Patent classifications
H04W12/63
OCCUPANT-DEPENDENT SETTING SYSTEM FOR VEHICLE, AND VEHICLE
An occupant-dependent setting system for a vehicle includes a setting processor, a server apparatus including a server memory, and first and second authentication processors. On the condition that the occupant is authenticated by the first authentication processor, the second authentication processor acquires, from the vehicle, data regarding the occupant and data regarding the vehicle, and authenticates a combination of the occupant and the vehicle. On the condition that the combination of the occupant and the vehicle is unauthenticatable by the data regarding the occupant and the data regarding the vehicle, the second authentication processor authenticates the combination of the occupant and the vehicle, by a combination of account data regarding the occupant and the vehicle. The account data is held by an occupant terminal of the occupant on board the vehicle to make access to the server apparatus.
APPARATUS AND METHODS FOR MULTIFACTOR AUTHENTICATION
Apparatus and methods for multifactor authentication using a smart mobile device are provided. The apparatus and methods may include an authentication engine on a server, a smart mobile device belonging to a user and a smartphone belonging to a user. The authentication engine may determine a location of the user, the user's smartphone, and the user's smart mobile device. When the smart mobile device is within a pre-determined distance to the user or the user's smartphone, the authentication engine may send an authentication request to the smart mobile device, or automatically authenticate the user.
APPARATUS AND METHODS FOR MULTIFACTOR AUTHENTICATION
Apparatus and methods for multifactor authentication using a smart mobile device are provided. The apparatus and methods may include an authentication engine on a server, a smart mobile device belonging to a user and a smartphone belonging to a user. The authentication engine may determine a location of the user, the user's smartphone, and the user's smart mobile device. When the smart mobile device is within a pre-determined distance to the user or the user's smartphone, the authentication engine may send an authentication request to the smart mobile device, or automatically authenticate the user.
SYSTEM FOR DETERMINING NETWORK MEMBERSHIP
Aspects described herein may allow for determining network membership to facilitate detecting fraudulent messages. A computing device may receive, from one or more terminals at a first location, a plurality of interactive messages during a pre-determined time period. Each interactive message may comprise personally identifiable information of a user. The computing device may store a first record and a second record that indicate interactive messages were received from a group of users in temporal proximity to each other at the first location and the second location respectively. The computing device may send a request to confirm users in the subset are members of a network and update a membership list based on a reply received from the user. If further messages are received from devices outside the membership list, an alert may be sent to alert the possibility of a fraudulent message.
SYSTEM FOR DETERMINING NETWORK MEMBERSHIP
Aspects described herein may allow for determining network membership to facilitate detecting fraudulent messages. A computing device may receive, from one or more terminals at a first location, a plurality of interactive messages during a pre-determined time period. Each interactive message may comprise personally identifiable information of a user. The computing device may store a first record and a second record that indicate interactive messages were received from a group of users in temporal proximity to each other at the first location and the second location respectively. The computing device may send a request to confirm users in the subset are members of a network and update a membership list based on a reply received from the user. If further messages are received from devices outside the membership list, an alert may be sent to alert the possibility of a fraudulent message.
Call protect geolocator display for 5G or other next generation network
Call spoofing can be mitigated by providing geolocation information to the called device. For example, when a call rings, a geolocator can be invoked and the incoming call display screen can show a carrier logo and/or a geolocator globe illustrating the location of the call originator. The geolocation session initiation protocol data can be confirmed by a network device and compared against carrier specific data of the calling device to authenticate voice calls for called devices. In one embodiment location data of the calling device can purposely be shared in order to facilitate the mitigation of call spoofing.
Information processing apparatus, information processing system, information processing method, and non-transitory storage medium
An information processing apparatus including a control unit configured to perform obtaining result data indicating a result of locking and unlocking performed by a locking and unlocking device that performs locking and unlocking based on authentication information obtained from a portable terminal carried by a user, and generating, based on the result data, proposal data including a proposal for a service to be provided to the user.
Screen-analysis based device security
Systems and methods are provided for a content-based security for computing devices. An example method includes identifying content rendered by a mobile application, the content being rendered during a session, generating feature vectors from the content and determining that the feature vectors do not match a classification model. The method also includes providing, in response to the determination that the feature vectors do not match the classification model, a challenge configured to authenticate a user of the mobile device. Another example method includes determining a computing device is located at a trusted location, capturing information from a session, the information coming from content rendered by a mobile application during the session, generating feature vectors for the session, and repeating this until a training criteria is met. The method also includes training a classification model using the feature vectors and authenticating a user of the device using the trained classification model.
Protected WiFi sensing measurements
This disclosure provides systems, methods, and apparatuses for wireless communication. In some aspects, An example method includes receiving, from a second wireless communication device, a frame associated with one or more wireless sensing measurements, verifying an integrity of the received frame associated with a message integrity code (MIC) in the received frame, and obtaining one or more wireless sensing measurements associated with the received frame.
Protected WiFi sensing measurements
This disclosure provides systems, methods, and apparatuses for wireless communication. In some aspects, An example method includes receiving, from a second wireless communication device, a frame associated with one or more wireless sensing measurements, verifying an integrity of the received frame associated with a message integrity code (MIC) in the received frame, and obtaining one or more wireless sensing measurements associated with the received frame.