Patent application number | Description | Published |
20120033722 | Time-Domain Link Adaptation - Embodiments of the invention provide time-domain link adaptation in power line communications. In one embodiment, the cyclic prefix length and position is adjusted with an OFDM symbol to overlap a periodic impulse noise pulse, thereby allowing the data carried in the symbol to be detected at a receiver. The cyclic prefix may be adjusted to provide a pattern that yields an integer number of OFDM symbols in one zero crossing period. The data rate used for the symbols overlapping the zero-crossing period may be zero or very low. A high data rate may be used for symbols outside the zero-crossing period because those symbols will not be affected by the periodic impulse noise. | 02-09-2012 |
20120068784 | Coupling Circuits for Power Line Communication Devices - Coupling circuits for power line communication (PLC) devices are described. In an embodiment, a PLC device may comprise a processor and a coupling circuit coupled to the processor. The coupling circuit may in turn comprise a transmitter path and a receiver path. In some implementations, the transmitter path may include a first amplifier, a first capacitor coupled to the first amplifier, a first transformer coupled to the first capacitor, and a plurality of line interface coupling circuits coupled to the first transformer, where each of the line interface coupling circuits is configured to be connected to a different phase of an electrical power circuit. Meanwhile, the receiver path may include a plurality of capacitors, where each of the plurality of capacitors coupled to a corresponding one of the line interface circuits, a filter network coupled to the plurality of capacitors, and a second amplifier coupled to the filter network. | 03-22-2012 |
20120082253 | Pilot Structure for Coherent Modulation - A system and method for communicating in a power line communications (PLC) network using Orthogonal Frequency-Division Multiplexing (OFDM) symbols. Pilot tones are carried by the OFDM symbols according to a predetermined pattern. A receiving device identifies pilot tones on each frequency. A group of previously received pilot tones on a selected frequency are filtered to generate a channel estimate for a tone on the selected frequency in a new symbol. The channel estimates on two different frequencies within an OFDM symbol may be interpolated to determine a channel estimate for a third frequency with the OFDM symbol. | 04-05-2012 |
20120257639 | Communications in Beacon-Enabled Networks - Systems and methods for designing, using, and/or implementing communications in beacon-enabled networks are described. In various implementations, these systems and methods may be applicable to power line communications (PLC). For example, a method may include identifying one of a plurality of orthogonal superframes. The identified superframe may include beacon slots and contention access period (CAP) slots. The beacon slots may follow a sequence of two or more frequency subbands, and the CAP slots may follow the same sequence of two or more frequency subbands. Also, the sequence of two or more frequency subbands may be distinct from other sequences of two or more frequency subbands followed by other beacon slots and CAP slots within others of the plurality of available superframes. The method may then include communicating with another device using the identified superframe. | 10-11-2012 |
20150049720 | BACKHAUL RADIO WITH EXTREME INTERFERENCE PROTECTION - A backhaul radio is disclosed that operates in multipath propagation environments such as obstructed LOS conditions with uncoordinated interference sources in the same operating band. Such a backhaul radio may use a combination of interference mitigation procedures across multiple of the frequency, time, spatial and cancellation domains. Such backhaul radios may communicate with each other to coordinate radio resource allocations such that accurate interference assessment and channel propagation characteristics assessment may be determined during normal operation. | 02-19-2015 |
20150223082 | BACKHAUL RADIO WITH EXTREME INTERFERENCE PROTECTION - A backhaul radio is disclosed that operates in multipath propagation environments such as obstructed LOS conditions with uncoordinated interference sources in the same operating band. Such a backhaul radio may use a combination of interference mitigation procedures across multiple of the frequency, time, spatial and cancellation domains. Such backhaul radios may communicate with each other to coordinate radio resource allocations such that accurate interference assessment and channel propagation characteristics assessment may be determined during normal operation. | 08-06-2015 |
20150295627 | EFFICIENT RANK AND PRECODING MATRIX FEEDBACK FOR MIMO SYSTEMS - The present disclosure provides a receiver, a transmitter and methods of operating a receiver or a transmitter. In one embodiment, the receiver includes a receive unit configured to receive transmissions from multiple antennas. The receiver also includes a rank feedback unit configured to feed back a transmission rank selection, wherein the transmission rank selection corresponds to a transmission rank feedback reduction scheme. The receiver further includes a precoding feedback unit configured to feed back a preceding matrix selection, wherein the preceding matrix selection corresponds to a preceding matrix feedback reduction schemes. | 10-15-2015 |
20160029329 | MAPPING SCHEMES FOR SECONDARY SYNCHRONIZATION SIGNAL SCRAMBLING - Embodiments of the present disclosure provide a transmitter, a receiver and methods of operating a transmitter and a receiver. In one embodiment, the transmitter includes a synchronization unit configured to provide a primary synchronization signal and a secondary synchronization signal having first and second segments. The transmitter also includes a secondary scrambling unit configured to provide a scrambled secondary synchronization signal, wherein scrambling agents for the first and second segments are derived from a primary synchronization sequence of the primary synchronization signal. The secondary scrambling unit is further configured to provide an additional scrambling of one of the first and second segments, wherein a second scrambling agent is derived from the remaining segment of a secondary synchronization sequence of the secondary synchronization signal. The transmitter further includes a transmit unit configured to transmit the primary synchronization signal and the scrambled secondary synchronization signal. | 01-28-2016 |
