G06F21/35

METHOD AND APPARATUS TO ENABLE A MARKET IN USED DIGITAL CONTENT
20180007018 · 2018-01-04 ·

Methods and apparatus to enable a distinction between “new” and “used” digital content and to enable a market in used digital content files between mobile phone terminals and an electronic store, securely, by means of a wireless telephony network and a server complex to handle contents right management, transaction reporting, inventory, content delivery, payment, and billing. A server receives a signal generated by a wireless user device that was sent over a wireless telephony network. The signal indicates an election for returning at least one previously purchased digital content item. The server deletes user rights for the at least one digital content item identified by the received signal and sends information to the user device that generated the signal. Access to the associated digital content item at the user device is removed according to the sent information.

MOBILE RFID CONTAINER AND DISTRIBUTION METHOD
20180004988 · 2018-01-04 ·

A transportable container is enabled with radio frequency identification (“RFID”) technologies to maintain automated inventory levels of those items that are inside the container. The inventory data is communicated via wireless methods, such as cellular or Wi-Fi, to a remote device such as enterprise resource planning (“ERP”) system. The ERP system may use the inventory data received from the remote device to automatically update appropriately and generate appropriate records (e.g., container inventory, restocking, invoicing, etc.). In some embodiments, automated RFID scans are triggered when the container is opened and subsequently closed. The container may include RF containment/screening to prevent inadvertent scanning of RFID tags outside of the container. The container may also include a location device to allow the location of the container to be readily determined.

MOBILE RFID CONTAINER AND DISTRIBUTION METHOD
20180004988 · 2018-01-04 ·

A transportable container is enabled with radio frequency identification (“RFID”) technologies to maintain automated inventory levels of those items that are inside the container. The inventory data is communicated via wireless methods, such as cellular or Wi-Fi, to a remote device such as enterprise resource planning (“ERP”) system. The ERP system may use the inventory data received from the remote device to automatically update appropriately and generate appropriate records (e.g., container inventory, restocking, invoicing, etc.). In some embodiments, automated RFID scans are triggered when the container is opened and subsequently closed. The container may include RF containment/screening to prevent inadvertent scanning of RFID tags outside of the container. The container may also include a location device to allow the location of the container to be readily determined.

SYSTEMS AND METHODS FOR SHORT RANGE WIRELESS DATA TRANSFER
20180004500 · 2018-01-04 · ·

Systems and methods for application level authentication are provided for use with the low energy Bluetooth device and accessory. This includes receiving accessory credentials from a server, establishing a Bluetooth low energy connection with the accessory, authenticating with the accessory, and lastly transferring data to the accessory. The transferring of the data may be either a bulk transfer, or a data stream. The authenticating may be an application layer authentication between a device and the accessory using a shared secret key and using a hash function. Additional embodiments include methods for over-the-air firmware updates, and device control of a low energy Bluetooth accessory.

PROCESSING APPARATUS, METHOD FOR CONTROLLING PROCESSING APPARATUS, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM
20180004922 · 2018-01-04 ·

Provided is a processing apparatus that authenticates a requestor in response to a request for performing predetermined processing. The processing apparatus executes the predetermined processing upon the authentication succeeding. Whether or not authentication is performed is set individually for each of the processing apparatus and an external apparatus of the processing apparatus that serve as the requestor. The authentication is performed in the case where authentication is set to be performed on the requestor that made the request.

Fingerprint Emulator

An access key for a device having a fingerprint activated lock includes an electrically conductive member having surface features formed on a surface thereof that can be recognized by the fingerprint activated lock as a unique fingerprint. A second electrically conductive member is electrically coupled to the first electrically conductive member. The second electrically conductive member is electrically coupled to the body of a user such that the sensor recognizes the first electrically conductive member as a fingerprint. The second electrically conductive member is preferably a ring, stylus or gripping portion upon which the first electrically conductive member is mounted. The electrically conductive member is preferably constructed from a capacitive elastomer such as an electrically conductive silicone. The access key functions as a synthetic fingerprint to limit access to a system to a possessor of the key. Access to the system provided by key can be limited to a predetermined period of time or a selected geographic area.

Fingerprint Emulator

An access key for a device having a fingerprint activated lock includes an electrically conductive member having surface features formed on a surface thereof that can be recognized by the fingerprint activated lock as a unique fingerprint. A second electrically conductive member is electrically coupled to the first electrically conductive member. The second electrically conductive member is electrically coupled to the body of a user such that the sensor recognizes the first electrically conductive member as a fingerprint. The second electrically conductive member is preferably a ring, stylus or gripping portion upon which the first electrically conductive member is mounted. The electrically conductive member is preferably constructed from a capacitive elastomer such as an electrically conductive silicone. The access key functions as a synthetic fingerprint to limit access to a system to a possessor of the key. Access to the system provided by key can be limited to a predetermined period of time or a selected geographic area.

Method and System for Associating a User with a Wearable Device
20180004926 · 2018-01-04 ·

A method and system are provided for associating a user with a wearable device. The method includes: obtaining physiological information of a user of a wearable device; comparing the obtained physiological information against a stored physiological profile, wherein the stored physiological profile is built up over time from obtained physiological information; and, based on the comparison, updating a confidence parameter indicating the extent to which the obtained physiological information matches the physiological profile.

Multi-Factor Authentication to Access Services
20180007060 · 2018-01-04 ·

A technology is provided for using a multi-factor authentication process to access services in a computing service environment. One or more policies can be defined for allowing access to one or more services and/or resources associated with a service provider environment according to an authenticated identity. A device, detected by a voice-capturing endpoint within a defined geographical location, may be authenticated according to a unique identification (ID). Voice data received from the voice-capturing endpoint can be authenticated. The authenticated identity can be established according to the authenticated device and the authenticated voice data. A command, received via a voice command from the voice-capturing endpoint, may be issued with the authenticated identity to access the one or more services and/or resources associated with the service provider environment according to the plurality of policies.

AUTHENTICATION SYSTEM

A system for creating a combined electronic identification that obtains user information (202) about a user of a hardware device (100), authenticates the user from the user information (202), obtains a hardware profile (208) of the device (100), the hardware profile 208 comprising user generated data stored on the device (100) and links the user information (202) and the hardware profile (208) as a combined electronic identification. The hardware device (100) can be comprised of a main processor, memory, a touchscreen interface, and a wireless communication module, such as a mobile phone, computer, or tablet computer.