Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Authentication (e.g., identity)

Subclass of:

340 - Communications: electrical

340825000 - SELECTIVE

340500100 - Intelligence comparison for controlling

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
340500810 Personal identification 296
340500860 Document authentication 27
Entries
DocumentTitleDate
20100156593Radiation image capturing system - The power consumption of a battery for supplying electric power to a cassette having a radiation detector for detecting radiation image information is greatly reduced. When a cassette transceiver of the cassette starts transmitting the radiation image information to a console transceiver of a console, the cassette transceiver changes the gain of a variable-gain amplifier to change a transmission radio-wave intensity, and transmits a test signal at the changed transmission radio-wave intensity. When the console transceiver receives the test signal, the console transceiver transmits a reception acknowledgement signal generated by a reception acknowledgement signal generator. In response to the reception acknowledgement signal, the cassette transceiver sets its own transmission radio-wave intensity to a value at the time the cassette transceiver received the reception acknowledgement signal, and transmits the radiation image information at the set transmission radio-wave intensity.06-24-2010
20090195354Authenticating a signal based on an unknown component thereof - Authentication of a signal, signal08-06-2009
20090195355METHODS AND APPARATUS FOR PLACE SHIFTING CONTENT TO A VEHICLE ENTERTAINMENT SYSTEM - Apparatus, systems and methods are provided for transferring content from a home entertainment system to a vehicle entertainment system through a wireless connection. A user requests to experience content, through a vehicle entertainment system that is stored or otherwise made available through a content source that is located remotely with respect to the vehicle entertainment system. The vehicle entertainment system transmits a request to a base station communicatively coupled to the content source and the base station responsively retrieves the content from the content source and transmits the content over a wireless connection to the vehicle entertainment system.08-06-2009
20110187494METHOD AND APPARATUS TO VALIDATE A SUBSCRIBER LINE - A method is described of providing validation data associated with a subscriber line of a telecommunication network using a validation system. The method includes obtaining line data of the subscriber line wherein the line data is suitable for interrogating a line identification database (LIDB). The method interrogates the LIDB with the line data to obtain reference subscriber data associated with the line data, and processes the reference subscriber data to obtain validation data associated with the subscriber line. The method includes identifying a local exchange carrier (LEC) associated with the subscriber line to determine if a billing arrangement exists between the validation system and the LEC. The invention extends to a subscriber line validation system to validate a subscriber line of a communication network.08-04-2011
20100073130KEY HOLDING DEVICE FOR IN-VEHICLE AUXILIARY KEY - A key holding device includes a key cylinder capable of retaining an auxiliary key which is a vehicle key that is not a master key. A rotor is rotatably arranged in the key cylinder. The auxiliary key is insertable into the rotor. A tumbler is rotatable with the rotor in the key cylinder. The tumbler holds the auxiliary key in a manner irremovable from the key cylinder in accordance with the rotational position of the rotor. A key lock mechanism is capable of locking the rotor in a state in which the tumbler holds the auxiliary key in a manner irremovable from the key cylinder. A control unit selectively switches the rotor between a locked state and an unlocked state by controlling the key lock mechanism so as to permit removal of the auxiliary key when the rotor is in the unlocked state.03-25-2010
20100073128APPARATUS AND METHOD FOR SECURE DETECTION OF AN ITEM AND A METHOD OF SECURING ACCESS TO INFORMATION ASSOCIATED WITH THE ITEM - Privacy of information is protected by a method of securing access to information associated with a value item, the method involving comparing a security signature and a stored profile, and permitting access to the information associated with the value item if the security signature matches the stored profile.03-25-2010
20100073129ELECTROMECHANICAL LOCK - The invention relates to an electromechanical lock comprising: an electronic circuitry (03-25-2010
20100045425 DATA TRANSMISSION OF SENSORS - A method for data transmission between a sensor module for measuring and storing data and a mobile device wherein the sensor module and the mobile device have identified each other and, wherein the sensor module comprises a first secure element capable of storing a first security key and the mobile device comprises a second secure element capable of storing a second security key characterized in that the method comprises the steps of an authentication step for carrying out a security process between the sensor module and the mobile device in order to authenticate the sensor module with the mobile device by means of comparing first and second security keys; a pairing step for establishing a communication between the sensor module and the mobile device in order to enable communication therebetween; a transmission step for establishing a secure transmission of data from the sensor module to the mobile device when comparison of the first and second security keys has resulted in authentication.02-25-2010
20120206234Systems for Activating and/or Authenticating Electronic Devices for Operation with Athletic Equipment - Articles of clothing or pieces of athletic equipment include modules, e.g., for sensing physical and/or physiological characteristics associated with use of the clothing or athletic equipment or for performing other functions. Such systems and methods may use physical or other interaction(s) between the module and the article of clothing or piece of athletic equipment for activating and/or deactivating the module and/or sensing devices included with the module, for confirming whether the module and clothing or piece of athletic equipment are authorized for use with one another, and/or for automatic data algorithm selection methods. Additionally, such systems and methods also may use the activation and/or authentication systems for data input to the module. Some examples of such systems and methods may utilize magnets and magnetic sensing systems and/or light (or other radiation) sources and sensing systems for activation, authentication, data input, and/or algorithm selection.08-16-2012
20100097175VEHICLE AUTHENTICATION DEVICE - A vehicle authentication device has an in-vehicle device mounted on a vehicle, an authentication unit disposed in the in-vehicle device, for matching an ID returned from a portable device in response to a request from the in-vehicle device and performing an authentication of the vehicle, and an operation switch for instructing a power supply transition of the vehicle. The in-vehicle device has a measurement unit for measuring a duration of an active state of the operation switch, a determination unit for determining whether the duration exceeds a predetermined time, and a control unit for executing a power supply transition control of the vehicle based on the determination that the duration time of the active state of the operation switch exceeds the predetermined time made by the determination unit and an authentication result of the authentication unit.04-22-2010
20130038424ATTENUATION LEVEL BASED ASSOCIATION IN COMMUNICATION NETWORKS - An electric vehicle can be configured to execute an association procedure with one or more charging stations in a charging facility to securely connect to and receive electric power from one of the charging stations. The electric vehicle can broadcast one or more service matching messages to the charging stations and, in response, can receive attenuation information from one or more of the charging stations. The electric vehicle can analyze the attenuation information received from the charging stations to identify with which charging station the electric vehicle should associate (e.g., to determine which charging station should provide electric power to the electric vehicle). The electric vehicle can then associate with (and receive electric power from) the identified charging station.02-14-2013
20090045909Water Friend or Foe System for Global Vessel Identification and Tracking - A Water Friend or Foe System (WFSS) includes a Subscriber Identity Module (SIM) card in a SIM reader on a marine vessel. A transmitter, which is coupled to the SIM reader, transmits information from the SIM card, as well as positioning information, to a WFFS tracking station.02-19-2009
20100066488SYSTEM AND METHOD FOR VALIDATED GUEST REVIEWS - The present invention relates to a validation system and method which enables a guest review website to prevent people from posting reviews of hotels without having an invitation with a unique identifier generated by an independent service provider.03-18-2010
20100066489SECURITY-ENABLED DIGITAL MEDIA AND AUTHENTICATION METHODS THEREOF - Embodiments of methods, devices and/or systems for security-enabled digital media and authentication methods thereof are described.03-18-2010
20090045910Platform for Standardizing Vehicle Communications With Third-Party Applications - A business-to-vehicle platform functions as an information technology (IT) integration platform to support secure communication between a vehicle's onboard IT system and any offboard third-party IT system. In one embodiment, the a vehicle's communication hub is decoupled from all voice and data traffic to/from third-party service providers, such that the vehicles will “look and feel” like standard business IT devices to the third-party service providers. In certain embodiments, this decoupling enables the use of standardized business IT services in vehicles, rather than the traditional approach of requiring vehicle-specific embedded services.02-19-2009
20090309695COMPUTING SYSTEM AND COMPUTER-IMPLEMENTED METHOD FOR A MULTI-CARD SYSTEM - A computer-implemented method for a multi-card system is provided. An inserted card detects the operational status of cards of the same type. The inserted card will be in standby status when inserted card finds an active card of the same type. If the inserted card does not find any active card of the same type, the inserted card will send a query to a control card requesting the operational status of the cards of the same type. If the control card accepts the query, the control card will send a signal to the inserted card. The inserted card determines its operational status based on the signal. If the inserted card does not receive the signal in a predetermined amount of time, it will be activated.12-17-2009
20100271172CAR-CHARGING SYSTEM - The car-charging system can charge only an authenticated car both in a public parking area and at home. The car-charging system is capable of charging a charge-accumulating device in the car to be charged through a power-supplying line from a power source outside the car, and is arranged to authenticate the car by means of communication between an authentication-managing device in a power-supplying device outside the car and a DSRC onboard device in the car. The authentication-managing device and DSRC onboard device each have a DSRC basic application software program implemented thereon.10-28-2010
20120218073Accessible Region of a Device - A device to detect a portable device associated with a user accessing an accessible region of the device with a sensor, identify the portable device and log the user into the device with a profile of the user if the accessible region is accessed by the portable device, and generate a session on the device based on the profile of the user.08-30-2012
