Entries |
Document | Title | Date |
20080197971 | System, method and article for online fraudulent schemes prevention - A method, system and scheme are presented that provide a means of establishing secure and reliable two-way authentication with online service providers (“Providers”) using a hardware device. The account holders (“Users”) use a unique hardware device (“Hardware Device”), which is plugged into the communication technology, such as computer, being used to access online accounts. The device is used for storing cryptographic algorithms and keys that are capable of performing hashing, encryption and decryption operations. The device is periodically refreshed with new keys, which cannot be read or duplicated by the User. | 08-21-2008 |
20080218311 | PATIENT IDENTIFICATION SYSTEM - The patient identification system of the preferred embodiments includes a transponder that is affixed to a patient and functions to communicate information that identifies the patient to a device or series of devices. The series of devices includes at least a first device that collects data from the patient and communicates with the transponder. The patient identification system is preferably designed to identify a patient, and more specifically to identify a patient to be associated with the data collected by the device. The patient identification system, however, may be alternatively used in any suitable environment and for any suitable reason. | 09-11-2008 |
20080315990 | Presence Informaion Notification System and Method, Computer Program, Charging System and Charging Device and Portable Device - A presence information notification system is provided which generates presence information indicating where or whether or not a user is present and notifies a terminal of the generated information substantially without requiring the user to perform any intentional operation therefor. | 12-25-2008 |
20090102603 | METHOD AND APPARATUS FOR PROVIDING AUTHENTICATION WITH A USER INTERFACE SYSTEM - A system, and method for use thereof, for authentication. The system may generate an image in a three dimensional coordinate system, for example a three dimensional lock. A sensing system may sense a user interaction with the image. The user interaction may include a user selecting a sequence, or code, of alphanumeric characters. The sensed user interaction may be correlated with the three dimensional coordinate system. The correlated user interaction may be compared with a predetermined authentication pattern. The predetermined authentication pattern may be a preset alphanumeric sequence indicating an allowed access. The system may also provide a user authentication if a match exists between the correlated user interaction and the predetermined authentication pattern. The system may be used for interconnecting or communicating between two or more components connected to an interconnection medium (e.g., a bus) within a single computer or digital data processing system. | 04-23-2009 |
20090146780 | UNIQUE IDENTIFICATION SYSTEM - An embodiment of the present invention includes a system and method for providing a unique and dynamic identification for members in a community. | 06-11-2009 |
20090189736 | Authentication System - [Problems] To provide an authentication system improving authentication accuracy of existence of a registered person and easily find an unauthorized act to improve the security in a system by performing authentication using coincidence/non-coincidence of biometrics information and temporal/spatial authentication when performing individual authentication via a network by using electronic information which is easily tampered, easily leaks out, and is easily stolen. | 07-30-2009 |
20090212908 | METHODS FOR INITIATING OPERATING VOLTAGES FOR SUBSCRIBER IDENTITY CARDS AND SYSTEMS UTILIZING THE SAME - A system for initiating operating voltages for subscriber identity cards is provided. The system includes a first subscriber identity card, a second subscriber identity card, an RF module, a controller and a Baseband unit. The controller initiates a first operating voltage of the first subscriber identity card and initiates a second operating voltage of the second subscriber identity, respectively. The Baseband unit cooperates with the first subscriber identity card to camp on a first cell and cooperates with the second subscriber identity card to camp on a second cell via the RF module. | 08-27-2009 |
20090212909 | PORTABLE ELECTRONIC AUTHORIZATION SYSTEM AND METHOD - In one embodiment, an apparatus comprises a user authenticator and a transponder. The transponder is permitted to emit a wireless signal representing information stored in the apparatus in response to a wireless interrogation signal after the user authenticator has authenticated the identity of the user. In another embodiment, an apparatus comprises, a memory, a user input, and a transponder. The memory stores at least first and second distinct codes. The user input permits a user to select any one of the at least first and second codes for transmission in response to a wireless interrogation signal. The transponder emits a wireless signal representing the selected one of the at least first and second codes in response to an interrogation signal. In yet another embodiment, a token that may be used to engage in a transaction at a point of sale comprises a substrate, a rewritable memory, and a reconfigurable display. The rewriteable memory is supported by the substrate and can be selectively configured to store information on the token that identifies an account that is to be used to engage in the transaction at the point of sale. The substrate and memory are configured and arranged such that the substrate can be selectively interfaced with an apparatus at the point of sale to permit the apparatus to read the contents of the memory. The reconfigurable display is also supported by the substrate and displays at least some of the information that is stored in the rewritable memory. | 08-27-2009 |
