G06F2221/2117

RECEPTION TERMINAL

A reception terminal, included in a management system for managing entry and/or exit of a user in a security zone that includes a server room of a data center, the reception terminal that issues reception information upon accepting personal information of the user prior to the entry into the security zone, includes: a personal authentication part that is used for a personal authentication of the user visiting the data center; and an issuing part that issues, in a case where biometric information is pre-registered in addition to a performance of a personal identification, authorization information representing an authorization of the entry of the user into a particular server room in response to existence of personal information associated with the reception information input by the user, and a satisfaction of a visit condition of visit information associated with the input reception information.

PORTABLE AUTHENTICATION DEVICE, IC CARD AND AUTHENTICATION SYSTEM

According to one embodiment, an authentication device includes a sensor, a communication interface, a memory and a processor. The sensor acquires biological information. The communication interface communicates with a device. The memory stores feature information of biological information of a registrant for use in biometrics and management information indicating a device which the registrant has a right to use. The processor authenticates whether a user whose biological information has been acquired by the sensor is the registrant having a right to use the device communicated through the communication interface, and transmits a result of the authentication to the device communicated through the communication interface.

INFORMATION MATCHING SYSTEM AND INFORMATION MATCHING METHOD

A storing information generation apparatus obtains registration information and an identifier capable of identifying the registration information, to generate a first individual key from the common key and the identifier, and to generate storing information obtained by linearly converting the registration information using the common key and the first individual key. A matching information concealment apparatus obtains matching information to generate concealed matching information concealing the matching information using an encryption key. A concealed similarity calculation apparatus calculates a concealed similarity from the storing information and the concealed matching information. A decryption apparatus generates a second individual key from the common key and the identifier, and calculates a similarity between the registration information and the matching information from the concealed similarity, a decryption key corresponding to the encryption key, the common key, and the second individual key.

METHOD FOR PROVIDING A PRIVACY-ENABLED SERVICE TO USERS
20220343018 · 2022-10-27 · ·

A method for providing a privacy-enabled service is disclosed. The method includes the steps of providing a client with an organization ID.sub.[RS1] and generating a set of system system IDs which are assigned to the organization and associated with the client organization ID. The set of system system IDs and the organization ID are then distributed to client-designated users by the client organization system ID to permit the user to access a survey and a feedback mechanism provided by the organization. The organization is provided with information submitted by users in a de-identified aggregate, subject to certain k-anonymity controls to protect individuals who have submitted information from being identified due to changes in the aggregate via timing or scarcity of answers.

IMPLEMENTATION OF BIOMETRIC AUTHENTICATION

The present disclosure relates generally to implementing biometric authentication, including providing user interfaces for: while the electronic device is in a first state in which a respective function of the electronic device is disabled, detecting one or more activations of the button; and in response to detecting the one or more activations of the button: capturing, with the one or more biometric sensors that are separate from the button, biometric data; if the biometric data satisfies biometric authentication criteria, transitioning the electronic device to a second state in which the respective function of the electronic device is enabled; and if the biometric data does not satisfy the biometric authentication criteria, maintaining the electronic device in the first state and displaying, on the display, an indication that biometric authentication has failed.

DIGITAL SAFETY AND ACCOUNT DISCOVERY
20230082518 · 2023-03-16 ·

Methods, computer-readable media, software, and apparatuses may assist a consumer in keeping track of a consumer's accounts in order to prevent unauthorized access or use of the consumer's identified subscriptions and financial accounts. The identified subscriptions and financial accounts may be displayed to the consumer along with recommendations and assistance for closing unused or unwanted financial accounts and subscriptions to prevent unauthorized access or use.

DATA DISTRIBUTION MANAGEMENT APPARATUS, DATA DISTRIBUTION MANAGEMENT METHOD, AND PROGRAM
20230081480 · 2023-03-16 ·

Provided is a data distribution management apparatus 1 which duplicates data stored in a dedicated data store 2 to a shared data store 3 and shares the data. The data distribution management apparatus 1 includes a proposal management unit 11 which mediates creation of an agreement on a data sharing condition including a condition limiting data to be shared and a condition limiting a user capable of referring to the data to be shared and registers the agreed-upon data sharing condition in a proposal database 15, a policy management unit 12 which registers an access control policy which is used for access control on the data to be shared in a policy DB 16 on the basis of the agreed-upon data sharing condition, and a policy enforcement unit 13 which duplicates the data to be shared from the dedicated data store 2 to the shared data store 3 on the basis of the access control policy and performs access control on the data to be shared on the basis of the access control policy in response to a data reference request for the data to be shared.

Terminal device, personal authentication system and personal authentication method
11483713 · 2022-10-25 · ·

A technology which is highly safe and furthermore highly convenient in personal authentications via a mobile terminal is provided. A terminal device 200 of the present invention includes: a position determining section 271 that determines a position of the terminal device 200 at predetermined time intervals, and accumulates the position as position information; a movement history generating section 272 that generates a movement history by using the position information accumulated in a predetermined period, and stores the movement history as movement history information; a registration processing section 276 that transmits, for registration, the movement history information to a personal authentication apparatus; and an authentication requesting section 279 that makes an authentication request to the personal authentication apparatus 310 by using the movement history information stored after the transmission by the registration processing section 276 to the personal authentication apparatus 310.

Digital safety and account discovery

Methods, computer-readable media, software, and apparatuses may assist a consumer in keeping track of a consumer's accounts in order to prevent unauthorized access or use of the consumer's identified accounts. To discover the various accounts, the methods, computer-readable media, software, and apparatuses can monitor at least a consumer's email accounts, web browser history, and web cache. The discovered accounts may be displayed to the consumer along with recommendations and assistance for closing unused or unwanted accounts to prevent unauthorized access or use.

System and method for registering a user
11632241 · 2023-04-18 · ·

According to an aspect of the present disclosure, a method performed by a verification platform for authorising a user incapable of providing digital consent comprises: receiving sensitive user information and a unique supervisor identifier; encrypting the sensitive user information using an encryption scheme with an associated encryption key to generate encrypted user information; sending an authorisation request message to a supervisor device associated with the unique supervisor identifier, wherein the authorisation request message comprises the encryption key and a request for authorisation in response; discarding the sensitive user information and the encryption key, such that the verification platform cannot access the sensitive user information; and, if the verification platform receives an authorisation response message from the supervisor device comprising a received encryption key, decrypting the encrypted user information using the received encryption key, such that the verification platform can successfully access the sensitive user information.