G06F21/43

Device pairing

Alternative pairing is used to enable communication between devices, but without conventional processes required for pairing. Moreover, multiple wireless bonds may be enabled, where both a device is linked to another device and an account is associated with the device and also a backend server. Once an appropriate bond is established, a streaming app (or partial or lightweight version of an application including a selected subset of application functionality) can be streamed to a device such that the user can enter information that can be transmitted to a paired device over the wireless connection. This can enable the association of the device to be performed with respect to the backend servers of the relevant provider. Such an approach can also establish a mechanism for the user to create an account while downloading the full application, or remainder of the application in some embodiments, in the background.

Device pairing

Alternative pairing is used to enable communication between devices, but without conventional processes required for pairing. Moreover, multiple wireless bonds may be enabled, where both a device is linked to another device and an account is associated with the device and also a backend server. Once an appropriate bond is established, a streaming app (or partial or lightweight version of an application including a selected subset of application functionality) can be streamed to a device such that the user can enter information that can be transmitted to a paired device over the wireless connection. This can enable the association of the device to be performed with respect to the backend servers of the relevant provider. Such an approach can also establish a mechanism for the user to create an account while downloading the full application, or remainder of the application in some embodiments, in the background.

Methods to authorizing secondary user devices for network services and related user devices and back-end systems

Methods are provided to authorize a secondary user device for a network service provided over a network. Responsive to receiving a request from a primary user device, a voucher may be transmitted over the network to the primary user device. A request for an authorization waiver may be received from the secondary user device over the network, wherein the request for the authorization waiver includes the voucher that was transmitted to the primary user device. Responsive to receiving the request from the secondary user device including the voucher, an authorization waiver may be transmitted to the secondary user device. Related methods of operating primary and secondary user devices are also discussed.

Methods to authorizing secondary user devices for network services and related user devices and back-end systems

Methods are provided to authorize a secondary user device for a network service provided over a network. Responsive to receiving a request from a primary user device, a voucher may be transmitted over the network to the primary user device. A request for an authorization waiver may be received from the secondary user device over the network, wherein the request for the authorization waiver includes the voucher that was transmitted to the primary user device. Responsive to receiving the request from the secondary user device including the voucher, an authorization waiver may be transmitted to the secondary user device. Related methods of operating primary and secondary user devices are also discussed.

ENCRYPTED COMMUNICATION METHOD AND ELECTRONIC DEVICE
20220382886 · 2022-12-01 ·

An encrypted communication method is applied in a first electronic device, which includes a first processor communicating through encrypted channel of first Bluetooth, and a second processor communicating through unencrypted channel of second Bluetooth. The method includes: receiving, by the first processor, a key transmitted from a second electronic device, and transmitting the key to the second processor, the key being transmitted from the second electronic device to the first processor through the encrypted channel of the first Bluetooth; receiving, by the second processor in response to the first electronic device being switched to a system run by the second processor, a first ciphertext transmitted from the second electronic device, the first ciphertext being transmitted from the second electronic device to the second processor through the unencrypted channel of the second Bluetooth; and decrypting, by the second processor, the first ciphertext with the key to obtain the first plaintext.

ENCRYPTED COMMUNICATION METHOD AND ELECTRONIC DEVICE
20220382886 · 2022-12-01 ·

An encrypted communication method is applied in a first electronic device, which includes a first processor communicating through encrypted channel of first Bluetooth, and a second processor communicating through unencrypted channel of second Bluetooth. The method includes: receiving, by the first processor, a key transmitted from a second electronic device, and transmitting the key to the second processor, the key being transmitted from the second electronic device to the first processor through the encrypted channel of the first Bluetooth; receiving, by the second processor in response to the first electronic device being switched to a system run by the second processor, a first ciphertext transmitted from the second electronic device, the first ciphertext being transmitted from the second electronic device to the second processor through the unencrypted channel of the second Bluetooth; and decrypting, by the second processor, the first ciphertext with the key to obtain the first plaintext.

ENCRYPTED ASSET CONTAINERS WITH CENTRALIZED SHAREABLE CREDENTIALS
20220385458 · 2022-12-01 ·

A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.

ISOLATING AND IDENTIFYING HUMANS USING MICRO-VIBRATION SIGNALS AS UNIQUE FINGERPRINTS
20220382844 · 2022-12-01 ·

A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.

Multidevice user authentication in group-based communication systems

Method, apparatus and computer program product for multi-device user authentication are described herein. For example, the apparatus includes at least one processor and at least one non-transitory memory including program code. The at least one non-transitory memory and the program code are configured to, with the at least one processor, identify, on a first computing device, a first active interface session associated with one or more active authentication conditions each configured to enable access to a group-based communication interface of a group-based communication system; cause a first computing device to present an authentication command interface for the first active interface session; receive an interface session request from a second computing device indicating electronic communication by the second computing device with the authentication command interface; and cause the second computing device to execute limited user authentication routines each configured to enable a respective active authentication condition on the second computing device.

Multidevice user authentication in group-based communication systems

Method, apparatus and computer program product for multi-device user authentication are described herein. For example, the apparatus includes at least one processor and at least one non-transitory memory including program code. The at least one non-transitory memory and the program code are configured to, with the at least one processor, identify, on a first computing device, a first active interface session associated with one or more active authentication conditions each configured to enable access to a group-based communication interface of a group-based communication system; cause a first computing device to present an authentication command interface for the first active interface session; receive an interface session request from a second computing device indicating electronic communication by the second computing device with the authentication command interface; and cause the second computing device to execute limited user authentication routines each configured to enable a respective active authentication condition on the second computing device.