20090278657 | IMAGE DISPLAY DEVICE AND METHOD FOR CONTROLLING THE SAME - A disclosed image display device includes a display part; a user identifying part configured to perform personal identification to identify personal identification information; a detecting part configured to detect whether the image display device is held by hand; and a control part configured to display an image on the display part upon a display request when the user identifying part identifies personal identification information obtained upon the display request as personal identification information of an authorized user, to continue displaying the image on the display part as long as the detecting part detects that the image display device is held by hand, and to erase the image on the display part when the user identifying part fails to identify the personal identification information of the authorized user by a personal identification performed upon detecting by the detecting part that the image display device is not held by hand. | 11-12-2009 |
20090284347 | IDENTITY VERIFICATION BADGE AND METHOD FOR UTILIZING SAME IN A SECURITY SYSTEM - An identification and verification security badge is disclosed. The badge includes a keypad that allows the entry of user information that is monitored and verified by a processor within the badge. The processor compares an inputted personal identification number with one that is stored within a memory within the badge. When a match is found, an access code is transmitted that includes at least a badge identification code that uniquely identifies the badge. The badge also includes an on-body sensor that determines the status of the badge with respect to a user. When the sensor determines that the badge is not in close proximately to the user, then transmission from the badge is inhibited. In another aspect, when a transition from one state of the badge sensor to another state is determined, the personal identification number is required to be entered. | 11-19-2009 |
20100052851 | Security System Utilizing Gesture Recognition - Systems and methods are provided for restricting access to an item of interest. A normalization component resamples an input trajectory to produce a resampled trajectory having a standard size. A reference point generator reduces the resampled trajectory to respective values for a set of reference points, each having at least two associated coordinates. The system further includes at least one authentication region. Each of the at least one authentication region represents at least one of the set of reference points. A verification component is configured to determine if the values for the set of reference points from a given input falls within the at least one authentication region. An access restriction mechanism restricts access to the item of interest unless a threshold number of values for the set of reference points from the input falls within their associated authentication regions. | 03-04-2010 |
20100102929 | PROTECTION, SECURITY AND DISPLACEMENT TRACKING LUMINOUS BADGE SYSTEM - The invention relates to an equipment comprising at least one badge ( | 04-29-2010 |
20100117792 | DEVICE INCLUDING AUTHENTICATION GLYPH - A device used in an authentication process. The device includes a processor, a display coupled to the processor, and a computer readable medium coupled to the processor. The computer readable medium includes (i) code for displaying a first authentication image including a plurality of image elements including a set of image elements, where the image elements in the set of image elements are located at a first set of positions on a display screen, (ii) code for receiving a first glyph having a first configuration corresponding to the set of image elements from a user while the first authentication image is displayed, (iii) code for displaying a second authentication image including the plurality of image elements including the set of image elements, where the image elements in the set of image elements are located at a second set of positions on the display screen, where the second set of positions is different than the first set of positions, and (iv) code for receiving a second glyph having a second configuration corresponding to the set of image elements from a user while the first authentication image is displayed | 05-13-2010 |
