US12302089B2 - Wearable identity device for fingerprint bound access to a cloud service - Google Patents
Wearable identity device for fingerprint bound access to a cloud service Download PDFInfo
- Publication number
- US12302089B2 US12302089B2 US18/517,059 US202318517059A US12302089B2 US 12302089 B2 US12302089 B2 US 12302089B2 US 202318517059 A US202318517059 A US 202318517059A US 12302089 B2 US12302089 B2 US 12302089B2
- Authority
- US
- United States
- Prior art keywords
- personal digital
- user
- button
- radio
- crypto
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000003993 interaction Effects 0.000 claims abstract description 41
- 230000004044 response Effects 0.000 claims abstract description 27
- 238000000034 method Methods 0.000 claims description 52
- 238000004891 communication Methods 0.000 description 24
- 230000033001 locomotion Effects 0.000 description 24
- 230000009471 action Effects 0.000 description 19
- 230000008901 benefit Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 5
- VBMOHECZZWVLFJ-GXTUVTBFSA-N (2s)-2-[[(2s)-6-amino-2-[[(2s)-6-amino-2-[[(2s,3r)-2-[[(2s,3r)-2-[[(2s)-6-amino-2-[[(2s)-2-[[(2s)-6-amino-2-[[(2s)-2-[[(2s)-2-[[(2s)-2,6-diaminohexanoyl]amino]-5-(diaminomethylideneamino)pentanoyl]amino]propanoyl]amino]hexanoyl]amino]propanoyl]amino]hexan Chemical compound NC(N)=NCCC[C@@H](C(O)=O)NC(=O)[C@H](CCCCN)NC(=O)[C@H](CCCCN)NC(=O)[C@H]([C@@H](C)O)NC(=O)[C@H]([C@H](O)C)NC(=O)[C@H](CCCCN)NC(=O)[C@H](C)NC(=O)[C@H](CCCCN)NC(=O)[C@H](C)NC(=O)[C@H](CCCN=C(N)N)NC(=O)[C@@H](N)CCCCN VBMOHECZZWVLFJ-GXTUVTBFSA-N 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 108010068904 lysyl-arginyl-alanyl-lysyl-alanyl-lysyl-threonyl-threonyl-lysyl-lysyl-arginine Proteins 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000001020 rhythmical effect Effects 0.000 description 1
- 238000010079 rubber tapping Methods 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 210000000707 wrist Anatomy 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/009—Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B5/00—Near-field transmission systems, e.g. inductive or capacitive transmission systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/025—Services making use of location information using location based information parameters
- H04W4/027—Services making use of location information using location based information parameters using movement velocity, acceleration information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A personal digital ID device provides a digital identifier to a service for a predetermined duration in response to user interaction. The user interaction may include a button press. The personal digital ID device may be in the form of a bracelet, a key fob, or other form factor. The service may be provided by a mobile device, in the cloud, or elsewhere.
Description
This application is a Continuation of, and claims the benefit of priority to U.S. patent application Ser. No. 18/056,250, filed Nov. 16, 2022, and now issued as U.S. U.S. Pat. No. 11,832,095 on Nov. 28, 2023, and which is a Continuation of, and claims the benefit of priority to U.S. patent application Ser. No. 17/315,148, filed May 7, 2021, now issued as U.S. Pat. No. 11,523,273 on Dec. 6, 2022, which is a Continuation of, and claims the benefit of priority to U.S. patent application Ser. No. 16/932,088, filed Jul. 17, 2020, now issued as U.S. Pat. No. 11,006,271 on May 11, 2021, which is a Continuation of, and claims the benefit of priority to U.S. patent application Ser. No. 16/675,670, filed Nov. 6, 2019, now issued as U.S. Pat. No. 10,721,071 on Jul. 21, 2020, which is a Continuation of, and claims the benefit of priority to U.S. patent application Ser. No. 16/257,956, on Jan. 25, 2019, now issued as U.S. Pat. No. 10,476,675, on Nov. 12, 2019, which is a Continuation of, and claims the benefit of priority to U.S. patent application Ser. No. 15/903,935, on Feb. 23, 2018, now issued as U.S. Pat. No. 10,211,988 on Feb. 19, 2019, which is a Continuation of, and claims the benefit of priority to U.S. patent application Ser. No. 15/069,548, on Mar. 14, 2016, now issued as U.S. Pat. No. 9,906,365 on Feb. 27, 2018, which is a Continuation of, and claims the benefit of priority to U.S. patent application Ser. No. 13/843,402, on Mar. 15, 2013, now issued as U.S. Pat. No. 9,319,881 on Apr. 19, 2016, and which is incorporated by reference in entirety.
The present invention relates generally to mobile devices, and more specifically to identity representation in mobile devices.
Mobile devices typically authenticate to cloud services using passwords. For example, as shown in FIG. 1 , mobile device 100 may prompt a user for a password in order access cloud service 102. This operation is also shown in FIG. 2 , where an application is started on the mobile device, and then a user enters a password to access the cloud service.
As an example, a user may open a web browser on a smartphone (or any other app on the mobile device) and then navigate to a merchant's website (cloud service). The merchant website then prompts for the user's password prior to allowing the user access to the user's account at the merchant. The user's account at the merchant may store sensitive information such as credit card numbers, addresses, phone numbers, and the like.
Password-based cloud service authentication is vulnerable to hacking. If a hacker gains access to a password file (storing hashed passwords) from the merchant, then the universe of hashed password values can be compared to entries in the password file to gain access to individual user accounts. Sensitive user information may be compromised as a result.
In the following detailed description, reference is made to the accompanying drawings that show, by way of illustration, various embodiments of an invention. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention. It is to be understood that the various embodiments of the invention, although different, are not necessarily mutually exclusive. For example, a particular feature, structure, or characteristic described in connection with one embodiment may be implemented within other embodiments without departing from the scope of the invention. In addition, it is to be understood that the location or arrangement of individual elements within each disclosed embodiment may be modified without departing from the scope of the invention. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is defined only by the appended claims, appropriately interpreted, along with the full range of equivalents to which the claims are entitled. In the drawings, like numerals refer to the same or similar functionality throughout the several views.
The digital identifier provided by personal digital ID device 300 may be used for authentication. For example, the user in possession of personal digital ID device 300 may interact with the device for the purpose of authenticating to mobile device 330 or authenticating to a service in communication with mobile device 300. Personal digital ID device 300 may take any form. For example, personal digital ID device 300 may be a bracelet, a card, a key fob, or the like.
In some embodiments, radio link 402 is a near-field radio link and in other embodiments, radio link 402 is a non-near-field radio link. For example, radio link 402 may be a BLUETOOTH™ radio link (non-near-field), or may be a near-field communications (NFC) radio link (near-field) such as an ISO 14443 compatible radio link, an ISO 18092 compatible radio link, or an IEEE 802.15.4 compatible radio link.
As used herein, the term “near-field” refers to communication protocols and compatible radios in which the maximum intended communication distance is less than the wavelength of the radio wave used for that communication. ISO 14443 (NFC) is an example of near-field because the wavelength is on the order of 870 inches and the intended communication distance is only a few inches. All communications protocols and compatible radios that are not near-field are referred to herein as “non-near-field.” An example of a non-near-field protocol is BLUETOOTH™ because the wavelength is on the order of 4.5 inches and the intended communication distance is typically much greater than 4.5 inches. The use of the term “non-near-field radio” is not meant to imply that the distance of communication cannot be less than the wavelength for the non-near-field radio.
Personal digital ID device 400 includes button 410 and light emitting diodes (LEDs) 420. In some embodiments, personal digital ID device 400 includes a housing in the shape of a personal accessory. For example, personal digital ID device 400 is shown as a bracelet in FIG. 4 . In some embodiments the housing is flexible, such that the personal digital ID device may be stretched. In other embodiments, the housing is rigid. One skilled in the art will understand that personal digital ID device 400 may be constructed from various different materials to achieve a desired level of pliability, and constructed in various different shapes and sizes.
In operation, a user may start an application on mobile device 330 with the intention of accessing cloud services 440. The application then prompts the user to press button 410 on personal digital ID device 400. Personal digital ID device 400 then communicates with mobile device 330 over radio link 402. In some embodiments, personal digital ID device 400 includes security hardware that provides a secure level of authentication only after button 410 is pressed. In these embodiments, user interaction (button press) with personal digital ID device 400 is required before authentication can take place.
In some embodiments, secure authentication may take place between personal digital ID device 400 and mobile device 330. For example, a button press may make security hardware within personal digital ID device 400 available for authentication purposes for a predetermined period of time. Mobile device 330 may then communicate with security hardware within personal digital ID device 400 to authenticate the user to the mobile device.
In other embodiments, secure authentication may take place between personal digital ID device 400 and cloud service 440. For example, a button press may make security hardware within personal digital ID device 400 available for authentication purposes for a predetermined period of time. Cloud service 440 may then communicate with the security hardware within personal digital ID device 400 to authenticate the user to the cloud service. Because personal digital ID device 400 uses radio link 402 to reach mobile device 330 which in turn uses communication link 432 to reach service 440, one can say that in some embodiments, personal digital ID device 400 is able to communicate with service 440 with the mobile device 330 as an intermediary. In these embodiments, both mobile device 330 and personal digital ID device 400 are used for successful access to service 440.
Because personal digital ID device 400 requires user interaction before making the security hardware available, a user must be in possession of personal digital ID device 400 in order to be authenticated. This is significantly more robust than a password-only authentication method. Hackers are unable to hack into a user's account using software techniques alone.
An example authentication sequence between personal digital ID device 400 and cloud service 440 is now described. This example uses an online bookseller as the cloud service, a smartphone as the mobile device, and a bracelet shaped personal digital ID device with a button. The online bookseller stores credit card information in a user's account and requires users to authenticate to the cloud service before allowing access to the user's account.
A user in possession of both personal digital ID device 400 and mobile device 330 wishes to purchase an item from the bookseller's online store. The user opens an application on mobile device 330. This application may be a web browser or any other application that provides access to the bookseller's online store. The mobile device then prompts the user to press the button on the personal digital ID device in order to authenticate. The user presses the button and is authenticated to the online bookseller. In some embodiments, this is the extent of user involvement in the authentication process. That is to say, after one button press, the user is authenticated. In other embodiments, the authentication sequence may require more interaction from the user. For example, the user may also be required to enter a password or answer a security question using mobile device 330, or the like.
The user authenticated by pressing the button once in previous example. In some embodiments, the user authenticates by pressing the button twice or more times. In still further embodiments, the user is authenticated only after pressing the button for longer than a predetermined duration of time (e.g., longer than a threshold).