20090091422DEVICE IDENTIFICATION VIA SERIAL COMMUNICATION LINK - Systems and methods are provided that enable identification of an accessory device or other peripheral device via a serial communication link. An electronic device (e.g., a media player or portable media device) may identify an accessory device using a serial communication link when the accessory device is attached or coupled to the electronic device. Based on serial communications, for example, the electronic device may discover and identify an accessory device to determine whether one or more preferences or functionalities should be set or enabled. The electronic device may also discover whether an accessory device or its manufacturer, distributor, or retailer is authorized or licensed to enable certain functionalities or set certain preferences when connect to the electronic device. Therefore, aspects of a serial communication link that may already exist in many electronic devices for data communication usage may be repurposed to provide identification or authorization of accessories or other peripheral devices.04-09-2009
20090267730Robust Authentication and Key Agreement Protocol for Net-Generation Wireless networks - Embodiments of the invention may be used to provide an authentication and key agreement protocol that is more robust against base station, replay and other attacks compared to previously known systems. The nonce-based authentication and key agreement protocol provides security against such attacks while avoiding the problems that arise in systems that use sequence number counters on the home environment and mobile station-sides. In an embodiment, a nonce that is transmitted from the user to the home environment through the serving network, as well as subsequent values for the nonce that are derived from the initial nonce, are used as indices for authentication vectors.10-29-2009
20090267729Anti-counterfeiting system - A method and apparatus for verifying the authenticity of, and detecting tampering with, an item is disclosed. An RFID transponder comprises an antenna resonant circuit which is coupled to an associated integrated circuit when the integrated circuit is positioned proximately to the antenna resonant circuit, thereby enabling the integrated circuit to receive and respond to a radiofrequency query signal. The antenna resonant circuit can be integrated with a capsule or other form of removable packaging, such that it is destroyed upon removal of, or tampering with, the packaging.10-29-2009
20130063244SYSTEM AND METHOD FOR CONTROLLING VEHICLE IGNITION - The system for controlling vehicle ignition provides three separate levels of access to prevent unauthorized users from actuating ignition of a vehicle. The system includes a radio frequency identification tag having permanent computer readable memory and volatile computer readable memory associated therewith. The radio frequency identification tag is preferably embedded within a vehicle key. A predetermined permanently assigned authentication code is stored in the permanent computer readable memory and a variable time stamp is stored in the volatile computer readable memory. The permanently assigned authentication code and the variable time stamp are transmitted upon activation of the radio frequency identification tag. Vehicle ignition occurs only upon the mechanical operation of the key in a conventional ignition switch and matching of both the permanently assigned authentication code and the variable time stamp with codes and stamps stored in vehicle memory. The time stamp represents time and date of prior ignition actuation.03-14-2013
20100079237DEVICE AND METHOD FOR PROVIDING RFID IDENTIFICATION DATA FOR AN AUTHENTICATION SERVER - In a system (04-01-2010
20120235785WIRELESS COMMUNICATION DEVICE AND METHOD WITH INTELLIGENT AUTHENTICATION - A wireless communication device (09-20-2012
20090206986 METHOD OF PRESENTING IMS PUBLIC USER IDENTIFY TO RFID APPLICATIONS - An IMS node communicating with a user node and an information node is provided. The information node is adapted to conduct access control based on IMS Public User Identity. The IMS node comprises: request mediation means for mediating an access request from the user node to the information node by converting a first protocol conforming to IMS into a second protocol interpretable to the information node; and response mediation means for mediating an access response from the information node to the user node by converting the second protocol into the first protocol. The access request includes the IMS Public User Identity and information identity specifying information which the information node is requested to retrieve.08-20-2009
20110279226CHARGING SYSTEM AND CHARGING METHOD THEREOF - A charging system and the charging method are provided. The charging system comprises a charging unit and a rechargeable unit. The rechargeable unit includes a first wireless communication apparatus and a first wireless charging module. The charging unit includes a second wireless communication apparatus, a second wireless charging module and a processing module. The charging method comprises the steps of: transmitting an authentication code and a charging signal to the second wireless communication apparatus by the first wireless communication apparatus; verifying the authentication code by the processing module after receiving the authentication code and the charging signal from the second wireless communication apparatus; charging the first wireless charging module via wireless charging by the second wireless charging module controlled by the processing module when the authentication code is verified.11-17-2011
20110298582Visibility Radio Cap and Network - A pedigree tag for tracking and validating authenticity of contents in a container includes: a radio frequency modem operable at a low radio frequency, not exceeding one megahertz, and including a full duplex transmitter and receiver; an antenna operatively coupled with the radio frequency modem; a programmable microprocessor operatively coupled with the radio frequency modem; a memory operatively coupled with the programmable microprocessor; a clock; and a connector for connecting a power source for providing power to the microprocessor; wherein the pedigree tag is in a form factor conformable to the container to which it is affixed.12-08-2011
20110140836COMMUNICATION PAD FOR A COMMUNICATION TERMINAL - A communication pad for communication with a communication terminal is provided, wherein the communication pad comprises a processing unit and a non-volatile memory having a crypto key and/or a unique identification code stored thereon, wherein the processing unit is adapted to process the crypto key together with authentication challenge data to generate an authentication response, and wherein the communication pad is adapted to be identified to the communication terminal by sending the authentication response and/or a unique identification code to the communication terminal. In particular, the communication pad may be a user proprietary game pad, adapted to communicate with an open domain stand-alone or network-based game terminal.06-16-2011
20080238611Authentication of source, plus, for goods and services system, method, and components - A unique identifier is created for each article (clothing, accessories, jewels, fragrances, manufactures, etc.) for which the provider of the article desires to authenticate its Brand source to the party acquiring the article to substantiate to that acquiring party that they are receiving a genuine article. The unique identifier is so provided from a secure third party that also stores the unique identifier, possibly with other historical information, in a secure data base accessable only by authorized parties. The unique identifier may be provided on tags to be carried by the respective article or it may be applied directly to the article as by direct part marking from the material of the article and when so provided it includes a brand source identifier of the party providing the unique identifier as an additional protective measure. The unique identifier furthermore may be provided as an encoded, imageable symbology such as a “Data Matrix”.10-02-2008
20080309456Kiosk device - An kiosk device, which includes a receiver, a memory unit, a central processor, a decoder and a player, wherein the receiver receives signals transmitted from GPS (Global Positioning System) transmitters, or RFID (wireless radio frequency identification) transmitters which activate the central processor that controls the decoder to decode digital data stored in the memory unit and produce information guide data that can be automatically played back by the player. Accordingly, the present invention provides considerable ease of operation and convenience.12-18-2008
20110169602SYSTEM AND METHOD FOR MONITORING PRODUCTS IN A DISTRIBUTION CHAIN - In a product distribution system, a product with a product identification code (e.g., a serial number) is shipped between the different entities of a chain with a security label having a security label code. At each entity, the product can be authenticated by sending a query with the security label to the product source. At the product source, the received label code is compared to a label code stored in a database. Preferably the label codes are indexed with the product identification and if they match, a verification of authenticity is sent to the entity. In addition, if the entity desires to relabel the product before sending it on the chain, the source generates a new label code, stores the new label code so that it can be authenticated in the future and sends information to the entity for generating the new label with the new label code. The entity cannot generate or print a new label without receiving the label code from the source.07-14-2011
20090146778SYSTEM COMPRISING AN OBJECT AND A SENSING UNIT FOR IDENTIFYING THE OBJECT - The invention relates to a system (Sy) which comprises an object (06-11-2009
20100123545PROJECTION SYSTEM, SCREEN, AND PROJECTOR - A projection system includes: a screen having screen specific authentication information; and a projector having a function of acquiring the screen specific authentication information and, based on the acquired authentication information, carrying out an authentication process for setting the projector to a usable condition.05-20-2010
20100013594System for monitoring component of operating machine - A working machine is provided with a plurality of exchangeable components, and each component is provided with a wireless tag. A component ID is stored in advance in the wireless tag. When, on the side of the working machine, a component exchange timing or an engine starting timing is detected, the component ID stored in the wireless tag is acquired, and is transmitted to a working machine management device. The working machine management device checks the component ID which has been received from the working machine and a component ID which is stored in a component ID storage means against one another. And, if these two component IDs do not match one another, an abnormal state detection means outputs a warning signal.01-21-2010
20100127823Radio Frequency Certificates of Authenticity and Related Scanners - Radio frequency certificates of authenticity (RFCOAs) and associated scanners and methods are presented. In one implementation, an array of miniaturized antenna elements in an RFCOA scanner occupies an area smaller than a credit card yet obtains a unique electromagnetic fingerprint from an RFCOA associated with an item, such as the credit card. The antenna elements are miniaturized by a combination of both folding and meandering the antenna patch components. The electromagnetic fingerprint of an exemplary RFCOA embeddable in a credit card or other item is computationally infeasible to fake, and the RFCOA cannot be physically copied or counterfeited based only on possession of the electromagnetic fingerprint.05-27-2010
20100079238RFID TAG WITH PIEZOELECTRIC SENSOR FOR POWER AND INPUT DATA - An RFID tag having a non-volatile memory and a piezoelectric sensor. The piezoelectric sensor produces an electrical charge that momentarily supplies electrical power to the RFID tag when subjected to a mechanical force and the electrical power is sufficient to record data in the non-volatile memory. The piezoelectric sensor is affixed to an article such that an attempt to tamper with the article produces sufficient mechanical force on the piezoelectric sensor to record data evidencing the tampering in the non-volatile memory.04-01-2010
