H04W12/06

Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts
11595374 · 2023-02-28 · ·

A permissions management system is disclosed for enabling a user to securely authorize a third-party system to access user account data and initiate transactions related to a user account, without disclosing to the third-party system account credentials. The system enables the user to also securely de-authorize the third-party system. For example, records may be automatically generated that securely store account information, including one or more permissions related to the account and/or the third-party. A token associated with a record may be shared with the third-party system, but neither the record itself, nor the user account credentials, may be shared with the third-party. Accordingly, the third-party may request user account data and/or initiate transactions by providing the token, but does not itself know, e.g., the user account credentials. Further, the user may set various permissions related to the token, and may also revoke the token (e.g., de-authorize the third-party), thus providing increased security to the user's account.

SYSTEM AND METHOD FOR PROVIDING SECURE IDENTIFICATION SOLUTIONS

The present invention provides a method and system for verifying and tracking identification information. In an embodiment of the invention, a system for delivering security solutions is provided that includes at least one of the following: a radio frequency (RF) identification device, an identification mechanism (e.g., a card, sticker), and an RF reader.

Modify voice calls with a moving driver to reduce distractions
20180007554 · 2018-01-04 ·

A system for reducing traffic accidents caused by distraction from a mobile telecom device. The system detects when the device is near a driver's seat of a moving vehicle. While the system is carrying a voice call between a remote voice device and the mobile device, the system modifies voice signal transmission between the devices by periodically playing a beep or other signal to remind the parties that one of them is driving and suspends voice signal transmission from the remote device to the mobile device when the system detects that circumstances affecting level of attention required for driving merit the driver paying greater attention.

Devices, Systems, and Methods for Security Using Magnetic Field Based Identification

Devices, systems and methods are disclosed for determining an electromagnetic signature for authenticating a device, a user, and/or a location. In exemplary embodiments, a magnetometer captures an electromagnetic signature which is then compared with one or more authorized electromagnetic signatures. If the electromagnetic signature matches an authorized electromagnetic signature, then access is granted. The magnetometer is integrated into a communication device having a processor and a logic. The magnetometer captures an electromagnetic signature of a surrounding environment and detects motion of the communication device through the captured electromagnetic signature. The logic on the communication device locks or unlocks features of the device based upon the captured electromagnetic signature. In further embodiments of the subject disclosure, the magnetometer is in communication with a server which authenticates a user or communication device to provide access to a remote location.

Devices, Systems, and Methods for Security Using Magnetic Field Based Identification

Devices, systems and methods are disclosed for determining an electromagnetic signature for authenticating a device, a user, and/or a location. In exemplary embodiments, a magnetometer captures an electromagnetic signature which is then compared with one or more authorized electromagnetic signatures. If the electromagnetic signature matches an authorized electromagnetic signature, then access is granted. The magnetometer is integrated into a communication device having a processor and a logic. The magnetometer captures an electromagnetic signature of a surrounding environment and detects motion of the communication device through the captured electromagnetic signature. The logic on the communication device locks or unlocks features of the device based upon the captured electromagnetic signature. In further embodiments of the subject disclosure, the magnetometer is in communication with a server which authenticates a user or communication device to provide access to a remote location.

METHOD AND APPARATUS FOR UTILIZING CALLEE INFORMATION AND LOCATION BEFORE CALL ESTABLISHMENT

The present disclosure relates to providing user information. In a method for requesting user information of an information requesting device in a mobile communication system, the method includes selecting a callee from a user, acquiring a user identifier (ID) of the selected callee, transmitting a user information request for the selected callee and the user ID to a relay server, evaluating whether an admission message is received from the relay server, and if the admission message is received, receiving user information from the relay server.

CONTROLLING ACCESS TO PROTECTED FUNCTIONALITY OF A HOST DEVICE USING A WIRELESS DEVICE
20180007558 · 2018-01-04 · ·

A wearable device can establish a verified session with a host device (e.g., by establishing that the wearable device is present in the vicinity of the host device and is currently being worn). The existence of such a verified session can be used to control user access to sensitive information that may be stored in or otherwise accessible to a host device. For example, the host device and/or application programs executing thereon can be configured to restrict a user's ability to invoke program functionality that accesses sensitive information based on whether a verified session with a wearable device is currently in progress.

PASSIVE DYNAMIC GEOFENCING FOR MOBILE DEVICES
20180007505 · 2018-01-04 ·

Systems and methods for passive dynamic geofencing on a mobile device are discussed. For example, a method for passive dynamic geofencing can include operations such as monitoring a first parent geofence and a first plurality of child geofences; detecting crossing a boundary of the first parent geofence into a second parent geofence; loading the second parent geofence and a second plurality of child geofences encompassed by the second parent geofence; and monitoring the second parent geofence and the second plurality of child geofences.

PASSIVE DYNAMIC GEOFENCING FOR MOBILE DEVICES
20180007505 · 2018-01-04 ·

Systems and methods for passive dynamic geofencing on a mobile device are discussed. For example, a method for passive dynamic geofencing can include operations such as monitoring a first parent geofence and a first plurality of child geofences; detecting crossing a boundary of the first parent geofence into a second parent geofence; loading the second parent geofence and a second plurality of child geofences encompassed by the second parent geofence; and monitoring the second parent geofence and the second plurality of child geofences.

METHOD AND DEVICE FOR AUTHENTICATING A MOBILE STATION ON AN ALTERNATIVE COMMUNICATIONS NETWORK
20180007539 · 2018-01-04 · ·

A method of authenticating a mobile station on an alternate communications network is disclosed, the mobile station being associated with a default communications network. The mobile station comprises a baseband processor to manage the antenna-related functions and a SIM card to accommodate a default SIM associated with the default communications network for receiving network credentials from the baseband processor. The method comprises providing a SIM card device to intercept communications between the baseband processor and the SIM card, monitoring the network credentials in respect of the network that the mobile station is actively in communication with, determining whether the mobile station needs to switch to an alternate network, and identifying or receiving from a user the alternate network, consulting a SIM bank, comprising at least one alternate SIM, and selecting an alternate SIM having a mobile station identification variable compatible with the alternate network, receiving a network authentication request on the mobile station from the alternate network, and allocating the selected mobile station identification variable to the mobile station so as to identify the user of the mobile station on the alternate network.