After the user interacted with the button, one more action took place without the user's involvement. For example, in response to the button press, personal digital ID device 400 made a security mechanism available or communication over radio link 402. In some embodiments, personal digital ID device 400 makes the security device available by powering up a radio for a predetermined amount of time.
Personal digital ID device 600 includes controller 610, radio 620, button 410, LEDs 420, and crypto/cipher engine 632 with digital identifier 633. Button 410 is an example of a hardware-based interaction device as described above. LEDs 420 are also described above. Radio 620 may be any type of radio, including a near-field radio or a non-near-field radio.
Crypto/cipher engine 632 is any device that can provide a secure data store and/or encryption capabilities in the service of personal digital ID device 600. For example, in some embodiments, crypto/cipher engine 632 may be a dedicated secure storage and computation area within controller 610 that stores and processes digital identifier 633, either as encrypted data or as clear data or in any combination of encrypted and clear data. In other embodiments, controller 610 is part of the crypto/cipher engine 632 and crypto/cipher engine 632 is a smartcard secure element. In other embodiments, crypto/cipher engine 632 is separate from controller 610, such as a smartcard secure element. Various embodiments having smartcard secure elements are described in more detail below.
In operation, personal digital ID device 600 provides identity and/or authentication services to a user in response to user interaction with the device. For example, in some embodiments, controller 610 turns on radio 620 for a predetermined period of time (e.g., a few seconds to a few minutes) in response to user interaction with button 410. Also for example, in some embodiments, controller 610 makes services provided by crypto/cipher engine 632 (including, but not limited to, digital identifier 633) available over radio link 620 for a predetermined period of time in response to user interaction with button 410. The ID and/or authentication services may be used to authenticate a user to a mobile device or to a cloud service, or to any other service. The predetermined period of a few seconds to a few minutes is provided as an example, and the various embodiments of the invention are not so limited.
In some embodiments, digital identifier 633 may be a password, a fingerprint, or other user authentication factor (UAF), encrypted or in the clear; digital certificates, keys, keys for symmetric or asymmetric cryptography functions, unique digital identifiers, or the like. The UAF can come to the personal digital ID device via any of the radio links, or from the personal digital ID device itself, or any combination thereof.
In some embodiments, digital identifier 633 includes two shared secret keys K1 and K2 that are shared with a cloud service. Once personal digital ID device 600 is made available to a cloud service, the digital ID device could generate a random number R1, encrypt it with the shared secret key K1, and send it to the cloud service. The cloud service will then decrypt R1 with key K1, then encrypt with key K2 both R1 and another random value R2 and send the result back to personal digital ID device 600. Personal digital ID device 600 will then decrypt this payload with K2. If it successfully recovers R1, then it knows that it is communicating with an authenticated cloud service that it trusts. Personal digital ID device 600 then encrypts R2 back with K1 and sends it to the cloud service which will in turn decrypt it with K1 and if it successfully recovers R2, then it knows that it is communicating with an authenticated personal digital ID device it trusts. The use of K1, K2, R1, and R2 are mere examples. The authentication sequence of events is also provided as an example. Other embodiments use different authentication sequences. The authentication sequence mentioned above could involve more complex steps such as the use of public key infrastructure standards such as PKCS or involve methods for challenge-response. The connection made available could not only be used for authentication or mutual authentication but also for establishment of a secure channel between the personal digital ID device and the cloud service where additional unique data stored in the personal digital ID device such as payment information could then be communicated securely by encrypting with a session specific key such as R2 to enact transactions in the cloud service.
Again, the use of R2 for secure communication post secure mutual authentication is only to be considered an example. The entire set of processes defined above is to illustrate what it means to make the personal digital ID device available to a service in response to user interaction. Many such processes are possible and known to those skilled in the art of security engineering, cyber security, secure identity, identity management, trusted service management, or smartcard protocols. Such processes could also help the intermediate device send secure information to a cloud service or receive secure information from the cloud service. Such secure information could be but not limited to transactions and outcomes, additional personal information, files, emails, voice connections, and messages.
Personal digital ID device 700 includes processor 710, non-near-field radio 720, button 410, LEDs 420, memory 712, charging circuits 722, battery 724, sensors 740, secure element (SE) 732, and near-field radio 734. Button 410 is an example of a hardware-based interaction device as described above. LEDs 420 are also described above. Although FIG. 7 shows a non-near-field radio communicating over link 702, this is not a limitation of the present invention. For example, in some embodiments, radio 720 is a near-field radio.
In some embodiments, secure element 732 is combined with near-field radio 734 in a single integrated circuit such as a smartcard controller. In other embodiments, secure element 732, or a combination of secure element 732 and near-field radio 734 are integrated into another semiconductor device such as processor 710.
Examples of smart card controllers that combine secure element 732 with near-field radio 734 are the “SmartMX” controllers sold by NXP Semiconductors N. V. of Eindhoven, The Netherlands. In some embodiments, the secure element has an ISO/IEC 7816 compatible interface that communicates with other components within personal digital ID device 700 (e.g., processor 710), although this is not a limitation of the present invention.
In some embodiments, secure element 732 includes applets, keys and digital certificates. Digital certificates are used to validate the identity of the certificate holder. Certificate authorities typically issue digital certificates. Digital certificates and their functionality are well known. Secure element applets and encryption keys are also well known. In some embodiments, personal digital ID device 700 makes available one or more of applets, keys, and/or digital certificates available to a service using either radio 720 or 734 in response to user interaction for a predetermined duration. Applets, keys, and certificates are examples of digital identifier 633 (FIG. 6 ).
Personal digital ID device 800 includes all the component of personal digital ID device 700 (FIG. 7 ), and also includes multiple secure elements 832. In some embodiments, the different secure elements are used for different purposes. For example, one secure element may be used for access control, while another secure element may be use for payments, and still another secure element may be used for authentication to a service.
Personal digital ID device 900 communicates with mobile device 900 after user interaction. Example user interactions include, but are not limited to, button presses, motions, fingerprints, images, audio communications, or the like or any combination thereof. Examples of these user interactions and others are described more fully below.
In some embodiments some or all of the user authentication factors (UAF) such as fingerprints, motions, images or even passwords or PIN, or the like, or any combination thereof or any representation of such, could come to the personal digital ID device including 900 via the a radio link such as the BLUETOOTH™ non-near-field radio from a mobile device such as the laptop computer. The type of radio link (e.g. BLUETOOTH™) and the type of mobile device (e.g. laptop computer) for the personal digital ID device to receive UAF are provided as examples and the various embodiments of the invention are not so limited.
Personal digital ID device 900 communicates with POS 1010 after user interaction. Example user interactions include, but are not limited to, button presses, motions, fingerprints, images, audio communications, or the like or any combination thereof. Examples of these user interactions and others are described more fully below.
In some embodiments, this corresponds to processor 710 (FIG. 7 ) receiving a fingerprint when the user presses the button. The fingerprint (or data representing the fingerprint) may be passed to SE 732 for comparison with a stored fingerprint to validate the user. If there is a match, the user is validated, and then the personal digital ID device may allow communication with a service outside the device.
Fingerprints may also be collected or verified during setup or configuration of personal digital ID device 1200. Setup and configuration are described more fully below.
In some embodiments the fingerprint user authentication factor comes to personal digital ID device 1200 via its radio link.
In some embodiments, this corresponds to processor 710 (FIG. 7 ) receiving data from motion sensor 1420 that describes motion of the device. The data representing the motion may be passed to SE 732 for comparison with a stored value to validate the user. If there is a match, the user is validated, and then the personal digital ID device may allow communication with a service outside the device.
Motion data may also be collected or verified during setup or configuration of personal digital ID device 1400. Setup and configuration are described more fully below.
In some embodiments the motion data user authentication factor comes to the personal digital ID device 1400 via its radio link.
In FIG. 16 , a user is shown interacting with personal digital ID device 1400 by making fine movements. In some embodiments, the fine movements are performed making a series of tapping motions with varying spacing and intensity. This may be viewed by a user as similar to typing a password, but instead of remembering and typing a character sequence, the user remembers and taps a rhythmic sequence.
In some embodiments, this corresponds to processor 710 (FIG. 7 ) receiving an image from imager 1710. The image may be of anything. For example, the image may be of a user's face, a user's personal possession, a landmark, or any other item. The data representing the image may be passed to SE 732 for comparison with a stored value to validate the user. If there is a match, then the personal digital ID device may allow communication with a service outside the device.
Image data may also be collected or verified during setup or configuration of personal digital ID device 1700. Setup and configuration are described more fully below.
In some embodiments the captured image user authentication factor comes to the personal digital ID device 1700 via its radio link.
In some embodiments, this corresponds to processor 710 (FIG. 7 ) receiving audio data from microphone 1910. The audio may represent anything. For example, a user may speak a phrase or provide another signature. The data representing the audio may be passed to SE 732 for comparison with a stored value to validate the user. If there is a match, the user is validated, and then the personal digital ID device may allow communication with a service outside the device. In some embodiments, this corresponds to performing a voiceprint analysis.
Audio data may also be collected or verified during setup or configuration of personal digital ID device 1900. Setup and configuration are described more fully below.
In some embodiments the audio information user authentication factor comes to the personal digital ID device 2000 via its radio link.
In some embodiments, the actions of method 2300 are performed by a processor configured to perform the operations by virtue of stored software instructions. For example, processor 710 (FIG. 7 ) may be configured to perform actions corresponding to receiving user interactions, and making a digital identifier available for a predetermined time in response thereto. The digital identifier may be made available by turning one or more radios, such as a near-field radio and/or a non-near-field radio.
In some embodiments, the actions of method 2400 are performed by a processor configured to perform the operations by virtue of stored software instructions. For example, processor 710 (FIG. 7 ) may be configured to perform actions corresponding to receiving user interactions, and performing different actions based on the type of user interaction that occurred.
Although the present invention has been described in conjunction with certain embodiments, it is to be understood that modifications and variations may be resorted to without departing from the spirit and scope of the invention as those skilled in the art readily understand. Such modifications and variations are considered to be within the scope of the invention and the appended claims.
Claims (20)
1. A method comprising:
scanning a fingerprint when a user interacts with a button;
making available one or more keys for a challenge-response to validate the user with a cloud service by powering a radio for a predetermined duration in response to the validated user interacting with the button; and
displaying a battery level in response to a second interaction with the button, wherein the button is part of a wearable personal digital device.
2. The method of claim 1 , wherein the one or more keys are part of a digital identifier which is part of a crypto/cipher engine.
3. The method of claim 2 , wherein the crypto/cipher engine is user-removable from the wearable personal digital device.
4. The method of claim 2 , wherein the crypto/cipher engine comprises a smartcard controller.
5. The method of claim 2 , wherein the crypto/cipher engine resides on a subscriber identity module card.
6. The method of claim 1 , wherein the one or more keys comprise a symmetric key.
7. The method of claim 1 , wherein the one or more keys comprises an asymmetric key.
8. The method of claim 1 , wherein scanning the fingerprint comprises positioning a finger of the user on a fingerprint sensor which is positioned on a surface of the button.
