Patent classifications
H04W12/47
Devices, systems, and methods for secure and adaptable transportation of goods and/or persons
A method includes receiving, by a first device of a transportation provider, a device ID of a particular device of a user and purchase information regarding a purchase, by the user, of one or more goods or services. The method includes sending, by the first device, the device ID of the particular user device to a central server. The method includes receiving, by the first device from the central server, information regarding the particular user device. The method includes determining, by the first device, a selected transportation vehicle based on the purchase information and the information regarding the particular user device. The method includes sending, by the first device, a vehicle ID of the selected transportation vehicle to the central server. The method includes providing a transportation service to the user using the particular user device and the selected transportation vehicle.
Sharing system access using a mobile device
Techniques are disclosed relating to using a device to gain access to another system. In some embodiments, a first mobile device performs a pairing operation with a control unit that controls access to a system, the pairing operation including the first mobile device establishing a first cryptographic key with the control unit. The first mobile device receives a request to enable a second mobile device to communicate with the control unit, and in response to receiving the request, the first mobile device generates a second cryptographic key from the first cryptographic key. The first mobile device provides the second cryptographic key to the second mobile device. The second mobile device is configured to send a beacon including a payload encrypted with the second cryptographic key, and the encrypted payload is usable to authenticate the second mobile device to the control unit.
Trustable product delivery with RFID and smart chip
Trustable delivery of a product uses a package with a printed label having a unique product ID, an RFID marker applied to the product that contains the ID, and a smart chip inside the product that contains the ID and a digital key. The ID from the RFID marker is compared to the label for initial validation of the package. The smart chip is further interrogated to generate an encoded value of the ID, such as a hash value, using the digital key. The hash value is then used to authenticate the ID, thereby verifying that the product as delivered is the original, untampered product. The product ID and the hash value are recorded in a blockchain ledger associated with the product. In this manner, the packaged product can be validated by any party in the delivery chain, e.g., manufacturer, seller, distributor, delivery service, and final recipient.
Body temperature sensor module to be attached to skin, comprising intelligent semiconductor
Provided is a body temperature sensor module to be attached to the skin including: a power supply unit electrically connected to a flexible printed circuit board and providing driving power; a temperature sensor mounted on one surface of the flexible printed circuit board and measuring the body temperature of the wearer; a communication module for transmitting information measured by the temperature sensor to an external communication module; a control unit for controlling the driving of the power supply unit, the temperature sensor and the communication module; a protection member for preventing the exposure of the flexible printed circuit board, the power supply unit, the temperature sensor, the communication module and the control unit to the outside; and a membrane layer separably attached to one surface of the protection member, and formed from a nanofiber web having micropores to be able to block moisture and allow the passage of air.
Multi-functional authentication apparatus and operating method for the same
A multi-functional authentication apparatus and an operation method for the same are provided. The multi-functional authentication apparatus integrates multiple communication modules into one device. A biometric authentication procedure is firstly performed when activating this multi-functional authentication apparatus. A security code is generated through a security authentication mechanism provided by this apparatus after reading biometric features. After that, according to a connection protocol, one of the communication modules of the multi-functional authentication apparatus is activated to connect with an external host. The security code is transmitted to the host via the communication module for identifying a user. The multi-functional authentication apparatus acts as an authenticator that allows a user to login to a computer system or obtain a network service after authentication. The multi-functional authentication apparatus also provides authentication for the user to open an access control device or conduct a mobile payment.
Systems, Methods and Computer Program Products for Asynchronous Authentication of Digital Wallet Based Payment Transactions
The invention provides systems, methods and computer program products for asynchronous authentication of digital wallet based payment transactions. The invention enables secure authentication of contactless payment card based payment transactions that have been implemented through contactless communication between a payor device and a payment terminal device using near-field-communication. In various embodiments, the invention provides methods, systems, servers, and computer program products for authentication of a contactless communication protocol based digital wallet payment transaction, as substantially described herein.
User authentication based on RFID-enabled identity document and gesture challenge-response protocol
A method of using a user terminal to provide secure authenticated registration between a user and a third party, the method comprising: reading a chip to receive chip data stored on the chip (S408); transmitting the chip data, via a network interface of the user terminal, over a network to an authentication server associated with said third party (S410) and in response receiving via said network interface a notification message from the authentication server (S412); determining whether the identification document is authentic based on the notification message from the authentication server (S414), wherein in response to determining that the identification document is authentic, the method further comprising: outputting, via at least one output device of the user terminal, an authentication challenge to the user (S418); receiving image data as a response to the authentication challenge (S420); and transmitting the image data, via the network interface, over the network to the authentication server for authenticating the user with the third party (S422).
User authentication based on RFID-enabled identity document and gesture challenge-response protocol
A method of using a user terminal to provide secure authenticated registration between a user and a third party, the method comprising: reading a chip to receive chip data stored on the chip (S408); transmitting the chip data, via a network interface of the user terminal, over a network to an authentication server associated with said third party (S410) and in response receiving via said network interface a notification message from the authentication server (S412); determining whether the identification document is authentic based on the notification message from the authentication server (S414), wherein in response to determining that the identification document is authentic, the method further comprising: outputting, via at least one output device of the user terminal, an authentication challenge to the user (S418); receiving image data as a response to the authentication challenge (S420); and transmitting the image data, via the network interface, over the network to the authentication server for authenticating the user with the third party (S422).
System and method employing virtual ledger
A system, method and computer program product for computer based open innovation, includes an asset valuation device receiving asset information regarding one or more tangible or non-tangible assets, and generating a valuation signal, based on the asset information; a self-executing code device receiving the valuation signal, and generating a self-executing code signal, based on the valuation signal; an air router device having both a low band radio channel, and an internet router channel for redundant internet communications, and a malicious code removal device for scrubbing malicious code from data received, receiving the valuation signal, and generating a node voting request signal, based on the valuation signal; and a mesh network having a plurality of node devices receiving the node voting request signal, and generating vote confirmation signals, based on the node voting request signal.
System and method employing virtual ledger
A system, method and computer program product for computer based open innovation, includes an asset valuation device receiving asset information regarding one or more tangible or non-tangible assets, and generating a valuation signal, based on the asset information; a self-executing code device receiving the valuation signal, and generating a self-executing code signal, based on the valuation signal; an air router device having both a low band radio channel, and an internet router channel for redundant internet communications, and a malicious code removal device for scrubbing malicious code from data received, receiving the valuation signal, and generating a node voting request signal, based on the valuation signal; and a mesh network having a plurality of node devices receiving the node voting request signal, and generating vote confirmation signals, based on the node voting request signal.