codes; a wireless broadcast element; and a processing circuit electronically coupled to the memory and the wireless broadcast element, the processing circuit being configured to retrieve one of the non-repeated verification codes from the memory and to transfer the non-repeated verification code to the wireless broadcast element, the wireless broadcast element being configured to wirelessly broadcast the non-repeated verification code to a plurality of mobile devices for individual verification of the plurality of mobile devices, the non-repeated verification code being different than any other non-repeated verification code previously retrieved from the memory and used for individual verification of the plurality of mobile devices..
Inmarket Media Llc

Communication control apparatus, system, and method therefor

In a communication control method for wireless communication between a first communication device and a second communication device through a wireless communication unit, identification information is notified from the second communication device to the first communication device by using a communication unit other than the wireless communication unit. Wireless communication between the first and second communication devices is performed by the wireless communication unit using the first communication parameter shared in advance, and authentication processing based on identification information is performed.
Canon Kabushiki Kaisha

Method and connection between electronic devices

Disclosed are a method and an apparatus for connecting electronic devices based on biometric information without a certification server. An electronic device includes a wireless communication unit configured to perform wireless communication with an external device; a biometric recognition module; a memory; and a processor connected to the wireless communication unit, the biometric recognition module, and the memory.
Samsung Electronics Co., Ltd.

Methods, systems, and media for recommending collaborators of media content based on authenticated media content input

Methods, systems, and media for recommending collaborators of media content based on authenticated media content input are provided. In some implementations, the method comprises: receiving a request from a content creator to initiate presentation of broadcasted media content using a media device, wherein the request invites a plurality of users to participate in the broadcasted media content; determining that a user of the plurality of users has interacted with the broadcasted media content, wherein the user has been permitted to interact with the broadcasted media content in response to providing user authentication information; determining collaborator information associated with the user based on the user authentication information; and automatically causing, without user interaction, the determined collaborator information to be presented to the content creator for associating with the broadcasted media content..
Google Llc

Method and infrastructure for synchronized streaming of content

Systems and methods for synchronizing the playback of network media across multiple content playback devices, termed herein as “playback devices”, “clients”, or “client devices”. In one implementation, client devices are controlled to parse and buffer media content separately.
Sony Network Entertainment International Llc

Network based call authentication

A device may receive, from a network device, a resolution query associated with a call. The resolution query may include a device identifier of the network device.
Verizon Patent And Licensing Inc.

Secure controlling of vehicle components in a telecommunication network

A telecommunication network, an authentication node, and a method for commissioning an electronically controllable vehicle component of a telecommunication network. For commissioning, the vehicle component requires a verification of authentication data that are to be acquired.
Robert Bosch Gmbh

Securing ordered resource access

Ordered access to resources is controlled by restricting access to additional resources that are accessible when a client device provides an authentication provided when accessing an initial resource. When the client device accesses the initial resources, a set of access parameters are identified describing the request and the client device providing the request, and included with an expiration time in generating a token.
Perimeterx, Inc.

Peer to peer enterprise file sharing

Disclosed are various embodiments for facilitating the distribution of files from a file repository. Files from a file repository can be distributed via peer to peer transmissions where the peer devices can perform authentication functions.
Airwatch Llc

Peer to peer enterprise file sharing

Disclosed are various embodiments for facilitating the distribution of files from a file repository. Files from a file repository can be distributed via peer to peer transmissions where the peer devices can perform authentication functions.
Airwatch Llc

Peer to peer enterprise file sharing

Disclosed are various embodiments for facilitating the distribution of files from a file repository. Files from a file repository can be distributed via peer to peer transmissions where the peer devices can perform authentication functions.
Airwatch Llc

Rfid authentication architecture and methods for rfid authentication

A method for mutual authentication in an rfid system comprising an rfid reader and an rfid tag, the method comprising requesting an identification from the tag, receiving the identification, using the received identification to select a password associated with the identification, generating a password key based on the selected password, encrypting the selected password using the password key, and transmitting the encrypted password to the tag.. .
Neology, Inc.

Method of mutual authentication between agent and data manager in u-health environment

Disclosed is a method of mutual authentication between an agent and a data manager in a u-health environment, in which the agent performs identification recognition using an identification (id) of the agent, i.e., a system-id, a secret key, encryption, and a one-time use random number generator, instead of using biometric scan data of an existing ieee 11073 agent, and hence bidirectional authentication, rather than unidirectional authentication, is allowed.. .
Industry-academic Cooperation Foundation Halla University

Automatic association of authentication credentials with biometrics

A computing device may receive authentication information. Within a time-out period, a fingerprint may also be received.
Apple Inc.

A authenticating a user when logging in at an online service

Provided is a method for authenticating a user when logging in at an online service, where the online service is provided by a server arrangement and the method is based on a communication between the online service and a primary device and between the online service and a secondary device. The method comprising the following steps: a user identification specified by the user at the secondary device and not including any credential is received by the online service; an authentication request is transmitted by the online service to the primary device where the primary device is associated with the user identification; an authentication response comprising at least one credential is transmitted by the primary device to the online service, where the at least one credential originates from a storage in the primary device and is only transmitted through the authentication response upon a successful local authentication of the user at the primary device..
Siemens Aktiengesellschaft

Authentication-free configuration for service controllers

Embodiments generally relate to out-of-band management of a computing system. The present technology discloses enable a primary service controller to provide a centralized configuration of multiple secondary service controllers so that they can share a same configuration.
Quanta Computer Inc.

Private simultaneous authentication of equals

A passphrase is assigned to an end user device for use in authenticating the end user device for a network using sae. An identification of the end user device is determined during an authentication process.
Aerohive Networks, Inc.

Systems and methods for generating multi-dimensional password and authenticating thereof

Systems and methods for multi-dimensional password generation and authentication is provided. The method includes selecting a virtual reality (vr) environment, rendering interactive objects in the vr environment, tracking a first set of activities including user behavior, user interaction with the objects, and changes made to the objects, the behavior including user position(s), head rotation, time spent on a particular position, gps coordinates, and the changes include one of position, shape, color, and rotation of the objects.
Tata Consultancy Services Limited

Systems and methods to authenticate users and/or control access made by users on a computer network using a graph score

A controller for user authentication and access control, configured to: store data representing a graph having: nodes representing data elements associated with accesses made using an access token; and links among the nodes representing connections between the data elements identified in details of the accesses. In response to receiving details of an access made using the access token, the controller updates the graph according to the details and determines a plurality of measurements of the graph.
Idm Global, Inc.

Abstracting an authentication sequence using http

An enterprise server is provisioned with an authentication response language, where the authentication response language allows the enterprise server to issue instructions for authentication steps to an enterprise client, which enables the enterprise client to execute a set of instructions for navigating an authentication sequence. The set of instructions installed into and served by the enterprise server varies depending on a protocol inherently used by the authentication topology.
International Business Machines Corporation

Authenticating mobile applications using policy files

Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, via a first server, a key pair and a policy file associated with a mobile service from a second server.
International Business Machines Corporation

System and associated software for providing advanced data protections in a defense-in-depth system by integrating multi-factor authentication with cryptographic offloading

The advanced data protection system is implemented by distributing data encryption across multiple isolated computing systems and using multi-factor authentication to access remote, protected decryption material. Architectural components include: client application software reading/writing from/to a client data store executing on a client host computer, client application plug-ins communicating with external authentication devices, server application software reading/write data from/to a server data store executing on a host computer which is physically or virtually isolated from the client host computer, authentication devices, components, or systems integrated with or connected to the client computer and exposing programmatic interfaces to client application software, and secure networking components executing on both hosts that provide secure data exchange.
Definitive Data Security, Inc.

Federated mobile device management

In one example of federated mobile device management, a first management server federates with a second management server based on an exchange of one or more identity authentication certificates between them. After the first and second management servers have federated or affiliated, they can exchange mobile device management data, including compliance policies, rules, resources, etc., with each other.
Airwatch Llc

Device provisioning protocol (dpp) using assisted bootstrapping

This disclosure provides systems, methods and apparatus, including computer programs encoded on computer storage media, for enhancing a device provisioning protocol (dpp) with assisted bootstrapping. In one aspect, a configurator device can provision an enrollee device for a network with the assistance of an intermediary device.
Qualcomm Incorporated

Methods for header extension preservation, security, authentication, and protocol translation for rtp over mprtp

Systems, methods, and devices of the various embodiments provide for header extension preservation, security, authentication, and/or protocol translation for multipath real-time transport protocol (mprtp). Various embodiments include methods that may be implemented in a processor of a computing device for mprtp transmission of real-time transport protocol (rtp) packets.
Qualcomm Incorporated

Transaction authentication based on contextual data presentation

Methods, devices, and systems are provided for approving a transaction through an exchange of presented user contextual approval information and approval decryption. The user contextual approval information is generated by a user during a transaction, cryptographically signed, and provided to a transaction server.
Assa Abloy Ab

Replaceable item authentication

A replaceable item for a host device includes a non-volatile memory and logic. The non-volatile memory stores passwords or authentication values, and/or a cryptographic key.
Hewlett-packard Development Company, L.p.