9. The method of claim 1 further comprising modifying an electrical functionality of the wearable personal digital device by opening a connector of a housing coupled to the button.
10. The method of claim 1 , wherein the radio comprises a near-field radio.
11. The method of claim 10 , wherein the near-field radio comprises an ISO 14443 compatible radio.
12. The method of claim 10 , wherein the near-field radio comprises an ISO 18092 compatible radio.
13. The method of claim 1 , wherein the radio comprises a non-near-field radio.
14. The method of claim 13 , wherein the non-near-field radio comprises a Bluetooth radio.
15. The method of claim 1 , wherein the radio comprises a near-field radio and a non-near-field radio.
16. A non-transitory machine-readable storage medium having one or more machine-executable
instructions that when executed cause a processor to perform a method comprising:
scanning a fingerprint when a user interacts with a button;
validating the user with a cloud service by applying one or more keys for a challenge-response;
powering a radio for a predetermined duration in response to validating the user after the user interacts with the button; and
displaying a battery level in response to a second interaction with the button, wherein the button is part of a wearable personal digital device.
17. The non-transitory machine-readable storage medium of claim 16 , wherein the one or more keys are part of a digital identifier which is part of a crypto/cipher engine.
18. The non-transitory machine-readable storage medium of claim 17 , wherein the crypto/cipher engine is user-removable from the wearable personal digital device.
19. The non-transitory machine-readable storage medium of claim 17 , wherein the crypto/cipher engine comprises a smartcard controller.
20. The non-transitory machine-readable storage medium of claim 17 , wherein the crypto/cipher engine resides on a subscriber identity module card.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/517,059 US12302089B2 (en) | 2013-03-15 | 2023-11-22 | Wearable identity device for fingerprint bound access to a cloud service |
Applications Claiming Priority (9)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/843,402 US9319881B2 (en) | 2013-03-15 | 2013-03-15 | Personal digital identity device with fingerprint sensor |
US15/069,548 US9906365B2 (en) | 2013-03-15 | 2016-03-14 | Personal digital identity device with fingerprint sensor and challenge-response key |
US15/903,935 US10211988B2 (en) | 2013-03-15 | 2018-02-23 | Personal digital identity card device for fingerprint bound asymmetric crypto to access merchant cloud services |
US16/257,956 US10476675B2 (en) | 2013-03-15 | 2019-01-25 | Personal digital identity card device for fingerprint bound asymmetric crypto to access a kiosk |
US16/675,670 US10721071B2 (en) | 2013-03-15 | 2019-11-06 | Wearable personal digital identity card for fingerprint bound access to a cloud service |
US16/932,088 US11006271B2 (en) | 2013-03-15 | 2020-07-17 | Wearable identity device for fingerprint bound access to a cloud service |
US17/315,148 US11523273B2 (en) | 2013-03-15 | 2021-05-07 | Wearable identity device for fingerprint bound access to a cloud service |
US18/056,250 US11832095B2 (en) | 2013-03-15 | 2022-11-16 | Wearable identity device for fingerprint bound access to a cloud service |
US18/517,059 US12302089B2 (en) | 2013-03-15 | 2023-11-22 | Wearable identity device for fingerprint bound access to a cloud service |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/056,250 Continuation US11832095B2 (en) | 2013-03-15 | 2022-11-16 | Wearable identity device for fingerprint bound access to a cloud service |
Publications (2)
Publication Number | Publication Date |
---|---|
US20240349038A1 US20240349038A1 (en) | 2024-10-17 |
US12302089B2 true US12302089B2 (en) | 2025-05-13 |
Family
ID=51529320
Family Applications (9)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/843,402 Active 2033-05-23 US9319881B2 (en) | 2013-03-15 | 2013-03-15 | Personal digital identity device with fingerprint sensor |
US15/069,548 Active 2033-05-01 US9906365B2 (en) | 2013-03-15 | 2016-03-14 | Personal digital identity device with fingerprint sensor and challenge-response key |
US15/903,935 Active US10211988B2 (en) | 2013-03-15 | 2018-02-23 | Personal digital identity card device for fingerprint bound asymmetric crypto to access merchant cloud services |
US16/257,956 Active US10476675B2 (en) | 2013-03-15 | 2019-01-25 | Personal digital identity card device for fingerprint bound asymmetric crypto to access a kiosk |
US16/675,670 Active US10721071B2 (en) | 2013-03-15 | 2019-11-06 | Wearable personal digital identity card for fingerprint bound access to a cloud service |
US16/932,088 Active US11006271B2 (en) | 2013-03-15 | 2020-07-17 | Wearable identity device for fingerprint bound access to a cloud service |
US17/315,148 Active US11523273B2 (en) | 2013-03-15 | 2021-05-07 | Wearable identity device for fingerprint bound access to a cloud service |
US18/056,250 Active US11832095B2 (en) | 2013-03-15 | 2022-11-16 | Wearable identity device for fingerprint bound access to a cloud service |
US18/517,059 Active US12302089B2 (en) | 2013-03-15 | 2023-11-22 | Wearable identity device for fingerprint bound access to a cloud service |
Family Applications Before (8)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/843,402 Active 2033-05-23 US9319881B2 (en) | 2013-03-15 | 2013-03-15 | Personal digital identity device with fingerprint sensor |
US15/069,548 Active 2033-05-01 US9906365B2 (en) | 2013-03-15 | 2016-03-14 | Personal digital identity device with fingerprint sensor and challenge-response key |
US15/903,935 Active US10211988B2 (en) | 2013-03-15 | 2018-02-23 | Personal digital identity card device for fingerprint bound asymmetric crypto to access merchant cloud services |
US16/257,956 Active US10476675B2 (en) | 2013-03-15 | 2019-01-25 | Personal digital identity card device for fingerprint bound asymmetric crypto to access a kiosk |
US16/675,670 Active US10721071B2 (en) | 2013-03-15 | 2019-11-06 | Wearable personal digital identity card for fingerprint bound access to a cloud service |
US16/932,088 Active US11006271B2 (en) | 2013-03-15 | 2020-07-17 | Wearable identity device for fingerprint bound access to a cloud service |
US17/315,148 Active US11523273B2 (en) | 2013-03-15 | 2021-05-07 | Wearable identity device for fingerprint bound access to a cloud service |
US18/056,250 Active US11832095B2 (en) | 2013-03-15 | 2022-11-16 | Wearable identity device for fingerprint bound access to a cloud service |
Country Status (2)
Country | Link |
---|---|
US (9) | US9319881B2 (en) |
WO (1) | WO2014150535A1 (en) |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014197497A2 (en) | 2013-06-03 | 2014-12-11 | The Morey Corporation | Geospatial asset tracking systems, methods and apparatus for acquiring, manipulating and presenting telematic metadata |
US10354175B1 (en) | 2013-12-10 | 2019-07-16 | Wells Fargo Bank, N.A. | Method of making a transaction instrument |
US10479126B1 (en) | 2013-12-10 | 2019-11-19 | Wells Fargo Bank, N.A. | Transaction instrument |
US10380476B1 (en) | 2013-12-10 | 2019-08-13 | Wells Fargo Bank, N.A. | Transaction instrument |
US10513081B1 (en) | 2013-12-10 | 2019-12-24 | Wells Fargo Bank, N.A. | Method of making a transaction instrument |
CN104243484B (en) * | 2014-09-25 | 2016-04-13 | 小米科技有限责任公司 | Information interacting method and device, electronic equipment |
US10417295B2 (en) * | 2015-10-20 | 2019-09-17 | At&T Intellectual Property I, L.P. | Sensory allegiance |
CN106936775A (en) * | 2015-12-29 | 2017-07-07 | 航天信息股份有限公司 | A kind of authentication method and system based on fingerprint recognition |
US10482365B1 (en) | 2017-11-21 | 2019-11-19 | Wells Fargo Bank, N.A. | Transaction instrument containing metal inclusions |
CA3082120A1 (en) | 2017-11-24 | 2019-05-31 | Elsi Inc. | Devices, systems, and methods for securely storing and managing sensitive information |
US10958639B2 (en) * | 2018-02-27 | 2021-03-23 | Bank Of America Corporation | Preventing unauthorized access to secure information systems using multi-factor, hardware based and/or advanced biometric authentication |
WO2019209435A1 (en) * | 2018-04-25 | 2019-10-31 | Mastercard International Incorporated | Wearable device for authenticating payment transactions |
CN109067906A (en) * | 2018-09-05 | 2018-12-21 | 朱海建 | A kind of fingerprint cloud system |
US11637825B2 (en) * | 2019-01-11 | 2023-04-25 | Visa International Service Association | Authentication with offline device |
CN110611658B (en) * | 2019-08-20 | 2020-10-09 | 烽火通信科技股份有限公司 | SD-WAN-based equipment authentication method and system |
US11546774B2 (en) * | 2019-10-07 | 2023-01-03 | James Zheng Du | Methods, systems, apparatuses, and devices for controlling access to an access control location |
CN110650021A (en) * | 2019-10-15 | 2020-01-03 | 北京帕斯沃得科技有限公司 | Authentication terminal network real-name authentication method and system |
US11093944B1 (en) | 2020-04-30 | 2021-08-17 | Capital One Services, Llc | Systems and methods for peer-to-peer identity verification |
KR20210148503A (en) * | 2020-05-28 | 2021-12-08 | 삼성전자주식회사 | Multi device data exchange method and system implementing the same |
US11356266B2 (en) | 2020-09-11 | 2022-06-07 | Bank Of America Corporation | User authentication using diverse media inputs and hash-based ledgers |
US11368456B2 (en) | 2020-09-11 | 2022-06-21 | Bank Of America Corporation | User security profile for multi-media identity verification |
WO2024015034A1 (en) * | 2022-07-14 | 2024-01-18 | Novayen Enerji̇ Yazilim Üreti̇m Dağitim Pazarlama Li̇mi̇ted Şi̇rketi̇ | Scrollable and time sensitive six biometric key password generation and authentication machine |
