Patent classifications
H04L63/0846
User terminal for password-based authentication, and password-based trading terminal, system, and method
A user terminal, a password-based trading terminal, a system and a method for password-based authentication are provided. Wherein, the user terminal comprises a password generation module and a first near field communication module. The password generation module is configured to generate a password. The first near field communication module is configured to convert the generated password into near field communication label data, and then send the data to a password-based trading terminal through near field communication. The present application effectively ensures password security during the password-based authentication.
ENCODING-LOCKED METHOD FOR AUDIO PROCESSING AND AUDIO RECEIVING DEVICE
An encoding-locked method for audio processing for audio receiving device includes the following steps: inserting a first encryption key into a first digital signal stream so as to obtain a second digital signal stream, checking whether there is the first encryption key in a received digital signal stream so as to determine whether the received digital signal stream is the second digital signal stream, and when the received digital signal stream is not the second digital signal stream, no processing the received digital signal stream.
Anonymous cross-device linking using temporal identifiers
Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, including a method for providing content. Login credentials provided by a user are received when communicating through a first user device, and a temporal identifier is created for the user and provided to the first user device. Prior to expiration of the temporary key, login credentials provided by the user on a second different user device are received. The temporal identifier is re-created for the user and provided to the second different user device. A first request is received from the first or second different user device. The temporal identifier is stored and an identifier associated with the device. A second request is received from the other device. A device identifier for the first and second different user device are linked in association with the temporal identifier. The linking is used to respond to the second request.
Transaction scheme for offline payment
An authentication factor is received, including an authentication key, an account information of a user, and a dynamic time factor. A bound authentication information is generated by using the authentication factor and a device information of a client device that requested the secure offline payment. The bound authentication information is transmitted to a service server system perform an offline payment authorization based on the bound authentication information. In response to a successful offline payment authorization, a graphical identifier is generated for completing the secure offline payment associated with the authentication factor, where the graphical identifier includes the bound authentication information and a dynamic password generated based on the dynamic time factor.
Authentication of mobile servers
In one embodiment, a method, apparatus, and system of authenticating a mobile server may have at least one mobile server configured to execute games of chance on a plurality of mobile gaming devices and an authentication server configured to: determine a location of the at least one mobile server; determine a wireless communication means to communicate with the at least one mobile server based on the location of the at least one mobile server; communicate with the at least one mobile server via the determined wireless communication means; and initiate authentication, by an authentication server, of the at least one mobile server.
Method and apparatus for authentication and identity management of communicating devices
Aspects of the subject disclosure may include, for example, receiving, from a second waveguide system, electromagnetic waves at a physical interface of a transmission medium that propagate without utilizing an electrical return path where the electromagnetic waves are guided by the transmission medium and where the electromagnetic waves have a non-optical frequency range, and authenticating the second waveguide system according to an authentication protocol based on authentication information contained in the electromagnetic waves. Other embodiments are disclosed.
METHOD AND DEVICE FOR ACCESSING SMART CAMERA
The present disclosure relates to a method and a device for accessing a smart camera. The method includes detecting access media for accessing the smart camera. The method also includes generating an access request corresponding to the access media when detecting that the access media is a local area network. The access request carries an access password. The method further includes sending the access request to the smart camera, such that the smart camera allows access after successfully verifying the access password in the access request.
Prevention of replay attack in long term evolution device-to-device discovery
Methods, systems, and devices are described for device-to-device (D2D) wireless communication. A device may receive a timing variable from a network while the device is in a connected mode. The device may then use the timing variable for D2D discovery message authentication. The device may compare the timing variable with a local timing variable to determine whether a difference between the two variables is within a maximum allowable offset. The device may announce the D2D discovery message to another device when the difference is within the maximum allowable offset.
Refreshing security credentials used to invoke an external function
A query referencing a function associated with a remote software component is received by a network-based data warehouse system. Temporary security credentials corresponding to a role at a cloud computing service platform are obtained. The role has permission to send calls to a web endpoint corresponding to the remote software component. A request comprising input data and electronically signed using the temporary security credentials is sent to a web Application Programming Interface (API) management system of the cloud computing service platform. The request, when received by the web API management system, causes the web API management system to invoke external functionality provided by the remote software component at the web endpoint with respect to the input data. A response comprising a result of invoking the external functionality is received from the web API management system, and the result data is processed according to the query.
Server to server communication
Managing user sessions in a networked computing environment. A method includes, at an identity provider computer system, providing a first id token to a resource provider for an entity. The first id token has therein a first policy check interval having a value defining a period when the first id token should be revalidated. Due to expiration of the first policy check interval, a first refresh token is received from a resource provider computer system that received the first id token. As a result of receiving the first refresh token from the resource provider computer system, the identity provider computer system evaluates conditional access policy for the entity. If the identity provider computer system determines that the conditional access policy for the entity has been met, the identity provider computer system provides a new id token and a new refresh token to the resource provider computer system.