System and authenticating electronic content

The present invention provides for an authenticity marker to be embedded within web page and/or email content which allows a user to validate that the content originates from the true source of the content and is not merely a copy. The method includes a user requesting content in the form of a web page and/or email from a server using a web browser or email client.
Secure Axcess Llc

Key agreement for wireless communication

Methods, systems, and computer programs for performing key agreement operations in a communication system are described. In some aspects, a wireless network operator receives a mobile device identifier and accesses a secret key associated with the mobile device.
Certicom Corp.

Method and system for quantum key distribution based on trusted computing

One embodiment described herein provides a system and method for negotiating quantum data keys between first and second entities. During operation, the system performs a mutual authentication between the first and second entities.
Alibaba Group Holding Limited

Multi-application personal health record microprocessor card

A personal health record card for storing instantly accessible medical information pertaining to the individual associated with the personal health record card is provided. The memory device for storing an individual's personal health information, said memory device comprising: a memory that stores computer readable data, said memory storing: a primary information section comprising information that identifies the individual associated with the memory device and basic information related to the identity of the individual, the primary information accessible by a memory device reader without any authentication; a secondary information section comprising a first level of the individual's sensitive and confidential health information, said secondary information section being accessible only by the memory device reader after authentication; and optionally, a tertiary information section comprising a second level of the individual's sensitive and confidential health information, said tertiary information section being accessible only by the memory device reader after a second level of authentication..
Scs Card Technology Inc.

Decoding of encoded audio bitstream with metadata container located in reserved data space

Apparatus and methods for generating an encoded audio bitstream, including by including program loudness metadata and audio data in the bitstream, and optionally also program boundary metadata in at least one segment (e.g., frame) of the bitstream. Other aspects are apparatus and methods for decoding such a bitstream, e.g., including by performing adaptive loudness processing of the audio data of an audio program indicated by the bitstream, or authentication and/or validation of metadata and/or audio data of such an audio program.
Dolby Laboratories Licensing Corporation

Virtual assistant configured by selection of wake-up phrase

A speech-enabled dialog system responds to a plurality of wake-up phrases. Based on which wake-up phrase is detected, the system's configuration is modified accordingly.
Soundhound, Inc.

Storage container with inventory control

Systems and methods of the invention relate to managing an inventory of items within a storage container. A storage container can house one or more items for distribution among one or more users such as, for instance, employees.
3 Strike, Llc

Method and system for providing telematics services to a machine device

A vehicle processing device authenticates that an authorized user has requested an action by the vehicle, and generates an authentication acknowledgement message. At least two security devices being present within the cabin of, or close to, the vehicle during a predetermined period following an authentication trigger event that occurs while the user performs a predetermined sequence of authentication activities (i.e., button presses, operating the vehicle or a part of it, etc.) provides a basis for the authentication acknowledgement message.
M2md Technologies, Inc.

Access monitoring system for remote locations

A system for compliance monitoring of a user of a monitored location is provided. The system includes at least one checkpoint monitor installed in the monitored location and a system server at a monitoring center being configured to be in communication with each checkpoint monitor via a network.
Wellfence Llc

System and classification and authentication of identification documents using a machine learning based convolutional neural network

The present disclosure describes systems and methods to classify and authenticate id documents based on the information contained on the face of the id document. This present system can automatically classify, authenticate, and extracting data from documents using artificial intelligence (ai) based machine learning for image recognition.
Confirm, Inc.

Augmented reality device and product purchase facilitation

An augmented reality device and method for product purchase facilitation using an augmented reality device are provided. The device includes a display module configured to provide augmented reality visual content, the augmented reality visual content including a virtual image of a product, a biometric authentication module configured to receive biometric data relating to a user and authenticate the user based on the received biometric data, and a transceiver module configured to receive, from a user device, digital payment credentials for facilitating purchase of the product, and transmit the digital payment credentials to a payment processing module for product purchase upon successful authentication of the user..
Mastercard Asia/pacific Pte. Ltd.

Open registry for provenance and tracking of goods in the supply chain

An identity system for the internet of things (iot) that enables users and machines to identify, authenticate and interact with items/goods without relying on a third-party-controlled authentication service. The system includes tags having alphanumeric values and coupled to items/goods and an open registry database and ledger where digital records associated with the items/goods is able to be stored.
Chronicled, Inc

Secure encryption using genomic information

The invention provides an improved genomics-based method and apparatus for identification, authentication, and verification. Genomic information from an individual's genome, is used as an encryption key in methods, systems and apparatus for transmitting data in an encrypted fashion.
Systems Imagination, Inc.

Fingerprint recognition card and operating fingerprint recognition card

A fingerprint recognition card includes a first region configured to receive power from a battery of the fingerprint recognition card, supply the power supplied from the battery to a second region in response to an input of a power button of the fingerprint recognition card, and control activation of a third region based on a fingerprint authentication result provided from the second region, the second region configured to be activated in response to the power supplied from the first region and include a fingerprint sensor configured to sense a fingerprint input by a user of the fingerprint recognition card and the third region configured to be activated based on the control of the first region.. .
Kona I Co., Ltd.

Systems and methods for authenticating a user using private network credentials

A cardholder authentication computing device for authenticating user computing devices during online payment transactions are provided. The cardholder authentication computing device leverages pre-authentication of a user by a private network to facilitate authentication of a user in the context of an online payment transaction between the user and a merchant.
Mastercard International Incorporated

Systems and methods for contactless and secure data transfer

In one embodiment, a method comprises receiving a unique identifier from an item and sending a communication to an electronic device requesting that a user confirm a pending transaction, receiving input from the electronic device associated, and sending the received input to an authentication system for completing a transaction. In another embodiment, a system comprises a sensor, an authentication system, and a transaction processing system.
Capital One Services, Llc

Location-based device and authentication system

Systems and methods for device and payment management include detecting, through a first network, that a user device that is associated with a user is located at a trusted location. A first anticipated activity that is associated with the user is determined.
Paypal, Inc.

Authentication feature in a barcode

A method for serializing products using a barcode and checking authenticity of barcodes. A printing modification introduces an authentication feature into the barcode.
Hicof Inc.

Authentication systems and methods

A system includes a first computing device having a first non-transitory machine-readable storage medium, first communication circuitry, and at least one first processor in communication with the first non-transitory machine-readable storage medium and the first communication circuitry. The at least one first processor is configured to execute instructions stored in the first non-transitory machine-readable storage medium to cause the first communication circuitry to receive a first signal from a first transmission medium, calculate a first authentication value for an object based on data included in the first signal, and cause the first communication circuitry to transmit a second signal to the first transmission medium.
Ark Ideaz, Inc.

Disabling counterfeit cartridges

A method for disabling counterfeit cartridge operation is provided. The method includes detecting a cartridge in a blade enclosure.
Hewlett Packard Enterprise Development Lp

Resolving detected access anomalies in a dispersed storage network

A method for execution by a storage unit of a dispersed storage network includes receiving an access request from a requestor. An access anomaly of the access request is detected, and the access request is queued for processing in response.
International Business Machines Corporation

System and signature pathway authentication and identification

A computer-implemented security system and method provides signature pathway authentication and identification. The system and method include establishing a user-defined cognitive signature pathway through multiple graphical zones of a graphical user interface.
Passtouch, Llc

Method for generating a signed electronic document with an anti-tamper function

A method is to be implemented by a network server, and includes: receiving input information associated with a handwritten signature inputted on an original document, and a dynamic image associated with a motion of a signer during input of the handwritten signature; compiling a signed document based on the original document, the input information and the dynamic image; generating an authentication value based on a location where the handwritten signature is rendered on the signed document and a location where the dynamic image is rendered on the signed document; and incorporating the authentication value into the signed document to result in an anti-tamper document.. .
Thinkcloud Digital Technology Co., Ltd.

