H04L63/0853

CONTINUOUS AUTHENTICATION FOR DIGITAL SERVICES BASED ON CONTACTLESS CARD POSITIONING
20230050991 · 2023-02-16 · ·

Various embodiments are generally directed to continuous authentication of a user to a digital service based on activity of a contactless card positioned proximate to a computing device on which the digital service operates. For example, a series of periodic status messages may be provided between a client device and the contactless card to verify whether the contactless card remains active, wherein authorization to access the digital service continues while the contactless card is active, and terminates when the contactless card is inactive.

Smart Device Management Method, Mobile Terminal, and Communication System
20230049074 · 2023-02-16 ·

A communication system includes a first mobile terminal, a second mobile terminal, a smart device, and a router. The first mobile terminal, the second mobile terminal, and the smart device each establish a Wi-Fi link to a Wi-Fi router. The first mobile terminal is configured to manage the smart device. The router performs similarity comparison on first connection information and second connection information based on the first connection information generated when the first mobile terminal is connected to the router and the second connection information generated when the second mobile terminal is connected to the router, for example, a connection time point and connection duration. If a similarity reaches a first threshold, the router sends prompt information to the first mobile terminal. The prompt information is used to prompt whether to share management permission on the smart device with the second mobile terminal.

AUTHENTICATION TIMERS
20230047564 · 2023-02-16 ·

A first device transmits a first message to a second device as part of a challenge-response protocol in order to authenticate the second device. A power limited power supply coupled to the second device limits power consumption by the second device during the second device's challenge-response protocol calculations. The first device measures a response time of the second device during the challenge-response protocol. The authentication of the second device is based on the response time of the second device while it has limited power consumption.

VXLAN ACCESS AUTHENTICATION METHOD AND VTEP DEVICE
20230048013 · 2023-02-16 ·

A VXLAN access authentication method includes: An authentication point device receives a VXLAN authentication packet, where the VXLAN authentication packet is a VXLAN packet. The VXLAN authentication packet includes a VXLAN header and an authentication request sent by a terminal, the VXLAN header includes a first VNI, and the authentication request includes an authentication credential. The authentication point device obtains permission of the terminal or a second VNI based on the authentication credential. The permission of the terminal corresponds to the second VNI. The authentication point device sends the permission of the terminal or the second VNI to a control point device, where the control point device is a device that encapsulates the authentication request into the VXLAN authentication packet. In this application, VXLAN access authentication is performed on an overlay network, so that configuration complexity can be reduced when a VXLAN access authentication mode is modified or created.

COMBINED SECURITY ACCESS SYSTEM
20230047088 · 2023-02-16 · ·

A combined security access system for a building that includes a controllable building component. The system includes a combined security access device connected to the building component. The access device further includes: a processor; a first memory device connected to the processor; a second memory device connected to the processor; and a wireless interface module connected to the processor. The access device may be connected to an external electronic device, and the external electronic device communicates with the processor of the access control system to control the building component.

SYSTEMS AND METHODS FOR ESTABLISHING A SECURE COMMUNICATION LINK IN AN ELECTRIC POWER DELIVERY SYSTEM

A non-transitory computer readable medium includes instructions that, when executed by processing circuitry, are configured to cause the processing circuitry to operate in a recovery mode after initiating a startup operation, transmit a data frame to a device of an electric power delivery system during the recovery mode, the data frame indicating a request for a security association key (SAK), receive the SAK from the device in response to transmitting the data frame, and use the SAK to communicate data via a media access control security (MACsec) communication link.

System for sending e-mail and/or files securely
11582205 · 2023-02-14 · ·

A system and method for facilitating secure transfer of encrypted files and/or messages can facilitate the secure transfer of encrypted files to a receiving user. The system can include: a computer program for facilitating sending of an e-mail message to a receiving user, the e-mail message including at least a web address of a trusted provider and instructions about how to securely download encrypted files without the receiving user setting up an account or a password, the transfer of encrypted files being facilitated by a code sent to a telephone of the receiving user.

Method for vehicle identification and communication between transportation network company (TNC) service users
11577691 · 2023-02-14 ·

A method for effective vehicle identification and communication between riders of transportation network companies (TNC), and the vehicles that are being designated to the riders. Accordingly, a system used to execute the method of the present invention conveys the information of the rider on a display device on the designated vehicle of the rider, so as to notify the rider before getting into the designated vehicle. Additionally, the present invention also helps assist blind people by conveying audio messages, such as pipe messages or announcing their names. Further, the present invention provides riders the ability to send an emergency alert, thereby ensuring a safer ride. Furthermore, the present invention enables TNCs to utilize the display device as a trade dress and as an optional platform for other media advertisements.

Enhanced and/or more efficient fixed-mobile convergence capabilities and/or device discovery capabilities within a telecommunications network
11582186 · 2023-02-14 · ·

A method for providing fixed-mobile convergence capabilities and/or device discovery capabilities within a telecommunications network includes: a specific client device or user equipment is connected to or connects to the home gateway device in order to connect to the telecommunications network; the home gateway device uses the connection to the specific client device or user equipment to initiate an exchange of messages according to an authentication or key exchange protocol, wherein the authentication or key exchange protocol is an extensible authentication protocol (EAP) or an enhanced authentication and key agreement (AKA), wherein identity information of the specific client device or user equipment is transmitted to the home gateway device as part of at least one message of the authentication or key exchange protocol; and the authentication or key exchange protocol is prematurely terminated.

Image forming apparatus and controlling method
11582236 · 2023-02-14 · ·

An image forming apparatus includes a communication interface and a processor. The communication interface is configured to transmit data to and receive data from a cloud server that provides a cloud service. The processor is configured to receive a token from the cloud server via the communication interface, transmit a request including the token to the cloud server via the communication interface, receive a response including user information from the cloud server via the communication interface, and shift to a login state based on the user information.