Patent classifications
H04W12/77
NON-TRANSITORY COMPUTER-READABLE MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR TERMINAL DEVICE AND COMMUNICATION DEVICE
A terminal device may obtain a third public key of a communication device, in a case where the third public key is obtained, send a third authentication request in which the third public key is used to the communication device, receive a third authentication response from the communication device, and send third connection information to the communication device. The third connection information may include a first identifier and a second identifier, the first identifier for identifying a first wireless network in which a first access point operates as a parent station, and the second identifier for identifying a second wireless network in which a second access point operates as a parent station.
Authenticating users to ATMs and other secure machines for cardless transactions
Systems, apparatus, methods, and computer program products for using quick response (QR) codes for authenticating users to ATMs and other secure machines for cardless transactions are disclosed. Embodiments of the present disclosure read an image displayed on a display of an external device using a mobile device associated with a user authorized to access a secure resource, decode transaction information encoded in the image, transmit the transaction information and an identifier of the mobile device from the mobile device to an authentication system, and grant access to the secure resource if the transaction information and the identifier satisfy an authentication test performed at the authentication system.
Method, user terminal, and service terminal for processing service data
A service terminal, which is communicatively coupled to a remote server, works with an offline user terminal to complete a service request initiated by a user of the user terminal. The service terminal repeatedly broadcasts a service message to neighboring user terminals until after receiving a service purchase request message wirelessly transmitted from a user terminal. The service terminal then suspends the broadcast of the service message and communicates the service purchase request to the remote server and receives a purchase confirmation message from the remote server. Next, the service terminal wirelessly transmits the purchase confirmation message back to the user terminal. From reading the purchase confirmation message, a user of the user terminal can tell whether the service purchase request has been completed successfully or not. If not, the service terminal then resumes the broadcast of the service message until after receiving another service purchase request message.
METHODS, TERMINAL AND SERVER FOR ENABLING SIGN-INS
There is disclosed a method of enabling sign-ins by a terminal in communication with a server located at a different location when compared to the terminal, the method comprising: in response to capturing a mobile device identifier displayed by a mobile device, determining whether or not the displayed mobile device identifier matches a visual identifier based on the captured identifier; upon determining that the displayed mobile device identifier matches the visual identifier, transmitting first sign-in information from the terminal to the server; in response to receiving a server identifier transmitted from the server, wherein the server identifier is generated by the server in response to receipt of the first sign-in information, displaying the received server identifier; and in response to receiving second sign-in information transmitted from the server, displaying a notification indicating a sign-in.
Systems and methods for short-range communication between devices
The present disclosure relates to systems and methods for communicating between devices using short-range communication links. More specifically, the present disclosure relates to systems and methods for communicating access-right data between devices for verification or transfer.
Interactive electronic communications and control system
A system comprising a database containing user data, an interface engine that communicates with the database and parses the data, an application server that communicates with the interface engine, a user device that receives and displays the parsed data, receives user-provided information, and sends the user-provided information to the application server, wherein the application server automatically updates the user device display with the parsed data, receives user-provided information from said user device, and provides the user-provided information to the interface engine for updating the database.
Assessing condition of real-world objects
A computer-implemented method of assessing the condition of a real-world object is provided. The computer-implemented method comprises: receiving sensor data depicting the real-world object; authenticating the received sensor data as genuinely depicting the real-world object; and if the authentication is successful, assessing a condition of the real-world object from the sensor data.
Systems and methods for authenticating a user at a public terminal
Systems and methods for authenticating a user to access a public terminal are described. Disclosed embodiments may include reading, using the physical credential reader, a user identifier from the physical credential device. Disclosed embodiments may also include transmitting the public terminal identifier and the user identifier to a secure server. Further, disclosed embodiments may include receiving, after completing the transmission, a unique code from the secure server. Disclose embodiments may additionally include displaying the unique code on the display device. Disclosed embodiments may include receiving, after displaying the unique code, an authentication message from the secure server. Disclosed embodiments may further include, responsive to receiving the authentication message, authorizing the user to use a terminal command at the public terminal.
Method for logging a target device into a network
A method for logging a target device onto a network comprising: transmitting an electronic log-on message from a terminal device to a universal communication platform by a user, the log-on message contains information about the identity of the target device and a log-on option to said network, and where at the time of transmission of the message, there is no communication link between the terminal device and the target device; integrating the log-on message into a log-on credentials message by the universal communication platform; transmitting the log-on credentials message from the universal communication platform to the user's terminal device; transmitting the information contained in the log-on credentials message as modulated light by the terminal device, acquiring said information through a light-sensitive sensor of the target device and extracting the information about the option to log onto said network, logging onto the network using the log-on option by the target device.
Mutual authentication security system with detection and mitigation of active man-in-the-middle browser attacks, phishing, and malware and other security improvements.
A strong, unified and comprehensive new computer security and authentication solution is disclosed. It is ideal for everyday users, and invents faster and easier enrollments, faster usage, easier usage, numerous aspects of stronger security including token based rapid mutual-authentication with protection against phishing, MitM, malware and user carelessness, secure resilience against token loss or theft, continuing protection in harsh situations, non-repudiation benefits, biometric encryption, code self-defenses, improved deployment, lower costs, new revenue opportunities, and more. One aspect's flow, visually-enforced mutual-authentication is: customer visits protected web site's login page, gets identified via Cookies, site displays one random photograph on said page, triggers customer's smartphone to automatically show a grid of random photos, one of which matches the login page photo, and customer taps it to login. Disclosed techniques teach how to block fraudulent sites and activity by preventing these producing any matching photo the customer can tap.