G06F21/43

Password-based authorization for audio rendering

A method and device for processing one or more audio streams based on password-based privacy restrictions is described. A device may be configured to receive unrestricted audio streams of the one or more audio streams based on privacy restrictions associated with a password, wherein the one or more audio streams are from audio elements represented in an acoustic environment that comprises one or more sub-acoustic spaces, each of the one or more audio streams representative of a respective soundfield, and generate the respective soundfields of the unrestricted audio streams.

Password-based authorization for audio rendering

A method and device for processing one or more audio streams based on password-based privacy restrictions is described. A device may be configured to receive unrestricted audio streams of the one or more audio streams based on privacy restrictions associated with a password, wherein the one or more audio streams are from audio elements represented in an acoustic environment that comprises one or more sub-acoustic spaces, each of the one or more audio streams representative of a respective soundfield, and generate the respective soundfields of the unrestricted audio streams.

Transaction authentication

A biometric token is generated for a user and provided to a user-operated device. A pre-staged transaction is defined by a user and the user supplies the token for association with the pre-staged transaction. Subsequently, a user visits a transaction terminal and a new candidate token is generated from biometric attributes of the user. The candidate token is matched to the token associated with pre-staged transaction to authenticate the user and the pre-staged transaction is processed at the transaction terminal as a completed transaction.

Transaction authentication

A biometric token is generated for a user and provided to a user-operated device. A pre-staged transaction is defined by a user and the user supplies the token for association with the pre-staged transaction. Subsequently, a user visits a transaction terminal and a new candidate token is generated from biometric attributes of the user. The candidate token is matched to the token associated with pre-staged transaction to authenticate the user and the pre-staged transaction is processed at the transaction terminal as a completed transaction.

DEVICE INTRODUCTION AND ACCESS CONTROL FRAMEWORK

In an embodiment, a method includes registering applications and network services for notification of an out-of-band introduction, and using the out-of-band introduction to bootstrap secure in-band provisioning of credentials and policies that are used to control subsequent access and resource sharing on an in-band channel. In another embodiment, an apparatus implements the method.

DEVICE INTRODUCTION AND ACCESS CONTROL FRAMEWORK

In an embodiment, a method includes registering applications and network services for notification of an out-of-band introduction, and using the out-of-band introduction to bootstrap secure in-band provisioning of credentials and policies that are used to control subsequent access and resource sharing on an in-band channel. In another embodiment, an apparatus implements the method.

Expedited user authentication

A system for granting access to an account at an access device includes a computer server having a hardware processor and a memory storing a software code. The hardware processor executes the software code to receive a login request from the access device through a first communications socket, open a second communications socket between the access device and the computer server, transmit a verification request message including a required call-to-action to a verification device through a third communications socket, and receive a verification response message verifying that the required call-to-action has been completed at the verification device. Upon receiving the verification response message, the software code sends an access token for accessing the account to the access device through the second communications socket, receives the access token from the access device, and grants the access device access to the account.

DEVICE AND METHOD FOR AUTHENTICATING A USER OF A FIRST ELECTRONIC DEVICE CONNECTED TO A SECOND ELECTRONIC DEVICE
20230237139 · 2023-07-27 ·

Authentication of a user of a first electronic device, such as a communication terminal or a virtual or augmented reality headset. The first electronic device is connected to a second electronic device, the first electronic device and the second electronic device being separately portable by the user. The authentication device includes an analyser capable of checking whether a detected value of a relative characteristic parameter of the second electronic device corresponds to a stored value of this relative characteristic parameter of the second electronic device associated with an identifier of a user requiring an authentication, the relative characteristic parameter corresponding to the characteristic parameter of the second electronic device measured relative to the characteristic parameter of the first electronic device.

DEVICE AND METHOD FOR AUTHENTICATING A USER OF A FIRST ELECTRONIC DEVICE CONNECTED TO A SECOND ELECTRONIC DEVICE
20230237139 · 2023-07-27 ·

Authentication of a user of a first electronic device, such as a communication terminal or a virtual or augmented reality headset. The first electronic device is connected to a second electronic device, the first electronic device and the second electronic device being separately portable by the user. The authentication device includes an analyser capable of checking whether a detected value of a relative characteristic parameter of the second electronic device corresponds to a stored value of this relative characteristic parameter of the second electronic device associated with an identifier of a user requiring an authentication, the relative characteristic parameter corresponding to the characteristic parameter of the second electronic device measured relative to the characteristic parameter of the first electronic device.

MULTI-LAYERED AUTHENTICATION AND PERMISSION METHODS, SYSTEMS AND APPARATUSES

A method can include receiving user input values via a plurality of inputs of a motor vehicle and determining if each received user input value corresponds to an authenticated user value in a secure memory of the motor vehicle. For each received user input value corresponding to an authenticated user value, a certainty factor corresponding to the authenticated user value can be accessed from a secure memory. A certainty score can be generated from all accessed certainty factors. Each of a plurality of permissions for operating or accessing the motor vehicle can be enabled in response to a comparison between the certainty score and a certainty threshold assigned to each permission. Corresponding devices and systems are also disclosed.