Patent classifications
H04W12/47
Secure password generation and management using NFC and contactless smart cards
Various embodiments are directed to securely generating and managing passwords using a near-field communication (NFC) enabled contactless smart card. For example, a secure password may be generated by generating a random number via a random number generator of the contactless smart card and converting the random number to one or more human-readable characters. In another example, a secure cryptographic hash function of the contactless smart card may generate a hash output value, which may be converted to one or more human-readable characters. The human-readable characters may be used as the secure password or it may be transformed to add more layers of security and complexity.
System and method for smart card based hardware root of trust on mobile platforms using near field communications
The exemplary embodiments described herein relate to systems and methods for identifying and authenticating a mobile platform. One embodiment relates to a method comprising receiving, by a mobile platform, a digital certificate from an integrated circuit card (“ICC”) via close-proximity radio communication, verifying the digital certificate with a digital signature stored on the mobile platform, and booting the mobile platform upon verification of the digital certificate of the ICC. A further embodiment relates to a mobile platform, comprising a non-transitory computer readable storage medium storing a digital signature, and a processor receiving a digital certificate from an integrated circuit card (“ICC”) via close-proximity radio communication between the ICC and the mobile platform, verifying the digital certificate with the digital signature, booting the mobile platform upon verification of the digital certificate of the ICC.
System and method for smart card based hardware root of trust on mobile platforms using near field communications
The exemplary embodiments described herein relate to systems and methods for identifying and authenticating a mobile platform. One embodiment relates to a method comprising receiving, by a mobile platform, a digital certificate from an integrated circuit card (“ICC”) via close-proximity radio communication, verifying the digital certificate with a digital signature stored on the mobile platform, and booting the mobile platform upon verification of the digital certificate of the ICC. A further embodiment relates to a mobile platform, comprising a non-transitory computer readable storage medium storing a digital signature, and a processor receiving a digital certificate from an integrated circuit card (“ICC”) via close-proximity radio communication between the ICC and the mobile platform, verifying the digital certificate with the digital signature, booting the mobile platform upon verification of the digital certificate of the ICC.
User device using NFC, authentication system and operation method thereof
An operation method of a user device which performs near field communication (NFC) with a card reader includes downloading a service certification of a service, which the card reader provides, from a service authentication server through a network, sending status information of the user device to the card reader, receiving a service identifier (ID) which the card reader sends depending on the status information, performing an authentication process with the card reader based on a symmetric key when the service ID is present in the downloaded service certification, and sending an authentication success message to the card reader when the authentication process succeeds.
SYSTEMS AND METHODS FOR SCALABLE CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS
Systems and methods for authentication may include an authentication server. The authentication server may include a processor and a memory. The processor may be configured to transmit an authentication request. The processor may be configured to receive a first response that is responsive to the authentication request, the first response comprising a first cryptogram. The processor may be configured to generate a first challenge based on the first response. The processor may be configured to encrypt the first challenge with a symmetric key. The processor may be configured to transmit the first challenge receive a second response that is responsive to the first challenge, the second response comprising a second cryptogram. The processor may be configured to authenticate the second response.
Forensic video recording with presence detection
At a high level, embodiments of the invention relate to augmenting video data with presence data derived from one or more proximity tags. More specifically, embodiments of the invention generate forensically authenticated recordings linking video imagery to the presence of specific objects in or near the recording. One embodiment of the invention includes video recording system comprising a camera, a wireless proximity tag reader, a storage memory and control circuitry operable to receive image data from the camera receive a proximity tag identifier identifying a proximity tag from the proximity tag reader, and store an encoded frame containing the image data and the proximity tag identity in the storage memory.
Forensic video recording with presence detection
At a high level, embodiments of the invention relate to augmenting video data with presence data derived from one or more proximity tags. More specifically, embodiments of the invention generate forensically authenticated recordings linking video imagery to the presence of specific objects in or near the recording. One embodiment of the invention includes video recording system comprising a camera, a wireless proximity tag reader, a storage memory and control circuitry operable to receive image data from the camera receive a proximity tag identifier identifying a proximity tag from the proximity tag reader, and store an encoded frame containing the image data and the proximity tag identity in the storage memory.
SECURE EDGE DEVICE FOR CONTACTLESS VEHICLE PROCESSING
Embodiments of the present invention provide a secure edge device for contactless resource distribution and resource crediting from an automobile. In this way, the edge device may be affixed to or embedded within the side or the mirror of an automobile and be able to communicate with a third party device using near field communication. Upon authentication of a user, the edge device may communicate with the third party to transmit and present data about the resource distribution to the automobile display. The system allows for the user to select the resource distribution via the automobile display and provide a completion of resource distributions.
CONTROLLING METHOD OF A MEMORY CARD
According to one embodiment, a memory system includes a nonvolatile semiconductor memory device, controller, memory, wireless communication function section, and extension register. The controller controls the nonvolatile semiconductor memory device. The memory is serving as a work area of the controller. The wireless communication module has a wireless communication function. The extension register is provided in the memory. The controller processes a first command to read data from the extension register, and a second command to write data to the extension register. The extension register records, an information specifying the type of the wireless communication function in a specific page, and an address information indicating a region on the extension register to which the wireless communication function is assigned.
Devices, systems, and methods for secure and adaptable transportation of goods and/or persons
A method includes receiving, by a first device of a transportation provider, a device ID of a particular device of a user and purchase information regarding a purchase, by the user, of one or more goods or services. The method includes sending, by the first device, the device ID of the particular user device to a central server. The method includes receiving, by the first device from the central server, information regarding the particular user device. The method includes determining, by the first device, a selected transportation vehicle based on the purchase information and the information regarding the particular user device. The method includes sending, by the first device, a vehicle ID of the selected transportation vehicle to the central server. The method includes providing a transportation service to the user using the particular user device and the selected transportation vehicle.