20090206987METHODS AND SYSTEMS FOR OBJECT IDENTIFICATION AND FOR AUTHENTICATION - Methods and systems for object identification and/or authentication.08-20-2009
20090261944CONTENT DISTRIBUTION SYSTEM, SERVER COMPUTER AND RECORDING MEDIUM - A server computer includes a receiving part for receiving a content and apparatus identification information of an apparatus that existed in a vicinity when the content was generated; an extracting part for extracting identification information corresponding to the apparatus identification information received by the receiving part by referring to a database in which the identification information is stored in association with the apparatus identification information; a storing part for storing the content and apparatus identification information received by the receiving part and the identification information extracted by the extracting part in an associated manner in the storage unit; and a first sending part for sending the content stored in the storage unit to another information processor corresponding to identification information received from outside when the identification information received from the outside matches the identification information stored in the storage unit.10-22-2009
20100127822NON-NETWORKED RFID-PUF AUTHENTICATION - An integrated circuit includes a sequence generator configured to generate a series of challenges; a hidden output generator configured to generate a series of hidden outputs, each hidden output a function of a corresponding challenge in the series of challenges; and bit reduction circuitry configured to generate a response sequence including a plurality of response parts, each response part a function of a corresponding plurality of hidden outputs.05-27-2010
20090167489ANTI-FORGERY METHOD AND APPARATUS BASED ON CPK ELECTRONIC TAG - An anti-forgery method and apparatus based on combined public key (CPK) electronic tag is provided. The CPK electronic tag is implemented by CPK crypto scheme and RFID, to perform self-signing on predefined ID, and to ensure uniqueness and authenticity of the item by binding the item and the tag, to prevent duplicating and counterfeiting.07-02-2009
20080278282Motor Vehicle Control Device Data Transfer System And Process - The present invention relates to a motor vehicle control device data transfer system and process. In particular, it relates to such a system and process for the transfer of data, subject to the risk of tampering, from a central data-processing device (11-13-2008
20080284562Computer based guest monitoring and identification system and method - A guest monitoring and identification system is shown. The system comprises an RFID carried by a guest and includes therein programmed predetermined data identifying a guest. An activating transmitter transmits a monitoring signal over a designated area to be traversed by a guest having the RFID. A receiver receives from the RFID a transmitted data signal containing the programmed predetermined data identifying the guest. A guest identification and service information processor receives the transmitted data signal. The processor interprets the programmed predetermined data identifying a guest and generates data/information signals providing the name and service profile for an identified guest. A communication device communicates to service staff the name and service profile for an identified guest.11-20-2008
20080272883Display and labeled article - A higher forgery prevention effect is realized. A display includes a first interface section provided with a relief-type diffraction grating constituted by a plurality of grooves, and a second interface section provided with a plurality of recesses or projections arranged two-dimensionally at a center-to-center distance smaller than the minimum center-to-center distance of the plural grooves, and each having a forward tapered shape.11-06-2008
20090315671IMAGE ACQUISITION SYSTEM AND METHOD OF AUTHENTICATING IMAGE ACQUISITION DEVICE IN THE IMAGE ACQUISITION SYSTEM - An image acquisition system includes an image acquisition device and a commanding device configured as a member separate from the image acquisition device to transmit a command to the image acquisition device for controlling the image acquisition device in such a manner as to permit the image acquisition device to operate in response to the command. The image acquisition device transmits to the commanding device identification information permitting the image acquisition device to identify the commanding device. The commanding device receives the transmitted identification information and transmits a command with authentication information contains authentication information permitting the image acquisition device to authenticate the commanding device, the authentication information containing one of the received identification information and information derived from the identification information.12-24-2009
20080258864Communication Apparatus and Communication Method - A communication apparatus for mutual communication, when acting as an authenticator communication apparatus performing authentication, includes a transmitting section that transmits to an authenticatee communication apparatus subject to authentication challenge data to authenticate the authenticatee communication apparatus in a time slot, which is a segmented period of time in which the communication apparatus to communicate with a specific communication apparatus; and a receiving section that receives from the authenticatee communication apparatus first response data for responding to the challenge data in the same time slot as the one in which the transmitting section transmits the challenge data. An objective is to carry out authentication of a tag by a Reader/Writer (R/W) and authentication of the R/W by the tag at the same time as an anti-collision process, and to further achieve confidentiality of unique ID information that is transmitted.10-23-2008
20090160605Interrogation System Employing Prior Knowledge About an Object to Discern an Identity Thereof - An interrogation system employable with an object having a radio frequency identification (RFID) tag and method of operating the same. In one embodiment, the interrogation system includes a database having prior knowledge about the object, and an interrogator that scans the RFID tag and discerns additional information therefrom about the object. The interrogator still further includes a control system that identifies the object based on the prior knowledge and the additional information.06-25-2009
20090184799INFORMATION STORAGE MEDIUM AND INFORMATION STORAGE MEDIUM PROCESSING APPARATUS - An information storage medium according to this embodiment includes a first communication unit configured to communicate with an information storage medium processing apparatus in a contact state, a second communication unit configured to communicate with the information storage medium processing apparatus in a non-contact state, a storage unit configured to store information, and an execution unit configured to execute predetermined processing based on the information stored in the storage unit using information processing results of both the first communication unit and the second communication unit. The execution unit executes the predetermined processing under a condition that both the first communication unit and the second communication unit have succeeded in authentication processing for the predetermined processing.07-23-2009
20110205015METHOD FOR CHALLENGE RESPONSE AUTHENTICATION BETWEEN A READING DEVICE AND A TRANSPONDER USING CONTACTLESS DATA TRANSMISSION - A method for challenge-response authentication between a reading device and a transponder based on a contactless data transmission, according to which challenge data (CH) are transferred within an anti-collision loop from the reading device to the transponder by means of one or several commands (AC) of an anti-collision method, with the command or commands (AC) serving to determine transponder identification data. In the command or commands (AC) respective challenge data (CH) are contained in a data field (D08-25-2011
20090128286System for controlling the use of electronic devices within an automobile - A system for controlling the use of electronic devices within an automobile includes a control module integrated into the operation of the automobile, wherein the control module is linked to the electrical system of the automobile and is controlled, monitored and updated via a graphical user interface of the automobiles. The control module includes a mechanism for identifying use of electronic devices within the automobile, determining whether the usage is permitted and preventing usage of the electronic device if it is determined the usage is not permitted.05-21-2009
20090051485Methods and Apparatus for Product Authentication - A method for product authentication, comprising applying to the genuine products code on a label, the code being generated by an algorithm, which code is unique to a small sub-set of articles, preferably for a single such article, so that it can be assumed that any product on the market which either does not have a label or has a wrong label, or for which the label is otherwise accounted for, is counterfeit, the label being machine readable, such as a writeable RFID tag characterised in that the label comprises a machine-readable microcircuit to which a code can be written, and from which the written code can be read remotely.02-26-2009
20090072946COLLABORATIVE PRODUCT AUTHENTICATION - An identification of an RFID tag is received from a mobile device. A product associated with the identification is identified, and a keeper associated with the product is identified. The keeper is provided to the mobile device, and a selection of the keeper is received from the mobile device. Authentication information associated with the product and the keeper is identified, and the authentication information is provided to the mobile device.03-19-2009
20090096574RFID TAG USING ENCRYPTED PASSWORD PROTECTION - A permanent ID can be read off of an RFID chip of an RFID tag. The permanent ID can be combined with a seed value to form a combined value. The combined value can be encrypted to form an encrypted value. This encrypted value can be stored on the RFID chip. Later, the RFID tag can be validated using the encryption value.04-16-2009
20090096573Activation of Cryptographically Paired Device - An event is detected at a first device. Responsive to the detection, at least some functionality of the first device is deactivated. The presence of a second device, cryptographically paired with the first device, is detected by the first device. Responsive to the detection, at least some functionality of the first device is activated or reactivated.04-16-2009
20120268238APPARATUS AND SYSTEM FOR PROVIDING WIRELESS CHARGING SERVICE - A wireless charging apparatus and system according to an embodiment of the present invention provides a wireless charging service through authentication so as to efficiently control charging rights with respect to a plurality of electronic devices, which desire to receive the wireless charging service using a shared wireless charging apparatus, resulting in allowing a user to get a stable wireless charging service and proposing a new benefit creation model. The wireless charging apparatus according to an embodiment of the present invention includes a wireless communication unit configured to receive authentication result information relating to a target electronic device from a server, and a wireless charging unit configured to wirelessly transmit power to the target electronic device if the authentication result information indicates a successful authentication, wherein the wireless communication unit transmits the authentication result information to the target electronic device if the authentication result information indicates an unsuccessful authentication.10-25-2012
