Patent classifications
G06F21/34
Electronic device control using user identification
Provided is an electronic device in which, after user authentication is executed on the basis of identification information of a user acquired through a reader configured to read information from a contactless medium, a control unit causes a display unit to display a home screen when no job corresponding the identification information is registered, the control unit executes a process according to one piece of a job when only the one job is registered, and the control unit executes a process according to a job selected through an operation of the user from among two or more jobs when the two or more jobs are registered.
METHOD AND SYSTEM FOR PROVIDING A BRAIN COMPUTER INTERFACE
A method for providing a brain computer interface that includes detecting a neural signal of a user in response to a calibration session having a time-locked component and a spontaneous component; generating a user-specific calibration model based on the neural signal; prompting the user to undergo a verification session, the verification session having a time-locked component and a spontaneous component; detecting a neural signal contemporaneously with delivery of the verification session; generating an output of the user-specific calibration model from the neural signal; based upon a comparison operation between processed outputs, determining an authentication status of the user; and performing an authenticated action.
METHOD AND SYSTEM FOR PROVIDING A BRAIN COMPUTER INTERFACE
A method for providing a brain computer interface that includes detecting a neural signal of a user in response to a calibration session having a time-locked component and a spontaneous component; generating a user-specific calibration model based on the neural signal; prompting the user to undergo a verification session, the verification session having a time-locked component and a spontaneous component; detecting a neural signal contemporaneously with delivery of the verification session; generating an output of the user-specific calibration model from the neural signal; based upon a comparison operation between processed outputs, determining an authentication status of the user; and performing an authenticated action.
TOKEN BASED ONE-TIME PASSWORD SECURITY
A one-time password (OTP) based security scheme is described, where a provider pre-generates a number of verification codes (e.g., OTP codes) which will be valid for a predetermined interval. The provider then encodes the verification codes (e.g., by hashing each code with a time value), and stores the verification codes into a data structure. The data structure can be provided to a verification system that can use the set of pre-generated OTP codes to authenticate requests received from users having personal security tokens.
TOKEN BASED ONE-TIME PASSWORD SECURITY
A one-time password (OTP) based security scheme is described, where a provider pre-generates a number of verification codes (e.g., OTP codes) which will be valid for a predetermined interval. The provider then encodes the verification codes (e.g., by hashing each code with a time value), and stores the verification codes into a data structure. The data structure can be provided to a verification system that can use the set of pre-generated OTP codes to authenticate requests received from users having personal security tokens.
DEVICE AND METHOD FOR AUTHENTICATING A USER OF A FIRST ELECTRONIC DEVICE CONNECTED TO A SECOND ELECTRONIC DEVICE
Authentication of a user of a first electronic device, such as a communication terminal or a virtual or augmented reality headset. The first electronic device is connected to a second electronic device, the first electronic device and the second electronic device being separately portable by the user. The authentication device includes an analyser capable of checking whether a detected value of a relative characteristic parameter of the second electronic device corresponds to a stored value of this relative characteristic parameter of the second electronic device associated with an identifier of a user requiring an authentication, the relative characteristic parameter corresponding to the characteristic parameter of the second electronic device measured relative to the characteristic parameter of the first electronic device.
MULTI STEP AUTHENTICATION METHOD AND SYSTEM
A multi step authentication method for authenticating a person as an authorized person, the multi step authentication method being executed by a multi step authentication system including an authentication server, a user device, the method comprising the steps of executing a first authentication phase, the first authentication phase comprises performing a first authentication technique; executing a second authentication phase, the second authentication phase comprises performing a second authentication technique, wherein the first authentication technique and second authentication technique are disparate; both the first and second authentication techniques utilize contactless authentication techniques; wherein the second authentication phase is performed after the first authentication phase successfully authenticates a person as an authorized user, a person is authenticated as an authorized person or vehicle if both the first authentication phase and second authentication phase successfully authenticate the person or vehicle, and; wherein the first authentication phase and second authentication phase are sequentially alterable.
Hardware key system for device protection
A medical device includes at least one memory device storing data; a communication interface defining a first communication path to allow communications between the medical device and an external device or network; and a hardware key interface defining a second communication path that is separate from the first communication path. A hardware key is configured to be coupled to the meter via the second communication path defined by the hardware key interface. The data on the at least one memory device cannot be modified unless the hardware key interface is physically coupled to the hardware key. The hardware key may include a key code component and conducting lines, where the hardware key interface receives the key code via the conducting lines and the data on the at least one memory device cannot be modified unless the key code provided by the hardware key is validated.
Hardware key system for device protection
A medical device includes at least one memory device storing data; a communication interface defining a first communication path to allow communications between the medical device and an external device or network; and a hardware key interface defining a second communication path that is separate from the first communication path. A hardware key is configured to be coupled to the meter via the second communication path defined by the hardware key interface. The data on the at least one memory device cannot be modified unless the hardware key interface is physically coupled to the hardware key. The hardware key may include a key code component and conducting lines, where the hardware key interface receives the key code via the conducting lines and the data on the at least one memory device cannot be modified unless the key code provided by the hardware key is validated.
Method and system for securing sensitive information
A method for securing sensitive information, includes storing patient information in a secured form in an external device that is carried by a patient. A user terminal obtains a first signature generated using a first secret key inside a first identification medium, where the first secret key is associated with a first healthcare person. Moreover, the user terminal communicates a write request that includes at least the first signature to the external device. The external device receives the write request from the user terminal when the user terminal is within a proximal communication range of the external device. Furthermore, the external device verifies at least the first signature received in the write request. The user terminal writes first information to the external device, based on verification of at least the first signature. A system for securing sensitive information is also provided.