Patent classifications
H04W12/068
Method and device for authenticating a user
A method and a device for authenticating a user. A signal representative of at least one character traced by the user on a surface of a transmitter device is received by the authentication device. The transmitter device includes an antenna able to transmit a radio signal to a terminal of the user via a channel using the electromagnetic wave conduction capabilities of the body of the user when the hand of the user traces the at least one character on or close to the surface of the transmitter device. The authentication device checks whether the received signal corresponds to a previously stored control signal and, in the event of a positive check, confirms authentication of the user.
Applying network policies on a per-user basis
In one example, an Access Point (AP) configures a first mapping of a first cellular network connection to a first local access network group, and further configures a second mapping of a second cellular network connection to a second local access network group. The AP determines whether a user device is authorized to use the first cellular network connection or the second cellular network connection. If the user device is authorized to use the first cellular network connection, the AP associates, for the user device, a first user device identifier with the first local access network group. If the user device is authorized to use the second cellular network connection, the AP associates, for the user device, a second user device identifier with the second local access network group.
ELECTRONIC DEVICE, WEARABLE DEVICE, AND METHOD FOR CONTROLLING SCREEN OF ELECTRONIC DEVICE
A method for controlling a screen in an electronic device is provided. The method includes receiving, from a first external device, rotation input information entered by rotation of a rotation input device included in the first external device, and controlling an object displayed on a display based on the received rotation input information.
SYSTEM AND METHOD FOR USING A BIOMETRIC PAYMENT DEVICE
Systems and methods are described related to using flexible circuity in a payment device. In one embodiment, a payment device comprises a computing device and a memory. The computing device is configured to store a biometric identifier associated with a transaction account. The computing device is configured to at least receive, by the antenna, an interrogation signal from a point of sale (POS) device in order to activate the payment device for a payment transaction. The computing device is configured to determine a scanned fingerprint identifier of a user based at least in part on the interrogation signal activating the payment device and authenticate the scanned fingerprint identifier by matching the scanned fingerprint identifier to the biometric identifier. The transaction account is transmitted to the POS device for processing the payment transaction based at least in part on the authentication of the scanned fingerprint identifier.
MOBILE KEY ENROLLMENT AND USE
A computer system performs techniques related to enrolling and using a secure credential. In some embodiments, a computer system provides user interfaces for enrolling a secure credential on the computer system. In some embodiments, a computer system provides user interfaces for inviting a user account to use a secure credential.
INFORMATION PROCESSING SYSTEM, WIRELESS TERMINAL, AND INFORMATION PROCESSING METHOD
An information processing system including a video device for displaying a video and a wireless terminal for communicating with the video device and communicating with other apparatuses via a network, wherein the video device transmits video information captured by a camera and sound information collected by a microphone when reception from the wireless terminal of information pertaining to a video to be displayed is detected, and outputs the received sound information using a speaker. The wireless terminal transmits information pertaining to the video to be displayed to the video device, the other apparatuses receive the captured video information and collected sound information via the network, and transmit information pertaining to the video to be displayed and information pertaining to the sound to be outputted.
NETWORK CONFIGURATION AND MANAGEMENT
An Internet-connected device, such as a car, refrigerator, or even a laptop can use a second device, such as a cell phone, to support cryptographic operations and communication with token service providers or other processing services requiring pre-provisioned capabilities that may include cryptographic secrets. By removing the need to store personally sensitive data in “Internet of Things” (IoT) devices, a user's personal information and other sensitive financial information may be contained to a relatively small number of devices. This may help prevent theft of goods or services by IoT devices that are not always under the close control of the user.
DIGITAL CREDENTIAL REVOCATION
A device implementing a digital credential revocation system includes at least one processor configured to maintain a valid digital credential list, a revocation list, and a synchronization counter value. The at least one processor is configured to transmit a request to synchronize the valid digital credential list with an electronic device, the request including the valid digital credential list and the revocation list. The at least one processor is further configured to, in response to receipt of an updated valid digital credential list from the electronic device: clear the revocation list, replace the valid digital credential list with the updated valid digital credential list, and increment the synchronization counter value, and fulfill a received credential maintenance request when the received credential maintenance request comprises an other synchronization counter value that is greater than or equal to the incremented synchronization counter value, otherwise deny the received credential maintenance request.
WIRELESS ACCESS CREDENTIAL SYSTEM
An access control system and methods according to at least one embodiment leverage wireless access credentials to allow a user to securely gain access to a secured area using his or her mobile device. As such, a credentialed mobile device may permit access to the secured area without requiring a real-time connection to a credential management system and/or an administrative system.
Wearable identity device for fingerprint bound access to a cloud service
A personal digital ID device provides a digital identifier to a service for a predetermined duration in response to user interaction. The user interaction may include a button press. The personal digital ID device may be in the form of a bracelet, a key fob, or other form factor. The service may be provided by a mobile device, in the cloud, or elsewhere.