H04W12/77

Authentication based on a physical key

A device may obtain registration data associated with a registration of an individual. The registration data may include an image that depicts a physical key and a reference object. The device may process the image to identify a first feature of the physical key and a first measurement of the first feature based on the size of the reference object. The device may store first feature data based on the first feature and the first measurement. The device may obtain second feature data based on a second feature of the physical key and a second measurement of the second feature identified from an insertion of the physical key into a keyhole of an authentication mechanism. The device may determine whether the first feature data corresponds to the second feature data. The device may authenticate the individual based on determining that the first feature data corresponds to the second feature data.

CONFIRMING AUTHENTICITY OF A USER TO A THIRD-PARTY SYSTEM

A telecommunications network server system provides a digital identifier to a user device. The digital identifier may include identification data corresponding to a user of the user device. In addition, the telecommunications network server system receives, from one or more third-party systems, requests to authenticate the user for an electronic transaction with the respective third-party system. The telecommunications network server system provides a unique electronic transaction code to each third-party system. Responsive to receiving from the user device one of the unique electronic transaction codes, the telecommunications network server system provides, to the respective third-party system, authentication of the user.

COUPON VALIDATION AND FRAUD MITIGATION

A method for preventing fraud in incentive transactions is provided that includes receiving metadata from a brand manufacturer for an incentive associated with a selected product, the metadata including a product identifier and a redemption rule. The method includes requesting a host to create a record in a distributed ledger for the incentive using the metadata, providing the incentive to a consumer via a mobile device, assigning a public address to the incentive, receiving from the host a first private key associated with the public address in the record, providing the first private key to the consumer, and receiving a second private key indicative of a redemption of the incentive at a retailer. The method includes validating redemption of the incentive and recording the redemption of the incentive at a retailer in the distributed ledger record when the redemption of the incentive is validated. A system to perform the above method is also provided.

EXPANDABLE SECURITY SYSTEM

A computer-implemented method includes receiving, by a base station of a first security system, an identification of a portable security system. The method further includes adding, by the base station, the portable security system as a sensor to a plurality of sensors monitored by the first security system. The method further includes configuring, by the base station, the portable security system in protect-mode, wherein the portable security system sounds an alarm in response to a sensor from the second system indicating a security-breach. The method further includes in response to the alarm from the portable security system, generating, by the base station, an alarm event of the first security system.

CLOUD-BASED MANAGEMENT SERVICE DEVICE REGISTRATION USING INTERMEDIATE CLOUD STORAGE

Techniques are described herein that are capable of registering a user device with a cloud-based management service using an intermediate cloud storage. For instance, the intermediate cloud storage may store an encrypted data blob including information that identifies the user device. The intermediate cloud storage or a registration system may decrypt the encrypted data blob so that the registration system may use the decrypted data blob to register the user device with the cloud-based management service. For instance, the registration system may retrieve the encrypted or decrypted data blob from the intermediate cloud storage by providing a requisite secret to the intermediate cloud storage. The requisite secret may be provided to the registration system by the user device (e.g., via a matrix barcode, such as a QR code).

Communication apparatus, communication method, and storage medium
11570619 · 2023-01-31 · ·

A communication apparatus includes an authentication unit that sets a communication parameter for connecting to a wireless network, and executes authentication processing, with a base station, for registering the communication apparatus to the base station that forms the wireless network, as a management apparatus that is allowed to connect another apparatus to the wireless network, a setting unit that, based on information acquired from code information captured through imaging, sets the communication parameter to another communication apparatus corresponding to the code information, and a registration unit that executes registration processing for registering the other communication apparatus to the base station as the management apparatus, based on at least a condition that the communication parameter is set to the other communication apparatus by the setting unit.

Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet
11711355 · 2023-07-25 · ·

Disclosed is a computer-implemented method for establishing a secure connection between two electronic computing devices which are located in a network environment, the two electronic computing devices being a first computing device offering the connection and a second computing device designated to accept the connection, the method comprising executing, by at least one processor of at least one computer, a connection-establishing application for exchanging an information packet between the first computing device and the second computing device comprising a secret usable for establishing the connection, and evaluating a response from the second computing device for establishing the secure connection.

Digital Contact Data Management and Distribution Systems and Methods
20230027966 · 2023-01-26 ·

Applications for creating, managing, and distributing digital contact data over large networks. Applications configured for implementation with electronic devices having touch-sensitive surfaces with displays, particularly mobile devices. Applications implemented with predictive keyboards for efficient, error-free searching of digital contact data and profiles. Applications for quickly sharing and distributing digital contact data over large networks via simple gestures over touch-sensitive surfaces.

Methods and Electronic Devices for Verifying Device Identity During Secure Pairing
20230023647 · 2023-01-26 ·

An electronic device includes a first communication device operable across a first medium of communication and a second communication device operable across a second medium of communication that is different from the first medium of communication. One or more processors operable with the first communication device and the second communication device obtain a client certificate digest from a prospective client device using the first communication device. Thereafter, the one or more processors receive a client certificate from a remote electronic device using the second communication device. The one or more processors then verifying that the prospective client device and the remote electronic device are the same device prior to establishing a secure communication session.

DATA PROCESSING UTILIZING A DIGITAL TAG
20230023350 · 2023-01-26 ·

A method is disclosed and includes receiving a push transfer message with a first transaction amount, and a digital tag, a credential or a token from an application server computer, in a transaction. In the transaction, a first user using a first user device interacts with a second user using the digital tag. The digital tag associated with the credential or the token, and the first user device has a transfer application that receives the digital tag and is in communication with the application server computer. The push transfer message is transmitted to an authorizing entity computer where a second amount is credited to the second user's account.