Service control and user identity authentication based on virtual reality

A method for service control and user identity authentication includes recognizing a voice command of a virtual reality (vr) device user for initiating a service supported by a vr application, using a biometric sensor to collect one or more biometric characteristics of the vr device user, performing user identity authentication based on the collected one or more biometric characteristics, and communicating with a server that provides the service for performing the service if the user identity authentication is successful.. .
Alibaba Group Holding Limited

User identity authentication using virtual reality

A method for user identity authentication using virtual reality includes presenting one or more virtual elements on a virtual reality (vr) scenario of a vr application for initiating a service, identifying, using one or more sensors communicably coupled to the vr device, one or more interactive operations of a user of the vr device with the one or more virtual elements, determining whether the one or more interactive operations match one or more predetermined operations for selecting the one or more virtual elements to initiate the service and trigger biometric authentication for user identity authentication, invoking biometric authentication if the one or more interactive operations match one or more predetermined operations, presenting a virtual guidance in the vr scenario for guiding the user to perform the biometric authentication, and presenting a service interface to the user if the biometric authentication is successful.. .
Alibaba Group Holding Limited

User authentication persistence

Methods and apparatuses for user authentication are described. In one example, an active condition of an authenticator device is detected and the identity of the user is authenticated.
Plantronics, Inc.

Direct authentication system and method via trusted authenticators

Systems and methods are provided for enabling online entities to determine whether a user is truly the person who he says using a “two-factor” authentication technique and authenticating customer's identity utilizing a trusted authenticator.. .

Secure data replication

One or more techniques and/or computing devices are provided for secure data replication. For example, a first storage controller may host first storage within which storage resources (e.g., files, logical unit numbers (luns), volumes, etc.) are stored.
Netapp Inc.

Detection and identification of a human from characteristic signals

One or more sensors are configured for detection of characteristics of moving objects and living subjects for human identification or authentication. One or more processors, such as in a system of sensors or that control a sensor, may be configured to process signals from the one or more sensors to identify a person.
Resmed Sensor Technologies Limited

Biometric-electronic key system

A biometric-electronic key system includes an electronic key that stores an electronic key id and a communication peer that is capable of performing wireless communication with the electronic key id. A non-accomplishment notification unit presents the user with a non-accomplishment notification of the biometric authentication when the biometric authentication cannot be accomplished.
Kabushiki Kaisha Tokai Rika Denki Seisakusho

Lens-based security features with multiple lenses dedicated to individual colors for currency and brand authentication

Products, such as branding labels, credit cards, and currency, that are fabricated so as to include an optical security element, which is designed to provide enhanced optical focusing onto each color used in the printed image (or in the ink layer). The optical security assembly may include a carrier film or substrate.
Lumenco, Llc

Authentication for x-ray imaging components

A communication channel for an x-ray imaging system may operatively couple a first imaging component to a second imaging component. The communication channel may include a first connector configured to couple to the first imaging component, a second connector configured to couple to the second imaging component, and a first authentication module configured to authenticate with the second imaging component..
Varex Imaging Corporation

Optical chaos based wireless device fingerprinting

A computer-implemented method for authenticating an access point attempting to access a wireless network is presented. The computer-implemented method includes receiving an authentication challenge from the access point, analyzing the authentication challenge at a wireless node by using an optical chaos generation module having an optical section and a radio frequency (rf) section to facilitate reproducibility, unpredictability, and unclonability of challenge-response pairs, and transmitting an authentication response to the access point..
Nec Laboratories America, Inc.

System and connecting a wi-fi product to a wi-fi network

Disclosed is a method and system for connecting a wi-fi product to an available wi-fi network using a bluetooth connection. The method includes connecting, the wi-fi product to an electronic device through the bluetooth connection, inputting, an authentication credentials related to the available wi-fi network over the electronic device by a user, where the input of the authentication credentials is facilitated by an application residing on a memory medium of the electronic device, sending, by the electronic device, the authentication credentials to bluetooth module of the wi-fi product, sending, by the bluetooth module, the authentication credentials to a wi-fi module configured in the at least one wi-fi product and communicatively linked with the bluetooth module, and registering, the authentication credentials with the available wi-fi network for connecting the wi-fi module to the available wi-fi network..

Connectivity to a core network via an access network

Methods, systems, and devices for wireless communications are described that supports connectivity to a core network via an access network. A user equipment (ue) may establish connectivity with an access network and perform a discovery procedure to identify and select a packet data gateway that provides connectivity to a core network via a core network node.
Qualcomm Incorporated

Method and system for reporting a short message capability via an ip multimedia subsystem

A method and apparatus for operation by a base station are provided. The base station may be configured to receive a request for attachment from a wtru and transmit and receive authentication messages between the wtru and a cellular core network including an hlr.
Interdigital Technology Corporation

System for location based authentication

Embodiments of the present invention describe systems for authenticating an identity of a user or a mobile device of the user. As such, when an event associated with the user is determined to be occurring, an authentication code is generated but not immediately sent to the mobile device of the user.
Bank Of America Corporation

Method for providing content using a head-mounted device, system for executing the method, and content display device

A method of providing content using a head-mounted device. The method includes receiving, by a terminal configured to display a screen for logging in to the application, input of user identification information by a user, wherein the user identification information associates the user with a first application.
Colopl, Inc.

Application redirection system

Systems and methods for redirecting control of a process performed on a browser application on a user device accessing a web application to a native application on the user device include receiving, through a web application controlling a process, a request to perform an action (e.g., user authentication). A determination is made whether the request identifies a native application feature for completing the action that is preferable over a web application feature for completing the same action.
Paypal, Inc.

Authentication of client devices using modified images

Systems and methods for detecting phishing attacks and identifying attackers are described. In embodiments, a server system may modify a template image based on user information and provide the modified image to a user system with a login page.
Salesforce.com, Inc.

Automated data authentication and service authorization via cryptographic keys in a private blockchain

Embodiments of the present invention provide a system for authenticating records belonging to an individual or entity and providing authorized access of said records to service providers. Embodiments of the invention utilize a private blockchain to store various types of records to be conveyed to the service providers.
Bank Of America Corporation

Network authentication of a geo-fenced volume

Provided is a method for managing a software defined network using a software control layer to regulate a geo-fenced volume. The software control layer can use a global positioning system (gps) including a range of latitudes, a range of longitudes and a range of altitudes.
International Business Machines Corporation

User profile selection using contextual authentication

In embodiments, apparatuses, methods and storage media (transitory and non-transitory) are described that are associated with user profile selection using contextual authentication. In various embodiments, a first user of a computing device may be authenticated and have an access control state corresponding to a first user profile established, the computing device may select a second user profile based at least in part a changed user characteristic, and the computing device may present a resource based at least in part on the second user profile.
Intel Corporation

Providing a secure communication channel during active directory disaster recovery

A secure communication channel can be established between a recovery console and a recovery agent during an active directory disaster recovery. This secure channel can be established without employing the kerberos or ntlm authentication protocols.
Quest Software Inc.

Advanced local-network threat response

There are provided measures for enabling advanced local-network threat response. Such measures could exemplarily comprise receiving, at a local-network honeypot entity, a username/password related authentication data in relation to a login attempt to the honeypot entity, triggering a threat response operation at a local-network backend entity upon detection of the username/password related authentication data, the threat response operation comprising testing validity of the username/password related authentication data in one or more local accounts of the local-network, and in case the username/password related authentication data is detected to be valid for any account in the local-network, determining that said account is compromised and locking the compromised account..
F-secure Corporation

Communication control apparatus, communication control method, and recording medium

A communication unit and a controller are included, the communication unit being configured to communicate with a communication apparatus using a first communication procedure in which authentication of the communication apparatus is performed in order to retain a communication session with the communication apparatus and using a second communication procedure that does not require authentication of the communication apparatus in order to communicate with the communication apparatus, the controller being configured to perform, using the first communication procedure and the second communication procedure, control under which it is determined whether a communication session with the communication apparatus is to be retained and perform control under which a limit is put on retaining of the communication session with the communication apparatus through the second communication procedure in a case where the communication apparatus is not authenticated as a certain communication apparatus through the first communication procedure.. .
Canon Kabushiki Kaisha

Secure authentication to provide mobile access to shared network resources

Techniques to perform secure authentication to provide mobile access to shared content are disclosed. In various embodiments, a user credential associated with a request to access content is received at a connector node from a mobile application running on a mobile device.
Emc Ip Holding Company Llc

Identity data based on aggregating input data

A computing device, a system, and a method are provided to receive a number of inputs associated with one or more sensors of the computing device. One or more processors are configured to determine input data based on the number of inputs and authenticate a user account based on the input data.
Paypal, Inc.

