H04L63/0492

Pairing and attestation of proximal devices

A host device to pair with a modular device includes an environmental data collection system to provide motion data, and a data analysis circuit to filter the motion data to provide motion information. The data analysis circuit further to detect anomalies in the motion data to provide anomaly data. The host device further including a pairing system to determine whether the host device is proximate to the modulate device based on a comparison of the motion information with received motion information from the modular device. The pairing circuit is further to pair with the modular device responsive to a match between a key and a received key from the modular device. The host device further including a key generator to generate the key based on a comparison between the anomaly data and received anomaly data from the modular device responsive to a determination that the modular device is proximate.

SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION
20230179589 · 2023-06-08 ·

Systems and methods for cryptographic authentication are provided. A transport service may establish a connection with a login device, where a user is attempting to log in via a web browser. The login device may display a graphical code that encodes a unique URL provided by the transport service. A user may use an authenticator device to image the graphical code. A browser within the authenticator device may be opened and access the URL. The transport service may utilize the authenticator device to perform a proximity-based authentication.

METHOD AND APPARATUS FOR AUTHENTICATING A DEVICE USING BLUETOOTH TECHNOLOGY

Disclosed is a method and an apparatus for a first device to perform authentication by using Bluetooth LE (Low Energy). The present invention provides a method and an apparatus comprising exchanging capability information with a second device; generating a random code for first authentication through a user authentication service based on the capability information; transmitting a write request message including the generated random code to the second device; receiving a write response message in response to the write request message from the second device; receiving an authentication indication message from the second device, wherein the authentication indication message includes state information indicating success or failure of the first authentication based on the random code; and transmitting an authentication complete message in response to the authentication indication message.

Methods, systems, and media for authenticating a connection between a user device and a streaming media content device

Mechanisms for authenticating a connection between a user device and a streaming media content device comprising: identifying a collection of candidate streaming media content devices based on beacon(s) detected by a user device; receiving an indication that one of the content devices is to be selected for connection to the user device; transmitting instructions to the content devices to broadcast a signal, wherein the signal broadcast by each of the content devices contains a value that indicates an identity of the content device; receiving, from the user device, an audio signal that includes a detected signal; processing the audio signal to extract the value indicating the identity of a particular content device associated with the detected signal contained in the received audio signal; identifying the particular content device based on the determined value; and transmitting an indication that the user device and the particular content device are authenticated to communicate.

UNIFIED VPN AND IDENTITY BASED AUTHENTICATION TO CLOUD-BASED SERVICES

Techniques are disclosed to provide VPN and identity based authentication to cloud-based services. In various embodiments, a request to authenticate a user to a service is received. A user identity associated with one or both of the user and the request is determined based at least in part on data comprising the request. An identity assertion is generated based at least in part on the user identity. The identity assertion is provided to a requesting node with which the request to authenticate is associated.

Remote auditing of electronic keys
20220358802 · 2022-11-10 ·

Embodiments relate to enhanced auditing features for administration of remote electronic keys. An electronic key delivers electrical power to an electronic lock to energize circuitry thereof. The electrical power may energize an electric motor or solenoid. Based on access control information associated with the electronic key, an unlocking signal is conveyed from the electronic key that causes the electronic lock to change from a locked state to an unlocked state, thereby permitting a user of the key to access one or more resources secured by the lock. The electronic key stores details related to the unlocking event in memory sites. In some aspects, the electronic key broadcasts a message via a wireless wide area network (WWAN). The message may include a request to establish a WWAN communications link with an access control server located away from the electronic key. Responsive to establishing the WWAN communications link, the electronic key initiates a transfer of data to the access control server, the data including details related to the unlocking event.

SECURE RFID TAG IDENTIFICATION
20220360572 · 2022-11-10 ·

A method, apparatus and system for secure one-way RFID tag identification is provided. The method comprising generating, at an RFID tag, an auxiliary identifier; generating, at an RFID tag, a secure representation based on the auxiliary identifier; transmitting, from the RFID tag and receiving at an RFID reader, one or more representations of the auxiliary identifier and the tag identifier including the secure representation; and verifying the identity of the RFID tag based on the received representations.

Methods and architectures for secure ranging

A secure ranging system can use a secure processing system to deliver one or more ranging keys to a ranging radio on a device, and the ranging radio can derive locally at the system ranging codes based on the ranging keys. A deterministic random number generator can derive the ranging codes using the ranging key and one or more session parameters, and each device (e.g. a cellular telephone and another device) can independently derive the ranging codes and derive them contemporaneously with their use in ranging operations.

Authentication control device and authentication control method

An authentication control device includes one or more memories, and one or more processors coupled to the one or more memories and the one or more processor configured to perform storing of a first authentication key received from a server device in the one or more memories, the first authentication key relating to a second authentication key stored in a terminal of a user, in communication between the authentication control device and the terminal in the state where the authentication control device is uncommunicable with the server device, in response to receiving, from the terminal, first information encoded in accordance with the second authentication key, perform decoding of the first information by the stored first authentication key, and execute an authentication process of the user in accordance with second information acquired by the decoding.

Image-Capturing and Image-Distributing System for Automatically or Manually Capturing Image of User Carrying Mobile Communication Terminal
20170318215 · 2017-11-02 ·

A system and a method in which image-capturing is effected automatically or manually. When a user-carried mobile terminal receives a near field wireless signal from a near field wireless signal transmitting station installed in an image-capturing field area, it is determined that a user is present within the image-capturing field of the externally installed image-capturing device and the user-carried communication terminal transmits automatically or manually an image-capturing request to the externally installed image-capturing device. In response, the externally installed image-capturing device effects image-capturing and then transmits the obtained image to an image server. After transmission of the image-capturing request, the user-carried mobile communication terminal makes a downloading request to the image server and effects downloading via a network and the downloaded data is automatically stored within the user-carried mobile communication terminal.