Patent application number | Description | Published |
20120002714 | Communication on a Pilot Wire - Systems and methods are disclosed for communicating on a pilot wire between Electric Vehicle Service Equipment (EVSE) and an Electric Vehicle (EV). The EVSE and EV exchange a Pulse Width Modulation (PWM) signal on the pilot wire to control charging operations of the EV. Data communications may also be transmitted on the pilot wire, such as between transmit and receive modems. The modems transmit communication signals either continuously, without regard to the state of the PWM signal, or only when the PWM is in an off-state. If transmitting while PWM is on, the modem needs a large coupling impedance and/or a large signal injection. To transmit only when the PWM is off, the modem may use a blocking diode in the coupling circuit or may synchronize to the pulses in the PWM signal. | 01-05-2012 |
20120063497 | Systems And Methods for Implementing Application Profiles and Device Classes in Power Line Communication (PLC) Environments - Systems and methods for application profiles and device classes in power line communications (PLCs) are described. In some embodiments, a PLC device may include a processor and a memory coupled to the processor. The memory may be configured to store program instructions, which may be executable by the processor to cause the PLC device to communicate with a higher-level PLC apparatus over a power line using a frequency band. The frequency band may be selected based upon an application profile and/or a device class associated with the PLC device. In some implementations, the higher-level PLC apparatus may include a PLC gateway or a data concentrator, and the PLC device may include a PLC modem or the like. Examples of application profiles include access communications, in-premises connectivity, AC charging, and/or DC charging. Device classes may represent a minimum communication data rate and/or an operating frequency band restriction of the PLC device. | 03-15-2012 |
20120076211 | Systems and Methods for Facilitating Power Line Communications - Systems and methods for facilitating power line communications are described. In some embodiments, a PLC device may detect the availability of a first frequency band as well the availability of a combination of a second frequency band with a third frequency band. The PLC device may then communicate with another PLC device using a frequency band selected as (a) at least a portion of a combination of the first, second, and third frequency bands, (b) at least a portion of the first frequency band, or (c) at least a portion of the combination of the second with third frequency bands. The PLC device may further transmit a message to a higher-level PLC apparatus (e.g., a domain master) over the power line using a device-based access mode, receive an instruction to switch to a domain-based access mode, and thereafter communicate with another PLC device using the domain-based access mode. | 03-29-2012 |
20120093198 | Building, Transmitting, and Receiving Frame Structures in Power Line Communications - Systems and methods for building, transmitting, and receiving frame structures in power line communications (PLC) are described. Various techniques described herein provide a preamble design using one or more symbols based on a chirp signal that yields a low peak-to-average power ratio (PAPR). According to some techniques, the preamble may be constructed with one or more different types and/or number of symbols configured to identify a PLC domain operating in close physical proximity to another PLC domain. According to other techniques, one or more preamble symbols may be interspersed within a header portion of a PLC frame to facilitate estimation of a frame boundary and/or sampling frequency offset, for example, in the presence of impulsive noise. According to yet other techniques, a PLC detector may be capable of receiving and decoding two or more types of PLC frames (e.g., using different PLC standards). | 04-19-2012 |
20120099628 | Symbol-Level Repetition Coding in Power Line Communications - Systems and methods for implementing symbol-level repetition coding in power line communications (PLC) are described. In some embodiments, these systems and methods may provide reliable communication in severe channel environments of PLC networks, at least in part, by changing the forward error correction (FEC) used by various devices operating within current PLC systems. For example, a method may include receiving a PLC signal and applying convolutional encoding to the received signal, the convolutional encoding producing an encoded signal. The method may also include performing a subcarrier modulation operation upon the encoded signal, the subcarrier modulation operation producing a modulated signal. The method may further include applying symbol-level repetition coding to the modulated signal, the symbol-level repetition coding producing a repetitious signal. In some cases, one or more distinct repetition patterns may be applied to different symbols or portions thereof. The repetitious signal may then be transmitted over a power line. | 04-26-2012 |
20120134395 | Power Line Communications (PLC) Across Different Voltage Domains Using Multiple Frequency Subbands - Systems and methods for implementing power line communications (PLC) across different voltage domains using multiple frequency subbands are described. From an end node's perspective (e.g., a PLC device), a method may include scanning a plurality of downlink subbands usable by a base node (e.g., a PLC router, etc.) to communicate with one or more PLC devices (e.g., other end nodes) from a medium voltage (MV) to a low voltage (LV) power line, and transmitting association request(s) to the base node that select and/or allow the base node to select one or more downlink subbands for use in subsequent communications. From the base node's perspective, the method may include selecting one or more of a plurality of uplink subbands for use in subsequent communications based on the received association request(s). In various implementations, the selection of downlink and/or uplink subbands may be based on signal-to-noise ratio (SNR) values and/or congestion indicators. | 05-31-2012 |
