Patent classifications
H04W12/77
Discovering an embedded subscriber identification module root discovery service endpoint
A method includes receiving a request to provision an embedded subscriber identity module (eSIM) profile to an eSIM-enabled device. The request includes a proxy eSIM identifier (EID) prefix. The eSIM profile is associated with a service provider of a mobile communication service a user of the device subscribes to. The method also includes determining whether the proxy EID prefix includes an address of a target discovery server the device is configured to connect to, and when the proxy EID prefix includes the address the method includes extracting the address of the target discovery server from the proxy EID prefix. Using the extracted address of the target discovery server, the method also includes registering a discovery event with the target discovery server indicating that the service provider has reserved the eSIM profile to the proxy EID or an actual EID assigned to the device.
Visual image authentication
Methods and systems described herein authenticate a user and help secure transaction. A display screen presents images that are difficult for malware to recognize but a person can recognize. In at least one embodiment, a person communicates transaction information using visual images received from the service provider system. In at least one embodiment, a user selects a sequence of visual images as a means of authenticating the user and logging into a financial account or other corporate account. In some embodiments, methods and systems are provided for determining whether to grant access, by generating and displaying visual images on a screen that the user can recognize, and select. In an embodiment, a user presses his or her finger or fingers on a display screen to select images as a method for authenticating and protecting communication from malware. In an embodiment, non-determinism in hardware helps unpredictably vary the image selected, the image location, generate noise in the image, or change the shape or texture of the image. In some embodiments, visual image authentication helps Alice and Bob detect if Eve has launched a man-in-the-middle attack on their key exchange.
Systems and methods for kiosk or payment terminal-based touchless interactions using mobile electronic devices
Systems and methods for kiosk or payment terminal-based touchless interactions using mobile electronic devices are disclosed. In one embodiment, at a cloud-based information processing apparatus comprising at least one computer processor, a method for interacting with a kiosk or payment terminal using a mobile electronic device may include: (1) receiving, from a mobile electronic device and at a uniform resource locator, a communication comprising an identifier for a kiosk or payment terminal comprising a screen; (2) receiving, from the mobile electronic device, touch data corresponding to user input to a touch-sensitive input on the mobile electronic device; and (3) communicating the touch data to the kiosk or payment terminal. The kiosk or payment terminal may graphically represent the touch data by moving a cursor on the screen.
ACTIVATION OF AN APPLICATION SESSION BASED ON AUTHENTICATION OF A USER DEVICE AND A CHARACTERISTIC OF THE USER DEVICE
In some implementations, a system may receive, from a user device, a user-side request associated with establishing an application session, wherein the user-side request includes an optical code. The system may receive, from an agent device, an agent-side request associated with the agent device joining the application session, wherein the agent-side request includes authentication information that indicates that the agent device scanned the optical code from an output component of the user device. The system may send, to the user device, a notification to permit the user device to join the application session. The system may activate the application session to permit the user device and the agent device to communicate via the application session.
Code-based Two Factor Authentication
Authenticating a user account to access a remote service from a user device includes: capturing a machine-readable image code displayed on the user device using a mobile device, wherein the image code is provided by the remote service; extracting and calling a corresponding session code embedded in the image code; determining whether a phone token is in storage; one of: (a) sending the phone token to the remote service, if the phone token is in the storage; or (b) prompting a user to enter credentials including username and password and sending the entered credentials to the remote service, if the phone token is not in the storage; and receiving access to the remote service for the user device, when the session code is valid and either the credentials are valid or the phone token is confirmed.
Method for providing assistance for pairing a Wi-Fi type terminal with a Wi-Fi type access point
Method for pairing a Wi-Fi type terminal with a Wi-Fi type access point connected to a display unit, the pairing method comprising the steps, implemented by the access point, of: detecting the presence of a terminal; detecting whether the terminal is located near the access point; if the presence of the terminal near the access point is detected, displaying a message proposing to pair the terminal to the access point on the display unit; when a pairing acceptance signal is received, displaying a pairing information message on the display unit providing assistance for pairing the terminal with the access point.
Access system for a structure
An access system and system for enabling a package to be delivered to a house are disclosed. The access unit includes a keypad, a light, and an activatable open button. The access unit opens a door to the structure when the button is pressed while active. The access unit also includes an authentication module configured to communicate via Bluetooth with a package delivery unit when the package delivery unit reaches a predetermined delivery distance near the structure and to authenticate the package delivery unit. The access unit also includes an execution module configured to store one or more rules pertaining to delivery of a package by the package delivery unit and to execute the one or more rules in response to the access unit successfully communicating with the package delivery unit, wherein one of the rules is to activate the activatable open button if the authentication is successful.
Verification Method, Electronic Device, and Non-Transitory Computer-Readable Storage Medium
A verification method, includes: in a case that the first operation does not meet a verification condition, adjusting a current value of a first sub-region in the verification region, or increasing an area of the first sub-region in the verification region, or adjusting a current value of a second sub-region in the verification region. The verification region includes the first sub-region and the second sub-region, and after the current value of the first sub-region or the current value of the second sub-region is adjusted, the current value of the first sub-region is greater than the current value of the second sub-region.
NETWORK MANAGEMENT SYSTEM TO ONBOARD HETEROGENEOUS CLIENT DEVICES TO WIRELESS NETWORKS
Techniques are described that enable onboarding of a plurality of heterogeneous client devices with secure access to a wireless network using a network management system (NMS). The NMS has a memory to store a plurality of private pre-shared keys (PPSKs), where each PPSK is provisioned for a particular client device or a particular group of client devices. In response to a key lookup request from an access point (AP) device for a client device, the NMS performs a key lookup and, in response to identifying a PPSK provisioned for the client device, authenticates the client device to access the wireless network via the AP device. The NMS then manages one or more of tracking the client device, policy application to the client device, or handling of network traffic from the client device while connected to the wireless network using the PPSK as an identifier of the client device.
SYSTEMS AND METHODS FOR SECURELY GENERATING AND PRINTING A DOCUMENT
Systems and methods for securely generating and printing documents are disclosed. For example, processor(s) of a computer system may receive information for the document from a computing device through a network, verify the information for the document, and upon verification, generate document generation data using at least a portion of the information for the document. The document generation data may include document metadata that enables generation of an image of the document and/or the image of the document. Upon the processor(s) verifying first authentication information of a first code associated with a printing device received from the computing device through the network and second authentication information of a second code associated with the computing device received from the printing device through the network, the processor(s) may transmit the document generation data to the printing device through the network, and cause the printing device to print the image of the document.