G06F21/42

System and method to retrieve a secure message when a display of a mobile device is inaccessible

Systems and methods are described for providing a security code to a second device. A first device receives a textual representation of a security code that is required for authorization of a second device with a remote application server. The first device checks if the textual representation of the security code is accessed during a predefined time period. If not, the first device also checks if the second device is within an output range of the first device. If so, the first device outputs an audio representation of the security code.

Moveable safety deposit box system

A re-locatable safety deposit box facility that allows for 24/7 access by authorized personnel to their safety deposit boxes without the need for any attendants at the facility. The facility is self-contained and re-locatable, such that it can be moved from one location to another location. In some embodiments, the facility may be, for example, a standard size shipping container. It has interior dimensions that are sufficient to house an array of safety deposit boxes. The container may also be equipped with devices that may be used to lift the entire container up so that it may be moved to another location.

Moveable safety deposit box system

A re-locatable safety deposit box facility that allows for 24/7 access by authorized personnel to their safety deposit boxes without the need for any attendants at the facility. The facility is self-contained and re-locatable, such that it can be moved from one location to another location. In some embodiments, the facility may be, for example, a standard size shipping container. It has interior dimensions that are sufficient to house an array of safety deposit boxes. The container may also be equipped with devices that may be used to lift the entire container up so that it may be moved to another location.

Account access recovery system, method and apparatus

Some embodiments of the invention provide a program for recovering access to a service associated with an account. The program provides a login credential to log into the account to receive the associated service. Next, the program receives an access continuation parameter (ACP) after logging into the account. The program then accesses the service and receives a rejection of a subsequent access to the service. The program then provides the ACP in lieu of the login credential to continue to receive the service.

Account access recovery system, method and apparatus

Some embodiments of the invention provide a program for recovering access to a service associated with an account. The program provides a login credential to log into the account to receive the associated service. Next, the program receives an access continuation parameter (ACP) after logging into the account. The program then accesses the service and receives a rejection of a subsequent access to the service. The program then provides the ACP in lieu of the login credential to continue to receive the service.

PUBLIC KEY ENCRYPTION USING SELF POWERED TIMERS
20220382851 · 2022-12-01 ·

A one-time self-powered timer circuit whose state can be measured only once, after which the timer will de-synchronize itself. In this manner, the timers can only be used for one-pad authentication. The security of the public-key distribution algorithms that will exploit the synchronization between billions of hardware-software timers, time reversibility of software timer and time irre-versibility of hardware timers and one-time read-out to deliver classical and quantum-like benefits. System-on-chip and circuit imple-mentation of the self-powered timer array, read-out, programming and initialization modules that implements the proposed public-key distribution algorithms.

PUBLIC KEY ENCRYPTION USING SELF POWERED TIMERS
20220382851 · 2022-12-01 ·

A one-time self-powered timer circuit whose state can be measured only once, after which the timer will de-synchronize itself. In this manner, the timers can only be used for one-pad authentication. The security of the public-key distribution algorithms that will exploit the synchronization between billions of hardware-software timers, time reversibility of software timer and time irre-versibility of hardware timers and one-time read-out to deliver classical and quantum-like benefits. System-on-chip and circuit imple-mentation of the self-powered timer array, read-out, programming and initialization modules that implements the proposed public-key distribution algorithms.

Communication channel enhancement
11516338 · 2022-11-29 · ·

A system for automatic authentication of service requests includes authentication of a remote access device. This authentication may be accomplished automatically prior to text or audio communication between a customer and a service agent. In some embodiments, authentication is accomplished automatically by authentication of the remote access device or accomplished by asking the customer questions. A single authentication of the remote access device may be used to authenticate a service request transferred between service agents. The authentication of the remote device may include, for example, use of a personal identification number, a fingerprint, a photograph, and/or a hardware identifier. Some embodiments include an intelligent pipeline configured for managing queues of customer service requests and/or customer service agent control over a customer's access device. Some embodiments include logic configured to manage and enhance communication channels between devices.

Communication channel enhancement
11516338 · 2022-11-29 · ·

A system for automatic authentication of service requests includes authentication of a remote access device. This authentication may be accomplished automatically prior to text or audio communication between a customer and a service agent. In some embodiments, authentication is accomplished automatically by authentication of the remote access device or accomplished by asking the customer questions. A single authentication of the remote access device may be used to authenticate a service request transferred between service agents. The authentication of the remote device may include, for example, use of a personal identification number, a fingerprint, a photograph, and/or a hardware identifier. Some embodiments include an intelligent pipeline configured for managing queues of customer service requests and/or customer service agent control over a customer's access device. Some embodiments include logic configured to manage and enhance communication channels between devices.

Remote support device
11588878 · 2023-02-21 · ·

A portable remote support device comprises a processing unit, a network communication unit configured to communicate with a cloud service, a video capturing unit, at least one video input port and at least one output port. The processing unit is configured to communicate video signals received via the video input port to the cloud service via the network communication unit, and to emulate pointing device signals and/or keyboard signals received via the network communication unit on said at least one output port. The portable remote support device is configured to obtain unique secure tokens.