Patent classifications
H04W12/068
Access controlling network architectures utilizing cellular signaled access control to restricted services with expected keys in accordance with novel communications protocols, and methods for use thereof
In some embodiments, the present disclosure provides an access controlling network architecture may include: a processor in communication with a non-transitory computer readable medium storing application program instructions that when executed, cause the processor to: generate an expected access control digital key for authenticating a computing device that is operationally linked to access-restricted digital resource for accessing; record the expected access control digital key in a computer memory associated with the access controlling platform; cause to display the expected access control digital key at the computing device; receive a mobile originating communication, having: a particular access control digital key and an identity linked to the computing device; perform a confirmation of the particular access control digital key with the expected access control digital key; transmit, when the confirmation is successful, an access authentication indicator; configured to cause to unlock the at least one access-restricted digital resource for accessing.
Systems, Methods and Computer Program Products for Asynchronous Authentication of Digital Wallet Based Payment Transactions
The invention provides systems, methods and computer program products for asynchronous authentication of digital wallet based payment transactions. The invention enables secure authentication of contactless payment card based payment transactions that have been implemented through contactless communication between a payor device and a payment terminal device using near-field-communication. In various embodiments, the invention provides methods, systems, servers, and computer program products for authentication of a contactless communication protocol based digital wallet payment transaction, as substantially described herein.
Authenticating a customer to a risk level using an authorization token
Disclosed herein are system, method, and computer program product embodiments for authenticating a mobile user via an authentication method determined based on a token level associated with the action being completed. An authentication token is created corresponding to the token level and the authentication token is sent to the mobile device. This authentication token may be used to authenticate subsequent actions and engage various services to complete the actions using application programming interfaces. The authentication token stored on the mobile device obviates the need for a user to authenticate multiple times to complete actions requiring a similar token level. The system may authenticate the identity of the mobile user using various authentication methods.
Determination of weak hashed credentials
According to examples, an apparatus may include a processor and a non-transitory computer readable medium on which is stored machine readable instructions that may cause the processor to access a hashed credential associated with a user or a device, access hashed versions of a plurality of commonly used credentials, determine whether the hashed credential matches a hashed version of a commonly used credential of the plurality of commonly used credentials, and based on a determination that the hashed credential matches a hashed version of a commonly used credential, perform at least one of a reporting or a blocking operation.
PASSWORD-LESS WIRELESS AUTHENTICATION
First, a plurality of access tokens may be received from a respective plurality of identity provider services. Each of the plurality of access tokens may be associated with a user. Then, the plurality of access tokens may be stored in a profile associated with the user. Next, user polices associated with the use of the plurality of access tokens may be assigned. A device token may then be provided to a user device associated with the user. The device token may be associated with the profile. The device token and network policies may be received and then it may be determined that the user polices and the network policies are congruent. In response to determining that the user polices and the network policies are congruent, authentication to at least one of the plurality identity provider services may be made.
COMMUNICATION SYSTEM, APPARATUS, METHOD FOR CONTROLLING APPARATUS, AND METHOD FOR MANUFACTURING MOBILE DEVICE
A communication system includes a mobile device and an apparatus. The apparatus obtains unique data from the mobile device by using a common key while the common key is stored in the mobile device, generates a unique key by using the obtained unique data, stores the generated unique key as a service key in the apparatus, and transmits the generated unique key to the mobile device. When the mobile device receives the unique key from the apparatus while the common key is stored in the mobile device, the mobile device rewrites a service key stored in the mobile device from the common key to the unique key.
Security Of Wi-Fi Protected Setup Procedure
Solutions pertaining to improvement in the security of a Wi-Fi Protected Setup (WPS) procedure are proposed. An access point (AP) determines that a WPS procedure is activated. In response, the AP varies a transmission (Tx) power in transmitting one or more WPS management frames during the WPS procedure. Moreover, the AP configures one or more credentials to a station (STA) in response to receiving one or more management frames from the STA.
SYSTEM AND METHOD FOR APP DISCOVERY, INSTALLATION, AND USAGE
A system and method functions to make an app as installed on a smart device usable to access a service, such as a media streaming service. A presence of a counterpart to the app as installed on an appliance within a home network which includes the smart device is detected. A user credential, such as a username and password combination, that is associated with the counterpart to the app is then identified. The user credential is caused to be automatically associated with the app as installed on the smart device.
Home appliance, network connection system for home appliance and network connection method of home appliance
Disclosed herein is a method of connection of home appliance to a network, a network-connection system for home appliances, and an apparatus related to a network-connection setting for home appliances. The network connection method of home appliance includes operations in which a terminal device receives an input of an authentication key of an access point (AP) apparatus and the terminal device or the AP apparatus verifies and authenticates the authentication key; a home appliance is set to be in a state of communicating with the terminal device; the home appliance is interconnected to the terminal device and the terminal device transmits an identification number and the certificated authentication key of the AP apparatus to the home appliance; and the home appliance is connected to the AP apparatus based on the identification number and the authentication key of the AP apparatus.
Operating system with automatic login mechanism and automatic login method
An operating system with automatic login mechanism and an automatic login method are provided. The operating system includes a first electronic device, a second electronic device and a server device. The second electronic device includes a biometric sensor. When a login event of the first electronic is triggered, the first electronic device sends a login request to the second electronic device directly or via the server device, so that the second electronic device performs a biometric verification by the biometric sensor according to the login request. When the biometric verification is passed, the second electronic device sends a first login credential to the first electronic device directly or via the server device, so that the first electronic device performs an automatic login operation of the first electronic device according to the first login credential.