20090315670RFID ENABLED MEDIA SYSTEM AND METHOD - A digital media playing system includes, in one embodiment, a digital video and/or audio media object, such as a portable digital media container adapted to hold one or more digital storage mediums, that includes a radio frequency identification tag containing RFID tag information. The digital media playing system also includes a trusted media content playing device that has a radio frequency identification tag reader operatively coupled therewith, to read the RFID tag information from the RFID tag that is located on the portable media container and that securely downloads remotely stored audio and/or video media based on the RFID tag information. The RFID tag information that is in the RFID tag includes, in one embodiment, encrypted tag identification information and unencrypted remote content identification information as well as, if desired, portable digital media container authentication data (e.g. player ID). Other RFID enabled digital video and/or audio media objects include movie tickets, concert tickets, 3-D objects, clothing and other forms.12-24-2009
20100013595Method for controlling the re-use of prefilled reagent dispensers and other consumables - This disclosure provides methods and systems by which a device could detect if it has been loaded with a consumable that was not authorized by the manufacturer of the device even if the gray market could exactly remanufacture or duplicate the consumable. The methods and systems utilize an asymmetric key pair.01-21-2010
20100013593Biometric authentication and verification - Biometric authentication and verification are described. A method in biometric identification includes establishing a foundational biometric measurement based on a first user input. The method also includes providing a second user input at a biometric terminal, the second user input used by the biometric terminal to determine whether to acknowledge a verifying biometric measurement, in response to receipt of the established foundational biometric measurement and the second user input. The method may also include establishing the foundational biometric measurement, by the user, utilizing biometric equipment. Alternatively, the establishing of the foundational biometric measurement based on first user input is performed by providing the first user input to a biometric kiosk, the biometric kiosk using the first user input to establish the foundational biometric measurement. Advantages of the present invention include the ability to perform more secure biometric transactions.01-21-2010
20090045911USE OF RADIO FREQUENCY IDENTIFIER (RFID) TAGS FOR IDENTIFICATION OF AN AUTHENTICATION STATUS OF AN ITEM - A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H02-19-2009
20100201480METHOD FOR THE ACCESS CONTROL TO AN AUTOMATION UNIT - In a method for the access control to an automation unit (08-12-2010
20110109430System And Method For Article Authentication Using Blanket Illumination - A method and apparatus for determining a digital signature from an article. A coherent light source directs a beam to illuminate the article and a detector arrangement collects data points from light scattered from many different parts of the article to collect a large number of independent data points, typically 500 or more. By collecting a large number of independent signal contributions specific to many different parts of the article, a digital signature can be computed that is unique to the area of the article that has been scanned. This measurement can be repeated whenever required to test authenticity of the article. Using this method, it has been discovered that it is essentially pointless to go to the effort and expense of making specially prepared tokens, since unique characteristics are measurable a in a straightforward manner from a wide variety of every day articles.05-12-2011
20110128120SYSTEMS AND METHODS FOR DETERMINING AUTHENTICITY OF SUBSTANCES - One embodiment of the present invention includes a system for determining authenticity of substances. The system comprises a plurality of RF sensors distributed in a predefined location pattern relative to a location for placing a substance under analysis. Each of the RF sensors is configured to transmit a response to an interrogation signal with a unique identifier. The system also comprises an RF transmitter that transmits sequences of interrogation signals over different frequency bands at one or more power levels and an RF receiver that receives responses to the sequences of interrogation signals transmitted from the RF sensors. The system further comprises a response pattern analyzer that determines response patterns for the RF sensors to the interrogation sequences and transmits a difference indicator if at least one of the determined response patterns varies from a predetermined signature of an authentic substance.06-02-2011
20110109429System and Method for Article Authentication Using Thumbnail Signatures - A method and apparatus for determining a digital signature from an article. A coherent light source directs a beam to illuminate the article and a detector arrangement collects data points from light scattered from many different parts of the article to collect a large number of independent data points, typically 500 or more. By collecting a large number of independent signal contributions specific to many different parts of the article, a digital signature can be computed that is unique to the area of the article that has been scanned. This measurement can be repeated whenever required to test authenticity of the article. Using this method, it has been discovered that it is essentially pointless to go to the effort and expense of making specially prepared tokens, since unique characteristics are measurable a in a straightforward manner from a wide variety of every day articles.05-12-2011
20110109427IMAGE PROCESSING APPARATUS AND METHOD OF CONTROLLING THE IMAGE PROCESSINGAPPARATUS - A process to generate a request for a copy process occurs at the side of a Web server before the copying is actually started since a user has selected the copy function of an MFP. If the user instructs logout from the MFP during the process, it is determined that the user has no right because the authentication context of the user is deleted from the MFP. Accordingly, it is not possible for the user to perform the copying.05-12-2011
20110109428System and Method for Article Authentication Using Signatures - A method and apparatus for determining a digital signature from an article. A coherent light source directs a beam to illuminate the article and a detector arrangement collects data points from light scattered from many different parts of the article to collect a large number of independent data points, typically 500 or more. By collecting a large number of independent signal contributions specific to many different parts of the article, a digital signature can be computed that is unique to the area of the article that has been scanned. This measurement can be repeated whenever required to test authenticity of the article. Using this method, it has been discovered that it is essentially pointless to go to the effort and expense of making specially prepared tokens, since unique characteristics are measurable a in a straightforward manner from a wide variety of every day articles.05-12-2011
20110025458METHOD AND APPARATUS FOR AUTHENTICATING RFID TAGS - In an RFID system, a method and apparatus for linking an RFID tag to an associated object. The system includes a relatively simple tag, a reader, a linker, and a store. The reader interrogates the tag for an ID and selectively provides the ID to the linker. The linker, in turn, uses the ID to provide back to the reader an associated Uniform Resource Identifier (“URI”). The reader then forwards the URI to the store. In response, the store returns to the reader the object associated with the ID via the URI. The disclosed method and apparatus provide more efficient and secure tag authentication.02-03-2011
20110043327PHYSICAL AND VIRTUAL IDENTIFICATION IN A WIRELESS POWER NETWORK - A wireless charging system is disclosed. The wireless charging system includes a detector configured to identify device information related to a device to be powered at a location, a location processor coupled with the detector and configured to deliver location-specific information related to the location to the device to be powered based on the detected device information, a power supply in communication with the location processor configured to wirelessly provide power to the device based on the detected device information, such that the location processor is configured to deliver the location specific information to the device via a first channel, and wherein the power supply is configured to wirelessly provide power to the device via a second channel.02-24-2011
20120242452USE OF RADIO FREQUENCY IDENTIFIER (RFID) TAGS FOR IDENTIFICATION OF AN AUTHENTICATION STATUS OF AN ITEM - A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H09-27-2012
20110084796METHOD AND SYSTEM FOR SECURE RFID COMMUNICATION BETWEEN A NOISY READER AND A COMMUNICATING OBJECT - A method for communication between a RFID noisy reader (04-14-2011
20100033300Apparatus, systems and methods for authentication of objects having multiple components - Apparatus, systems and methods for authenticating objects, comprising receiving an encrypted object identifier associated with an unknown object having multiple components, decrypting the encrypted object identifier using a first public key of a first public/private key pair to obtain unknown object information including unknown identification data for the multiple components, inspecting the unknown object to obtain actual object information including actual identification data for the multiple components, and comparing the unknown identification data with the actual identification data to determine whether the unknown object is an authentic object, wherein an authentic object has an object identifier generated using a first private key of the first public/private key pair to encrypt the actual object information.02-11-2010
20100237985METHOD, SYSTEM, AND APPARATUS FOR DISTRIBUTING ELECTRICITY TO ELECTRIC VEHICLES, MONITORING THE DISTRIBUTION THEREOF, AND/OR CONTROLLING THE DISTRIBUTION THEREOF - A method, system, and apparatus for distributing electricity to electric vehicles, monitoring the distribution thereof, and/or controlling the distribution thereof, provides various components to vehicle operators and station owners to track and control energy usage. Plug outlet devices are associated with a station. A coordinator element is configured to receive vehicle information and information about the station from one or more electric vehicles. The information is verified, stored, and/or aggregated for later display. In addition, the information can be used to determine whether or not to deny electrical charging service to a vehicle using a switch component.09-23-2010
20090219132SYSTEM FOR PRODUCT AUTHENTICATION AND TRACKING - An authentication system enabling a customer to verify the authenticity of a product in a foolproof, secure and simple manner. plurality of secret sets of numbers (09-03-2009
20100188191SYSTEM AND METHOD FOR PROVIDING SECURE IDENTIFICATION SOLUTIONS - The present invention provides a method and system for verifying and tracking identification information. In an embodiment of the invention, a system for delivering security solutions is provided that includes at least one of the following: a radio frequency (RF) identification device, an identification mechanism (e.g., a card, sticker), and an RF reader.07-29-2010
20110241823TAG-BASED PERSONALIZATION - Embodiments of methods and apparatus for tag-based personalization of kiosk computing devices are disclosed. In embodiments, an authentication server/system may receive, from a mobile device, a plurality data packets having data associated with a display tag of a kiosk computing device. The authentication system/server may, in response, instruct the kiosk to activate an account-specific mode based on an account associated with the mobile device. Other embodiments may be described and/or claimed.10-06-2011
20110241824IN-VEHICLE MOUNT TYPE BATTERY CHARGING SYSTEM, MANAGING SERVER, MANAGING SERVER CONTROL METHOD AND COMPUTER-READABLE MEDIUM STORING PROGRAM FOR MANAGING SERVER - An in-vehicle mount type battery charging system including a charging station having a charger for charging an in-vehicle mount battery of an electric vehicle, and a managing server connected to the charger. The managing server receives registration for enabling use of the charger from a user, authenticates the user when the user uses the charger and allows the user to use the charger when the user is authenticated as a registered member. Furthermore, the managing server receives temporary registration for temporarily enabling use of the charger from a user as a nonmember, authenticates the user when the user uses the charger and temporarily allows the user to use the charger when the user is authenticated as a registered temporary member.10-06-2011