Citations (140)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5581173A (en) | 1991-01-03 | 1996-12-03 | Beckwith Electric Co., Inc. | Microcontroller-based tap changer controller employing half-wave digitization of A.C. signals |
US5623552A (en) | 1994-01-21 | 1997-04-22 | Cardguard International, Inc. | Self-authenticating identification card with fingerprint identification |
EP0774737A3 (en) | 1995-11-16 | 1998-11-04 | Ncr International Inc. | An authorization device |
US5930804A (en) | 1997-06-09 | 1999-07-27 | Philips Electronics North America Corporation | Web-based biometric authentication system and method |
US6088585A (en) | 1997-05-16 | 2000-07-11 | Authentec, Inc. | Portable telecommunication device including a fingerprint sensor and related methods |
US6225916B1 (en) | 1997-08-01 | 2001-05-01 | Matsushita Electric Industrial Co., Ltd. | Remote control signal reception controller |
US6366202B1 (en) | 1999-09-07 | 2002-04-02 | Lawrence D. Rosenthal | Paired lost item finding system |
US20020104006A1 (en) * | 2001-02-01 | 2002-08-01 | Alan Boate | Method and system for securing a computer network and personal identification device used therein for controlling access to network components |
US6466804B1 (en) | 2000-08-25 | 2002-10-15 | Motorola, Inc. | Method and apparatus for remote multiple access to subscriber identity module |
US20020150282A1 (en) | 2001-04-17 | 2002-10-17 | Kinsella David J. | Fingerprint sensor with feature authentication |
US20020187808A1 (en) | 2001-06-12 | 2002-12-12 | Jari Vallstrom | Method and arrangement for encrypting data transfer at an interface in mobile equipment in radio network, and mobile equipment in radio network |
US6510346B2 (en) | 2000-12-13 | 2003-01-21 | Lawrence D. Gordan | Therapeutic infrared energy wrist cover |
US20030046228A1 (en) | 2001-08-28 | 2003-03-06 | Jean-Marc Berney | User-wearable functional jewelry with biometrics and smartcard to remotely sign and/or authenticate to e-services |
US20030103413A1 (en) | 2001-11-30 | 2003-06-05 | Jacobi James J. | Portable universal interface device |
US20030137588A1 (en) | 2002-01-23 | 2003-07-24 | Guan-Wu Wang | Wireless camera system |
US6709333B1 (en) | 2001-06-20 | 2004-03-23 | Sierra Design Group | Player identification using biometric data in a gaming environment |
US20040063475A1 (en) | 2002-09-26 | 2004-04-01 | Weng Yuan Sung | Wrist mobile phone device having voice activated wireless headset |
US20040073801A1 (en) | 2002-10-14 | 2004-04-15 | Kabushiki Kaisha Toshiba | Methods and systems for flexible delegation |
US20040117638A1 (en) | 2002-11-21 | 2004-06-17 | Monroe David A. | Method for incorporating facial recognition technology in a multimedia surveillance system |
US6774796B2 (en) | 2001-08-01 | 2004-08-10 | Motorola, Inc. | Master authenticator |
US20040220807A9 (en) | 1999-10-04 | 2004-11-04 | Comsense Technologies Ltd. | Sonic/ultrasonic authentication device |
US20040239481A1 (en) | 2001-07-10 | 2004-12-02 | American Express Travel Related Services Company, Inc. | Method and system for facial recognition biometrics on a fob |
US20050033689A1 (en) | 2001-07-10 | 2005-02-10 | American Express Travel Related Services Company, Inc. | A system and method for dynamic fob synchronization and personalization |
US20050039040A1 (en) | 2003-03-31 | 2005-02-17 | Ransom Douglas S. | System and method for seal tamper detection for intelligent electronic devices |
US20050116811A1 (en) | 2002-03-05 | 2005-06-02 | Masi Eros | Method for detecting the position and for confirming the identity of an individual |
US20050197103A1 (en) | 2004-02-26 | 2005-09-08 | Nec Corporation | Mobile phone with restriction on use thereof and method for restricting use of mobile phone |
US20050206518A1 (en) | 2003-03-21 | 2005-09-22 | Welch Allyn Protocol, Inc. | Personal status physiologic monitor system and architecture and related monitoring methods |
US6970726B2 (en) | 2001-07-23 | 2005-11-29 | Nec Corporation | Mobile station having short-range radio function and power consumption reduction method therefor |
US20060036515A1 (en) | 2004-07-29 | 2006-02-16 | Daryl Ingalsbe | Monitoring technology |
US20060133066A1 (en) | 2004-12-16 | 2006-06-22 | D Souza Ian C | Jewelry with battery powered illumination |
US20060147040A1 (en) | 2003-06-16 | 2006-07-06 | Lee Yun K | Rijndael block cipher apparatus and encryption/decryption method thereof |
US20060153040A1 (en) | 2005-01-07 | 2006-07-13 | Apple Computer, Inc. | Techniques for improved playlist processing on media devices |
US20060219776A1 (en) | 2003-11-17 | 2006-10-05 | Dpd Patent Trust | Rfid reader with multiple interfaces |
US20070046476A1 (en) | 2005-08-25 | 2007-03-01 | Aegis 3 | System providing medical personnel with immediate critical data for emergency treatments |
US20070049250A1 (en) | 2005-08-23 | 2007-03-01 | Agere Systems, Inc. | Authenticating data units of a mobile communications device |
US20070050618A1 (en) | 2005-08-31 | 2007-03-01 | Pierre Roux | Method and apparatus for user authentication |
US20070079383A1 (en) | 2004-08-31 | 2007-04-05 | Gopalakrishnan Kumar C | System and Method for Providing Digital Content on Mobile Devices |
US20070113099A1 (en) | 2005-11-14 | 2007-05-17 | Erina Takikawa | Authentication apparatus and portable terminal |
US20070180263A1 (en) | 2005-12-16 | 2007-08-02 | David Delgrosso | Identification and remote network access using biometric recognition |
US20070259717A1 (en) | 2004-06-18 | 2007-11-08 | Igt | Gesture controlled casino gaming system |
US20070279852A1 (en) | 2004-02-27 | 2007-12-06 | Daniel Simon R | Wearable Modular Interface Strap |
US20070295803A1 (en) | 2006-06-22 | 2007-12-27 | Hip Consult Inc. | Apparatus and method for facilitating money or value transfer |
US7314167B1 (en) | 2005-03-08 | 2008-01-01 | Pisafe, Inc. | Method and apparatus for providing secure identification, verification and authorization |
US20080014867A1 (en) | 2004-11-16 | 2008-01-17 | Advanced Microelectronic And Automation Technology Ltd. | Portable Identity Card Reader System For Physical and Logical Access |
US20080126929A1 (en) | 2006-11-29 | 2008-05-29 | Microsoft Corporation | Remote ui for smart devices |
US20080304362A1 (en) | 2007-06-05 | 2008-12-11 | Robert Alan Fleming | Inter-diver signaling device and process |
US20080305769A1 (en) | 2007-06-08 | 2008-12-11 | Nahum Rubinstein | Device Method & System For Facilitating Mobile Transactions |
US20090036056A1 (en) | 2007-08-03 | 2009-02-05 | Ricoh Company, Ltd, | Information processing system, information processing device, and information processing method |
US20090143104A1 (en) | 2007-09-21 | 2009-06-04 | Michael Loh | Wireless smart card and integrated personal area network, near field communication and contactless payment system |
US20090146826A1 (en) * | 2007-12-10 | 2009-06-11 | Igor Gofman | Rapid Charging And Power Management Of A Battery-Powered Fluid Analyte Meter |
US20090146947A1 (en) | 2007-12-07 | 2009-06-11 | James Ng | Universal wearable input and authentication device |
US20090163175A1 (en) | 2007-12-24 | 2009-06-25 | Guangming Shi | Virtual sim card for mobile handsets |
US20090195350A1 (en) | 2008-02-01 | 2009-08-06 | Pillar Llc | Situationally Aware and Self-Configuring Electronic Data And Communication Device |
US20090231960A1 (en) * | 2006-08-27 | 2009-09-17 | Gavin James Hutcheson | GSM mobile watch phone |
US20090247078A1 (en) | 2008-03-27 | 2009-10-01 | Vladimir Sklovsky | Method and Apparatus for Automatic Application Selection in an Electronic Device Using Multiple Discovery Managers |
US20090249478A1 (en) | 2008-03-31 | 2009-10-01 | Plantronics, Inc. | User Authentication System and Method |
US7599493B2 (en) | 2005-02-14 | 2009-10-06 | Tricipher Inc. | Asymmetric key pair having a kiosk mode |
US7603565B2 (en) | 2001-02-12 | 2009-10-13 | Symbol Technologies, Inc. | Apparatus and method for authenticating access to a network resource |
US20090276626A1 (en) | 2005-04-04 | 2009-11-05 | Research In Motion Limited | Portable smart card reader having secure wireless communications capability |
US20090312011A1 (en) | 2006-12-15 | 2009-12-17 | Innovision Research & Technology Plc | Communications devices comprising near field rf communicators |
US20100049987A1 (en) | 2006-12-19 | 2010-02-25 | Telecom Italia S.P.A | Method and arrangement for secure user authentication based on a biometric data detection device |
US7762470B2 (en) | 2003-11-17 | 2010-07-27 | Dpd Patent Trust Ltd. | RFID token with multiple interface controller |
US20100225443A1 (en) | 2009-01-05 | 2010-09-09 | Sevinc Bayram | User authentication for devices with touch sensitive elements, such as touch sensitive display screens |
US7802293B2 (en) | 2005-04-06 | 2010-09-21 | Actividentity, Inc. | Secure digital credential sharing arrangement |
US20100299198A1 (en) | 2009-05-20 | 2010-11-25 | M-Dot, Inc. | Message Broker for Redemption of Digital Incentives |
US20100304670A1 (en) | 2009-05-26 | 2010-12-02 | Shuo Jeffrey | Portable personal sim card |
US20100330908A1 (en) | 2009-06-25 | 2010-12-30 | Blueant Wireless Pty Limited | Telecommunications device with voice-controlled functions |
US7869602B1 (en) | 2005-03-10 | 2011-01-11 | Sprint Spectrum L.P. | User-based digital rights management |
US20110119759A1 (en) | 2000-02-23 | 2011-05-19 | Micron Technology, Inc. | System and method for controlling user access to an electronic device |
US20110138176A1 (en) | 2009-12-09 | 2011-06-09 | Ebay Inc. | Systems and methods for facilitating user identity verification over a network |
US20110140855A1 (en) | 2009-12-15 | 2011-06-16 | Sony Corporation | Signal processing device and method |
US20110140913A1 (en) | 2008-09-29 | 2011-06-16 | John Matthew Montenero | Multifunctional telemetry alert safety system (MTASS) |
