Patent classifications
H04L2463/082
OPERATING METHOD FOR ONE-TIME PASSWORD WITH UPDATABLE SEED
An operating method for a one-time password with an updatable seed. The method comprises: a one-time password entering a dormancy mode after being powered on and initialized; being woken up when an interrupt is detected; entering an interrupt processing flow; setting a wakeup flag; entering a key processing flow when a key wakeup flag is set; judging a system state and a key manner; and completing the functions of programming seed data and generating a password according to a judgment result. According to the present invention, on the premise of guaranteeing the security, a user is permitted to program and update seed data in a one-time password, thereby facilitating the use of the user.
APPARATUS AND METHOD FOR AUTHENTICATION BASED ON COGNITIVE INFORMATION
An authentication apparatus and method based on cognitive information. The authentication apparatus based on cognitive information includes an authentication request reception unit for receiving a request to authenticate an authentication target, a behavioral and contextual information collection unit for collecting behavioral and contextual information corresponding to the authentication target, a cognitive information extraction unit for extracting cognitive information corresponding to the request from previously stored big data, and an authentication processing unit for authenticating the authentication target in consideration of the behavioral and contextual information based on the extracted cognitive information.
Network Authentication Of Multiple Profile Accesses From A Single Remote Device
A network authentication system and method is described for authenticating multiple profile accesses from a single remote device. A device remote from a web server, yet connected to the web server via, for example, the Internet, can allow multiple users to register their profiles within the device. The profiles are registered using a pre-existing user ID and password corresponding to, for example, the user's financial accounts. Multiple profiles and, specifically, the indicia of those profiles, can appear on the display of the remote device allowing each user the ability to select their own registered profile. Access to a profile is granted when the user enters their private PIN. Once the PIN is entered, the private information such as financial account information will be securely forwarded from the web server to the remote device.
METHODS FOR BIOMETRIC VERIFICATION USING A MOBILE DEVICE
A method (200) for registering a new account of a user of a verification software by using a mobile device (108) equipped with a camera (110) and a display (112). The method (200) may comprise capturing (202) a first image of a front side (702) of a physical ID card (700) by using the camera (110), wherein the physical ID card (700) comprises a text (704), comprising user information, and an ID photo (706) depicting the user's face, extracting (204) the user information from the text (704) and ID face features from the ID photo (706), presenting (206) the user information to the user on the display (112), capturing (208) a reference photo of the user's face by using the camera (110), extracting (210) reference face features from the reference photo, comparing (212) the reference face features and the ID face features, if a match (214) is found, forming (216) a face template by using the reference face features and storing (218) the face template together with the user information.
SYSTEMS AND METHODS FOR PROVIDING INFORMATION RIGHTS MANAGEMENT OFFLINE FILE FACILITY
Systems and methods for providing secure offline file access utilizing information rights management (IRM) are provided herein. In some embodiments, the method may comprise storing one or more IRM-protected documents in a secure local storage on a user device; storing one or more consumption licenses associated with the one or more IRM-protected documents in the secure local storage on the user device, wherein the one or more consumption licenses is required to access one or more IRM-protected documents; detecting a loss of network connectivity on the user device; writing the one or more consumption licenses to an IRM location in memory on the user device; receiving a request to open a document of the one or more IRM-protected documents; reading the consumption license from the IRM location in memory; and enabling access to the requested IRM-protected document based on the consumption license.
PROXIMITY DETECTION SYSTEM
Various systems and methods for providing a walk away lock are provided herein. A plurality of data packets may be received at a compute device from a user device. Here, each packet has corresponding time-to-receive value. A baseline latency value of the plurality of data packets may be determined based on their respective time-to-receive values. Additional data packets may be received from the user device, each of these additional data packets having their own corresponding time-to-receive values. A current latency value of the additional data packets may be calculated based on the respective time-to-receive values. A security operation may be performed based on the baseline latency value and the current latency value.
SMART DATA CARDS THAT ENABLE THE PERFORMANCE OF VARIOUS FUNCTIONS UPON ACTIVATION/AUTHENTICATION BY A USER'S FINGERPRINT, ONCARD PIN NUMBER ENTRY, AND/OR BY FACIAL RECOGNITION OF THE USER, OR BY FACIAL RECOGNITION OF A USER ALONE, INCLUDING AN AUTOMATED CHANGING SECURITY NUMBER THAT IS DISPLAYED ON A SCREEN ON A CARD'S SURFACE FOLLOWING AN AUTHENTICATED BIOMETRIC MATCH
A smart card such as an EMV card that connects, wirelessly or by contact, to a reader or other device, and permits the flow of information/data to/from the card when connected thereto, after fingerprint scanning authorization/user verification system; or image scanning authorization/user verification, or PIN number entry from an on-card pad, or both, including a display screen for displaying changing/static user identification data stored thereon/therein alter such authorization/verification.
AUTHENTICATION INFORMATION PROCESSING METHOD AND APPARATUS AND USER TERMINAL INCLUDING AUTHENTICATION INFORMATION PROCESSING METHOD AND APPARATUS
Disclosed are an authentication information processing method and apparatus and a user terminal including an authentication information processing method and apparatus. The authentication information processing method performed by the disclosed authentication information processing apparatus comprises the steps of: obtaining biometric information of a user; obtaining a unique key corresponding to the authentication information processing apparatus; and generating an authentication key by using at least a part of the biometric information and at least a part of the unique key.
Method and apparatus to regulate a digital security system that controls access to a resource
A method and system to regulate a digital security system that controls access to a resource is disclosed. The system controls access to the resource according to a multi-level security protocol including a high-security-level access protocol and a low-security-level access protocol. The regulation method and system are configured to collect data from a set of user-data sources with which the user interacts during his daily life and, based on the collected data, to compute security parameters characterizing user activity. The computed security parameters are compared to a digital profile that models the characteristic behavior of this user. When the comparison indicates that the observed user activity is inconsistent with the digital behavior profile, the digital security system is regulated to set (or maintain) it in an operating state such that, when the user requests access to the resource in the future, the system will automatically implement the high-security-level access protocol.
Personal digital identity device with fingerprint sensor responsive to user interaction
A personal digital ID device provides a digital identifier to a service for a predetermined duration in response to user interaction. The user interaction may include a button press. The personal digital ID device may be in the form of a bracelet, a key fob, or other form factor. The service may be provided by a mobile device, in the cloud, or elsewhere.