20100117793 | PHOTOGRAPHING CONTROL APPARATUS, PROGRAM AND METHOD OF THE SAME, AND PHOTOGRAPHING APPARATUS - An imaging control apparatus for controlling an imaging apparatus that presents presentation information and captures an image of a person, the imaging control apparatus includes: an identification information acquisition unit that acquires identification information; an information presentation instruction unit that refers to presentation information setting information which associates the identification information and the presentation information with each other, and instructs the imaging apparatus to present presentation information that the presentation information setting information associates with identification information acquired by the identification information acquisition unit; and an imaging instruction unit that instructs the imaging apparatus to capture an image of the person while the instruction presentation instruction unit instructs to present the presentation information. | 05-13-2010 |
20100134244 | IMAGE PROCESSING DEVICE, USER AUTHENTICATION METHOD AND PROGRAM - The present invention is intended to improve operability of an operation panel in case of using a function imposed a limitation on use in an image processing device. In order to achieve this, an image processing device | 06-03-2010 |
20100265036 | Personalized device owner identifier - One aspect of the disclosure relates to obtaining an identifiable aspect of a supposed owner of a personalized device; and determining whether the supposed owner of the personalized device is a true owner of the personalized device based at least in part on the obtaining an identifiable aspect of the supposed owner of the personalized device. Another aspect of the disclosure relates to obtaining a feature of a supposed owner; and identifying an aspect of a personalized device owner identifier based at least in part on the obtaining the feature of the supposed owner. | 10-21-2010 |
20100321155 | OBJECT AUTHENTICATION SYSTEM - A system employing enrollment information and the quality of the enrollment information. The enrollment information includes data unique to the identification of a person. The system also stores biometric sensor quality information. When a person seeks to authenticate his/her identity, the sensor transmits the sensor quality data along with the biometric attribute data to the system. The transmitted data is correlated with the enrollment data, and quality of the enrollment data, to produce a score indicative of the probability of a correct identification. | 12-23-2010 |
20110102140 | Universal validation module for access control systems - A validation module provides for the upgrading of a physical access control system (PACS) to full HSPD-12 compliance without requiring modification or replacement of the existing PACS. The validation module may contain all of the validation functionality required by federal specifications and technical requirements. The validation module may be installed between an existing PACS panel and a supported card/biometric reader. Readers may be selected based on assurance level requirements, e.g., contactless or contact readers for low and medium assurance level areas and full biometric readers for high assurance areas. The validation module may validate a card according to the assurance level setting, extract ID information from data on the card and then pass the ID information to the PACS panel for an access decision. Cardholder data captured by one validation module may be distributed to other validation modules of the PACS using a management station. | 05-05-2011 |
20110187499 | METHOD FOR OPERATING A MOTOR VEHICLE - In a method for operating a motor vehicle ( | 08-04-2011 |
20110215902 | CUSTOMER RECOGNITION METHOD AND SYSTEM - Disclosed embodiments describe a customer recognition method and system. The customer recognition system has an acknowledgment server that carries out the customer recognition method. The customer recognition method may include storing customer profile data related to a customer and identity device data related to an identity device; receiving a unique device identifier from a sensor within communication range of the identity device; retrieving customer profile data from the profile database based on the received identifier; sending the customer profile data to the sensor; and receiving an acknowledgement status relating to the customer. | 09-08-2011 |
20110248822 | SYSTEMS AND APPARATUSES AND METHODS TO ADAPTIVELY CONTROL CONTROLLABLE SYSTEMS - A system can include a presence apparatus, an identification apparatus, an interaction apparatus, and a controlling apparatus. | 10-13-2011 |
20120007713 | HANDHELD COMPUTER SYSTEMS AND TECHNIQUES FOR CHARACTER AND COMMAND RECOGNITION RELATED TO HUMAN MOVEMENTS - Systems and methods for human hand gesture recognition through a training mode and a recognition mode are disclosed. In the training mode, a user can move a handheld device with a hand gesture intended to represent a command. Sensors within the handheld device can record raw data, which can be processed to obtain a set of values corresponding to a set of discrete features, which is stored in a database and associated with the intended command. The process is repeated for various hand gestures representing different commands. In the recognition mode, the user can move the handheld device with a hand gesture. A computer system can compare a set of values corresponding to a set of discrete features derived from the hand gesture with the sets of values stored in the database, select a command with the closest match and displays and/or executes the command. | 01-12-2012 |