US20110187642A1 (en) | 2009-11-25 | 2011-08-04 | Patrick Faith | Interaction Terminal |
US7994915B2 (en) | 2004-11-08 | 2011-08-09 | Sony Corporation | Information processing system and information processing apparatus |
US20110214158A1 (en) | 2010-02-26 | 2011-09-01 | Research In Motion Limited | Wireless communications system providing mobile device authentication bypass based upon user-wearable security device and related methods |
US20110212707A1 (en) | 2008-11-04 | 2011-09-01 | Gemalto Sa | Remote user authentication using nfc |
US20110215921A1 (en) | 2009-06-22 | 2011-09-08 | Mourad Ben Ayed | Systems for wireless authentication based on bluetooth proximity |
US20110231292A1 (en) | 2010-03-22 | 2011-09-22 | Mccown Steven Harvey | Systems, apparatus, and methods for proximity-based peer-to-peer payment transactions |
US20110245316A1 (en) | 2010-03-30 | 2011-10-06 | Sciclone Pharmaceuticals, Inc. | Prevention or delay of onset of oral mucositis |
US20110240748A1 (en) | 2002-03-28 | 2011-10-06 | Innovation Connection Corporation | System, Method and Apparatus for Enabling Transactions Using a Biometrically Enabled Programmable Magnetic Stripe |
US20110250840A1 (en) | 2007-01-05 | 2011-10-13 | Apple Inc. | Automatic power-off of bluetooth device from linked device |
US20110275316A1 (en) | 2010-05-10 | 2011-11-10 | Nokia Corporation | Device to device connection setup using near-field communication |
US20120016793A1 (en) | 2006-07-11 | 2012-01-19 | Jo-Ann Peters | Wearable Contactless Payment Devices |
US20120019361A1 (en) | 2009-06-22 | 2012-01-26 | Mourad Ben Ayed | Systems for three factor authentication |
US20120019379A1 (en) | 2009-06-22 | 2012-01-26 | Mourad Ben Ayed | Systems for three factor authentication challenge |
US20120032782A1 (en) | 2006-12-27 | 2012-02-09 | Colella Brian A | System for restricted biometric access for a secure global online and electronic environment |
US20120041767A1 (en) | 2010-08-11 | 2012-02-16 | Nike Inc. | Athletic Activity User Experience and Environment |
US20120054498A1 (en) | 2010-08-24 | 2012-03-01 | Rickman Gregory M | System and method for managing secure information within a hybrid portable computing device |
US20120075107A1 (en) | 2010-04-23 | 2012-03-29 | Nader Newman | Battery state indicator on a battery powered device |
US20120084563A1 (en) | 2005-09-16 | 2012-04-05 | Tara Chand Singhal | Systems and methods for multi-factor remote user authentication |
US20120089948A1 (en) | 2010-10-11 | 2012-04-12 | Third Wave Power Pte Ltd | Gesture controlled user interface |
US20120094600A1 (en) | 2010-10-19 | 2012-04-19 | Welch Allyn, Inc. | Platform for patient monitoring |
US20120207305A1 (en) | 2011-02-10 | 2012-08-16 | Nxp B.V. | Secure smart poster |
US20120221475A1 (en) | 2011-01-31 | 2012-08-30 | Bank Of America Corporation | Mobile transaction device security system |
US20120232430A1 (en) | 2011-03-10 | 2012-09-13 | Patrick Boissy | Universal actigraphic device and method of use therefor |
US20120238206A1 (en) | 2011-03-14 | 2012-09-20 | Research In Motion Limited | Communications device providing near field communication (nfc) secure element disabling features related methods |
US20120252405A1 (en) | 2011-03-31 | 2012-10-04 | Lortz Victor B | Connecting mobile devices, internet-connected hosts, and cloud services |
US20120254960A1 (en) | 2011-03-31 | 2012-10-04 | Victor Lortz | Connecting mobile devices, internet-connected vehicles, and cloud services |
US20120258773A1 (en) | 2011-04-07 | 2012-10-11 | Apple Inc. | Devices and methods for providing access to internal component |
US20120297190A1 (en) | 2011-05-19 | 2012-11-22 | Microsoft Corporation | Usable security of online password management with sensor-based authentication |
US20120302163A1 (en) | 2011-05-23 | 2012-11-29 | Broadcom Corporation | Methods and Apparatus for Controlling State and Functionality of an Electronic Component Through Motion-Awareness |
US8344853B1 (en) | 2006-05-16 | 2013-01-01 | Eigent Technologies, Llc | Secure RFID system and method |
US8351868B2 (en) | 2009-11-20 | 2013-01-08 | Motorola Solutions, Inc. | Radio status indicator |
US20130019284A1 (en) | 2011-06-10 | 2013-01-17 | Pacyga James W | Automated web based applications with a wireless communication device |
US20130060868A1 (en) | 2011-09-07 | 2013-03-07 | Elwha LLC, a limited liability company of the State of Delaware | Computational systems and methods for identifying a communications partner |
US20130081122A1 (en) | 2011-09-23 | 2013-03-28 | Jerome Svigals | A Method, Device and System for Secure Transactions |
US20130095757A1 (en) | 2011-10-12 | 2013-04-18 | Research In Motion Limited | Methods and apparatus to control accessories |
US8430325B2 (en) | 2007-09-12 | 2013-04-30 | Devicefidelity, Inc. | Executing transactions secured user credentials |
US20130117832A1 (en) | 2011-11-07 | 2013-05-09 | Shaheen Ashok Gandhi | Identity Verification and Authentication |
US20130119128A1 (en) | 2011-11-16 | 2013-05-16 | Hugo Straumann | Method and system for authenticating a user by means of an application |
US20130152185A1 (en) | 2011-12-09 | 2013-06-13 | Research In Motion Limited | Transaction provisioning for mobile wireless communications devices and related methods |
US20130159119A1 (en) | 2011-11-22 | 2013-06-20 | Square, Inc. | Cardless payment transactions |
US20130169430A1 (en) | 2011-12-28 | 2013-07-04 | Joe Shook | Apparatus and method for smoke detection & alarm |
US20130212661A1 (en) | 2012-02-13 | 2013-08-15 | XceedlD Corporation | Credential management system |
US20130219164A1 (en) | 2011-12-29 | 2013-08-22 | Imation Corp. | Cloud-based hardware security modules |
US20130243189A1 (en) | 2012-03-19 | 2013-09-19 | Nokia Corporation | Method and apparatus for providing information authentication from external sensors to secure environments |
US20130263252A1 (en) | 2012-03-27 | 2013-10-03 | Validity Sensors, Inc. | Button depress wakeup and wakeup strategy |
US20130268931A1 (en) | 2012-04-06 | 2013-10-10 | Security First Corp. | Systems and methods for securing and restoring virtual machines |
US20130275748A1 (en) | 2012-04-17 | 2013-10-17 | Gemalto Sa | Secure password-based authentication for cloud computing services |
US20130298224A1 (en) | 2012-05-03 | 2013-11-07 | Authentec, Inc. | Electronic device including a finger sensor having a valid authentication threshold time period and related methods |
US20130298208A1 (en) * | 2012-05-06 | 2013-11-07 | Mourad Ben Ayed | System for mobile security |
US8596528B2 (en) | 2002-09-17 | 2013-12-03 | Mastercard International Incorporated | Collaborative negotiation techniques for mobile personal trusted device financial transactions |
US20130332353A1 (en) * | 2012-06-08 | 2013-12-12 | American Express Travel Related Services Company, Inc. | System and method for using flexible circuitry in payment accessories |
US20140011479A1 (en) | 2011-01-11 | 2014-01-09 | Telefonica S.A. | Identification method for accessing mobile broadband services or applications |
US20140040139A1 (en) | 2011-12-19 | 2014-02-06 | Sequent Software, Inc. | System and method for dynamic temporary payment authorization in a portable communication device |
US20140073321A1 (en) | 2012-09-11 | 2014-03-13 | Nokia Corporation | Method and apparatus for caching local mashup service parameters |
US20140090039A1 (en) | 2012-09-24 | 2014-03-27 | Plantronics, Inc. | Secure System Access Using Mobile Biometric Devices |
US20140101755A1 (en) | 2012-10-10 | 2014-04-10 | Research In Motion Limited | Mobile wireless communications device providing security features based upon wearable near field communication (nfc) device and related methods |
US8699952B2 (en) | 2011-04-08 | 2014-04-15 | Acer Inc. | Electronic apparatus, proximity network system and connecting method thereof |
US20140121982A1 (en) | 2012-10-30 | 2014-05-01 | Nokia Corporation | Method and apparatus for determining biometrics utilizing 3-dimensional sensor data |
US20140143155A1 (en) | 2012-11-20 | 2014-05-22 | Nagravision S.A. | Electronic payment method, system and device for securely exchanging payment information |
US8746363B2 (en) | 2011-04-15 | 2014-06-10 | Hanscan Ip B.V. | System for conducting remote biometric operations |
US8770470B2 (en) | 2008-04-29 | 2014-07-08 | Visa U.S.A. Inc. | Device including form factor indicator |
US20140216914A1 (en) | 2012-05-18 | 2014-08-07 | Apple Inc. | Capacitive Sensor Packaging |
US20140281565A1 (en) | 2013-03-15 | 2014-09-18 | Tyfone, Inc. | Configurable personal digital identity device responsive to user interaction |
EP2048590B1 (en) | 2007-10-09 | 2014-10-01 | Vodafone Holding GmbH | Method for communication, communication device and secure processor |
US20140310113A1 (en) | 2011-10-01 | 2014-10-16 | Uttam Sengupta | Cloud based credit card emulation |
US9002267B2 (en) | 2012-08-22 | 2015-04-07 | Blackberry Limited | Near field communications-based soft subscriber identity module |
US9021563B2 (en) | 2013-01-02 | 2015-04-28 | Htc Corporation | Accessory interface system |
US9037851B2 (en) * | 2009-11-17 | 2015-05-19 | Unho Choi | User authentication system, user authentication apparatus, smart card, and user authentication method for ubiquitous authentication management |
-
2013
- 2013-03-15 US US13/843,402 patent/US9319881B2/en active Active
-
2014
- 2014-03-11 WO PCT/US2014/023533 patent/WO2014150535A1/en active Application Filing
-
2016
- 2016-03-14 US US15/069,548 patent/US9906365B2/en active Active
-
2018
- 2018-02-23 US US15/903,935 patent/US10211988B2/en active Active
-
2019
- 2019-01-25 US US16/257,956 patent/US10476675B2/en active Active
- 2019-11-06 US US16/675,670 patent/US10721071B2/en active Active
-
2020
