G06F21/32

Creating a secure digital identity

Methods and systems for creating a verifiable digital identity are provided. The method includes obtaining a first user-generated item comprising an identifiable feature. The method also includes digitally signing the first user-generated item to generate a secure digital artifact. The method also includes uploading the secure digital artifact and the first user-generated item to an auditable chain of a public ledger. The method also includes verifying a digital identity of the user by auditing the auditable chain. The method also includes obtaining a second user-generated item generated comprising the identifiable feature. The method also includes comparing the first and second user-generated items. The method also includes uploading the second user-generated item to the public ledger when the comparing is within a threshold.

Narrative authentication

Authentication is performed based on a user narrative. A narrative, such as a personal story, can be requested during a setup process. Content, voice signature, and emotion can be determined or inferred from analyzing the narrative. Subsequently, a user can provide vocal input associated with the narrative, such as by retelling the narrative or answering questions regarding the narrative. The vocal input can be analyzed for content, voice signature and emotion, and compared with the initial narrative. An authentication score can then generated based on the comparison.

Narrative authentication

Authentication is performed based on a user narrative. A narrative, such as a personal story, can be requested during a setup process. Content, voice signature, and emotion can be determined or inferred from analyzing the narrative. Subsequently, a user can provide vocal input associated with the narrative, such as by retelling the narrative or answering questions regarding the narrative. The vocal input can be analyzed for content, voice signature and emotion, and compared with the initial narrative. An authentication score can then generated based on the comparison.

Method and system for monitoring and providing beneficial visual and auditory stimulation for dementia patients
11589799 · 2023-02-28 ·

An on-person portable device and/or app that allows for constant location monitoring of dementia patients is disclosed. Such a device and/or app also includes automated communication of facial recognition of persons proximally near such a patient as well as possible generation of certain music in response to patient status and/or location. The patient is provided the device and/or app for handling or wearing, such as a phone or pair of glasses, in order to follow location through GPS monitoring, and a reactive program therein that automatically views another person and provides an identification thereof coupled with a voice modulator within an earpiece or like device for memory stimulation pertaining to loved ones or friends, and the like. The same program may also provide the music response to comments, movement, or any other external stimuli to the subject patient, again, to evoke a memory stimulus, as well.

Method and system for monitoring and providing beneficial visual and auditory stimulation for dementia patients
11589799 · 2023-02-28 ·

An on-person portable device and/or app that allows for constant location monitoring of dementia patients is disclosed. Such a device and/or app also includes automated communication of facial recognition of persons proximally near such a patient as well as possible generation of certain music in response to patient status and/or location. The patient is provided the device and/or app for handling or wearing, such as a phone or pair of glasses, in order to follow location through GPS monitoring, and a reactive program therein that automatically views another person and provides an identification thereof coupled with a voice modulator within an earpiece or like device for memory stimulation pertaining to loved ones or friends, and the like. The same program may also provide the music response to comments, movement, or any other external stimuli to the subject patient, again, to evoke a memory stimulus, as well.

Voice interaction scripts

This disclosure describes systems and methods that identify activities for which scripts can be built to perform an activity when requested by a user. The scripts can be voice-activated by a defined customized voice command and can include delivery preferences. The user's identity can be verified by analyzing voice biometrics of the customized voice command. After performance of the activity, results can be delivered to the device in the format indicated in the script.

Voice interaction scripts

This disclosure describes systems and methods that identify activities for which scripts can be built to perform an activity when requested by a user. The scripts can be voice-activated by a defined customized voice command and can include delivery preferences. The user's identity can be verified by analyzing voice biometrics of the customized voice command. After performance of the activity, results can be delivered to the device in the format indicated in the script.

Mobile application for smart systems interaction

A building control system includes a plurality of interconnected building systems. A mobile application is configured to be installed on at least one mobile device. The mobile application is configured to cause the mobile device to interface with the building server and to display a graphical user interface (GUI). The GUI includes an elevator pane configured to allow a user to interface with a building elevator control system.

Mobile application for smart systems interaction

A building control system includes a plurality of interconnected building systems. A mobile application is configured to be installed on at least one mobile device. The mobile application is configured to cause the mobile device to interface with the building server and to display a graphical user interface (GUI). The GUI includes an elevator pane configured to allow a user to interface with a building elevator control system.

Authentication device, authentication system, and authentication method
11593465 · 2023-02-28 · ·

In order to improve the safety and reliability of services provided by a computer, an authentication device (1) equipped with a transmission unit (15) and a determination unit (16) is provided. The transmission unit (15) transmits a challenge to a terminal device (7) where the challenge is presented to a user (8) to be authenticated, the challenge being information serving as the basis on which the user inputs information to be used for authentication processing. At this time, the transmission unit (15) transmits a plurality of different challenges to the terminal device (7). The determination unit (16) determines not only whether or not a response input to the terminal device (7) by the user (8) in response to each challenge is correct, but also whether or not time information regarding the challenge and the response thereto satisfies a condition regarding the response.