Patent classifications
H04W12/65
User authentication over an audio channel using a mobile device
A system is described for authenticating a user on a client device using the user's mobile device and utilizing the audio channel. An authentication server receives a request from the client to initiate a session for the user, creates the session, and sends a session token back to the client along with a request for authentication. The client broadcasts an audio transmission containing the token to the mobile device over an audio channel using data-over-sound transmission. The mobile device receives the transmission via a microphone, obtains the token and the server identity from the transmission, and sends user credentials that are stored on the mobile device along with the token identifying the session directly to the authentication server. The server verifies the received credentials, confirms the token, and logs the user into the session.
Mobile phone authentication method using implicit authentication
Provided is a mobile phone authentication method using implicit authentication, the method including the steps of: by a server, receiving behavior data and environment information data from a user terminal when a user checks an authentication number for authentication of a mobile phone user; by the server, detecting a start point of a behavior of the user for checking the authentication number by performing peak detection in the received behavior data, and storing behavior data from the detected start point; and by the server, extracting feature data from the received environment information data and learning the extracted feature data to build a learning model.
Mobile phone authentication method using implicit authentication
Provided is a mobile phone authentication method using implicit authentication, the method including the steps of: by a server, receiving behavior data and environment information data from a user terminal when a user checks an authentication number for authentication of a mobile phone user; by the server, detecting a start point of a behavior of the user for checking the authentication number by performing peak detection in the received behavior data, and storing behavior data from the detected start point; and by the server, extracting feature data from the received environment information data and learning the extracted feature data to build a learning model.
Authentication based on user interaction with images or objects
An authentication system includes an authenticator that receives an authentication request from a device and receives sensor data from one or more sensors, the sensor data being indicative of interaction with one or more real world objects or with a displayed authentication image. The authenticator determines that the sensor data is indicative of an authorized interaction with the one or more real world objects or with the displayed authentication image and, in response to the determination, grants the authentication request.
Authentication based on user interaction with images or objects
An authentication system includes an authenticator that receives an authentication request from a device and receives sensor data from one or more sensors, the sensor data being indicative of interaction with one or more real world objects or with a displayed authentication image. The authenticator determines that the sensor data is indicative of an authorized interaction with the one or more real world objects or with the displayed authentication image and, in response to the determination, grants the authentication request.
System and method for dynamic multifactor authentication
A method of authenticating a user. The method comprises the step of sending an authentication request to a remote authentication device and generating a first piece of authentication information. A mobile device receives the first piece of authentication information from either an access terminal or the remote authentication device. The mobile device of the user generating a second piece of authentication information which is at least partially based on the received first piece of authentication information. The second piece of authentication information is sent to the remote authentication devices and the second piece of authentication information validated. If the second piece of authentication information is successfully validated an authentication signal is generated.
Navigation System
Location may be determined in a way that does not primarily rely on jam-able or spoof-able techniques. For example, an apparatus may have multiple location-determining units, each unit having a different level of trust. One unit may have a first (e.g., highest) level of trust, a second such unit may have a second (e.g., medium) level of trust lower than the first level of trust, and a third such unit may have a third (e.g., lowest) level of trust lower than the first and second levels of trust. The apparatus may generally prefer to determine its location using the highest level of trust unit that is available at any given time.
Notification Prompt Method, Server, and Storage Medium
This application provides a notification prompt method, a server, and a storage medium. The method includes: when a notification is received, determining a target terminal that meets a preset notification prompt condition from terminal devices on which an account of a target user is logged in; obtaining identity information of a user currently using the target terminal; and when detecting, based on the identity information, that only the target user is currently using the target terminal, controlling the target terminal to prompt the notification in a first prompt mode, where preview content of the notification is displayed in the first prompt mode; or when detecting, based on the identity information, that a plurality of users are currently using the target terminal, controlling the target terminal to prompt the notification in a second prompt mode, where preview content of the notification is not displayed in the second prompt mode.
Transferring application data between devices
Methods, systems, and apparatus are described for transferring application data. In one aspect, a method includes causing, by a first component on a first device to establish a wireless connection with a second device; receiving, from a second component on the second device, data specifying one or more applications that are installed on the second device and supported by the second component, each of the applications being separate from the second component; determining, by the first component, that a first application installed on the first device matches one of the applications installed on the second device, the first application being separate from the first component; receiving, by the first component, first application data from the first application; and causing, by the first component, the first device to send the first application data to the second component running on the second device using the wireless connection.
Wearer identification based on personalized acoustic transfer functions
A wearable device includes an audio system. In one embodiment, the audio system includes a sensor array that includes a plurality of acoustic sensors. When a user wears the wearable device, the audio system determines an acoustic transfer function for the user based upon detected sounds within a local area surrounding the sensor array. Because the acoustic transfer function is based upon the size, shape, and density of the user's body (e.g., the user's head), different acoustic transfer functions will be determined for different users. The determined acoustic transfer functions are compared with stored acoustic transfer functions of known users in order to authenticate the user of the wearable device.