20100039218System and method for transmitting illusory and non-illusory identification characteristics - Methods and systems for transmitting illusory identification characteristics are provided.02-18-2010
20110102136INFORMATION PROCESSING APPARATUS, POWER-SUPPLY CONTROL METHOD, PROGRAM, AND POWER-SUPPLY CONTROL SYSTEM - An information processing apparatus includes: a first connection section to which a first power-supply device is connected; a second connection section to which a second power-supply device is connected; a setting determiner that determines whether or not identification information is to be set for each power-supply device on the basis of connection states and setting control information; an authenticator that selectively obtains, when the setting determiner determines that identification information is not to be set, identification information from the power-supply devices connected to each connection section and that authenticates the obtained identification information; an identification-information setter that causes, when the setting determiner determines that identification information is to be set, unique identification information to be set for each power-supply device; and a processor that selectively performs executable power-supply-related processing on the basis of a result of the authentication or the identification-information setting and of processing control information.05-05-2011
20120200386METHOD OF MUTUALLY AUTHENTICATING A READER AND A RADIO TAG - A method and apparatus are provided for mutually authenticating a reader and a radio tag. The method includes: a step of the tag sending data to the reader, the data enabling an index to be determined for identifying an authentication coupon of the reader, the index being selected by the tag; a step of the reader obtaining the coupon from the determined index and of the reader sending the coupon to the tag; a step of the tag obtaining an authentication value from the selected index and of the tag verifying that the coupon received from the reader corresponds to the authentication value that is obtained, if the verification is positive, then a step of finalizing the authentication of the tag by the reader; and if the verification is negative, interrupting the mutual authentication method.08-09-2012
20110102135GEOGRAPHIC BASED REMOTE CONTROL - An intermediary between a remote control device and a remotely controllable device implements identification and/or authentication. The intermediary is, e.g., a node or set of nodes within a head end of a cable network service provider. A remote control device at a customer premise sends a command intended to control a remotely controllably device which is also located at the same customer premise. The customer premise includes a network interface, e.g., a cable modem, which has associated identification information. The command and the associated network interface identification information are communicated to the intermediary, e.g., via a cable modem. The intermediary accesses a subscriber record corresponding to the location based on the network interface identification information. The intermediary identifies the device to be controlled, e.g., a particular set top box and/or authenticates the remote control device. A command is sent via the network to the device to be controlled.05-05-2011
20110074540CONTROL SYSTEM AND METHOD FOR INTERFACE OF ELECTRONIC DEVICE - A control system for controlling interfaces of an electronic device. The electronic device includes a display device. The control system includes a storage module stores a plurality of human face images and desktop media files. A detecting module detects whether a face of a user is within a determined range and accordingly outputs a detection signal in response to the face being within the determined range. An image capture module captures a face image of the user according to the detection signal and outputs the face image. An identify module receives the face image and compares the face image with the plurality of stored human face images in the storage module, for identifying the age of the user, and output an identification result. A control module reads a corresponding desktop media file from the storage module according to the identification result and displays the media file on the display device.03-31-2011
20120119875METHOD, PORTABLE DATA CARRIER, AND SYSTEM FOR ENABLING A TRANSACTION - A method, portable data carrier (05-17-2012
20110068893RFID FINGERPRINT CREATION AND UTILIZATION - Embodiments of the present invention provide a method, system and computer program product for creating and managing radio frequency identification (RFID) fingerprints to ensure item authenticity. In an embodiment of the invention, an object fingerprint creation method can be provided. The method can include receiving a sensed signal from at least one RFID reader resulting from at least one RFID tag affixed to a target object. The method further can include extracting a voltage produced by the RFID tag from the sensed signal. Finally, the method can include storing the voltage as a fingerprint for the target object for later comparison with another fingerprint for an authenticating object to determine whether or not the authenticating object is the target object.03-24-2011
20090167490COMMUNICATION SYSTEM, SETTLEMENT MANAGEMENT APPARATUS AND METHOD, PORTABLE INFORMATION TERMINAL AND INFORMATION PROCESSING METHOD, AND PROGRAM - The present invention provides a communication system that enables safe and easy addition of a function for use of credit card settlement services to a portable information terminal. In this system, if a user brings his credit card close to the portable information terminal, the portable information terminal reads a card ID stored in a contactless IC card provided in the credit card. Then, the card ID is transmitted to a card management system which checks whether or not the card ID is valid. If confirming that the card ID is valid, the card management system instructs the portable information terminal to write the card ID thereto. If the user places an order of a merchandise, the card ID written to the portable information terminal is provided therefrom to use credit card settlement services.07-02-2009
20080272882Verifying the ownership of an owner's authority in terms of product and service - The present invention provides an apparatus for verifying the authority of an owner, in terms of an identifier of a product, the first verification information for verifying the authority held at a terminal for an owner with the authority involving the product, and the second verification information for verifying the authority concerning the identifier of the product stored in a product database. The apparatus comprises means for receiving the identifier and the first verification information, means for acquiring the second verification information from the product DB, and means for determining whether or not there is the authority from the first verification information and the second verification information. A hash value acquired from a one-way hash function is employed as a verification key of the verification information.11-06-2008
20100245036BEVERAGE CONTAINER AUTHENTICITY AND PROVENANCE DEVICES AND METHODS - An RFID label comprising an RFID circuit and an RFID antenna, and optional secondary security label ensures the authenticity of a beverage contained in a beverage container. The RFID label cannot be removed without destroying the RFID label or rendering it inoperable. A secondary security label may be placed over the closure of the beverage container to provide a secondary measure against tampering as well as a visual indicator of authenticity. It is placed on a portion of the bottle, a portion of the beverage container's closure, and the RFID label. An attempt to remove the secondary security label will also render the RFID label unusable.09-30-2010
20100245035ELECTRONIC TAG BROADCASTING SYSTEM AND BROADCASTING METHOD USING ELECTRONIC TAG - An electronic tag broadcasting system and a broadcasting method using an electronic tag are provided. The electronic tag broadcasting system makes it possible to include information on photographed objects in a broadcasting signal, greatly change the combination of information by means of conventional manual operations, increase benefits of bi-directional broadcasting and the combination of broadcasting/communication by using recognition information included in broadcasting contents, and create a lot of new products and a large market. Popularity of broadcasting increases usage of electronic tags and their related application, thereby providing various service convergence that combines RFID, USN, communication, broadcasting, etc. and leading to a convenient ubiquitous society.09-30-2010
20110163844IDENTIFICATION ELEMENT HAVING AN OPTICAL TRANSPONDER - An identification element has a transponder with a data-emitting transmission unit and with a data-receiving reception unit in order to communicate with a device for registering and/or controlling access authorization to spaces or objects. In addition, a control circuit is provided for the transmission unit and reception unit. The transponder is an optical transponder (07-07-2011
20110068894METHOD FOR AUTHENTICATING AN RFID TAG - To ensure data protection in an authentication method for use in an RFID system in accordance with the challenge-response protocol, the data communication between RFID reader and RFID tag is usually encrypted in addition. Such an authentication can be designed to an arbitrary degree of complexity and therefore inevitably requires a high level of investment in hardware and software resources. An RFID tag has a display, wherein the response is displayed on the display of the RFID tag and is read in by the RFID reader by an optical scanner. The response of the RFID tag can therefore be read out only when there is direct visual contact.03-24-2011
20100194528CONTROL DEVICE, CONTROL SYSTEM, CONTROL METHOD AND STORAGE MEDIUM - To provide a control system capable of avoiding communication with an unintended external device when a number of external devices exist outside the device. A control system includes a control device 08-05-2010
20110148570Configuration RFID Circuit - A radio-frequency identification (RFID) reader circuit includes a transceiver configured to communicate with a plurality of different types of RFID transponders using radio frequency signals. The RFID reader circuit includes a processor circuit that is configured to detect and communicate with the plurality of different types of RFID transponders via the transceiver, respectively using a command set for the type of RFID transponder that the processor circuit is communicating with. The processor circuit is further configured to, in response to detecting an RFID transponder having configuration data for a new command set, access and use the configuration data for the new command set to update a configuration of the RFID reader circuit to enable communication with a new type of RFID transponder.06-23-2011
20090174525Communication system and communication method - An object of the invention is to provide a communication system for inputting authentication information to a communication machine without providing an external machine access interface for inputting authentication information.07-09-2009
20110133883ANONYMOUS AUTHENTICATION METHOD BASED ON PRE-SHARED CIPHER KEY, READER-WRITER, ELECTRONIC TAG AND SYSTEM THEREOF - An anonymous authentication method based on a pre-shared key, a reader-writer, an electronic tag and an anonymous bidirectional authentication system are disclosed. The method comprises the following steps: 1) a reader-writer sends an accessing authentication requirement group to the electronic tag; 2) after the electronic tag receives the accessing authentication requirement group, an accessing authentication response group is constructed and sent to the reader-writer; 3) after the reader-writer receives the accessing authentication response group, an accessing authentication confirmation group is constructed and sent to the electronic tag; 4) the electronic tag carries out confirmation according to the accessing authentication confirmation group.06-09-2011