20120105199 | Validating Sensor Data at a Community Sensor-Coordinating Entity - In one embodiment, a method includes receiving sensor data from a source associated with a person; comparing the sensor data against a sensor information model of the person that includes a description of the person, a description of a sensor associated with the person, a description of a property associated with the person, and a description of a virtual community that the person is associated with; determining whether the sensor data are valid based on the comparison; and if the sensor data are valid, routing the sensor data to an application provider associated with the virtual community. | 05-03-2012 |
20120256725 | AUTHENTICATION SYSTEM - [PROBLEMS] To provide an authentication system improving authentication accuracy of existence of a registered person and easily find an unauthorized act to improve the security in a system by performing authentication using coincidence/non-coincidence of biometrics information and temporal/spatial authentication when performing individual authentication via a network by using electronic information which is easily tampered, easily leaks out, and is easily stolen. [MEANS FOR SOLVING PROBLEMS] An authentication server ( | 10-11-2012 |
20120286929 | AUTHENTICATED SECURITY SYSTEM - An apparatus, system, and method are disclosed for detecting intruders within a home or business. The apparatus may include a signal generation module that generates a signal pulse. At least a portion of the signal pulse is reflected off individuals within the space. The signal pulse also includes instructions for an RFID tag to send a response message. A first distance is measured between the individual and a position sensor using the reflected portion of the signal. A second distance is measured between the RFID tag and the RFID reader. If the distances are substantially equal, the individual is treated as authorized to be in the space. If the distances are not equal, or if no response is received from the RFID tag, the individual is treated as unauthorized and security measures are taken. | 11-15-2012 |
20130038425 | SYSTEM AND METHOD FOR PERFORMING COMMANDS FROM A REMOTE SOURCE - According to one embodiment of the invention, a method for secured execution of commands is described. Initially, a second electronic device authenticates a first electronic device and registers the first electronic device as a trusted device. Thereafter, up receipt of a message with one or more embedded commands, such commands are executed without any pre-established communication protocol if the message is from the registered first electronic device. | 02-14-2013 |
20130141213 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER-READABLE RECORDING MEDIUM STORING A PROGRAM - An information processing apparatus includes: a first storage part that stores correspondence information between a first identification information and second identification information; a user identification part that identifies the second identification information corresponding to the first identification information in response to an input of the first identification information; and an authentication request part that requests an authentication to an authentication device connected through a network based on the second identification information identified by the user identification part. The user identification part inquires the authentication device about the corresponding second identification information with respect to the first identification information that is not stored in the first storage part. | 06-06-2013 |
20130162396 | Automatically Controllable Smart Stroller or Wheelchair - A smart stroller or wheelchair device includes a frame, a body-movement detecting unit provided on the frame, a drive control unit and a drive unit. The drive control unit electrically connects with the body-movement detecting unit and the drive unit. The body-movement detecting unit is operated to detect a position and a distance of an operator, thereby the drive control unit synchronously controlling the drive unit to move the frame a predetermined distance. In an embodiment, the stroller or wheelchair device includes a light sensor unit, a canopy control unit and a canopy drive unit. In an alternative, the stroller or wheelchair device includes a backrest adjustment mechanism, a recognition system or a safety guard system. | 06-27-2013 |
20130194070 | BIOMETRIC AUTHENTICATION - A tool for determining whether to grant a current person access to a protected resource. A computer receives a plurality of touches performed by a current person on a touch screen. Each touch in the plurality of touches includes a location of the touch on the touch screen and a surface area measurement of the touch screen impacted by the current person. The computer determines whether each touch in the plurality of touches received matches a predetermined touch performed by a person authorized to access the protected resource. If each touch in the set of touches received matches a stored touch performed by a person authorized to access the protected resource the current person will be granted access to the protected resource. | 08-01-2013 |