Validating internet of things device firmware

A computer-implemented method validates internet of things (iot) device firmware levels for peer-to-peer communication in a network. Communication rules between a first device and a second device are utilized to establish a session to validate iot device firmware levels between the first device and the second device on a network.
International Business Machines Corporation

Multi-level authentication using phone application level data

Embodiments of the present invention provide a multi-level authentication system to provide an additional level of authentication using phone application level data. The system extracts application level data and generates a questionnaire based on the extracted application level data.
Bank Of America Corporation

Proxy-based access to remote database

Proxy-based access occurs between a cloud database and analytical client tool, without requiring a separate intervening application server. A client proxy (tool side) communicates exclusively with a server proxy (database side).
Sap Se

Sram-based authentication circuit

A memory device includes a memory block that includes a plurality of memory bits, wherein each bit is configured to present a first logical state; and an authentication circuit, coupled to the plurality of memory bits, wherein the authentication circuit is configured to access a first bit under either a reduced read margin or a reduced write margin condition to determine a stability of the first bit by detecting whether the first logical state flips to a second logical state, and based on the determined stability of at least the first bit, to generate a physically unclonable function (puf) signature.. .
Taiwan Semiconductor Manufacturing Co., Ltd.

Authentication of a new device by a trusted device

A method, computer program, apparatus, and system for authentication of devices in a network of devices, and more specifically to a challenge-response authentication in which one trusted device presents a question (“challenge”) and another party must provide a valid answer (“response”) to be authenticated. The challenge includes processing data by an application specific integrated circuit (asic)..
Axis Ab

Methods, systems and computer program products for data protection by policing processes accessing encrypted data

The described embodiments relate to data protection methods, systems, and computer program products. A process-based encrypted data access policing system is proposed based on methods of encrypted data file management, process authentication and authorization, trojan detection for authorized processes, encryption key generation and caching, and encrypted-file cache management.
Bicdroid Inc.

Validating internet of things device firmware using a peer-to-peer registry

A computer-implemented method validates internet of things (iot) device firmware levels for peer-to-peer communication in a network using a peer-to-peer registry. Each device in an iot is registered anonymously by utilizing a unique device identifier and a firmware level in a peer-to-peer registry.
International Business Machines Corporation

Method and system for accessing a device by a user

A system for authenticating a user accessing a device includes an authentication server and a ticket granting server. The authentication server is configured to generate a part of an authentication ticket which is combinable with at least one other part generated by at least one other authentication server to produce a complete authentication ticket, and to generate a part of a user session key which is combinable with at least one other part generated by the at least one other authentication server to produce a combined user session key.
Nec Europe Ltd.

Sram-based authentication circuit

A memory device includes a memory cell array comprising a plurality of memory cells wherein each of the plurality of memory cells is configured to be in a data state, and a physically unclonable function (puf) generator. The puf generator further includes a first sense amplifier, coupled to the plurality of memory cells, wherein while the plurality of memory cells are being accessed, the first sense amplifier is configured to compare accessing speeds of first and second memory cells of the plurality of memory cells, and based on the comparison, provide a first output signal for generating a first puf signature..
Taiwan Semiconductor Manufacturing Co., Ltd.

False alarm reduction

Techniques are described for reducing false alarms related to security and automation systems. One method includes receiving a request to activate a security function associated with a automation system, initiating a first security duration after a predetermined time associated with the received request, detecting an occurrence of an event associated with the automation system during the first security duration, initiating a second security duration based on the detecting, and broadcasting a message requesting authentication credentials at a location of the automation system during the second security duration..
Vivint, Inc.

Secure access control method with reader and mobile terminal, in particular such as a telephone terminal

A secure access control method is provided that uses secure access control readers having radiocommunication associated to a microcontroller in connection with a remote processing unit and radiocommunication mobile terminals carried by a user. The method includes emitting an announcement signal having security parameters defining access conditions to mobile terminals that determines and evaluates the power of each signal, notifying the mobile terminal of an access action by the user on the mobile terminal or close reader, and translating it by an access pass.
Systemes Et Technologies Identification (stid)

Frictionless access control system with user tracking and omni and dual probe directional antennas

An access control system includes a mesh network of nodes for tracking and authenticating users throughout a building. The nodes include wireless interfaces.
Sensormatic Electronics, Llc

Automated workflow access based on clinical user role and location

Systems, methods, computer-readable media for automating displays based on admissions, transfers, and discharges are provided. In embodiments, a location associated with a clinician is detected.
Cerner Innovation, Inc.

User and device authentication for web applications

A computing device supports a web authentication (webauthn) application program interface (api) that is configured to exposes functionalities that may substitute for those utilized in the emv (europay, mastercard, and visa) standard for transactions using smart payment instruments like debit and credit cards that include embedded computer chips. The functionality of the webauthn-compliant computing device is analogous to a physical card in the conventional chip and pin (personal identification number) where the chip serves as proof of payment device and the pin as proof of payment account holder..
Microsoft Technology Licensing, Llc

User and device authentication for web applications

A computing device, supporting a web browser and one or more biometric sensors for recognizing a device user by capturing biometric characteristics such as the user's face, iris, or fingerprints, is configured to enable web applications to authenticate the user using password-less or two-factor scenarios to enhance online security while reducing password risks such as password guessing, phishing, and keylogging attacks. The present user and device authentication enables online activities having high potential risks, such as online purchases, to be completed securely and conveniently by providing strong cryptographic proof of both the user and a computing device that is trusted by the user..
Microsoft Technology Licensing, Llc

User account management via a distributed ledger

User access to a set of data stored in a distributed ledger, wherein the distributed ledger is stored by a plurality of node computing entities, is provided. A first node computing entity receives a share key request indicating that a first user account has authorized a second user account to have access to a set of data stored in the distributed ledger.
Alphapoint

Active presence detection with depth sensing

In vision-based authentication platforms for secure resources such as computer systems, false positives and/or false negatives in the detection of walk-away events are reduced or eliminated by incorporating depth information into tracking authenticated system operators.. .

Method and system for countering ransomware

Methods, systems and computer readable media are provide for protecting stored data from ransomware. In an embodiment, the data is stored in an external drive connected to the processor.

Secure unattended network authentication

A system for secure network access by unattended devices is described. The system describes how unattended devices that have encrypted data at rest and/or require secure authentication to an open network may procure the access credentials for authentication and/or decryption.
Hand Held Products, Inc.

Hardening security images

Methods and systems are provided for electronic authentication. A modified electronic image is generated by altering at least a pixel of an electronic image.
Paypal, Inc.

Information processing apparatus determining propriety of use based on authentication result of fingerprint authentication process, control method therefor, and storage medium storing control program therefor

An information processing apparatus is capable of allowing an operation by a finger of which a fingerprint has not been registered, and of improving operability while holding security. A collating unit collates fingerprint information about a finger that touched a touch panel read by a reader unit with registered fingerprint information.
Canon Kabushiki Kaisha

Device to perform secure biometric authentication

Aspect may relate to a device that comprises a sensor and a first secure processor. The sensor may receive an input and generate raw data from the input.
Qualcomm Incorporated

Information processing apparatus, information processing method, and computer program

An information processing apparatus includes an authenticating unit, an acquiring unit, a first specifying unit, and a first display unit. The authenticating unit, when accepting first user information used for authentication of determining whether a user has an authority, compares the first user information and second user information identifying a user having the authority.
Ricoh Company, Ltd.

Authentication device, terminal device, image forming system, and non-transitory computer readable medium

An authentication device includes an input unit that inputs specific information of an application to be installed and specific information of an image forming device which is an installation destination, and a controller that collates the specific information of the application and the specific information of the image forming device with a database to output an authentication result indicating that authentication has been performed or has not been performed.. .
Fuji Xerox Co., Ltd.

Delegating control of a vehicle

An identification of a vehicle is received. An identification of a first user to receive delegation of control of the vehicle is received.
International Business Machines Corporation

Access and driver authentication system with increased security against relay attacks using movement sensor technology integrated into the authentication tool

An authentication system for vehicles that has a minimum of one authentication element for detecting a movement, vibration and/or inclination. An apparatus generates a movement, vibration and/or inclination.
Hella Kgaa Hueck & Co.

Supply authentication via timing challenge response

In an example implementation, a print supply cartridge comprises a microcontroller to receive a timing challenge and enable authentication of the cartridge by providing a challenge response. The challenge response is provided in a challenge response time that falls within an expected time window..
Hewlett-packard Development Company, L.p.

