H04L9/3271

SYSTEMS AND METHODS TO PERFORM CONTACTLESS CARD ACTIVATION

Example embodiments relate to performing activation techniques for contactless cards. For example, embodiments may include performing a near-field communication (NFC) exchange with a contactless card, processing a message comprising data to activate the contactless card, communicating the data to a server to activate the contactless card; and receiving a response from the server, the response to indicate whether the contactless card is successfully activated or not successfully activated.

Blockchain-based trustless date verifiable video capture
11546560 · 2023-01-03 ·

A host system may initiate a multiple node exchange of selected values to generate a random selection. The structure of the exchange may allow later verification that no single node had control of the generation of the random selection. Accordingly, the random selection may be unknown prior to the exchange. The host system may then provide the random selection to the device for integration of the random selection during the capture of video. The video may be recorded to a blockchain. Because of the integration with the random selection, the video may be date verifiable, such that the video can be verified to be created after the random selection and before recordation to the blockchain.

Magnetic sensor array device optimization

A magnetic sensor array device is comprised of an array of magnetic sensors arranged on a common semiconductor substrate to measure the multi-axis magnetic field of an arbitrary sized region at high speed with high spatial resolution and high magnetic resolution. This invention further improves a multi-axis magnetic sensor array device fabricated on a common semiconductor substrate with additional optimizations to provide for variable spatial resolution, variable magnetic resolution, and a novel secret key derivation.

SYSTEM AND METHOD FOR SHARED SESSIONS IN COMMUNICATION NETWORKS
20220417040 · 2022-12-29 · ·

A system, apparatus and method are provided for supporting shared sessions in communication networks. The system, apparatus and method include interoperation between a User Equipment and serving nodes of a communication network. The serving nodes communicate with at least one anchor node of the communication network. In some implementations a shared session identifier and User Equipment identifying component are used to identify a User Equipment within a shared session. In some implementations, a paging notification is used to inform one or more target User Equipment that of a downlink message relating to the shared session.

Generating an authentication result by using a secure base key

An encrypted sequence that includes an authentication key may be received. A base key stored at a device may be identified and the encrypted sequence may be decrypted with the base key to obtain the authentication key. A challenge value may be received and the authentication key may be combined with the challenge value to generate a device ephemeral key. An authentication result may be generated for the device based on a combination of the device ephemeral key and the challenge value. Furthermore, the authentication result may be transmitted to a mobile network to authenticate the device.

User device using NFC, authentication system and operation method thereof
11539403 · 2022-12-27 · ·

An operation method of a user device which performs near field communication (NFC) with a card reader includes downloading a service certification of a service, which the card reader provides, from a service authentication server through a network, sending status information of the user device to the card reader, receiving a service identifier (ID) which the card reader sends depending on the status information, performing an authentication process with the card reader based on a symmetric key when the service ID is present in the downloaded service certification, and sending an authentication success message to the card reader when the authentication process succeeds.

System for authorizing secured access using cryptographic hash value validations

A system for authorizing secured access using cryptographic hash value validations is provided. In particular, the system may receive requests from users and/or computing systems to obtain secured access a particular resource or to execute a certain process. In response, the system may require that the user and/or computing system complete additional required steps (e.g., a computation) before being granted access to the resources or processes. In this way, the system may prevent unauthorized or unintended access to the system's resources or processes.

Authentication scheme in a virtual private network

A method in a virtual private network (VPN) environment, the method including determining, by a VPN server, an encrypted authentication packet based at least in part on utilizing an encryption key and a nonce to encrypt one or more fields of an initial authentication packet; transmitting, by the VPN server to an authentication server, the encrypted authentication packet to enable VPN authentication of a device requesting VPN services from the VPN server; determining, by the authentication server, a response regarding the VPN authentication based at least in part on decrypting the one or more fields utilizing a decryption key and the nonce; and transmitting, by the authentication server to the VPN server, the response regarding the VPN authentication. Various other aspects are contemplated.

AUTOMATIC ASSOCIATION OF A NON-MEDICAL DEVICE WITH A MEDICAL DEVICE
20220408267 · 2022-12-22 ·

Techniques disclosed herein relate to automatic association of a non-medical device with a medical device. In some embodiments, the techniques involve accessing a user account provided by a cloud-based service, retrieving first identification information that is stored to the user account and identifies a medical device via the cloud-based service, receiving second identification information from the medical device, and establishing a secure communication link with the medical device based on determining that the second identification information corresponds to or matches the first identification information.

AUTHENTICATION METHOD, CORRESPONDING DEVICE AND PROGRAM
20220407854 · 2022-12-22 ·

A method for authenticating access via a communication terminal, before a server is disclosed. The method includes, subsequently to the transmission by an access application of the communication terminal, to the server, of a connection request: transforming a variable element, received from the server, using transformation materials obtained upon a subscription before the server, outputting a transformed element; transmitting to the server, an identifier associated to the access and to the transformed element; and receiving an authentication of the access, originating from the server taking the transformed element into account.