SECURITY DEVICE AND INFORMATION MANAGEMENT SYSTEM

    公开(公告)号:US20240004979A1

    公开(公告)日:2024-01-04

    申请号:US18466126

    申请日:2023-09-13

    CPC classification number: G06F21/32 G06F21/35

    Abstract: According to an embodiment, a security device includes an interface, a secure memory, and a processor. The interface communicates with a mobile terminal including a function of disclosing information. The secure memory stores information to be used for authentication. The processor receives an authentication request associated with an instruction to disclose information to be subjected to security management in the mobile terminal by the interface, specifies an authentication process to be executed by using information stored in the secure memory in accordance with content of the authentication request, and notifies the mobile terminal of an authentication result of execution of the specified authentication process.

    SYSTEM FOR AUTHENTICATING A USER AT AND REPORTING ABOUT USE OF A CHARGING DEVICE

    公开(公告)号:US20230415595A1

    公开(公告)日:2023-12-28

    申请号:US18249477

    申请日:2021-10-28

    Applicant: HEYCHARGE GMBH

    CPC classification number: B60L53/305 G06F21/35

    Abstract: The present invention relates to an authenticating and reporting system (10) for authenticating a user at and reporting about use of a charging device (40) comprising: —at least one database unit comprising: —at least one cryptography module (22) configured to sign and/or encrypt authentication elements (28) and to decrypt charging report elements (48), and —at least one transmitting and receiving module (26) configured to transmit encrypted authentication elements (28) and to receive encrypted charging report elements (48); —at least one charging device (40) comprising: —at least one wireless communication module (44), —at least one encrypting and decrypting unit (46), —at least one storage module (42), and —at least one control module, wherein the at least one charging device (40) is configured to decrypt the authentication elements (28), control a charging procedure of a connected chargeable device, provide encrypted charging report elements (48), and store a timestamp parameter of a transmitted encrypted charging report element (48) or a group of transmitted encrypted charging report elements (48); - and at least one mobile device (30) configured to transfer the authentication elements (28) from the database unit (20) to the charging device (40) and the charging report elements (28) from the charging device (40) to the database unit (20).

    Wireless kill switch
    36.
    发明授权

    公开(公告)号:US11803626B2

    公开(公告)日:2023-10-31

    申请号:US17805812

    申请日:2022-06-07

    Applicant: Mewt LLC

    CPC classification number: G06F21/35 H04L43/10 H04L43/16

    Abstract: A system comprising: a wireless kill switch and a computer; said wireless kill switch comprising: a housing, a radio transmitter, a microcontroller, an operable button, and a battery; said housing encasing the radio transmitter, the microcontroller, and the battery and allowing for operation of the operable button; the radio transmitter transmitting a continuous service signal to be received by a receiver on said computer and a heartbeat signal generated as a data packet on a first predetermined time basis; wherein said system maintains an operational state upon receipt of the continuous service signal and receipt of the heartbeat signal at a second predetermined time basis; and wherein the system modifies the computer to a different state than the operational state upon omission of the continuous service signal or the heartbeat signal.

    Authentication with secondary approver

    公开(公告)号:US11755712B2

    公开(公告)日:2023-09-12

    申请号:US17519025

    申请日:2021-11-04

    Applicant: Apple Inc.

    Abstract: Techniques are provided for giving access to restricted content on a first device from a second device through a wireless network. In one embodiment, the first device transmits an authorization request signal to the second device or to a server in the wireless network. The second device, having received the authorization request, prompts an authorized user to give authorization to the first device by inputting an authentication key such as a password or gesture on the second device. Upon verification of the authentication key, an authorization signal may be wirelessly transmitted to the first device, permitting access to the restricted content or functions on the first device. In some embodiments, the second device may be alerted to an authorization request and may select a request for authorization from a selectable queue of requests.

Patent Agency Ranking