20120147899 | Media Access Control (MAC) Layer for Power Line Communications (PLC) - Systems and methods for a media access control (MAC) layer for power line communications (PLC) are described. In some embodiments, a method may include receiving packets for transmission, each packet associated with a priority code, each priority code unrelated to its corresponding packet's time or order of arrival. The method may also include transmitting a first subset of packets having priority codes higher than priority codes in a second subset, and buffering the packets in the second subset for later transmission. Another method may include identifying a link quality indicator (LQI) associated neighboring service nodes, selecting one of the service nodes with highest LQI, and transmitting a promotion needed packet data unit to the selected service node. Yet another method may include communicating an Internet protocol (IP)-based message to a PLC device that excludes mesh header information, fragmentation header information, and/or the IP address of the PLC device. | 06-14-2012 |
20120189042 | Building, Transmitting, and Receiving Robust Protocol Data Units in Power Line Communications - Systems and methods for building, transmitting, and receiving robust protocol data units (PDUs) in power line communications (PLC) are described. In some embodiments, a method may include receiving a PDU, applying bit-level repetition to at least a portion of the PDU to create a repeated portion, block interleaving two or more symbols corresponding to the repeated portion to create a block interleaved portion, inserting pilot tones in the block interleaved portion, and modulating each tone in the block interleaved portion with respect to a nearest one of the inserted pilot tones to create a robust PDU. In some implementations, the robust PDU may include a first header portion carrying information encoded using a first version of a PLC protocol (e.g., a legacy standard) and a second header portion carrying information encoded using a second version of the PLC protocol (e.g., a newer version of the same standard). | 07-26-2012 |
20120236875 | Slotted Channel Access Techniques in Network Communications - Systems and methods for designing, using, and/or implementing slotted channel access techniques in network communications are described. In some embodiments, a method may include selecting one of a plurality of time slots within a contention access period (CAP), each of the plurality of time slots having a predetermined duration, and transmitting a packet during the selected time slot. For example, the time slot may be selected randomly or based on a round-robin algorithm. In some implementations, the duration of each of the plurality of time slots may correspond and/or be equal to: (a) a duration of a data packet of maximum size, (b) a sum of durations of a request-to-send packet, an interframe space, and a clear-to-send packet, and/or (c) a duration of a guaranteed time slot (GTS) or contention free period (CFP) request packet, as prescribed by a given communication protocol or standard. | 09-20-2012 |
20120236876 | MAC PROTOCOLS WITH SUBBANDING - Systems and methods for designing, using, and/or implementing media access control (MAC) protocols with subbanding are described. In some embodiments, a method may include receiving a beacon packet during one of a plurality of beacon slots of a superframe, each beacon slot corresponding to one of a plurality of different downlink subbands. The method may also include identifying, based on the received beacon packet, contention access periods following the beacon slots, each of the contention access periods corresponding to one of a plurality of different uplink subbands. The method may further include transmitting an information packet over each of the plurality of uplink subbands during the contention access periods. Then, the method may include receiving, during a guaranteed time slot following the contention access periods, an indication of a selected one of the plurality of uplink subbands to be used in a subsequent communications. | 09-20-2012 |
20120263189 | Beacon-Enabled Communications for Variable Payload Transfers - Systems and methods for designing, using, and/or implementing beacon-enabled communications for variable payload transfers are described. In various embodiments, these systems and methods may be applicable to power line communications (PLC). For example, a method may include implementing a superframe having a plurality of beacon slots, a plurality of intermediate slots following the beacon slots, and a poll-based Contention Free Period (CFP) slot following the intermediate slots. Each of the beacon slots and each of the intermediate slots may correspond to a respective one of a plurality of frequency subbands, and the poll-based CFP slot may correspond to a combination of the plurality of frequency subbands. The method may also include receiving a poll request over a first of the plurality of frequency subbands during the poll-based CFP slot, and then transmitting a data packet over a second of the plurality of frequency subbands during the poll-based CFP slot. | 10-18-2012 |
20120275326 | Non-Beacon Network Communications Using Frequency Subbands - Systems and methods for designing, using, and/or implementing non-beacon network communications using frequency subbands are described. In various implementations, these systems and methods may be applicable to Power Line Communications (PLC). For example, a method may include transmitting a beacon request message over a given one of a plurality of frequency subbands, receiving a plurality of beacons in response to having transmitted the beacon request message, each of the plurality of beacons received over a respective one of the plurality of frequency subbands, and calculating a downlink quality report based, at least in part, upon the received beacons. The method may also include transmitting the downlink quality report over each of the plurality of frequency subbands and receiving a subband allocation command in response to having transmitted the downlink quality report, the subband allocation command indicating a downlink subband assignment and an uplink subband assignment. | 11-01-2012 |