- 2020-07-17 US US16/932,088 patent/US11006271B2/en active Active
-
2021
- 2021-05-07 US US17/315,148 patent/US11523273B2/en active Active
-
2022
- 2022-11-16 US US18/056,250 patent/US11832095B2/en active Active
-
2023
- 2023-11-22 US US18/517,059 patent/US12302089B2/en active Active
Patent Citations (144)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5581173A (en) | 1991-01-03 | 1996-12-03 | Beckwith Electric Co., Inc. | Microcontroller-based tap changer controller employing half-wave digitization of A.C. signals |
US5623552A (en) | 1994-01-21 | 1997-04-22 | Cardguard International, Inc. | Self-authenticating identification card with fingerprint identification |
EP0774737A3 (en) | 1995-11-16 | 1998-11-04 | Ncr International Inc. | An authorization device |
US6088585A (en) | 1997-05-16 | 2000-07-11 | Authentec, Inc. | Portable telecommunication device including a fingerprint sensor and related methods |
US5930804A (en) | 1997-06-09 | 1999-07-27 | Philips Electronics North America Corporation | Web-based biometric authentication system and method |
US6225916B1 (en) | 1997-08-01 | 2001-05-01 | Matsushita Electric Industrial Co., Ltd. | Remote control signal reception controller |
US6366202B1 (en) | 1999-09-07 | 2002-04-02 | Lawrence D. Rosenthal | Paired lost item finding system |
US20040220807A9 (en) | 1999-10-04 | 2004-11-04 | Comsense Technologies Ltd. | Sonic/ultrasonic authentication device |
US20110119759A1 (en) | 2000-02-23 | 2011-05-19 | Micron Technology, Inc. | System and method for controlling user access to an electronic device |
US6466804B1 (en) | 2000-08-25 | 2002-10-15 | Motorola, Inc. | Method and apparatus for remote multiple access to subscriber identity module |
US6510346B2 (en) | 2000-12-13 | 2003-01-21 | Lawrence D. Gordan | Therapeutic infrared energy wrist cover |
US20020104006A1 (en) * | 2001-02-01 | 2002-08-01 | Alan Boate | Method and system for securing a computer network and personal identification device used therein for controlling access to network components |
US7603565B2 (en) | 2001-02-12 | 2009-10-13 | Symbol Technologies, Inc. | Apparatus and method for authenticating access to a network resource |
US20020150282A1 (en) | 2001-04-17 | 2002-10-17 | Kinsella David J. | Fingerprint sensor with feature authentication |
US20020187808A1 (en) | 2001-06-12 | 2002-12-12 | Jari Vallstrom | Method and arrangement for encrypting data transfer at an interface in mobile equipment in radio network, and mobile equipment in radio network |
US6709333B1 (en) | 2001-06-20 | 2004-03-23 | Sierra Design Group | Player identification using biometric data in a gaming environment |
US20040239481A1 (en) | 2001-07-10 | 2004-12-02 | American Express Travel Related Services Company, Inc. | Method and system for facial recognition biometrics on a fob |
US20050033689A1 (en) | 2001-07-10 | 2005-02-10 | American Express Travel Related Services Company, Inc. | A system and method for dynamic fob synchronization and personalization |
US6970726B2 (en) | 2001-07-23 | 2005-11-29 | Nec Corporation | Mobile station having short-range radio function and power consumption reduction method therefor |
US6774796B2 (en) | 2001-08-01 | 2004-08-10 | Motorola, Inc. | Master authenticator |
US20030046228A1 (en) | 2001-08-28 | 2003-03-06 | Jean-Marc Berney | User-wearable functional jewelry with biometrics and smartcard to remotely sign and/or authenticate to e-services |
US20030103413A1 (en) | 2001-11-30 | 2003-06-05 | Jacobi James J. | Portable universal interface device |
US20030137588A1 (en) | 2002-01-23 | 2003-07-24 | Guan-Wu Wang | Wireless camera system |
US20050116811A1 (en) | 2002-03-05 | 2005-06-02 | Masi Eros | Method for detecting the position and for confirming the identity of an individual |
US20110240748A1 (en) | 2002-03-28 | 2011-10-06 | Innovation Connection Corporation | System, Method and Apparatus for Enabling Transactions Using a Biometrically Enabled Programmable Magnetic Stripe |
US8596528B2 (en) | 2002-09-17 | 2013-12-03 | Mastercard International Incorporated | Collaborative negotiation techniques for mobile personal trusted device financial transactions |
US20040063475A1 (en) | 2002-09-26 | 2004-04-01 | Weng Yuan Sung | Wrist mobile phone device having voice activated wireless headset |
US20040073801A1 (en) | 2002-10-14 | 2004-04-15 | Kabushiki Kaisha Toshiba | Methods and systems for flexible delegation |
US20040117638A1 (en) | 2002-11-21 | 2004-06-17 | Monroe David A. | Method for incorporating facial recognition technology in a multimedia surveillance system |
US20050206518A1 (en) | 2003-03-21 | 2005-09-22 | Welch Allyn Protocol, Inc. | Personal status physiologic monitor system and architecture and related monitoring methods |
US20050039040A1 (en) | 2003-03-31 | 2005-02-17 | Ransom Douglas S. | System and method for seal tamper detection for intelligent electronic devices |
US20060147040A1 (en) | 2003-06-16 | 2006-07-06 | Lee Yun K | Rijndael block cipher apparatus and encryption/decryption method thereof |
US7762470B2 (en) | 2003-11-17 | 2010-07-27 | Dpd Patent Trust Ltd. | RFID token with multiple interface controller |
US20060219776A1 (en) | 2003-11-17 | 2006-10-05 | Dpd Patent Trust | Rfid reader with multiple interfaces |
US20050197103A1 (en) | 2004-02-26 | 2005-09-08 | Nec Corporation | Mobile phone with restriction on use thereof and method for restricting use of mobile phone |
US20070279852A1 (en) | 2004-02-27 | 2007-12-06 | Daniel Simon R | Wearable Modular Interface Strap |
US8460103B2 (en) | 2004-06-18 | 2013-06-11 | Igt | Gesture controlled casino gaming system |
US20070259717A1 (en) | 2004-06-18 | 2007-11-08 | Igt | Gesture controlled casino gaming system |
US20060036515A1 (en) | 2004-07-29 | 2006-02-16 | Daryl Ingalsbe | Monitoring technology |
US20070079383A1 (en) | 2004-08-31 | 2007-04-05 | Gopalakrishnan Kumar C | System and Method for Providing Digital Content on Mobile Devices |
US7994915B2 (en) | 2004-11-08 | 2011-08-09 | Sony Corporation | Information processing system and information processing apparatus |
US20080014867A1 (en) | 2004-11-16 | 2008-01-17 | Advanced Microelectronic And Automation Technology Ltd. | Portable Identity Card Reader System For Physical and Logical Access |
US20060133066A1 (en) | 2004-12-16 | 2006-06-22 | D Souza Ian C | Jewelry with battery powered illumination |
US20060153040A1 (en) | 2005-01-07 | 2006-07-13 | Apple Computer, Inc. | Techniques for improved playlist processing on media devices |
US7599493B2 (en) | 2005-02-14 | 2009-10-06 | Tricipher Inc. | Asymmetric key pair having a kiosk mode |
US7314167B1 (en) | 2005-03-08 | 2008-01-01 | Pisafe, Inc. | Method and apparatus for providing secure identification, verification and authorization |
US7869602B1 (en) | 2005-03-10 | 2011-01-11 | Sprint Spectrum L.P. | User-based digital rights management |
US20090276626A1 (en) | 2005-04-04 | 2009-11-05 | Research In Motion Limited | Portable smart card reader having secure wireless communications capability |
US7802293B2 (en) | 2005-04-06 | 2010-09-21 | Actividentity, Inc. | Secure digital credential sharing arrangement |
US20070049250A1 (en) | 2005-08-23 | 2007-03-01 | Agere Systems, Inc. | Authenticating data units of a mobile communications device |
US20070046476A1 (en) | 2005-08-25 | 2007-03-01 | Aegis 3 | System providing medical personnel with immediate critical data for emergency treatments |
US20070050618A1 (en) | 2005-08-31 | 2007-03-01 | Pierre Roux | Method and apparatus for user authentication |
US20120084563A1 (en) | 2005-09-16 | 2012-04-05 | Tara Chand Singhal | Systems and methods for multi-factor remote user authentication |
US20070113099A1 (en) | 2005-11-14 | 2007-05-17 | Erina Takikawa | Authentication apparatus and portable terminal |
US20070180263A1 (en) | 2005-12-16 | 2007-08-02 | David Delgrosso | Identification and remote network access using biometric recognition |
US8344853B1 (en) | 2006-05-16 | 2013-01-01 | Eigent Technologies, Llc | Secure RFID system and method |
US20070295803A1 (en) | 2006-06-22 | 2007-12-27 | Hip Consult Inc. | Apparatus and method for facilitating money or value transfer |
US20120016793A1 (en) | 2006-07-11 | 2012-01-19 | Jo-Ann Peters | Wearable Contactless Payment Devices |
US20090231960A1 (en) * | 2006-08-27 | 2009-09-17 | Gavin James Hutcheson | GSM mobile watch phone |
US20080126929A1 (en) | 2006-11-29 | 2008-05-29 | Microsoft Corporation | Remote ui for smart devices |
US20090312011A1 (en) | 2006-12-15 | 2009-12-17 | Innovision Research & Technology Plc | Communications devices comprising near field rf communicators |
US20100049987A1 (en) | 2006-12-19 | 2010-02-25 | Telecom Italia S.P.A | Method and arrangement for secure user authentication based on a biometric data detection device |
US20120032782A1 (en) | 2006-12-27 | 2012-02-09 | Colella Brian A | System for restricted biometric access for a secure global online and electronic environment |
US20110250840A1 (en) | 2007-01-05 | 2011-10-13 | Apple Inc. | Automatic power-off of bluetooth device from linked device |
US20080304362A1 (en) | 2007-06-05 | 2008-12-11 | Robert Alan Fleming | Inter-diver signaling device and process |
US20080305769A1 (en) | 2007-06-08 | 2008-12-11 | Nahum Rubinstein | Device Method & System For Facilitating Mobile Transactions |
US20090036056A1 (en) | 2007-08-03 | 2009-02-05 | Ricoh Company, Ltd, | Information processing system, information processing device, and information processing method |
US8430325B2 (en) | 2007-09-12 | 2013-04-30 | Devicefidelity, Inc. | Executing transactions secured user credentials |
US20130092741A1 (en) | 2007-09-21 | 2013-04-18 | Michael Loh | Wireless smart card and integrated personal area network, near field communication and contactless payment system |
