Patent classifications
G06F2221/2111
USER AUTHENTICATION VIA TELEPHONIC COMMUNICATION
Examples of the present disclosure describe systems and methods for automated user authentication via phone call. In aspects, user interaction with an application/service may be detected at a user device. Device information for the user device may be provided to a login management service, which may provide access information and a security object for accessing the application/service to the user device. The user device may use the access information to place a call to a service provider. A call detection service may detect the call and collect contact information for the user device and the security object. The contact information and the security object may be provided to the login management service. The login management service may validate the security object and use the contact information to authenticate a user to access the application/service.
Information display considering privacy on public display
According to one embodiment, a method, computer system, and computer program product for displaying information on a public device is provided. The present invention may include displaying, based on information received from a connected mobile device, user information and dummy information on a display device. The present invention may further include displaying an indicator alongside the user information and a dummy indicator alongside the dummy information. The present invention may further include transmitting user information and dummy information to a display device, synchronizing display of the user information to the display device, and synchronizing haptic feedback based on a received visual pattern. The present invention may further include generating dummy information according to the type of information.
Protection of privileged operation access of electronic devices
A method for preventing unauthorized access of privileged operations of a first device. The method provides for one or more processors to detect an initiating action of a privileged operation of a first device. The one or more processors receive a current location of the first device. The one or more processors determine whether a pre-determined location matches the current location of the first device. In response to determining the current location of the first device fails to match the predetermined location, the one or more processors determine whether a pre-determined connection condition exists between the first device and an authorized device, and in response to determining an absence of the pre-determined connection condition between the first device and the authorized device, the one or more processors perform a first action disabling the privileged operation of the first device.
Multi-purpose smart card with user trusted bond
The present disclosure relates a new generation “smart card” designed to create a severable invisible “bond” between the cardholder and the smart card itself where this trusted bond relationship is used to enhance and simplify the authentication process and during the use of the multi-purpose smart card. This new smart card is initiated and connected to a specific user using biometric information added to the card and the user using biometric information connects via a trusted bond with the card by pairing the biometric information which can be severed in one of multiple ways. The trusted bond with the smart card can be broken in one of multiple ways including disconnection from a network, distancing from the user, impact accelerometers, outside parameters, etc. The multi-function smart card also uses this established trusted bond with the user to simplify the authentication of the user for use of the card in encrypted computer network, ground security, or other retail and payment function.
Device Location Finding
Embodiments for a device locator application are described. In an embodiment, one or more inertial displacement measurement values may be received using the inertial sensor and received camera sensor data, a trajectory based on the one or more inertial displacement measurement values may be determined, a beacon signal from a target wireless device and determine at least one signal strength value from the beacon signal may be received, at least one proximity value to the target wireless device may be estimated based on the at least one signal strength value corresponding to at least one position along the trajectory, and an indicator of the at least one proximity value to the target wireless device may be presented along the trajectory in a user interface.
DATA PROCESSING TRANSACTIONS USING MACHINE TO MACHINE (M2M) DATA TRANSFER
A user device is provided. The user device is configured to detect that a user is in a foreign region outside a home region of the user, wherein the user is registered with a home processor located within the home region of the user. The user device provides a recommendation to the user of one or more partner processors located within the foreign region, wherein each of the one or more partner processors has a predetermined association with the home processor. The user device receives a selection of a partner processor selected by the user from the one or more partner processors. The user device authenticates a data processing transaction at the selected partner processor by verifying an identity of the user and initiates the data processing transaction at the selected partner processor after the authentication.
SUPPORTING DATA PROCESSING TRANSACTIONS USING MACHINE TO MACHINE (M2M) DATA TRANSFER
A system is provided for implementing a data processing transaction for a home processor located within a home region. The system is configured to receive a query from a user device of a user, search a list of partner processors located within a foreign region based on the query and transmit to the user device information relating to one or more partner processors determined as a result of the search. The system receives a request to authenticate the data processing transaction at a selected partner processor, verifies an identity of the user based on the request and transmits an indication of successful authentication. The system transmits at least a portion of data relating to a registration of the user at the home processor to the selected partner processor, wherein the data processing transaction is processed by the partner processor based on the transferred data.
METHOD, APPARATUS, AND SYSTEM FOR RADIO BASED SLEEP TRACKING
Methods, apparatus and systems for radio-based sleep tracking are described. In one example, a described system comprises: a transmitter configured to transmit a first wireless signal through a wireless multipath channel in a venue; a receiver configured to receive a second wireless signal through the wireless multipath channel, wherein the second wireless signal differs from the first wireless signal due to the wireless multipath channel which is impacted by a sleeping motion of an object in the venue; and a processor. The processor is configured for: obtaining a time series of channel information (TSCI) of the wireless multipath channel based on the second wireless signal, wherein each channel information (CI) of the TSCI comprises N1 components, wherein N1 is a positive integer larger than one, computing N1 component-wise analytics each associated with one of the N1 components of the TSCI, identifying N2 largest component-wise analytics among the N1 component-wise analytics, wherein N2 is a positive integer less than N1 computing at least one first motion statistics based on the N2 largest component-wise analytics of the TSCI, and monitoring the sleeping motion of the object based on the at least one first motion statistics.
AUTOMATED DATA COLLECTION ARCHITECTURE FOR USE IN VEHICLE OPERATIONS
A system for acquiring data from vehicle in real time for mapping infrastructure using blockchain technology.
Multi-factor authentication with URL validation
Techniques are provided for providing multi-factor authentication with Uniform Resource Locator (URL) validation (MFAUV). One of the multiple authentication factors used may include a unique, user-specific URL that is sent to the user within a message. In this way, the user may simply click on, or otherwise execute or select, the provided URL, directly from within the message in which the URL is provided.