Patent classifications
G06F7/04
System and method for detecting an object of interest
A system and method for detecting an object of interest. An embodiment of a system or method may include receiving an indication an object of interest is present in a first area; obtaining, at the first area, a first set of unique characteristics of a respective set of mobile communication devices; receiving an indication the object of interest is present in a second area; obtaining, at the second area, a second set of characteristics of a respective second set of mobile communication devices; and associating a unique characteristic of a mobile communication device with the object of interest based on the first and second sets of characteristics.
System and methods for validating and managing user identities
A system and associated methods for validating and managing user identities are disclosed. In at least one embodiment, a central computing system is configured for receiving and processing data related to an at least one user and associated identity. A user account is established and associated with each user, the account containing at least one of a unique account identifier, an identity score representing a quality rating of the user based on the at least one identity, and an identity table containing details related to the at least one identity. In at least one embodiment, the computing system is capable of selectively validating the at least one identity, dynamically calculating the identity score associated with the at least one user, and even leveraging select unique identifying data to create a persistent multi-factor authentication process in conjunction with a mobile device associated with the at least one user.
Authentication system, authentication device, and authentication method
According to an embodiment, an authentication system includes a physical device, a calculator, and an authenticator. The physical device includes a data source which outputs a data sequence along time series. The calculator performs, using hidden Markov model, probability calculation on an ID which is based on the data sequence obtained from the physical device. The authenticator authenticates the physical device based on calculation result of the calculator.
Digital identity
The disclosure relates to a digital identity system for creating a computer stored digital identity. The system includes a network interface configured to send and receive electronic messages, persistent electronic storage, a profile management module executing on a processor configured to receive from an entity an electronic message comprising a data item, extract the data item from the electronic message and store the data item in a digital profile in the persistent electronic storage. The system also includes a credential creation module executing on a processor, a publication module executing on a processor, and a receipt generation module executing on a processor.
Image-based group profiles
An image of users of an application may be received from a computing device on a home network. The image may comprise representations of a group of users. Recognition techniques may be applied to the image. Unclaimed profiles may be created for users who are not recognized. The unclaimed profiles may be utilized by applications prior to being claimed by a user or group. Access to the unclaimed profiles may be controlled based on the identity of the network gateway used in the transmission of the image used as the basis for forming the profile.
Wireless access control system for a door including proximity based lock disabling and related methods
A wireless access control system for a door may include a lock assembly carried by the door that may include a lock, lock wireless communications circuitry, a proximity detector directed toward an interior area, interior and exterior antennas, and a lock controller. The lock controller may determine if the user is in the interior or exterior area based upon the proximity detector and a received signal strength at the interior and exterior antennas based upon wireless communication with a remote access device, enable lock switching based upon the received signal strength at the exterior antenna being greater than at the interior antenna, disable lock switching when the user is in the interior area and a difference between the received signal strength at the interior and exterior antennas is below a threshold, and switch the lock based upon communication with the remote access device and switching of the lock being enabled.
Systems and methods for detecting suspicious applications based on how entry-point functions are triggered
The disclosed computer-implemented method for detecting suspicious applications based on how entry-point functions are triggered may include (1) identifying an application that is capable of accessing a data-access Application Programming Interface (API) programmed to provide access to sensitive information located on a computing system and/or a data-transfer API programmed to send information outside of the computing system, (2) identifying an entry-point function of the application whose execution results in a call to the data-access API and/or the data-transfer API, (3) determining how the entry-point function is triggered, (4) determining whether the application is suspicious based on how the entry-point function is triggered, and (5) performing a security action based on whether the application is suspicious. Various other methods, systems, and computer-readable media are also disclosed.
Method and system for accessing service/data of a first network from a second network for service/data access via the second network
The present invention relates to a method for accessing service/data of a first network from a second network for service/data access via the second network, comprising the steps of a) Pairing of a user device with the first network, b) Attaching the user device to the second network, c) Authenticating the user device with the second network, d) Providing connectivity information for services/data of the first network to the second network, e) Providing available services/data information by the first network to the second network, f) Accessing a service and/or data of the first network by the second network. The present invention relates also to a system for accessing service/data of a first network from a second network for service/data access via the second network.
Associative search systems and methods
A computer system including a memory, at least one processor coupled to the memory, and a search component executable by the at least one processor is provided. The search component is configured to receive information descriptive of at least one search term; execute a first query against a plurality of documents that identifies at least one first document of the plurality of documents responsive to the at least one search term; identify one or more secondary terms associated with the at least one first document based on occurrence of the one or more secondary terms within the at least one first document; and provide a search result including at least one of the one or more secondary terms and one or more identifiers of one or more documents including the one or more secondary terms. The search result may also include one or more identifiers of bookmarked documents.
System and method for token domain control
A method for providing a token code in conjunction with a value token is disclosed. The token code serves as a shared secret for authenticating the use of the value token. Multiple token holders can possess the same value token, but each token holder may have a different token code for use with the value token.