Communication device and terminal device

A communication device may supply connection information to a first wireless interface so as to store the connection information in an interface memory, establish a wireless connection via a second wireless interface with a terminal device by using the connection information after the connection information has been sent to the terminal device, execute a first authentication using first authentication information in a case where the first authentication information is received from the terminal device, send a first registration instruction to the terminal device by using the wireless connection via the second wireless interface in a case where the first authentication is successful, and execute a second authentication using the first authentication information in a case where the first authentication information which has been registered in the terminal device is received from the terminal device after the first registration instruction has been sent to the terminal device.. .
Brother Kogyo Kabushiki Kaisha

Data processing and authentication of light communication sources

Various systems and methods for identifying and performing authentication of visible light communications using optical camera communication techniques are described. In an example, an electronic processing system to authenticate a particular light emitting source includes electronic operations for: detecting, from image data, modulated light data emitted from a light emitting object, where the image data depicts the light emitting object, and where the image data is captured with an image sensor (e.g., of a camera); identifying, from the image data, the light emitting object as a source of the modulated light data; receiving an indication to select the light emitting object as an authenticated source of the modulated light data; and performing a command to process the modulated light data from the authenticated source, with the command performed in response to the indication to select the light emitting object as the authenticated source of the modulated light data..

System and secure pairing of bluetooth devices

A mobile device includes a bluetooth transceiver, the bluetooth transceiver being in an idle power state when not securely paired to a second bluetooth transceiver of a peripheral device. The mobile device further includes an audio interface, the audio interface coupled to the bluetooth transceiver, the audio interface configured to connect to a second audio interface of the peripheral device.
Bbpos Limited

Communication device and terminal device

A communication device may supply both identification information for identifying a specific application program and first authentication information to a wireless interface so as to store both the identification information and the first authentication information in an interface memory. The wireless interface may be configured to send both the identification information and the first authentication information in the interface memory to a first terminal device by using a first communication session.
Brother Kogyo Kabushiki Kaisha

Image forming apparatus and image forming system

In accordance with an embodiment, an image forming apparatus comprises a first image forming section configured to form an image with a visible image forming material; a second image forming section configured to form an image with an invisible image forming material; an image acquisition section configured to acquire a print image that should be printed on a medium as a printed matter; and a processor configured to acquire authentication information for authenticity determination added to the printed matter and carry out an image forming processing on not only the print image with the visible image forming material by the first image forming section but also the authentication information with the invisible image forming material by the second image forming section.. .
Toshiba Tec Kabushiki Kaisha

Cognitive authentication with employee onboarding

Embodiments include method, systems and computer program products for onboarding a new employee to an organization. Aspects include receiving, by a processor, employee data comprising an employee group associated with the new employee of the organization.
International Business Machines Corporation

Detection of compromised credentials as a network service

Techniques for detection of compromised credentials as a network service are disclosed. In some embodiments, a system, process, and/or computer program product for detection of compromised credentials as a network service includes monitoring a plurality of sessions at a firewall, logging a plurality of failed or timed out attempts to authenticate at the firewall in a log, analyzing the log for a pattern of failed or timed out attempts to authenticate at the firewall to identify potentially compromised credentials for authentication, and determining that a set of credentials for authentication have been compromised based on the analysis of the log..
Palo Alto Networks, Inc.

System and delegation of permissions to a third party

A system and method for delegating permissions to a third party are presented. A request to access a first computing resource of a computer server is received from a first user.
Go Daddy Operating Company, Llc

Distributed authentication with thresholds in iot devices

Managing authentication of a child device includes receiving, by a host device, sensor data from a child device, deriving simplified authentication data from the sensor data based on a capability of the child device, storing the simplified authentication data in an authentication profile for the child device, and transmitting the simplified authentication data to the child device, wherein the simplified authentication data is sufficient to allow the child device to authenticate a user without the host device.. .
Mcafee, Inc.

Method and performing initial access procedure based on authentication in wireless communication system

In the present invention, a method and an apparatus for performing initial access procedure based on authentication in a wireless communication system are disclosed. The method may comprise generating a pseudo permanent identifier based on a permanent identifier of the user equipment, transmitting, to a first authentication entity, a first message including the pseudo permanent identifier and an index of a specification authentication key, receiving, from the first authentication entity, a second message including a first mac for at least one a first new authentication key generated by a second authentication entity or a first increased counter at the second authentication entity for a specific authentication counter, and transmitting, to the first authentication entity, a third message including a second mac for at least one a second new authentication key generated by the user equipment or a second increased counter at the user equipment for the specific authentication counter..
Lg Electronics Inc.

Multi factor user authentication on multiple devices

Systems and methods of the present invention provide for a first and second client computer configured to receive and transmit an authentication credential and at least one additional authentication credential respectively. The authentication credentials may be selected from authentication credentials known only to a user, identifying a client computer and/or identifying a characteristic unique to the user.
Go Daddy Operating Company, Llc

Pharmacy authentication methods and systems

An electronic image that includes information identifying a user of a client device is received, as is another electronic image that captures the face of the user. A first account (e.g., a store account) is linked to a second account (e.g., a pharmacy account) if an image of the user extracted from the first electronic image matches the face of the user..
Cvs Pharmacy, Inc.

Driver identification and authentication systems and methods

A method for processing a security authorization is disclosed. The method comprises capturing biometric data with a scanning apparatus of the authentication system and comparing the biometric data to authentication data.
Gentex Corporation

Policy enforcement of client devices

A method may include sending, by a client device, an access request to an authentication server device. The access request may include a request to access an administered resource.
Google Llc

Method, system and device for generating, storing, using, and validating nfc tags and data

A smart tag and methods of interacting with and authenticating interactions with the same are provided. The smart tag is enabled to generate a tag authentication cryptogram (tac) and include the tac in response to a read request.
Assa Abloy Ab

Location determination for user authentication

User authentication techniques based on geographical locations associated with a client device are provided. An example method for authentication of the client device includes receiving an authentication request from the client device.
A10 Networks, Inc.

Shared terminal and display control method

A shared terminal includes circuitry, a receiver, and a transmitter. The circuitry accepts a turning-on to a power switch of the shared terminal that has been turned off, obtains specific terminal identification information for identifying the specific privately-owned terminal.

Timing array as credentials

A multi-dimensional approach can be used to verify a password. In addition to requiring the input of the correct password, the timing at which the characters of the password are input can be determined and compared to stored timing values.

Secondary authentication using user's login status

A method is described for storing a plurality of access tokens, each access token associated with a respective login credential of a plurality of login credentials, and each access token usable to access a respective account of a plurality of accounts of a user. The method further comprising receiving a transaction request from the user for a transaction with a target account and determining a respective user login status of the user for ones of the plurality of accounts using respective access tokens.
Ca, Inc.

Method and system for securely transmitting volumes into cloud

A first computing device is provided for transmitting one or more volumes via a secured connection. The first computing device includes a controller that is executable by one or more processors and is configured to instruct a cloud computing device to generate a worker virtual machine.
Citrix Systems, Inc.

Systems and methods to authenticate users and/or control access made by users on a computer network based on scanning elements for inspection according to changes made in a relation graph

A controller for user authentication and access control, configured to: store data representing a graph having: nodes representing data elements associated with accesses made using an access token; and links among the nodes representing connections between the data elements identified in details of the accesses. In response to receiving details of an access made using the access token, the controller updates the graph according to the details and identifies changes in the graph resulting from update.
Idm Global, Inc.

Time-based network authentication challenges

Techniques for time-based network authentication challenges are disclosed. In some embodiments, a system, process, and/or computer program product for time-based network authentication challenges includes monitoring a session at a firewall to identify a user associated with the session, generating a timestamp for an authentication factor associated with the user after the user successfully authenticates for access to a resource based on an authentication profile, intercepting another request from the user for access to the resource at the firewall, and determining whether the timestamp for the authentication factor is expired based on the authentication profile..
Palo Alto Networks, Inc.

Intercept-based multifactor authentication enrollment of clients as a network service

Techniques for intercept-based multifactor authentication client enrollment as a network service are disclosed. In some embodiments, a system, process, and/or computer program product for intercept-based multifactor authentication client enrollment as a network service includes monitoring a session at a firewall, intercepting a request for access to a resource while monitoring the session at the firewall, determining that a user associated with the session is not enrolled for multifactor authentication, and initiating enrollment of the user for the multifactor authentication..
Palo Alto Networks, Inc.

Multifactor authentication as a network service

Techniques for multifactor authentication as a network service are disclosed. In some embodiments, a system, process, and/or computer program product for multifactor authentication as a network service includes monitoring a session at a firewall, applying an authentication profile based on the new session, and performing an action based on the authentication profile..
Palo Alto Networks, Inc.

