G06F21/34

Modular blood glucose control systems

Blood glucose control systems are disclosed. A blood glucose control system can receive a glucose level signal from a glucose sensor operatively coupled to a subject. The system can decode encoded data of the glucose level signal to obtain the glucose level of the subject and the indication of the glucose trend. The system can automatically calculate the dose control signal using a control algorithm configured to calculate regular correction boluses of glucose control agent in response to at least the glucose level of the subject. The system can select a dose control signal encoding profile from a plurality of dose control signal encoding profiles and, based on the dose control signal encoding profile, encode the dose control signal such that the pump controller can read the dose control signal. The system can transmit an encoded dose control signal to the pump controller.

Modular blood glucose control systems

Blood glucose control systems are disclosed. A blood glucose control system can receive a glucose level signal from a glucose sensor operatively coupled to a subject. The system can decode encoded data of the glucose level signal to obtain the glucose level of the subject and the indication of the glucose trend. The system can automatically calculate the dose control signal using a control algorithm configured to calculate regular correction boluses of glucose control agent in response to at least the glucose level of the subject. The system can select a dose control signal encoding profile from a plurality of dose control signal encoding profiles and, based on the dose control signal encoding profile, encode the dose control signal such that the pump controller can read the dose control signal. The system can transmit an encoded dose control signal to the pump controller.

SECURE AUTHENTICATION SYSTEM AND METHOD

Methods and systems pertaining secure transaction systems are disclosed. In one implementation, a computer with a verification token associated with a computer can send user authentication data as well as a secure datum to a control server. The verification token may obtain the secure datum from a validation entity. The control server can validate the secure datum and authentication data and can generate a payer authentication response.

SECURE AUTHENTICATION SYSTEM AND METHOD

Methods and systems pertaining secure transaction systems are disclosed. In one implementation, a computer with a verification token associated with a computer can send user authentication data as well as a secure datum to a control server. The verification token may obtain the secure datum from a validation entity. The control server can validate the secure datum and authentication data and can generate a payer authentication response.

EVENT DRIVEN SECOND FACTOR CREDENTIAL AUTHENTICATION
20180007041 · 2018-01-04 ·

A reader configured to perform dual-factor authentication is provided. The reader is configured to analyze credential data as well as event-based user inputs. The event-based user inputs are received in response to the reader presenting one or more events to a user and monitoring the user's reaction thereto. Utilization of an event-based user input enables the reader to perform dual-factor authentication without necessarily being provided with a keyboard or other advanced user input device.

EVENT DRIVEN SECOND FACTOR CREDENTIAL AUTHENTICATION
20180007041 · 2018-01-04 ·

A reader configured to perform dual-factor authentication is provided. The reader is configured to analyze credential data as well as event-based user inputs. The event-based user inputs are received in response to the reader presenting one or more events to a user and monitoring the user's reaction thereto. Utilization of an event-based user input enables the reader to perform dual-factor authentication without necessarily being provided with a keyboard or other advanced user input device.

Fingerprint Emulator

An access key for a device having a fingerprint activated lock includes an electrically conductive member having surface features formed on a surface thereof that can be recognized by the fingerprint activated lock as a unique fingerprint. A second electrically conductive member is electrically coupled to the first electrically conductive member. The second electrically conductive member is electrically coupled to the body of a user such that the sensor recognizes the first electrically conductive member as a fingerprint. The second electrically conductive member is preferably a ring, stylus or gripping portion upon which the first electrically conductive member is mounted. The electrically conductive member is preferably constructed from a capacitive elastomer such as an electrically conductive silicone. The access key functions as a synthetic fingerprint to limit access to a system to a possessor of the key. Access to the system provided by key can be limited to a predetermined period of time or a selected geographic area.

UNIFIED AUTHENTICATION MANAGEMENT SYSTEM
20180004928 · 2018-01-04 · ·

A system for automatic authentication of a user to allow access to websites and physical devices which provides tiered levels of security and defines an API protocol for exchange of authentication credentials.

UNIFIED AUTHENTICATION MANAGEMENT SYSTEM
20180004928 · 2018-01-04 · ·

A system for automatic authentication of a user to allow access to websites and physical devices which provides tiered levels of security and defines an API protocol for exchange of authentication credentials.

VIRTUAL SMART CARDS WITH AUDIT CAPABILITY
20180007039 · 2018-01-04 ·

Virtual smart card system includes a virtual smart card server (VSS) which controls access to content respectively associated with a plurality of virtual smart cards. A remote client computer system includes a system level agent which establishes the client computer machine to the VSS as a trusted computer system. A user level agent at the client computer system responds to a request for a virtual smart card operation by causing the client computer system to obtain user authentication information, negotiate with the system level agent to obtain a cookie, and initiate a request to the VSS for the virtual smart card operation. The VSS will perform the virtual smart card operation provided that a security policy is satisfied and will communicate the results to the user level agent.