H04L9/3228

CONTINUOUS AUTHENTICATION FOR DIGITAL SERVICES BASED ON CONTACTLESS CARD POSITIONING
20230050991 · 2023-02-16 · ·

Various embodiments are generally directed to continuous authentication of a user to a digital service based on activity of a contactless card positioned proximate to a computing device on which the digital service operates. For example, a series of periodic status messages may be provided between a client device and the contactless card to verify whether the contactless card remains active, wherein authorization to access the digital service continues while the contactless card is active, and terminates when the contactless card is inactive.

PERSONAL EMULATING DEVICE FOR EMULATING GLOBAL PHONE COMMUNICATION AS DOMESTIC MOBILE COMMUNICATION
20230048238 · 2023-02-16 ·

A personal emulating device for emulating global phone communication as domestic mobile communication comprises a Universal Subscriber Identity Module (USIM) authentication unit, an information confirmation unit, an authentication processing unit, and a linking unit. The USIM authentication unit includes: a USIM interface unit which interfaces with a USIM of a designated standard; an antenna unit which transmits and receives radio frequency signals of a designated mobile communication standard to and from a base station in a mobile communication network corresponding to the USIM interfaced to the USIM interface unit; and a radio unit which performs a signal processing operation for transmitting and receiving the radio frequency signals of the designated mobile communication standard to and from the base station in the mobile communication network corresponding to the USIM interfaced to the USIM interface unit.

ENCRYPTION METHOD AND SYSTEM FOR XENOMORPHIC CRYPTOGRAPHY
20230050628 · 2023-02-16 ·

The present invention relates to a method and system of cybersecurity; and particularly relates to an encryption method and system on the basis of cognitive computing for xenomorphic cryptography or unusual form of cryptography; said method comprises generating a Functional Neural Network or KeyNode (KN) of the system by programming a chain of multiple nodes also called Artificial Mirror Neurons (AMN) based on captured information of reaction time and emotional response to a simple task; racing the nodes in the Functional Neural Network or KeyNode (KN) as an encryption device or cipher for the time of use; generating a password at the time of use based on the sum of intrinsic values of the nodes in the racing network at this time and adopting the generated password for authentication. The present invention can be applied to secure online and mobile communication especially at the dawn of 5G with generalization of open API lifestyle platforms so as to allow real-time identification for digital cryptocurrency payments and other public distributed ledger technology (DLT) mechanisms.

REMOTE DEVICE LINKAGE FOR SECURE COMMUNICATIONS

Embodiments of the present invention provide a system for facilitating a secure way to allow primary users and secondary users to perform interactions remotely via an automated machine, such as an automated teller machine (ATM). In particular, the system may assign exclusive control over an automated device to a primary user via a computing device connected to the same local network or virtual private network as the automated machine, and may allow the primary user to communicate via the automated machine with a secondary user who wishes to complete one or more resource interactions. In some embodiments, the system may invoke one or more auxiliary devices on the same network to complete the interaction.

Apparatus and methods for secure distributed communications and data access
11582037 · 2023-02-14 · ·

A secure access control system configured to control access to sensitive data stored on disparate systems is disclosed. A first entity is designated to control access to second entity data. An authentication token, generated using a key derivation function, is used to authenticate the first entity. The authenticated first entity is granted access to second entity data. An access control interface is generated configured to selectively grant or withdraw access to second entity data. The access control interface identifies entities associated with respective access controls. The access control interface is instantiated on a first entity device. Activation indications of access controls is received over a network. Access to second entity data is accordingly granted or withdrawn. Access control transition event rules and/or access control transition time rules are retrieved. Using monitored events and the access control transition event rules, and/or a monitored current time and the access control transition time rules, a determination is made as to transition access control of the second entity data first entity to the second entity.

METHOD AND DEVICE FOR ANONYMOUS ACCESS CONTROL TO A COLLABORATIVE ANONYMIZATION PLATFORM
20230040929 · 2023-02-09 ·

A device and a method implemented by computer for authorizing, to a user having access rights granted by a first operator, a completely anonymous and secure access, with no trusted third-party, to a collaborative anonymization platform and/or to a service requiring privacy properties based on such a platform operated by various operators.

INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD, AUTHENTICATION DEVICE AND AUTHENTICATION METHOD, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD IN AUTHENTICATION SYSTEM, AND COMPUTER PROGRAM
20230043031 · 2023-02-09 ·

An information processing apparatus that performs multifactor and multistage authentication procedures is to be provided. An information processing apparatus includes: an authentication procedure processing unit that performs an authentication procedure on an external device, using a tamper-resistant secure element; and a control unit that controls a process for multistage authentication of the external device, the multistage authentication including the authentication procedure. The control unit controls a process of a second authentication procedure using the identification information about the secure element, the identification information being associated with the user account information. The control unit controls execution of the second authentication procedure during an operation in the login authentication procedure.

METHOD FOR GENERATING AND AUTHENTICATING THREE-DIMENSIONAL DYNAMIC OTP WITHOUT PASSWORD INPUT
20230042697 · 2023-02-09 ·

Disclosed is a method for generating and authenticating a three-dimensional dynamic OTP that does not require input of a password. In the method, a user address received from a user terminal is converted into coordinate values in degrees, minutes, and seconds on latitude and longitude, and set as address coordinates from the coordinates in a unit of seconds and then a two-dimensional reference coordinate system is displayed that is subdivided with the address coordinates as an origin, a two-dimensional function is provided and rotated about an arbitrary axis to form a three-dimensional space by a three-dimensional function, one OTP generation coordinate within the three-dimensional space is provided, and then a one-time password is generated by combining respective coordinate values of x, y, and z axes of the one OTP generation coordinate.

Efficient transfer of authentication credentials between client devices

An authentication system facilitates a transfer of enrollment in authentication services between client devices. The authentication system enrolls a client device in authentication services to enable the client device to be used for authenticating requests to access one or more services. As part of enrolling the client device, the authentication system receives authentication enrollment information for the client device that is associated with one or more authentication credentials securely stored on the client device (e.g., a multi-factor authentication (MFA) certificate). The authentication system facilitates one or more processes for transferring the enrollment from an enrolled client device to a non-enrolled client device that limit the number and complexity of actions performed by the user. In particular, the authentication system facilitates transfer of enrollment based on receiving enrollment transfer requests authorized by the enrolled client device using one or more authentication credentials associated with the enrollment of the enrolled client device.

Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts
11595374 · 2023-02-28 · ·

A permissions management system is disclosed for enabling a user to securely authorize a third-party system to access user account data and initiate transactions related to a user account, without disclosing to the third-party system account credentials. The system enables the user to also securely de-authorize the third-party system. For example, records may be automatically generated that securely store account information, including one or more permissions related to the account and/or the third-party. A token associated with a record may be shared with the third-party system, but neither the record itself, nor the user account credentials, may be shared with the third-party. Accordingly, the third-party may request user account data and/or initiate transactions by providing the token, but does not itself know, e.g., the user account credentials. Further, the user may set various permissions related to the token, and may also revoke the token (e.g., de-authorize the third-party), thus providing increased security to the user's account.