20130214905 | PORTABLE TERMINAL AND GRIPPING-FEATURE LEARNING METHOD - A portable terminal includes a gripping-feature sample acquisition section that acquires a gripping feature sample from a sensor array; a former-template storage that stores an old authentication template in a portable terminal used in the past, as a former template; a feature-segment extracting section that extracts a feature segment from the former template and calculates a distance between the former template and the gripping feature sample in each feature segment; a segment-position correcting section that applies deformation correction to the former template in a feature segment in which the distance calculated by the feature-segment extracting section is longer than a predetermined value, to generate a corrected template; a template comparison section that compares the corrected template with the acquired gripping feature sample and calculates an inter-vector distance therebetween; and a template storage that stores the corrected template as an authentication template when the inter-vector distance is equal to or shorter than a predetermined value. | 08-22-2013 |
20130241696 | METHOD, SYSTEM AND PROGRAM PRODUCT FOR IDENTIFYING A USER ON AN EXERCISE EQUIPMENT - A method, a system and a program product for identifying a user on a exercise equipment. An equipment identification code associated to a exercise equipment is acquired by means of an electronic portable device of the user. The equipment identification code and the user identification code are sent, by means of the electronic portable device, to an electronic calculator operatively connected to the exercise equipment. | 09-19-2013 |
20140009265 | System and Method for Providing Checkpoint Background Checks - An improved method for providing checkpoint background checks is described herein. In one embodiment, the pass control method can comprise collecting data related to the identity of a visitor with a checkpoint computer, transferring the data to a pass control server, querying one or more member profiles using the data, and returning a message to the checkpoint computer. In this method, the member profiles can comprise identity information and one or more flags. The flags can be related to an outcome of a previously performed background check performed using the identity information. The message returned to the checkpoint computer can be related to the flags within any of the member profiles comprising identity information that matches the data. | 01-09-2014 |
20140043141 | SERVICE IDENTIFICATION AUTHENTICATION - A server receives a service personnel identification verification request from a computing device. The request includes identification information obtained via the computing device from a security badge. The computer determines whether there is a security concern with the identification information by comparing the identification information to stored service personnel information in a service personnel database. A response is sent to the computing device indicating the result of the determination, for presentation to a user who may be interacting with a person having the security badge. | 02-13-2014 |
20140125455 | SYSTEMS AND ALGORITHMS FOR CLASSIFICATION OF USER BASED ON THEIR PERSONAL FEATURES - A system and algorithms to authenticate a person where a system only has some standard personal text data about the person, and cannot have a real biometric template obtained using an enrollment procedure. The authentication allows access to restricted resources by the person. This method is especially useful when it is used as an auxiliary authentication service with other methods such as password or Callback that dramatically lower the chances for an imposter. | 05-08-2014 |
20140139317 | IN-VEHICLE ELECTRONIC DEVICE AND DATA COLLECTION SYSTEM - The present invention relates to an in-vehicle electronic device and a data collection system including the same, and has an object to enhance the convenience. In order to achieve this object, the present invention includes: an input unit for a personal ID; an in-vehicle control unit connected to the input unit; and an in-vehicle transmission unit and an in-vehicle reception unit connected to the in-vehicle control unit. The in-vehicle control unit is connected to a memory that records therein a data collection condition set for each personal ID. If a personal ID is inputted to the input unit, data of a person associated with the personal ID can be collected from a server. With this configuration, pieces of data of a plurality of persons who are in the same automobile can be collected from the server. | 05-22-2014 |