20110006878GAMMA STERILIZABLE RFID SYSTEM THAT PREVENTS UNAUTHORIZED OPERATION OF ASSOCIATED DISPOSABLE BIOPROCESS COMPONENTS - This invention provides a system and apparatus that is able to authenticate and prevent illegal manufacturing and unauthorized operation of disposable bioprocess components. This invention utilizes a ferro-electric random access memory (FRAM) chip to store error-correctable information on a RFID tag attached to the disposable bioprocess components, where the error-correctable information is written into the memory chip, so that the information can remain in the chip when the RFID tag and disposable bioprocess component is gamma-sterilized. Also, this invention includes a method for authenticating the disposable bioprocess component that reduces liability in that a counterfeit poor quality disposable component is not used on the hardware so the user will not file an unjustified complaint.01-13-2011
20110304425Systems and Methods for Efficient Authentication - A communication system is configured to operate in an ad hoc wireless network. The communication system includes a transmission device configured to send and receive a message, a signing module configured to generate a hierarchical signature using the message, and a verifying module configured to hierarchically verify a predetermined portion of a hierarchically signed message.12-15-2011
20110050389LOW POWER WIRELESS CONTROLLER SYSTEMS AND METHODS - A wireless control device is described that single chip passive wireless control integrated circuit device. The device is coupled to an antenna configured to receive a radio signal and comprises a radio frequency transceiver circuit fabricated on a semiconductor substrate of an integrated circuit device and configured to extract information from the radio signal and a processor fabricated on the semiconductor substrate and configured to receive the information extracted from the radio signal and to respond to a command encoded in the information. A FET fabricated on the substrate operates as a switch and has a gate controlled by the processor. The FET can be configured to transmit an activation current provided to the integrated circuit device to an output of the integrated circuit device. The output may drive an actuator.03-03-2011
20110050388Gesture Based Electronic Latch for Laptop Computers - A portable information handling system includes a top cover, a base, and an electronic latch. The top cover is connected to the base. The top cover has a gesture sensitive surface configured to receive a trace. The electronic latch is in communication with the gesture sensitive surface, and is configured to latch the top cover and the base together. The electronic latch is further configured to unlatch the top cover from the base in response to receiving a signal representing that the trace received on the gesture sensitive surface is proper.03-03-2011
20100097176INPUT DEVICE AND USER AUTHENTICATION METHOD - An input device having a given input screen includes a first unit that generates data indicating any one of a touch position, a touch area, and a touching time, the touch position being a position touched by an object, the touch area being an area touched by the object, and the touching time being a period touched by the object, a second unit that generates password codes based on any one of the touch position, the touch area, and the touching time, and a third unit that judges whether a user is an authorized user based on the password code. It is possible to generate password codes including data of any one of the touch position, the touch area, and the touching time. Accordingly, the password cannot be stolen by others, and the input device with which impersonation or spoofing is difficult and the password need not be input.04-22-2010
20100026450IDENTIFICATION MEDIUM, IDENTIFICATION METHOD, AND IDENTIFICATION APPARATUS - An identification medium is to be observed via a linearly polarizing filter and includes a first liquid crystal layer that changes the wavelength of light according to the rotational angle of the linearly polarizing filter, a cholesteric liquid crystal layer, and a light absorbing layer that is provided below the cholesteric liquid crystal layer.02-04-2010
20110090044Information processing apparatus, communication apparatus, and program - An information processing apparatus includes: a storage block configured to store a first region as part of a layer structure; an execution block which, in response to a designation command transmitted by a communication apparatus to designate the creation of a second region as a lower layer of the first region, performs a region creation process for creating the second region as the lower layer of the first region; and a transmission block which, if the region creation process is stopped, then transmits first information indicating whether or not the second region is already created to the communication apparatus, in response to a request from the communication apparatus.04-21-2011
20110043326Broadcast receiver, mobile device, service providing method, and broadcast receiver controlling method - A broadcast receiver includes a mode determination unit to determine a current operation mode among a plurality of operation modes, a communication interface to transmit the determined current operation mode to a mobile device through interactive communication, and to receive a control command from the mobile device, and a controller to provide a service of the determined current operation mode according to the control command received from the mobile device. Accordingly, a user controls the broadcast receiver through the mobile device according to the operation mode so that user's convenience is improved.02-24-2011
20110080257CONFIGURABLE DISPLAY FOR SIGNAL ACTIVATED DEVICE - A system for providing a configurable display for a signal activated device may include a receiver, a memory, a processor, and a display. The receiver may be operative to receive a radio frequency signal. The memory may be coupled with the receiver, and may be operative to store an item. The processor may be coupled with the memory and may be operative to retrieve the item stored in the memory, in response to the activation signal received by the receiver. The processor may use a current induced in the receiver by the radio frequency signal to retrieve the item. The display may be coupled with the processor and may be operative to display the item retrieved from memory using the current induced in the receiver.04-07-2011
20120062360SYSTEM AND METHOD FOR CONTROLLING THE ACCESS TO A NETWORKED CONTROL SYSTEM - The invention relates to controlling the access to a networked control system such as a lighting control system or a home control system. According to an embodiment of the invention, a system for controlling the access to a networked control system (03-15-2012
20120154111METHOD FOR INSPECTING A PRODUCT AS AN ORIGINAL PRODUCT OF A PRODUCT PRODUCER - Against the background of continually growing problems of product piracy, in particular due to the further expansion and liberalization of international trade, there is great demand for automated and reliable inspection of the authenticity of products. The present disclosure relates to methods and systems for inspecting a product as an original product of a product producer by authenticating at least one RFID (Radio Frequency Identification) tag allocated to the product using an asymmetrical challenge response protocol.06-21-2012
20120161924Automatic Authentication of Electronic Devices - An electronic device with an embedded wireless tag may be authenticated by a linking partner, which may be another electronic device or a data network, before network connection can be established. In some embodiments, the electronic device includes an embedded wireless communicator for communicating with the wireless tag through a wireless link to retrieve identification data for authentication. In other embodiments, the electronic device cooperates with an external wireless communicator to retrieve stored identification data from the embedded wireless tag. In alternate embodiments, an electronic device may authenticate a peripheral device with an embedded wireless tag before connection can be established with the peripheral device. The electronic device may further erase the data stored on the peripheral device when authentication fails.06-28-2012
20120169459SYSTEM AND METHOD FOR PASSIVELY ACQUIRING EXISTING CUSTOMERS' MOBILE PHONE NUMBERS FROM CUSTOMER SERVICE LOGS - An entity passively acquires an existing customer's mobile phone number and links the customer's mobile phone number to the customer's account without requesting the customer to actively provide customer identifying information. This is accomplished by capturing the customer's mobile phone number when the customer uses a mobile phone to contact the entity and checking whether the captured mobile phone number is in a customer database. If the captured mobile phone number is not in the customer database, the customer using the mobile phone number may be validated by determining that the customer corresponds to a particular customer account and associating the captured mobile phone number with the particular customer account. For example, the validation of the customer may include analyzing entries in the service log to identify phone numbers, determining whether the identified phone numbers are mobile numbers or landline numbers, determining who the identified phone numbers belong to, and determining whether the identified person corresponds to an account in the customer database. If the captured mobile phone number is in the customer database, the customer using the mobile phone number may be validated against the corresponding customer account record to establish a confidence score.07-05-2012
20120313749AUTHENTICATION OF A SECURITY MARKER - An apparatus for authenticating security markers includes a laser or LED for illuminating the security marker; a detector for detecting an optical response from the security marker; an element for changing a temperature of the laser or LED to vary the wavelength of radiation produced by the LED; a detector for detecting changes in the optical response from the security marker as the wavelength of the radiation changes; a microprocessor for comparing the optical response profile from the security marker as it varies with changes in wavelength to a reference profile; and authenticating the security marker if the optical response profile matches the reference profile.12-13-2012
20120313748AUTHENTICATION OF A SECURITY MARKER - A method for authenticating security markers includes illuminating the security marker with a laser, detecting an optical response from the security marker, changing a temperature of the laser to vary the wavelength of radiation produced by the laser; detecting changes in the optical response from the security marker as the wavelength of the radiation changes, comparing the optical response profile from the security marker as it varies with changes in wavelength to a reference profile; and authenticating the security marker if the optical response profile matches the reference profile.12-13-2012
20120212321SYSTEM AND METHOD FOR MANAGING ACCESS TO AND TRACKING A PLURALITY OF CARTS - A system and method for managing access to a plurality of carts. A plurality of users may be created in a database, each user having unique identifying information. Users may be grouped into user groups when having similar attributes. Each cart may have an entry in the database with associated attributes. Carts may be grouped into cart groups for carts having similar attributes. Users may be given access to cart either individually, through a user group that has access to the cart, by given access to an entire group of carts, or through a user group that has access to an entire group of carts. The various associations can be interwoven to provide groups and sub-groups for managing applications where multiple users must interact with multiple carts. The carts can store access logs which may be communicated in real time to a computing device or may be stored locally at the cart for later access by an administrator.08-23-2012