20120281716 | Hybrid Communication Networks - Systems and methods for designing, using, and/or implementing hybrid communication networks are described. In various embodiments, these systems and methods may be applicable to power line communications (PLC). For example, one or more of the techniques disclosed herein may include methods to coordinate medium-to-low voltage (MV-LV) and low-to-low voltage (LV-LV) PLC networks when the MV-LV network operates in a frequency subband mode and the LV-LV network operates in wideband mode (i.e., hybrid communications). In some cases, MV routers and LV routers may have different profiles. For instance, MV-LV communications may be performed using MAC superframe structures, and first-level LV to lower-level LV communications may take place using a beacon mode. Lower layer LV nodes may communicate using non-beacon modes. Also, initial scanning procedures may encourage first-to-second -level LV device communications rather than MV-to-first-level LV connections. | 11-08-2012 |
20120281717 | Superframe Coordination in Beacon-Enabled Networks - Systems and methods for designing, using, and/or implementing superframe coordination in beacon-enabled networks are described. In various implementations, these systems and methods may be applicable to Power Line Communications (PLC). For example, a method may include implementing a Media Access Control (MAC) superframe using a communication device. The MAC superframe may include a plurality of beacon slots, a plurality of Contention Access Period (CAP) slots following the plurality of beacon slots, a Contention Free Period (CFP) poll access slot following the plurality of CAP slots, a CFP slot following the CFP poll access slot, an inactivity period following the CFP slot, a beacon region following the inactivity period, and a communication slot following the beacon region. The method may also include communicating with another communication device using the MAC superframe. | 11-08-2012 |
20140146900 | Building, Transmitting, and Receiving Frame Structures in Power Line Communications - Systems and methods for building, transmitting, and receiving frame structures in power line communications (PLC) are described. Various techniques described herein provide a preamble design using one or more symbols based on a chirp signal that yields a low peak-to-average power ratio (PAPR). According to some techniques, the preamble may be constructed with one or more different types and/or number of symbols configured to identify a PLC domain operating in close physical proximity to another PLC domain. According to other techniques, one or more preamble symbols may be interspersed within a header portion of a PLC frame to facilitate estimation of a frame boundary and/or sampling frequency offset, for example, in the presence of impulsive noise. According to yet other techniques, a PLC detector may be capable of receiving and decoding two or more types of PLC frames (e.g., using different PLC standards). | 05-29-2014 |
20140195880 | RATE MATCHING AND SCRAMBLING TECHNIQUES FOR CONTROL SIGNALING - Embodiments of the present disclosure provide a transmitter, a receiver and methods of operating a transmitter and a receiver. In one embodiment, the transmitter includes an input padding module configured to provide padded bits having padding bits added to payload bits for one or more control channels, and a scrambling module configured to apply a masking sequence to one or more of the padded bits to generate scrambled bits. Additionally, the transmitter also includes an encoding module configured to perform forward error correction encoding and rate matching on the scrambled bits to obtain a required number of control channel output bits, and a transmit module configured to transmit the control channel output bits for one or more control channels. | 07-10-2014 |
20140270011 | PSEUDORANDOM SEQUENCE GENERATION FOR OFDM CELLULAR SYSTEMS - In one embodiment, a transmitter includes a binary sequence generator unit configured to provide a sequence of reference signal bits, wherein the sequence is an inseparable function of a cell identification parameter, a cyclic prefix mode corresponding to the transmitter and one or more time indices of the sequence. The transmitter also include a mapping unit that transforms the sequence of reference signal bits into a complex reference signal, and a transmit unit configured to transmit the complex reference signal. In another embodiment, a receiver includes a receive unit configured to receive a complex reference signal and a reference signal decoder unit configured to detect a sequence of reference signal bits from the complex reference signal, wherein the sequence is an inseparable function of a cell identification parameter, a cyclic prefix mode corresponding to a transmitter and one or more time indices of the sequence. | 09-18-2014 |
20150063285 | Non-Beacon Network Communications Using Frequency Subbands - Systems and methods for designing, using, and/or implementing non-beacon network communications using frequency subbands are described. In various implementations, these systems and methods may be applicable to Power Line Communications (PLC). For example, a method may include transmitting a beacon request message over a given one of a plurality of frequency subbands, receiving a plurality of beacons in response to having transmitted the beacon request message, each of the plurality of beacons received over a respective one of the plurality of frequency subbands, and calculating a downlink quality report based, at least in part, upon the received beacons. The method may also include transmitting the downlink quality report over each of the plurality of frequency subbands and receiving a subband allocation command in response to having transmitted the downlink quality report, the subband allocation command indicating a downlink subband assignment and an uplink subband assignment. | 03-05-2015 |
20150085883 | Hybrid Communication Networks - Systems and methods for designing, using, and/or implementing hybrid communication networks are described. In various embodiments, these systems and methods may be applicable to power line communications (PLC). For example, one or more of the techniques disclosed herein may include methods to coordinate medium-to-low voltage (MV-LV) and low-to-low voltage (LV-LV) PLC networks when the MV-LV network operates in a frequency subband mode and the LV-LV network operates in wideband mode (i.e., hybrid communications). In some cases, MV routers and LV routers may have different profiles. For instance, MV-LV communications may be performed using MAC superframe structures, and first-level LV to lower-level LV communications may take place using a beacon mode. Lower layer LV nodes may communicate using non-beacon modes. Also, initial scanning procedures may encourage first-to-second-level LV device communications rather than MV-to-first-level LV connections. | 03-26-2015 |
