H04W12/77

Verified hosted information in online galleries

An apparatus verifies hosted information associated with a user. The apparatus establishes, by the online host serving as a relying party system (RPS), a secure connection between the RPS and a user mobile-identification-credential device (UMD). The RPS sends a mobile identification credential (MIC) user information request to the UMD, via the secure connection, seeking release of MIC user information (official information). The RPS obtains from authorizing party system (APS) verification of the MIC user information received in response to the MIC user information request. The RPS stores the MIC user information as hosted information pertaining to the user. The RPS designates the hosted information as base truth information representing the user.

Systems and methods for fraud prevention

A computing device establishes communication with a financial institution communication device, and receives an instruction for a user to perform an action to authenticate the user. The action includes providing user-provided data indicative of a location. The computing device determines first location information based on the user-provided data. The computing device also determines second location information using a location sensor. The computing device authenticates the used based on determining that the first location information correlates to the second location information.

METHOD AND APPARATUS FOR DYNAMICALLY PRESENTING CONTENT USING AN INTERFACE FOR SETTING CONDITIONAL NETWORK DESTINATIONS

QR codes or the like are used in hardlink applications, by which different users may receive different information in response to a user’s interaction with a touchpoint. The content delivered to a particular user in response to a hardlink code or a presented hyperlink may be dependent on the time of the scan, the geographic location of the user, a weather condition at the geographical location, personal information associated with the user, a number of previous scans of the code by prior individuals, and any combination of the these or other variables, which may be determined by an originator of the QR code or other party. User devices may be re-directed to alternate content or network addresses based on one or more programmed conditions.

COMPUTER-IMPLEMENTED METHOD AND SYSTEM FOR SECURE IDENTIFICATION OF DISCONNECTED OBJECTS AND THEIR LOCATIONS
20230179592 · 2023-06-08 · ·

A computer-implemented method for secure identification of a device being associated at a specific location, thus allowing a user to activate a procedure connected to the specific location where the device is placed, said device being disconnected from internet, comprising the following steps: an enrollment process performed through an application miming on a mobile device, said enrollment process associating the device hardware parameters to the specific location and recording and storing these data on a back-end application miming on a central system; a generation process performed on the device, said generation process generating and displaying on the device a graphical code OTP based with limited lifetime; a validation process of the graphical code OTP based; if the received graphical code OTB based is validated, the user is allowed to activate, through his mobile device, the procedure connected to the specific location.

System and method for securely connecting network devices

A platform, apparatus and method for Internet of Things Implementations. For example, one embodiment of a system comprises: an Internet of Things (IoT) hub comprising a network interface to couple the IoT hub to an IoT service over a wide area network (WAN), and programming logic to program an identification device with one or more encryption keys usable to establish encrypted communication with an IoT device; and at least one IoT device interfacing with the identification device following programming of the identification device by the IoT hub; wherein once the identification device is programmed and interfaced with the IoT device, the IoT device uses the one or more keys to establish a secure communication channel with the IoT hub and/or the IoT service.

THIRD-PARTY VEHICLE OPERATOR SIGN-IN

Systems and methods to authenticate a vehicle operator for an autonomous vehicle on a vehicle service platform are provided. In one example embodiment, a computer-implemented method includes obtaining authentication request data indicative of an authentication request, the authentication request data including at least an operator identifier associated with the vehicle operator and a vehicle identifier associated with the autonomous vehicle. The method includes providing a service code associated with the authentication request to the autonomous vehicle. The method includes obtaining from a user device in response to providing the service code to the autonomous vehicle, operator data associated with the authentication request, the operator data including the service code. The method includes determining an authentication result associated with the authentication request based at least in part on the service code and the operator data. The method includes providing the authentication result to the user device.

METHOD AND SYSTEM FOR PROVIDING LOCATION-AWARE MULTI-FACTOR MOBILE AUTHENTICATION

A method performs location-based multi-factor authentication. The method includes a mobile device that receives a first set of authentication credentials provided by a user, and transmits the first set of authentication credentials to an authentication server, which verifies the first set of authentication credentials. The authentication server transmits verified first factor authentication to the mobile device that sends a request for second factor authentication to an authentication system, which causes the mobile device to scan identifier information associated with a secure device, the secure device then sending a second set of authentication credentials to the authentication system. The authentication system verifies the second set of credentials system and transmits verified second factor authentication to the authentication server, which subsequently grants final authentication based on the verified first factor authentication and the verified second factor authentication.

Configurable hearing device for use with an assistive listening system

A hearing device adapted for use by a wearer comprises an audio streaming circuit configured to receive electromagnetic audio streaming via a first communication link. A configuration circuit is configured to receive configuration parameters via a second communication link different from the first communication link for configuring the hearing device to receive the electromagnetic audio streaming. Control circuitry of the hearing device configures the hearing device to enable reception of the electromagnetic audio streaming in accordance with the received configuration parameters.

Method and apparatus for dynamically presenting content using an interface for setting conditional network destinations

QR codes or the like are used in hardlink applications, by which different users may receive different information in response to a user's interaction with a touchpoint. The content delivered to a particular user in response to a hardlink code or a presented hyperlink may be dependent on the time of the scan, the geographic location of the user, a weather condition at the geographical location, personal information associated with the user, a number of previous scans of the code by prior individuals, and any combination of the these or other variables, which may be determined by an originator of the QR code or other party. User devices may be re-directed to alternate content or network addresses based on one or more programmed conditions.

SYSTEMS AND METHODS OF AUTHENTICATING ITEMS

In some embodiments, systems and methods provide distributed item authentication. In some embodiments systems comprise: a housing; a set of sensor systems; a transceiver; and an authentication control circuit configured to: obtain first sensor data of an item being authenticated, obtain an initial identification of the item; access an item authentication block specific to the item; obtain a first set of authentication instructions; control one or more sensor systems in accordance with the first set of authentication instructions; compare multiple current authentication sensor data to the set of multiple historic authentication sensor data; confirm that each of a threshold number of the multiple current authentication sensor data is consistent within a threshold variation of a corresponding one of the set of multiple historic authentication sensor data; and cause the item authentication block to be updated to include the confirmation of authentication of the item.