H04L9/3226

VIDEO SECURITY SYSTEM WITH IMPROVED NETWORK RESPONSE TIME USING PRE-AUTHENTICATION INFORMATION
20230011133 · 2023-01-12 · ·

A video security system with improved network response speed using pre-authentication information, which is capable of improving a network response speed by simplifying handshaking for securely exchanging authentication information and an encryption key in a process of starting communication between a client terminal and a server using pre-authentication information that is valid only for the client terminal, is provided.

Augmented reality vehicle identification with visual light communication

The disclosure relates to augmented reality vehicle identification with visual light communication. For example, a mobile device may be configured for “scanning” an area having multiple parked vehicles within visual range of the mobile device, to identify a target vehicle. The mobile device may include an application for identifying the target vehicle using visual light communication (VLC) equipment and techniques that present an augmented reality outline or other identification of the target vehicle on the smartphone screen once the vehicle is identified by the system. The encrypted communication channels with the vehicle may be established to utilize vehicle headlamps, interior lights, or another light emitting device to establish the VLC between the user's phone and the vehicle VLC system. The mobile device may emit VLC signals using an onboard light emitter while being in visual communication with the target vehicle, establish an encrypted communication channel with the vehicle, and identify the vehicle using automatic and/or user-selectable identification features.

AUTHENTICATION OF COMPUTER DEVICES WITHOUT PASSWORD STORAGE
20230012084 · 2023-01-12 ·

An apparatus and method for performing authenticated communications that includes receiving, by a gateway device, a password associated with an application. The gateway device is in communication with a plurality of access control devices associated with the application. Access to each device in a cluster formed by the gateway device and the plurality of access control devices requires a user authentication associated with the password. The gateway device generates a plurality of different matching pairs of salt values and hash values and deletes the password. In addition, the gateway device transmits different sets of mismatched pairs of the salt values and the hash values to at least two devices of the cluster for storage. The user authentication is based on a salt value and a hash value from the plurality of different matching pairs of salt values and hash values stored at two different devices of the cluster.

System and method of performing secured transactions in a communication network
11699147 · 2023-07-11 · ·

A system and a method of data communication between a first computing device, associated with a first user, and at least one second computing device associated with a second user may include: receiving, by the first computing device, one or more data elements pertaining to details of a transaction request from the second computing device, via a voice channel; extracting said transaction request details by the first computing device; transmitting, by the first computing device, one or more authentication data elements of an electronic wallet module, comprised in the first computing device, to the second computing device, via the voice channel; and carrying out the requested transaction by the first computing device, based on the extracted transaction request details and the electronic wallet authentication data.

Methods and system for securely capturing and providing transaction information
11699136 · 2023-07-11 · ·

An option is set on a payment card of a card issuer. A request for payment for a transaction is received by a payment server of the card issuer from a merchant device/server. The payment server requests and receives a one-time token based on the option. An authorization indicating payment was successful is sent from the payment server to the merchant device/server with a flag set, the token, and a network address. Merchant device/server identifies the flag obtains the token and sends an e-receipt for the transaction along with the token to the network address. The e-receipt accessible from the network address by a consumer associated with the transaction. Furthermore, the e-receipt is obtained by the consumer without registering personal information or contact information with the merchant, which preserves the anonymity of the consumer with respect to the merchant.

Image forming apparatus having a plurality of ports to which portable memory is attachable, and computer-readable medium and method for the same
11698762 · 2023-07-11 · ·

An image forming apparatus includes a controller configured to perform a storage printing process that includes storing print data in a dedicated memory, which is a portable memory set as a storage destination to store the print data in the storage printing process when attached to a dedicated port among a plurality of ports, and causing a print engine to perform printing according to the print data stored in the dedicated memory in response to an operation received via a user interface, prior to the storage printing process, set one of the plurality of ports as the dedicated port, in response to a portable memory being attached to a port, determine whether the portable memory is the dedicated memory and the port is the dedicated port, and provide a notification when determining that the portable memory is not the dedicated memory but the port is the dedicated port.

DYNAMIC MULTI-FACTOR AUTHENTICATION

An authentication model dynamically adjusts authentication factors required for access to a remote resource based on changes to a risk score for a user, a device, or some combination of these. For example, the authentication model may conditionally specify the number and type of authentication factors required by a user/device pair, and may dynamically alter authentication requirements based on changes to a current risk assessment for the user/device while the remote resource is in use.

Distributed key secret for rewritable blockchain

A system includes circuitry for rewriting blockchains in a non-tamper-evident or tamper-evident operation using a key secret held in portions by multiple individually untrusted parties. The blockchains may include a series of blocks secured by integrity codes that may prevent non-tamper-evident rewrites by non-trusted parties that are not in possession of the key secret or individually-untrusted parties in possession of only a portion of the key secret. In some cases, multiple individually-untrusted parties may combine their portions into the key secret. As a group, the multiple individually-untrusted parties may perform non-tamper-evident operation with respect to at least one integrity code within the blockchain.

Data processing method and apparatus

A method includes sending, by a trusted application (TA) entity, a certificate of the TA entity and a private key signature of the TA entity to a target security domain (SD). The certificate and the private key signature enable the target SD to perform trust verification via a server, obtaining, by the TA entity, a first key of the target SD when the trust verification of the TA entity succeeds, and establishing, by the TA entity, a trust relationship with the target SD.

Secure container for package delivery

A method includes transmitting, by a handler device associated with a package handler, a message to an access control system requesting access to a secure container secured by an electronic lock mechanism; determining, by the access control system, whether the package handler is authorized to access the secure container based on the received message; transmitting, by the access control system, an unlock command to the secure container in response to a determination that the package handler is authorized to access the secure container; and unlocking the electronic lock mechanism of the secure container in response to successful authentication of the unlock command.