US20090143104A1 (en) | 2007-09-21 | 2009-06-04 | Michael Loh | Wireless smart card and integrated personal area network, near field communication and contactless payment system |
EP2048590B1 (en) | 2007-10-09 | 2014-10-01 | Vodafone Holding GmbH | Method for communication, communication device and secure processor |
US20090146947A1 (en) | 2007-12-07 | 2009-06-11 | James Ng | Universal wearable input and authentication device |
US20090146826A1 (en) * | 2007-12-10 | 2009-06-11 | Igor Gofman | Rapid Charging And Power Management Of A Battery-Powered Fluid Analyte Meter |
US20090163175A1 (en) | 2007-12-24 | 2009-06-25 | Guangming Shi | Virtual sim card for mobile handsets |
US20090195350A1 (en) | 2008-02-01 | 2009-08-06 | Pillar Llc | Situationally Aware and Self-Configuring Electronic Data And Communication Device |
US20090247078A1 (en) | 2008-03-27 | 2009-10-01 | Vladimir Sklovsky | Method and Apparatus for Automatic Application Selection in an Electronic Device Using Multiple Discovery Managers |
US20090249478A1 (en) | 2008-03-31 | 2009-10-01 | Plantronics, Inc. | User Authentication System and Method |
US8770470B2 (en) | 2008-04-29 | 2014-07-08 | Visa U.S.A. Inc. | Device including form factor indicator |
US20110140913A1 (en) | 2008-09-29 | 2011-06-16 | John Matthew Montenero | Multifunctional telemetry alert safety system (MTASS) |
US20110212707A1 (en) | 2008-11-04 | 2011-09-01 | Gemalto Sa | Remote user authentication using nfc |
US20100225443A1 (en) | 2009-01-05 | 2010-09-09 | Sevinc Bayram | User authentication for devices with touch sensitive elements, such as touch sensitive display screens |
US20100299198A1 (en) | 2009-05-20 | 2010-11-25 | M-Dot, Inc. | Message Broker for Redemption of Digital Incentives |
US20100304670A1 (en) | 2009-05-26 | 2010-12-02 | Shuo Jeffrey | Portable personal sim card |
US8190129B2 (en) | 2009-06-22 | 2012-05-29 | Mourad Ben Ayed | Systems for three factor authentication |
US20120019361A1 (en) | 2009-06-22 | 2012-01-26 | Mourad Ben Ayed | Systems for three factor authentication |
US20120019379A1 (en) | 2009-06-22 | 2012-01-26 | Mourad Ben Ayed | Systems for three factor authentication challenge |
US20110215921A1 (en) | 2009-06-22 | 2011-09-08 | Mourad Ben Ayed | Systems for wireless authentication based on bluetooth proximity |
US20100330908A1 (en) | 2009-06-25 | 2010-12-30 | Blueant Wireless Pty Limited | Telecommunications device with voice-controlled functions |
US9037851B2 (en) * | 2009-11-17 | 2015-05-19 | Unho Choi | User authentication system, user authentication apparatus, smart card, and user authentication method for ubiquitous authentication management |
US8351868B2 (en) | 2009-11-20 | 2013-01-08 | Motorola Solutions, Inc. | Radio status indicator |
US20110187642A1 (en) | 2009-11-25 | 2011-08-04 | Patrick Faith | Interaction Terminal |
US20110138176A1 (en) | 2009-12-09 | 2011-06-09 | Ebay Inc. | Systems and methods for facilitating user identity verification over a network |
US20110140855A1 (en) | 2009-12-15 | 2011-06-16 | Sony Corporation | Signal processing device and method |
US20110214158A1 (en) | 2010-02-26 | 2011-09-01 | Research In Motion Limited | Wireless communications system providing mobile device authentication bypass based upon user-wearable security device and related methods |
US8869263B2 (en) | 2010-02-26 | 2014-10-21 | Blackberry Limited | Wireless communications system providing mobile device authentication bypass based upon user-wearable security device and related methods |
US20110231292A1 (en) | 2010-03-22 | 2011-09-22 | Mccown Steven Harvey | Systems, apparatus, and methods for proximity-based peer-to-peer payment transactions |
US20110245316A1 (en) | 2010-03-30 | 2011-10-06 | Sciclone Pharmaceuticals, Inc. | Prevention or delay of onset of oral mucositis |
US20120075107A1 (en) | 2010-04-23 | 2012-03-29 | Nader Newman | Battery state indicator on a battery powered device |
US20110275316A1 (en) | 2010-05-10 | 2011-11-10 | Nokia Corporation | Device to device connection setup using near-field communication |
US20120041767A1 (en) | 2010-08-11 | 2012-02-16 | Nike Inc. | Athletic Activity User Experience and Environment |
US20120054498A1 (en) | 2010-08-24 | 2012-03-01 | Rickman Gregory M | System and method for managing secure information within a hybrid portable computing device |
US20120089948A1 (en) | 2010-10-11 | 2012-04-12 | Third Wave Power Pte Ltd | Gesture controlled user interface |
US20120094600A1 (en) | 2010-10-19 | 2012-04-19 | Welch Allyn, Inc. | Platform for patient monitoring |
US20140011479A1 (en) | 2011-01-11 | 2014-01-09 | Telefonica S.A. | Identification method for accessing mobile broadband services or applications |
US20120221475A1 (en) | 2011-01-31 | 2012-08-30 | Bank Of America Corporation | Mobile transaction device security system |
US20120207305A1 (en) | 2011-02-10 | 2012-08-16 | Nxp B.V. | Secure smart poster |
US20120232430A1 (en) | 2011-03-10 | 2012-09-13 | Patrick Boissy | Universal actigraphic device and method of use therefor |
US20120238206A1 (en) | 2011-03-14 | 2012-09-20 | Research In Motion Limited | Communications device providing near field communication (nfc) secure element disabling features related methods |
US20120252405A1 (en) | 2011-03-31 | 2012-10-04 | Lortz Victor B | Connecting mobile devices, internet-connected hosts, and cloud services |
US20120254960A1 (en) | 2011-03-31 | 2012-10-04 | Victor Lortz | Connecting mobile devices, internet-connected vehicles, and cloud services |
US20120258773A1 (en) | 2011-04-07 | 2012-10-11 | Apple Inc. | Devices and methods for providing access to internal component |
US8699952B2 (en) | 2011-04-08 | 2014-04-15 | Acer Inc. | Electronic apparatus, proximity network system and connecting method thereof |
US8746363B2 (en) | 2011-04-15 | 2014-06-10 | Hanscan Ip B.V. | System for conducting remote biometric operations |
US20120297190A1 (en) | 2011-05-19 | 2012-11-22 | Microsoft Corporation | Usable security of online password management with sensor-based authentication |
US20120302163A1 (en) | 2011-05-23 | 2012-11-29 | Broadcom Corporation | Methods and Apparatus for Controlling State and Functionality of an Electronic Component Through Motion-Awareness |
US20130019284A1 (en) | 2011-06-10 | 2013-01-17 | Pacyga James W | Automated web based applications with a wireless communication device |
US20130060868A1 (en) | 2011-09-07 | 2013-03-07 | Elwha LLC, a limited liability company of the State of Delaware | Computational systems and methods for identifying a communications partner |
US20130081122A1 (en) | 2011-09-23 | 2013-03-28 | Jerome Svigals | A Method, Device and System for Secure Transactions |
US20140310113A1 (en) | 2011-10-01 | 2014-10-16 | Uttam Sengupta | Cloud based credit card emulation |
US20130095757A1 (en) | 2011-10-12 | 2013-04-18 | Research In Motion Limited | Methods and apparatus to control accessories |
US20130117832A1 (en) | 2011-11-07 | 2013-05-09 | Shaheen Ashok Gandhi | Identity Verification and Authentication |
US20130119128A1 (en) | 2011-11-16 | 2013-05-16 | Hugo Straumann | Method and system for authenticating a user by means of an application |
US20130159119A1 (en) | 2011-11-22 | 2013-06-20 | Square, Inc. | Cardless payment transactions |
US20130152185A1 (en) | 2011-12-09 | 2013-06-13 | Research In Motion Limited | Transaction provisioning for mobile wireless communications devices and related methods |
US20140040139A1 (en) | 2011-12-19 | 2014-02-06 | Sequent Software, Inc. | System and method for dynamic temporary payment authorization in a portable communication device |
US20130169430A1 (en) | 2011-12-28 | 2013-07-04 | Joe Shook | Apparatus and method for smoke detection & alarm |
US20130219164A1 (en) | 2011-12-29 | 2013-08-22 | Imation Corp. | Cloud-based hardware security modules |
US20130212661A1 (en) | 2012-02-13 | 2013-08-15 | XceedlD Corporation | Credential management system |
US20130243189A1 (en) | 2012-03-19 | 2013-09-19 | Nokia Corporation | Method and apparatus for providing information authentication from external sensors to secure environments |
US20130263252A1 (en) | 2012-03-27 | 2013-10-03 | Validity Sensors, Inc. | Button depress wakeup and wakeup strategy |
US20130268931A1 (en) | 2012-04-06 | 2013-10-10 | Security First Corp. | Systems and methods for securing and restoring virtual machines |
US20130275748A1 (en) | 2012-04-17 | 2013-10-17 | Gemalto Sa | Secure password-based authentication for cloud computing services |
US20130298224A1 (en) | 2012-05-03 | 2013-11-07 | Authentec, Inc. | Electronic device including a finger sensor having a valid authentication threshold time period and related methods |
US20130298208A1 (en) * | 2012-05-06 | 2013-11-07 | Mourad Ben Ayed | System for mobile security |
US20140216914A1 (en) | 2012-05-18 | 2014-08-07 | Apple Inc. | Capacitive Sensor Packaging |
US20130332353A1 (en) * | 2012-06-08 | 2013-12-12 | American Express Travel Related Services Company, Inc. | System and method for using flexible circuitry in payment accessories |
US9002267B2 (en) | 2012-08-22 | 2015-04-07 | Blackberry Limited | Near field communications-based soft subscriber identity module |
US20140073321A1 (en) | 2012-09-11 | 2014-03-13 | Nokia Corporation | Method and apparatus for caching local mashup service parameters |
US20140090039A1 (en) | 2012-09-24 | 2014-03-27 | Plantronics, Inc. | Secure System Access Using Mobile Biometric Devices |
US20140101755A1 (en) | 2012-10-10 | 2014-04-10 | Research In Motion Limited | Mobile wireless communications device providing security features based upon wearable near field communication (nfc) device and related methods |
US20140121982A1 (en) | 2012-10-30 | 2014-05-01 | Nokia Corporation | Method and apparatus for determining biometrics utilizing 3-dimensional sensor data |
