H04W12/65

User authentication based on RFID-enabled identity document and gesture challenge-response protocol
11595380 · 2023-02-28 · ·

A method of using a user terminal to provide secure authenticated registration between a user and a third party, the method comprising: reading a chip to receive chip data stored on the chip (S408); transmitting the chip data, via a network interface of the user terminal, over a network to an authentication server associated with said third party (S410) and in response receiving via said network interface a notification message from the authentication server (S412); determining whether the identification document is authentic based on the notification message from the authentication server (S414), wherein in response to determining that the identification document is authentic, the method further comprising: outputting, via at least one output device of the user terminal, an authentication challenge to the user (S418); receiving image data as a response to the authentication challenge (S420); and transmitting the image data, via the network interface, over the network to the authentication server for authenticating the user with the third party (S422).

Sending verification password responsive to mobile device proximity
11509648 · 2022-11-22 · ·

A method includes detecting proximity between a mobile device and a remote device associated with a transaction reserved by a user of the mobile device and a mode of the electronic device. A verification password is sent to the remote device responsive to detecting the proximity and the mode. A device includes a module to detect proximity between the device and a remote device associated with a transaction reserved by a user of the device occurring within a predefined distance threshold and a processor coupled to the module. A device includes another module to detect a stationary mode of the electronic device occurring for at least a predefined duration threshold. The processor is sends a verification password to the remote device responsive to detecting the proximity and the mode.

SYSTEMS AND METHODS FOR COUNTERING SECURITY THREATS IN A PASSIVE KEYLESS ENTRY SYSTEM

System, methods, and other embodiments described herein relate to securing wireless communications for passive keyless entry (PKE) to an asset. In one embodiment, a method includes, responsive to acquiring sensor data about at least a surrounding environment of a vehicle that provides access according to wireless communications with a remote device, analyzing the sensor data to define operating conditions identifying security characteristics of the vehicle and interactions of the remote device with the vehicle. The method includes activating a countermeasure from an available group of countermeasures according to at least the operating conditions. The method includes wirelessly communicating, by the vehicle with the remote device, according to the countermeasure.

Headset for acoustic authentication of a user
11494473 · 2022-11-08 · ·

A headset for acoustic authentication of a user is provided, the headset comprising at least a first microphone, a second microphone, a controllable filter, and an authenticator. The first microphone is arranged to obtain a first input signal. The second microphone is arranged to obtain a second input signal. The controllable filter is configured to receive the first input signal and the second input signal and to determine at least one filter transfer function from the received first input signal and the second input signal. The authenticator is configured to determine a current user acoustic signature from the at least one filter transfer function and to compare the current user acoustic signature with a predefined user acoustic signature and to authenticate the user based on the comparison of the current user acoustic signature with the predefined user acoustic signature.

Website verification service

The concepts and technologies disclosed herein are directed to a website verification service. A system can receive, from a web server that hosts a website, a query for a set of authentication credentials (“credentials”) to be used to verify that the website is trustworthy. The system can generate and provide the credentials to the web server. The web server can, in turn, provide the credentials to a web browser device for presentation to a user via a web browser application executing on the web browser device. The system also can provide the credentials to a verifier device. The verifier device can present the credentials to the user via a verifier application executing on the verifier device. The user can compare the credentials presented via the web browser application to the credentials presented via the verifier application executing on the verifier device to determine whether the website can be trusted.

DIRECTIONAL SECURE COMMUNICATIONS

Methods, apparatuses, and computer-readable medium for directional security are provided. An example method may include receiving, from a wireless device, a configuration for a set of shared keys. The example method may further include receiving, from a second UE, at least one message or signal including a location of the second UE, the received at least one message or signal being associated with an angle of arrival. The example method may further include configuring a key from the set of shared keys based on at least one of the received configuration, the location of the second UE, the AoA of the received at least one message or signal, or a location of the first UE. The example method may further include generating one or more ranging signals based on the configured key, the one or more ranging signals being directionally secure based on the location of the second UE.

DIRECTIONAL SECURE COMMUNICATIONS

Methods, apparatuses, and computer-readable medium for directional security are provided. An example method may include receiving, from a wireless device, a configuration for a set of shared keys. The example method may further include receiving, from a second UE, at least one message or signal including a location of the second UE, the received at least one message or signal being associated with an angle of arrival. The example method may further include configuring a key from the set of shared keys based on at least one of the received configuration, the location of the second UE, the AoA of the received at least one message or signal, or a location of the first UE. The example method may further include generating one or more ranging signals based on the configured key, the one or more ranging signals being directionally secure based on the location of the second UE.

METHODS AND APPARATUSES FOR MANAGING NETWORK SECURITY USING VIDEO SURVEILLANCE AND ACCESS CONTROL SYSTEM

Aspects of the present disclosure include methods and systems for receiving, from a requester, a request for accessing an access-controlled asset based on authentication information of an authorized user, identifying a request location of the request, identifying a current location of the authorized user, determining whether the request location is substantially identical to the current location, and granting the request in response to authenticating the authentication information and determining that the request location is substantially identical to the current location, or denying the request in response to failure to authenticate the authentication information or determining that the request location is different than the current location.

Network data management and data security
11615412 · 2023-03-28 · ·

Systems, devices, methods, instructions, and other implementations are described for network data management. One embodiment involves request data received at a device associated with a digital lockbox, where the request data includes identifying information for an originating device associated with a location and is associated with a user device. A unique token is generated with the identifying information. The unique token can be used to tokenize a network link to create a secure one-time link. The system transmits the one-time link, which can then be used to facilitate secure communications between a computing system associated with the originating device and the user device.

Network data management and data security
11615412 · 2023-03-28 · ·

Systems, devices, methods, instructions, and other implementations are described for network data management. One embodiment involves request data received at a device associated with a digital lockbox, where the request data includes identifying information for an originating device associated with a location and is associated with a user device. A unique token is generated with the identifying information. The unique token can be used to tokenize a network link to create a secure one-time link. The system transmits the one-time link, which can then be used to facilitate secure communications between a computing system associated with the originating device and the user device.