Patent classifications
H04L63/0492
Method of Providing a Gateway between Mobile Devices and Radio Frequency Identification (RFID) Enabled Readers
An RFID magnetic field powered translating device that acts as a gateway between mobile devices and radio frequency identification (RFID) enabled readers. The gateway enables the portable device to emulate access credentials for physical access, computer credentials, licenses and payment cards using Bluetooth communication between the portable mobile device and translating device; and RFID emulation at either 125 khz or 13.56 MHz between the translating device and the RFID reader.
ADDING A DEVICE TO A PROTECTED NETWORK WITHOUT DATA ENTRY ON THE DEVICE
An apparatus comprising a processor configured to cause the apparatus to perform operations including: detecting a protected wireless network; observing a set of encrypted wireless data packets being transmitted by one or more devices participating in the protected wireless network, wherein configuration information for participating in the protected wireless network has been encoded according to a predefined protocol in sizes or times of transmission of the set of encrypted wireless data packets; determining the configuration information based on sizes or times of receipt of a portion of each of the set of encrypted wireless data packets; and participating in the protected wireless network using the determined configuration information.
SYSTEM AND METHOD FOR SECURE COMMUNICATIONS WITH INTERNET-OF-THINGS DEVICES
A system and method for securing communications between Internet of Things (IoT) devices and user devices. The method includes establishing a connection to an IoT device over a first secured communication channel, wherein the IoT device is communicatively connected to a wireless network using at least login credentials received from a user device over a second communication channel, wherein the user device is communicatively connected to the wireless network; receiving, from the IoT device, a unique identifier of the user device; and associating the user device with the IoT device, wherein only user devices that are associated with the IoT device can control the IoT device.
METHODS AND SYSTEM FOR REAL-TIME FRAUD DECISIONING BASED UPON USER-DEFINED VALID ACTIVITY LOCATION DATA
A computer-implemented method for real-time fraudulent activity verification, comprising: displaying, on a user device, a first notification which prompts entry of a user-selected geographic area, the user-selected geographic area defining a valid region for processing of transactions associated with a user; receiving, by the user device, user-defined geographic data, the user-defined geographic data specifying at least one user-selected geographic area and defining the valid region for processing of transactions; transmitting, by the user device, the user-defined geographic data along with user data, the user data identifying the user device or the user; receiving, the user device, a second notification, the second notification being an authentication request message received in response to a proposed transaction associated with a user identifier related to the user; displaying, by the user device, the second notification; receiving, by the user device, user-provided authentication data; and transmitting, by the user device, the user-provided authentication data.
Enforce Data Security based on a Mobile Device, Positioning, Augmented Reality
Systems and methods are provided for securing data using a mobile device. The method may include determining securing global positioning data values of the mobile device; measuring a securing direction of the mobile device relative to a magnetic north direction; capturing a securing password by the mobile device; and securing the data against unauthorized access using the determined global positioning data values, the securing password, and the securing direction as a combined password.
Method and apparatus for access credential provisioning
A method and apparatus are provided for access credential provisioning. A method may include receiving, at a first mobile apparatus, information about a second mobile apparatus. The first mobile apparatus may be provisioned with network access credential information to be transferred from the first mobile apparatus to the second mobile apparatus. The method may further include causing the information about the second mobile apparatus to be provided to a provisioning apparatus for the network. The method may additionally include receiving authorization form the provisioning apparatus to transfer the network access credential information from the first mobile apparatus to the second mobile apparatus. The method may also include, in response to receipt of the authorization, causing the network access credential information to be provided to the second mobile apparatus. A corresponding apparatus is also provided.
SECURE COMMUNICATIONS
A system including a sensor, a computing device and a Wireless Access Point (WAP). The sensor in response to receipt of an initiation signal, via a first communication channel, from a relatively proximal computing device, is arranged to generate and store first security information and to transmit, wirelessly via a second communications channel, a first message comprising information representing at least a part of the first security information. The WAP, which is remote from the sensor is arranged to receive and store the first message. The WAP is arranged to generate second security information and to transmit wirelessly to the computing device, via a third communications channel when the computing device is within range of the WAP, a second message comprising information representing at least a part of the second security information. The sensor is arranged to receive at least the second message via only the first communications channel.
User authentication system and portable terminal
A user authentication system includes a main body device and an authentication device. The main body device has an authentication code transmission requesting unit, a verification unit, and an unlocking unit. The authentication code transmission requesting unit generates an authentication code transmission request including a first value, and transmits the authentication code transmission request to the authentication device. The authentication device generates an authentication code in response to the first value in the authentication code transmission request, and transmits the authentication code to the main body device. The verification unit determines that authentication is successful if the authentication code is received from the authentication device. When the verification unit determines that the authentication is successful, the unlocking unit enables a predetermined functionality.
FAILED RESOURCE USAGE MONITOR AND REMEDIATION SYSTEM
A system monitors failed resource usage and remediates the failure by determining that the user attempted to use a resource to perform an action associated with a third party; determining that the attempt to use the resource to perform the action failed; determining that a user device of the user is located within a physical boundary; providing information related to the resource or the failed action to the third party; expediting a second attempt to perform the action including receiving authentication information comprising the provided information from the user, the authentication information configured to authenticate an identity of the user, and authenticating the identity of the user based on the received authentication information; and in response to authenticating the identity of the user, performing the action.
Systems and methods for utilizing wireless programmable credentials
Various embodiments of the present invention provide systems and methods for performing updates of credentials used in relation to RFID readers. As an example, some embodiments of the present invention provide methods for updating credentials capable of authorization to an RFID reader. Such methods include providing a cellular telephone that includes a memory, a cellular telephone interface, and an nfc interface. An access is received via the cellular telephone interface, and is stored to the memory. Communication with an RFID reader is initiated via the nfc interface, and the access update is provided to the RFID reader for authorization