20120256723RANDOM LOCATION AUTHENTICATION - An authentication string, such as a password, consists of characters. Each of the characters in the authentication string is randomly associated with a defined location on a device. For example, an area on a touch screen can be associated with a character in the authentication string. When a user selects a location associated with the character, feedback is provided that identifies the character. When the user selects a location that is not associated with the character, feedback is provided that does not identify the character.10-11-2012
20100052845Antitheft System For Vehicle - In a keyless entry system, a CPU in an ECU and a CPU in a remote control key change a function formula specified by primary function formula data stored in a memory and a function formula specified by primary function formula data stored in a memory to respective new function formulas. With this structure, function formulas used in the remote control key and the ECU can be changed to respective new function formulas. This makes it possible to enhance the safety of the keyless entry system because it is difficult to predict the function formulas used in the remote control key and the ECU.03-04-2010
20090289758Wireless Device, Wireless Control System and Wireless Control Method - According to one embodiment, a wireless control system having an electronic device with a wireless communication function and a remote control module for remotely operating the electronic device, wherein the remote control module includes a control module. A control module configured to transmit a authentication information to a other device via a proximity communication module and receive remote control command information for remotely operating the other device from the other device via the proximity communication module so as to store it in a storage module in order to allow the other device to start a process for establishing wireless connection with the electronic device based on the authentication information.11-26-2009
20120313747METHOD FOR AUTHENTICATING SECURITY MARKERS - A method for authenticating security markers includes preparing a security marker with at least two or more optically active compounds; applying the security marker to an article to be authenticated; illuminating the security marker with radiation; detecting the optical response of the security marker; and wherein the two or more optically active compounds have a complementary response to different wavelengths of the illuminating radiation.12-13-2012
20120188053System and method for monitoring patients that perform a medical self-check - A system for monitoring patients that perform a medical self-check includes a piece of equipment having a data entry unit, through which a user can enter one or more data; a user identification unit having a mother board configured to request a univocal identification datum and verify the identification entered by the user after the request; a clinical data acquisition unit configured to acquire one or more clinical data of the user after a positive user identification; a mobile telephony system; and at least one, preferably a plurality of diagnostic centers located in different parts and placed in communication with the piece of equipment through the mobile telephony system such that, in use, the piece of equipment transmits the data acquired through the mobile telephony system to a diagnostic center, so that the center can monitor and file such data.07-26-2012
20120229250HOST APPARATUS, ACCESSORY APPARATUS, AND AUTHENTICATING AND CONTROLLING METHOD THEREOF - A method for authenticating an accessory apparatus by a host apparatus is provided. The method includes receiving authentication information from the accessory apparatus, comparing the received authentication information and pre-stored authentication information and performing authentication with respect to the accessory apparatus based on a result of the comparing, and, if the authentication is normally performed, performing a function corresponding to the accessory apparatus, and, if the authentication is not normally performed, transmitting corresponding information to an external server.09-13-2012
20100328026AUTHENTICATION OF AN ELECTROMAGNETIC TERMINAL-TRANSPONDER COUPLE BY THE TRANSPONDER - A method of authentication of a terminal generating a magnetic field, by a transponder including an oscillating circuit from which a D.C. voltage is generated, wherein the transponder: receives first data relative to the current in an oscillating circuit of the terminal, measured by the terminal for a first value of the resistive load of the transponder; and exploits these first data and second data relative to the level of said D.C. voltage, respectively measured for the first resistive load value and for a second resistive load value.12-30-2010
20100328028FLEXIBLE SEMICONDUCTOR DEVICE AND IDENTIFICATION LABEL - Provided is a flexible device (12-30-2010
20100328027AUTHENTICATION OF AN ELECTROMAGNETIC TERMINAL-TRANSPONDER COUPLE BY THE TERMINAL - A method of authentication, by a terminal generating a magnetic field, of a transponder located in this field, wherein: first data, relative to the current in an oscillating circuit of the terminal, measured by the terminal for a first value of the resistive load of the transponder, are transmitted to the transponder; second corresponding data are evaluated by the transponder for a second value of the resistive load and are transmitted to the terminal; and said second data are compared with third corresponding data, measured by the terminal for the second value of the resistive load.12-30-2010
20120319816PATIENT MONITOR CAPABLE OF MONITORING THE QUALITY OF ATTACHED PROBES AND ACCESSORIES - A system and method to help maintain quality control and reduce cannibalization of accessories and attached probes in a highly sensitive patient monitor, such as a pulse oximetry system. One or more attached components may have information elements designed to designate what quality control mechanisms a patient monitor should look to find on that or another component or designate other components with which the one component may properly work. In a further embodiment, such information elements may also include data indicating the appropriate life of the component.12-20-2012
20120319815AUTHENTICATION SYSTEMS AND METHODS - A system includes a machine-readable storage medium, a processor in communication with the machine-readable storage medium, communication circuitry in communication with the processor; and a plurality of sensors in communication with the processor. Each of the plurality of sensors is configured to generate an electrical signal in response to receiving wave energy. The processor is configured to control data acquisition for authenticating an object using at least a subset of the plurality of sensors, calculate an authentication value based on signals received from the subset of the plurality of sensors, and cause the communication circuitry to transmit an authentication request including the authentication value to an authentication entity.12-20-2012
20120268239METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR REGISTRATION OF AND ANONYMOUS COMMUNICATIONS RELATED TO TAGGED OBJECTS - Systems and methods of registration of an anonymous tag having an owner with a location service include authenticating a tag sensor associated with the owner of the tag with the location service. The tag is placed within a defined transmission distance of the tag from the tag sensor associated with the owner. The tag is activated while it is within the defined distance from the tag sensor to initiate transmission of the self identification. The transmitted self identification is received at the tag sensor to detect the tag. It is determined that the detected tag is not yet registered with the location service and an identification of the tag and the owner is transmitted to the location service from the tag sensor to register the tag as belonging to the owner at the location service to limit registration of the tag at the location service.10-25-2012
20120326838METHOD OF TRANSFERRING ENERGY BETWEEN A FIRST UNIT AND A SECOND UNIT - A method for transferring energy between first and second units with first and second meters and subscriptions to first and second backend platforms, as well as a first unit for supporting such energy transfer, where the backend platforms execute an authentication procedure and a switch is unbarred by the first control box upon successful execution of the authentication procedure. A second control box sends an amount of the transferred energy measured by the second meter to the first control box energy consumption to data is sent to the backend platforms, and a consumption clearing procedure is executed between the first and the second units at the backend platforms by means of the received energy consumption data.12-27-2012
20100231355INFORMATION PROCESSING APPARATUS - An information processing apparatus includes: an authenticating unit configured to perform, when an input from an operator not having operation authority is received on a restricted input button that can be operated only by an operator having the operation authority, authentication by the operator having the operation authority; and a restriction releasing unit configured to temporarily release the operation restriction for the restricted input button when the authentication by the operator having the operation authority is successful.09-16-2010
20100231354CONTROL SYSTEM AND METHOD, AND COMMUNICATION DEVICE AND METHOD - A control system has a control device for performing a control of a predetermined process, and a communication device for communicating with the control device. The control device has a first transmission unit for transmitting a request signal requesting for transmission of a response signal to the communication device, a first reception unit for receiving the response signal transmitted through a predetermined procedure from the communication device in response to the request signal transmitted by the first transmission unit, an authentication unit for performing authentication of the communication device using identification information of the communication device contained in the response signal received by the first reception unit and identification information of the communication device registered in advance, and a process executing unit for executing the predetermined process when the authentication of the communication device by the authentication unit is successful. The communication device has a first storage unit for storing transmission scheduled time information indicating a time scheduled to transmit the response signal assigned to the communication device, a second reception unit for receiving the request signal transmitted from the first transmission unit, and a second transmission unit for transmitting the response signal corresponding to the request signal received by the second reception unit to the control device at a time different from times assigned to other communication devices based on the transmission scheduled time information stored in the first storage unit.09-16-2010
20100231353SYSTEM AND PORTABLE DEVICE FOR TRANSMITTING IDENTIFICATION SIGNALS - A system is provided with a portable device for the transmission of a signal to a second device, wherein the portable device is wearable on the body of a user. The portable device includes at least two electrodes and transmitter electronics for the generation of an electrical signal between the electrodes, such that the signal is able to be coupled by the electrodes into the body of the user and detected by at least one electrode of the second device. A portable device is distinguished in that between the electrodes are arranged component parts of the transmitter electronics and/or of an application distinct from the transmitter electronics, and/or an air gap is present.09-16-2010