20150207540 | SYSTEMS AND METHODS FOR IMPLEMENTING APPLICATION PROFILES AND DEVICE CLASSES IN POWER LINE COMMUNICATION (PLC) ENVIRONMENTS - Systems and methods for application profiles and device classes in power line communications (PLCs) are described. In some embodiments, a PLC device has the device class defined by a PHY layer and may include a processor and a memory coupled to the processor. The memory may be configured to store program instructions, which may be executable by the processor to cause the PLC device to communicate with a higher-level PLC apparatus over a power line using a frequency band. The frequency band may be selected based upon an application profile and/or a device class associated with the PLC device. In some implementations, the higher-level PLC apparatus may include a PLC gateway or a data concentrator, and the PLC device may include a PLC modem or the like. Examples of application profiles include access communications, in-premises connectivity, AC charging, and/or DC charging. Device classes may represent a minimum communication data rate and/or an operating frequency band restriction of the PLC device. | 07-23-2015 |
20150319272 | DEVICE AND FRAME STRUCTURE FOR POWERLINE COMMUNICATIONS - Embodiments of the invention provide a device and a frame structure for powerline communications. The header may comprise two parts that are separately encoded. A common header segment is encoded alone, and an embedded header segment is encoded with payload data | 11-05-2015 |
Patent application number | Description | Published |
20090138706 | TECHNIQUES FOR SEARCHING ENCRYPTED FILES - Techniques for efficiently searching encrypted searchable spaces. For example, embodiments of the present invention provide techniques for searching a plurality of files that are stored in encrypted (or ciphertext) form. According to embodiments of the present invention, the search can usually be performed by decrypting only a portion of the encrypted searchable space. According to an embodiment of the present invention, the search techniques determine a set of files comprising one or more files from the plurality of encrypted files that contain a user-specified query element. The set of files is usually determined by decrypting only a subset of the plurality of encrypted files. | 05-28-2009 |
20110060913 | OTP GENERATION USING A CAMOUFLAGED KEY - A system and method is provided for generating a one-time passcode (OTP) from a user device. The method includes providing a passcode application and a cardstring defined by a provider account to the user device. The passcode application is configured to generate a passcode configured as a user OTP for the provider account, using the cardstring. The cardstring is defined by at least one key camouflaged with a personal identification number (PIN). The key may be camouflaged by modifying and encrypting the modified key under the PIN. The key may be configured as a symmetric key, a secret, a seed, and a controlled datum. The cardstring may be an EMV cardstring; and the key may be a UDKA or UDKB. The cardstring may be an OTP cardstring, and the key may be a secret configurable to generate one of a HOTP, a TOTP, and a counter-based OTP. | 03-10-2011 |
20110099480 | METHOD AND SYSTEM FOR MACHINE IDENTIFICATION - A method and system for identifying a machine used for an online session with an online provider includes executing a lightweight fingerprint code from a provider interface during an online session to collect and transmit machine and session information; generating and storing a machine signature or identity including a machine effective speed calibration (MESC) which may be used to identify the machine when the machine is used in a subsequent online session by a method of matching the machine signature and MESC to a database of machine identities, analyzing a history of the machine's online sessions to identify one or more response indicators, such as fraud indicators, and executing one or more responses to the response indicators, such as disabling a password or denying an online transaction, where the response and response indicator may be provider-designated. | 04-28-2011 |
20110113237 | KEY CAMOUFLAGING METHOD USING A MACHINE IDENTIFIER - A method is provided for generating a human readable passcode to an authorized user including providing a control access datum and a PIN, and generating a unique machine identifier for the user machine. The method further includes modifying the controlled access datum, encrypting the controlled access datum using the PIN and/or a unique machine identifier to camouflage the datum, and generating a passcode using the camouflaged datum and the PIN and/or the unique machine identifier. A mobile user device may be used to execute the method in one embodiment. The passcode may be used to obtain transaction authorization and/or access to a secured system or secured data. The unique machine identifier may be defined by a machine effective speed calibration derived from information collected from and unique to the user machine. | 05-12-2011 |
20110113245 | ONE TIME PIN GENERATION - A method and system is provided for generating a one-time passcode (OTP) configured for use as a personal identification number (PIN) for a user account from a user device. The OTP may be generated using an OTP generator which may include an algorithm an user account-specific OTP key. The OTP key may be camouflaged by encryption, obfuscation or cryptographic camouflaging using a PIN or a unique machine identifier defined by the user device. Obtaining an OTP from the user device may require inputting a data element which may be one of a PIN, a character string, an image, a biometric parameter, a user device identifier such as an machine effective speed calibration (MESC), or other datum. The OTP may be used for any transaction requiring a user PIN input, including ATM and debit card transactions, secure access and online transactions. | 05-12-2011 |
