G06F2221/2117

USER REGISTRATION METHOD, USER LOGIN METHOD AND CORRESPONDING DEVICE
20220318356 · 2022-10-06 ·

The present disclosure relates to the technical field of Internet, and provides a user registration method, a user login method and a device corresponding thereto. In these methods, a passport or the user card records identity information of the autonomous identity of a user, and the user can use the passport or the user card to access an application website, which is unlike the conventional method of performing the accessing through the account and the password. Moreover, the present disclosure further implements a series of mechanisms from the application to the use, concerning the passport and the user card.

IDENTITY VERIFICATION FOR NETWORK ACCESS

This disclosure describes techniques for authentication related to verification of identity for network access. The techniques may include sending a challenge associated with authentication to a network to a mobile device. In response to sending the challenge, the techniques may include receiving a challenge response from the mobile device. The challenge response may include biometric credential information associated with a user of the mobile device. The challenge response may also include an indication of an authorization assertion associated with the authentication to the network. In some examples, the techniques may include tailoring access to the network for the mobile device based on the biometric credential information.

Method for operating an Internet-of-Things system

A method for operating an Internet of Things (IoT) system includes obtaining, by a device registration tool, identification information of a first IoT module, obtaining, by the device registration tool, identification information of a device with the first IoT module mounted thereon, and registering, by the device registration tool, the identification information of the first IoT module and the identification information of the device in a database accessible by an IoT network.

Memory controller and storage device including the same

A memory controller and a storage device including the same are disclosed. A memory controller for controlling a nonvolatile memory includes: a security access control module configured to convert biometric authentication data received from a biometric module into security configuration data having a data format according to a security standard protocol and perform, based on the security configuration data, at least one of authority registration and authority authentication of a user authority set for an access control of a secure area of the nonvolatile memory, encrypted user data being stored in the secure area; and a data processing unit configured to, based on an access to the secure area being permitted, encrypt user data received from a host device or decrypt the encrypted user data read from the secure area.

CONTROL DEVICE AND CONTROL METHOD
20230143234 · 2023-05-11 ·

The present technology relates to a control device and a control method capable of performing authentication with higher safety using brain information.

Provided is a control device including a processing unit configured to perform control of a first authentication process of authenticating a user on the basis of first registration information based on first brain information of the user measured in response to a replay of a first induction medium, and control of a registration process of a second registration information used for a second authentication process of authenticating the user on the basis of second brain information of the user measured in response to a replay of a second induction medium different from the first induction medium. For example, the present technology can be applied to a measurement device capable of measuring brain information.

System and methods for generating and authenticating dynamic usernames replication

A method for generating a dynamic username includes receiving a static component of a dynamic username and a selection of a dynamic parameter component of the dynamic username from a user. The static component and the selected dynamic parameter component are combined in a predetermined order, based on a user selected option. The dynamic username is produced from the combined static component and the selected dynamic parameter component based on the predetermined order. A rule for producing the dynamic username is generated. The rule defines the predetermined order of the static component and the selected dynamic parameter component. The static component and the rule are stored in a credential database with the rule being associated with the static component.

System and apparatus for secure password recovery and identity verification

A secure method for resetting the password for an account is disclosed. During the setup of the account, the user can provide the service provider with a media file, and when the user asks the service provider to reset the password for the account, the user will be prompted with several media files. The user can be asked to identify the media file that the user provided to the service provider at the time of the setup of the account. If the user properly identifies the media file, the password will be reset.

Contextual automated device onboarding

Examples described herein include systems and methods for contextually providing automated device enrollment into a management system. A management application on a user device can receive network settings for connecting to a local server. The network settings can be preconfigured by an administrator. The management application can cause the user device to send an enrollment request and a device identifier to the local server. The device identifier can be used to validate the device and provide a security token to the management application. The management application can use the security token to complete enrollment of the user device.

SYSTEM AND METHOD FOR REGISTERING A USER
20230208624 · 2023-06-29 ·

According to an aspect of the present disclosure, a method performed by a verification platform for authorising a user incapable of providing digital consent comprises: receiving sensitive user information and a unique supervisor identifier; encrypting the sensitive user information using an encryption scheme with an associated encryption key to generate encrypted user information; sending an authorisation request message to a supervisor device associated with the unique supervisor identifier, wherein the authorisation request message comprises the encryption key and a request for authorisation in response; discarding the sensitive user information and the encryption key, such that the verification platform cannot access the sensitive user information; and, if the verification platform receives an authorisation response message from the supervisor device comprising a received encryption key, decrypting the encrypted user information using the received encryption key, such that the verification platform can successfully access the sensitive user information.

Emotion-Based Authentication Service

An emotion-based authentication service can obtain data associated with a user device, identify an emotion associated with the data, detect an authentication request that requests authentication of the user device using an emotion-based authentication service, generate, based on the emotion and the data, a challenge for the user device and an expected response to the challenge, receive, from the user device, a response to the challenge, and determine if the user device is to be authenticated based on the response to the challenge and the expected response to the challenge.