Mobile authentication interoperability for digital certificates

A system and method for integrating hierarchical authentication systems and non-hierarchical authentication systems. The system and method is provided in one configuration as a mobile app that functions to allow a mobile device to access highly sensitive data while simultaneously ensuring a highly secured environment utilizing both hierarchical authentication systems and non-hierarchical authentication systems to provide a highly reliable authentication process..

Techniques for secure authentication

Various embodiments are generally directed to techniques for secure message authentication and digital signatures, such as with a cipher-based hash function, for instance. Some embodiments are particularly directed to a secure authentication system that implements various aspects of the cipher-based hash function in dedicated hardware or circuitry.
Intel Corporation

Authenticator, authenticatee and authentication method

According to one embodiment, an authenticator which authenticates an authenticatee, which stores first key information (nkey) that is hidden, includes a memory configured to store second key information (hkey) which is hidden, a random number generation module configured to generate random number information, and a data generation module configured to generate a session key (skey) by using the second key information (hkey) and the random number information. The authenticator is configured such that the second key information (hkey) is generated from the first key information (nkey) but the first key information (nkey) is not generated from the second key information (hkey)..
Toshiba Memory Corporation

Visible light communication of an access credential in an access control system

Methods and systems relating to communication of authentication information in an access control system are disclosed. The authentication information is transmitted to an electronic locking device configured to restrict access to an entry point of the access control system.
Videx, Inc.

Cloud-based connectivity tool and method

A method for conducting a survey or poll includes receiving authentication data from a plurality of users. The received authentication data is evaluated for each user to determine if the authentication data is valid.
Pollmole Corporation

Personal authentication apparatus system and method

A target authentication device includes an electrode to detect an electrical signal associated with a user of the device. The electrical signal represents an authentication code for the device.
Proteus Digital Health, Inc.

Method for safely unlocking and/or locking a vehicle

A method for securely wirelessly unlocking and/or locking a vehicle using a mobile radio including detecting a motion interaction or audio interaction of a user on or with the mobile radio and accessing, in a memory device of the mobile radio, a characteristic user interaction that corresponds to a vehicle opening command. The method further includes establishing whether the user interaction matches the characteristic user interaction and, if there is a match, responding to an authentication request from the vehicle that has been obtained by the mobile radio with an encrypted response message that is sufficient to unlock the vehicle..
Volkswagen Ag

Systems and methods for biometric identity authentication

A method for authenticating a user identity for a data transaction is provided. The method is implemented using an identity authentication computing device in connection with a memory and a data transaction processor.
Mastercard International Incorporated

Electronic transaction verification system with biometric authentication

An electronic transaction verification system for use with transaction tokens such as checks, credit cards, debit cards, and smart cards that gathers and transmits information about the transaction token and biometric data. Customers can be enrolled in the system by receiving customer information that includes at least a biometric datum, associating the received customer information with a transaction instrument issued to the customers and storing the received customer information and the issued transaction instrument information in a database for future reference..
Biometric Payment Solutions

Facial recognition-based authentication

Facial recognition-based authentication comprises obtaining a first image of a target object, updating projection information associated with a display by a display device, obtaining a second image of the target object, the second image being an image of the target object after the projection information is updated, obtaining an image difference data based at least in part on the first image and the second image, and determining whether the target object is a virtual object based at least in part on the image difference data.. .
Alibaba Group Holding Limited

Warp and weft encoding of garment

In various example embodiments, a system and method for authenticating a garment are presented. The authentication system can include a code reader configured to receive an image of a garment.
Ebay Inc.

Self-destruct sram-based authentication circuit

A memory device is disclosed. The memory device includes a memory bit array comprising a plurality of memory bits, wherein each memory bit is configured to present an initial logic state when the memory device is powered on, and an erasion circuit, coupled to the memory bit array, and configured to alter an intrinsic characteristic of at least one of the memory bits so as to alter the initial logic state of the at least one memory bit..
Taiwan Semiconductor Manufacturing Co., Ltd.

Non-transitory computer-readable recording medium, communication management method, and communication management device

A non-transitory computer-readable recoding medium having stored therein a communication management program that causes a communication management device to execute a process. The process includes authenticating a terminal in response to an authentication request from the terminal, receiving a communication content destined to a communication target system, the communication target system sharing access-authentication information with the communication management device, adding a first information with the communication content, the first information corresponding to a result of the authentication request, detecting whether the communication content includes a second information that is identified by the communication target system as information added by the communication management device, deleting the second information when the second information is detected in the communication content; and transmitting the communication content to the communication target system..
Fujitsu Limited

Communication device capable of performing a wireless communication according to nfc (abbreviation of near field communication) standard.--

A communication device may receive a first specific signal not including authentication information from a first terminal device via an nfc interface, change an operation mode of the nfc interface from a first operation mode to a third operation mode, supply first authentication information to the nfc interface, store first authentication information in a predetermined area, change the operation mode of the nfc interface from the third operation mode to the first operation mode, receive a second specific signal including the first authentication information from the first terminal device via the nfc interface and execute an authentication using the first authentication information by determining whether the first authentication information included in the second specific signal is stored in the predetermined area without changing the operation mode of the nfc interface from the first operation mode in a case where the second specific signal is received.. .
Brother Kogyo Kabushiki Kaisha

Enhanced biometric user authentication

Methods and apparatuses for enhanced user biometric authentication are described. In one example, authenticating a user includes storing user authentication pairs in a memory of an authenticator device, each authentication pair comprising an instruction prompt and a stored corresponding user response biometric to the instruction prompt.
Plantronics, Inc.

Information processing apparatus, information processing system, and user authentication method

An information processing apparatus includes a storage unit and a processing unit. The storage unit stores therein first authentication information corresponding to an account of a user on a server, and a session id generated by the server when the user logs in.
Fujitsu Limited

Multi-tenant encryption for storage class memory

Various embodiments are generally directed to the providing for mutual authentication and secure distributed processing of multi-party data. In particular, an experiment may be submitted to include the distributed processing of private data owned by multiple distrustful entities.
Intel Corporation

Printing apparatus with authentication function

A controller performs a first processing including: at a predetermined timing, determining whether a first authentication code stored in a storage of a control board attached to a first control board attachment portion matches a second authentication code stored in a storage of a control board attached to a second control board attachment portion; upon determining that the first authentication code matches the second authentication code, allowing a printer to execute a print processing; and upon determining that the first authentication code does not match the second authentication code, prohibiting the printer from executing the print processing.. .
Riso Kagaku Corporation

Copy copying information between first processing apparatus and second processing apparatus, the first processing apparatus, and the second processing apparatus

In a copy method, a first processing apparatus performs: receiving authentication information from a mobile terminal; storing the received authentication information into an external storage medium connected to a first interface of the first processing apparatus; and storing particular information stored in a first storage of the first processing apparatus, into the external storage medium connected to the first interface. A second processing apparatus performs: receiving the authentication information from the mobile terminal; reading the authentication information stored in the external storage medium connected to a second interface of the second processing apparatus; and storing, into a second storage of the second processing apparatus, the particular information stored in the external storage medium connected to the second interface, when the read authentication information and the received authentication information match each other..
Brother Kogyo Kabushiki Kaisha

Tap-to-dock

A novel docking process introduces a new handshake scheme between a first device (referred to herein as the “dockee”) and a docking device (referred to simply as the “dock”) to communicate a user's intention to connect the dockee and the dock (i.e., dock the dockee to the dock). The handshake consists of two steps: 1) establish a connection over a near field communication (nfc) link to convey information about the docking event; and 2) establish a second connection over the wireless channel to connect the dockee and the dock.
Intel Corporation

Information processing system

A master server includes a mapping management unit that returns, with respect to an address inquiry request for a site server to be in cooperation with a pc, the address inquiry request being sent from the pc, an ip address of the site server to be in cooperation with the pc that sent the address inquiry request. The site server includes an authentication processing unit that authenticates the user in response to an authentication request for the user from the pc, and returns an authentication result to the pc, a permission information providing unit that, when the authentication processing unit succeeds in authentication, obtains the permission information corresponding to the user from the second memory, and provides the permission information to the pc that sent the authentication request, and a second spooler that spools job data from the pc, and outputs the job data to the image forming apparatus..
Kyocera Document Solutions Inc.

