H04L63/083

Management of access credentials

Various embodiments include computing devices and methods for management of access credentials. A processor of a computing device may receive an authentication request from a client application support service to authenticate a client application. The processor may send a response comprising an authentication token to the client application support service. The processor may receive from the client application support service a request for an access token to access a target system. The processor may send a response comprising the access token to the client application support service to enable the client application support service to access the target system using the access token on behalf of the client application.

Vehicle and control method thereof

A personal mobility sharing system includes: a personal mobility, a server, an owner terminal and a member terminal connected through a network, and the server is configured to register a device information of the personal mobility, receive a sharing setting information from the owner terminal, set a sharing mode of the personal mobility based on the sharing setting information, receive an authentication request from the member terminal and transmit an unlock signal to the personal mobility when the authentication request includes pre-registered authentication information.

Electronic device and control method thereof

An electronic device is provided. The electronic device includes a communication interface including circuitry, a memory, and a processor which, based on receiving ID information generated by performing a first encryption process on biometric information and password information generated by performing a second encryption process on the biometric information from an external electronic device through the communication interface, is configured to control the electronic device to: store the ID information and the password information in the memory. The processor, based on receiving first ID information and first password information from the external electronic device, is configured to control the electronic device to: acquire at least one candidate ID information from the memory based on the first ID information, compare password information corresponding to each of the acquired at least one candidate ID information with the first password information to identify one of the candidate ID information, and perform user authentication based on the identified candidate ID information and corresponding password information.

Password-based authorization for audio rendering

A method and device for processing one or more audio streams based on password-based privacy restrictions is described. A device may be configured to receive unrestricted audio streams of the one or more audio streams based on privacy restrictions associated with a password, wherein the one or more audio streams are from audio elements represented in an acoustic environment that comprises one or more sub-acoustic spaces, each of the one or more audio streams representative of a respective soundfield, and generate the respective soundfields of the unrestricted audio streams.

INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD, AUTHENTICATION DEVICE AND AUTHENTICATION METHOD, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD IN AUTHENTICATION SYSTEM, AND COMPUTER PROGRAM
20230043031 · 2023-02-09 ·

An information processing apparatus that performs multifactor and multistage authentication procedures is to be provided. An information processing apparatus includes: an authentication procedure processing unit that performs an authentication procedure on an external device, using a tamper-resistant secure element; and a control unit that controls a process for multistage authentication of the external device, the multistage authentication including the authentication procedure. The control unit controls a process of a second authentication procedure using the identification information about the secure element, the identification information being associated with the user account information. The control unit controls execution of the second authentication procedure during an operation in the login authentication procedure.

BINDING METHOD AND SYSTEM FOR DEVICE NETWORK CONFIGURATION, AND MOBILE TERMINAL AND STORAGE MEDIUM
20230040580 · 2023-02-09 · ·

Disclosed are a binding method and system for device network configuration, and a mobile terminal and a storage medium. The method comprises: according to a request made to a cloud server from a smart device needing to be configured, acquiring device information of the smart device and a binding code; receiving the binding code generated by the cloud server, and the device information sent by same, and connecting the smart device according to the device information, and sending the binding code to the connected smart device, such that when the smart device is registered to the cloud server, the binding and connection to the smart device are realized according to the binding code.

Multiple Relying Parties in a Single-Sign-On Environment

A system and method for providing secure Single-Sign-On (SSO) authentication in a zero-knowledge architecture. A first server component may operate as a first relying party in a first SSO flow. When the user of an application successfully authenticates to a first identity provider, a first part of a secret key may be provided to the application. Additionally, a second server component may operate as a second relying party in a second SSO flow. When the first part of the secret key is received by the application, authentication information may be provided to a second identity provider. Based on a successful authentication, a second part of the secret key may be provided to the application. The first and second parts of the secret key may be combined by the application to generate a final secret key that may be used to decipher encrypted user data.

Robotic process automation system with device user impersonation

A robotic process automation system provides a capability to deploy software robots (bots) by receiving from a deployment user a bot deployment request comprising a bot identification that identifies a specific preexisting bot and an authorized class of user to execute the specific preexisting bot. Credentials of the deployment user are checked. An execution device upon which the specific preexisting bot will execute is identified from a set of available devices. An authorization token is issued for the execution device to uniquely identify the execution device and to authorize the execution device to communicate with the robotic process automation system. In response to a request by the execution device the specific preexisting bot and credentials corresponding to the authorized class of user are provided, wherein the specific preexisting bot executes on the execution device automatically without input from any individual corresponding to the authorized class of user.

Information processing apparatus, information processing system, information processing method, and non-transitory storage medium

An information processing apparatus including a control unit configured to perform obtaining result data indicating a result of locking and unlocking performed by a locking and unlocking device that performs locking and unlocking based on authentication information obtained from a portable terminal carried by a user, and generating, based on the result data, proposal data including a proposal for a service to be provided to the user.

Network device and medical system for the detection of at least one network problem

A network device (100) detects a network problem in a medical system (105). A reception module (110) receives current medical system process data. A monitoring module (120) detects predefined events (124) based on the process data and triggers a detection signal (132) output in the presence of a predefined event. A sending module (130) sends the detection signal to a predefined device address (134) via a network (140). The predefined events include: a predefined plurality of unsuccessful password entry attempts within a predefined first time period; an unsuccessful encryption within an encryption protocol framework; a predefined plurality of outputs via the network triggered via the network within a predefined second time period; an output of a signal, which is to be carried out, has been unsuccessful; and a predefined number of messages have been received within the framework of a service discovery within a predefined third time period.