20110184867 | SYSTEM AND METHOD FOR GENERATING A DYNAMIC CARD VALUE - A method and system is provided for generating a dynamic card value (DCV) from a mobile user device for use in a transaction between a user cardholder and a transaction provider. The DCV may be configured for use as a card verification value (CVV), also known as a card security code (CSC), a primary account number (PAN), or a portion of a PAN. The DCV may be generated using a DCV generator which may include an algorithm and a DCV generation key. The DCV generation key may be camouflaged. Obtaining a DCV from the user device may require inputting a PIN, a device identifier, a challenge or transaction information. The DCV may be used for any transaction requiring the input of a user identification number and a verification value, including, credit card transactions, debit card transactions, online or telephonic transactions. | 07-28-2011 |
20110202984 | METHOD AND SYSTEM FOR MULTIPLE PASSCODE GENERATION - This invention relates to a method and a system for generating user passcodes for each of a plurality of transaction providers from a mobile user device. A method and system for activating a plurality of passcode generators on a user device configured with a passcode application installed on the user device is provided. Each of the passcode generators may correspond to a different user account or transaction provider, such that each passcode generator provides a user passcode configured for the corresponding account or transaction provider. One or more of the passcode generators may include a passcode generating algorithm and a passcode key. Access to one or more of the passcode generators may require providing a PIN or a challenge. | 08-18-2011 |
20110238573 | CARDLESS ATM TRANSACTION METHOD AND SYSTEM - A method and system are provided for conducting automatic teller machine (ATM) transactions without the use of an ATM card, using a mobile user device. The mobile user device communicates with an ATM, a provider interface or a network. The ATM communicates with the mobile user device through a contact or contactless means, which may include communication through any wireless connection such as RFID, Bluetooth™ or other near field communication means, or through a USB port or other means of contact. A mobile user device may provide transaction information or authentication information to an ATM or to an authentication system in communication with an ATM. The transaction may be associated with the user's ATM account or another account. The mobile user device may generate a dynamic value which may be used as a password, an authentication value, an account identifier or a transaction identifier. | 09-29-2011 |
20110276495 | ONE-TIME USE PASSWORD SYSTEMS AND METHODS - According to the invention, a method of using a one-time password for a transaction between a user and a merchant is disclosed. The method may include generating the one-time password. The method may also include authenticating the user by the authentication server in response to a request from the user to use the one-time password. The method may further include authorizing the use of the one-time password for the transaction in response to authenticating the user by the authentication server. The method may moreover include using the one-time password in combination with an account number to settle the transaction between the user and the merchant. The method may additionally include sending a message to the authentication server originating from the merchant, wherein the message comprises the one-time password, and wherein the message requests a determination whether the one-time password is authorized for use in the transaction. The method may also include sending a message to the merchant originating from the authentication server, wherein the message includes a determination whether the transaction should be approved in response to the authentication server determining whether the one-time password is authorized for use in the transaction. | 11-10-2011 |
20130173789 | METHOD AND SYSTEM FOR MACHINE IDENTIFICATION - A method and system for identifying a machine used for an online session with an online provider includes executing a lightweight fingerprint code from a provider interface during an online session to collect and transmit machine and session information; generating and storing a machine signature or identity including a machine effective speed calibration (MESC) which may be used to identify the machine when the machine is used in a subsequent online session by a method of matching the machine signature and MESC to a database of machine identities, analyzing a history of the machine's online sessions to identify one or more response indicators, such as fraud indicators, and executing one or more responses to the response indicators, such as disabling a password or denying an online transaction, where the response and response indicator may be provider-designated. | 07-04-2013 |
20130332741 | KEY CAMOUFLAGING USING A MACHINE IDENTIFIER - A method is provided for generating a human readable passcode to an authorized user including providing a control access datum and a PIN, and generating a unique machine identifier for the user machine. The method further includes modifying the controlled access datum, encrypting the controlled access datum using the PIN and/or a unique machine identifier to camouflage the datum, and generating a passcode using the camouflaged datum and the PIN and/or the unique machine identifier. A mobile user device may be used to execute the method in one embodiment. The passcode may be used to obtain transaction authorization and/or access to a secured system or secured data. The unique machine identifier may be defined by a machine effective speed calibration derived from information collected from and unique to the user machine. | 12-12-2013 |
