H04L63/0838

USER AUTHENTICATION SYSTEM, USER AUTHENTICATION SERVER, AND USER AUTHENTICATION METHOD
20230216686 · 2023-07-06 ·

A system which performs both identification and authentication of a user ID at the same time with only one step of inputting a one-time password without the need of step of inputting a user ID is provided. A one-time password deriving rule for generating a one-time password by being applied to pattern elements at specific positions in a case where a plurality of pattern elements arranged in a predetermined pattern are presented to a user who is to be authenticated as a presentation pattern is set as a password of the user, and the user is authenticated on the basis of a character string for authentication in which a user ID is embedded at a predetermined embedding position within the one-time password. In this event, a correct character string for authentication for the presented presentation pattern is generated as a verification code for all user IDs, and in a case where a verification code which matches a character string for authentication input from the user exists, user authentication of the user ID corresponding to the verification code is made successful.

Display system, display method, and recording medium

In a display system according to the present disclosure, a server device includes an authentication processor that authenticates a user for use of a file, based on authentication information of the user input at a user terminal and an access information generator that generates first access information for accessing the file if the user is authenticated by the authentication processor for use of the file, and a display device includes a file acquirer that acquires the file from the server device, based on the first access information generated by the access information generator, and a display processor that displays the file acquired by the file acquirer, on the display.

Secure pairing of wireless devices
11696139 · 2023-07-04 · ·

A facility for establishing a wireless connection between first and second devices is described. On the first device, the facility causes a one-time pairing code to be displayed, then wirelessly receives from the second device a wireless connection solicitation having contents. On the first device, in response to the receiving, the facility determines whether the contents reflect the one-time pairing code. In response to determining that the contents reflect the one-time pairing code, on the first device, the facility establishes the wireless connection between the first and second devices.

Communication device and system

To realize more secured Authentication while convenience is secured. There is provided a communication device including a control unit configured to control a process relating to transmission or reception of a first authentication signal and a second authentication signal used for a first authentication process that is authentication between the communication device and another communication device, in which the control unit further controls a second authentication process that is authentication different from the first authentication process and starts a process relating to transmission or reception of signals used for a second authentication process that is authentication different from the first authentication process before transmission or reception of the first authentication signal.

Mutually authenticated voice communications

The present disclosure relates generally to authentication of voice communications. Methods performed by a user device for mutually authenticated communications can include creating a first communication channel with a backend, creating a secure session across a second communication channel with the backend, receiving a first identification message from the backend via the second communication channel, receiving a second identification message from the backend via the first communication channel, sending an attestation that the second identification message matches the first identification message to the backend via the second communication channel, receiving a second step authorization instruction from the backend via the second communication channel, assessing the identity of the user, and delivering an authorization response to the backend via the second communication based of the assessed identity of the user.

Methods, systems, and computer readable media for single-use authentication messages

A method for creating single-use authentication messages includes creating, at a consumer network function of a core network of a telecommunications network, a message hash of at least a subset of a request message. The method includes adding, at the consumer network function, the message hash to a client credentials assertion (CCA) token for the consumer network function. The method includes sending, from the consumer network function, the request message with the CCA token to a producer network function.

Accessing user accounts and data from any computing device

The present disclosure describes techniques for accessing user accounts and data from any computing device. It may be determined whether an account of a user exists in a cloud service in response to receiving information associated with the user from any computing device. Data associated with the account may be stored by the cloud service. There may be a plurality of types of data associated with a plurality of security levels. The plurality of security levels may correspond to different security requirements. The data associated with the account may belong to at least one of the plurality of types of data. An instance of the account may be deployed to the computing device in response to determining that the account exists in the cloud service. The instance of the account may enable the user to access services via the computing device.

REREGISTRATION OF CLIENT DEVICE WITH SERVER DEVICE USING USER DEVICE
20230006994 · 2023-01-05 ·

Subsequent to registration of a client device with a server device such that credentials by which the client device is authenticated are securely stored at the client device, the client device provides a user device and a server device a recovery identifier and a recovery secret key associated with the client device. Upon the credentials no longer being stored at the client device such that the client device has to be reregistered with the server device to store new credentials by which the client device is authenticated, the user device generates and provides a recovery code to the client device, which provides the recovery code to the server device. Upon validating the recovery code based on the recovery identifier and the recovery secret key, the server device reregisters the client device with the server device such that the new credentials are securely stored at the client device.

Validating a player's real-world location using activity within a parallel-reality game

Systems and methods for linking real world activity, such as real world commercial activity or real world data collection activity, with a location-based parallel reality game are provided. In particular, a game server hosting a parallel reality game can modify, update, or add to game data stored in a game database associated with the parallel reality game to include certain game features in the parallel reality game linked with real world activity in the real world. The game features can be linked with activities in the real world such that player actions associated with the game features in the virtual world can lead to or encourage activity in the real world, such as commercial activity and/or data collection activity in the real world. A one-time password may be used to validate a player's location in the real world and to enable controlled access to game features in the virtual world.

Secure password generation and management using NFC and contactless smart cards
11544368 · 2023-01-03 · ·

Various embodiments are directed to securely generating and managing passwords using a near-field communication (NFC) enabled contactless smart card. For example, a secure password may be generated by generating a random number via a random number generator of the contactless smart card and converting the random number to one or more human-readable characters. In another example, a secure cryptographic hash function of the contactless smart card may generate a hash output value, which may be converted to one or more human-readable characters. The human-readable characters may be used as the secure password or it may be transformed to add more layers of security and complexity.