20100231352ACCESSORY IDENTIFICATION FOR MOBILE COMPUTING DEVICES - Embodiments disclosed herein provide for identification processes and/or procedures for accessories coupled with a mobile computing device. During identification an accessory can communicate lingo information that includes only those lingoes the accessory can use while coupled with the mobile computing device. The accessory can also communicate accessory protocol information to the mobile computing device during identification. The accessory can be limited to using only those lingoes and/or those protocols identified during identification. Various other accessory information, capabilities, preferences, etc. can also be communicated to the mobile computing device during identification.09-16-2010
20100182122RFID Tag and Operating Method Thereof - A radio frequency identification (RFID) tag and a method for operating the RFID tag are provided. The method includes steps of receiving a read command, generating a mode parameter, selecting a simulation situation from a situation group according to the mode parameter, and selectively generating a response signal according to the simulation situation. The situation group includes a first situation and a second situation. The response signal includes virtual identification (ID) information or virtual content information stored in the RFID tag.07-22-2010
20120139697IDENTIFYING AND GENERATING BIOMETRIC COHORTS BASED ON BIOMETRIC SENSOR INPUT - Biometric data, which identifies a set of biometric patterns, is received from a set of biometric sensors. The biometric data is processed to form digital biometric data that identifies attributes of the biometric data. Thereafter, a biometric cohort is generated using the digital biometric data. Each member of the set of biometric cohorts shares at least one biometric attribute in common.06-07-2012
20130015948CARD DEVICEAANM AKITA; KojiAACI KanagawaAACO JPAAGP AKITA; Koji Kanagawa JPAANM HORIKAWA; SeiichiroAACI KanagawaAACO JPAAGP HORIKAWA; Seiichiro Kanagawa JPAANM KASAMI; HideoAACI KanagawaAACO JPAAGP KASAMI; Hideo Kanagawa JP - According to one embodiment, a card device includes an authentication unit, a wireless communication unit, and a control unit. The authentication unit performs an authentication process with an external device via wired communication. The wireless communication unit performs wireless communication with the external device. The control unit controls the wireless communication unit to reduce radio waves radiated from the wireless communication unit when the control unit detects that the authentication process is being performed.01-17-2013
20130169409ANTI-COUNTERFEITING ARTICLE AND METHOD THEREOF - An anti-counterfeiting article includes a first part, a second part, a first radio frequency identification (RFID) tag, and a second RFID tag. The second part of the article is detachably attached to the first part. The first RFID tag is attached to the first part, and the second RFID tag is attached to the second part. The first RFID tag pre-stores a first identification code, the second RFID pre-stores a second identification code, the first identification code is identical with or is related to the second identification code in a some way or according to a predetermined criteria for confirming the status of the article as a certified product.07-04-2013
20080224823Identification Systems - An identification system where providing' identification data sets that contain different types of information accessible by different parties, removes the need for all potential readers of the object to be able to access all information, and to contact a third party during the verification process is disclosed. The identification data sets are encrypted and printed in a portable physical form as an identity object. Graphical symbols, such as a data matrix, or RFID tags or secure chips may be used to store encrypted data. These may be incorporated into a passport or other identification document. Additional identity objects may be printed for use in identifying objects connected with a user or source that contain a subset of the information in the original data matrix.09-18-2008
20130176104Semiconductor-Based Device Authentication - Various embodiments of devices and associated methods are described herein for authenticating electrical devices. In one aspect, an electrical device is provided comprising an interface configured to receive and transmit signals; a power line coupled to the interface and configured to provide a power signal thereto; and an authentication circuit coupled to the interface and the power line. The authentication circuit is configured to disable the power signal on the power line for a specified time period in response to an authentication request signal received at the interface and to provide an authentication response signal on the power line to represent the disabling of the power signal.07-11-2013
20080218310SMART GARMENT - A sensor authenticated to a garment transfers information, either wirelessly or wired, to an external data processing device. Such information includes location information, physiometric data of the individual wearing the garment, garment performance and wear data (when the garment is an athletic shoe, for example). The external data processing device can be portable digital media players that are, in turn, in wireless communication with a server computer or other wireless devices.09-11-2008
20080218309METHOD AND TECHNOLOGY FOR REMOTE ADMINISTRATION OF WIRELESS DEVICES - A remote administrator to allow a caregiver to configure a user's wireless device includes a master software client in the remote administrator and a controllable software client in the wireless device. Commands transmitted to the wireless device from the remote administrator allow the caregiver to configure the user's wireless device based on user initiated configuration requested.09-11-2008
20080218308Identification Document with a Contactless Rfid Chip - To provide an identification document, particularly a passport, in which at least one contactless RFID chip (09-11-2008
20130135080TAG FORGERY PROTECTION - A method for determining the authenticity of an article including a microchip package, wherein the microchip package includes a sensing element. The method includes receiving a value of a measurable quantity. The value of the measurable quantity is measured using the sensing element. The value of the measurable quantity is indicative of an environment. Reference information indicative of the environment I received. The received value of a measurable quantity and the reference information are used to determine the authenticity of the article comprising the microchip package. A computer program product including a non-transitory computer readable medium and computer program code which when executed by a data processor is for executing the method. An apparatus for determining the authenticity of an article including a microchip package including a sensing element.05-30-2013
20130135081Systems And Methods For Authenticating Objects Using IR - Systems and methods authenticate an object using IR. IR is projected at a first wavelength onto the object and a first image of the object is captured during the projection of the IR. The object is authenticated by processing the first image to detect IR fluorescence from an IR fluorescing material incorporated into the object in response to the projected IR, where presence of the IR fluorescence within the first image indicates authentication of the object.05-30-2013
20100277275METHOD AND SYSTEM FOR A RECOGNITION SYSTEM HAVING A VERIFICATION RECOGNITION SYSTEM - A method and system for performing computer implemented recognition is disclosed. In one method embodiment, the present invention first accesses user input stored in a memory of a mobile device. On the mobile device, the present invention performs a coarse recognition process on the user input to generate a coarse result. The coarse process may operate in real-time. The embodiment then displays a portion of the coarse result on a display screen of the mobile device. The embodiment further performs a detailed recognition process on the user input to generate a detailed result. The detailed process has more recognition patterns and computing resources available to it. The present embodiment performs a comparison of the detailed result and the coarse result. The present embodiment displays a portion of the comparison on the display screen.11-04-2010
20110210820MULTIPLE NEAR FIELD COMMUNICATION TAGS IN A PAIRING DOMAIN - A system and method for simply and securely pairing multiple Bluetooth or other wireless electronic devices in a network. Multiple Near Field Communication (NFC) read-only tags are places in a vehicle or other defined space, such that users of NFC-enabled electronic devices can pass their device near one of the NFC tags, which then transfers encryption key data to the user's device, allowing that device to be automatically joined to a small, secure wireless network. Various embodiments are disclosed for establishing and controlling the network, and applications are suggested for using the ad-hoc network—such as for the control of a vehicle's entertainment system.09-01-2011
20080197969METHODS AND SYSTEMS FOR AUTHENTICATING CONTENTS OF A BOTTLE - A system for authenticating contents of a bottle containing an alcoholic beverage includes a neck seal, a first reader, a second reader, and a server. The neck seal is attached to the bottle and includes a neck seal identification number and an invisible security taggant. The first reader scans the neck seal, detects the presence of the security taggant, and authenticates the neck seal. The second reader retrieves a bottle tag number from a radio-frequency identification tag. The server authenticates the contents of the bottle responsive to identifying an association between the neck seal identification number and the bottle tag number.08-21-2008
20110241825IDENTIFICATION INFORMATION MANAGEMENT SYSTEM, METHOD OF GENERATING AND MANAGING IDENTIFICATION INFORMATION, TERMINAL, AND GENERATION AND MANAGEMENT PROGRAMS - An identification information management system according to the present invention comprises a plurality of terminals communicable with servers and a site management apparatus which manages site containing the terminals. The terminal has an identification information processing unit which assuming that a one-way hash function is f(x) and a terminal-unique ID is a, generates values x satisfying a conditional equation f(x)=a as identification information.10-06-2011
20120274442METHOD AND SYSTEM FOR MEASURING THE MOBILITY OF AN ANIMAL - A method and system to measure and record the mobility score of quadrupeds is disclosed. The method and system determines when an animal is walking and measures dynamic parameters to assess gait and derive a mobility score.11-01-2012
20130187752Coded Doorbell Chime - A coded doorbell chime and a system therefore that is useful for effectively screening visitors at an entrance into the structure by providing one or more different doorbell sounds for different visitors or categories of visitors, such as family, friends and the like. The coded doorbell chime comprises a doorbell activating device, having a housing, a doorbell switch and a keypad associated therewith, and a sound producing mechanism, having a housing, sound generator and a speaker associated therewith, operatively connected to the doorbell activating device. Selected visitors enter a code to produce a first sound identifying them as a person the occupant of the structure knows. Other visitors use the doorbell switch to produce a second sound that identifies them as a person the occupant does not know. Preferably, the doorbell switch is on the outer surface of a moveable cover that hides the keypad when the cover is closed.07-25-2013
20130194065Communication Method in a Home-Automation Installation - The communication method applies to a home-automation installation comprising at least one sending element, a self-powered receiving element and an element for substituting for the receiving element. The method is such that, when the receiving element is in a sleep mode, the substitution element receives and records information sent by the sending element for the attention of the receiving element and such that, when the receiving element is no longer in sleep mode, the substitution element sends the information for the attention of the receiving element.08-01-2013

Patent applications in class Authentication (e.g., identity)

Patent applications in all subclasses Authentication (e.g., identity)