20140040629 | OTP GENERATION USING A CAMOUFLAGED KEY - A system and method is provided for generating a one-time passcode (OTP) from a user device. The method includes providing a passcode application and a cardstring defined by a provider account to the user device. The passcode application is configured to generate a passcode configured as a user OTP for the provider account, using the cardstring. The cardstring is defined by at least one key camouflaged with a personal identification number (PIN). The key may be camouflaged by modifying and encrypting the modified key under the PIN. The key may be configured as a symmetric key, a secret, a seed, and a controlled datum. The cardstring may be an EMV cardstring; and the key may be a UDKA or UDKB. The cardstring may be an OTP cardstring, and the key may be a secret configurable to generate one of a HOTP, a TOTP, and a counter-based OTP. | 02-06-2014 |
20140067683 | SYSTEM AND METHOD FOR GENERATING A DYNAMIC CARD VALUE - A method and system is provided for generating a dynamic card value (DCV) from a mobile user device for use in a transaction between a user cardholder and a transaction provider. The DCV may be configured for use as a card verification value (CVV), also known as a card security code (CSC), a primary account number (PAN), or a portion of a PAN. The DCV may be generated using a DCV generator which may include an algorithm and a DCV generation key. The DCV generation key may be camouflaged. Obtaining a DCV from the user device may require inputting a PIN, a device identifier, a challenge or transaction information. The DCV may be used for any transaction requiring the input of a user identification number and a verification value, including, credit card transactions, debit card transactions, online or telephonic transactions. | 03-06-2014 |
20140068271 | METHOD AND SYSTEM FOR MULTIPLE PASSCODE GENERATION - This invention relates to a method and a system for generating user passcodes for each of a plurality of transaction providers from a mobile user device. A method and system for activating a plurality of passcode generators on a user device configured with a passcode application installed on the user device is provided. Each of the passcode generators may correspond to a different user account or transaction provider, such that each passcode generator provides a user passcode configured for the corresponding account or transaction provider. One or more of the passcode generators may include a passcode generating algorithm and a passcode key. Access to one or more of the passcode generators may require providing a PIN or a challenge. | 03-06-2014 |
20140139318 | Mapping Biometrics To A Unique Key - A technique for mapping a biometric credential of a user to a data value such as a key or password. A database stores multiple entries of biometric templates and associated data values for different users. One of the entries is a match for a particular user, and the remaining entries are randomly selected. The number of entries is reasonably large to provide a desired degree of randomness for a given entry, but smaller than a key space of the data values. Based on an input of a biometric sample of the user, a best match is selected from the entries of biometric templates, and the associated data value is used to authenticate the user. Two- or three-factor authentication can be provided. Additional factors can include a password provided by the user and a key which is encrypted by the data value of the matching entry. | 05-22-2014 |
20140181488 | METHOD AND SYSTEM FOR MACHINE IDENTIFICATION - A method and system for identifying a machine used for an online session with an online provider includes executing a lightweight fingerprint code from a provider interface during an online session to collect and transmit machine and session information; generating and storing a machine signature or identity including a machine effective speed calibration (MESC) which may be used to identify the machine when the machine is used in a subsequent online session by a method of matching the machine signature and MESC to a database of machine identities, analyzing a history of the machine's online sessions to identify one or more response indicators, such as fraud indicators, and executing one or more responses to the response indicators, such as disabling a password or denying an online transaction, where the response and response indicator may be provider-designated. | 06-26-2014 |
Patent application number | Description | Published |
20140282872 | STATELESS WEB CONTENT ANTI-AUTOMATION - A computer-implemented method for coordinating content transformation includes receiving, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet; modifying the computer code to obscure operation of the web server system that could be determined from the computer code; generating transformation information that is needed in order to reverse the modifications of the computer code to obscure the operation of the web server system; and serving to the computing client the modified code and the reverse transformation information. | 09-18-2014 |
20140283038 | Safe Intelligent Content Modification - A computer-implemented method for deflecting abnormal computer interactions includes receiving, at a computer server system and from a client computer device that is remote from the computer server system, a request for web content; identifying, by computer analysis of mark-up code content that is responsive to the request, executable code that is separate from, but programmatically related to, the mark-up code content; generating groups of elements in the mark-up code content and the related executable code by determining that the elements within particular groups are programmatically related to each other; modifying elements within particular ones of the groups consistently so as to prevent third-party code written to interoperate with the elements from modifying from interoperating with the modified elements, while maintain an ability of the modified elements within each group to interoperate with each other; and recoding the mark-up code content and the executable code to include the modified elements. | 09-18-2014 |
20140283067 | DETECTING THE INTRODUCTION OF ALIEN CONTENT - A computer-implemented method for identifying abnormal computer behavior includes receiving, at a computer server subsystem, data that characterizes subsets of particular document object models for web pages rendered by particular client computers; identifying clusters from the data that characterize the subsets of the particular document object models; and using the clusters to identify alien content on the particular client computers, wherein the alien content comprises content in the document object models that is not the result of content that is the basis of the document object model served. | 09-18-2014 |
