H04L2463/121

SYSTEMS AND METHODS FOR HIDING IDENTITY OF TRANSACTING PARTY IN DISTRIBUTED LEDGER TRANSACTION BY HASHING DISTRIBUTED LEDGER TRANSACTION ID USING SECURED REPRESENTATION OF DISTRIBUTED LEDGER ADDRESS OF TRANSACTING PARTY AS A KEY
20200045020 · 2020-02-06 ·

Implementations of the disclosure are directed to proving and creating on a distributed ledger a verifiable transaction record of a transaction between a user associated with user device and an agent associated with agent system, where the identities of the user and agent are hidden. Some implementations are directed to providing for hidden identity of claims where a distributed ledger identity of a user may be masked from an agent.

Secure real-time clock update in an access control system

A method according to one embodiment includes communicating a wireless advertisement that identifies a clock status of a real-time clock of the access control device, wherein the clock status includes a clock status value indicating that the real-time clock has not been set, establishing a wireless communication connection with a computing device in response to the wireless advertisement, transmitting a session random value to the computing device, receiving a clock update token from the computing device, wherein the clock update token is indicative of an authority of the computing device to update the real-time clock of the access control device, authenticating the clock update token based on at least the session random value, and updating the real-time clock based on a received update time in response to successful authentication of the clock update token.

Systems, devices, and methods for identifying user data
10552697 · 2020-02-04 · ·

The various embodiments described herein include methods, devices, and systems for identifying users. In one aspect, a method includes (1) receiving from a server a request to identify a user; (2) in response to the identification request, sending a request for encoded image data corresponding to one or more features of the first user, the request specifying a particular encoding for the image data; (3) receiving encoded image data corresponding to the one or more features of the first user; (4) obtaining stored image data for an authorized user corresponding to one or more features of the authorized user; (5) determining whether the first user is the authorized user based on a comparison of the received encoded image data and the stored image data; and (6) providing to the remote server an identification indicator based on the determination of whether the first user is the authorized user.

Methods and apparatus for statistical mobile device identification
10547699 · 2020-01-28 · ·

Methods and apparatus for mobile device identification using TCP segment timestamps are disclosed. A request from a mobile device is received at a server. A TCP connection, initiated by the mobile device, is made between the server and the device, and a timestamp generated by the mobile device is retrieved from the options field of the TCP SYN segment. Other identifying information is received from the mobile device source, including an IP address, port, and HTTP headers. Based on the identifying information, the mobile device timestamp, and a current timestamp generated by the server, a likelihood is determined that the particular mobile device previously communicated with the server.

A DEVICE, COMPUTER PROGRAM AND METHOD
20200029214 · 2020-01-23 · ·

A device for authenticating a user is described. This device comprises transceiver circuitry configured to receive motion information from a plurality of wearable devices located on a user's body indicative of the motion of the user's body at the location of the respective wearable device at a particular time; and 5 controller circuitry configured to: compare the received motion information and the location of the respective wearable device and authenticate the user in the event of a positive comparison between the received motion information and the location of the respective wearable device with stored motion information and the location of the respective wearable device.

ROAMING MOBILE SUBSCRIBER TERMINAL LOCATING SYSTEM
20200029294 · 2020-01-23 ·

A method of locating a user of a wireless communication device who has roamed out of network, includes the steps of receiving an identifier of a mobile switching center (MSC ID) that is serving the user out of network, transmitting a request for user location data to the mobile switching center, the request including an identifier of the wireless communication device, and determining a location of the user based on the user location data received from the mobile switching center. The user location data includes an identifier of a cell (cell ID) within the mobile switching center, and the location of the user is determined based on the cell ID.

Client device ticket

A system may include a client device to connect to a network and a network device communicatively coupled to the client device. The network device may determine that the client device has been authenticated to the network via a captive portal page. The network device may further create a ticket corresponding to the client device. Possession of the ticket by the client device may indicate authentication of the client device to the network. The network device may then transmit the ticket to the client device for storage on the client device. The stored ticket may enable the client device to remain authenticated to the network after a period of inactivity.

Mobile wallets with packaged travel services
10540729 · 2020-01-21 · ·

Methods and systems for location-based mobile wallets are disclosed. A one-time mobile wallet can be established on a mobile device and associated with a travel itinerary. Device data and external data can be used with the travel itinerary to determine a travel assistance action. The location of the mobile device can be determined using GPS and/or contactless terminal data, for example. Based on the location of the mobile device and the travel itinerary, a travel assistance action can be performed. This can, for example, include presenting wallet elements to a user or automatically initiating a phone call to a service provider listed in the travel itinerary. In this way, travel assistance can vary with the location of the mobile device. After expiration of the duration, the one-time mobile wallet can be disabled.

Detecting Anomalies in a Computer Network Based on Usage Similarity Scores

A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is big data driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies and threats, regardless of whether such anomalies/threats were previously known. The security platform can include both real-time and batch paths/modes for detecting anomalies and threats. By visually presenting analytical results scored with risk ratings and supporting evidence, the security platform enables network security administrators to respond to a detected anomaly or threat, and to take action promptly.

SYSTEMS AND METHOD FOR PROVIDING AUTOMATED NOTARIZATION

An automated notarization device may receive biometric data from a biometric sensor, transmit the biometric data to a remote server, receive processed biometric data, receive user identification data relating to a user identity, compare processed biometric data and user identification data, receive document data, send an emboss request, record time stamp information, scan a signed version of the document, and transmit a notarization confirmation. An automated notarization device for providing a notarization transaction may include a processor, a display, an image sensor, a biometric sensor, a notarization printer, a scanner, a transceiver, and a non-transitory memory storing instructions that, when executed by the processor, cause the processor to perform processing including receive biometric data from the biometric sensor, transmit the biometric data to a server remote from the automated notarization device, receive processed biometric data, receive user identification data, compare the processed biometric data and the user identification data, receive document data, send an emboss request, record time stamp information, scan a signed version of the document, and transmit a notarization confirmation.