Patent classifications
H04W12/068
Password protection with independent virtual keyboard
A virtual keyboard rendered on a separate computing device is independent of the user's computer. A virtual keyboard displayed on the user's computer screen is blank without any alphanumeric characters. Another virtual keyboard displayed on the user's independent computing device has a randomly generated layout of alphanumeric characters on a keypad. The user enters a password by pressing the blank keys of the blank keyboard on his computer screen with reference to the other virtual keyboard. The position sequence of these entered keys is sent to an application on a remote server computer. The remote server computer shares a virtual keyboard having the randomly generated layout of characters with the independent computing device via an online or off-line technique. When online, an encoded image of the encrypted layout is sent to the client computer and displayed for scanning by the device. When off-line, both the application and the device generate the same random key sequence by using the same pseudo random number generator and the same seed value.
Methods, apparatuses, and systems for dynamically managing assets
Apparatuses, methods and systems for unlocking a tracking apparatus that is affixed to an asset are disclosed herein. In one example, a method of unlocking a tracking apparatus that is affixed to an asset is provided. The tracking apparatus may comprise an electronic tag electronically coupled to a securing component comprising an actuating element. The method may comprise: receiving asset information associated with the tracking apparatus; generating and storing a secure machine-readable code in conjunction with the asset information; in response to receiving a request to unlock the tracking apparatus, determining whether a received input corresponds with the stored secure machine-readable code; and providing an indication to cause an electronic reader in electronic communication with the tracking apparatus to trigger deactivating the actuating element.
EMBEDDED AUTHENTICATION SYSTEMS IN AN ELECTRONIC DEVICE
This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile).
DATA PACKET GENERATOR FOR GENERATING PASSCODES
A data packet generator periodically generates a data packet including a passcode comprising a plurality of characters. The data packet is sent to a server or a computing device for validation. If validated, the data packet is used, for example, to identify the location of a user or device. Additional systems and methods involving such a data packet generator are also disclosed.
RESTRICTED ACCESS PROCEDURE
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may transmit a registration request for restricted access (RA), wherein the registration request selectively includes an onboarding access request. The UE may selectively communicate with an onboarding network to authenticate and authorize a particular network based at least in part on whether the registration request includes the onboarding access request. The UE may complete the RA registration after transmitting the registration request and based at least in part on selectively communicating with the onboarding network to authenticate and authorize the particular network. Numerous other aspects are described.
Wi-fi connection method and device
A Wi-Fi connection method and a device is provided. The method includes: searching an ambient environment of a device for a Wi-Fi access point, to obtain a list of Wi-Fi access points; determining a target access point in the list of Wi-Fi access points; sending a connection request to a device in which the target access point resides; receiving feedback information that is returned, according to the connection request, by the device in which the target access point resides, where the feedback information indicates whether the target access point is a portable Wi-Fi hotspot; and if the feedback information indicates that the target access point is a portable Wi-Fi hotspot, outputting prompt information, where the prompt information is used to remind a user of the device that the target access point is a portable Wi-Fi hotspot.
Managing permissions for different wireless devices to control a common host device
Disclosed herein is a technique for managing permissions associated with the control of a host device that are provided to a group of wireless devices. The host device is configured to pair with a first wireless device. In response to pairing with the first wireless device, the host device grants a first level of permissions for controlling the host device to the first wireless device. Subsequently, the host device can receive a second request from a second wireless device to pair with the host device. In response to pairing with the second wireless device, the host device can grant a second level of permissions for controlling the host device to second wireless device, where the second level of permissions is distinct from the first level of permissions.
Virtual credential authentication based on browsing context
In some implementations, an authentication device may receive information related to website browsing activity at a client device. The information related to the website browsing activity may include information associated with a web address for a current website where information associated with a virtual credential was entered. The authentication device may identify one or more valid web addresses associated with the virtual credential, which may be valid only for an entity associated with the one or more valid web addresses. The authentication device may transmit, to the client device, information to indicate whether the website browsing activity is authenticated based on a comparison of the web address for the current website where the information associated with the virtual credential was entered and the one or more valid web addresses associated with the virtual credential.
MECHANISM TO DELIVER SMS MEANT FOR USER'S PUBLIC OR PRIVATE 5G IDENTITY OVER WLAN NETWORK
Systems, methods, and computer-readable media are provided for delivering 5G SMS messages over an enterprise wireless local area network (WLAN). An example method can include associating, by an enterprise WLAN, a client device with the enterprise WLAN by assigning an enterprise WLAN identity to the client device, authenticating, by the enterprise WLAN, the client device, and generating, by the enterprise WLAN, a subscription policy for the client device. The client device can be subscribed to a 5G network. The subscription policy can specify how to route to the client device from the 5G network through the enterprise WLAN.
SYSTEMS AND METHODS FOR MANAGING CRYPTOCURRENCY
A system for managing and using digital financial assets, such as cryptocurrency uses multiple independent devices that mutually cooperate to control cryptocurrency assets in a secure manner. Each of these devices may store a unique private key associated with the cryptocurrency assets, which may be configured such that a certain minimum number of these private keys are required to transfer the cryptocurrency assets. The use of multiple private keys spread across multiple distinct devices may reduce the likelihood of loss stemming from a hardware failure or reduce the likelihood of an attacker successfully gaining access to the cryptocurrency assets. In addition, selection of the devices to be used for storing these private keys, as well as how many private keys are required to authorize a transaction, may be tailored to balance a user's preferences for reliability of access versus security and for third-party custody versus self-custody.