20140218169 | SECURITY DEVICE FOR EQUIPMENT INFORMATION AND THE OPERATION METHOD THEREOF - An equipment information security device is provided. The equipment information security device is installed on an equipment with confidential information, wherein the equipment or the device has a security interface, the device comprises: a fitting which is worn by a staff and combined with an electronic tag with or without authority to the corresponding equipment; a tag reader, which detects the electronic tag within a detecting area corresponding to the security interface; and an authority processing unit, which links to the tag reader: wherein the authority processing unit sets the security interface to an operation state and enables the security interface when there are only the authorized electronic tags being detected in the detecting area, and the authority processing unit sets the security interface to a security state and disables the security interface when one or more unauthorized electronic tags are detected in the detecting area. | 08-07-2014 |
20140240092 | SYSTEMS AND METHODS FOR IDENTIFYING A USER OF AN ELECTRONIC DEVICE - Systems and methods for identifying a user of an electronic device are disclosed. An example method includes capturing body characteristic data associated with a user via a sensor on a computing device. The body characteristic data is captured as the user interacts with the computing device for a purpose different from user identification. The example method includes determining an identifier associated with the user based on the captured body characteristic data. | 08-28-2014 |
20140266595 | Systems and Methods for Job Site Management - Systems and methods for job site management, such as those, for example, configured validate a worker, clock-in a worker, clock-out a worker, detect a geographic location of a worker, provide information relating to a worker, and the like. | 09-18-2014 |
20140266596 | CONFIGURABLE PERSONAL DIGITAL IDENTITY DEVICE RESPONSIVE TO USER INTERACTION WITH USER AUTHENTICATION FACTOR CAPTURED IN MOBILE DEVICE - A personal digital ID device provides a digital identifier to a service for a predetermined duration in response to user interaction. The user interaction may include a button press. The personal digital ID device may be in the form of a bracelet, a key fob, or other form factor. The service may be provided by a mobile device, in the cloud, or elsewhere. | 09-18-2014 |
20140266597 | PERSONAL DIGITAL IDENTITY DEVICE WITH MOTION SENSOR RESPONSIVE TO USER INTERACTION - A personal digital ID device provides a digital identifier to a service for a predetermined duration in response to user interaction. The user interaction may include a button press. The personal digital ID device may be in the form of a bracelet, a key fob, or other form factor. The service may be provided by a mobile device, in the cloud, or elsewhere. | 09-18-2014 |
20140266598 | CONFIGURABLE PERSONAL DIGITAL IDENTITY DEVICE WITH MOTION SENSOR RESPONSIVE TO USER INTERACTION - A personal digital ID device provides a digital identifier to a service for a predetermined duration in response to user interaction. The user interaction may include a button press. The personal digital ID device may be in the form of a bracelet, a key fob, or other form factor. The service may be provided by a mobile device, in the cloud, or elsewhere. | 09-18-2014 |
20140266599 | CONFIGURABLE PERSONAL DIGITAL IDENTITY DEVICE WITH IMAGER RESPONSIVE TO USER INTERACTION - A personal digital ID device provides a digital identifier to a service for a predetermined duration in response to user interaction. The user interaction may include a button press. The personal digital ID device may be in the form of a bracelet, a key fob, or other form factor. The service may be provided by a mobile device, in the cloud, or elsewhere. | 09-18-2014 |
20140340197 | Method for Deploying Large Numbers of Waste Containers in a Waste Collection System - A method of redeploying waste containers in a waste collection system with an active or passive signal means requires a user to aim an optical character recognition reader at a waste container comprising a unique optical waste container identifier. The optical character recognition reader reads unique waste container optical identifier. The unique waste container optical identifier is converted to a unique electronically formatted waste container identifier. A unique radio frequency signal identifier is stored on a radio frequency emitting tag and associated with the unique electronically formatted waste container identifier. The radio frequency emitting tag is attached to the waste container. | 11-20-2014 |
20140361873 | DECOUPLED CONTACTLESS BI-DIRECTIONAL SYSTEMS AND METHODS - A contactless bi-directional device including first and second generally mutually electromagnetically decoupled contactless loop antennas which are arranged in at least partially mutually overlapping orientation, first and second contactless communication chips, each of the first and second communications chips being connected to a corresponding one of the generally mutually electromagnetically decoupled contactless loop antennas, thereby providing bi-directional communication. | 12-11-2014 |
