H04L9/3273

Method and system for temporary use of biometric information of another for access to a system

A method and system for temporarily gaining access to a system is disclosed, The method includes: receiving biometric data from a first biometric device of a first user on a computer processor; generating a temporary code on the computer processor in response to receipt of the biometric data from the first biometric device of the first user; sending the temporary code from the computer processor to the first biometric device of the first user; receiving biometric data from a second biometric device of a second user on the first biometric device of the first user; generating an access code on the first biometric device, the access code including one or more of the biometric data of the first user, the temporary code from the computer processor, and the biometric data of the second user; and sending the access code to the biometric device of the second user.

EMBEDDED UNIVERSAL INTEGRATED CIRCUIT CARD (eUICC) PROFILE CONTENT MANAGEMENT
20220385446 · 2022-12-01 ·

A mobile network operator (MNO) uses a provisioning server to update or install profile content in a profile or electronic subscriber identity module (eSIM). In an exemplary embodiment, the profile is present on a secure element such as an embedded universal integrated circuit card (eUICC) in a wireless device. One or more MNOs use the provisioning server to perform profile content management on profiles in the eUICC. In some embodiments, an MNO has a trust relationship with the provisioning server. In some other embodiments, the MNO does not have a trust relationship with the provisioning server and protects payload targeted for an MNO-associated profile using an over the air (OTA) key.

DEVICE REGISTRATION
20220385480 · 2022-12-01 ·

In an example there is provided a method for a set of registered devices that are registered to participate in an authentication protocol, where each registered device has a share of an authentication key. The method comprises generating share data for a share of the authentication key. The share data is communicated from an authorised subset of the registered devices to a device. The share of the authentication key is generated at the device, on the basis of the share data. The share of the authentication key combines with shares of the registered devices to allow the device to participate in the authentication protocol.

Advance mobile device and vehicle profile pairing

An advance pairing system preemptively pairs a phone to a vehicle using a backend cloud system prior to establishing the connection with the vehicle, such as during the time that a user is purchasing a vehicle, or just after the user enters the vehicle for the first time. The system includes a mobile application for automated advance pairing with the vehicle's automotive computer. The mobile app sends a request for advance pairing to a server that assigns a set of unique keys to the account for secure pairing of the mobile device and the vehicle. The server pushes an encrypted payload to both the mobile device app and the vehicle advance pairing app operating on the automotive computer. The encrypted payload can include a unique vehicle ID, a unique mobile device ID, and one or more encryption keys. The mobile device and the vehicle use the encrypted advance pairing information to establish a secured connection with minimal user input.

MUTUAL DEVICE-TO-DEVICE AUTHENTICATION METHOD AND DEVICE DURING DEVICE-TO-DEVICE BUNDLE OR PROFILE TRANSFER
20220377081 · 2022-11-24 ·

The disclosure discloses a method and apparatus for mutual authentication between two smart security media for bundle transfer between the security media. According to an embodiment of the disclosure, a first device for providing a bundle for the second device includes a transceiver; and at least one processor, wherein the at least one processor is configured to obtain information about a bundle to be transmitted to the second device, control the transceiver to transmit identification information of the bundle to the second device, control the transceiver to receive, from the second device, authentication information relating to bundle transfer of a second smart secure platform (SSP) of the second device, determine whether a second secondary platform bundle loader (SPBL) of the second SSP is a Spbl which is able to receive the bundle based on the authentication information relating to bundle transfer of the second SSP, and control the transceiver to transmit the bundle to the second device based on a result of the determining.

METHOD AND DEVICE FOR PROVIDING EVENT IN WIRELESS COMMUNICATION SYSTEM
20230054892 · 2023-02-23 ·

The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate. A method performed by a terminal in a wireless communication system is provided. The method comprises transmitting to a subscription manager discovery service (SM-DS) information indicating a support of a push service, receiving from the SM-DS a list of push services supported by the SM-DS, selecting at least one push service based on the list of push services supported by the SM-DS, generating an embedded Universal Integrated Circuit Card (eUICC) signature based on an indicator indicating at least one selected push service and a push token, and transmitting to the SM-DS the indicator, the push token, and the eUICC signature.

System and method for automatic bluetooth pairing

A method and system for automatically connecting one customer device with another over a Bluetooth or similar connection. The automatic connection may be made by generating a unique identifier to store on a new customer device and a backend system associated with an existing customer device and connecting the new customer device with the existing customer device using the unique identifier.

BIOSENSOR STRUCTURE FOR MEASURING SPECIMEN AND METHOD FOR MEASURING SPECIMEN BY USING THE SAME
20220360445 · 2022-11-10 · ·

Disclosed are an extension cryptographic operation processing system and method. An extension cryptographic operation processing method of a processing device including a trusted execution environment can be performed by at least one processor constituting the trusted execution environment of the processing device.

Secure authentication system and method

Methods and systems pertaining secure transaction systems are disclosed. In one implementation, a merchant server payment information from a user computer. The merchant server can transmit a verification request to a gateway as well as receive a verification response from the gateway. The merchant server can transmit an authentication request and receive an authentication response. After receiving the authentication response, the merchant server can initiate an authorization process.

Verification Method and Apparatus
20230102561 · 2023-03-30 ·

A verification method and apparatus are provided. The method includes: performing Bluetooth authentication with a terminal based on Bluetooth authentication information; after the Bluetooth authentication with the terminal succeeds, obtaining RFID authentication information, where the RFID authentication information includes label information and authorization information of an RFID label, and the authorization information is used to indicate an association relationship between the RFID label and the terminal; and performing RFID authentication based on the RFID authentication information, and being in a controllable state after the RFID authentication succeeds. This can effectively prevent a relay attack and improve security of a controlled device.