H04W12/68

SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR AUTHENTICATING A DEVICE BASED ON AN APPLICATION PROFILE
20230027202 · 2023-01-26 ·

Provided are computer-implemented methods for authenticating a mobile device based on a real-time mobile device application profile which may include generating, with a mobile device application on a mobile device, a real-time mobile device application profile associated with the mobile device, receiving the mobile device application profile by the mobile device; and determining whether there is an anomaly between the real-time mobile device application profile and a historical mobile device application profile associated with the mobile device. The methods may also include performing a remedial action associated with a transaction based on determining that there is an anomaly between the real-time mobile device application profile and the historical mobile device application profile. Systems and computer program products are also provided.

Method for confirming the identity of a user in a browsing session of an online service
20230027253 · 2023-01-26 ·

Method for confirming the identity of a user in a browsing session of an online service, comprising the steps of: a) providing a web server in which an online service resides, in communication with a client device provided with a user interface; b) providing a database associated with the web server in which a plurality of data relating to one or more users registered to the online service are stored; c) providing a script residing in the client device; d) identifying via script each browsing session on the online service and associating it with a user registered to the online service when the latter performs authentication; e) collecting via script biometric data generated by said at least one user interface and associating them with the user when authenticated; f) generating via script machine learning templates as a result of processing the biometric data; g) storing the biometric data and the machine learning templates locally in the client device; h) generating a score associated with the user as a result of processing via script new biometric data collected on said at least one user interface as a function of the machine learning templates generated in step f); i) sending the score to the web server; l) verifying the identity of the authenticated user as a result of processing the score by means of a security algorithm residing in the web server.

Home Toy Magic Wand Management Platform Interacting with Toy Magic Wands of Visitors
20230232237 · 2023-07-20 ·

The present disclosure is directed to facilitating the pairing of a visitor interactive object. An example method includes receiving, by a first interactive object from one or more sensors, data indicative of a visitor interactive object identifier associated with the visitor interactive object. The method includes generating, by the first interactive object, a pairing communication for the visitor interactive object that includes the visitor interactive object identifier and instructions to pair with the visitor interactive object. The method includes communicating, by the first interactive object, the pairing communication to a central computing device. The central computing device can be temporarily paired with the visitor interactive object based on the pairing communication. For instance, the method can include receiving, by the central computing device, the visitor pairing communication, generating a temporary visitor profile based on the visitor interactive identifier, and establishing the temporary wireless connection with the visitor interactive object.

Method to verify identity using a previously collected biometric image/data
11562055 · 2023-01-24 · ·

A system for remote identity verification including a computing device configured to capture a first image of the user a first distance and capture a second image at a second distance and then processing the images to create one or more facemaps. The facemaps are processed to verify that the images were captured from a live person. If the facemaps represents a live person, the facemaps and a user identifying code are sent to a trusted image server. The rusted image server configured to, using the user ID code, retrieve a trusted image from a database and generate a trusted image facemaps. Then, compare captured image facemaps to the trusted image facemaps. Responsive to a match between the captured image facemaps and the trusted image facemaps, send a message to the computing device, a third-party server, or both providing notice of the match.

Method to verify identity using a previously collected biometric image/data
11562055 · 2023-01-24 · ·

A system for remote identity verification including a computing device configured to capture a first image of the user a first distance and capture a second image at a second distance and then processing the images to create one or more facemaps. The facemaps are processed to verify that the images were captured from a live person. If the facemaps represents a live person, the facemaps and a user identifying code are sent to a trusted image server. The rusted image server configured to, using the user ID code, retrieve a trusted image from a database and generate a trusted image facemaps. Then, compare captured image facemaps to the trusted image facemaps. Responsive to a match between the captured image facemaps and the trusted image facemaps, send a message to the computing device, a third-party server, or both providing notice of the match.

Physical contact detection for device pairing
11706827 · 2023-07-18 · ·

Devices, methods, and systems for physical contact detection for device pairing are described herein. One device includes a mechanism configured to detect physical contact between the device and a wireless device, a memory, and a processor configured to execute executable instructions stored in the memory to perform a pairing of the wireless device and the device only upon the mechanism detecting the physical contact between the device and the wireless device.

IOT device risk assessment and scoring
11706246 · 2023-07-18 · ·

Techniques for establishing a risk score for Internet of Things (IoT) device parameters and acting in response thereto are disclosed. One or more data packets transmitted to or from an Internet of Things (IoT) device are analyzed to obtain event parameters. The event parameters are analyzed to determine a context of the IoT device. A behavior of the IoT device is determined based at least in part on the event parameters and the context. A progressive risk score is obtained for the IoT device. Subsequent to obtaining the progressive risk assessment score, the progressive risk assessment score is updated based at least in part on an analysis of one or more additional data packets.

IOT device risk assessment and scoring
11706246 · 2023-07-18 · ·

Techniques for establishing a risk score for Internet of Things (IoT) device parameters and acting in response thereto are disclosed. One or more data packets transmitted to or from an Internet of Things (IoT) device are analyzed to obtain event parameters. The event parameters are analyzed to determine a context of the IoT device. A behavior of the IoT device is determined based at least in part on the event parameters and the context. A progressive risk score is obtained for the IoT device. Subsequent to obtaining the progressive risk assessment score, the progressive risk assessment score is updated based at least in part on an analysis of one or more additional data packets.

Method and apparatus for securing a remote device
11706208 · 2023-07-18 · ·

A system and method for security of Internet of things (IoT) devices are discussed. A user of a mobile device, such as a customer of a wireless communication network, may remotely lock an IoT device while concomitantly assigning an ad hoc password to the IoT device that can be subsequently used to unlock the device. Alternatively, an IoT device may self-lock and produce a password in response to detecting its motion. The produced password may be provided to the user of a mobile device and used later to unlock the IoT device.

Method and apparatus for securing a remote device
11706208 · 2023-07-18 · ·

A system and method for security of Internet of things (IoT) devices are discussed. A user of a mobile device, such as a customer of a wireless communication network, may remotely lock an IoT device while concomitantly assigning an ad hoc password to the IoT device that can be subsequently used to unlock the device. Alternatively, an IoT device may self-lock and produce a password in response to detecting its motion. The produced password may be provided to the user of a mobile device and used later to unlock the IoT device.