Patent classifications
H04W12/065
MOBILE DEVICE TO PROVIDE ENHANCED SECURITY BASED UPON CONTEXTUAL SENSOR INPUTS
Disclosed is a mobile device to provide enhanced security based upon contextual sensor inputs. The mobile device may include: a biometric sensor; a contextual sensor; and a processor. The processor may be configured to: determine an authentication score based upon a biometric input received from the biometric sensor; modulate the authentication score based upon a contextual sensor input from the contextual sensor related to an event; and determine if the modulated authentication score falls below a predetermined threshold. If the authentication score falls below the predetermined threshold, the processor may command that a secondary authentication be performed.
AN INTEGRATED MOBILE PERSONAL ELECTRONIC DEVICE AND A SYSTEM TO SECURELY STORE, MEASURE AND MANAGE USERS HEALTH DATA
A mobile device, methods and systems provide the invention mobile Personal Health Records (PHR) management platform solution. The platform enables secure PHR data management, measuring user's medical parameters, managing PHR secured depository containing user's health data on the user's invention combined phone & add-on sleeve device, while blocking none legitimate users access to the invention devices secured storage content. The invention device user's authentication is based on the combined weighted fusion of at least two different human biological sensors within the device and their weighted output analysis. The multi-sensors ensure bio-authentication secured memory entry only for the legitimate device user. In case of authentication success it activates various types of applications on the user PHR data depository content stored in device. The system supports the user's PHR remote health management, remotely monitoring the user's measured medical parameters, updating & managing user's health medical history depository in the user's electronic sleeve.
Methods and systems for facilitating variable authentication of users on mobile devices
Methods and systems are described herein for an improved mechanism for authenticating users. In particular, the methods and systems facilitate variable authentication of users on mobile devices based on current and historical physical movement of the mobile devices at geographic locations and during predetermined time intervals while maintaining user privacy. Specifically, methods and systems authenticate users by comparing current motion data to historical motion data to determine if a user must be re-authenticated. For example, current motion data may be inconsistent with historical motion data and may cause re-authentication of a user. As another example, current motion data may be consistent with historical motion data and may not require re-authentication of a user. Moreover, the methods and systems alleviate privacy concerns by not transmitting sensitive data over one or more wired or wireless networks.
Self-authenticating intravascular device and associated devices, systems, and methods
A method of authorizing a limited use intravascular device can include determining if the intravascular device is in communication with a clinical system; determining if the intravascular device is authorized for clinical operation without providing the clinical system access to intravascular device data stored on the intravascular device; and providing an authorization signal to the clinical system. An intravascular device can include a flexible elongate member including a sensing component at a distal portion and a connector at a proximal portion, the connector including: a memory component configured to store a parameter value; a processing component; and a charge storage component configured to power the memory component and/or the processing component; wherein the processing component is configured to determine if the flexible elongate member is authorized for clinical operation using the parameter value without providing the parameter value to a clinical system.
Self-authenticating intravascular device and associated devices, systems, and methods
A method of authorizing a limited use intravascular device can include determining if the intravascular device is in communication with a clinical system; determining if the intravascular device is authorized for clinical operation without providing the clinical system access to intravascular device data stored on the intravascular device; and providing an authorization signal to the clinical system. An intravascular device can include a flexible elongate member including a sensing component at a distal portion and a connector at a proximal portion, the connector including: a memory component configured to store a parameter value; a processing component; and a charge storage component configured to power the memory component and/or the processing component; wherein the processing component is configured to determine if the flexible elongate member is authorized for clinical operation using the parameter value without providing the parameter value to a clinical system.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR AUTHENTICATING A DEVICE BASED ON AN APPLICATION PROFILE
Provided are computer-implemented methods for authenticating a mobile device based on a real-time mobile device application profile which may include generating, with a mobile device application on a mobile device, a real-time mobile device application profile associated with the mobile device, receiving the mobile device application profile by the mobile device; and determining whether there is an anomaly between the real-time mobile device application profile and a historical mobile device application profile associated with the mobile device. The methods may also include performing a remedial action associated with a transaction based on determining that there is an anomaly between the real-time mobile device application profile and the historical mobile device application profile. Systems and computer program products are also provided.
SYSTEM AND METHOD FOR DYNAMIC MULTI-FACTOR AUTHENTICATION
Systems and methods for authenticating users are described herein. One or more inputs including of biometric data, physical trait data, and other data sources may be collected passively when an individual is present in a space. A confidence ratio associated with one or more of the collected inputs may be determined. One or more of the determined confidence ratios may be evaluated together to determine a final confidence ratio for a user, on which an authentication decision is based. An access level may be selected from a plurality of access levels with different access privileges based on the determined confidence ratio. Authentication may be continuous or ongoing.
DYNAMIC MODIFICATION OF A VERIFICATION METHOD ASSOCIATED WITH A TRANSACTION CARD
A device may determine that a verification method associated with a transaction card is to be modified from a first verification method to a second verification method. The first verification method and the second verification method may use different types of verification information. The device may provide a set of instructions to the transaction card after determining that the verification method is to be modified. The set of instructions may cause the transaction card to modify the verification method from the first verification method to the second verification method. The device may provide information identifying a modification to the verification method to a transaction backend device to notify the transaction backend device that the verification method associated with the transaction card has been modified from the first verification method to the second verification method.
DYNAMIC MODIFICATION OF A VERIFICATION METHOD ASSOCIATED WITH A TRANSACTION CARD
A device may determine that a verification method associated with a transaction card is to be modified from a first verification method to a second verification method. The first verification method and the second verification method may use different types of verification information. The device may provide a set of instructions to the transaction card after determining that the verification method is to be modified. The set of instructions may cause the transaction card to modify the verification method from the first verification method to the second verification method. The device may provide information identifying a modification to the verification method to a transaction backend device to notify the transaction backend device that the verification method associated with the transaction card has been modified from the first verification method to the second verification method.
FACILITATING TRANSACTIONS WITH A USER ACCOUNT USING A WIRELESS DEVICE
A wireless device can store account identifiers and facilitate transactions. The wireless device can be loaded with user account identifiers and can be presented to various checkpoint devices. When presented, the wireless device can transmit a selected account identifier to the checkpoint device. In the context of a purchase transaction, the checkpoint device can be a point-of-sale terminal and the account data can be financial account data. In some instances, the wireless device can also facilitate a purchase transaction, e.g., by obtaining information about products to be purchased, constructing a purchase order from the product information, and transmitting the purchase order to a point-of-sale terminal.