METHOD AND SYSTEM FOR PERFORMING TASK IN ACCESS CONTROL DEVICE

    公开(公告)号:US20240340645A1

    公开(公告)日:2024-10-10

    申请号:US18296187

    申请日:2023-04-05

    申请人: ARMATURA LLC

    发明人: Fang Pei

    摘要: Embodiments herein disclose a mobile access control system (1000) and method. The system (1000) comprises a mobile device (200), an access control device (300) and a credential management server (100). The mobile device (200) sends an access credential request message for the user to a credential management server (100), receives the credential data and a wireless communication range based on the user from the server (100), verifies the user based on a match between the credential data received from the server (100) and the credential data of the user stored in the mobile device (200), activates an access control application in the mobile device (200), and encrypts the received data. The access control device (300) establishes a connection with the mobile device (200) and receives the encrypted data from the mobile device (200) using the short-range wireless communication, decrypts the encrypted data, and controls the access to the secured area.

    SYSTEMS INVOLVING MOBILE DEVICES AND/OR PLATFORM AGNOSTIC INFRASTRUCTURE FEATURES FOR IN-BRANCH AUTHENTICATION AND/OR AUTHORIZATION AND METHODS OF USE THEREOF

    公开(公告)号:US20240338702A1

    公开(公告)日:2024-10-10

    申请号:US18131796

    申请日:2023-04-06

    IPC分类号: G06Q20/40 H04W12/47 H04W12/64

    摘要: Systems and methods involving platform agnostic infrastructure for in-branch authentication and authorization, e.g., for customers and/or transactions, are disclosed. In one embodiment, an exemplary method may include initiating, upon an account access attempt, an authentication-authorization session based on account information, receiving a transaction request from an app running on a customer computing device, updating the session data of the current authentication/authorization session with the transaction request, determining a transaction risk level based on session data of current and/or prior session(s), initiating an authentication procedures based on transaction information, selecting an authentication mechanism from a library based on the authentication procedures, utilizing the authentication mechanism to authenticate the user according to the authentication procedure(s), enabling the app, upon authentication, to proceed to perform the transaction, and/or concluding the session and/or updating the session data with the one or more authentication procedures and/or transaction details of the completed transaction.

    METHODS AND APPARATUS FOR FACILITATING NFC TRANSACTIONS

    公开(公告)号:US20240236686A1

    公开(公告)日:2024-07-11

    申请号:US18435250

    申请日:2024-02-07

    申请人: Ouraring, Inc.

    摘要: An access control system includes a first controller having a first antenna interface for broadcasting identifying data to local devices, for receiving ephemeral ID signals, token signals or payload data from local devices, and a first processor for determining a first authentication when an ephemeral ID signal or a token from a first local device is determined to be valid, for determining a second authentication when an ephemeral ID signal or a token from a second local device is determined to be valid, and for instructing a peripheral to perform a user-perceptible action in response to the first authentication, and a second controller coupled to the first controller having a second processor for receiving payload data for the second local device in response to the second authentication, and a second antenna interface for outputting at least a portion of the payload data to the remote server in response to the second authentication.

    Access control for Near Field Communication functions

    公开(公告)号:US12022294B2

    公开(公告)日:2024-06-25

    申请号:US16951450

    申请日:2020-11-18

    申请人: NXP B.V.

    CPC分类号: H04W12/47 H04W12/08

    摘要: It is described a method, a control device, and a computer program for enabling/disabling at least one near field communication (NFC) function of a mobile device (MD). It is further described such a MD. The method comprises (a) associating the at least one NFC function to be enabled/disabled with a corresponding secure application (SA) installed in a secure element (SE) system; (b) checking whether the SA complies with a predefined secure condition; (c) if the SA complies with the predefined secure condition, transmitting a notification from the SA to the NFC control system (NFCC) via an interface between the SE system and the NFCC; and (d) enabling/disabling, by the NFCC, the at least one NFC function based on information comprised by the transmitted notification.

    System and method for hosting FIDO authenticators

    公开(公告)号:US11930006B2

    公开(公告)日:2024-03-12

    申请号:US18143909

    申请日:2023-05-05

    IPC分类号: H04L9/40 H04W12/47

    CPC分类号: H04L63/0853 H04W12/47

    摘要: A system or method for hosting and managing FIDO authenticators in local network or cloud for users in a shared multi-user environment; which receives an authentication request initiated by a relying party application on a computing device via Web Authentication (WebAuthn) interface; and uses unique identifiers (such as RFID tags) to distinguish the hosted authenticators associated with each user to forward the authentication request; and receiving a response to that authentication request from the hosted authenticator on the local network or cloud; and transmitting the authentication response back to the sender application on the computing device for authentication purposes.

    MOBILE USER AUTHENTICATION SYSTEM AND METHOD
    39.
    发明公开

    公开(公告)号:US20240078304A1

    公开(公告)日:2024-03-07

    申请号:US18261569

    申请日:2022-01-14

    摘要: Methods and systems for mobile cardholder authentication are provided. An access device can obtain interaction data produced during an interaction between a user and the resource provider computer in which the user attempts to obtain a resource from a resource provider and user device data comprising a cryptogram and supplemental data from the user device or another user device operated by the user. The cryptogram of the user device can be validated and the interaction data and user device data can be compared to determine that the user interacting with the access device is the same user as the user that interacted with the resource provider computer. The access device can provide an indication that the resource will be provided to the user responsive to determining that the user interacting with the access device is the same user as the user that interacted with the resource provider computer.