Patent classifications
H04W12/068
INFORMATION PROCESSING METHOD AND APPARATUS BASED ON FACE RECOGNITION, STORAGE MEDIUM, AND TERMINAL
A method includes: in response to detecting a communication connection between the electronic device and the user equipment, obtaining a user instruction transmitted to the user equipment, the user instruction including at least one preset parameter for setting an interface feature of a target logical interface on the electronic device. The target logical interface is used for verifying an identity of a user. The method includes generating the target logical interface, by setting the interface feature based on the user instruction on the electronic device; obtaining verification information of a user; collecting a face image of the current user through the target logical interface; and verifying an identity of the current user based on the face image and the verification information.
Method and apparatus for accessing authentication credentials within a credential vault
A method at a computing device, the method including detecting, at the computing device, a trigger that authentication is pending for an application or service; indicating a state of a credential vault via a user interface of the computing device; and when the credential vault is in a locked state, activating an authentication mechanism for the credential vault without changing focus on the user interface for the application or service.
System and method for detecting the user using a single one-time password
An improved One Time Password (iOTP) is used in a two-factor authentication mechanism to decode a username, and the inherent security of the iOTP eliminates the need for a password. When the user is identified by the iOTP, a second challenge is sent. The second challenge may be confirmed by user biometrics or via a PIN code if the user's device does not support biometrics. Benefits of the subject invention include: (1) no username, which eliminates exposure to multiple domain attacks (i.e., attacks on other sites with the same username) that attempt to extract passwords from less secure sites (e.g., where a user used the same username and password across multiple sites); and (2) password-less access—the iOTP replaces both the username and password function, thereby eliminating the need for the user to manage multiple usernames and passwords.
System and method of dynamic and scalable IoT framework
A method and a system for providing one or more services to one or more user devices [202] in an IoT network in a scalable M2M (Machine to Machine) framework. The method comprises receiving a connection request from the one or more user devices [202] at a load balance of the IoT network, the connection request comprises at least a username comprising a cluster identifier. The load balancer [204] determines a cluster identifier based on the connection request and identifies at least one target cluster from the one or more clusters [206], said target cluster being associated with the identifier cluster identifier. The load balancer [204] routes the connection request to the at least one target cluster to provide the one or more services to the one or more user devices [202].
Management of near field communications using low power modes of an electronic device
Systems, methods, and computer-readable media for managing near field communications during a low power management mode of an electronic device are provided that may make credentials of a near field communication (“NFC”) component appropriately secure and appropriately accessible while also limiting the power consumption of the NFC component and of other components of the electronic device.
System and Method for Performing Identity Management
A method of verifying an identity of a wireless device. The method comprising receiving a calling station identity from a SIM of a wireless device, receiving a secure identifier derived by a secure element of the wireless device, comparing the received calling station identity to calling station identities of authorized wireless devices to identify obtain a corresponding wireless device identity, confirming whether the secure identifier is authentic and determining a second wireless device identity from the secure identifier, and comparing the first wireless device identity and the second wireless device identity to verify the identity of the wireless device.
Method and Processes For Securely Autofilling Data Fields in A Software Application
The present invention gives the methods and processes for automatically servicing user driven requests to find place-holder fields, fill them in with relevant data in a secure manner and securely communicating the data related thereto to the appropriate Android™ device and/or application. More particularly, it relates to the methods and processes for authenticated users to automatically obtain and use the correct filled-in data that allows them to access or use any of a multiple number of Android™ applications and/or services at any time.
USING MULTIPLE CREDENTIALS FOR ACCESS AND TRAFFIC DIFFERENTIATION
The disclosure relates in some aspects to establishing connectivity with a network using a first set of credentials and determining whether additional connectivity needs to be established (e.g., using a second set of credentials) to communicate data. The disclosure relates in some aspects to the use of multiple credentials for access and service connectivity. For example, traffic generated by a device may be authorized based on a different set of credentials than the set of credentials used to access the network (e.g., to connect to an LTE network for a PDN connection). In this way, traffic belonging to a specific service or application can be charged and policed based on service specific needs. The disclosure thus relates in some aspects to the use of access credentials and service credentials. These different types of credentials can be used to enable traffic differentiation and policing based on the credentials in use.
SOFTWARE APPLICATIONS AND INFORMATION APPARATUS FOR PRINTING OVER AIR OR FOR PRINTING OVER A NETWORK
Information apparatus and application software supporting printing over air or network are herein disclosed and enabled. The information apparatus may include one or more software components that include (1) a discovery component to discover a supported printer in a local area network (LAN) and to receive device information related to the printer (e.g., capability, language or format supported, identification) from the printer, and (2) a printing component to generate or obtain print data based on the device information received and to transmit the print data to the discovered printer. After establishing the connection to the LAN, application software (e.g., Internet browser, email, photos, documents) in the information apparatus may print digital content by using the discovery component to discover the printer in the LAN, and may use the printing component to obtain and transmit print data in a form that is acceptable to the printer for printing the digital content.
MOBILE APPLICATION BASED ACCOUNT AGGREGATION
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for automating the collection of user information for account aggregation. In one aspect, a method includes receiving, at a server computer system from a mobile device of a user, a first user request to access account information; receiving, at the server computer system from a provider computer system, a plury of mobile device applications; for each respective establishment of the plurality of establishments: storing, at the server computer system, establishment login credentials of the user to access account information of the user at a computer system of the respective establishment, and obtaining account information of the user at the respective establishment; aggregating, on the computer system, all the account information of the user from the respective mobile device application of each establishment; and providing to the mobile device the aggregated account information of the user.