摘要:
A transaction authentication system uses a mobile unit to connect with a wireless network and with an authentication station using a short-range transceiver. Prior to a transaction, the mobile unit transmits an Identity to an authentication processor using the wireless provider network and receives a Hash and Identifiers therefrom. During a transaction, the mobile unit connects to an authentication station using a short-range air link and transmits its Hash. The authentication station transmits the received Hash to the authentication processor, which confirms the Identity of the mobile unit. If identified, the authentication processor sends a Private Identifier to the authentication station and the mobile unit connects using an air link with the Private Identifier. The authentication station sends a success message if it connects to the mobile unit using the Private Identifier air link. A device authentication message is sent to a transaction processor to process the requested transaction.
摘要:
The identity of a mobile communication device can be authenticated to allow the device to access a web site without the need for a user log-in operation. The mobile device stores an identity token and sends it to the web server in the web browser data stream. Additionally, the mobile device transmits an identity token to an authentication entity using a data stream other than the web browser data. The authentication entity queries the wireless network to verify authentication of the mobile device. The identity token may be the mobile telephone number itself, a temporary mobile subscriber identity assigned by the mobile network, or encrypted or hashed versions of either. Alternatively, a new temporary mobile subscriber identity may be sent to the mobile device and retransmitted back to the authentication entity.
摘要:
A system to permit push-to-talk communications in an orthogonal frequency division multiplexed (OFDM) communication network. Individual wireless communication devices that are part of a Group Call are assigned the same set or sets of OFDM tones for a downlink timeslot. Because each wireless communication device receives the same set of tones, each device will receive a communication simultaneously. The assigned OFDM tones need not be contiguous within a block of available tones. Because a large number of OFDM tones are available, the concept may be extended to a large number of groups that each separately support a Group Call function.
摘要:
Computers can be authenticated using automatically combined images. During an authentication process, a server transmits an image to a client. The transmitted image is combined with a stored image using a randomly selected logical operator to generate a combined image. The combined image is transmitted back to the server. The server has a copy of the transmitted image and the stored image and generates a series of template combined images using different logical operators selected from a set of logical operators to determine whether any of the template combined images match the received combined image. If the received combined image matches one of the template combined images, the user is authenticated.
摘要:
A base station includes multiple transmitter-receiver elements coupled to multiple antennas. The activation of additional baseband signal processing resources, dynamically mapped via a programmable digital interface module to a subset of the original transmitter-receiver sets in the base station to double capacity of the system or facilitate simultaneous operation of multiple air interface technologies with minimal or no hardware modifications to the base station or cell site. With a base station having four transmitter-receivers, the system transmits and receives the same signal on all transmitter-receivers to provide a 4×2 downlink and a 1×4 uplink. The system can be reconfigured by splitting the transmitter-receiver sets into two logically separate units. An additional base station modem resource is activated to double the capacity of the radio system or to implement a different communication protocol allowing transition between technologies.
摘要:
A system and method for delivering coupon messages to a consumer wireless device utilizes a fixed communication device that functions as a base station for the consumer wireless device. The fixed communication device has limited coverage zone. When the consumer wireless device comes within the coverage zone of the fixed communication device, the consumer wireless device selects the fixed communication device as the preferred base station. Upon completion of registration, the fixed communication device transmits one or more coupon messages to the consumer wireless device. The consumer may enter the associated retail establishment and complete a transaction using the received coupon message. The consumer wireless device may be viewed manually, or the display scanned or read electronically to accept the coupon message in the retail establishment.
摘要:
Client and server computers on a network can be authenticated using a shared secret. During a log-on and authentication process, the server transmits an image to the client. A mobile communication device captures and analyzes the image. If the image contains the shared secret, the mobile device can authenticate the server. The secret in the image can be a geometric relationship between elements of the picture, a mathematical relationship between elements, a particular number or types of elements in the picture, colors of elements, or combinations of the above. A single image may contain multiple shared secrets. The mobile device can readily analyze the image to determine if it contains the shared secret and thereby authenticate the server.
摘要:
Computers can be authenticated using a shared secret. During an authentication process, a server transmits an image to a client. A mobile device captures and analyzes the image. If the image contains the shared secret known only to the authentic server and the authentic mobile communication device, the mobile device can authenticate the server. The secret in the image can be readily analyzed. A single image may contain multiple shared secrets. Once the server has been authenticated, the user must modify the image in accordance with a shared modification secret to thereby authentic the user. The modified image is transmitted back to the authenticated server. If the image was properly modified, the user is authenticated.
摘要:
A transaction authentication system uses a computer network and mobile telephone network to authenticate a user. The user initiates a transaction and provides an identity token, such as the mobile telephone number. The identity token is used by an authentication server to initiate the issuance of a new temporary identity for the corresponding mobile device. The new temporary identity is forwarded from the mobile device to the authentication server which issues a security code if there is a match between the new temporary identities. The security code is forwarded to a transaction server which relays it to the authentication server. If the forwarded security code matches the generated security code, the transaction is permitted to continue.
摘要:
Client and server computers on a network can be authenticated using a shared secret. During a log-on and authentication process, the server transmits an image to the client. A mobile communication device captures and analyzes the image. If the image contains the shared secret, the mobile device can authenticate the server. The secret in the image can be a geometric relationship between elements of the picture, a mathematical relationship between elements, a particular number or types of elements in the picture, colors of elements, or combinations of the above. A single image may contain multiple shared secrets. The mobile device can readily analyze the image to determine if it contains the shared secret and thereby authenticate the server.