Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

488 results about "Access key" patented technology

In a web browser, an access key or accesskey allows a computer user to immediately jump to a specific part of a web page via the keyboard. They were introduced in 1999 and quickly achieved near-universal browser support.

Access Control Through Multifactor Authentication with Multimodal Biometrics

A system is provided in which a person may use a Cellular (Mobile) Telephone, a PDA or any other handheld computer to make a purchase. This is an example only. The process may entail any type of transaction which requires authentication, such as any financial transaction, any access control (to account information, etc.), and any physical access scenario such as doubling for a passport or an access key to a restricted area (office, vault, etc.). It may also be used to conduct remote transactions such as those conducted on the Internet (E-Commerce, account access, etc.). In the process, a multifactor authentication is used.
Owner:BEIGI HOMAYOON

Methods and apparatus for transferring product information from manufacturers to retailers and distributors via the Internet

Methods and apparatus for disseminating over the Internet product information produced and maintained by product manufacturers using existing universal product codes (bar codes) as access keys. A cross-referencing resource preferably implemented by the existing Internet Domain Name System (DNS) receives Internet request messages containing all or part of a universal product code value and returns the Internet address at which data or services relating to the identified product, or to the manufacturer of that product, may be obtained. By using preferred Web data storage formats and protocol which conform to XML, XLS, XLink, Xpointer, RDF and Web service standards specifications, product and company information may be seamlessly identified, retrieved and integrated with information from other sources. A “web register” module can be employed to provide an Internet interface between a shared sales Internet server and an otherwise conventional inventory control system, and operates in conjunction with the cross-referencing server to provide detailed product information to Internet shoppers who may purchase goods from existing stores via the Internet.
Owner:PROD ASSOC TECH LLC +1

Vehicle system for activating a vehicle component

A vehicle system for activating at least one vehicle component to provide access to a vehicle. A first receiver is operative to obtain a wireless signal at least comprising first identification data of an electronic device; a memory device storing at least second identification data; at least a second receiver being operative to check the presence of a matching vehicle access key, and the at least second receiver being operative to check the presence of a matching vehicle access key if the first identification data match the at least second identification data.
Owner:VOLKSWAGEN AG +1

Method of self-service access control for frequent guests of a housing facility

An improved electronic lock with keyless, card-less digital key system is provided for use in residential and commercial buildings. The invention describes a novel method of self-service remote assignment and access authorization to the facility for a specified period of time, and consequent contact-less operation of door locks by means of a mobile device. The method requires no interaction with the facility's front desk or reception or management for checking in, checking out, payments, or access key pick up or drop off.
Owner:FONEKEY

Distributed dynamic security for document collaboration

Techniques are provided for dynamically managing security for document collaboration. A document is associated with a list of collaborators, which can access the document. One collaborator is an identity service. The identity service is capable of dynamically encrypting versions of an access key needed by a collaborator to access the document and capable of dynamically adding or removing collaborators from the list of collaborators.
Owner:ORACLE INT CORP

System for regulating access to a resource

A system for regulating access to a resource by a plurality of users is provided. The system comprises: a plurality of portable access keys, each being provided to one of the users and having an associated variable access parameter; an access barrier, having an open state allowing passage through and a closed state denying access to the resource, and defining an access queue; a sensor that determines an access queue characteristic related to a number of users in the access queue; a controller, which sets an access criterion based on the determined access queue characteristic; and a detector, located at the access barrier and which determines the variable access parameter of a portable access key when it is brought into the vicinity of the detector. The controller sets the access barrier in its open state if the variable access parameter determined by the detector meets the access criterion.
Owner:LO Q

Method for operating a network, a system management device, a network and a computer program therefor

ActiveUS20110197064A1Minimizing communicational requirementMinimize computation requiredKey distribution for secure communicationUser identity/authority verificationSystems managementDistributed computing
The present invention relates to a method for operating a network comprising communicating devices representing nodes of the network. More precisely, the invention relates to a method for operating a network (1), comprising a node (D1) and a system management device (3), the system management device comprising a root keying material being a set of alpha-secure functions having a degree of complexity of, and the node being provided with a node keying material share of degree of complexity α derived from the root keying material. The method comprises the following steps, upon receipt at the system management device of a request for an external user (4) to gain access to the node (D1): the system management device generates an external user keying material share of degree of complexityα from the root keying material and an access identifier, the system management device generates an access keying material of degree of complexity less than α, from the external user keying material share and an identifier of the node, the system management device provides the external user with the access keying material share and the access identifier, the external user derives a key from the access keying material share, and transmitting this key and the access certificate to the node, the node computes a key from the access identifier and the node keying material share, and the node compares the key transmitted by the external user and the key computed by the node, so as to authenticate the external user.
Owner:KONINKLIJKE PHILIPS ELECTRONICS NV

Method and apparatus for personally controlled sharing of medical image and other health data

A method and apparatus for personally controlled sharing of medical image and other health data are disclosed. According to one aspect, the subject matter described herein includes a method for patient mediated access to patient health information maintained by different healthcare facilities and other health record repositories. The methods includes, using a central key server and a plurality of data servers local to healthcare facilities and other health record repositories. At the central key server, a patient controlled registry of access keys that control access to patient health information maintained by different healthcare facilities is provided. The central key server receives, from a data server of a first healthcare facility, a request for an access key that controls access to health information for a patient maintained by a second healthcare facility. In response to the request, the central key server authenticates credentials of the patient and the first healthcare facility, verifies permission from the patient to release the access key to the first healthcare facility, locates the access key for the health information for the patient at the second healthcare facility, and provides the access key to the first healthcare facility. The access key is used by the data server of the first healthcare facility to obtain health information for the patient directly from the data server of the second healthcare facility after successful authentication and verification by the second healthcare facility.
Owner:WAKE FOREST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products