Patent classifications
H04W12/77
Website Verification Service
The concepts and technologies disclosed herein are directed to a website verification service. A system can receive, from a web server that hosts a website, a query for a set of authentication credentials (“credentials”) to be used to verify that the website is trustworthy. The system can generate and provide the credentials to the web server. The web server can, in turn, provide the credentials to a web browser device for presentation to a user via a web browser application executing on the web browser device. The system also can provide the credentials to a verifier device. The verifier device can present the credentials to the user via a verifier application executing on the verifier device. The user can compare the credentials presented via the web browser application to the credentials presented via the verifier application executing on the verifier device to determine whether the website can be trusted.
SYSTEM AND METHOD FOR USING UNIQUE DEVICE IDENTIFIERS TO ENHANCE SECURITY
A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can transmit access data to a second electronic device. The access data can be associated with a first access code that can be generated based at least in part on data representing a device identifier of the first electronic device. A device identifier can uniquely identify the first electronic device from a plurality of electronic devices. Transferring the access data can involve transforming the first access code into a second access code that can include data representing a device identifier associated with the second electronic device. Transforming the first access code into the second access code can facilitate access to a resource associated with the access data for a second user, but not for a first user.
Security platform architecture
A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.
ACCESS CONTROLLER FOR SECURE TRANSACTIONS
A method for performing secure transactions is disclosed. The method includes: providing an access controller between a core application and a third-party application, where the access controller prevents the third-party application from unauthorized access to the core application; receiving, by the access controller, a command from the third-party application to access the core application; transmitting, by the access controller, an authorization request to a secure application storing credentials of a user; providing, by the access controller, the third-party application with access to the core application in response to the access controller receiving notification from the secure application that the command is authorized; and preventing, by the access controller, the third-party application from accessing the core application in response to the access controller receiving notification from the secure application that the command is unauthorized.
COMMUNICATION APPARATUS, COMMUNICATION METHOD, AND PROGRAM
A communication apparatus reads an image relating to a first other communication apparatus and acquires information on the first other communication apparatus from the image. The communication apparatus reads an image relating to a second other communication apparatus and acquires information on the second other communication apparatus from the image. The communication apparatus transmits information on a communication channel to the first other communication apparatus. The communication channel is for use in a role determination process for determining roles of the first other communication apparatus and the second other communication apparatus in direct wireless communication. The communication apparatus transmits the information on the communication channel and the information on the first other communication apparatus to the second other communication apparatus.
COMMUNICATION APPARATUS, COMMUNICATION METHOD, AND PROGRAM
A communication apparatus reads an image relating to a first other communication apparatus and acquires information on the first other communication apparatus from the image. The communication apparatus reads an image relating to a second other communication apparatus and acquires information on the second other communication apparatus from the image. The communication apparatus transmits information on a communication channel to the first other communication apparatus. The communication channel is for use in a role determination process for determining roles of the first other communication apparatus and the second other communication apparatus in direct wireless communication. The communication apparatus transmits the information on the communication channel and the information on the first other communication apparatus to the second other communication apparatus.
Determining a Device Posture Using a Device Posture Token
Disclosed are various approaches for generating a device posture token corresponding to a client device. The device posture token can be used by a verification computing device to determine whether the client device complies with the security policies of a particular facility.
Techniques for securing delivery of an audio message
Techniques for securing the delivery of an audio message on a device are described. A method may include receiving a message encrypted with a public key from a sender at a recipient device; authenticating a recipient using an image of an ear of the recipient; retrieving a private key when the authentication succeeds; decrypting the message using the private key; and presenting the decrypted message through a speaker on the recipient device. Other embodiments are described and claimed.
Electronic consent
Method to record or prevent the recordation of consent between at least one sexual partner. If the partner cannot prove certain information, generally including but not limited to his or her level of intoxication, program instructions ensure that a menu of sexual acts will not be generated. If a menu of sexual acts is not presented, the sexual partner cannot override the program instructions.
Electronic consent
Method to record or prevent the recordation of consent between at least one sexual partner. If the partner cannot prove certain information, generally including but not limited to his or her level of intoxication, program instructions ensure that a menu of sexual acts will not be generated. If a menu of sexual acts is not presented, the sexual partner cannot override the program instructions.