20140283068 | PROTECTING AGAINST THE INTRODUCTION OF ALIEN CONTENT - In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet. The method can also modify the computer code to obscure operational design of the web server system that could be determined from the computer code, and supplement the computer code with instrumentation code that is programmed to execute on the computing client. The method may serve the modified and supplemented computer code to the computing client. | 09-18-2014 |
20140283069 | PROTECTING AGAINST THE INTRODUCTION OF ALIEN CONTENT - In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet. The method can also modify the computer code to obscure operational design of the web server system that could be determined from the computer code, and supplement the computer code with instrumentation code that is programmed to execute on the computing client. The method may serve the modified and supplemented computer code to the computing client. | 09-18-2014 |
20150350181 | CLIENT/SERVER AUTHENTICATION USING DYNAMIC CREDENTIALS - In an embodiment, a method comprises intercepting, from a first computer, a first set of instructions that define one or more original operations, which are configured to cause one or more requests to be sent if executed by a client computer; modifying the first set of instructions to produce a modified set of instructions, which are configured to cause a credential to be included in the one or more requests sent if executed by the client computer; rendering a second set of instructions comprising the modified set of instructions and one or more credential-morphing-instructions, wherein the one or more credential-morphing-instructions define one or more credential-morphing operations, which are configured to cause the client computer to update the credential over time if executed; sending the second set of instructions to a second computer. | 12-03-2015 |
20150350213 | SELECTIVELY PROTECTING VALID LINKS TO PAGES OF A WEB SITE - In an embodiment, a method comprises intercepting, using a server computer, a first set of instructions that define a user interface and a plurality of links, wherein each link in the plurality of links is associated with a target page, and the plurality of links includes a first link; determining that the first link, which references a first target page, is protected; in response to determining the first link is protected: generating a first protected link that is different than the first link and includes first data that authenticates a first request that has been generated based on the first protected link and that references the first target page; and generating a first decoy link that includes second data that references a first decoy page and not the first target page; rendering a second set of instructions comprising the first protected link and the first decoy link, but not the first link, and which is configured to cause a first client computer to present the first protected link in the user interface and hide the first decoy link from the user interface; sending the second set of instructions to the first client computer. | 12-03-2015 |
20150350243 | Safe Intelligent Content Modification - A computer-implemented method for deflecting abnormal computer interactions includes receiving, at a computer server system and from a client computer device that is remote from the computer server system, a request for web content; identifying, by computer analysis of mark-up code content that is responsive to the request, executable code that is separate from, but programmatically related to, the mark-up code content; generating groups of elements in the mark-up code content and the related executable code by determining that the elements within particular groups are programmatically related to each other; modifying elements within particular ones of the groups consistently so as to prevent third-party code written to interoperate with the elements from modifying from interoperating with the modified elements, while maintain an ability of the modified elements within each group to interoperate with each other; and recoding the mark-up code content and the executable code to include the modified elements. | 12-03-2015 |
20150378968 | AUTOMATICALLY DETERMINING WHETHER A PAGE OF A WEB SITE IS BROKEN DESPITE ELEMENTS ON THE PAGE THAT MAY CHANGE - In an embodiment, a method comprises rendering a first image of a first user interface based on a first set of instructions; rendering a second image of a second user interface based on a second set of instructions; generating a first mask comprising a plurality of points, wherein each point in the first mask indicates whether a first point in the first image and a second point in the second image are different; rendering a third image of a third user interface based on a third set of instructions, wherein the first set of instructions are different than the third set of instructions and the first image is different than the third image; determining that the first image is equivalent to the third image based on the first image, the first mask, and the third image. | 12-31-2015 |
20160050231 | SELECTIVELY PROTECTING VALID LINKS TO PAGES OF A WEB SITE - In an embodiment, a method comprises intercepting, using a server computer, a first set of instructions that define a user interface and a plurality of links, wherein each link in the plurality of links is associated with a target page, and the plurality of links includes a first link; determining that the first link, which references a first target page, is protected; in response to determining the first link is protected: generating a first protected link that is different than the first link and includes first data that authenticates a first request that has been generated based on the first protected link and that references the first target page; and generating a first decoy link that includes second data that references a first decoy page and not the first target page; rendering a second set of instructions comprising the first protected link and the first decoy link, but not the first link, and which is configured to cause a first client computer to present the first protected link in the user interface and hide the first decoy link from the user interface; sending the second set of instructions to the first client computer. | 02-18-2016 |