US20140143155A1 (en) | 2012-11-20 | 2014-05-22 | Nagravision S.A. | Electronic payment method, system and device for securely exchanging payment information |
US9021563B2 (en) | 2013-01-02 | 2015-04-28 | Htc Corporation | Accessory interface system |
US20140281565A1 (en) | 2013-03-15 | 2014-09-18 | Tyfone, Inc. | Configurable personal digital identity device responsive to user interaction |
Non-Patent Citations (78)
Title |
---|
Beadle, H. et al., "Using Location and Environment Awareness in Mobile Communications", International Conference on Information, Communication and Signal Processing, ICICS '97, Sep. 9-12, 1997, 5 pgs. |
Final Office Action notified Aug. 21, 2015 U.S. Appl. No. 13/844,183. |
Final Office Action notified Aug. 4, 2015 for U.S. Appl. No. 13/842,937. |
Final Office Action notified Feb. 5, 2016 for U.S. Appl. No. 13/842,871. |
Final Office Action notified Jan. 14, 2016 for U.S. Appl. No. 13/844,255. |
Final Office Action notified Jan. 23, 2015 for U.S. Appl. No. 13/843,065. |
Final Office Action notified Jul. 1, 2015 U.S. Appl. No. 13/842,871. |
Final Office Action notified Jul. 15, 2016 for U.S. Appl. No. 13/843,529. |
Final Office Action notified Mar. 5, 2015 for U.S. Appl. No. 13/843,091. |
Final Office Action notified May 1, 2015 for U.S. Appl. No. 13/843,402. |
Final Office Action notified May 12, 2015 for U.S. Appl. No. 13/844,141. |
Final Office Action notified May 14, 2015 for U.S. Appl. No. 13/844,255. |
Final Office Action notified Oct. 28, 2015 for U.S. Appl. No. 13/844,301. |
Final Office Action notified Oct. 8, 2015 for U.S. Appl. No. 13/843,529. |
Final Office Action notified Sep. 14, 2015 for U.S. Appl. No. 13/843,628. |
Final Office Action notified Sep. 18, 2015 U.S. Appl. No. 13/844,216. |
Final Office Action notified Sep. 25, 2015 for U.S. Appl. No. 13/843,988. |
International Preliminary Report on Patentability notified Sep. 24, 2019 for PCT Patent Application No. PCT/US2014/023533. |
International Search Report and Written Opinion notified Jul. 10, 2014 for PCT Patent Application No. PCT/US2014/023533. |
Kwapisz, J. et al., "Cell Phone-Based Biometric Identification", 2010 Fourth IEEE International Conference on Biometrics Compendium, 7 pgs. |
Lin, C. et al., "A New Non-Intrusive Authentication Method based on the Orientation Sensor for Smartphone Users", 2012 IEEE Sixth International Conference on Software Security and Reliability, 8 pgs. |
Non Final Office Action notified Jul. 22, 2022 for U.S. Appl. No. 17/315,148. |
Non-Final Office Action notified Apr. 13, 2023 for U.S. Appl. No. 18/056,250. |
Non-Final Office Action notified Apr. 4, 2019 for U.S. Appl. No. 16/257,956. |
Non-Final Office Action notified Aug. 14, 2014 for U.S. Appl. No. 13/843,065. |
Non-Final Office Action notified Dec. 12, 2019 for U.S. Appl. No. 16/675,670. |
Non-Final Office Action notified Dec. 26, 2014 for U.S. Appl. No. 13/844,183. |
Non-Final Office Action notified Feb. 3, 2016 for U.S. Appl. No. 13/843,831. |
Non-Final Office Action notified Feb. 4, 2016 for U.S. Appl. No. 13/843,988. |
Non-Final Office Action notified Jan. 13, 2016 for U.S. Appl. No. 13/842,937. |
Non-Final Office Action notified Jan. 15, 2015 for U.S. Appl. No. 13/843,529. |
Non-Final Office Action notified Jan. 15, 2015 for U.S. Appl. No. 13/843,831. |
Non-Final Office Action notified Jan. 15, 2015 for U.S. Appl. No. 13/843,988. |
Non-Final Office Action notified Jan. 20, 2016 for U.S. Appl. No. 13/843,529. |
Non-Final Office Action notified Jan. 30, 2015 for U.S. Appl. No. 13/844,216. |
Non-Final Office Action notified Jul. 31, 2014 for U.S. Appl. No. 13/843,091. |
Non-Final Office Action notified Jun. 30, 2017 for U.S. Appl. No. 15/069,548. |
Non-Final Office Action notified Jun. 4, 2018 for U.S. Appl. No. 15/903,935. |
Non-Final Office Action notified Mar. 18, 2015 for U.S. Appl. No. 13/843,628. |
Non-Final Office Action notified May 13, 2015 for U.S. Appl. No. 13/843,181. |
Non-Final Office Action notified May 18, 2015 for U.S. Appl. No. 13/844,301. |
Non-Final Office Action notified Nov. 18, 2014 for U.S. Appl. No. 13/843,000. |
Non-Final Office Action notified Nov. 18, 2014 for U.S. Appl. No. 13/843,694. |
Non-Final Office Action notified Oct. 14, 2014 for U.S. Appl. No. 13/844,339. |
Non-Final Office Action notified Oct. 16, 2014 for U.S. Appl. No. 13/844,141. |
Non-Final Office Action notified Oct. 2, 2015 for U.S. Appl. No. 13/843,402. |
Non-Final Office Action notified Oct. 22, 2015 for U.S. Appl. No. 13/843,065. |
Non-Final Office Action notified Oct. 26, 2016 for U.S. Appl. No. 14/741,493. |
Non-Final Office Action notified Oct. 5, 2020 for U.S. Appl. No. 16/932,088. |
Non-Final Office Action notified Oct. 7, 2014 for U.S. Appl. No. 13/843,402. |
Non-Final Office Action notified Sep. 11, 2014 for U.S. Appl. No. 13/842,871. |
Non-Final Office Action notified Sep. 11, 2014 for U.S. Appl. No. 13/842,937. |
Non-Final Office Action notified Sep. 24, 2015 for U.S. Appl. No. 13/842,871. |
Non-Final Office Action notified Sep. 4, 2014 for U.S. Appl. No. 13/844,255. |
Non-Final Office Action notified Sep. 4, 2015 for U.S. Appl. No. 13/844,255. |
Notice of Allowance notified Apr. 13, 2017 for U.S. Appl. No. 15/249,081. |
Notice of Allowance notified Apr. 19, 2017 for U.S. Appl. No. 14/741,493. |
Notice of Allowance notified Aug. 12, 2015 for U.S. Appl. No. 13/843,000. |
Notice of Allowance notified Aug. 26, 2015 for U.S. Appl. No. 13/843,694. |
Notice of Allowance notified Aug. 28, 2015 for U.S. Appl. No. 13/844,183. |
Notice of Allowance notified Aug. 3, 2016 for U.S. Appl. No. 13/843,831. |
Notice of Allowance notified Aug. 9, 2016 for U.S. Appl. No. 13/843,988. |
Notice of Allowance notified Dec. 20, 2016 for U.S. Appl. No. 15/237,624. |
Notice of Allowance notified Jan. 19, 2021 for U.S. Appl. No. 16/932,088. |
Notice of Allowance notified Jan. 5, 2017 for U.S. Appl. No. 15/237,735. |
Notice of Allowance notified Jul. 11, 2019 for U.S. Appl. No. 16/257,956. |
Notice of Allowance notified Jun. 12, 2015 for U.S. Patent Application No. 13/844,339. |
Notice of Allowance notified Jun. 5, 2017 for U.S. Appl. No. 13/843,529. |
Notice of Allowance notified Mar. 13, 2020 for U.S. Appl. No. 16/675,670. |
Notice of Allowance notified Mar. 9, 2016 for U.S. Appl. No. 13/843,402. |
Notice of Allowance notified Nov. 9, 2015 for U.S. Appl. No. 13/843,091. |
Notice of Allowance notified Oct. 19, 2017 for U.S. Appl. No. 15/069,548. |
Notice of Allowance notified Oct. 21, 2015 for U.S. Appl. No. 13/843,181. |
Notice of Allowance notified Oct. 9, 2018 for U.S. Appl. No. 15/903,935. |
Notice of Allowance notified Sep. 15, 2022 for U.S. Appl. No. 17/315,148. |
Notice of Allowance notified Sep. 29, 2015 for U.S. Appl. No. 13/844,141. |
Wroblewski, L. "Apples Overloaded iPhone Button", Aug. 16, 2011, 2 pgs. |
Yuan, J. et al., "ISILON—An Intelligent System for Indoor Localization and Navigation Based on RFID and Ultrasonic Techniques", Proceedings of the 8th World Congress on Intelligent Control and Automation, Jul. 6-9, 2010, 6 pgs. |
Also Published As
Publication number | Publication date |
---|---|
US10476675B2 (en) | 2019-11-12 |
US20200076605A1 (en) | 2020-03-05 |
US11006271B2 (en) | 2021-05-11 |
US20230078707A1 (en) | 2023-03-16 |
US20190158290A1 (en) | 2019-05-23 |
US20160197727A1 (en) | 2016-07-07 |
US20140273961A1 (en) | 2014-09-18 |
WO2014150535A1 (en) | 2014-09-25 |
US10721071B2 (en) | 2020-07-21 |
US9906365B2 (en) | 2018-02-27 |
US11832095B2 (en) | 2023-11-28 |
US10211988B2 (en) | 2019-02-19 |
US20200351096A1 (en) | 2020-11-05 |
US9319881B2 (en) | 2016-04-19 |
US20210337379A1 (en) | 2021-10-28 |
US20240349038A1 (en) | 2024-10-17 |
US11523273B2 (en) | 2022-12-06 |
US20180183598A1 (en) | 2018-06-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12302089B2 (en) | Wearable identity device for fingerprint bound access to a cloud service | |
US9183371B2 (en) | Personal digital identity device with microphone | |
US9215592B2 (en) | Configurable personal digital identity device responsive to user interaction | |
US9207650B2 (en) | Configurable personal digital identity device responsive to user interaction with user authentication factor captured in mobile device | |
US9659295B2 (en) | Personal digital identity device with near field and non near field radios for access control | |
US9231945B2 (en) | Personal digital identity device with motion sensor | |
US9781598B2 (en) | Personal digital identity device with fingerprint sensor responsive to user interaction | |
US9734319B2 (en) | Configurable personal digital identity device with authentication using image received over radio link | |
US9143938B2 (en) | Personal digital identity device responsive to user interaction | |
US20140270174A1 (en) | Personal digital identity device responsive to user interaction with user authentication factor captured in mobile device | |
US9154500B2 (en) | Personal digital identity device with microphone responsive to user interaction | |
US20140270175A1 (en) | Personal digital identity device with imager | |
US20140266603A1 (en) | Personal digital identity device with imager responsive to user interaction | |
US20140273960A1 (en) | Personal digital identity device with user authentication factor captured in mobile device | |
US20140273959A1 (en) | Personal digital identity device | |
US20140266606A1 (en) | Configurable personal digital identity device with microphone responsive to user interaction | |
US20140266602A1 (en) | Configurable personal digital identity device with fingerprint sensor responsive to user interaction |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ROGUE VENTURE PARTNERS FUND IV, L.P., TEXAS Free format text: SECURITY INTEREST;ASSIGNOR:SIDEASSURE, INC.;REEL/FRAME:067378/0202 Effective date: 20240305 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |