Network supporting two-factor authentication for modules with embedded universal integrated circuit cards

    公开(公告)号:US10594679B2

    公开(公告)日:2020-03-17

    申请号:US16271455

    申请日:2019-02-08

    Inventor: John A. Nix

    Abstract: A network with a set of servers can support authentication from a module, where the module includes an embedded universal integrated circuit card (eUICC). The network can send a first network module identity, a first key K, and an encrypted second key K for an eUICC profile to an eUICC subscription manager. The second key K can be encrypted with a symmetric key. The module can receive and activate the eUICC profile, and the network can authenticate the module using the first network module identity and the first key K. The network can (i) authenticate the user of the module using a second factor, and then (ii) send the symmetric key to the module. The module can decrypt the encrypted second key K using the symmetric key. The network can authenticate the module using the second key K. The module can comprise a mobile phone.

    Power management and security for wireless modules in “machine-to-machine” communications

    公开(公告)号:US10523432B2

    公开(公告)日:2019-12-31

    申请号:US16271428

    申请日:2019-02-08

    Inventor: John A. Nix

    Abstract: Methods and systems are provided for power management and security for wireless modules in “Machine-to-Machine” communications. A wireless module operating in a wireless network and with access to the Internet can efficiently and securely communicate with a server. The wireless network can be a public land mobile network (PLMN) that supports wireless wide area network technology including 3rd generation (3G) and 4th generation (4G) networks, and future generations as well. The wireless module can (i) utilize sleep and active states to monitor a monitored unit with a sensor and (ii) communicate with wireless network by utilizing a radio. The wireless module can include power control steps to reduce the energy consumed after sending sensor data by minimizing a tail period of a radio resource control (RRC) connected state. Messages between the wireless module and server can be transmitted according to the UDP or UDP Lite protocol with channel coding in the datagram body for efficiency while providing robustness to bit errors. The wireless module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The wireless module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The communication system between the wireless module and the server can conserve battery life in the wireless module while providing a system that is secure, scalable, and robust.

    Network supporting two-factor authentication for modules with embedded universal integrated circuit cards

    公开(公告)号:US10362012B2

    公开(公告)日:2019-07-23

    申请号:US15162292

    申请日:2016-05-23

    Inventor: John A. Nix

    Abstract: A network with a set of servers can support authentication from a module, where the module includes an embedded universal integrated circuit card (eUICC). The network can send a first network module identity, a first key K, and an encrypted second key K for an eUICC profile to an eUICC subscription manager. The second key K can be encrypted with a symmetric key. The module can receive and activate the eUICC profile, and the network can authenticate the module using the first network module identity and the first key K. The network can (i) authenticate the user of the module using a second factor, and then (ii) send the symmetric key to the module. The module can decrypt the encrypted second key K using the symmetric key. The network can authenticate the module using the second key K. The module can comprise a mobile phone.

    Methods for using extracted features to perform an action associated with selected identified image

    公开(公告)号:US10205781B1

    公开(公告)日:2019-02-12

    申请号:US15785171

    申请日:2017-10-16

    Inventor: Ingemar J. Cox

    Abstract: Methods and systems to perform methods comprising receiving, at a computer system from a first electronic device a first electronic media work; extracting one or more features therefrom; determining that at least a portion of the first electronic media work corresponds to a first reference media work based on a matching of the extracted features against a database of reference features; receiving, from a second electronic device, a query related to the first electronic media work; linking the query to action information in an action database based upon determining that at least a portion of the first electronic media work corresponds to the first reference media work; generating machine-readable instructions associated with the action to be performed based at least in part on the linking of the query to the action information; transmitting, to the second electronic device, the machine-readable instructions; and logging an event associated with the machine-readable instructions.

Patent Agency Ranking