20150077228 | SYSTEM, DEVICE, AND METHOD OF TRANSMITTING A PLURALITY OF CREDENTIALS VIA NEAR-FIELD COMMUNICATION - A novel system and methodology for conducting financial and other transactions using a wireless device. Credentials may be selectively issued by issuers such as credit card companies, banks, and merchants to consumers permitting the specific consumer to conduct a transaction according to the authorization given as reflected by the credential or set of credentials. The preferred mechanism for controlling and distributing credentials according to the present invention is through one or more publicly accessible networks such as the Internet wherein the system design and operating characteristics are in conformance with the standards and other specific requirements of the chosen network or set of networks. Credentials are ultimately supplied to a handheld device such as a mobile telephone via a wireless network. The user holding the credential may then use the handheld device to conduct the authorized transaction or set of transactions via, for example, a short range wireless link with a point-of-sale terminal. | 03-19-2015 |
20150294514 | System and Method for Identification Triggered By Beacons - There is provided systems and methods of identification and automation of devices using a beacon. A system includes a beacon, an automation device, and a server. The beacon is configured to transmit a signal to the automation device in response to entering a defined geographic zone. The automation device is configured to receive the signal from the beacon, transmit, in response to receiving the signal, the signal to the server, receive an identification of a person possessing the beacon from the server, and activate an automation feature, wherein the automation feature uses the identification of the person possessing the beacon. An automation feature may include, but is not limited to, a video camera, a display device, or a stereo. | 10-15-2015 |
20150339871 | ENTITY MANAGEMENT AND RECOGNITION SYSTEM AND METHOD - A system and method for wirelessly monitoring and recognizing people and things is disclosed. An entity monitoring and recognition (EMAR) unit at a site detects the presence of the entity, and in response the unit recognizes the entity and triggers an action, wherein the detection and recognition comprises the EMAR unit wirelessly communicating with a device associated with the entity without any action on the part of the entity. A site is a physical location, including a budding. The system also stores detection and recognition events and associates them with the entity, the time of the detection and recognition, and a touchpoint within the site at which the detection and recognition occurred. | 11-26-2015 |
20150348342 | Electromagnetic Persona Generation Based on Radio Frequency Fingerprints - Electromagnetic (EM)/radio frequency (RF) emissions may be detected and corresponding EM personas may be created. One or more EM personas may be associated with a super persona corresponding to a particular entity. EM personas, super personas, and/or supplemental identifying information can be used to enforce security protocols. | 12-03-2015 |
20160001782 | Method and device for identifying a driver of a vehicle - In a method for identifying a driver of a vehicle, it is ascertained to what extent the driver is authorized to operate the vehicle, and the option of automatically adapting settings of the vehicle to individual users of the vehicle is provided. The identification of the driver, i.e., the recognition of an authorized user or a particular person who is an authorized user initially takes place by acquiring at least one operating parameter of the vehicle. The temporal behavior of this operating parameter then is compared to correspondingly stored comparison data in order to allow an identification of the driver or the user of the vehicle. | 01-07-2016 |
20160125677 | WEARABLE DEVICE WITH USER AUTHENTICATION INTERFACE - A wearable device is used to authenticate a user into a user account at a user device of the user. In particular, the wearable device may include a sensor configured to detect whether the wearable device is worn by or is with the user. If so, the wearable device may send a signal to the user device and the user device may authenticate the user based on the signal received from the wearable device. For example, when the sensor detects that the wearable device is worn by the user, the wearable device may send a unique signal periodically, such as every five seconds or every 10 seconds. Based on whether the unique signal from the wearable device is received, the user device may authenticate the user. | 05-05-2016 |
20160379458 | SMART DETECTION - Security and/or automation systems, collectively referred to as automation systems, may allow a parent to leave their child at home and feel comfortable. The automation system may receive a notification that the parents are leaving. The parents may set a child alone state or a babysitter state. The system may use settings determined by the parents to track child parameters. Restricted areas may include a parents liquor cabinet, a parents bedroom, an office, and the like. The automation system may additionally track the comings and goings of a child to determine if the child is out past a curfew, when the child left, when the child arrived at home, and the like. Additionally, the parent away state may implement a lock down on any firearms or other potential hazards in a home. | 12-29-2016 |