Patent classifications
G06F21/35
ACOUSTIC SECURITY CODE TRANSMISSION
A system and methods of computer security are provided wherein a first mobile computing device drives an acoustic transducer to emit an acoustic signal encoding a time-based, one time password (TOTP) code, and a second mobile computing device measures output of a MEMS gyroscope that senses the emitted acoustic signal. The second mobile computing device decodes the TOTP code from the gyroscope output, validates the TOTP code and responsively permits a user to access a secure application.
ACOUSTIC SECURITY CODE TRANSMISSION
A system and methods of computer security are provided wherein a first mobile computing device drives an acoustic transducer to emit an acoustic signal encoding a time-based, one time password (TOTP) code, and a second mobile computing device measures output of a MEMS gyroscope that senses the emitted acoustic signal. The second mobile computing device decodes the TOTP code from the gyroscope output, validates the TOTP code and responsively permits a user to access a secure application.
Systems and methods for location-based automated authentication
Systems, methods, and apparatuses for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform. The sensor and the backend platform are in network communication. The mobile device is operable to continuously transmit Bluetooth Low Energy (BLE) signals comprising encrypted transitory identifiers. The sensor is operable to receive a BLE signal from the mobile device when the mobile device is within a predetermined range, and communicate over a network connection the encrypted transitory identifier comprised in the BLE signal to the backend platform. The backend platform is operable to extract a unique identifier and a changing encrypted identifier from the received encrypted transitory identifier, generate a changing encrypted identifier, and validate a user identification by comparing the generated changing encrypted identifier and the extracted changing encrypted identifier.
Systems and methods for location-based automated authentication
Systems, methods, and apparatuses for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform. The sensor and the backend platform are in network communication. The mobile device is operable to continuously transmit Bluetooth Low Energy (BLE) signals comprising encrypted transitory identifiers. The sensor is operable to receive a BLE signal from the mobile device when the mobile device is within a predetermined range, and communicate over a network connection the encrypted transitory identifier comprised in the BLE signal to the backend platform. The backend platform is operable to extract a unique identifier and a changing encrypted identifier from the received encrypted transitory identifier, generate a changing encrypted identifier, and validate a user identification by comparing the generated changing encrypted identifier and the extracted changing encrypted identifier.
DEVICE AND METHOD FOR AUTHENTICATING A USER OF A FIRST ELECTRONIC DEVICE CONNECTED TO A SECOND ELECTRONIC DEVICE
Authentication of a user of a first electronic device, such as a communication terminal or a virtual or augmented reality headset. The first electronic device is connected to a second electronic device, the first electronic device and the second electronic device being separately portable by the user. The authentication device includes an analyser capable of checking whether a detected value of a relative characteristic parameter of the second electronic device corresponds to a stored value of this relative characteristic parameter of the second electronic device associated with an identifier of a user requiring an authentication, the relative characteristic parameter corresponding to the characteristic parameter of the second electronic device measured relative to the characteristic parameter of the first electronic device.
DEVICE AND METHOD FOR AUTHENTICATING A USER OF A FIRST ELECTRONIC DEVICE CONNECTED TO A SECOND ELECTRONIC DEVICE
Authentication of a user of a first electronic device, such as a communication terminal or a virtual or augmented reality headset. The first electronic device is connected to a second electronic device, the first electronic device and the second electronic device being separately portable by the user. The authentication device includes an analyser capable of checking whether a detected value of a relative characteristic parameter of the second electronic device corresponds to a stored value of this relative characteristic parameter of the second electronic device associated with an identifier of a user requiring an authentication, the relative characteristic parameter corresponding to the characteristic parameter of the second electronic device measured relative to the characteristic parameter of the first electronic device.
PROTECTED ARTICLE MANAGEMENT
Tracking, identifying and article management systems and methods for reliably and repeatedly determining one or more physically uncopiable attribute instances (of the same or varying types) from or inherent in an article of manufacture, using the selected physical uncopiable attribute(s) to produce an unforgeable identity for the article, and then integrating that unforgeable identity into computer-based tracking systems in a way that permits the tracking system to track and monitor articles for which identity information is known. Applications include documents, fashion accessories, artwork, and other objects.
PROTECTED ARTICLE MANAGEMENT
Tracking, identifying and article management systems and methods for reliably and repeatedly determining one or more physically uncopiable attribute instances (of the same or varying types) from or inherent in an article of manufacture, using the selected physical uncopiable attribute(s) to produce an unforgeable identity for the article, and then integrating that unforgeable identity into computer-based tracking systems in a way that permits the tracking system to track and monitor articles for which identity information is known. Applications include documents, fashion accessories, artwork, and other objects.
BLUETOOTH COMMUNICATION METHOD AND SYSTEM
A Bluetooth communication method implemented between first and second electronic devices, including establishing a communication in a connected mode between the first and second devices including a key exchange operation between these two devices, and establishing a communication in an advertising mode between the first and second devices including a periodic broadcast by the second device to the first device of a message including a payload and a calculated tag from this key.
Mobile communication terminal and control method therefor
A mobile communication terminal A performs near field communication with another mobile communication terminal B by a near field communication unit and obtains a communication distance with another mobile communication terminal B. An information acquisition unit acquires information on another mobile communication terminal B, information on the mobile communication terminal A, or both of the information when the communication distance to the other mobile communication terminal B is equal to or more than a threshold. An abnormality determination unit determines an abnormal state of the mobile communication terminal A based on information (position information, wearing information, or the like) acquired by the information acquisition unit. When the abnormality determination unit determines that the mobile communication terminal A is in the abnormal state, a lock unit locks the mobile communication terminal A, the other mobile communication terminal B or both of those mobile communication terminals.