H04W12/06

APPARATUS AND METHODS FOR MULTIFACTOR AUTHENTICATION

Apparatus and methods for multifactor authentication using a smart mobile device are provided. The apparatus and methods may include an authentication engine on a server, a smart mobile device belonging to a user and a smartphone belonging to a user. The authentication engine may determine a location of the user, the user's smartphone, and the user's smart mobile device. When the smart mobile device is within a pre-determined distance to the user or the user's smartphone, the authentication engine may send an authentication request to the smart mobile device, or automatically authenticate the user.

APPARATUS AND METHODS FOR MULTIFACTOR AUTHENTICATION

Apparatus and methods for multifactor authentication using a smart mobile device are provided. The apparatus and methods may include an authentication engine on a server, a smart mobile device belonging to a user and a smartphone belonging to a user. The authentication engine may determine a location of the user, the user's smartphone, and the user's smart mobile device. When the smart mobile device is within a pre-determined distance to the user or the user's smartphone, the authentication engine may send an authentication request to the smart mobile device, or automatically authenticate the user.

ELECTRONIC DEVICE AND METHOD FOR INSTALLING eSIM PROFILE IN ELECTRONIC DEVICE
20230041033 · 2023-02-09 ·

An electronic device includes a communication module, an embedded-subscriber identification module (eSIM) in which at least one profile is stored, and a processor. The processor is configured to, when accessing a server and succeeding in authentication for a first profile among at least one profile stored in the eSIM, receive an authentication token indicating successful authentication for the first profile from the server, when establishing communication with a first electronic device through the communication module, inform the first electronic device that the first profile is transmittable data, and when transmission of the first profile is requested from the first electronic device, transmit, to the first electronic device, the authentication token for downloading a second profile corresponding to the first profile from the server.

ELECTRONIC DEVICE AND METHOD FOR INSTALLING eSIM PROFILE IN ELECTRONIC DEVICE
20230041033 · 2023-02-09 ·

An electronic device includes a communication module, an embedded-subscriber identification module (eSIM) in which at least one profile is stored, and a processor. The processor is configured to, when accessing a server and succeeding in authentication for a first profile among at least one profile stored in the eSIM, receive an authentication token indicating successful authentication for the first profile from the server, when establishing communication with a first electronic device through the communication module, inform the first electronic device that the first profile is transmittable data, and when transmission of the first profile is requested from the first electronic device, transmit, to the first electronic device, the authentication token for downloading a second profile corresponding to the first profile from the server.

Hands free interaction system and method

A method is disclosed. The method includes receiving a broadcast signal from a beacon device, the broadcast signal encoding a first credential associated with a first entity. In response to receipt of the broadcast signal, the mobile communication device transmits the received first credential to an authentication system. The authentication system determines if the first entity associated with the broadcast signal is authentic and generates a confirmation message confirming the authenticity of the first entity. The mobile communication device then receives the confirmation message indicating that the first entity is authentic. The mobile communication thereafter receives and transmits a second credential for the mobile communication device to the beacon device, which transmits the second credential to the authentication system. The authentication system then confirms the authenticity of the mobile communication device. Then, the beacon device can initiate an interaction process with the user of the mobile communication device.

Hands free interaction system and method

A method is disclosed. The method includes receiving a broadcast signal from a beacon device, the broadcast signal encoding a first credential associated with a first entity. In response to receipt of the broadcast signal, the mobile communication device transmits the received first credential to an authentication system. The authentication system determines if the first entity associated with the broadcast signal is authentic and generates a confirmation message confirming the authenticity of the first entity. The mobile communication device then receives the confirmation message indicating that the first entity is authentic. The mobile communication thereafter receives and transmits a second credential for the mobile communication device to the beacon device, which transmits the second credential to the authentication system. The authentication system then confirms the authenticity of the mobile communication device. Then, the beacon device can initiate an interaction process with the user of the mobile communication device.

Call protect geolocator display for 5G or other next generation network

Call spoofing can be mitigated by providing geolocation information to the called device. For example, when a call rings, a geolocator can be invoked and the incoming call display screen can show a carrier logo and/or a geolocator globe illustrating the location of the call originator. The geolocation session initiation protocol data can be confirmed by a network device and compared against carrier specific data of the calling device to authenticate voice calls for called devices. In one embodiment location data of the calling device can purposely be shared in order to facilitate the mitigation of call spoofing.

Anti-theft mobile terminal and method for controlling the extraction of a memory card out from a mobile terminal
11558748 · 2023-01-17 · ·

The disclosed technology relates to a mobile terminal adapted to receive a memory card comprising a processing unit, an input interface and a card locking actuator configured to lock the memory card into the mobile terminal. The card locking actuator is controlled by the processing unit. In one aspect, the card locking actuator is configured to be locked when the mobile terminal is switched on. In another aspect, the processing unit is configured to lock the screen until a screen unlocking authentication procedure is performed by a user at the input interface and is configured to command unlocking of the card locking actuator after detecting that a predetermined authentication procedure is performed by a user at the input interface.

Anti-theft mobile terminal and method for controlling the extraction of a memory card out from a mobile terminal
11558748 · 2023-01-17 · ·

The disclosed technology relates to a mobile terminal adapted to receive a memory card comprising a processing unit, an input interface and a card locking actuator configured to lock the memory card into the mobile terminal. The card locking actuator is controlled by the processing unit. In one aspect, the card locking actuator is configured to be locked when the mobile terminal is switched on. In another aspect, the processing unit is configured to lock the screen until a screen unlocking authentication procedure is performed by a user at the input interface and is configured to command unlocking of the card locking actuator after detecting that a predetermined authentication procedure is performed by a user at the input interface.

Performance monitoring systems and methods
11557388 · 2023-01-17 · ·

Systems and methods for electronically creating and modifying a fitness plan are disclosed. The method may include receiving electronic user data, collecting electronic fitness data, and displaying a suggestion for a fitness activity based on the electronic user data and the electronic fitness data.