Inteum Company
Links
seedsprint
Visible Legacy
RSS
News & Resources
Inteum Company News
Inteum Library
Subscribe
Search Results - authentication
9
Results
Sort By:
Published Date
Updated Date
Title
ID
Descending
Ascending
Authenticating a User on a Mobile Device
Protecting mobile devices from unauthorized access is becoming more than indispensable these days. In particular, mobile devices such as smartphones and tablets are pervasive and store increasingly highly sensitive information about a user (e.g., contacts, usernames, passwords, emails, browser histories, business secrets, health conditions, etc.)....
Published: 2/27/2023
|
Inventor(s):
Yimin Chen
,
Yanchao Zhang
Keywords(s):
Authentication
,
Detection
,
Mobile technology
,
Recognition imaging
,
Security
,
Transactions Security
Category(s):
Computing & Information Technology
,
Physical Science
,
Intelligence & Security
Hand Waving Based Mutual
Authentication
for Drone Delivery
Reference #: 01533 The University of South Carolina is offering licensing opportunities for Hand Waving Based Mutual
Authentication
for Drone Delivery Background: When a drone is delivering a package to a user, it has to make sure the person waiting there is the real user. Similarly, when a user uses a drone to send a package, she needs to make sure...
Published: 12/18/2024
|
Inventor(s):
Qiang Zeng
,
Lannan Luo
Keywords(s):
authentication
,
Drone delivery
Category(s):
Software and Computing
Unobservable Re-
authentication
for Smartphones
Smart phones are very popular and used by over seven billion people. Each day seven million dollars worth of cell phones is lost or stolen. Without an
authentication
device, personal data stored on the device can be used for identity theft or the phone can be used for unauthorized purposes. Most authentication systems authenticate a user only once when...
Published: 2/23/2023
|
Inventor(s):
Lingjun Li
,
Xinxin Zhao
,
Guoliang Xue
Keywords(s):
Authentication
,
Networks, IT, Software and Communication
,
Smart Devices
,
Smartphone
Category(s):
Computing & Information Technology
Efficient Identification and Content
Authentication
for Phone Calls
Cryptographically Authenticates Phone Calls for Secure Personal and Professional CommunicationsThis application cryptographically verifies the identity of callers to ensure that phone calls are authentic, assuring users that their information is safe. Financial, medical, or other personal information is commonly communicated through phone calls or other...
Published: 6/27/2021
|
Inventor(s):
Patrick Traynor
,
Bradley Reaves
,
Logan Blue
,
Luis Vargas
,
Hadi Abdullah
,
Thomas Shrimpton
Keywords(s):
authentication
,
Caller ID
,
Phone Fraud
Category(s):
Technology Classifications > Engineering > Computer Science
Convenient Caller ID Verification Protocol for All Telephony Networks
AuthLoop Allows Efficient Cryptographic
Authentication
via Voice ChannelThis caller ID verification system allows efficient authentication through the voice data channel, improving consumer security on phone calls occurring on any combination of available telephony networks. Sensitive information, including banking and credit card account authorizations,...
Published: 6/23/2022
|
Inventor(s):
Patrick Traynor
,
Logan Blue
,
Bradley Reaves
Keywords(s):
authentication
,
cryptography
,
phone
Category(s):
Technology Classifications > Engineering > Computer Science
Radio-Frequency (RF) Imaging Sensor for Advanced Security Fingerprint Biometrics and Mobile Health Monitoring
Current portable and wearable devices use fingerprint analysis for secure
authentication
. The fingerprint pattern systems analyze only the surface morphology of the fingerprint, making it easy for hackers to spoof and bypass authentication. RF signals can collect tissue information beyond the surface of the finger and can provide increased security...
Published: 2/23/2023
|
Inventor(s):
Georgios Trichopoulos
,
Panagiotis Theofanopoulos
Keywords(s):
Authentication
,
Cyber Security
,
Cyber-Physical System
,
Engineering
,
Fingerprint
,
Graphenes
,
Health Monitoring
,
Medical Devices and Imaging
,
Mobile Biometrics
,
Real-Time System
,
Screening
,
Smart Devices
,
Transactions Security
Category(s):
Chemical/Biological Sensors
,
Diagnostic Assays/Devices
,
Medical Diagnostics/Sensors
,
Physical Science
,
Intelligence & Security
Authenticaation and Quality Assessment of chinese Medicinal Materials by DNA and Chemical Technologies
Invention Reference: 51, 67, 128 459,514 Traditional Chinese Medicines examined using these technologies include the followings: - 冬蟲夏草、黨參、素花黨參、川黨參、管花黨參、新疆黨參、灰毛黨參、球花黨參...
Published: 5/15/2018
|
Inventor(s):
Pang Chui Shaw
,
Li li Jiang
,
Ka Lok Wong
,
Yuk Lau Wong
Keywords(s):
Authentication
,
Quality Assessment
Category(s):
Others
Algorithm for Continuous Distributed Lexicographic Max-Min Resource Allocation
Currently, mobile wireless networks use contention-based protocols because of their simplicity and ability to adapt to changes in network conditions. Unfortunately, these systems lack the ability to prioritize the supply and demand load and changes in topology. This inability can cause variances in or delay of signals that can be important in applications...
Published: 2/23/2023
|
Inventor(s):
Jonathan Lutz
,
Charles Colbourn
,
Violet Syrotiuk
Keywords(s):
Authentication
,
Networks, IT, Software and Communication
,
Smart Devices
,
Smartphone
Category(s):
Wireless & Networking
Master Electronic Key for Multi-Purpose
Authentication
IntroductionPeople carry numerous keys, including physical keys, key cards for doors, parking and other use, garage door openers, and wireless fobs for cars, and they also use passwords or physical tokens for unlocking laptops and cell phones. It would be a great convenience to consolidate these into a single electronic key that could gain access to...
Published: 2/17/2023
|
Inventor(s):
Feng Zhu
,
Matt Mutka
,
Lionel Ni
Keywords(s):
Authentication
,
Master Key
,
Pervasive Computing
Category(s):
Computer Software
,
Communication