Patent classifications
H04W12/084
System and method for access control using network verification
A system for controlling access includes a computing device, configured to: determine a first identifier associated with a first access point being used by the computing device to access a network; determine first access control data associated with the first identifier and a first application executing on the computing device; and control access to data over the network by the first application based on the first access control data.
System and method for access control using network verification
A system for controlling access includes a computing device, configured to: determine a first identifier associated with a first access point being used by the computing device to access a network; determine first access control data associated with the first identifier and a first application executing on the computing device; and control access to data over the network by the first application based on the first access control data.
Accessing client credential sets using a key
Techniques are disclosed relating to a computer system accessing a client credential set to authenticate with a destination computer system. A computer system may, subsequent to receiving an indication to make available an application for a particular user, retrieve configuration data specifying a reference to a key value. The computer system may maintain a data object that includes a client credential set for the particular user. In response to an occurrence of an event associated with the application, the computer system may access the client credential set of the particular user from the data object using the key value and an indication of the particular user. The computer system may then send a request including the client credential set to a destination computer system for authentication with the destination computer system and receive a response indicating whether the computer system has been authenticated.
Accessing client credential sets using a key
Techniques are disclosed relating to a computer system accessing a client credential set to authenticate with a destination computer system. A computer system may, subsequent to receiving an indication to make available an application for a particular user, retrieve configuration data specifying a reference to a key value. The computer system may maintain a data object that includes a client credential set for the particular user. In response to an occurrence of an event associated with the application, the computer system may access the client credential set of the particular user from the data object using the key value and an indication of the particular user. The computer system may then send a request including the client credential set to a destination computer system for authentication with the destination computer system and receive a response indicating whether the computer system has been authenticated.
Electronic devices, methods, and systems for temporarily precluding sharing of media content to protect user privacy
An electronic device includes one or more sensors capturing media content while the electronic device is situated at a media content capture location. A user interface receives user input requesting transmission of the media content to another electronic device at a user input reception location. A location detector determines whether the media content capture location and the user input reception location are substantially different locations. One or more processors at least temporarily preclude, in response to the user input, the transmission of the media content to the other electronic device when the location detector determines that the media content capture location and the user input reception location are substantially different locations.
UNIVERSAL CREDENTIAL
A method for leveraging a universal credential in an access control system according to one embodiment includes generating, by a cloud system, a CBOR web token for user access to at least one electronic lock, wherein the CBOR web token includes a group tag associated with a set of access rights for a group of users and a cryptographic signature, transmitting the CBOR web token to a user mobile device, receiving, by a first electronic lock, the CBOR web token from the user mobile device for access to a passageway secured by the first electronic lock, verifying an authenticity of the cryptographic signature of the CBOR web token and that the group tag of the CBOR web token is associated with a group authorized to access the passageway secured by the first electronic lock, and unlocking a lock mechanism in response to the verifications.
Systems and methods for responsive data transfer and anonymizing data using tokenizing and encrypting
Described herein are systems and methods for securely obtaining payment information from a recipient on a payer's mobile device within an application on the payer's mobile device. The securely obtained information can be decrypted in the application, and the recipient information can be extracted. The extracted recipient information can be validated and used by the application to initiate a fund transfer to the recipient's account from the payer's account. The application can include a user interface that can allow the payer to anonymize the payment, securing the privacy of the payer.
Authentication service
Disclosed are various approaches for relaying and caching authentication credentials. A single sign-on (SSO) token is received, the SSO token representing a user account authenticated with an identity manager. An authentication request is then sent to a service that is federated with the identity manager in response to receipt of the SSO token, the authentication request including the SSO token. An access token is received in response to the authentication request, the access token providing access to the service for the user account authenticated with the identity manager for a predefined period of time. The access token and a link between the access token and the SSO token are then cached.
Updating settings of a wireless device by exchanging authentication and configuration information via an inductive coupling link
A method and a system are provided for updating settings of a wireless device. An inductive coupling link is established between a first wireless device and a second wireless device upon detection that the first wireless device is within a threshold proximity to the second wireless device. The second wireless device receives a token from the first wireless device via the inductive coupling link. The second wireless device forwards the token to a remote device that stores a user profile associated with the user of the first wireless device. The second wireless device receives at least a portion of the user profile from the remote device in response to the token being forwarded. The second wireless device performs an update procedure to update one or more settings of the second wireless device in accordance with the received at least the portion of the user profile.
Network services in a mesh network
A method including receiving, by a first device from a second device in a mesh network, an access request from the second device to access a network service available to the first device, the request being received via a meshnet connection between the first device and the second device; and transmitting, by the first device to the second device, access information associated with accessing the network service based at least in part on receiving the access request, the access information being transmitted via the meshnet connection. Various other aspects are contemplated.