H04W12/68

Method and system for the behaviour-based authentication of a user
11632368 · 2023-04-18 · ·

The invention relates to a method for authenticating (400) a current user of a mobile, portable communication system (100) with respect to a server (150) by means of a behavior-based authentication. The server (150) comprising a first interface and a second interface. The first interface is configured to communicate with at least one activatable device (152), and the second interface is configured to communicate with a mobile, portable communication system (100). The method for authentication comprises: receiving at least one classification result (600) by the server (150) from the mobile, portable communication system (100); evaluating the at least one classification result (600) by the server according to a predefined examination criterion (800); and activating the device (152) by the server (150) by means of a control signal.

Authentication system, mobile device, processing device, and non-transitory computer-readable medium

A mobile device is carried by a person to be authenticated. An acceleration sensor is installed in the mobile device and configured to output an acceleration signal corresponding to acceleration applied to the mobile device. A processing device is configured to execute determination processing for determining whether the person is walking based on the acceleration signal. A control device is configured to control transmission of a radio signal, and to control an operation of a controlled device based on a result of the determination processing and a result of authentication processing for authenticating, by way of the mobile device, the person as a user of the controlled device. The determination processing is activated in response to reception of the radio signal by the mobile device.

Method and apparatus to dynamically control facial illumination
11657132 · 2023-05-23 · ·

Systems and methods for authenticating a user in an authentication system using a computing device configured to capture authentication biometric identity information. The authentication biometric identify information captured during an authentication session. The authentication biometric identify information may comprise or be derived from one or more images of the user being authenticated. The authentication biometric identify information is compared to root identify biometric information. The root identify biometric information is captured from a trusted source, such as trusted devices located at trusted locations, such as a government entity, financial institution, or business. Identity verification may occur by comparing the trusted root identify biometric information to the biometric identify information captured during an authentication session. Liveness determination may also occur to verify the user is a live person. Liveness determination may include comparing two images of the user such that the two images are captured at different distances from the user.

Wearable misplacement

An access control system is described in which a primary credential device has a master key and a secondary credential device has a key derived from the master key. Both the master key and the derivative key are required to gain access to the resource protected by the access control system. If the secondary credential device is lost, misplaced, or stolen, it cannot be used to gain illicit access to the protected resource, and it can be easily replaced by providing a different secondary credential device with another key derived from the master key.

SYSTEMS AND METHODS FOR AUTHENTICATION BASED ON DYNAMIC RADIO FREQUENCY RESPONSE INFORMATION

In some implementations, a system may obtain dynamic radio frequency (RF) response information associated with a user equipment and additional dynamic information associated with the user equipment. The system may determine, based on the dynamic RF response information and the additional dynamic information, a current behavior profile of the user equipment. The system may compare the current behavior profile and a baseline behavior profile of the user equipment to generate comparison information. The system may grant or deny, based on the comparison information, the user equipment access to a resource of a private network.

SYSTEMS AND METHODS FOR AUTHENTICATION BASED ON DYNAMIC RADIO FREQUENCY RESPONSE INFORMATION

In some implementations, a system may obtain dynamic radio frequency (RF) response information associated with a user equipment and additional dynamic information associated with the user equipment. The system may determine, based on the dynamic RF response information and the additional dynamic information, a current behavior profile of the user equipment. The system may compare the current behavior profile and a baseline behavior profile of the user equipment to generate comparison information. The system may grant or deny, based on the comparison information, the user equipment access to a resource of a private network.

Controlling a media device using a mobile device

Techniques for automatically configuring and controlling a digital media device are described. A digital media device can be configured or controlled by a mobile device, e.g., a smart mobile phone. When the digital media device is being configured, the digital media device can broadcast a signal, indicating that the digital media device is requesting configuration information from a mobile device. A mobile device located in proximity of the digital media device, upon detecting the signal, can perform various security checks to determine that the request is legitimate, and then open a communication channel with the digital media device. The mobile device can provide user preferences of the mobile device, as well as credentials for accessing and downloading remote content, to the digital media device through the communication channel. Upon receiving the configuration information, the digital media device can use parameters in the configuration information as its settings.

Biometric user authentication

One aspect provides a method of authenticating a user of a user device, the method comprising: receiving motion data captured using a motion sensor of the user device during an interval of motion of the user device induced by the user; processing the motion data to generate a device motion feature vector, inputting the device motion feature vector to a neural network, the neural network having been trained to distinguish between device motion feature vectors captured from different users; and authenticating the user of the user device, by using a resulting vector output of the neural network to determine whether the user-induced device motion matches an expected device motion pattern uniquely associated with an authorized user, the neural network having been trained based on device motion feature vectors captured from a group of training users, which does not include the authorized user.

Biometric user authentication

One aspect provides a method of authenticating a user of a user device, the method comprising: receiving motion data captured using a motion sensor of the user device during an interval of motion of the user device induced by the user; processing the motion data to generate a device motion feature vector, inputting the device motion feature vector to a neural network, the neural network having been trained to distinguish between device motion feature vectors captured from different users; and authenticating the user of the user device, by using a resulting vector output of the neural network to determine whether the user-induced device motion matches an expected device motion pattern uniquely associated with an authorized user, the neural network having been trained based on device motion feature vectors captured from a group of training users, which does not include the authorized user.

Electronic system for construction and detection of spatial movements in a VR space for performance of electronic activities

In general, apparatuses, methods and computer program products for construction and detection of spatial movements in a virtual reality (VR) space for performance of electronic activities are disclosed. A VR composite credential authentication device is provided that is configured is structured for capturing, customizing and transforming one or more VR composite credentials of a user and authenticating electronic activities based on at least the VR composite credentials. The VR composite credentials of the user are captured using one or more VR spatial sensor devices which are configured for capture and imaging of VR spatial movement and position credentials. The captured credentials are analyzed to determine an associated electronic activity. The electronic activity is initiated, automatically, in response to the successful validation of the captured credentials. Moreover, the invention allows for setting-up an infinitely customizable library of registered VR composite credentials.