Patent classifications
G06F21/445
LOCKING FUNCTION FOR A MOBILE DEVICE
A mobile device comprises a functional arrangement for performing a function of the mobile device, a coupling device for connecting the mobile device to a stationary device, an authentication device for authenticating the stationary device and an activation device. The authentication device authenticates the stationary device based on information on the stationary device. The activation device activates the functional arrangement when the mobile device is connected to the stationary device by the coupling device, and when the stationary device has been authenticated by the authentication device.
USING ON-DEMAND APPLICATIONS TO PROCESS ENCRYPTED DATA FROM A CONTACTLESS CARD
A device may receive a uniform resource locator (URL) and encrypted data. The device may download a first application from an application server based on the URL. The device may download and execute the first application. The first application may receive the encrypted data.
Intelligent remote control
A content access device and system may allow portable remote devices to be paired with a variety of different devices, allowing remote control through a network connection. Content access devices may expose application program interfaces, allowing incoming network traffic to control operation of the device much in the same way that a local infrared remote would. Routing content commands through an external application server may also yield other benefits, such as allowing more customized selection of information and advertising content to users based on their viewing history.
Supply authentication via timing challenge response
In an example implementation, a print supply cartridge comprises a microcontroller to receive a timing challenge and enable authentication of the cartridge by providing a challenge response. The challenge response is provided in a challenge response time that falls within an expected time window.
Transaction verification through enhanced authentication
Systems and methods for authenticating requests to use an Application Programming Interface (“API”) are described. In some embodiments, a request to use an API is received. Based on a comparison of the request to use the API with a pattern of activity associated with the client, a determination is made whether the client deviates from an expected behavior. Once a determination that the client deviates from the expected behavior is made, an authentication challenge is generated and issued. In some embodiments, the comparison of the request to use the API with a pattern of activity involves comparing transactional attributes of the request to use the API with past client behavior.
Secure group file sharing
Aspects of the current subject matter are directed to secure group file sharing. An architecture for end-to-end encrypted, group-based file sharing using a trusted execution environment (TEE) is provided to protect confidentiality and integrity of data and management of files, enforce immediate permission and membership revocations, support deduplication, and mitigate rollback attacks.
Unified system for authentication and authorization
A request is received from a trusted application to authorize a client application that requests a service offered by the trusted application. Whether the client application is authorized to access the trusted application is determined in view of the request. An authentication of a user of the client application is caused in response to determining the client application is authorized to access the trusted application. An authorization result is returned to the trusted application in view of the determining and the authentication.
Method for operating a touch-sensitive, planar input device of a complete device, and complete device
An approach for operating at least one touch-sensitive, flat input device of a complete device, the input device being connected via a message-based bus connection to a control device of the complete device, and messages containing touch datasets describing touch data events being transmitted to the control device, which evaluates the messages for input information for an application program implemented by the control device, wherein when a security function in the control device that queries sensitive input information is accessed, the touch datasets are transmitted from the input device to the control apparatus via the bus connection in encrypted form until the associated input process has ended.
Key management system, communication device and key sharing method
A key management apparatus receives a key request including a first device identification information and a second device identification information, encrypts a common key using the first device identification information to generate a first encrypted common key, encrypts the common key using the second device identification information to generate a second encrypted common key, and transmits a key response including the first encrypted common key and the second encrypted common key. A first device receives the key response, decrypts the first encrypted common key using the first device identification information to obtain the common key, and transmits the second encrypted common key. A second device receives the second encrypted common key and decrypts the second encrypted common key using the second device identification information to obtain the common key.
Method and system for temporary use of biometric information of another for access to a system
A method and system for temporarily gaining access to a system is disclosed, The method includes: receiving biometric data from a first biometric device of a first user on a computer processor; generating a temporary code on the computer processor in response to receipt of the biometric data from the first biometric device of the first user; sending the temporary code from the computer processor to the first biometric device of the first user; receiving biometric data from a second biometric device of a second user on the first biometric device of the first user; generating an access code on the first biometric device, the access code including one or more of the biometric data of the first user, the temporary code from the computer processor, and the biometric data of the second user; and sending the access code to the biometric device of the second user.