Eureka-AI is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Eureka AI

23290 results about "Authentication" patented technology

Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity, authentication is the process of verifying that identity. It might involve validating personal identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product or document is not counterfeit.

Authentication and authorization methods for cloud computing security platform

An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group (e.g., processors, storage, and memory) for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application. The cloud environment administrator, however, typically is not registered (as a permitted user) within the customer's security module; thus, the cloud environment administrator is not able to access (or release to others, or to the cloud's general resource pool) the resources assigned to the cloud customer (even though the administrator itself assigned those resources) or the associated business information. To further balance the rights of the various parties, a third party notary service protects the privacy and the access right of the customer when its application and information are deployed in the cloud.

RFID applications

Applications of RFID technology include: RFID Tags on Automobiles in Parking Garages; RFID w/Toothbrushes; RFID Tags For Laundry Settings; RFID Tags Or Labels to Find a Mate; RFID To Identify The Value Of Coins; RFID Tags In The Doctors Office; RFID Tags Or Labels In Game Arcades; RFID With Prisoners; RFID Tags To Identify Soldiers; RFID Labels As Tags To Label Particular Components Of Aircraft or Other Structures; Car, Snowmobile, Boat, Etc. Ignition That Won't Start Without RFID Card; Car seats with RFID reader and memory; Air bags that adjust based on information on RFID; Car that keeps track of GPS info and knows whos driving based on RFID; RFID Smart Closet; Method of taking attendance; RFID on networked desks to monitor the location of individuals; Personal computer reads RFID to log you in and take you to favorite web page, load favorites list, etc.; RFID labels on Files; RFID address label versions of all label and sheet inventions; RFID sports tickets; Combination function invitation and RFID chip to allow admittance; Roll of tape with RFID built in; Schoolbus reads which kids getting on, keeps record; RFID on each car wheel; RFID key to operate common-area laundry; RFID to automatically adjust weights/treadmill settings in gym; RFID w/clothes measurements, save shelf space at store, get proper size; RFID keyring w/car information; Keep track of who's driving around neighborhood; RFID dental implant; RFID Thumbtack; RFID Doorstop; RFID identification of boats or ships at docks; RFID on cups w/specifics of favorite coffee drinks; RFID on bridges with RFID tanks on top of cars, to detect speeding; RFID on studs in a wall and RFID reader that acts as a stud finder; RFID tags or labels inside tires; RFID cards supplied with newspapers or magazines; RFID card that lights up a when the user reaches a particular location; RFID sports ticket w/automatic map generation to seat; RFID card to tell school cafeteria what lunch to prepare for particular student; student desk with slot to receive RFID card, desks on networks together, Central computing system can tell where any particular student is sitting at any given moment within the school; RFID readers on outdoor play equipment; Authentication of Expensive Items With RFID; Paintings or other art work with RFID label to be used to verify the number in a limited series; RFID on sports helmet or uniform; RFID chips in paint; RFID cards issued to airline passengers to identify type of drinks and meals for a particular passenger, etc.; Greeting Cards With RFID; Decorative Tiles With RFID Tags; RFID in Car Washes; and Adaptive Advertising Based on RFID Information.

Home security system

The present invention provides a home security system that includes a home security controller for collecting monitor data from various crime prevention and disaster prevention sensors installed in a home via a home network and notifying the portable terminal when a state of emergency occurs. The home security controller also enables devices in the home to be operated through remote control signals via an external network. The home security system further includes a portable terminal capable of connecting to the external network and having fingerprint data inputting means mounted on the body of the portable terminal for inputting fingerprints used for authentication. The fingerprint data inputting means has an assigned ID number. The home security system further includes a security center server having fingerprint authenticating means for receiving fingerprint data from the portable terminal via the external network and authenticating the fingerprint data through comparisons with registered fingerprint data. The fingerprint authenticating means completes authentication by checking the assigned ID number of the fingerprint data inputting means and matching the received fingerprint data with fingerprint data registered in association with the ID number. The security center server allows a connection between the portable terminal and the home security controller and controls bi-directional communications between the two after the security center server has completed authentication, enabling the portable terminal to receive monitor data from and transmit remote control signals to the home security controller via the external network.

Internet payment, authentication and loading system using virtual smart card

InactiveUS7908216B1Advantageous for small dollar amount transactionMinimal timeFinancePayment circuitsMerchant servicesPayment
A system loads, authenticates and uses a virtual smart card for payment of goods and/or services purchased on-line over the Internet. An online purchase and load (OPAL) server includes a virtual smart card data base that has a record of information for each smart card that it represents for a user at the behest of an issuer. The server includes a smart card emulator that emulates a smart card by using the card data base and a hardware security module. The emulator interacts with a pseudo card reader module in the server that imitates a physical card reader. The server also includes a client code module that interacts with the pseudo card reader and a remote payment or load server. A pass-through client terminal presents a user interface and passes information between the OPAL server and a merchant server, and between the OPAL server and a bank server. The Internet provides the routing functionality between the client terminal and the various servers. A merchant advertises goods on a web site. A user uses the client terminal to purchase goods and/or services from the remote merchant server. The payment server processes, confirms and replies to the merchant server. The payment server is also used to authenticate the holder of a virtual card who wishes to redeem loyalty points from a merchant. To load value, the client terminal requests a load from a user account at the bank server. The load server processes, confirms and replies to the bank server.

Method and system for partitioned service-enablement gateway with utility and consumer services

A gateway for providing consumer services is presented. The gateway includes a secure partition associated with a gateway and operable to control access to at least one utility service and a bundle associated with the secure partition. The gateway also includes a consumer service associated with the secure partition and an application programmer interface (API) bundle associated with the secure partition and providing at least one support function to the consumer service. In addition, the gateway includes a provisioning service associated with the secure partition and the API bundle, the provisioning service operable to install the consumer service, a billing service associated with the secure partition and the API bundle, the billing service operable to provide billing capabilities to the consumer service and a profile service associated with the secure partition and the API bundle, the profile service operable to store a user profile. Further, the gateway includes an authentication service associated with the secure partition and the API bundle, the authentication service operable to authorize a user associated with the gateway, a remote-logging service associated with the secure partition and the API bundle, the remote-logging service operable to log an event associated with the consumer service, and a maintenance service associated with the secure partition and the API bundle, the maintenance service operable to determine a network status associated with the gateway.
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products