Wireless token device

A first computing device is detected as substantially collocated with a wireless token device, using a short-range wireless communication network, and a connection is established between the first computing device and the wireless token device over the short-range wireless network. Authentication data stored in memory of the wireless token device is sent from the wireless token device to the first computing device over the short-range wireless network.
Mcafee, Llc

Mobile device authentication

An entry of a code to the touch-sensitive screen is received through at least one opening in the stencil at one or more predefined locations in the stencil, wherein the one or more predefined locations define at least part of an access code; and it is determined that the entered code equals the at least part of the access code, and in response, the access to the service on the device is granted.. .

Secure broadcast beacon communications

Using various embodiments, methods and systems for secure bluetooth low energy communications, in an unconnected state, are described herein. In one embodiment, conventional ble transmitting device data can be supplemented with authentication information, including a message authentication field which enables receivers to determine if the received beacon/transmitted ble peripheral data is genuine.

Drm addition authentication

There is provided a client device comprising a content protection decoder according to a first standard, comprising: a receiver for receiving an asset associated with content protection; a creation module for creating a content protection for the asset in accordance with the first standard, and including a parameter identifying information additional to the information associated with said standard; an interface for transmitting a request for a license to a license server based on said standard, the request including that parameter, and for receiving a license in response; and a controller for accessing content associated with the asset using the license. There is also provided a license server configured to: receive a license key request in accordance with a standard from a client device; transmit the request to a processing function associated with the standard; receive a parameter associated with the standard from the processing function; parse the parameter to retrieve additional information; process the additional information; access a license in accordance with the standard based on the parsed information; and transmit the accessed license in accordance with the standard to the client device..
Piksel, Inc.

Storage container with inventory control

Systems and methods of the invention relate to managing an inventory of items within a storage container. A storage container can house one or more items for distribution among one or more users such as, for instance, employees.
3 Strike, Llc

Repeater for frictionless access control system

In an access control system, an ancillary user device is used in conjunction with a mobile computing device to broadcast user information for authentication. The mobile computing device and ancillary user device are paired, and user information is transmitted from the mobile computing device to the ancillary user device.
Sensormatic Electronics, Llc

Wireless communication apparatus and processing method thereby

When a wireless network is constructed, a wireless communication apparatus in the wireless network constructed of a plurality of communication apparatuses decides whether to function as a providing source of communication parameters or as a provision destination that receives communication parameters. In a case where it has been decided that this apparatus is to function as the provision destination that receives communication parameters, the apparatus requests authentication when it participates in the wireless network using communication parameters.
Canon Kabushiki Kaisha

Methods and devices for access control of data flows in software defined networking system

The disclosure relates to a method for access control of a data flow in a software defined networking system. The method includes is performed in a controller device and comprises: receiving a first packet associated with a first data flow between a client node and a server node, verifying, based on flow attributes authentication of the first packet, repeating the receiving and verifying for a number of subsequent packets of the first data flow, wherein the number of subsequent packets is set based on type of protocol used for the first data flow and/or a policy set in the controller device, and sending, to an intermediate node along a path of the first data flow, a respective verification message for each successfully verified authentication of the first packet and any subsequent packets, allowing the first packet and any subsequent packets of the first data flow for forwarding..
Telefonaktiebolaget Lm Ericsson (publ)

Traitor tracing for obfuscated credentials

A method, computer program product, and system for providing verification processes associated with a commitment-based authentication protocol are described. A request by a user for access to one or more resources is received, and a presentation policy is transmitted to the user indicating required credentials.
International Business Machines Corporation

Work smart key device

A work method for a smart key device. A host machine acquires data from a trusted server via a browser and then transmits the data to a smart key device; the smart key device performs a signing operation when the data transmitted by the host machine is received and when a user confirmed by pressing a key and then returns a signing result to the host machine; and the host machine transmits data returned by the smart key device to the trusted server to verify the validity of the smart key device.
Feitian Technologies Co., Ltd.

Automatic provisioning of services to network-connected devices

The disclosed embodiments include computerized methods and systems that automatically provision one or more services available to an internet-of-things (iot) devices upon connection to and registration onto communications network. In one aspect, a device may receive, from a computing system, data specifying one or more first services provisioned to the device.
The Toronto-dominion Bank

Distributed storage of authentication data

A biometric server receives, a transmission of a biometric sample and an encrypted enrollment template of the user from a client device, wherein the encrypted enrollment template comprises an encrypted mathematical representation of historical biometric data of the user, and wherein the biometric sample comprises a current snapshot of the biometric data. The biometric server decrypts the encrypted enrollment template to an enrollment template using an enrollment template key.
International Business Machines Corporation

Networked storage system and method

A networked storage system and method provides multiple lockers arranged in a modular configuration, and multiple security means for accessing and monitoring lockers through an interconnected network of processors, user identifiers, and detectors that alert to unauthorized access to the lockers. The lockers are networked with a central kiosk and a remote processor for a user to access the lockers, for storing locker information, for monitoring lockers, and for processing events at lockers.
Shanghai Yishan Industrial Co., Ltd.

Mirrored communication devices in carrier networks

In some embodiments, an apparatus includes one or more communication sub-systems; and an identity mirror component in communication with the one or more communication sub-systems. In response to selection, on an another device, of the apparatus from among a plurality of devices, receive, from the another device, carrier user identity information and carrier authentication key information associated with the carrier user identity information.
Intel Corporation

Digital certificate for verifying application purpose of data usage

A method of creating an application purpose certificate, comprising: receiving from a software publisher an application code and declared privacy information, the declared privacy information includes at least one allowed usage purpose for each of a plurality of data types; analyzing the application's usage of data of each of the plurality of data types; verifying the usage is compliant with the least one allowed usage purpose according to the analysis; creating an encrypted digital purpose certificate, the digital purpose certificate is unique for the application code; and sending the digital purpose certificate to the software publisher to be bundled with the application code and a publisher authentication certificate.. .
International Business Machines Corporation

Cdn-based access control method and related device

A content delivery network based (cdn-based) access control method, includes receiving, by a cdn server, a hypertext transfer protocol (http) request from a user terminal and identification information of the user terminal, where the http request includes an access ticket, sending the identification information of the user terminal and the http request to a service server, receiving an http response including a content fingerprint when an authentication result indicating that the access ticket is valid, obtaining the content resource according to the content fingerprint, and sending the content resource to the user terminal.. .
Huawei Technologies Co., Ltd.

Systems, methods and computer-readable storage media facilitating mobile device guest network access

Mobile device access to a guest network is facilitated. A method comprises: detecting a home network having an associated access point based on the device being within a first defined proximity of the associated access point; and transmitting information indicative of a request to establish a guest network via the associated access point of the home network and providing authentication information for an entity associated with the device.
Network Performance Research Group Llc

Systems and methods for location-based authentication

Systems and methods are disclosed for performing location-based authentication using location-aware devices. One method includes: receiving an access request comprising authentication credentials and a first location from a first location-aware device; receiving a second location from a second location-aware device associated with the authentication credentials; and upon determining that the first location and second location are within a pre-determined distance, authenticating the authentication credentials..
Oath Inc.

Service operation management using near-field communications

Various techniques for the management and control of service operations using near-field communication (nfc) technologies are disclosed. In an example, a master computing system operates to identify a device configuration that enables a service operation upon a remote client device, identify an authentication value to authenticate permission to enable the service operation with the remote client device, and generate an nfc data payload including the authentication value and device configuration.

Authentication framework for a client of a remote database

Disclosed herein is a technique for authenticating an application operating on a client device with an authentication server device based on user credentials associated with an identity provider. In particular, the authentication server device facilitates the authorization process between the application and the identity provider without exposing, to the application, either the user credentials or an authorization code generated by the identity provider..
Apple Inc.

Method for in-line tls/ssl cleartext encryption and authentication

We describe a method, device and system for communicating to a peer via a network. A segment is received formatted according to a first network protocol, the received segment having clear-text payload data in a payload portion of the received segment.
Chelsio Communications, Inc.

System and authenticating and enabling functioning of a manufactured electronic device

A system and method for authenticating and enabling functioning of a manufactured electronic device are disclosed. A particular embodiment includes: an obfuscation code generator to produce an obfuscation code having a first portion representing manufacturing or physical characteristics of a particular paired system and a second portion representing one or more identifiers of the particular paired system, the obfuscation code generator to use the obfuscation code to obtain an authentication key; and an obfuscation state machine configured with a pre-defined quantity of state elements, a pre-defined quantity of the state elements being functional state elements, the obfuscation state machine being programmed with the authentication key to cause the obfuscation state machine to transition a protected device from an initial obfuscation state to a functional state, the embedded active obfuscation unit being further configured to load random bit-selected values from the obfuscation code into the obfuscation state machine for the values of the state elements and to load a different set of random bit-selected obfuscation values from the obfuscation code into the obfuscation state machine for the values of the functional state elements of the obfuscation state machine, thereby causing the protected device to transition from the initial obfuscation state through a set of obfuscation states before reaching the functional state for normal operation..
Anvaya Solutions, Inc.

Embedding protected memory access into a rfid authentication process based on a challenge-response mechanism

A rfid tag (501), reader (502) and protocol allow a protected read operation in a two-step tag authentication with cipher-block cryptography. A challenge-response mechanism using a shared secret symmetric key (638) for tag authentication includes a challenge and information to read data from a tag's memory (637).
Centro De Pesquisas Avançadas Wernher Von Braun

Non-linear physically unclonable function (puf) circuit with machine-learning attack resistance

Embodiments include apparatuses, methods, and systems for a physically unclonable function (puf) circuit. The puf circuit may include an array of puf cells to generate respective response bits of an authentication code in response to a challenge bit string.
Intel Corporation

Methods and systems for unmanned aircraft systems (uas) traffic management

Provided are methods comprising transmitting an authentication request for an operator of an unmanned aircraft system (uas) to an uas traffic management (utm) server, transmitting flight plan data to the utm server if the authentication request is successful, receiving operational data that comprises first traffic data, displaying at least a portion of the operational data, receiving flight data from the uas, transmitting the flight data to the utm server, and receiving updated operational data comprising second traffic data based on the flight data.. .
The Board Of Regents Of The Nevada System Of Higher Education On Behalf Of The University Of

Analytic identity measures for physical access control methods

A personal electronic device enables access to and occupancy of a secure space by providing measures of behaviors, personal attributes, history of transactions and movements that are used to validate continuous authentication and authorization of the device's possessor. This addresses the vulnerability of a misplaced, lost, or stolen electronic credential.

Neural network for eye image segmentation and image quality estimation

Systems and methods for eye image segmentation and image quality estimation are disclosed. In one aspect, after receiving an eye image, a device such as an augmented reality device can process the eye image using a convolutional neural network with a merged architecture to generate both a segmented eye image and a quality estimation of the eye image.
Magic Leap, Inc.

Commercial transaction system, administration server, and program

A commerce system includes an ec server connecting to a user terminal and executes e-commerce, a customs clearance authentication server that administers pre-customs clearance information, and an administration server connected to the customs clearance authentication server and the ec server. The administration server receives a registration request including product information regarding a product, transmits the registration request to the customs clearance authentication server, receives pre-customs clearance information regarding the product from the customs clearance authentication server, and notifies the pre-customs clearance information to the ec server.
Acd Inc.

System and automatically authenticating a caller

Systems and methods include an input interface that receives registration information including a contact number input into a mobile device of a user, a call interface that transmits a call signal to a call center system, wherein the call signal comprises the call signal contact number that placed a call associated with the call signal and a communication interface that transmits the registration information to a profile database that stores the registration information as a profile for authenticating the mobile device user and identifying information from the mobile device of the user during the call. The call center system includes a call authentication processor that retrieves the user profile, an authentication interface that receives the identifying information, and an authentication processor that compares the identifying information with the user profile, and routes the call on an authenticated call path if the identifying information at least partially matches the user profile..
Capital One Financial Corporation

Secure element having multiple users

Techniques are disclosed relating to secure data storage. In various embodiments, a mobile device includes a wireless interface, a secure element, and a secure circuit.
Apple Inc.

System and methods for authenticating a user using biometric data

A computer-based method for authenticating a user using biometric data is provided. The method is implemented using a biometric validation server in communication with a memory.
Mastercard International Incorporated

System and linking bill payment service with remittance

An enrollment of a receiver in a biometric authentication system is obtained. The receiver is challenged with a pre-remittance biometric challenge from the biometric authentication system prior to initiating a remittance to the receiver.
Mastercard International Incorporated

Mobile device authentication

Various embodiments herein each include at least one of systems, methods, software, and data structures for mobile device authorization of checks written on a checking account by an authorized individual. One embodiment, in the form of a method, includes receiving input with regard to a check within an authorized account session for the account on which the check is drawn.
Ncr Corporation

Multi-modal user authentication

Various systems and methods for providing a mechanism for multi-modal user authentication are described herein. An authentication system for multi-modal user authentication includes a memory including image data captured by a camera array, the image data including a hand of a user; and an image processor to: determine a hand geometry of the hand based on the image data; determine a palm print of the hand based on the image data; determine a gesture performed by the hand based on the image data; and determine a bio-behavioral movement sequence performed by the hand based on the image data; and an authentication module to construct a user biometric template using the hand geometry, palm print, gesture, and bio-behavioral movement sequence..

Systems and methods for authenticating a user based on captured image data

Systems and methods are provided for authenticating a user of a computing device. The system comprises one or more memory devices storing instructions, and one or more processors configured to execute the instructions to provide, to a computing device associated with a user, an indication of a prescribed authentication parameter.
Capital One Services, Llc

Authentication of a smart pen and computing device

Method and system are provided for authentication for pairing of a smart pen with a computing device. The method, which is carried out at a smart pen, may include: sensing a signature event carried out by a user writing with the smart pen on an input user interface of the computing device; recording a signature resulting from the signature event; authenticating the signature by comparing to a stored previously recorded signature at the smart pen.
International Business Machines Corporation

Authentication of a smart pen and computing device

Method and system are provided for authentication for pairing of a smart pen with a computing device. The method, which is carried out at a smart pen, may include: sensing a signature event carried out by a user writing with the smart pen on an input user interface of the computing device; recording a signature resulting from the signature event; authenticating the signature by comparing to a stored previously recorded signature at the smart pen.
International Business Machines Corporation

Patient-centered vehicle emergency application and web interface that provides emergency personnel with vehicle data and personalized occupant health information

A mobile device stores medical credentials for one or more occupants of a vehicle. Responsive to receipt of an indication of an emergency event at the vehicle, the mobile device sends the credentials, an authentication code, and vehicle information to a cloud server to cause the cloud server to construct web content including the vehicle information and medical information accessible using the credentials.
Ford Global Technologies, Llc

Device access control

Examples are provided for device access control. In one example, a computing device to which access is controlled includes a display device for presenting a user interface, a processor, and a storage device storing instructions executable by the processor to, for each of a threshold number of rounds, display a plurality of candidate regions, each candidate region including a plurality of candidate authentication objects, and receive input indicating a device access control response.
Harman International Industries, Incorporated

Access control for integrated circuit devices

Security systems for microelectronic devices physically lock the hardware itself and serve as a first line of defense by preventing overwriting, modification, maniplation or erasure of data stored in a device's memory. Implementations of the security systems can respond to lock/unlock commands that do not require signal or software interactivity with the functionality of the protected device, and which therefore may be consistent across devices.

Secure industrial control system

A secure industrial control system is disclosed herein. The industrial control system includes a plurality of industrial elements (e.g., modules, cables) which are provisioned during manufacture with their own unique security credentials.
Bedrock Automation Platforms Inc.

Authenticating a respondent to an electronic survey

This disclosure generally covers systems and methods that, in some embodiments, provide an electronic survey template for creating a user customizable electronic survey including authentication features. Those authentication features include, in some embodiments, authenticating questions with elements that capture a digitally drawn signature, digital image, fingerprint, or voiceprint.
Qualtrics, Llc

Distributed trust as secondary authentication mechanism

A computer system supports secondary authentication mechanism for authentication of a user, where the computer system may provide a variety of services including financial, scientific, academic, or governmental services. The computer system utilizes a multiphase distributed trust model in which the user is authenticated based on distributed trust of a set of randomly selected trusted contacts from a large set of trusted contacts initially chosen during an enrollment phase.
Bank Of America Corporation

Biometric authentication based on gait pattern or writing motion with an inertial measurement unit

The present invention relates to use an inertial measurement unit (imu) to record the acceleration trajectory of a person's gait or pen-less handwriting motion or any predesignated gestures, and to convert the data to a unique biometric pattern. The pattern is unique for each case and can be used as biometric security authentication..
Hong Kong Baptist University

Voice authentication within messaging systems

A user is initially trained for voice authentication within a messaging platform session. After training and during the same session or a different session with the messaging platform session or with a different messaging platform, and when the user requests during such session a sensitive operation be performed on behalf of the user with an external service, a randomly generated voice challenge is delivered to the user during that session.
Ncr Corporation

Authenticating executing user authentication

Provided is an authenticating apparatus that by a si