Patent classifications
H04W12/33
System for impetus resource distribution process confirmation with wearable device integration
Embodiments of the invention are directed to a system, method, or computer program product for integration with a wearable device for impetus resource distribution process confirmation and authentication. In this way, the invention coordinates with a wearable device and resource distribution vehicles of a user. Upon activation of a resource distribution vehicle, the system reviews metrics from the wearable device to identify discrepancies between the real-time metrics and a baseline for the user. The invention triggers tiered confirmation requests for authentication prior to allowing processing of the resource distribution for impetus distribution prevention.
System, Device and Method for Multi-Device Authentication
One example discloses a resource management device, including: an input interface configured to receive a first set of sensor readings corresponding to a user and a second set of sensor readings corresponding to a set of resources; a controller configured to match the user, based on the first set of sensor readings, to a specific resource within the set of resources, based on the second set of sensor readings; wherein the controller is configured to authenticate that the first set of sensor readings originated from the user before the match.
Band for performing an interactive activity
System, methods, and other embodiments described herein relate to performing an interactive activity using a band. In one embodiment, a method includes touching a subset of virtual inputs, on a touch sensor associated with a first band, relating to an interactive activity with a second band. The method may also include communicating, by the first band, first data to a first mobile device, the first data including information that identifies completion of the interactive activity and indicates a time that the subset are touched. The method may also include the first band triggering the first mobile device to communicate second data to a second mobile device to replicate the interactive activity.
Securely executing voice actions with speaker identification and authorization code
In some implementations, (i) audio data representing a voice command spoken by a speaker and (ii) a speaker identification result indicating that the voice command was spoken by the speaker are obtained. A voice action is selected based at least on a transcription of the audio data. A service provider corresponding to the selected voice action is selected from among a plurality of different service providers. One or more input data types that the selected service provider uses to perform authentication for the selected voice action are identified. A request to perform the selected voice action and (i) one or more values that correspond to the identified one or more input data types are provided to the service provider.
Mounting base for a wirelessly locatable tag
A mounting base for use with a wirelessly locatable tag may include a base portion defining a latching member configured to engage a wirelessly locatable tag to releasably retain the wirelessly locatable tag to the mounting base, a contact block attached to the base portion and configured to be positioned at least partially within a battery cavity of the wirelessly locatable tag, the contact block defining a top side and a peripheral side. The mounting base may further include a first conductive member positioned along the peripheral side of the contact block and configured to contact a first battery contact in the battery cavity of the wirelessly locatable tag, a second conductive member outwardly biased from the top side of the contact block, the second conductive member configured to contact a second battery contact in the battery cavity of the tag, and a power cable coupled to the base portion.
Wearable misplacement
An access control system is described in which a primary credential device has a master key and a secondary credential device has a key derived from the master key. Both the master key and the derivative key are required to gain access to the resource protected by the access control system. If the secondary credential device is lost, misplaced, or stolen, it cannot be used to gain illicit access to the protected resource, and it can be easily replaced by providing a different secondary credential device with another key derived from the master key.
Wearable misplacement
An access control system is described in which a primary credential device has a master key and a secondary credential device has a key derived from the master key. Both the master key and the derivative key are required to gain access to the resource protected by the access control system. If the secondary credential device is lost, misplaced, or stolen, it cannot be used to gain illicit access to the protected resource, and it can be easily replaced by providing a different secondary credential device with another key derived from the master key.
User activity-related monitoring system and method, and a user access authorization system and method employing same
Described are various embodiments of a user activity-related monitoring system and method, and a user access authorization system and method employing same. In one embodiment, a system is provided for authenticating a user authorised to perform a designated activity in a designated environment. The system comprises a wireless digital user authentication device (UAD) operable to: wirelessly establish an authenticated access session at an access point within the designated environment for performing the designated activity; and acquire activity-related data during performance of the designated activity. The system further comprises a digital application operatively associated with the wireless digital UAD and operable to: digitally compare and evaluate compliance of the activity-related data with a digital authenticated activity template within a designated tolerance.
Security mechanism for wireless authentication devices
Location-based validation of a wireless authentication device. A request is received by a security hardware computing device for an action requiring authentication in connection with security hardware. A security hardware location is received or accessed. A wireless authentication device location of a wireless authentication device in possession of a requester is received by security hardware computing device. The security hardware computing device receives a mobile device location for a mobile device in possession of the requester. The security hardware computing device determines whether the security hardware location, the mobile device location, and the wireless authentication device location are in a proximity. The security hardware computing device performs the action requiring authentication in connection with the security hardware.
METHOD AND SYSTEM FOR PROVIDING AN ELECTRONIC CREDENTIAL ASSOCIATED WITH ELECTRONIC IDENTIFICATION INFORMATION
The present disclosure relates to a system for providing an electronic credential associated with electronic identification information of a user. The system comprises one or more electronic sensor devices configured to monitor an activity or a surrounding of the user and to generate user-specific sensor data, processing circuitry configured to analyze the user-specific sensor data to extract characteristic data associated with the user, and to generate a sensed electronic credential confirming the extracted characteristic data; and a memory configured to store the sensed electronic credential as part of the user's electronic identification information.